Well, I went ahead and installed pptpd on my FW2 from yesterdays discussion, i got a connection up and running, but it seem like my pptp traffic doesn''t obey my rules. Here is the scenario. Remote System == DSL == [NET]FW1[LOC] == [NWL]FW2[JVC] == Local System [NET]FW1: 213.212.33.18/28 FW1[LOC]: 192.168.221.7/24 [NWL]FW2: 192.168.221.205/24 FW2[JVC]: 10.200.47.0/24 To this I have added PPTPd (config files at the end) when I connect to the pptpd, the client is assigned 192.168.226.178, I can ping 10.200.47.0/24 as expected, but I can _also_ ping anything else, which is not what I wanted. What have I missed here? I have defined as this ndc5-router-1:/etc/shorewall# less interfaces | grep -v ^# nwl eth0 detect jvc eth1 detect vpn ppp0 detect ndc5-router-1:/etc/shorewall# less zones | grep -v ^# net Net Internet loc Local Local networks nwl NWL New Wave Network jvc JVC JVC Network dmz DMZ Demilitarized zone vpn VPN VPN ndc5-router-1:/etc/shorewall# less policy | grep -v ^# $FW all ACCEPT all all REJECT info dc5-router-1:/etc/shorewall# less rules | grep -v ^# ACCEPT nwl $FW tcp ssh ACCEPT $FW nwl tcp www,domain,ssh ACCEPT $FW nwl udp www,domain ACCEPT all $FW icmp ACCEPT $FW all icmp ACCEPT jvc nwl:192.168.221.3 all ACCEPT nwl jvc icmp ACCEPT jvc nwl icmp ACCEPT nwl $FW tcp 1723 ACCEPT nwl $FW 47 - ndc5-router-1:/etc/shorewall# less /etc/pptpd.conf | grep -v ^# speed 115200 option /etc/ppp/pptpd-options debug localip 192.168.226.205 remoteip 192.168.226.178-185 ndc5-router-1:/etc/shorewall# less /etc/ppp/pptpd-options | grep -v ^# debug name ndc5-router-1 domain nwl.se auth netmask 255.255.255.0 nodefaultroute proxyarp lock ndc5-router-1:/etc/shorewall# shorewall status Shorewall-1.4.4b Status at ndc5-router-1 - Fri Jul 25 14:14:30 CEST 2003 Counters reset Fri Jul 25 14:06:42 CEST 2003 Chain INPUT (policy DROP 2 packets, 478 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 727 74638 eth0_in all -- eth0 * 0.0.0.0/0 0.0.0.0/0 107 10995 eth1_in all -- eth1 * 0.0.0.0/0 0.0.0.0/0 24 3498 ppp_in all -- ppp+ * 0.0.0.0/0 0.0.0.0/0 24 3498 common all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'' 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 0 0 eth0_fwd all -- eth0 * 0.0.0.0/0 0.0.0.0/0 0 0 eth1_fwd all -- eth1 * 0.0.0.0/0 0.0.0.0/0 24 2304 ppp_fwd all -- ppp+ * 0.0.0.0/0 0.0.0.0/0 24 2304 common all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'' 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0 0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 512 73210 fw2nwl all -- * eth0 0.0.0.0/0 0.0.0.0/0 0 0 fw2jvc all -- * eth1 0.0.0.0/0 0.0.0.0/0 24 2976 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain all2all (8 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 222 37972 common all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:'' 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain common (3 references) pkts bytes target prot opt in out source destination 0 0 icmpdef icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:135 225 30434 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:445 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:445 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:135 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900 25 3852 DROP all -- * * 0.0.0.0/0 255.255.255.255 0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53 state NEW 20 9488 DROP all -- * * 0.0.0.0/0 192.168.221.255 0 0 DROP all -- * * 0.0.0.0/0 10.200.47.255 Chain dmz2fw (0 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain dynamic (6 references) pkts bytes target prot opt in out source destination Chain eth0_fwd (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 nwl2jvc all -- * eth1 0.0.0.0/0 0.0.0.0/0 Chain eth0_in (1 references) pkts bytes target prot opt in out source destination 727 74638 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 727 74638 nwl2fw all -- * * 0.0.0.0/0 0.0.0.0/0 Chain eth1_fwd (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 jvc2nwl all -- * eth0 0.0.0.0/0 0.0.0.0/0 Chain eth1_in (1 references) pkts bytes target prot opt in out source destination 107 10995 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 107 10995 jvc2fw all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2all (6 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 10 1736 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2dmz (0 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 fw2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2jvc (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 fw2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2loc (0 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 fw2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2net (0 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 fw2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2nwl (1 references) pkts bytes target prot opt in out source destination 501 71408 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:80 1 66 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 10 1736 fw2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2vpn (0 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 fw2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain icmpdef (1 references) pkts bytes target prot opt in out source destination Chain jvc2fw (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 107 10995 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain jvc2nwl (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT all -- * * 0.0.0.0/0 192.168.221.3 state NEW 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain loc2fw (0 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain net2fw (0 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain newnotsyn (16 references) pkts bytes target prot opt in out source destination 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain nwl2fw (1 references) pkts bytes target prot opt in out source destination 600 46713 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 11 900 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 1 48 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:1723 0 0 ACCEPT 47 -- * * 0.0.0.0/0 0.0.0.0/0 115 26977 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain nwl2jvc (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain ppp_fwd (1 references) pkts bytes target prot opt in out source destination 24 2304 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 Chain ppp_in (1 references) pkts bytes target prot opt in out source destination 24 3498 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 Chain reject (10 references) pkts bytes target prot opt in out source destination 0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset 225 30434 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable 0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-unreachable 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain shorewall (0 references) pkts bytes target prot opt in out source destination Chain vpn2fw (0 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Jul 25 13:53:12 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=10.47.200.