Hi Tom,
Here is the output of ''shorewall dump''
2nd Try - first got stopped due to size, so I am removing a lot of the blacklist
section
Thanks.
-----------------
Shorewall 4.4.9 Dump at gateway - Mon Jan 10 07:54:20 EST 2011
Counters reset Sat Dec 18 11:13:00 EST 2010
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
1591K 162M dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
1156K 128M net2fw all -- ppp0 * 0.0.0.0/0 0.0.0.0/0
469K 37M loc2fw all -- eth1 * 0.0.0.0/0 0.0.0.0/0
48 3820 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
42 1512 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
36M 2563M dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
10M 553M TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x06/0x02 TCPMSS clamp to PMTU
359M 355G net_frwd all -- ppp0 * 0.0.0.0/0 0.0.0.0/0
186M 62G loc_frwd all -- eth1 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
269K 26M fw2net all -- * ppp0 0.0.0.0/0 0.0.0.0/0
111K 59M fw2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0
48 3820 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain %SSHKnock (1 references)
pkts bytes target prot opt in out source destination
0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 recent: CHECK name: SSH side: source LOG flags 0 level 6 prefix
`Shorewall:SSHKnock:ACCEPT:''
0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:!22 LOG flags 0 level 6 prefix `Shorewall:SSHKnock:DROP:''
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 recent: CHECK seconds: 60 name: SSH side: source
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:632 recent: REMOVE name: SSH side: source
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:633 recent: SET name: SSH side: source
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:634 recent: REMOVE name: SSH side: source
Chain Drop (2 references)
pkts bytes target prot opt in out source destination
1233K 132M all -- * * 0.0.0.0/0 0.0.0.0/0
8 396 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113 /* Auth */
1233K 132M dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0
1 120 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4 /* Needed ICMP types */
668 37511 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11 /* Needed ICMP types */
1232K 132M dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
91 7098 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
57034 2803K DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
219K 12M dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
160 31031 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain Reject (6 references)
pkts bytes target prot opt in out source destination
42 1512 all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113 /* Auth */
42 1512 dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11 /* Needed ICMP types */
0 0 dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain blacklst (4 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 95.216.0.0/15 0.0.0.0/0
* There is more stuff here - removed for message size*
Chain dropBcast (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type BROADCAST
42 1512 DROP all -- * * 0.0.0.0/0 224.0.0.0/4
Chain dropInvalid (2 references)
pkts bytes target prot opt in out source destination
34955 3530K DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID
Chain dropNotSyn (2 references)
pkts bytes target prot opt in out source destination
3015 1095K DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:!0x17/0x02
Chain dynamic (2 references)
pkts bytes target prot opt in out source destination
Chain fw2loc (1 references)
pkts bytes target prot opt in out source destination
82731 56M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
28162 2719K ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:fw2loc:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain fw2net (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:67:68
261K 26M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53 /* DNS */
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53 /* DNS */
7928 578K ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
2 120 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:fw2net:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain loc2fw (1 references)
pkts bytes target prot opt in out source destination
435K 35M blacklst all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
435K 35M smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
41850 2440K tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
34500 2043K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
2470 148K ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 /* SSH */
2489 189K ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8 /* Ping */
430K 34M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:loc2fw:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain loc2net (1 references)
