Hi Tom,
thanks for replying so fast.
> > I tried to read the all documentation and search through the mailing
> > list archive, but did not find an answer to the problem I am having.
> > Also the part about aliased interfaces in the documentation did not
> > cover my situation:
> > 
> > We have two firewalls in a cluster. Both have two bonded external
> > interfaces, two bonded internal interface and one for 
> > administration.
> > There are two cluster IPs, that get aliased on the internal and the
> > external interface of one of the firewalls by heartbeat, so when the
> > currently active firewall fails, the secondary can take 
> > over the IPs,
> > restart shorewall and resume service. All this works pretty 
> > well exept
> > for one thing. Policies are randomly not applied to some of 
> > the IPs of the firewall. 
> 
> What does that mean?  Give us concrete examples. And while 
> whatever it 
> is that you think is wrong is happening, please capture the output of 
> "ip addr ls", "ip route ls" and "shorewall
status".
Sorry for my stupidity, forgeting the most important part. I try to give
an overview of the network layout as well:
                    INET                        
                      |                         
            +---------+------+                  
            |                |                  
           RealIP:         Real IP              
        10.0.18.168      10.0.18.169            
        Aliased IP:                             
        10.0.18.167                             
                                                
         Admin IP:         Admin IP:            
        10.10.1.11        10.10.1.12            
            +-----------------+------------- ADM
                                                
           RealIP:         Real IP              
        213.95.19.11      213.95.19.12          
        Aliased IP:                             
        213.95.19.1                             
             |                |                 
             +--------+-------+                 
                      |                         
                     DMZ                        
The aliased IPs are started by heartbeat and can "move" to firewall 2,
if firewall 1 fails. All imcoming traffic is routed to the aliased IP,
not the real IPs. Both machines also have an dedicated interface only
for administration 
My shorewall config on both machines is like the following and I would
expect, that no ports on the firewall should be open, to the INET zone
of the firewall. I want the aliased IP and the real IP to have the same
rules, because they are on the same interface
Zones:
INET    INET            Internet
ADM     ADM             Admin network
DMZ     DMZ             Demilitarized zone
Interfaces:
INET    bond1           10.0.255.255    routefilter,norfc1918,blacklist
DMZ     bond0           213.95.19.63    routefilter,norfc1918
ADM     eth4            10.10.1.255
Policy:
FW              INET            ACCEPT
FW              DMZ             ACCEPT
FW              ADM             ACCEPT
DMZ             INET            ACCEPT
ADM             FW              ACCEPT
ADM             ADM             ACCEPT
INET            ADM             DROP
INET            all             DROP
all             all             REJECT          info
Rules:
# ALL
ACCEPT          INET            DMZ                     icmp    8
ACCEPT          INET            DMZ                     icmp    11
ACCEPT          DMZ             INET                    icmp    8
ACCEPT          DMZ             INET                    icmp    11
# FW
ACCEPT          INET            FW                      icmp    8
ACCEPT          INET            FW                      icmp    11
ACCEPT          DMZ             FW                      icmp    8
ACCEPT          DMZ             FW                      icmp    11
ACCEPT          ADM             FW                      icmp    8
ACCEPT          ADM             FW                      icmp    11
ACCEPT          ADM             FW                      tcp     22
But if I run a nmap scan on all three IPs from a machine on the INET
side, there is always one IP, where all ports are open:
nets-opr:~# nmap 10.0.18.167-169
Starting nmap V. 2.54BETA31 ( www.insecure.org/nmap/ )
Interesting ports on  (10.0.18.167):
(The 1549 ports scanned but not shown below are in state: closed)
Port       State       Service
22/tcp     open        ssh                     
25/tcp     open        smtp                    
111/tcp    open        sunrpc                  
1007/tcp   open        unknown                 
1080/tcp   open        socks                   
Interesting ports on  (10.0.18.168):
(The 1553 ports scanned but not shown below are in state: filtered)
