Hello all,
I am having problems making a DNAT configuration respond. I know that this
is something I''m getting wrong but I am currently stumped! Any
assistance is
greatly appreciated. Here are the details:
I have a firewall with three interfaces, eth0=net, eth1=lan and eth2=dmz. I
have installed Shorewall 1.4.5 as well as using the three_interfaces.tgz
setup files. Right now, I am trying to mirror how things are currently
working so that I can migrate servers to the DMZ at a later time. I am
trying to route web traffic from the Internet on port 443 (https) to a
server located internally on ip address 10.10.1.60. 
I created the following entry in the /etc/shorewall/nat file:
12.148.248.99   eth0    10.10.1.60      No      No
And then added the rule:
DNAT  net  loc:10.10.1.60  tcp  443  -  12.148.248.99
When trying to connect to the web server, the connection times out and on
the firewall is getting dropped. Here is the output from shorewall show log:
shorewall show log
Shorewall-1.4.5 Log at achilles.viisage.com - Mon Jun 23 17:18:31 EDT 2003
Counters reset Mon Jun 23 17:15:30 EDT 2003
Jun 23 17:06:01 all2all:REJECT:IN=eth1 OUT= SRC=10.10.2.32 DST=10.10.1.2
LEN=48 TOS=0x10 PREC=0x00 TTL=128 ID=61409 DF PROTO=TCP SPT=4837 DPT=21
WINDOW=65520 RES=0x00 SYN URGP=0 
Jun 23 17:06:02 all2all:REJECT:IN=eth1 OUT= SRC=10.10.2.32 DST=10.10.1.2
LEN=48 TOS=0x10 PREC=0x00 TTL=128 ID=61411 DF PROTO=TCP SPT=4837 DPT=21
WINDOW=65520 RES=0x00 SYN URGP=0 
Jun 23 17:06:02 all2all:REJECT:IN=eth1 OUT= SRC=10.10.2.32 DST=10.10.1.2
LEN=48 TOS=0x10 PREC=0x00 TTL=128 ID=61412 DF PROTO=TCP SPT=4837 DPT=21
WINDOW=65520 RES=0x00 SYN URGP=0 
Jun 23 17:13:34 net2all:DROP:IN=eth0 OUT= SRC=65.27.145.18 DST=12.148.248.68
LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=30737 DF PROTO=TCP SPT=4951 DPT=80
WINDOW=64240 RES=0x00 SYN URGP=0 
Jun 23 17:13:34 badpkt:DROP:IN=eth0 OUT= SRC=65.27.145.18
DST=255.255.255.255 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=30733 DF PROTO=TCP
SPT=4947 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B401010402) 
Jun 23 17:13:34 net2all:DROP:IN=eth0 OUT=eth1 SRC=65.27.145.18
DST=10.10.1.60 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=30776 DF PROTO=TCP
SPT=1049 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0 
Jun 23 17:13:34 net2all:DROP:IN=eth0 OUT= SRC=65.27.145.18
DST=12.148.248.126 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=30811 DF PROTO=TCP
SPT=1076 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0 
Jun 23 17:13:34 badpkt:DROP:IN=eth0 OUT= SRC=65.27.145.18
DST=255.255.255.255 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=30812 DF PROTO=TCP
SPT=1077 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B401010402) 
Jun 23 17:13:36 net2all:DROP:IN=eth0 OUT=eth1 SRC=65.27.145.18
DST=10.10.1.60 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=31488 DF PROTO=TCP
SPT=1049 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0 
Jun 23 17:13:36 net2all:DROP:IN=eth0 OUT= SRC=65.27.145.18 DST=12.148.248.68
LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=31496 DF PROTO=TCP SPT=4951 DPT=80
WINDOW=64240 RES=0x00 SYN URGP=0 
Jun 23 17:13:36 badpkt:DROP:IN=eth0 OUT= SRC=65.27.145.18
DST=255.255.255.255 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=31530 DF PROTO=TCP
SPT=4947 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B401010402) 
Jun 23 17:13:36 net2all:DROP:IN=eth0 OUT= SRC=65.27.145.18
DST=12.148.248.126 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=31555 DF PROTO=TCP
SPT=1076 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0 
Jun 23 17:13:36 badpkt:DROP:IN=eth0 OUT= SRC=65.27.145.18