pkts bytes target prot opt in out source destination
183M 62G ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
2982K 272M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc_frwd (1 references)
pkts bytes target prot opt in out source destination
3101K 318M blacklst all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
3101K 318M smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
118M 24G tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
186M 62G loc2net all -- * ppp0 0.0.0.0/0 0.0.0.0/0
121K 46M ACCEPT all -- * eth1 0.0.0.0/0 0.0.0.0/0
Chain log2 (13 references)
pkts bytes target prot opt in out source destination
86456 5994K LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2loc:ACCEPT:''
86456 5994K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logdrop (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logflags (5 references)
pkts bytes target prot opt in out source destination
153 9944 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 4 level 6 prefix `Shorewall:logflags:DROP:''
153 9944 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logreject (0 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source destination
1156K 128M blacklst all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
1155K 128M smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:67:68
230K 14M tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
38 3192 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
302 18471 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8 /* Ping */
159 8988 %SSHKnock tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 22,632,633,634
1155K 128M Drop all -- * * 0.0.0.0/0 0.0.0.0/0
1116K 123M LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2fw:DROP:''
1116K 123M DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2loc (1 references)
pkts bytes target prot opt in out source destination
326M 352G ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
9918 475K ACCEPT tcp -- * * 0.0.0.0/0 192.168.0.9
tcp dpt:3389
3 136 ACCEPT tcp -- * * 0.0.0.0/0 192.168.0.25
tcp dpt:4899 ctorigdst 165.228.58.71
8198 503K log2 tcp -- * * 0.0.0.0/0 192.168.0.2
[goto] multiport dports 25,80,143,443,465,587,993,1723
105 4832 log2 tcp -- * * 0.0.0.0/0 192.168.0.3
[goto] tcp dpt:3389
1930 112K log2 tcp -- * * 0.0.0.0/0 192.168.0.4
[goto] multiport dports 80,443,9000
1918 111K log2 tcp -- * * 0.0.0.0/0 192.168.0.5
[goto] multiport dports 80,443,4662,6000,7777,45631,49160:49300
0 0 log2 udp -- * * 0.0.0.0/0 192.168.0.5
[goto] udp dpt:4672
302 17424 log2 tcp -- * * 0.0.0.0/0 192.168.0.6
[goto] multiport dports 80,443
0 0 log2 tcp -- * * 202.124.246.88/29 192.168.0.5
[goto] tcp dpt:22
1610 85776 ACCEPT tcp -- * * 0.0.0.0/0 192.168.0.7
multiport dports 80,443 ctorigdst 203.35.162.45
18276 1069K log2 tcp -- * * 0.0.0.0/0
203.36.75.209 [goto] multiport dports
20,21,22,25,53,80,110,143,443,993,995
55533 4167K log2 udp -- * * 0.0.0.0/0
203.36.75.209 [goto] udp dpt:53
0 0 log2 tcp -- * * 202.124.246.88/29
203.36.75.209 [goto]
0 0 log2 udp -- * * 202.124.246.88/29
203.36.75.209 [goto]
194 10268 log2 tcp -- * * 0.0.0.0/0
203.36.75.210 [goto] multiport dports
20,21,22,25,53,80,110,143,443,993,995
0 0 log2 udp -- * * 0.0.0.0/0
203.36.75.210 [goto] udp dpt:53
78497 4247K Drop all -- * * 0.0.0.0/0 0.0.0.0/0
20740 1364K LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2loc:DROP:''
20740 1364K DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net_frwd (1 references)
pkts bytes target prot opt in out source destination
33M 2245M blacklst all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
33M 2245M smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
250M 335G tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
33M 2234M ACCEPT all -- * ppp0 0.0.0.0/0 0.0.0.0/0
326M 352G net2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0
Chain reject (13 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match src-type BROADCAST
0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0
0 0 DROP 2 -- * * 0.0.0.0/0 0.0.0.0/0
8 396 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-unreachable
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-prohibited
Chain shorewall (0 references)
pkts bytes target prot opt in out source destination
Chain smurflog (2 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain smurfs (4 references)
pkts bytes target prot opt in out source destination
3250 1136K RETURN all -- * * 0.0.0.0 0.0.0.0/0
0 0 smurflog all -- * * 0.0.0.0/0 0.0.0.0/0
[goto] ADDRTYPE match src-type BROADCAST
0 0 smurflog all -- * * 224.0.0.0/4 0.0.0.0/0
[goto]
Chain tcpflags (4 references)
pkts bytes target prot opt in out source destination
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x3F/0x29
85 6120 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x3F/0x00
1 40 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x06/0x06
1 40 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x03/0x03