Port       State       Service
113/tcp    closed      auth                    
Interesting ports on  (10.0.18.169):
(The 1553 ports scanned but not shown below are in state: filtered)
Port       State       Service
113/tcp    closed      auth   
On firewall 1, which is currently the active firewall:
ip addr ls:
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
2: eth0: <BROADCAST,MULTICAST,NOARP,SLAVE,UP> mtu 1500 qdisc pfifo_fast
master bond0 qlen 1000
    link/ether 00:07:e9:1f:ba:65 brd ff:ff:ff:ff:ff:ff
    inet 213.95.19.11/26 brd 213.95.19.63 scope global eth0
3: eth1: <BROADCAST,MULTICAST,SLAVE,UP> mtu 1500 qdisc pfifo_fast master
bond1 qlen 1000
    link/ether 00:07:e9:1f:be:2e brd ff:ff:ff:ff:ff:ff
    inet 10.0.18.168/16 brd 10.0.255.255 scope global eth1
4: eth2: <BROADCAST,MULTICAST,SLAVE,UP> mtu 1500 qdisc pfifo_fast master
bond0 qlen 1000
    link/ether 00:07:e9:1f:ba:65 brd ff:ff:ff:ff:ff:ff
    inet 213.95.19.11/26 brd 213.95.19.63 scope global eth2
5: eth3: <BROADCAST,MULTICAST,NOARP,SLAVE,UP> mtu 1500 qdisc pfifo_fast
master bond1 qlen 1000
    link/ether 00:07:e9:1f:be:2e brd ff:ff:ff:ff:ff:ff
    inet 10.0.18.168/16 brd 10.0.255.255 scope global eth3
6: eth4: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:0c:76:8b:da:a8 brd ff:ff:ff:ff:ff:ff
    inet 10.10.1.11/24 brd 10.10.1.255 scope global eth4
7: tunl0@NONE: <NOARP> mtu 1480 qdisc noop 
    link/ipip 0.0.0.0 brd 0.0.0.0
8: gre0@NONE: <NOARP> mtu 1476 qdisc noop 
    link/gre 0.0.0.0 brd 0.0.0.0
9: bond0: <BROADCAST,MULTICAST,MASTER,UP> mtu 1500 qdisc noqueue 
    link/ether 00:07:e9:1f:ba:65 brd ff:ff:ff:ff:ff:ff
    inet 213.95.19.11/26 brd 213.95.19.63 scope global bond0
    inet 213.95.19.1/26 brd 213.95.19.63 scope global secondary bond0:0
10: bond1: <BROADCAST,MULTICAST,MASTER,UP> mtu 1500 qdisc noqueue 
    link/ether 00:07:e9:1f:be:2e brd ff:ff:ff:ff:ff:ff
    inet 10.0.18.168/16 brd 10.0.255.255 scope global bond1
    inet 10.0.18.167/16 brd 10.0.255.255 scope global secondary bond1:0
ip route ls:
213.95.19.0/26 dev bond0  proto kernel  scope link  src 213.95.19.11 
10.10.1.0/24 dev eth4  proto kernel  scope link  src 10.10.1.11 
10.0.0.0/16 dev bond1  proto kernel  scope link  src 10.0.18.168 
default via 10.0.0.1 dev bond1 
And this is "shorewall status":
Shorewall-2.0.3a Status at stf-fw1 - Sun Jul 18 12:24:09 CEST 2004
Counters reset Sun Jul 18 12:05:19 CEST 2004
Chain INPUT (policy DROP 27 packets, 3590 bytes)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     all  --  lo     *       0.0.0.0/0
0.0.0.0/0           
    0     0 DROP      !icmp --  *      *       0.0.0.0/0
0.0.0.0/0           state INVALID 
13058  790K bond1_in   all  --  bond1  *       0.0.0.0/0
0.0.0.0/0           
    4  1312 bond0_in   all  --  bond0  *       0.0.0.0/0
0.0.0.0/0           
 4691  347K eth4_in    all  --  eth4   *       0.0.0.0/0
0.0.0.0/0           
    0     0 Reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
    0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0           LOG flags 0 level 6 prefix
`Shorewall:INPUT:REJECT:''
    0     0 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 DROP      !icmp --  *      *       0.0.0.0/0
0.0.0.0/0           state INVALID 
    0     0 bond1_fwd  all  --  bond1  *       0.0.0.0/0
0.0.0.0/0           
    0     0 bond0_fwd  all  --  bond0  *       0.0.0.0/0
0.0.0.0/0           
    0     0 eth4_fwd   all  --  eth4   *       0.0.0.0/0
0.0.0.0/0           
    0     0 Reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
    0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0           LOG flags 0 level 6 prefix
`Shorewall:FORWARD:REJECT:'' 
    0     0 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain OUTPUT (policy DROP 17 packets, 3007 bytes)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0
0.0.0.0/0           
    0     0 DROP      !icmp --  *      *       0.0.0.0/0
0.0.0.0/0           state INVALID 
 3121  125K FW2INET    all  --  *      bond1   0.0.0.0/0
0.0.0.0/0           
 1464  244K FW2ADM     all  --  *      eth4    0.0.0.0/0
0.0.0.0/0           
    0     0 FW2DMZ     all  --  *      bond0   0.0.0.0/0
0.0.0.0/0           
    0     0 Reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
    0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0           LOG flags 0 level 6 prefix
`Shorewall:OUTPUT:REJECT:'' 
    0     0 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain ADM2ADM (0 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain ADM2FW (1 references)
 pkts bytes target     prot opt in     out     source
destination         
  921 51972 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED 
    2    56 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 8 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 11 
