hi,
i''m just trying Shorewall for the first time. i''ve been
running gShield, but
that doesn''t handle the situation i''ve migrated into. so, in
short, please
flame lightly for my ignorance and stupidity.
this is a RH7.3 + errata fixes box. it''s the current Shorewall-1.4.2.
i downloaded and modified the two-interface example from the shorewall
web site. i tried to follow the install, setup, and two-interface
guides. iptables is version 1.2.5.
the network picture:
UUnet --(T1)-- Cisco (65.222.81.33) ---> Switch
| |
65.222.81.34 ------+ +---- 65.222.81.35
Production FW1 Testing FW2
10.100.x.1 10.100.x.2
| |
+------(switches/VLANs)-------+
|
Many local systems
on separate subnets
10.100.1.0/255
10.100.2.0/255
10.100.3.0/255
10.100.4.0/255
10.100.5.0/255
10.100.6.0/255
10.100.200.0/255
10.100.201.0/255
10.100.202.0/255
10.100.203.0/255
10.100.204.0/255
the reason for all the subnets is due to the recent explosion of the
corporate network. currently, they''re sharing the same core switch,
but in the next few months, each segment will become fully isolated,
and additional firewalls will be installed. that aside, the problem
is what to do for now. both FW1 and FW2 are aliased on each subnet.
eth0 is the ''public'' (net) interface. eth1 and its many
aliases are
the ''internal'' (loc) interface.
the production FW works fine. it''s running gShield at the moment. the
issue is that due to customer support, we need to have a new block of
public IPs map directly into the internal network. this block has been
purchased, and it''s 65.199.221.97-126 ... the address "97"
has already
been bound into the Cisco unit, and we can ping that fine from the
world at large.
what we want to do is setup Shorewall on FW2 to route the other public
IP addrs (65.199.221.x) to specific internal machines. for now, i''m
only trying to make this work on the first such pair:
65.199.221.98 -> 10.100.201.11
once that works, we''ll add our normal rules to FW2, test it for a
while,
and then make it FW1. the usual live-switching in case something goes
wrong we have FW1 still there.
ok, with all that background, here''s what happens. i can see via
tcpdump the FW2 box responds to the ARP query; it then receives the
incoming traffic for 65.199.221.98. it receives ping/telnet/ftp/www
traffic just fine... but never responds. instead, the log fills with
the "all2all:DROP" message. i''ve checked the FAQs and such,
but
i don''t see how i''ve set this up wrong. since i''m
just starting
out, can anyone point me in the right path? (note: i''ve read the
"Shorewall & IP Aliases" FAQ, the install guide, etc --
i''m doing
exactly what they say to, afaics.) below are the various bits and
pieces requested for getting meaningful help.
thanks,
-josh
Log Message:
------------------
May 13 15:16:17 fw35 root: Shorewall Restarted
May 13 15:18:25 fw35 kernel: Shorewall:net2all:DROP:IN=eth0 OUT=
MAC=00:a0:cc:21:e9:ac:00:08:a3:b7:8a:20:08:00 SRC=12.119.32.145
DST=65.199.221.98 LEN=56 TOS=0x00 PREC=0x00 TTL=247 ID=62908 PROTO=ICMP TYPE=3
CODE=13 [SRC=65.199.221.98 DST=207.46.134.94 LEN=48 TOS=0x00 PREC=0x00 TTL=125
ID=52311 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:18:28 fw35 kernel: Shorewall:net2all:DROP:IN=eth0 OUT=
MAC=00:a0:cc:21:e9:ac:00:08:a3:b7:8a:20:08:00 SRC=12.119.32.145
DST=65.199.221.98 LEN=56 TOS=0x00 PREC=0x00 TTL=247 ID=62931 PROTO=ICMP TYPE=3
CODE=13 [SRC=65.199.221.98 DST=207.46.134.94 LEN=48 TOS=0x00 PREC=0x00 TTL=125
ID=52823 DF PROTO=TCP INCOMPLETE [8 bytes] ]
---------------------
Policy File:
--------------------
loc net ACCEPT
fw net ACCEPT
net all DROP info
all all REJECT info
---------------------
NAT File
---------------------
65.199.221.98 eth0:0 10.100.201.11 no no
---------------------
Rules File
---------------------
ACCEPT fw net tcp 53
ACCEPT fw net udp 53
ACCEPT loc fw tcp 53
ACCEPT loc fw udp 53
#
# Accept SSH connections from the local network for administration
#
ACCEPT loc fw tcp 22
#
# Allow Ping To And From Firewall
#
ACCEPT loc fw icmp 8
ACCEPT net fw icmp 8
ACCEPT fw loc icmp 8
ACCEPT fw net icmp 8
#
# For the aliased/extra public IPs... how to handle...
#
DNAT net loc:10.100.201.11 all -
65.199.221.98
ACCEPT net loc:10.100.201.11 all
---------------------
Kernel Info
---------------------
[root@fw35 shorewall]# uname -a
Linux fw35.unix.futura 2.4.18-27.7.x #1 Fri Mar 14 06:44:53 EST 2003 i686
unknown
[root@fw35 shorewall]# lsmod
Module Size Used by Not tainted
ipt_TOS 1760 12 (autoclean)
ip_nat_irc 3392 0 (unused)
ip_nat_ftp 4064 0 (unused)
ip_conntrack_irc 3552 0 (unused)
ip_conntrack_ftp 4768 0 (unused)
ipt_state 1248 30 (autoclean)
ipt_REJECT 3744 2 (autoclean)
ipt_LOG 4384 7 (autoclean)
ipt_limit 1696 0 (autoclean)
iptable_nat 19700 3 (autoclean) [ip_nat_irc ip_nat_ftp]
ip_conntrack 20300 4 (autoclean) [ip_nat_irc ip_nat_ftp
ip_conntrack_irc ip_conntrack_ftp ipt_state iptable_nat]
iptable_mangle 2944 1 (autoclean)
iptable_filter 2464 1 (autoclean)
ip_tables 13952 10 [ipt_TOS ipt_state ipt_REJECT ipt_LOG
ipt_limit iptable_nat iptable_mangle iptable_filter]
autofs 11172 0 (autoclean) (unused)
3c59x 28456 1
tulip 41344 1
ide-cd 30144 0 (autoclean)
cdrom 31936 0 (autoclean) [ide-cd]
usb-uhci 24324 0 (unused)
usbcore 71072 1 [usb-uhci]
ext3 64768 2
jbd 47892 2 [ext3]
---------------------
"ip" addr + route info
---------------------
[root@fw35 shorewall]# ip addr show
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:a0:cc:21:e9:ac brd ff:ff:ff:ff:ff:ff
inet 65.222.81.35/29 brd 65.222.81.39 scope global eth0
inet 65.199.221.98/29 brd 65.222.81.39 scope global eth0:0
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:60:08:ca:38:ce brd ff:ff:ff:ff:ff:ff
inet 10.100.1.2/24 brd 10.100.1.255 scope global eth1
inet 10.100.2.2/24 brd 10.100.2.255 scope global eth1:0
inet 10.100.3.2/24 brd 10.100.3.255 scope global eth1:1
inet 10.100.4.2/24 brd 10.100.4.255 scope global eth1:2
inet 10.100.5.2/24 brd 10.100.5.255 scope global eth1:3
inet 10.100.6.2/24 brd 10.100.6.255 scope global eth1:4
inet 10.100.200.2/24 brd 10.100.200.255 scope global eth1:5
inet 10.100.201.2/24 brd 10.100.201.255 scope global eth1:6
inet 10.100.202.2/24 brd 10.100.202.255 scope global eth1:7
inet 10.100.203.2/24 brd 10.100.203.255 scope global eth1:8
inet 10.100.204.2/24 brd 10.100.204.255 scope global eth1:9
[root@fw35 shorewall]# ip route show
65.222.81.32/29 dev eth0 scope link
65.199.221.96/29 dev eth0 proto kernel scope link src 65.199.221.98
10.100.203.0/24 dev eth1 proto kernel scope link src 10.100.203.2
10.100.202.0/24 dev eth1 proto kernel scope link src 10.100.202.2
10.100.201.0/24 dev eth1 proto kernel scope link src 10.100.201.2
10.100.200.0/24 dev eth1 proto kernel scope link src 10.100.200.2
10.100.204.0/24 dev eth1 proto kernel scope link src 10.100.204.2
10.100.5.0/24 dev eth1 proto kernel scope link src 10.100.5.2
10.100.4.0/24 dev eth1 proto kernel scope link src 10.100.4.2
10.100.6.0/24 dev eth1 proto kernel scope link src 10.100.6.2
10.100.1.0/24 dev eth1 scope link
10.100.3.0/24 dev eth1 proto kernel scope link src 10.100.3.2
10.100.2.0/24 dev eth1 proto kernel scope link src 10.100.2.2
127.0.0.0/8 dev lo scope link
default via 65.222.81.33 dev eth0
--------------------------
Shorewall STATUS
--------------------------
[root@fw35 shorewall]# shorewall status
Shorewall-1.4.2 Status at fw35.unix.futura - Tue May 13 15:44:32 EDT 2003
Counters reset Tue May 13 15:16:17 EDT 2003
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
50 2860 eth0_in all -- eth0 * 0.0.0.0/0 0.0.0.0/0
420 24144 eth1_in all -- eth1 * 0.0.0.0/0 0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
172 14510 eth0_fwd all -- eth0 * 0.0.0.0/0 0.0.0.0/0
0 0 eth1_fwd all -- eth1 * 0.0.0.0/0 0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
3 228 fw2net all -- * eth0 0.0.0.0/0 0.0.0.0/0
275 49192 fw2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain all2all (2 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain common (5 references)
pkts bytes target prot opt in out source destination