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=42491 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=3328 Jul 25 13:53:13 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=10.47.200.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=42494 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=3584 Jul 25 13:53:14 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=10.47.200.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=42497 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=3840 Jul 25 13:53:15 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=10.47.200.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=42500 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=4096 Jul 25 13:56:05 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=10.47.200.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=42757 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=256 Jul 25 13:56:06 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=10.47.200.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=42762 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=512 Jul 25 13:56:07 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=10.47.200.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=42767 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=768 Jul 25 13:56:08 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=10.47.200.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=42773 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=1024 Jul 25 13:58:25 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=10.47.200.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=42939 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=1280 Jul 25 13:58:26 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=10.47.200.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=42942 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=1536 Jul 25 13:58:27 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=10.47.200.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=42945 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=1792 Jul 25 13:58:28 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=10.47.200.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=42948 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=2048 Jul 25 13:59:17 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=192.168.226.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=43058 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=256 Jul 25 13:59:18 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=192.168.226.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=43069 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=512 Jul 25 13:59:19 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=192.168.226.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=43093 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=768 Jul 25 13:59:20 all2all:REJECT:IN=ppp0 OUT=eth0 SRC=192.168.226.178 DST=10.47.200.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=43113 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=1024 Jul 25 14:02:07 all2all:REJECT:IN=ppp0 OUT=eth1 SRC=192.168.226.178 DST=10.200.47.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=43382 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=2304 Jul 25 14:02:08 all2all:REJECT:IN=ppp0 OUT=eth1 SRC=192.168.226.178 DST=10.200.47.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=43385 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=2560 Jul 25 14:02:09 all2all:REJECT:IN=ppp0 OUT=eth1 SRC=192.168.226.178 DST=10.200.47.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=43388 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=2816 Jul 25 14:02:10 all2all:REJECT:IN=ppp0 OUT=eth1 SRC=192.168.226.178 DST=10.200.47.200 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=43391 PROTO=ICMP TYPE=8 CODE=0 ID=768 SEQ=3072 NAT Table Chain PREROUTING (policy ACCEPT 75313 packets, 13M bytes) pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 3362 packets, 406K bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 3301 packets, 403K bytes) pkts bytes target prot opt in out source destination Mangle Table Chain PREROUTING (policy ACCEPT 141K packets, 46M bytes) pkts bytes target prot opt in out source destination 935 97557 pretos all -- * * 0.0.0.0/0 0.0.0.0/0 Chain INPUT (policy ACCEPT 111K packets, 17M bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 29541 packets, 28M bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 37184 packets, 5920K bytes) pkts bytes target prot opt in out source destination 573 103K outtos all -- * * 0.0.0.0/0 0.0.0.0/0 Chain POSTROUTING (policy ACCEPT 69207 packets, 35M bytes) pkts bytes target prot opt in out source destination Chain outtos (1 references) pkts bytes target prot opt in out source destination 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 TOS set 0x10 413 87496 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 TOS set 0x08 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 TOS set 0x08 Chain pretos (1 references) pkts bytes target prot opt in out source destination 492 34080 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 TOS set 0x08 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 TOS set 0x08 tcp 6 431611 ESTABLISHED src=192.168.221.207 dst=192.168.221.205 sport=3207 dport=22 src=192.168.221.205 dst=192.168.221.207 sport=22 dport=3207 [ASSURED] use=1 unknown 47 193 src=192.168.221.62 dst=192.168.221.205 src=192.168.221.205 dst=192.168.221.62 use=1 tcp 6 432000 ESTABLISHED src=192.168.221.207 dst=192.168.221.205 sport=1512 dport=22 src=192.168.221.205 dst=192.168.221.207 sport=22 dport=1512 [ASSURED] use=1 ndc5-router-1:/etc/shorewall#
Jan Johansson
2003-Jul-25 06:46 UTC
[SOLVED!!!] [Shorewall-users] PPTP-zone not obeying rules?
I am so sorry all, i am SO stupid, SO SO SO SO SO Stupid, I will repeatedly hit myself over the head with a surprisingly large herring. The computer I was testing it all from had (in addition to the dialup connection) a WLAN card... and that interface came up without me noticing, and snagged an IP on the local net. So of course it could ping both subnets. After disabling the WLAN, the setup worked as I expected. Tom, shorewall IS amazing.