DST=255.255.255.255 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=31573 DF PROTO=TCP
SPT=1077 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B401010402) 
Jun 23 17:15:35 badpkt:DROP:IN=eth0 OUT= SRC=12.101.124.7
DST=255.255.255.255 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=7013 DF PROTO=TCP
SPT=2121 DPT=80 WINDOW=16384 RES=0x00 SYN URGP=0 OPT (020405B401010402) 
Jun 23 17:16:21 net2all:DROP:IN=eth0 OUT=eth1 SRC=209.6.54.88 DST=10.10.1.60
LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=25690 DF PROTO=TCP SPT=32800 DPT=443
WINDOW=5840 RES=0x00 CWR ECE SYN URGP=0 
Jun 23 17:16:24 net2all:DROP:IN=eth0 OUT=eth1 SRC=209.6.54.88 DST=10.10.1.60
LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=25691 DF PROTO=TCP SPT=32800 DPT=443
WINDOW=5840 RES=0x00 CWR ECE SYN URGP=0 
Jun 23 17:16:30 net2all:DROP:IN=eth0 OUT=eth1 SRC=209.6.54.88 DST=10.10.1.60
LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=25692 DF PROTO=TCP SPT=32800 DPT=443
WINDOW=5840 RES=0x00 CWR ECE SYN URGP=0 
Jun 23 17:16:42 net2all:DROP:IN=eth0 OUT=eth1 SRC=209.6.54.88 DST=10.10.1.60
LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=25693 DF PROTO=TCP SPT=32800 DPT=443
WINDOW=5840 RES=0x00 CWR ECE SYN URGP=0 
Jun 23 17:17:06 net2all:DROP:IN=eth0 OUT=eth1 SRC=209.6.54.88 DST=10.10.1.60
LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=25694 DF PROTO=TCP SPT=32800 DPT=443
WINDOW=5840 RES=0x00 CWR ECE SYN URGP=0 
Jun 23 17:17:54 net2all:DROP:IN=eth0 OUT=eth1 SRC=209.6.54.88 DST=10.10.1.60
LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=25695 DF PROTO=TCP SPT=32800 DPT=443
WINDOW=5840 RES=0x00 CWR ECE SYN URGP=0 
Shorewall Version: 1.4.5
OS + Kernel: Linux achilles.viisage.com 2.4.18-14smp #1 SMP Wed Sep 4
12:34:47 EDT 2002 i686 i686 i386 GNU/Linux
Ip addr show:
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:02:b3:d1:5d:f1 brd ff:ff:ff:ff:ff:ff
    inet 12.148.248.68/26 brd 12.148.248.127 scope global eth0
    inet 12.148.248.99/26 brd 12.148.248.127 scope global secondary eth0
    inet 12.148.248.126/26 brd 12.148.248.127 scope global secondary eth0
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:07:e9:06:5e:d7 brd ff:ff:ff:ff:ff:ff
    inet 10.10.1.2/22 brd 10.10.3.255 scope global eth1
4: eth2: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:07:e9:06:5e:d6 brd ff:ff:ff:ff:ff:ff
    inet 192.168.21.1/24 brd 192.168.21.255 scope global eth2
Ip route show:
12.148.248.64/26 dev eth0  scope link 
192.168.21.0/24 dev eth2  scope link 
10.10.0.0/22 dev eth1  scope link 
127.0.0.0/8 dev lo  scope link 
default via 12.148.248.65 dev eth0 
Lsmod:
Module                  Size  Used by    Not tainted
ipt_ULOG                4904   0  (autoclean)
ipt_limit               1656   0  (autoclean)
ipt_multiport           1176   0  (autoclean)
loop                   12888   0  (unused)
ipt_TOS                 1656  12  (autoclean)
ipt_MASQUERADE          2296   0  (autoclean)
ipt_unclean             7736   2  (autoclean)
ipt_LOG                 4280   7  (autoclean)
ipt_state               1080  41  (autoclean)
iptable_mangle          2776   1  (autoclean)
ip_nat_irc              3696   0  (unused)
ip_nat_ftp              4464   0  (unused)
iptable_nat            21208   3  [ipt_MASQUERADE ip_nat_irc ip_nat_ftp]
ip_conntrack_irc        3616   0  [ip_nat_irc]
ip_conntrack_ftp        5312   0  [ip_nat_ftp]
ip_conntrack           23228   4  [ipt_MASQUERADE ipt_state ip_nat_irc
ip_nat_ftp iptable_nat ip_conntrack_irc ip_conntrack_ftp]
ip6_tables             16216   0 
autofs                 13700   0  (autoclean) (unused)
e1000                  56332   3 
ipt_REJECT              3736   4  (autoclean)
