Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- localhost dem # shorewall dump
- Shorewall 4.4.10 Dump at localhost - Thu Nov 11 17:10:52 EET 2010
- Counters reset Thu Nov 11 17:10:18 EET 2010
- Chain INPUT (policy DROP 0 packets, 0 bytes)
- pkts bytes target prot opt in out source destination
- 4 384 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW
- 1 111 net2fw all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
- 4 384 loc2fw all -- eth0 * 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
- 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
- Chain FORWARD (policy DROP 0 packets, 0 bytes)
- pkts bytes target prot opt in out source destination
- 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW
- 0 0 net2loc all -- wlan0 eth0 0.0.0.0/0 0.0.0.0/0
- 0 0 loc2net all -- eth0 wlan0 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
- 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
- Chain OUTPUT (policy DROP 0 packets, 0 bytes)
- pkts bytes target prot opt in out source destination
- 2 141 fw2net all -- * wlan0 0.0.0.0/0 0.0.0.0/0
- 0 0 fw2loc all -- * eth0 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
- Chain Drop (0 references)
- pkts bytes target prot opt in out source destination
- 0 0 all -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113
- 0 0 dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 4
- 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 11
- 0 0 dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,445
- 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139
- 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpts:1024:65535
- 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,139,445
- 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900
- 0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53
- Chain Reject (5 references)
- pkts bytes target prot opt in out source destination
- 4 384 all -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113
- 4 384 dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 4
- 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 11
- 0 0 dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,445
- 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139
- 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpts:1024:65535
- 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,139,445
- 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900
- 0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53
- Chain dropBcast (2 references)
- pkts bytes target prot opt in out source destination
- 4 384 DROP all -- * * 0.0.0.0/0 172.16.255.255
- 0 0 DROP all -- * * 0.0.0.0/0 192.168.1.255
- 0 0 DROP all -- * * 0.0.0.0/0 255.255.255.255
- 0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4
- Chain dropInvalid (2 references)
- pkts bytes target prot opt in out source destination
- 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
- Chain dropNotSyn (2 references)
- pkts bytes target prot opt in out source destination
- 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x17/0x02
- Chain dynamic (2 references)
- pkts bytes target prot opt in out source destination
- Chain fw2loc (1 references)
- pkts bytes target prot opt in out source destination
- 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
- Chain fw2net (1 references)
- pkts bytes target prot opt in out source destination
- 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:67:68
- 2 141 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
- Chain loc2fw (1 references)
- pkts bytes target prot opt in out source destination
- 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- 4 384 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:loc2fw:REJECT:'
- 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
- Chain loc2net (1 references)
- pkts bytes target prot opt in out source destination
- 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
- Chain logdrop (0 references)
- pkts bytes target prot opt in out source destination
- 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
- Chain logreject (0 references)
- pkts bytes target prot opt in out source destination
- 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
- Chain net2fw (1 references)
- pkts bytes target prot opt in out source destination
- 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:67:68
- 1 111 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2fw:REJECT:'
- 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
- Chain net2loc (1 references)
- pkts bytes target prot opt in out source destination
- 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2loc:REJECT:'
- 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
- Chain reject (12 references)
- pkts bytes target prot opt in out source destination
- 0 0 DROP all -- * * 0.0.0.0/0 172.16.255.255
- 0 0 DROP all -- * * 0.0.0.0/0 192.168.1.255
- 0 0 DROP all -- * * 0.0.0.0/0 255.255.255.255
- 0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0
- 0 0 DROP 2 -- * * 0.0.0.0/0 0.0.0.0/0
- 0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset
- 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
- 0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-unreachable
- 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
- Chain shorewall (0 references)
- pkts bytes target prot opt in out source destination
- Log (/var/log/messages)
