Tom & Bill

   Attached is the output of the "shorewall dump" command.

I changed LOGFILE = /var/log/shorewall       but nothing is ever written there.

Thanks
Jim



On 12/12/2017 02:39 PM, Tom Eastep wrote:
On 12/12/2017 01:16 PM, jamby wrote:
Bill

   from the FW  I can ping out into the internet.  And Firefox will
connect to websites.
But from 192.168.2.8  neither will work.  And nothing shows up the
messages file.

As frustrated as I am,  I am sure its worse for you since you can't see
what is going on here.
I am sure I have some minor statement wrong that's keeping it from running.

The best way to proceed would be to forward the output of 'shorewall
dump', collected as described at
http://www.shorewall.org/support.htm#Guidelines

-Tom


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Shorewall 5.0.14.1 Dump at nub3 - Tue Dec 12 15:14:28 PST 2017

Shorewall is running
State:Started Tue Dec 12 12:55:41 PST 2017 from /etc/shorewall/ 
(/var/lib/shorewall/firewall compiled Tue Dec 12 12:55:41 PST 2017 by Shorewall 
version 5.0.14.1)

Counters reset Tue Dec 12 12:55:41 PST 2017

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
17354   25M wan-fw     all  --  enp4s0 *       0.0.0.0/0            0.0.0.0/0   
        
  314 45151 lan-fw     all  --  enp3s0 *       0.0.0.0/0            0.0.0.0/0   
        
  252 29498 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
    2   134 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:INPUT:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  377 22620 TCPMSS     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp flags:0x06/0x02 TCPMSS clamp to PMTU
    0     0 wan_frwd   all  --  enp4s0 *       0.0.0.0/0            0.0.0.0/0   
        
  499 30275 lan_frwd   all  --  enp3s0 *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:FORWARD:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain OUTPUT (policy ACCEPT 23 packets, 2730 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain Reject (3 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    2   134            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 3 code 4 /* Needed ICMP types */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 11 /* Needed ICMP types */
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match dst-type BROADCAST
    2   134 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match dst-type MULTICAST
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match dst-type ANYCAST
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  multiport dports 135,445 /* SMB */
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  udp dpts:137:139 /* SMB */
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  udp spt:137 dpts:1024:65535 /* SMB */
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  multiport dports 135,139,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1900 /* UPnP */
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp flags:!0x17/0x02
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:53 /* Late DNS Replies */

Chain dynamic (4 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain lan-fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  292 43321 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
   16  1384 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
  314 45151 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain lan_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 sfilter    all  --  *      enp3s0  0.0.0.0/0            0.0.0.0/0   
        [goto] 
  499 30275 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
  406 24266 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
  499 30275 ACCEPT     all  --  *      enp4s0  0.0.0.0/0            0.0.0.0/0   
        

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logflags (7 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 4 level 6 prefix "Shorewall:logflags:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain reject (8 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match src-type BROADCAST
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 DROP       2    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with tcp-reset
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with icmp-port-unreachable
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with icmp-host-unreachable
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with icmp-host-prohibited

Chain sfilter (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:sfilter:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain sha-lh-acbfe68c7645adfd56e0 (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain sha-rh-c74671b297964da54693 (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         recent: SET name: %CURRENTTIME side: source mask: 255.255.255.255

Chain smurflog (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:smurfs:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain smurfs (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 RETURN     all  --  *      *       0.0.0.0              0.0.0.0/0   
        
    0     0 smurflog   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  ADDRTYPE match src-type BROADCAST
    0     0 smurflog   all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        [goto] 

Chain tcpflags (4 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x3F/0x29
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x3F/0x00
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x06/0x06
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x05/0x05
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x03/0x03
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x19/0x09
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp spt:0 flags:0x17/0x02

Chain wan-fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  305 20917 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
  305 20917 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:67:68
16971   25M tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
17049   25M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
   11   859 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    3   252 DROP       icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Ping */
  291 19806 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain wan-lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:wan-lan:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain wan_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 wan-lan    all  --  *      enp3s0  0.0.0.0/0            0.0.0.0/0   
        

Log (/var/log/shorewall)


NAT Table

Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 1 packets, 60 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 1 packets, 60 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Mangle Table

Chain PREROUTING (policy ACCEPT 23 packets, 2730 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain INPUT (policy ACCEPT 23 packets, 2730 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  499 30275 MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         MARK and 0xffffff00