66 3744 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp spt:0 flags:0x17/0x02
Log (/var/log/messages)
Jan 10 07:22:51 net2loc:DROP:IN=ppp0 OUT=eth1 SRC=218.30.15.215 DST=192.168.0.5
LEN=60 TOS=0x00 PREC=0x00 TTL=46 ID=55810 DF PROTO=TCP SPT=53119 DPT=22
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 10 07:22:51 net2loc:DROP:IN=ppp0 OUT=eth1 SRC=218.30.15.215 DST=192.168.0.2
LEN=60 TOS=0x00 PREC=0x00 TTL=46 ID=34104 DF PROTO=TCP SPT=52582 DPT=22
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 10 07:22:51 net2loc:DROP:IN=ppp0 OUT=eth1 SRC=218.30.15.215 DST=192.168.0.3
LEN=60 TOS=0x00 PREC=0x00 TTL=46 ID=44998 DF PROTO=TCP SPT=43981 DPT=22
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 10 07:25:28 net2fw:DROP:IN=ppp0 OUT= SRC=122.9.56.186 DST=165.228.58.71
LEN=40 TOS=0x00 PREC=0x00 TTL=94 ID=256 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384
RES=0x00 SYN URGP=0
Jan 10 07:26:07 net_dnat:DNAT:IN=ppp0 OUT= SRC=207.46.13.99 DST=203.35.162.45
LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=16241 DF PROTO=TCP SPT=16055 DPT=80
WINDOW=8192 RES=0x00 SYN URGP=0
Jan 10 07:29:26 net2fw:DROP:IN=ppp0 OUT= SRC=222.186.24.98 DST=165.228.58.71
LEN=40 TOS=0x00 PREC=0x00 TTL=99 ID=256 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384
RES=0x00 SYN URGP=0
Jan 10 07:29:30 net2fw:DROP:IN=ppp0 OUT= SRC=61.164.117.77 DST=165.228.58.71
LEN=40 TOS=0x00 PREC=0x00 TTL=99 ID=256 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384
RES=0x00 SYN URGP=0
Jan 10 07:36:22 net2loc:ACCEPT:IN=ppp0 OUT=eth1 SRC=1.144.207.87 DST=192.168.0.2
LEN=64 TOS=0x00 PREC=0x00 TTL=55 ID=16211 DF PROTO=TCP SPT=59560 DPT=443
WINDOW=65535 RES=0x00 SYN URGP=0
Jan 10 07:37:56 net2fw:DROP:IN=ppp0 OUT= SRC=116.255.144.111 DST=165.228.58.71
LEN=40 TOS=0x00 PREC=0x00 TTL=103 ID=256 PROTO=TCP SPT=6000 DPT=1433
WINDOW=16384 RES=0x00 SYN URGP=0
Jan 10 07:39:47 net2loc:ACCEPT:IN=ppp0 OUT=eth1 SRC=216.99.131.76
DST=192.168.0.2 LEN=64 TOS=0x00 PREC=0x00 TTL=47 ID=55950 DF PROTO=TCP SPT=59744
DPT=25 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 10 07:40:17 net2loc:DROP:IN=ppp0 OUT=eth1 SRC=64.21.234.194 DST=192.168.0.6
LEN=61 TOS=0x00 PREC=0x00 TTL=110 ID=12198 PROTO=ICMP TYPE=8 CODE=0 ID=3
SEQ=45354
Jan 10 07:40:19 net2loc:DROP:IN=ppp0 OUT=eth1 SRC=64.21.234.194 DST=192.168.0.6
LEN=61 TOS=0x00 PREC=0x00 TTL=110 ID=12351 PROTO=ICMP TYPE=8 CODE=0 ID=3
SEQ=16683
Jan 10 07:46:21 net2fw:DROP:IN=ppp0 OUT= SRC=129.192.196.5 DST=165.228.58.71
LEN=52 TOS=0x00 PREC=0x00 TTL=46 ID=37329 DF PROTO=TCP SPT=54339 DPT=23
WINDOW=49640 RES=0x00 SYN URGP=0
Jan 10 07:46:25 net2fw:DROP:IN=ppp0 OUT= SRC=129.192.196.5 DST=165.228.58.71
LEN=52 TOS=0x00 PREC=0x00 TTL=46 ID=37330 DF PROTO=TCP SPT=54339 DPT=23
WINDOW=49640 RES=0x00 SYN URGP=0
Jan 10 07:48:06 net_dnat:DNAT:IN=ppp0 OUT= SRC=207.46.13.99 DST=203.35.162.45
LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=6825 DF PROTO=TCP SPT=10940 DPT=80
WINDOW=8192 RES=0x00 SYN URGP=0
Jan 10 07:48:24 net2loc:ACCEPT:IN=ppp0 OUT=eth1 SRC=110.22.254.185
DST=192.168.0.2 LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=54144 DF PROTO=TCP SPT=63214
DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 10 07:49:40 net2loc:DROP:IN=ppp0 OUT=eth1 SRC=64.21.234.194 DST=192.168.0.4
LEN=61 TOS=0x00 PREC=0x00 TTL=110 ID=49099 PROTO=ICMP TYPE=8 CODE=0 ID=3
SEQ=29879
Jan 10 07:49:42 net2loc:DROP:IN=ppp0 OUT=eth1 SRC=64.21.234.194 DST=192.168.0.4
LEN=61 TOS=0x00 PREC=0x00 TTL=110 ID=49241 PROTO=ICMP TYPE=8 CODE=0 ID=3
SEQ=64695
Jan 10 07:53:29 net2loc:DROP:IN=ppp0 OUT=eth1 SRC=85.127.115.161 DST=192.168.0.2
LEN=61 TOS=0x00 PREC=0x00 TTL=105 ID=1014 PROTO=ICMP TYPE=8 CODE=0 ID=768
SEQ=16876
Jan 10 07:53:54 net_dnat:DNAT:IN=ppp0 OUT= SRC=211.154.255.57 DST=165.228.58.71
LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=17128 DF PROTO=TCP SPT=2198 DPT=3389
WINDOW=65535 RES=0x00 SYN URGP=0
NAT Table
Chain PREROUTING (policy ACCEPT 4235K packets, 425M bytes)
pkts bytes target prot opt in out source destination
4326K 430M nat_in all -- * * 0.0.0.0/0 0.0.0.0/0
4246K 426M dnat all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 606K packets, 50M bytes)
pkts bytes target prot opt in out source destination
2889K 280M nat_out all -- * * 0.0.0.0/0 0.0.0.0/0
2598K 253M ppp0_masq all -- * ppp0 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 26 packets, 1718 bytes)
pkts bytes target prot opt in out source destination
Chain dnat (1 references)
pkts bytes target prot opt in out source destination
1708K 166M net_dnat all -- ppp0 * 0.0.0.0/0 0.0.0.0/0
Chain log0 (1 references)
pkts bytes target prot opt in out source destination
9900 469K LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net_dnat:DNAT:''
9900 469K DNAT all -- * * 0.0.0.0/0 0.0.0.0/0
to:192.168.0.9
Chain log1 (1 references)
pkts bytes target prot opt in out source destination