- Nov 11 13:37:12 OUTPUT:REJECT:IN= OUT=eth0 SRC=172.16.0.3 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=17388 DF PROTO=TCP SPT=49140 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:12 OUTPUT:REJECT:IN= OUT=eth0 SRC=172.16.0.3 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=58966 DF PROTO=TCP SPT=49141 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:12 OUTPUT:REJECT:IN= OUT=eth0 SRC=172.16.0.3 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=39544 DF PROTO=TCP SPT=49142 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=16264 DF PROTO=TCP SPT=58096 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=59986 DF PROTO=TCP SPT=58097 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=209.85.229.101 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=4801 DF PROTO=TCP SPT=55550 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=209.85.229.100 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=21338 DF PROTO=TCP SPT=37745 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=209.85.229.102 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=41802 DF PROTO=TCP SPT=55590 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:32 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=20034 DF PROTO=TCP SPT=58101 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:32 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=27782 DF PROTO=TCP SPT=58102 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:32 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=46900 DF PROTO=TCP SPT=58103 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:33 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=64675 DF PROTO=TCP SPT=58104 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:33 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=16001 DF PROTO=TCP SPT=58105 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:49 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=53780 DF PROTO=TCP SPT=58106 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:49 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=34355 DF PROTO=TCP SPT=58107 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:50 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=21129 DF PROTO=TCP SPT=58108 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:37:50 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=60942 DF PROTO=TCP SPT=58109 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:38:01 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=53233 DF PROTO=TCP SPT=58110 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 13:38:01 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=58673 DF PROTO=TCP SPT=58111 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
- Nov 11 16:41:23 net2fw:REJECT:IN=wlan0 OUT= SRC=192.168.1.1 DST=192.168.1.100 LEN=408 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=1031 DPT=49796 LEN=388
- NAT Table
- Chain PREROUTING (policy ACCEPT 4 packets, 384 bytes)
- pkts bytes target prot opt in out source destination
- Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
- pkts bytes target prot opt in out source destination
- Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
- pkts bytes target prot opt in out source destination
- 0 0 wlan0_masq all -- * wlan0 0.0.0.0/0 0.0.0.0/0
- Chain wlan0_masq (1 references)
- pkts bytes target prot opt in out source destination
- 0 0 MASQUERADE all -- * * 172.16.0.0/16 0.0.0.0/0
- Mangle Table
- Chain PREROUTING (policy ACCEPT 5 packets, 495 bytes)
- pkts bytes target prot opt in out source destination
- 5 495 tcpre all -- * * 0.0.0.0/0 0.0.0.0/0
- Chain INPUT (policy ACCEPT 5 packets, 495 bytes)
- pkts bytes target prot opt in out source destination
- Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
- pkts bytes target prot opt in out source destination
- 0 0 tcfor all -- * * 0.0.0.0/0 0.0.0.0/0
- Chain OUTPUT (policy ACCEPT 2 packets, 141 bytes)
- pkts bytes target prot opt in out source destination
- 2 141 tcout all -- * * 0.0.0.0/0 0.0.0.0/0
- Chain POSTROUTING (policy ACCEPT 2 packets, 141 bytes)
- pkts bytes target prot opt in out source destination
- 2 141 tcpost all -- * * 0.0.0.0/0 0.0.0.0/0
- Chain tcfor (1 references)
- pkts bytes target prot opt in out source destination
- Chain tcout (1 references)
- pkts bytes target prot opt in out source destination
- Chain tcpost (1 references)
- pkts bytes target prot opt in out source destination
- Chain tcpre (1 references)
- pkts bytes target prot opt in out source destination
- Conntrack Table (21 out of 65536)
- tcp 6 424195 ESTABLISHED src=172.16.0.120 dst=66.249.92.104 sport=37702 dport=80 src=66.249.92.104 dst=172.16.0.120 sport=80 dport=37702 [ASSURED] use=2
- tcp 6 424486 ESTABLISHED src=172.16.0.120 dst=92.123.73.59 sport=39157 dport=80 src=92.123.73.59 dst=172.16.0.120 sport=80 dport=39157 [ASSURED] use=2
- tcp 6 424484 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51970 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51970 [ASSURED] use=2
- tcp 6 424439 ESTABLISHED src=172.16.0.120 dst=209.85.227.16 sport=59831 dport=993 src=209.85.227.16 dst=172.16.0.120 sport=993 dport=59831 [ASSURED] use=2
- tcp 6 424484 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51969 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51969 [ASSURED] use=2
- tcp 6 424468 ESTABLISHED src=172.16.0.120 dst=209.85.229.100 sport=37198 dport=80 src=209.85.229.100 dst=172.16.0.120 sport=80 dport=37198 [ASSURED] use=2
- tcp 6 424484 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51967 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51967 [ASSURED] use=2