iptable_filter          2412   1  (autoclean)
ip_tables              15608  14  [ipt_ULOG ipt_limit ipt_multiport ipt_TOS
ipt_MASQUERADE ipt_unclean ipt_LOG ipt_state iptable_mangle iptable_nat
ipt_REJECT iptable_filter]
microcode               5184   0  (autoclean)
ext3                   73024   3 
jbd                    56752   3  [ext3]
ft                     97376   4 
sd_mod                 13552   8 
scsi_mod              110344   2  [ft sd_mod]
Thanks,
Graeme
-------------- next part --------------
[H[JShorewall-1.4.5 Status at achilles.viisage.com - Mon Jun 23 17:04:49 EDT
2003
Counters reset Mon Jun 23 17:03:21 EDT 2003
Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
    0     0 DROP      !icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
state INVALID
    0     0 eth0_in    all  --  eth0   *       0.0.0.0/0            0.0.0.0/0
  249 26983 eth1_in    all  --  eth1   *       0.0.0.0/0            0.0.0.0/0
    0     0 eth2_in    all  --  eth2   *       0.0.0.0/0            0.0.0.0/0
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:''
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP      !icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
state INVALID
  104 11772 eth0_fwd   all  --  eth0   *       0.0.0.0/0            0.0.0.0/0
  232 20061 eth1_fwd   all  --  eth1   *       0.0.0.0/0            0.0.0.0/0
    0     0 eth2_fwd   all  --  eth2   *       0.0.0.0/0            0.0.0.0/0
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:''
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0
    0     0 DROP      !icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
state INVALID
    0     0 fw2net     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0
  104 37760 fw2loc     all  --  *      eth1    0.0.0.0/0            0.0.0.0/0
    0     0 fw2dmz     all  --  *      eth2    0.0.0.0/0            0.0.0.0/0
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:''
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain all2all (6 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
  160 21407 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:''
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain badpkt (2 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 LOG       !tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
LOG flags 4 level 6 prefix `Shorewall:badpkt:DROP:''
    0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
LOG flags 6 level 6 prefix `Shorewall:badpkt:DROP:''
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain common (5 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 icmpdef    icmp --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
udp dpt:135
  104 10885 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
udp dpts:137:139
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
udp dpt:445
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp dpt:139
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp dpt:445
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp dpt:135
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
udp dpt:1900
   38 10018 DROP       all  --  *      *       0.0.0.0/0           
255.255.255.255
   18   504 DROP       all  --  *      *       0.0.0.0/0            224.0.0.0/4
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp dpt:113
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
udp spt:53 state NEW
    0     0 DROP       all  --  *      *       0.0.0.0/0           
12.148.248.127
    0     0 DROP       all  --  *      *       0.0.0.0/0            10.10.3.255
    0     0 DROP       all  --  *      *       0.0.0.0/0           
192.168.21.255