3 136 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net_dnat:DNAT:''
3 136 DNAT all -- * * 0.0.0.0/0 0.0.0.0/0
to:192.168.0.25
Chain log3 (1 references)
pkts bytes target prot opt in out source destination
668 36180 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net_dnat:DNAT:''
668 36180 DNAT all -- * * 0.0.0.0/0 0.0.0.0/0
to:192.168.0.7
Chain nat_in (1 references)
pkts bytes target prot opt in out source destination
15717 826K DNAT all -- * * 0.0.0.0/0
203.35.162.46 to:192.168.0.3
17914 1040K DNAT all -- * * 0.0.0.0/0
203.35.162.41 to:192.168.0.2
17290 998K DNAT all -- * * 0.0.0.0/0
203.35.162.42 to:192.168.0.5
8757 471K DNAT all -- * * 0.0.0.0/0
203.35.162.43 to:192.168.0.6
19985 1040K DNAT all -- * * 0.0.0.0/0
203.35.162.44 to:192.168.0.4
Chain nat_out (1 references)
pkts bytes target prot opt in out source destination
0 0 SNAT all -- * * 192.168.0.3 0.0.0.0/0
to:203.35.162.46
153K 10M SNAT all -- * * 192.168.0.2 0.0.0.0/0
to:203.35.162.41
29534 1772K SNAT all -- * * 192.168.0.5 0.0.0.0/0
to:203.35.162.42
0 0 SNAT all -- * * 192.168.0.6 0.0.0.0/0
to:203.35.162.43
75 4551 SNAT all -- * * 192.168.0.4 0.0.0.0/0
to:203.35.162.44
Chain net_dnat (1 references)
pkts bytes target prot opt in out source destination
9900 469K log0 tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp dpt:3389
3 136 log1 tcp -- * * 0.0.0.0/0
165.228.58.71 [goto] tcp dpt:4899
668 36180 log3 tcp -- * * 0.0.0.0/0
203.35.162.45 [goto] multiport dports 80,443
Chain ppp0_masq (1 references)
pkts bytes target prot opt in out source destination
2099K 218M MASQUERADE all -- * * 192.168.0.0/24 0.0.0.0/0
Mangle Table
Chain PREROUTING (policy ACCEPT 547M packets, 417G bytes)
pkts bytes target prot opt in out source destination
547M 417G tcpre all -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 1625K packets, 164M bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 545M packets, 417G bytes)
pkts bytes target prot opt in out source destination
545M 417G MARK all -- * * 0.0.0.0/0 0.0.0.0/0
MARK and 0x0
545M 417G tcfor all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 387K packets, 86M bytes)
pkts bytes target prot opt in out source destination
387K 86M tcout all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 546M packets, 417G bytes)
pkts bytes target prot opt in out source destination
546M 417G tcpost all -- * * 0.0.0.0/0 0.0.0.0/0
Chain tcfor (1 references)
pkts bytes target prot opt in out source destination
Chain tcout (1 references)
pkts bytes target prot opt in out source destination
Chain tcpost (1 references)
pkts bytes target prot opt in out source destination
Chain tcpre (1 references)
pkts bytes target prot opt in out source destination
Raw Table
Chain PREROUTING (policy ACCEPT 547M packets, 417G bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 387K packets, 86M bytes)
pkts bytes target prot opt in out source destination
Conntrack Table (63 out of 32768)
udp 17 20 src=190.25.242.179 dst=203.36.75.209 sport=33006 dport=53
packets=53 bytes=3710 [UNREPLIED] src=203.36.75.209 dst=190.25.242.179 sport=53
dport=33006 packets=0 bytes=0 mark=0 use=2
udp 17 168 src=192.168.0.28 dst=199.108.3.4 sport=63318 dport=9875
packets=5385 bytes=173699 src=199.108.3.4 dst=165.228.58.71 sport=9875
dport=63318 packets=601 bytes=67347 [ASSURED] mark=0 use=2
tcp 6 431648 ESTABLISHED src=110.22.254.185 dst=203.35.162.41 sport=63214
dport=443 packets=10 bytes=1449 src=192.168.0.2 dst=110.22.254.185 sport=443
dport=63214 packets=6 bytes=3121 [ASSURED] mark=0 use=2
tcp 6 45 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30453 dport=80
packets=5 bytes=592 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30453
packets=5 bytes=556 [ASSURED] mark=0 use=2
udp 17 28 src=192.168.0.11 dst=255.255.255.255 sport=17784 dport=17784
packets=1 bytes=55 [UNREPLIED] src=255.255.255.255 dst=192.168.0.11 sport=17784
dport=17784 packets=0 bytes=0 mark=0 use=2
tcp 6 46 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30454 dport=80
packets=5 bytes=598 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30454
packets=5 bytes=559 [ASSURED] mark=0 use=2
tcp 6 40 SYN_SENT src=89.231.219.191 dst=203.35.162.40 sport=2807 dport=445
packets=116 bytes=6960 [UNREPLIED] src=203.35.162.40 dst=89.231.219.191
sport=445 dport=2807 packets=0 bytes=0 mark=0 use=2
tcp 6 429921 ESTABLISHED src=192.168.0.28 dst=114.141.200.85 sport=63310
dport=22 packets=964 bytes=82292 src=114.141.200.85 dst=165.228.58.71 sport=22
dport=63310 packets=857 bytes=199836 [ASSURED] mark=0 use=2
tcp 6 47 TIME_WAIT src=192.168.0.2 dst=204.2.160.233 sport=30455 dport=80
packets=5 bytes=592 src=204.2.160.233 dst=203.35.162.41 sport=80 dport=30455
packets=5 bytes=557 [ASSURED] mark=0 use=2
tcp 6 40 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30449 dport=80
packets=5 bytes=592 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30449
packets=5 bytes=556 [ASSURED] mark=0 use=2