    2   120 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:22 
 3766  295K ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain DMZ2FW (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 8 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 11 
    0     0 all2all    all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain DMZ2INET (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 8 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 11 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain Drop (2 references)
 pkts bytes target     prot opt in     out     source
destination         
12901  778K RejectAuth  all  --  *      *       0.0.0.0/0
0.0.0.0/0           
12899  778K dropBcast  all  --  *      *       0.0.0.0/0
0.0.0.0/0           
12859  771K DropSMB    all  --  *      *       0.0.0.0/0
0.0.0.0/0           
12834  770K DropUPnP   all  --  *      *       0.0.0.0/0
0.0.0.0/0           
12834  770K dropNotSyn  all  --  *      *       0.0.0.0/0
0.0.0.0/0           
12829  770K DropDNSrep  all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain DropDNSrep (2 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0           udp spt:53 
Chain DropSMB (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0           udp dpt:135 
    0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0           udp dpts:137:139 
    0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0           udp dpt:445 
    8   480 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:135 
    9   540 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:139 
    8   480 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:445 
Chain DropUPnP (2 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0           udp dpt:1900 
Chain FW2ADM (1 references)
 pkts bytes target     prot opt in     out     source
destination         
  901  144K ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED 
  563 99651 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain FW2DMZ (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain FW2INET (1 references)
 pkts bytes target     prot opt in     out     source
destination         
 3120  125K ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED 
    1    67 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain INET2ADM (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED 
    0     0 Drop       all  --  *      *       0.0.0.0/0
0.0.0.0/0           
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain INET2DMZ (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 8 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 11 
    0     0 INET2all   all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain INET2FW (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    2   189 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED 
    5   140 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 8 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 11 
12901  778K INET2all   all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain INET2all (2 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED 
12901  778K Drop       all  --  *      *       0.0.0.0/0
0.0.0.0/0           
12829  770K DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain Reject (4 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 RejectAuth  all  --  *      *       0.0.0.0/0
0.0.0.0/0           
    0     0 dropBcast  all  --  *      *       0.0.0.0/0
0.0.0.0/0           
    0     0 RejectSMB  all  --  *      *       0.0.0.0/0
0.0.0.0/0           
    0     0 DropUPnP   all  --  *      *       0.0.0.0/0
0.0.0.0/0           
    0     0 dropNotSyn  all  --  *      *       0.0.0.0/0
0.0.0.0/0           
    0     0 DropDNSrep  all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain RejectAuth (2 references)
 pkts bytes target     prot opt in     out     source
destination         
    2   120 reject     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:113 
Chain RejectSMB (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 reject     udp  --  *      *       0.0.0.0/0
0.0.0.0/0           udp dpt:135 
    0     0 reject     udp  --  *      *       0.0.0.0/0
0.0.0.0/0           udp dpts:137:139 
    0     0 reject     udp  --  *      *       0.0.0.0/0
0.0.0.0/0           udp dpt:445 
    0     0 reject     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:135 
    0     0 reject     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:139 
    0     0 reject     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:445 
Chain all2all (4 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED 
    0     0 Reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
