Displaying 10 results from an estimated 10 matches for "run_iptables2".
Did you mean:
  run_iptables
  
2002 Dec 19
0
Another Little Patch
...terface}_options=\"$options\"
 
-	for option in `separate_list $options`; do
+	for option in $options; do
 	    case $option in
 	    dhcp|noping|filterping|routestopped|norfc1918|multi|tcpflags)
                 ;;
@@ -2160,8 +2160,8 @@
 		if [ "$loglevel" = ULOG ]; then
 		    run_iptables2 -A $chain $proto $multiport \
 			$state $cli $sports $serv $dports -j ULOG $LOGPARMS \
-			--ulog-prefix "Shorewall:$chain:$logtarget:" \
-			else
+			--ulog-prefix "Shorewall:$chain:$logtarget:"
+		else
 		    run_iptables2 -A $chain $proto $multiport \
 			$state $cli $sports...
2004 Sep 25
0
Re: help with a W2K VPN client 619 error and PPTPserver
...off of the mailing list, feel free to put it back
on there if you want.
Hmmm -- the tunnels file has never accepted "!" in the GATEWAY column
regardless of the tunnel type :-(
Change the ''addrule()'' function (line 293 in
/usr/share/shorewall/firewall) to use ''run_iptables2'' rather than
''run_iptables''.
~  addrule() # $1 = chain name, remainder of arguments specify the rule
~   {
~      ensurechain $1
~      run_iptables2 -A $@
~  }
I''ve tested that change with this tunnels file entry:
	pptpserver              net     !64.139.97.4...
2004 Sep 02
3
Traffic shapping Bug ?
...as simple as :
#MARK           SOURCE          DEST            PROTO   PORT(S) CLIENT  USER
2                       eth1                0.0.0.0/0       tcp         80
As a result, I tried to get more information using the shorewall start debug 2 >
file command.
Here''s what I got :
+ run_iptables2 -t mangle -A tcfor -p -j MARK --set-mark ''PORT(S)''
+ ''['' ''x-t mangle -A tcfor -p -j MARK --set-mark PORT(S)'' = ''x-t mangle -A tcfor -p -j MARK --set-mark PORT(S)'' '']''
+ run_iptables -t mangle -A tcfor -p -j MA...
2005 Mar 27
2
Can''t get shorewall to start...
...ROR: Command "/sbin/iptables -A'' OUTPUT -o eth0 -d 
''!192.168.0.0/24'' -j ''fw2net" Failed''
   ERROR: Command "/sbin/iptables -A OUTPUT -o eth0 -d !192.168.0.0/24 
-j fw2net" Failed
It looks like there are places that should be calling run_iptables2, not 
run_iptables.
Shorewall version is 2.2.2
I don''t think you need the rest of the stuff since this isn''t a problem 
with the iptables running, but with getting the iptables generated in 
the first place.
Dick Munroe
2005 Feb 23
9
shorewall friendly way of limiting ssh brute force attacks?
I was wondering if anyone had implemented rules like this in shorewall:
http://blog.andrew.net.au/tech
I see tons of brute force attempts on the machines I administer, and I like
the idea of limiting them without the need for extra daemons scanning for
attacks.
Thanks,
	Dale
-- 
Dale E. Martin - dale@the-martins.org
http://the-martins.org/~dmartin
2003 Aug 25
2
Mandrake Connection Sharing facility problem.
...in eth0_masq
+ havenatchain eth0_masq
+ eval test ''"$eth0_masq_nat_exists"'' = Yes
++ test '''' = Yes
+ createnatchain eth0_masq
+ run_iptables -t nat -N eth0_masq
+ iptables -t nat -N eth0_masq
+ eval eth0_masq_nat_exists=Yes
++ eth0_masq_nat_exists=Yes
+ run_iptables2 -t nat -A eth0_masq -s 192.168.200.0/255.255.255.0 -d 
0.0.0.0/0 -j MASQUERADE
+ ''['' ''x-t nat -A eth0_masq -s 192.168.200.0/255.255.255.0 -d 0.0.0.0/0 -j 
MASQUERADE'' = ''x-t nat -A eth0_masq -s 192.168.200.0/255.255.255.0 -d 
0.0.0.0/0 -j MASQUERADE'...
2004 Jan 21
3
FW: DNAT and masq problem with kernel 2.4.23
...0/0268.html
http://lists.netfilter.org/pipermail/netfilter/2003-September/046962.html
Here is tail from debug message. How I can force to shorewall use
POSTROUTING chain for masq and DNAT instead of user defined chains?
# tail /tmp/trace
+ eval exists_nat_net_dnat=Yes
+ exists_nat_net_dnat=Yes
+ run_iptables2 -t nat -A net_dnat -p tcp -d 212.24.147.254 --dport http -j
DNAT
 --to-destination 192.168.140.2
+ [ x-t nat -A net_dnat -p tcp -d 212.24.147.254 --dport http -j
DNAT --to-desti
nation 192.168.140.2 = x-t nat -A net_dnat -p tcp -d 212.24.147.254 --dport
http
 -j DNAT --to-destination 192.168.140.2...
2005 Feb 01
4
Shorewall problem
I am getting the following message when Shorewall stops can anybody shed 
any light on this message and where I should be looking? Thanks
root@bobshost:~# shorewall stop
Loading /usr/share/shorewall/functions...
Processing /etc/shorewall/params ...
Processing /etc/shorewall/shorewall.conf...
Loading Modules...
Stopping Shorewall...Processing /etc/shorewall/stop ...
IP Forwarding Enabled
2004 Aug 19
4
MASQUERADE problem again...
...sts_nat_eth0_masq"'' = Yes
++ test '''' = Yes
+ createnatchain eth0_masq
+ run_iptables -t nat -N eth0_masq
+ ''['' -n '''' '']''
+ iptables -t nat -N eth0_masq
+ eval exists_nat_eth0_masq=Yes
++ exists_nat_eth0_masq=Yes
+ run_iptables2 -t nat -A eth0_masq -s 192.168.4.0/24 -d 0.0.0.0/0 -j 
MASQUERADE
+ ''['' ''x-t nat -A eth0_masq -s 192.168.4.0/24 -d 0.0.0.0/0 -j 
MASQUERADE'' = ''x-t nat -A eth0_masq -s 192.168.4.0/24 -d 0.0.0.0/0 -j 
MASQUERADE'' '']''
+ run_iptab...
2003 Mar 23
12
Shorewall 1.4.1
This is a minor release of Shorewall.
WARNING: This release introduces incompatibilities with prior releases.  
See http://www.shorewall.net/upgrade_issues.htm.
Changes are:
a) There is now a new NONE policy specifiable in
/etc/shorewall/policy. This policy will cause Shorewall to assume that
there will never be any traffic between the source and destination
zones.
b) Shorewall no longer