tcp 6 53 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30459 dport=80
packets=5 bytes=592 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30459
packets=5 bytes=556 [ASSURED] mark=0 use=2
tcp 6 370387 ESTABLISHED src=49.197.170.251 dst=203.35.162.41 sport=62667
dport=443 packets=1 bytes=52 [UNREPLIED] src=192.168.0.2 dst=49.197.170.251
sport=443 dport=62667 packets=0 bytes=0 mark=0 use=2
tcp 6 24 TIME_WAIT src=192.168.0.5 dst=184.73.179.154 sport=34766 dport=80
packets=7 bytes=831 src=184.73.179.154 dst=203.35.162.42 sport=80 dport=34766
packets=7 bytes=3433 [ASSURED] mark=0 use=2
tcp 6 431864 ESTABLISHED src=192.168.0.2 dst=204.2.160.26 sport=30411
dport=80 packets=6 bytes=444 src=204.2.160.26 dst=203.35.162.41 sport=80
dport=30411 packets=5 bytes=3387 [ASSURED] mark=0 use=2
tcp 6 431999 ESTABLISHED src=192.168.0.28 dst=192.168.0.254 sport=63877
dport=22 packets=355 bytes=31468 src=192.168.0.254 dst=192.168.0.28 sport=22
dport=63877 packets=373 bytes=142893 [ASSURED] mark=0 use=2
udp 17 143 src=192.168.0.28 dst=199.108.3.4 sport=65454 dport=9875
packets=4904 bytes=158508 src=199.108.3.4 dst=165.228.58.71 sport=9875
dport=65454 packets=695 bytes=58992 [ASSURED] mark=0 use=2
tcp 6 37 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30447 dport=80
packets=5 bytes=592 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30447
packets=5 bytes=556 [ASSURED] mark=0 use=2
tcp 6 431986 ESTABLISHED src=192.168.0.2 dst=216.52.233.237 sport=29706
dport=443 packets=2281 bytes=134208 src=216.52.233.237 dst=203.35.162.41
sport=443 dport=29706 packets=1143 bytes=89193 [ASSURED] mark=0 use=2
tcp 6 35 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30446 dport=80
packets=5 bytes=598 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30446
packets=5 bytes=559 [ASSURED] mark=0 use=2
tcp 6 63 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30468 dport=80
packets=5 bytes=592 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30468
packets=5 bytes=556 [ASSURED] mark=0 use=2
tcp 6 57 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30462 dport=80
packets=5 bytes=592 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30462
packets=5 bytes=556 [ASSURED] mark=0 use=2
udp 17 165 src=192.168.0.28 dst=199.108.3.4 sport=63314 dport=9875
packets=5391 bytes=173895 src=199.108.3.4 dst=165.228.58.71 sport=9875
dport=63314 packets=611 bytes=72102 [ASSURED] mark=0 use=2
tcp 6 431990 ESTABLISHED src=192.168.0.28 dst=216.52.233.237 sport=52324
dport=443 packets=10533 bytes=617148 src=216.52.233.237 dst=165.228.58.71
sport=443 dport=52324 packets=5273 bytes=407016 [ASSURED] mark=0 use=2
tcp 6 61 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30467 dport=80
packets=5 bytes=598 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30467
packets=5 bytes=559 [ASSURED] mark=0 use=2
tcp 6 64 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30469 dport=80
packets=5 bytes=598 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30469
packets=5 bytes=559 [ASSURED] mark=0 use=2
tcp 6 54 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30460 dport=80
packets=5 bytes=598 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30460
packets=5 bytes=559 [ASSURED] mark=0 use=2
tcp 6 68 SYN_SENT src=219.81.166.162 dst=203.35.162.45 sport=2377 dport=445
packets=102 bytes=4896 [UNREPLIED] src=203.35.162.45 dst=219.81.166.162
sport=445 dport=2377 packets=0 bytes=0 mark=0 use=2
udp 17 28 src=192.168.0.11 dst=255.255.255.255 sport=57742 dport=3483
packets=1 bytes=65 [UNREPLIED] src=255.255.255.255 dst=192.168.0.11 sport=3483
dport=57742 packets=0 bytes=0 mark=0 use=2
tcp 6 4 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30437 dport=80
packets=5 bytes=484 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30437
packets=5 bytes=472 [ASSURED] mark=0 use=2
tcp 6 431358 ESTABLISHED src=192.168.0.22 dst=17.149.36.208 sport=49508
dport=5223 packets=965 bytes=84510 src=17.149.36.208 dst=165.228.58.71
sport=5223 dport=49508 packets=520 bytes=48464 [ASSURED] mark=0 use=2
udp 17 179 src=192.168.0.28 dst=199.108.3.59 sport=59828 dport=1350
packets=67700 bytes=3875363 src=199.108.3.59 dst=165.228.58.71 sport=1350
dport=59828 packets=144395 bytes=18309738 [ASSURED] mark=0 use=2
tcp 6 431782 ESTABLISHED src=192.168.0.23 dst=72.14.203.188 sport=55614
dport=5228 packets=308 bytes=22470 src=72.14.203.188 dst=165.228.58.71
sport=5228 dport=55614 packets=343 bytes=29865 [ASSURED] mark=0 use=2
tcp 6 43 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30451 dport=80
packets=5 bytes=592 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30451
packets=5 bytes=556 [ASSURED] mark=0 use=2
tcp 6 25 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30440 dport=80
packets=29 bytes=1506 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30440
packets=52 bytes=72134 [ASSURED] mark=0 use=2
tcp 6 43 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30452 dport=80