Chain OUTPUT (policy ACCEPT 23 packets, 2730 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 23 packets, 2730 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Raw Table

Chain PREROUTING (policy ACCEPT 23 packets, 2730 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 23 packets, 2730 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Conntrack Table (1 out of 65536)

ipv4     2 tcp      6 65 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=52790 
dport=25 src=127.0.0.1 dst=127.0.0.1 sport=25 dport=52790 [ASSURED] mark=0 
secctx=system_u:object_r:unlabeled_t:s0 zone=0 use=2

IP Configuration

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
4: virbr0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state 
DOWN qlen 1000
    inet 192.168.122.1/24 brd 192.168.122.255 scope global virbr0
       valid_lft forever preferred_lft forever

IP Stats

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode 
DEFAULT qlen 1
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    76745      917      0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    76745      917      0       0       0       0       
2: enp3s0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc mq state DOWN 
mode DEFAULT qlen 1000
    link/ether 00:1a:a0:c8:63:e9 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    172858     1607     0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    57276      453      0       0       0       0       
3: enp4s0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast state 
DOWN mode DEFAULT qlen 1000
    link/ether 00:18:f8:0c:9e:a6 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    25092796   19021    0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    924637     12773    36      0       36      0       
4: virbr0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state 
DOWN mode DEFAULT qlen 1000
    link/ether 52:54:00:e6:7f:3d brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    0          0        0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    0          0        0       0       0       0       
5: virbr0-nic: <BROADCAST,MULTICAST> mtu 1500 qdisc pfifo_fast master virbr0 
state DOWN mode DEFAULT qlen 1000
    link/ether 52:54:00:e6:7f:3d brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    0          0        0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    0          0        0       0       0       0       

Bridges

bridge name     bridge id               STP enabled     interfaces
virbr0          8000.525400e67f3d       yes             virbr0-nic

Routing Rules

0:      from all lookup local 
32766:  from all lookup main 
32767:  from all lookup default 

Table default:


Table local:

local 192.168.122.1 dev virbr0 proto kernel scope host src 192.168.122.1
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
broadcast 192.168.122.255 dev virbr0 proto kernel scope link src 192.168.122.1
broadcast 192.168.122.0 dev virbr0 proto kernel scope link src 192.168.122.1
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1

Table main:

192.168.122.0/24 dev virbr0 proto kernel scope link src 192.168.122.1

Per-IP Counters

   iptaccount is not installed

NF Accounting

No NF Accounting defined (nfacct not found)

Events


/proc

   /proc/version = Linux version 3.10.0-693.11.1.el7.x86_64 
(buil...@kbuilder.dev.centos.org) (gcc version 4.8.5 20150623 (Red Hat 
4.8.5-16) (GCC) ) #1 SMP Mon Dec 4 23:52:40 UTC 2017
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 0
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 0
   /proc/sys/net/ipv4/conf/default/log_martians = 1
   /proc/sys/net/ipv4/conf/enp3s0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/enp3s0/arp_filter = 0
   /proc/sys/net/ipv4/conf/enp3s0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/enp3s0/rp_filter = 0
   /proc/sys/net/ipv4/conf/enp3s0/log_martians = 1
   /proc/sys/net/ipv4/conf/enp4s0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/enp4s0/arp_filter = 0
   /proc/sys/net/ipv4/conf/enp4s0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/enp4s0/rp_filter = 0
   /proc/sys/net/ipv4/conf/enp4s0/log_martians = 1
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 0
   /proc/sys/net/ipv4/conf/lo/log_martians = 1
   /proc/sys/net/ipv4/conf/virbr0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/virbr0/arp_filter = 0
   /proc/sys/net/ipv4/conf/virbr0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/virbr0/rp_filter = 0
   /proc/sys/net/ipv4/conf/virbr0/log_martians = 1
   /proc/sys/net/ipv4/conf/virbr0-nic/proxy_arp = 0
   /proc/sys/net/ipv4/conf/virbr0-nic/arp_filter = 0
   /proc/sys/net/ipv4/conf/virbr0-nic/arp_ignore = 0
   /proc/sys/net/ipv4/conf/virbr0-nic/rp_filter = 0
   /proc/sys/net/ipv4/conf/virbr0-nic/log_martians = 1