    0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0           LOG flags 0 level 6 prefix
`Shorewall:all2all:REJECT:'' 
    0     0 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain blacklst (2 references)
 pkts bytes target     prot opt in     out     source
destination         
Chain bond0_fwd (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0           state INVALID,NEW 
    0     0 norfc1918  all  --  *      *       0.0.0.0/0
0.0.0.0/0           state NEW 
    0     0 DMZ2INET   all  --  *      bond1   0.0.0.0/0
0.0.0.0/0           
    0     0 all2all    all  --  *      eth4    0.0.0.0/0
0.0.0.0/0           
Chain bond0_in (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    4  1312 dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0           state INVALID,NEW 
    4  1312 norfc1918  all  --  *      *       0.0.0.0/0
0.0.0.0/0           state NEW 
    0     0 DMZ2FW     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain bond1_fwd (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0           state INVALID,NEW 
    0     0 blacklst   all  --  *      *       0.0.0.0/0
0.0.0.0/0           state INVALID,NEW 
    0     0 norfc1918  all  --  *      *       0.0.0.0/0
0.0.0.0/0           state NEW 
    0     0 INET2ADM   all  --  *      eth4    0.0.0.0/0
0.0.0.0/0           
    0     0 INET2DMZ   all  --  *      bond0   0.0.0.0/0
0.0.0.0/0           
Chain bond1_in (1 references)
 pkts bytes target     prot opt in     out     source
destination         
13056  790K dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0           state INVALID,NEW 
13056  790K blacklst   all  --  *      *       0.0.0.0/0
0.0.0.0/0           state INVALID,NEW 
13056  790K norfc1918  all  --  *      *       0.0.0.0/0
0.0.0.0/0           state NEW 
12908  779K INET2FW    all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain dropBcast (2 references)
 pkts bytes target     prot opt in     out     source
destination         
   40  6760 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0           PKTTYPE = broadcast 
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0           PKTTYPE = multicast 
Chain dropNotSyn (2 references)
 pkts bytes target     prot opt in     out     source
destination         
    5   200 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp flags:!0x16/0x02 
Chain dynamic (6 references)
 pkts bytes target     prot opt in     out     source
destination         
Chain eth4_fwd (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0           state INVALID,NEW 
    0     0 all2all    all  --  *      bond1   0.0.0.0/0
0.0.0.0/0           
    0     0 all2all    all  --  *      bond0   0.0.0.0/0
0.0.0.0/0           
Chain eth4_in (1 references)
 pkts bytes target     prot opt in     out     source
destination         
 3770  295K dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0           state INVALID,NEW 
 4691  347K ADM2FW     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain icmpdef (0 references)
 pkts bytes target     prot opt in     out     source
destination         
Chain norfc1918 (4 references)
 pkts bytes target     prot opt in     out     source
destination         
    4  1312 rfc1918    all  --  *      *       0.0.0.0/7
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 0.0.0.0/7 
    0     0 rfc1918    all  --  *      *       2.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 2.0.0.0/8 
    0     0 rfc1918    all  --  *      *       5.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 5.0.0.0/8 
    0     0 rfc1918    all  --  *      *       7.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 7.0.0.0/8 
    0     0 rfc1918    all  --  *      *       23.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 23.0.0.0/8 
    0     0 rfc1918    all  --  *      *       27.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 27.0.0.0/8 
    0     0 rfc1918    all  --  *      *       31.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 31.0.0.0/8 
    0     0 rfc1918    all  --  *      *       36.0.0.0/7
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 36.0.0.0/7 
    0     0 rfc1918    all  --  *      *       39.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 39.0.0.0/8 
    0     0 rfc1918    all  --  *      *       41.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 41.0.0.0/8 
    0     0 rfc1918    all  --  *      *       42.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 42.0.0.0/8 
    0     0 rfc1918    all  --  *      *       71.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 71.0.0.0/8 
    0     0 rfc1918    all  --  *      *       72.0.0.0/5
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 72.0.0.0/5 
    0     0 rfc1918    all  --  *      *       89.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 89.0.0.0/8 