packets=5 bytes=598 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30452
packets=5 bytes=559 [ASSURED] mark=0 use=2
tcp 6 431967 ESTABLISHED src=192.168.0.2 dst=206.51.26.124 sport=49733
dport=3101 packets=4903 bytes=224561 src=206.51.26.124 dst=203.35.162.41
sport=3101 dport=49733 packets=2457 bytes=125318 [ASSURED] mark=0 use=2
tcp 6 431987 ESTABLISHED src=192.168.0.27 dst=216.52.233.213 sport=50087
dport=443 packets=9605 bytes=678015 src=216.52.233.213 dst=165.228.58.71
sport=443 dport=50087 packets=4802 bytes=428510 [ASSURED] mark=0 use=2
tcp 6 49 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30456 dport=80
packets=5 bytes=598 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30456
packets=5 bytes=559 [ASSURED] mark=0 use=2
tcp 6 430922 ESTABLISHED src=1.144.207.87 dst=203.35.162.41 sport=59560
dport=443 packets=9 bytes=1381 src=192.168.0.2 dst=1.144.207.87 sport=443
dport=59560 packets=6 bytes=3121 [ASSURED] mark=0 use=2
tcp 6 41 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30450 dport=80
packets=5 bytes=598 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30450
packets=5 bytes=559 [ASSURED] mark=0 use=2
tcp 6 34 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30445 dport=80
packets=5 bytes=592 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30445
packets=5 bytes=556 [ASSURED] mark=0 use=2
tcp 6 429445 ESTABLISHED src=192.168.0.28 dst=202.124.246.90 sport=63760
dport=22 packets=1191 bytes=86324 src=202.124.246.90 dst=165.228.58.71 sport=22
dport=63760 packets=1524 bytes=516700 [ASSURED] mark=0 use=2
tcp 6 51 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30458 dport=80
packets=5 bytes=598 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30458
packets=5 bytes=559 [ASSURED] mark=0 use=2
tcp 6 58 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30465 dport=80
packets=5 bytes=598 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30465
packets=5 bytes=559 [ASSURED] mark=0 use=2
udp 17 179 src=192.168.0.28 dst=199.108.3.59 sport=51843 dport=1350
packets=84905 bytes=4870402 src=199.108.3.59 dst=165.228.58.71 sport=1350
dport=51843 packets=180191 bytes=23983695 [ASSURED] mark=0 use=2
tcp 6 5 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30439 dport=80
packets=5 bytes=484 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30439
packets=5 bytes=472 [ASSURED] mark=0 use=2
tcp 6 61 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30466 dport=80
packets=5 bytes=592 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30466
packets=5 bytes=556 [ASSURED] mark=0 use=2
udp 17 179 src=192.168.0.28 dst=199.108.3.59 sport=51842 dport=1350
packets=85148 bytes=4877252 src=199.108.3.59 dst=165.228.58.71 sport=1350
dport=51842 packets=179807 bytes=23886100 [ASSURED] mark=0 use=2
tcp 6 38 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30448 dport=80
packets=5 bytes=598 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30448
packets=5 bytes=559 [ASSURED] mark=0 use=2
tcp 6 56 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30461 dport=80
packets=5 bytes=592 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30461
packets=5 bytes=556 [ASSURED] mark=0 use=2
tcp 6 50 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30457 dport=80
packets=5 bytes=592 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30457
packets=5 bytes=556 [ASSURED] mark=0 use=2
udp 17 170 src=192.168.0.28 dst=199.108.3.4 sport=63322 dport=9875
packets=5380 bytes=173532 src=199.108.3.4 dst=165.228.58.71 sport=9875
dport=63322 packets=605 bytes=68440 [ASSURED] mark=0 use=2
tcp 6 431864 ESTABLISHED src=192.168.0.2 dst=204.2.160.33 sport=30412
dport=80 packets=4 bytes=474 src=204.2.160.33 dst=203.35.162.41 sport=80
dport=30412 packets=3 bytes=613 [ASSURED] mark=0 use=2
tcp 6 2 TIME_WAIT src=192.168.0.2 dst=204.2.160.233 sport=30434 dport=80
packets=8 bytes=712 src=204.2.160.233 dst=203.35.162.41 sport=80 dport=30434
packets=11 bytes=11228 [ASSURED] mark=0 use=2
udp 17 18 src=192.168.0.5 dst=255.255.255.255 sport=3483 dport=3483
packets=1 bytes=44 [UNREPLIED] src=255.255.255.255 dst=192.168.0.5 sport=3483
dport=3483 packets=0 bytes=0 mark=0 use=2
tcp 6 4 TIME_WAIT src=192.168.0.2 dst=204.2.160.233 sport=30435 dport=80
packets=5 bytes=592 src=204.2.160.233 dst=203.35.162.41 sport=80 dport=30435
packets=5 bytes=557 [ASSURED] mark=0 use=2
udp 17 179 src=192.168.0.28 dst=199.108.3.59 sport=59775 dport=1350
packets=62724 bytes=3583933 src=199.108.3.59 dst=165.228.58.71 sport=1350
dport=59775 packets=134843 bytes=17173372 [ASSURED] mark=0 use=2
udp 17 169 src=192.168.0.28 dst=199.108.3.4 sport=63326 dport=9875
packets=5379 bytes=173502 src=199.108.3.4 dst=165.228.58.71 sport=9875
dport=63326 packets=601 bytes=67661 [ASSURED] mark=0 use=2
udp 17 179 src=192.168.0.28 dst=199.108.15.115 sport=53935 dport=1429
packets=58507 bytes=3793046 src=199.108.15.115 dst=165.228.58.71 sport=1429