47 2632 icmpdef icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:445
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:139
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:445
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:135
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900
0 0 DROP all -- * * 0.0.0.0/0
255.255.255.255
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 state NEW
0 0 DROP all -- * * 0.0.0.0/0 65.222.81.39
0 0 DROP all -- * * 0.0.0.0/0 10.100.1.255
Chain dynamic (4 references)
pkts bytes target prot opt in out source destination
Chain eth0_fwd (1 references)
pkts bytes target prot opt in out source destination
172 14510 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
172 14510 rfc1918 all -- * * 0.0.0.0/0 0.0.0.0/0
state NEW
172 14510 net2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0
Chain eth0_in (1 references)
pkts bytes target prot opt in out source destination
50 2860 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 rfc1918 all -- * * 0.0.0.0/0 0.0.0.0/0
state NEW
50 2860 net2fw all -- * * 0.0.0.0/0 0.0.0.0/0
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source destination
0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 loc2net all -- * eth0 0.0.0.0/0 0.0.0.0/0
Chain eth1_in (1 references)
pkts bytes target prot opt in out source destination
420 24144 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
420 24144 loc2fw all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2loc (1 references)
pkts bytes target prot opt in out source destination
275 49192 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW udp dpt:53
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
3 228 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain icmpdef (1 references)
pkts bytes target prot opt in out source destination
Chain loc2fw (1 references)
pkts bytes target prot opt in out source destination
420 24144 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:22
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logdrop (30 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:rfc1918:DROP:''
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2all (2 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
47 2632 common all -- * * 0.0.0.0/0 0.0.0.0/0
47 2632 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:''
47 2632 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source destination
3 228 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
47 2632 net2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2loc (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
172 14510 ACCEPT all -- * * 0.0.0.0/0
10.100.201.11 state NEW
0 0 ACCEPT all -- * * 0.0.0.0/0
10.100.201.11 state NEW
0 0 net2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain newnotsyn (8 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain reject (10 references)
pkts bytes target prot opt in out source destination
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
Chain rfc1918 (2 references)
pkts bytes target prot opt in out source destination
0 0 RETURN all -- * * 255.255.255.255 0.0.0.0/0
0 0 DROP all -- * * 169.254.0.0/16 0.0.0.0/0
0 0 logdrop all -- * * 172.16.0.0/12 0.0.0.0/0
0 0 logdrop all -- * * 192.0.2.0/24 0.0.0.0/0
0 0 logdrop all -- * * 192.168.0.0/16 0.0.0.0/0
0 0 logdrop all -- * * 0.0.0.0/7 0.0.0.0/0
0 0 logdrop all -- * * 2.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 5.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 7.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 10.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 23.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 27.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 31.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 36.0.0.0/7 0.0.0.0/0
0 0 logdrop all -- * * 39.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 41.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 42.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 49.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 50.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 58.0.0.0/7 0.0.0.0/0
0 0 logdrop all -- * * 60.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 70.0.0.0/7 0.0.0.0/0
0 0 logdrop all -- * * 72.0.0.0/5 0.0.0.0/0
0 0 logdrop all -- * * 83.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 84.0.0.0/6 0.0.0.0/0
0 0 logdrop all -- * * 88.0.0.0/5 0.0.0.0/0
0 0 logdrop all -- * * 96.0.0.0/3 0.0.0.0/0