ARP


Modules

ip_set                 36439  2 ip_set_hash_ip,xt_set
ip_set_hash_ip         27260  0 
iptable_filter         12810  1 
iptable_mangle         12695  1 
iptable_nat            12875  0 
iptable_raw            12678  0 
ip_tables              27115  4 
iptable_filter,iptable_mangle,iptable_nat,iptable_raw
ipt_MASQUERADE         12678  0 
ipt_REJECT             12541  4 
ipt_rpfilter           12606  0 
nf_conntrack          133387  30 
nf_nat_ftp,nf_nat_irc,nf_nat_sip,nf_nat_amanda,xt_CT,nf_nat_snmp_basic,nf_conntrack_netbios_ns,nf_conntrack_proto_gre,xt_helper,nf_nat,xt_connlimit,nf_nat_h323,nf_nat_ipv4,nf_nat_pptp,nf_nat_tftp,xt_conntrack,nf_conntrack_amanda,nf_nat_masquerade_ipv4,nf_conntrack_netlink,nf_conntrack_broadcast,xt_connmark,nf_conntrack_ftp,nf_conntrack_irc,nf_conntrack_sip,nf_conntrack_h323,nf_conntrack_ipv4,nf_conntrack_pptp,nf_conntrack_sane,nf_conntrack_snmp,nf_conntrack_tftp
nf_conntrack_amanda    13041  1 nf_nat_amanda
nf_conntrack_broadcast    12589  2 nf_conntrack_netbios_ns,nf_conntrack_snmp
nf_conntrack_ftp       18638  1 nf_nat_ftp
nf_conntrack_h323      73895  1 nf_nat_h323
nf_conntrack_ipv4      15053  12 
nf_conntrack_irc       13518  1 nf_nat_irc
nf_conntrack_netbios_ns    12665  0 
nf_conntrack_netlink    40449  0 
nf_conntrack_pptp      19257  1 nf_nat_pptp
nf_conntrack_proto_gre    14434  1 nf_conntrack_pptp
nf_conntrack_sane      13143  0 
nf_conntrack_sip       33860  1 nf_nat_sip
nf_conntrack_snmp      12857  1 nf_nat_snmp_basic
nf_conntrack_tftp      13121  1 nf_nat_tftp
nf_defrag_ipv4         12729  2 xt_TPROXY,nf_conntrack_ipv4
nf_defrag_ipv6         35104  1 xt_TPROXY
nf_log_common          13317  1 nf_log_ipv4
nf_log_ipv4            12767  6 
nf_nat                 26787  11 
nf_nat_ftp,nf_nat_irc,nf_nat_sip,nf_nat_amanda,nf_nat_proto_gre,nf_nat_h323,nf_nat_ipv4,nf_nat_pptp,nf_nat_tftp,xt_nat,nf_nat_masquerade_ipv4
nf_nat_amanda          12491  0 
nf_nat_ftp             12770  0 
nf_nat_h323            17720  0 
nf_nat_ipv4            14115  1 iptable_nat
nf_nat_irc             12723  0 
nf_nat_masquerade_ipv4    13412  1 ipt_MASQUERADE
nf_nat_pptp            13115  0 
nf_nat_proto_gre       13009  1 nf_nat_pptp
nf_nat_sip             17152  0 
nf_nat_snmp_basic      17302  0 
nf_nat_tftp            12489  0 
nf_reject_ipv4         13373  1 ipt_REJECT
xt_addrtype            12676  5 
xt_AUDIT               12682  0 
xt_CHECKSUM            12549  0 
xt_CLASSIFY            12507  0 
xt_comment             12504  9 
xt_connlimit           12917  0 
xt_connmark            12755  0 
xt_conntrack           12760  11 
xt_CT                  12956  0 
xt_dscp                12597  0 
xt_DSCP                12629  0 
xt_hashlimit           17569  0 
xt_helper              12583  0 
xt_iprange             12783  0 
xt_length              12536  0 
xt_LOG                 12690  6 
xt_mark                12563  1 
xt_multiport           12798  2 
xt_nat                 12681  0 
xt_NFLOG               12537  0 
xt_NFQUEUE             12697  0 
xt_owner               12534  0 
xt_physdev             12587  0 
xt_pkttype             12504  0 
xt_policy              12582  0 
xt_realm               12498  0 
xt_recent              18542  1 
xt_set                 13181  0 
xt_statistic           12601  0 
xt_tcpmss              12501  0 
xt_TCPMSS              12707  1 
xt_time                12661  0 
xt_TPROXY              17327  0 