dport=53935 packets=54724 bytes=4412875 [ASSURED] mark=0 use=2
tcp 6 26 TIME_WAIT src=192.168.0.2 dst=204.2.160.33 sport=30442 dport=80
packets=8 bytes=718 src=204.2.160.33 dst=203.35.162.41 sport=80 dport=30442
packets=11 bytes=11349 [ASSURED] mark=0 use=2
tcp 6 431760 ESTABLISHED src=192.168.0.28 dst=202.124.246.90 sport=63252
dport=22 packets=130976 bytes=5547620 src=202.124.246.90 dst=165.228.58.71
sport=22 dport=63252 packets=348853 bytes=50418032 [ASSURED] mark=0 use=2
tcp 6 32 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30444 dport=80
packets=5 bytes=598 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30444
packets=5 bytes=559 [ASSURED] mark=0 use=2
tcp 6 31 TIME_WAIT src=192.168.0.2 dst=204.2.160.59 sport=30443 dport=80
packets=5 bytes=592 src=204.2.160.59 dst=203.35.162.41 sport=80 dport=30443
packets=5 bytes=556 [ASSURED] mark=0 use=2
IP Configuration
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state
UNKNOWN qlen 1000
inet 192.168.0.254/24 brd 192.168.0.255 scope global eth1
191: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1492 qdisc
pfifo_fast state UNKNOWN qlen 3
inet 165.228.58.71 peer 165.228.0.1/32 scope global ppp0
inet 169.254.146.101/16 brd 169.254.255.255 scope global ppp0
IP Stats
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
3820 48 0 0 0 0
TX: bytes packets errors dropped carrier collsns
3820 48 0 0 0 0
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state
UNKNOWN qlen 1000
link/ether 00:0c:29:d8:d3:f9 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
1896565495 360659122 634 0 0 0
TX: bytes packets errors dropped carrier collsns
366824949 219810960 0 0 0 0
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state
UNKNOWN qlen 1000
link/ether 00:0c:29:d8:d3:03 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
588391538 188068415 2150 0 0 0
TX: bytes packets errors dropped carrier collsns
535734912 326540417 0 0 0 0
191: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1492 qdisc
pfifo_fast state UNKNOWN qlen 3
link/ppp
RX: bytes packets errors dropped overrun mcast
4289167488 224406372 0 0 0 0
TX: bytes packets errors dropped carrier collsns
2874417684 115692197 0 5 0 0
/proc
/proc/version = Linux version 2.6.31-gentoo-r6 (root@gateway) (gcc version
4.1.2 (Gentoo 4.1.2 p1.0.2)) #4 SMP Sat Mar 13 13:37:59 EST 2010
/proc/sys/net/ipv4/ip_forward = 1
/proc/sys/net/ipv4/icmp_echo_ignore_all = 0
/proc/sys/net/ipv4/conf/all/proxy_arp = 0
/proc/sys/net/ipv4/conf/all/arp_filter = 0
/proc/sys/net/ipv4/conf/all/arp_ignore = 0
/proc/sys/net/ipv4/conf/all/rp_filter = 0
/proc/sys/net/ipv4/conf/all/log_martians = 0
/proc/sys/net/ipv4/conf/default/proxy_arp = 0
/proc/sys/net/ipv4/conf/default/arp_filter = 0
/proc/sys/net/ipv4/conf/default/arp_ignore = 0
/proc/sys/net/ipv4/conf/default/rp_filter = 0
/proc/sys/net/ipv4/conf/default/log_martians = 1
/proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth0/arp_filter = 0
/proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth0/rp_filter = 0
/proc/sys/net/ipv4/conf/eth0/log_martians = 1
/proc/sys/net/ipv4/conf/eth1/proxy_arp = 1
/proc/sys/net/ipv4/conf/eth1/arp_filter = 0
/proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth1/rp_filter = 1
/proc/sys/net/ipv4/conf/eth1/log_martians = 1
/proc/sys/net/ipv4/conf/lo/proxy_arp = 0
/proc/sys/net/ipv4/conf/lo/arp_filter = 0
/proc/sys/net/ipv4/conf/lo/arp_ignore = 0
/proc/sys/net/ipv4/conf/lo/rp_filter = 0
/proc/sys/net/ipv4/conf/lo/log_martians = 1
/proc/sys/net/ipv4/conf/ppp0/proxy_arp = 0
/proc/sys/net/ipv4/conf/ppp0/arp_filter = 0
/proc/sys/net/ipv4/conf/ppp0/arp_ignore = 0
/proc/sys/net/ipv4/conf/ppp0/rp_filter = 0
/proc/sys/net/ipv4/conf/ppp0/log_martians = 1
Routing Rules
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
Table local:
local 192.168.0.254 dev eth1 proto kernel scope host src 192.168.0.254
broadcast 192.168.0.255 dev eth1 proto kernel scope link src 192.168.0.254
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 169.254.0.0 dev ppp0 proto kernel scope link src 169.254.146.101
local 169.254.146.101 dev ppp0 proto kernel scope host src 169.254.146.101
broadcast 192.168.0.0 dev eth1 proto kernel scope link src 192.168.0.254
broadcast 169.254.255.255 dev ppp0 proto kernel scope link src
169.254.146.101
local 165.228.58.71 dev ppp0 proto kernel scope host src 165.228.58.71
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
Table main:
165.228.0.1 dev ppp0 proto kernel scope link src 165.228.58.71
192.168.0.0/24 dev eth1 proto kernel scope link src 192.168.0.254
169.254.0.0/16 dev ppp0 proto kernel scope link src 169.254.146.101
127.0.0.0/8 dev lo scope link
default via 165.228.0.1 dev ppp0
ARP
? (192.168.0.19) at dc:2b:61:a6:58:35 [ether] on eth1
? (192.168.0.9) at 00:0c:29:0c:3a:6a [ether] on eth1
? (192.168.0.2) at 00:21:5a:fd:ba:a9 [ether] on eth1
? (192.168.0.23) at 38:e7:d8:b5:06:ce [ether] on eth1