0 0 logdrop all -- * * 127.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 197.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 198.18.0.0/15 0.0.0.0/0
0 0 logdrop all -- * * 201.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * * 240.0.0.0/4 0.0.0.0/0
Chain shorewall (0 references)
pkts bytes target prot opt in out source destination
May 13 15:33:46 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.134.30
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=21124 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:34:20 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.134.30
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=21636 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:34:23 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.134.30
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=22148 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:34:29 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.134.30
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=22404 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:34:41 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.134.30
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=22660 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:38:25 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.134.30
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=23684 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:38:28 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.134.30
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=24196 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:38:34 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.134.30
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=24452 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:38:46 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.134.30
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=24708 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:39:20 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.249.61
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=25476 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:39:23 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.249.61
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=25988 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:39:29 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.249.61
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=26244 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:39:41 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.249.61
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=26500 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:43:25 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.249.61
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=27524 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:43:28 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.249.61
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=28036 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:43:34 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.249.61
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=28292 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:43:46 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.249.61
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=28548 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:44:20 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.249.61
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=29060 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:44:23 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.249.61
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=29572 DF PROTO=TCP INCOMPLETE [8 bytes] ]
May 13 15:44:29 net2all:DROP:IN=eth0 OUT= SRC=65.199.221.98 DST=207.46.249.61
LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=29828 DF PROTO=TCP INCOMPLETE [8 bytes] ]
NAT Table
Chain PREROUTING (policy ACCEPT 1737 packets, 240K bytes)
pkts bytes target prot opt in out source destination
13 1259 eth0_in all -- eth0 * 0.0.0.0/0 0.0.0.0/0
11 1127 net_dnat all -- eth0 * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 257 packets, 19746 bytes)
pkts bytes target prot opt in out source destination
3 228 eth0_out all -- * eth0 0.0.0.0/0 0.0.0.0/0
3 228 eth0_masq all -- * eth0 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 272 packets, 19484 bytes)
pkts bytes target prot opt in out source destination
Chain eth0_in (1 references)