Shorewall has detected the following iptables/netfilter capabilities:
   ACCOUNT Target (ACCOUNT_TARGET): Not available
   Address Type Match (ADDRTYPE): Available
   Amanda Helper: Available
   Arptables JF (ARPTABLESJF): Not available
   AUDIT Target (AUDIT_TARGET): Available
   Basic Ematch (BASIC_EMATCH): Available
   Basic Filter (BASIC_FILTER): Available
   Capabilities Version (CAPVERSION): 50004
   Checksum Target (CHECKSUM_TARGET): Available
   CLASSIFY Target (CLASSIFY_TARGET): Available
   Comments (COMMENTS): Available
   Condition Match (CONDITION_MATCH): Not available
   Connection Tracking Match (CONNTRACK_MATCH): Available
   Connlimit Match (CONNLIMIT_MATCH): Available
   Connmark Match (CONNMARK_MATCH): Available
   CONNMARK Target (CONNMARK): Available
   CT Target (CT_TARGET): Available
   DSCP Match (DSCP_MATCH): Available
   DSCP Target (DSCP_TARGET): Available
   Enhanced Multi-port Match (EMULIPORT): Available
   Extended Connection Tracking Match Support (NEW_CONNTRACK_MATCH): Available
   Extended Connmark Match (XCONNMARK_MATCH): Available
   Extended CONNMARK Target (XCONNMARK): Available
   Extended MARK Target 2 (EXMARK): Available
   Extended MARK Target (XMARK): Available
   Extended Multi-port Match (XMULIPORT): Available
   Extended REJECT (ENHANCED_REJECT): Available
   FLOW Classifier (FLOW_FILTER): Available
   FTP-0 Helper: Not available
   FTP Helper: Available
   fwmark route mask (FWMARK_RT_MASK): Available
   Geo IP Match (GEOIP_MATCH): Not available
   Goto Support (GOTO_TARGET): Available
   H323 Helper: Available
   Hashlimit Match (HASHLIMIT_MATCH): Available
   Header Match (HEADER_MATCH): Not available
   Helper Match (HELPER_MATCH): Available
   Iface Match (IFACE_MATCH): Not available
   IMQ Target (IMQ_TARGET): Not available
   IPMARK Target (IPMARK_TARGET): Not available
   IPP2P Match (IPP2P_MATCH): Not available
   IP range Match(IPRANGE_MATCH): Available
   Ipset Match Counters (IPSET_MATCH_COUNTERS): Available
   Ipset Match (IPSET_MATCH): Available
   Ipset Match Nomatch (IPSET_MATCH_NOMATCH): Available
   ipset V5 (IPSET_V5): Available
   iptables -S (IPTABLES_S): Available
   iptables --wait option (WAIT_OPTION): Available
   IRC-0 Helper: Not available
   IRC Helper: Available
   Kernel Version (KERNELVERSION): 31000
   LOGMARK Target (LOGMARK_TARGET): Not available
   LOG Target (LOG_TARGET): Available
   Mangle FORWARD Chain (MANGLE_FORWARD): Available
   Mark in the filter table (MARK_ANYWHERE): Available
   MARK Target (MARK): Available
   MASQUERADE Target (MASQUERADE_TGT): Available
   Multi-port Match (MULTIPORT): Available
   NAT (NAT_ENABLED): Available
   Netbios_ns Helper: Available
   New tos Match (NEW_TOS_MATCH): Available
   NFAcct Match: Not available
   NFLOG Target (NFLOG_TARGET): Available
   NFQUEUE Target (NFQUEUE_TARGET): Available
   Owner Match (OWNER_MATCH): Available
   Owner Name Match (OWNER_NAME_MATCH): Available
   Packet length Match (LENGTH_MATCH): Available
   Packet Mangling (MANGLE_ENABLED): Available
   Packet Type Match (USEPKTTYPE): Available
   Persistent SNAT (PERSISTENT_SNAT): Available
   Physdev-is-bridged Support (PHYSDEV_BRIDGE): Available
   Physdev Match (PHYSDEV_MATCH): Available
   Policy Match (POLICY_MATCH): Available
   PPTP Helper: Available
   Rawpost Table (RAWPOST_TABLE): Not available
   Raw Table (RAW_TABLE): Available
   Realm Match (REALM_MATCH): Available
   Recent Match "--reap" option (REAP_OPTION): Available
   Recent Match (RECENT_MATCH): Available
   Repeat match (KLUDGEFREE): Available
   RPFilter Match (RPFILTER_MATCH): Available
   SANE-0 Helper: Not available
   SANE Helper: Available
   SIP-0 Helper: Not available
   SIP Helper: Available
   SNMP Helper: Available
   Statistic Match (STATISTIC_MATCH): Available
   TARPIT Target (TARPIT_TARGET): Not available
   TCPMSS Match (TCPMSS_MATCH): Available
   TCPMSS Target (TCPMSS_TARGET): Available
   TFTP-0 Helper: Not available
   TFTP Helper: Available
   Time Match (TIME_MATCH): Available
   TPROXY Target (TPROXY_TARGET): Available
   UDPLITE Port Redirection (UDPLITEREDIRECT): Not available
   ULOG Target (ULOG_TARGET): Not available