Chain dmz2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
icmp type 8
    0     0 all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain dmz2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
icmp type 8
    0     0 all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain dmz2net (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp dpt:53
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW udp dpt:53
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
icmp type 8
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain dynamic (6 references)
 pkts bytes target     prot opt in     out     source               destination
Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination
  104 11772 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 badpkt     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
unclean
  104 11772 net2loc    all  --  *      eth1    0.0.0.0/0            0.0.0.0/0
    0     0 net2dmz    all  --  *      eth2    0.0.0.0/0            0.0.0.0/0
Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 badpkt     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
unclean
    0     0 net2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination
  232 20061 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0
  232 20061 loc2net    all  --  *      eth0    0.0.0.0/0            0.0.0.0/0
    0     0 loc2dmz    all  --  *      eth2    0.0.0.0/0            0.0.0.0/0
Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source               destination
  249 26983 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0
  249 26983 loc2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain eth2_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 dmz2net    all  --  *      eth0    0.0.0.0/0            0.0.0.0/0
    0     0 dmz2loc    all  --  *      eth1    0.0.0.0/0            0.0.0.0/0
Chain eth2_in (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 dmz2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain fw2dmz (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
icmp type 8
    0     0 all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain fw2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination
  104 37760 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
icmp type 8
    0     0 all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp dpt:53
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW udp dpt:53
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain icmpdef (1 references)
 pkts bytes target     prot opt in     out     source               destination
Chain loc2dmz (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp dpt:22
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
icmp type 8
    0     0 all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination
   89  5576 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp dpt:22
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
icmp type 8
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp dpt:8118
  160 21407 all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain loc2net (1 references)
 pkts bytes target     prot opt in     out     source               destination
  108  7845 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    1    48 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp dpt:22
  123 12168 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain net2all (3 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:''
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain net2dmz (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    0     0 DROP       icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
icmp type 8