pkts bytes target prot opt in out source destination
2 132 DNAT all -- * * 0.0.0.0/0
65.199.221.98 to:10.100.201.11
Chain eth0_masq (1 references)
pkts bytes target prot opt in out source destination
0 0 SNAT all -- * * 10.100.203.0/24 0.0.0.0/0
to:65.222.81.35
0 0 SNAT all -- * * 10.100.202.0/24 0.0.0.0/0
to:65.222.81.35
0 0 SNAT all -- * * 10.100.201.0/24 0.0.0.0/0
to:65.222.81.35
0 0 SNAT all -- * * 10.100.200.0/24 0.0.0.0/0
to:65.222.81.35
0 0 SNAT all -- * * 10.100.204.0/24 0.0.0.0/0
to:65.222.81.35
0 0 SNAT all -- * * 10.100.5.0/24 0.0.0.0/0
to:65.222.81.35
0 0 SNAT all -- * * 10.100.4.0/24 0.0.0.0/0
to:65.222.81.35
0 0 SNAT all -- * * 10.100.6.0/24 0.0.0.0/0
to:65.222.81.35
0 0 SNAT all -- * * 10.100.1.0/24 0.0.0.0/0
to:65.222.81.35
0 0 SNAT all -- * * 10.100.3.0/24 0.0.0.0/0
to:65.222.81.35
0 0 SNAT all -- * * 10.100.2.0/24 0.0.0.0/0
to:65.222.81.35
Chain eth0_out (1 references)
pkts bytes target prot opt in out source destination
0 0 SNAT all -- * * 10.100.201.11 0.0.0.0/0
to:65.199.221.98
Chain net_dnat (1 references)
pkts bytes target prot opt in out source destination
11 1127 DNAT all -- * * 0.0.0.0/0 0.0.0.0/0
to:10.100.201.11
Mangle Table
Chain PREROUTING (policy ACCEPT 66441 packets, 12M bytes)
pkts bytes target prot opt in out source destination
172 14510 man1918 all -- eth0 * 0.0.0.0/0 0.0.0.0/0
state NEW
1084 80231 pretos all -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 62814 packets, 12M bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 1935 packets, 162K bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 57799 packets, 5609K bytes)
pkts bytes target prot opt in out source destination
516 89148 outtos all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 59611 packets, 5762K bytes)
pkts bytes target prot opt in out source destination
Chain logdrop (30 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:man1918:DROP:''
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain man1918 (1 references)
pkts bytes target prot opt in out source destination
0 0 RETURN all -- * * 0.0.0.0/0
255.255.255.255
0 0 DROP all -- * * 0.0.0.0/0
169.254.0.0/16
0 0 logdrop all -- * * 0.0.0.0/0
172.16.0.0/12
0 0 logdrop all -- * * 0.0.0.0/0 192.0.2.0/24
0 0 logdrop all -- * * 0.0.0.0/0
192.168.0.0/16
0 0 logdrop all -- * * 0.0.0.0/0 0.0.0.0/7
0 0 logdrop all -- * * 0.0.0.0/0 2.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 5.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 7.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 10.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 23.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 27.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 31.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 36.0.0.0/7
0 0 logdrop all -- * * 0.0.0.0/0 39.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 41.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 42.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 49.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 50.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 58.0.0.0/7
0 0 logdrop all -- * * 0.0.0.0/0 60.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 70.0.0.0/7
0 0 logdrop all -- * * 0.0.0.0/0 72.0.0.0/5
0 0 logdrop all -- * * 0.0.0.0/0 83.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 84.0.0.0/6
0 0 logdrop all -- * * 0.0.0.0/0 88.0.0.0/5
0 0 logdrop all -- * * 0.0.0.0/0 96.0.0.0/3
0 0 logdrop all -- * * 0.0.0.0/0 127.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 197.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
198.18.0.0/15
0 0 logdrop all -- * * 0.0.0.0/0 201.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0 240.0.0.0/4
Chain outtos (1 references)
pkts bytes target prot opt in out source destination
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 TOS set 0x10
513 88920 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:22 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:20 TOS set 0x08
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:20 TOS set 0x08
Chain pretos (1 references)
pkts bytes target prot opt in out source destination
657 33624 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:22 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:20 TOS set 0x08
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:20 TOS set 0x08
tcp 6 431999 ESTABLISHED src=10.100.1.5 dst=10.100.1.2 sport=39581 dport=22
src=10.100.1.2 dst=10.100.1.5 sport=22 dport=39581 [ASSURED] use=1
[root@fw35 shorewall]#