? (192.168.0.28) at 80:ee:73:00:b4:1a [ether] on eth1
? (192.168.0.5) at 00:1d:60:48:6c:30 [ether] on eth1
? (192.168.0.27) at d4:9a:20:d8:87:b8 [ether] on eth1
Modules
ipt_CLUSTERIP 5824 0
ipt_ECN 2076 0
ipt_MASQUERADE 2172 1
ipt_NETMAP 1500 0
ipt_REDIRECT 1500 0
ipt_ULOG 6628 0
ipt_addrtype 2044 3
ipt_ah 1372 0
ipt_ecn 1596 0
iptable_mangle 2268 1
iptable_nat 4252 1
iptable_raw 1756 0
nf_conntrack 53016 30
ipt_CLUSTERIP,nf_nat_tftp,nf_nat_snmp_basic,nf_nat_sip,nf_nat_pptp,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,xt_connlimit,nf_conntrack_amanda,nf_conntrack_sane,nf_conntrack_tftp,nf_conntrack_sip,nf_conntrack_proto_sctp,nf_conntrack_pptp,nf_conntrack_proto_gre,nf_conntrack_netlink,nf_conntrack_netbios_ns,nf_conntrack_irc,nf_conntrack_h323,nf_conntrack_ftp,xt_helper,xt_state,xt_connmark,xt_conntrack,ipt_MASQUERADE,iptable_nat,nf_nat,nf_conntrack_ipv4
nf_conntrack_amanda 3452 1 nf_nat_amanda
nf_conntrack_ftp 6176 1 nf_nat_ftp
nf_conntrack_h323 43400 1 nf_nat_h323
nf_conntrack_ipv4 11592 25 iptable_nat,nf_nat
nf_conntrack_irc 4768 1 nf_nat_irc
nf_conntrack_netbios_ns 2140 0
nf_conntrack_netlink 15132 0
nf_conntrack_pptp 5088 1 nf_nat_pptp
nf_conntrack_proto_gre 4576 1 nf_conntrack_pptp
nf_conntrack_proto_sctp 6660 0
nf_conntrack_sane 4120 0
nf_conntrack_sip 14672 1 nf_nat_sip
nf_conntrack_tftp 3856 1 nf_nat_tftp
nf_defrag_ipv4 1564 1 nf_conntrack_ipv4
nf_nat 14608 12
ipt_REDIRECT,ipt_NETMAP,nf_nat_tftp,nf_nat_sip,nf_nat_pptp,nf_nat_proto_gre,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,ipt_MASQUERADE,iptable_nat
nf_nat_amanda 1564 0
nf_nat_ftp 2300 0
nf_nat_h323 5532 0
nf_nat_irc 1820 0
nf_nat_pptp 2652 0
nf_nat_proto_gre 1856 1 nf_nat_pptp
nf_nat_sip 5084 0
nf_nat_snmp_basic 8068 0
nf_nat_tftp 1308 0
xt_CLASSIFY 1308 0
xt_MARK 1788 1
xt_NFLOG 1404 0
xt_NFQUEUE 1916 0
xt_TCPMSS 2780 1
xt_comment 1276 23
xt_connlimit 3620 0
xt_connmark 1916 0
xt_conntrack 3708 22
xt_dccp 2500 0
xt_dscp 2076 0
xt_hashlimit 7852 0
xt_helper 1724 0
xt_iprange 2108 0
xt_length 1500 0
xt_limit 2016 0
xt_mac 1340 0
xt_mark 1468 0
xt_multiport 2556 13
xt_owner 2204 0
xt_pkttype 1340 0
xt_policy 2588 0
xt_realm 1244 0
xt_recent 8544 5
xt_state 1756 0
xt_tcpmss 1692 0
xt_time 2300 0
Shorewall has detected the following iptables/netfilter capabilities:
NAT: Available
Packet Mangling: Available
Multi-port Match: Available
Extended Multi-port Match: Available
Connection Tracking Match: Available
Extended Connection Tracking Match Support: Available
Packet Type Match: Available
Policy Match: Available
Physdev Match: Not available
Physdev-is-bridged Support: Not available
Packet length Match: Available
IP range Match: Available
Recent Match: Available
Owner Match: Available
Ipset Match: Not available
CONNMARK Target: Not available
Connmark Match: Available
Extended Connmark Match: Available
Raw Table: Available
IPP2P Match: Not available
CLASSIFY Target: Available
Extended REJECT: Available
Repeat match: Available
MARK Target: Available
Extended MARK Target: Available
Extended MARK Target 2: Available
Mangle FORWARD Chain: Available
Comments: Available
Address Type Match: Available
TCPMSS Match: Available
Hashlimit Match: Available
NFQUEUE Target: Available
Realm Match: Available
Helper Match: Available
Connlimit Match: Available
Time Match: Available
Goto Support: Available
LOGMARK Target: Not available
IPMARK Target: Not available
LOG Target: Available
Persistent SNAT: Not available
TPROXY Target: Not available
FLOW Classifier: Available
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State
PID/Program name
tcp 0 0 0.0.0.0:10000 0.0.0.0:* LISTEN
4472/perl
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN
4145/sshd
tcp 0 0 192.168.0.254:22 192.168.0.28:63877
ESTABLISHED17185/1
udp 0 0 0.0.0.0:10000 0.0.0.0:*
4472/perl
udp 0 0 169.254.146.101:68 0.0.0.0:*
27392/dhcpcd
Traffic Control
Device eth0:
qdisc pfifo_fast 0: root bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
Sent 69086302503 bytes 219810970 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
Device eth1:
qdisc pfifo_fast 0: root bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
Sent 357018021462 bytes 326540426 pkt (dropped 0, overlimits 0 requeues 92501)
rate 0bit 0pps backlog 0b 0p requeues 92501
Device ppp0:
qdisc pfifo_fast 0: root bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
Sent 7169385621 bytes 115692208 pkt (dropped 0, overlimits 0 requeues 1)
rate 0bit 0pps backlog 0b 0p requeues 1
TC Filters
Device eth0:
Device eth1:
Device ppp0:
------------------------------------------------------------------------------
Gaining the trust of online customers is vital for the success of any company
that requires sensitive data to be transmitted over the Web. Learn how to
best implement a security strategy that keeps consumers'' information
secure
and instills the confidence they need to proceed with transactions.
http://p.sf.net/sfu/oracle-sfdevnl