    0     0 net2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    0     0 DROP       icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
icmp type 8
    0     0 net2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain net2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination
   98 11411 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
state RELATED,ESTABLISHED
    1    43 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
state NEW tcp flags:!0x16/0x02
    1    78 DROP       icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
icmp type 8
    4   240 ACCEPT     tcp  --  *      *       12.148.248.98        10.10.1.60  
state NEW tcp dpt:443
    0     0 net2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain newnotsyn (14 references)
 pkts bytes target     prot opt in     out     source               destination
    1    43 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain reject (11 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
reject-with tcp-reset
  104 10885 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
reject-with icmp-port-unreachable
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
reject-with icmp-host-unreachable
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
reject-with icmp-host-prohibited
Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination
Jun 23 15:47:57 FORWARD:REJECT:IN=eth0 OUT=eth0 SRC=209.6.54.68
DST=12.148.248.99 LEN=78 TOS=0x00 PREC=0x00 TTL=113 ID=14207 PROTO=ICMP TYPE=8
CODE=0 ID=768 SEQ=36407
Jun 23 15:48:57 FORWARD:REJECT:IN=eth0 OUT=eth0 SRC=209.6.54.68
DST=12.148.248.99 LEN=78 TOS=0x00 PREC=0x00 TTL=113 ID=14692 PROTO=ICMP TYPE=8
CODE=0 ID=768 SEQ=43063
Jun 23 15:49:57 FORWARD:REJECT:IN=eth0 OUT=eth0 SRC=209.6.54.68
DST=12.148.248.99 LEN=78 TOS=0x00 PREC=0x00 TTL=113 ID=15159 PROTO=ICMP TYPE=8
CODE=0 ID=768 SEQ=49719
Jun 23 15:50:57 FORWARD:REJECT:IN=eth0 OUT=eth0 SRC=209.6.54.68
DST=12.148.248.99 LEN=78 TOS=0x00 PREC=0x00 TTL=113 ID=15617 PROTO=ICMP TYPE=8
CODE=0 ID=768 SEQ=56375
Jun 23 15:51:57 FORWARD:REJECT:IN=eth0 OUT=eth0 SRC=209.6.54.68
DST=12.148.248.99 LEN=78 TOS=0x00 PREC=0x00 TTL=113 ID=16081 PROTO=ICMP TYPE=8
CODE=0 ID=768 SEQ=63031
Jun 23 15:52:57 FORWARD:REJECT:IN=eth0 OUT=eth0 SRC=209.6.54.68
DST=12.148.248.99 LEN=78 TOS=0x00 PREC=0x00 TTL=113 ID=16551 PROTO=ICMP TYPE=8
CODE=0 ID=768 SEQ=4152
Jun 23 15:53:57 FORWARD:REJECT:IN=eth0 OUT=eth0 SRC=209.6.54.68
DST=12.148.248.99 LEN=78 TOS=0x00 PREC=0x00 TTL=113 ID=17003 PROTO=ICMP TYPE=8
CODE=0 ID=768 SEQ=10808
Jun 23 15:54:21 net2all:DROP:IN=eth0 OUT=eth1 SRC=206.105.10.121 DST=10.10.1.60
LEN=404 TOS=0x00 PREC=0x00 TTL=52 ID=34284 PROTO=UDP SPT=4000 DPT=1434 LEN=384
Jun 23 15:59:41 net2all:DROP:IN=eth0 OUT=eth1 SRC=24.196.227.198 DST=10.10.1.60
LEN=404 TOS=0x00 PREC=0x00 TTL=115 ID=38363 PROTO=UDP SPT=1297 DPT=1434 LEN=384
Jun 23 16:16:32 net2all:DROP:IN=eth0 OUT= SRC=65.33.237.92 DST=12.148.248.68
LEN=404 TOS=0x00 PREC=0x00 TTL=112 ID=14552 PROTO=UDP SPT=4922 DPT=1434 LEN=384
Jun 23 16:28:10 badpkt:DROP:IN=eth0 OUT= SRC=12.81.90.229 DST=255.255.255.255
LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=3096 DF PROTO=TCP SPT=3191 DPT=445
WINDOW=8760 RES=0x00 SYN URGP=0 OPT (020405B401010402)
Jun 23 16:28:18 badpkt:DROP:IN=eth0 OUT= SRC=12.81.90.229 DST=255.255.255.255
LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=3425 DF PROTO=TCP SPT=3454 DPT=445
WINDOW=8760 RES=0x00 SYN URGP=0 OPT (020405B401010402)
Jun 23 16:49:16 net2all:DROP:IN=eth0 OUT=eth1 SRC=12.148.248.98 DST=10.10.1.60
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=5293 DF PROTO=TCP SPT=50355 DPT=443
WINDOW=5840 RES=0x00 SYN URGP=0