    0     0 rfc1918    all  --  *      *       90.0.0.0/7
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 90.0.0.0/7 
    0     0 rfc1918    all  --  *      *       92.0.0.0/6
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 92.0.0.0/6 
    0     0 rfc1918    all  --  *      *       96.0.0.0/3
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 96.0.0.0/3 
    0     0 rfc1918    all  --  *      *       173.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 173.0.0.0/8 
    0     0 rfc1918    all  --  *      *       174.0.0.0/7
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 174.0.0.0/7 
    0     0 rfc1918    all  --  *      *       176.0.0.0/5
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 176.0.0.0/5 
    0     0 rfc1918    all  --  *      *       184.0.0.0/6
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 184.0.0.0/6 
    0     0 rfc1918    all  --  *      *       189.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 189.0.0.0/8 
    0     0 rfc1918    all  --  *      *       190.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 190.0.0.0/8 
    0     0 rfc1918    all  --  *      *       197.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 197.0.0.0/8 
    0     0 rfc1918    all  --  *      *       223.0.0.0/8
0.0.0.0/0           
    0     0 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 223.0.0.0/8 
    0     0 rfc1918    all  --  *      *       240.0.0.0/4
0.0.0.0/0           
  150 11550 rfc1918    all  --  *      *       0.0.0.0/0
0.0.0.0/0           ctorigdst 240.0.0.0/4 
Chain reject (11 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0           PKTTYPE = broadcast 
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0           PKTTYPE = multicast 
    0     0 DROP       all  --  *      *       10.0.255.255
0.0.0.0/0           
    0     0 DROP       all  --  *      *       213.95.19.63
0.0.0.0/0           
    0     0 DROP       all  --  *      *       10.10.1.255
0.0.0.0/0           
    0     0 DROP       all  --  *      *       255.255.255.255
0.0.0.0/0           
    0     0 DROP       all  --  *      *       224.0.0.0/4
0.0.0.0/0           
    2   120 REJECT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           reject-with tcp-reset 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0           reject-with icmp-port-unreachable 
    0     0 REJECT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           reject-with icmp-host-unreachable 
    0     0 REJECT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           reject-with icmp-host-prohibited 
Chain rfc1918 (52 references)
 pkts bytes target     prot opt in     out     source
destination         
  154 12862 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0           LOG flags 0 level 6 prefix
`Shorewall:rfc1918:DROP:''
  154 12862 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source
destination         
Chain smurfs (0 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 LOG        all  --  *      *       10.0.255.255
0.0.0.0/0           LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
    0     0 DROP       all  --  *      *       10.0.255.255
0.0.0.0/0           
    0     0 LOG        all  --  *      *       213.95.19.63
0.0.0.0/0           LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
    0     0 DROP       all  --  *      *       213.95.19.63
0.0.0.0/0           
    0     0 LOG        all  --  *      *       10.10.1.255
0.0.0.0/0           LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
    0     0 DROP       all  --  *      *       10.10.1.255
0.0.0.0/0           
    0     0 LOG        all  --  *      *       255.255.255.255
0.0.0.0/0           LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
    0     0 DROP       all  --  *      *       255.255.255.255
0.0.0.0/0           
    0     0 LOG        all  --  *      *       224.0.0.0/4
0.0.0.0/0           LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
    0     0 DROP       all  --  *      *       224.0.0.0/4
0.0.0.0/0           
Jul 18 12:21:28 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=822 PROTO=UDP
SPT=3988 DPT=712 LEN=57 
Jul 18 12:21:43 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=967 PROTO=UDP
SPT=3989 DPT=712 LEN=57 
Jul 18 12:21:43 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=967 PROTO=UDP
SPT=3989 DPT=712 LEN=57 
Jul 18 12:21:58 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1118 PROTO=UDP
SPT=3992 DPT=712 LEN=57 
Jul 18 12:21:58 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1118 PROTO=UDP
SPT=3992 DPT=712 LEN=57 
Jul 18 12:22:13 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1160 PROTO=UDP
SPT=3993 DPT=712 LEN=57 