Netid  State      Recv-Q Send-Q Local Address:Port               Peer 
Address:Port              
udp    UNCONN     0      0         *:36755                 *:*                  
 users:(("avahi-daemon",pid=713,fd=13))
udp    UNCONN     0      0      127.0.0.1:53                    *:*             
      users:(("dnsmasq",pid=1075,fd=8))
udp    UNCONN     0      0      192.168.2.1:53                    *:*           
        users:(("dnsmasq",pid=1075,fd=6))
udp    UNCONN     0      0      192.168.122.1:53                    *:*         
          users:(("dnsmasq",pid=1604,fd=5))
udp    UNCONN     0      0      *  %enp3s0:67                    *:*            
       users:(("dnsmasq",pid=1075,fd=4))
udp    UNCONN     0      0      *  %virbr0:67                    *:*            
       users:(("dnsmasq",pid=1604,fd=3))
udp    UNCONN     0      0         *:137                   *:*                  
 users:(("nmbd",pid=1122,fd=16))
udp    UNCONN     0      0         *:138                   *:*                  
 users:(("nmbd",pid=1122,fd=17))
udp    UNCONN     0      0         *:5353                  *:*                  
 users:(("avahi-daemon",pid=713,fd=12))
udp    UNCONN     0      0      127.0.0.1:323                   *:*             
      users:(("chronyd",pid=777,fd=1))
tcp    LISTEN     0      50        *:139                   *:*                  
 users:(("smbd",pid=1509,fd=38))
tcp    LISTEN     0      128       *:111                   *:*                  
 users:(("systemd",pid=1,fd=44))
tcp    LISTEN     0      5      127.0.0.1:53                    *:*             
      users:(("dnsmasq",pid=1075,fd=9))
tcp    LISTEN     0      5      192.168.2.1:53                    *:*           
        users:(("dnsmasq",pid=1075,fd=7))
tcp    LISTEN     0      5      192.168.122.1:53                    *:*         
          users:(("dnsmasq",pid=1604,fd=6))
tcp    LISTEN     0      128       *:22                    *:*                  
 users:(("sshd",pid=1077,fd=3))
tcp    LISTEN     0      128    127.0.0.1:631                   *:*             
      users:(("cupsd",pid=1074,fd=12))
tcp    LISTEN     0      10        *:25                    *:*                  
 users:(("sendmail",pid=6094,fd=4))
tcp    LISTEN     0      50        *:445                   *:*                  
 users:(("smbd",pid=1509,fd=37))

Traffic Control

Device lo:
qdisc noqueue 0: root refcnt 2 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device enp3s0:
qdisc mq 0: root 
 Sent 53322 bytes 453 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 
qdisc pfifo_fast 0: parent :1 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
 Sent 53322 bytes 453 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 

class mq :1 root 
 Sent 53322 bytes 453 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 
class mq :2 root 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 
class mq :3 root 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 
class mq :4 root 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 
class mq :5 root 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 

Device enp4s0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 928477 bytes 12809 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device virbr0:
qdisc noqueue 0: root refcnt 2 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device virbr0-nic:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 180 bytes 2 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 



TC Filters

Device lo:

Device enp3s0:

Device enp4s0:

Device virbr0:

Device virbr0-nic:

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to