Jun 23 16:49:19 net2all:DROP:IN=eth0 OUT=eth1 SRC=12.148.248.98 DST=10.10.1.60
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=5294 DF PROTO=TCP SPT=50355 DPT=443
WINDOW=5840 RES=0x00 SYN URGP=0
Jun 23 16:49:25 net2all:DROP:IN=eth0 OUT=eth1 SRC=12.148.248.98 DST=10.10.1.60
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=5295 DF PROTO=TCP SPT=50355 DPT=443
WINDOW=5840 RES=0x00 SYN URGP=0
Jun 23 16:49:37 net2all:DROP:IN=eth0 OUT=eth1 SRC=12.148.248.98 DST=10.10.1.60
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=5296 DF PROTO=TCP SPT=50355 DPT=443
WINDOW=5840 RES=0x00 SYN URGP=0
Jun 23 16:50:01 net2all:DROP:IN=eth0 OUT=eth1 SRC=12.148.248.98 DST=10.10.1.60
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=5297 DF PROTO=TCP SPT=50355 DPT=443
WINDOW=5840 RES=0x00 SYN URGP=0
Jun 23 16:58:46 net2all:DROP:IN=eth0 OUT=eth1 SRC=12.222.35.70 DST=10.10.1.60
LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=20087 DF PROTO=TCP SPT=2872 DPT=80
WINDOW=16384 RES=0x00 SYN URGP=0
Jun 23 16:58:49 net2all:DROP:IN=eth0 OUT=eth1 SRC=12.222.35.70 DST=10.10.1.60
LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=20239 DF PROTO=TCP SPT=2872 DPT=80
WINDOW=16384 RES=0x00 SYN URGP=0
Jun 23 16:58:55 net2all:DROP:IN=eth0 OUT=eth1 SRC=12.222.35.70 DST=10.10.1.60
LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=20547 DF PROTO=TCP SPT=2872 DPT=80
WINDOW=16384 RES=0x00 SYN URGP=0
NAT Table
Chain PREROUTING (policy ACCEPT 184 packets, 24329 bytes)
 pkts bytes target     prot opt in     out     source               destination
    3   181 net_dnat   all  --  eth0   *       0.0.0.0/0            0.0.0.0/0
    2   121 eth0_in    all  --  eth0   *       0.0.0.0/0            0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 1 packets, 60 bytes)
 pkts bytes target     prot opt in     out     source               destination
    7   394 eth0_out   all  --  *      eth0    0.0.0.0/0            0.0.0.0/0
    7   394 eth0_masq  all  --  *      eth0    0.0.0.0/0            0.0.0.0/0
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source               destination
    2   121 DNAT       all  --  *      *       0.0.0.0/0           
12.148.248.99      to:10.10.1.60
Chain eth0_masq (1 references)
 pkts bytes target     prot opt in     out     source               destination
    7   394 SNAT       all  --  *      *       10.10.0.0/22         0.0.0.0/0   
to:12.148.248.126
Chain eth0_out (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 SNAT       all  --  *      *       10.10.1.60           0.0.0.0/0   
to:12.148.248.99
Chain net_dnat (1 references)
 pkts bytes target     prot opt in     out     source               destination
    1    60 DNAT       tcp  --  *      *       12.148.248.98       
12.148.248.99      tcp dpt:443 to:10.10.1.60
Mangle Table
Chain PREROUTING (policy ACCEPT 626 packets, 62366 bytes)
 pkts bytes target     prot opt in     out     source               destination
  626 62366 pretos     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain INPUT (policy ACCEPT 253 packets, 27408 bytes)
 pkts bytes target     prot opt in     out     source               destination
Chain FORWARD (policy ACCEPT 341 packets, 32311 bytes)
 pkts bytes target     prot opt in     out     source               destination
Chain OUTPUT (policy ACCEPT 104 packets, 37760 bytes)
 pkts bytes target     prot opt in     out     source               destination
  104 37760 outtos     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 443 packets, 69950 bytes)
 pkts bytes target     prot opt in     out     source               destination