Jul 18 12:22:13 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1160 PROTO=UDP
SPT=3993 DPT=712 LEN=57 
Jul 18 12:22:28 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1183 PROTO=UDP
SPT=3994 DPT=712 LEN=57 
Jul 18 12:22:28 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1183 PROTO=UDP
SPT=3994 DPT=712 LEN=57 
Jul 18 12:22:43 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1303 PROTO=UDP
SPT=3995 DPT=712 LEN=57 
Jul 18 12:22:43 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1303 PROTO=UDP
SPT=3995 DPT=712 LEN=57 
Jul 18 12:22:58 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1431 PROTO=UDP
SPT=4006 DPT=712 LEN=57 
Jul 18 12:22:58 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1431 PROTO=UDP
SPT=4006 DPT=712 LEN=57 
Jul 18 12:23:13 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1513 PROTO=UDP
SPT=4007 DPT=712 LEN=57 
Jul 18 12:23:13 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1513 PROTO=UDP
SPT=4007 DPT=712 LEN=57 
Jul 18 12:23:28 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1644 PROTO=UDP
SPT=4012 DPT=712 LEN=57 
Jul 18 12:23:28 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1644 PROTO=UDP
SPT=4012 DPT=712 LEN=57 
Jul 18 12:23:43 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1764 PROTO=UDP
SPT=4013 DPT=712 LEN=57 
Jul 18 12:23:43 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=1764 PROTO=UDP
SPT=4013 DPT=712 LEN=57 
Jul 18 12:23:58 rfc1918:DROP:IN=bond1 OUT= SRC=10.0.1.1
DST=255.255.255.255 LEN=77 TOS=0x00 PREC=0x00 TTL=128 ID=2090 PROTO=UDP
SPT=4019 DPT=712 LEN=57 
NAT Table
Chain PREROUTING (policy ACCEPT 39944 packets, 2595K bytes)
 pkts bytes target     prot opt in     out     source
destination         
Chain POSTROUTING (policy ACCEPT 55 packets, 3597 bytes)
 pkts bytes target     prot opt in     out     source
destination         
Chain OUTPUT (policy ACCEPT 14 packets, 1093 bytes)
 pkts bytes target     prot opt in     out     source
destination         
Mangle Table
Chain PREROUTING (policy ACCEPT 64867 packets, 6177K bytes)
 pkts bytes target     prot opt in     out     source
destination         
18075 1155K pretos     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain INPUT (policy ACCEPT 64721 packets, 6168K bytes)
 pkts bytes target     prot opt in     out     source
destination         
Chain FORWARD (policy ACCEPT 145 packets, 8988 bytes)
 pkts bytes target     prot opt in     out     source
destination         
Chain OUTPUT (policy ACCEPT 26883 packets, 3625K bytes)
 pkts bytes target     prot opt in     out     source
destination         
 4903  426K outtos     all  --  *      *       0.0.0.0/0
0.0.0.0/0           
Chain POSTROUTING (policy ACCEPT 26919 packets, 3615K bytes)
 pkts bytes target     prot opt in     out     source
destination         
Chain outtos (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 TOS        tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:22 TOS set 0x10 
 1219  201K TOS        tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp spt:22 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:21 TOS set 0x10 
    2    80 TOS        tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp spt:21 TOS set 0x10 
    2    80 TOS        tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp spt:20 TOS set 0x08 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:20 TOS set 0x08 
Chain pretos (1 references)
 pkts bytes target     prot opt in     out     source
destination         
 1231 68220 TOS        tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:22 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp spt:22 TOS set 0x10 
   10   600 TOS        tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:21 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp spt:21 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp spt:20 TOS set 0x08 
   10   600 TOS        tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:20 TOS set 0x08 
udp      17 28 src=10.10.1.12 dst=10.10.1.11 sport=32768 dport=694
[UNREPLIED] src=10.10.1.11 dst=10.10.1.12 sport=694 dport=32768 use=1 
udp      17 1 src=10.0.1.1 dst=255.255.255.255 sport=4013 dport=712
[UNREPLIED] src=255.255.255.255 dst=10.0.1.1 sport=712 dport=4013 use=1 
udp      17 16 src=10.0.1.1 dst=255.255.255.255 sport=4019 dport=712
[UNREPLIED] src=255.255.255.255 dst=10.0.1.1 sport=712 dport=4019 use=1 
udp      17 29 src=10.10.1.11 dst=10.10.1.12 sport=32768 dport=694
[UNREPLIED] src=10.10.1.12 dst=10.10.1.11 sport=694 dport=32768 use=1 
tcp      6 431999 ESTABLISHED src=10.10.1.12 dst=10.10.1.11 sport=32770
dport=22 src=10.10.1.11 dst=10.10.1.12 sport=22 dport=32770 [ASSURED]
use=1 
I hope that this time I included all needed information. If something is
missing I will send it asap.
Thank you very much,
Julian