Chain outtos (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 TOS        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp dpt:22 TOS set 0x10
  104 37760 TOS        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp spt:22 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp dpt:21 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp spt:21 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp spt:20 TOS set 0x08
    0     0 TOS        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp dpt:20 TOS set 0x08
Chain pretos (1 references)
 pkts bytes target     prot opt in     out     source               destination
  189 13061 TOS        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp dpt:22 TOS set 0x10
   87 10119 TOS        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp spt:22 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp dpt:21 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp spt:21 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp spt:20 TOS set 0x08
    0     0 TOS        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
tcp dpt:20 TOS set 0x08
tcp      6 40 TIME_WAIT src=10.10.2.32 dst=206.46.170.10 sport=4831 dport=110
src=206.46.170.10 dst=12.148.248.126 sport=110 dport=4831 [ASSURED] use=1
unknown  2 599 src=10.1.1.2 dst=224.0.0.1 [UNREPLIED] src=224.0.0.1 dst=10.1.1.2
use=1
tcp      6 20 SYN_SENT src=10.10.2.37 dst=10.0.1.128 sport=1402 dport=6969
[UNREPLIED] src=10.0.1.128 dst=12.148.248.126 sport=6969 dport=1402 use=1
tcp      6 70 SYN_SENT src=10.10.2.37 dst=10.0.1.128 sport=1706 dport=6969
[UNREPLIED] src=10.0.1.128 dst=12.148.248.126 sport=6969 dport=1706 use=1
tcp      6 45 SYN_SENT src=10.10.2.37 dst=10.0.1.128 sport=1504 dport=6969
[UNREPLIED] src=10.0.1.128 dst=12.148.248.126 sport=6969 dport=1504 use=1
tcp      6 95 SYN_SENT src=10.10.2.37 dst=10.0.1.128 sport=1807 dport=6969
[UNREPLIED] src=10.0.1.128 dst=12.148.248.126 sport=6969 dport=1807 use=1
tcp      6 113 SYN_SENT src=10.10.2.37 dst=10.0.1.128 sport=1910 dport=6969
[UNREPLIED] src=10.0.1.128 dst=12.148.248.126 sport=6969 dport=1910 use=1
udp      17 29 src=10.10.5.1 dst=10.10.5.5 sport=514 dport=514 [UNREPLIED]
src=10.10.5.5 dst=10.10.5.1 sport=514 dport=514 use=1
udp      17 29 src=10.10.5.1 dst=10.10.5.32 sport=514 dport=514 [UNREPLIED]
src=10.10.5.32 dst=10.10.5.1 sport=514 dport=514 use=1
tcp      6 70110 ESTABLISHED src=209.6.54.205 dst=209.6.54.33 sport=139
dport=1615 [UNREPLIED] src=209.6.54.33 dst=209.6.54.205 sport=1615 dport=139
use=1
tcp      6 431954 ESTABLISHED src=10.10.2.32 dst=12.148.248.98 sport=4833
dport=22 src=12.148.248.98 dst=12.148.248.126 sport=22 dport=4833 [ASSURED]
use=1
tcp      6 80723 ESTABLISHED src=10.10.2.32 dst=10.10.2.1 sport=3059 dport=22
src=10.10.2.1 dst=10.10.2.32 sport=22 dport=3059 [ASSURED] use=1
tcp      6 80097 ESTABLISHED src=10.10.2.32 dst=10.10.2.1 sport=3338 dport=22
src=10.10.2.1 dst=10.10.2.32 sport=22 dport=3338 [ASSURED] use=1
tcp      6 431912 ESTABLISHED src=10.10.2.32 dst=10.10.1.2 sport=4200 dport=22
src=10.10.1.2 dst=10.10.2.32 sport=22 dport=4200 [ASSURED] use=1
tcp      6 431999 ESTABLISHED src=10.10.2.32 dst=10.10.1.2 sport=4201 dport=22
src=10.10.1.2 dst=10.10.2.32 sport=22 dport=4201 [ASSURED] use=1
tcp      6 431867 ESTABLISHED src=10.10.2.32 dst=216.136.226.117 sport=4353
dport=80 src=216.136.226.117 dst=12.148.248.126 sport=80 dport=4353 [ASSURED]
use=1
tcp      6 119 SYN_SENT src=12.148.248.98 dst=12.148.248.99 sport=50357
dport=443 [UNREPLIED] src=10.10.1.60 dst=12.148.248.98 sport=443 dport=50357
use=1
tcp      6 83374 ESTABLISHED src=10.10.2.7 dst=207.46.106.193 sport=3437
dport=1863 src=207.46.106.193 dst=12.148.248.126 sport=1863 dport=3437 [ASSURED]
use=1