- tcp 6 424484 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51973 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51973 [ASSURED] use=2
- tcp 6 424492 ESTABLISHED src=172.16.0.120 dst=92.123.73.50 sport=33341 dport=80 src=92.123.73.50 dst=172.16.0.120 sport=80 dport=33341 [ASSURED] use=2
- tcp 6 424601 ESTABLISHED src=172.16.0.120 dst=209.85.227.16 sport=48942 dport=993 src=209.85.227.16 dst=172.16.0.120 sport=993 dport=48942 [ASSURED] use=2
- tcp 6 424468 ESTABLISHED src=172.16.0.120 dst=209.85.229.100 sport=37200 dport=80 src=209.85.229.100 dst=172.16.0.120 sport=80 dport=37200 [ASSURED] use=2
- tcp 6 424493 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51968 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51968 [ASSURED] use=2
- tcp 6 424467 ESTABLISHED src=172.16.0.120 dst=209.85.229.100 sport=37199 dport=80 src=209.85.229.100 dst=172.16.0.120 sport=80 dport=37199 [ASSURED] use=2
- tcp 6 424484 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51965 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51965 [ASSURED] use=2
- tcp 6 424375 ESTABLISHED src=172.16.0.120 dst=209.85.227.16 sport=59816 dport=993 src=209.85.227.16 dst=172.16.0.120 sport=993 dport=59816 [ASSURED] use=2
- tcp 6 424469 ESTABLISHED src=172.16.0.120 dst=209.85.229.102 sport=51203 dport=80 src=209.85.229.102 dst=172.16.0.120 sport=80 dport=51203 [ASSURED] use=2
- tcp 6 424484 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51966 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51966 [ASSURED] use=2
- tcp 6 431984 ESTABLISHED src=192.168.1.100 dst=213.179.58.83 sport=53158 dport=6667 src=213.179.58.83 dst=192.168.1.100 sport=6667 dport=53158 [ASSURED] use=2
- tcp 6 424473 ESTABLISHED src=172.16.0.120 dst=66.249.92.104 sport=37703 dport=80 src=66.249.92.104 dst=172.16.0.120 sport=80 dport=37703 [ASSURED] use=2
- tcp 6 424383 ESTABLISHED src=172.16.0.120 dst=209.85.227.16 sport=59818 dport=993 src=209.85.227.16 dst=172.16.0.120 sport=993 dport=59818 [ASSURED] use=2
- tcp 6 424490 ESTABLISHED src=172.16.0.120 dst=92.123.73.50 sport=33340 dport=80 src=92.123.73.50 dst=172.16.0.120 sport=80 dport=33340 [ASSURED] use=2
- IP Configuration
- 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
- inet 127.0.0.1/8 scope host lo
- 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
- inet 172.16.0.145/16 brd 172.16.255.255 scope global eth0
- 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
- inet 192.168.1.100/24 brd 192.168.1.255 scope global wlan0
- IP Stats
- 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
- link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- RX: bytes packets errors dropped overrun mcast
- 19726 279 0 0 0 0
- TX: bytes packets errors dropped carrier collsns
- 19726 279 0 0 0 0
- 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
- link/ether 00:1d:72:f1:d4:e0 brd ff:ff:ff:ff:ff:ff
- RX: bytes packets errors dropped overrun mcast
- 3080433 11494 0 0 0 0
- TX: bytes packets errors dropped carrier collsns
- 1290107 11663 0 0 0 0
- 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
- link/ether 00:21:6b:11:16:f2 brd ff:ff:ff:ff:ff:ff
- RX: bytes packets errors dropped overrun mcast
- 46753244 50779 0 0 0 0
- TX: bytes packets errors dropped carrier collsns
- 5357583 40351 0 0 0 0
- Bridges
- bridge name bridge id STP enabled interfaces
- /proc
- /proc/version = Linux version 2.6.35-gentoo-r8 (root@localhost) (gcc version 4.4.4 (Gentoo 4.4.4-r2 p1.2, pie-0.4.5) ) #10 SMP PREEMPT Fri Oct 29 13:12:35 EEST 2010
- /proc/sys/net/ipv4/ip_forward = 1
- /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
- /proc/sys/net/ipv4/conf/all/proxy_arp = 0
- /proc/sys/net/ipv4/conf/all/arp_filter = 0
- /proc/sys/net/ipv4/conf/all/arp_ignore = 0
- /proc/sys/net/ipv4/conf/all/rp_filter = 0
- /proc/sys/net/ipv4/conf/all/log_martians = 0
- /proc/sys/net/ipv4/conf/default/proxy_arp = 0
- /proc/sys/net/ipv4/conf/default/arp_filter = 0
- /proc/sys/net/ipv4/conf/default/arp_ignore = 0
- /proc/sys/net/ipv4/conf/default/rp_filter = 0
- /proc/sys/net/ipv4/conf/default/log_martians = 1
- /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
- /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
- /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
- /proc/sys/net/ipv4/conf/eth0/rp_filter = 0
- /proc/sys/net/ipv4/conf/eth0/log_martians = 1
- /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
- /proc/sys/net/ipv4/conf/lo/arp_filter = 0
- /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
- /proc/sys/net/ipv4/conf/lo/rp_filter = 0
- /proc/sys/net/ipv4/conf/lo/log_martians = 1
- /proc/sys/net/ipv4/conf/wlan0/proxy_arp = 0
- /proc/sys/net/ipv4/conf/wlan0/arp_filter = 0
- /proc/sys/net/ipv4/conf/wlan0/arp_ignore = 0
- /proc/sys/net/ipv4/conf/wlan0/rp_filter = 0
- /proc/sys/net/ipv4/conf/wlan0/log_martians = 1
- RTNETLINK answers: Operation not supported
- Dump terminated
- Routing Table
- 192.168.1.0/24 dev wlan0 proto kernel scope link src 192.168.1.100 metric 2
- 172.16.0.0/16 dev eth0 proto kernel scope link src 172.16.0.145 metric 1
- 127.0.0.0/8 via 127.0.0.1 dev lo
- default via 192.168.1.1 dev wlan0 proto static
- ARP
- ? (192.168.1.1) at 00:21:00:32:d7:e1 [ether] on wlan0
- Modules
- iptable_mangle 1208 1
- iptable_nat 2979 1
- ipt_MASQUERADE 1458 1
- nf_conntrack_ipv4 8617 15 iptable_nat,nf_nat
- nf_defrag_ipv4 1091 1 nf_conntrack_ipv4
- nf_nat 12597 2 ipt_MASQUERADE,iptable_nat
- Shorewall has detected the following iptables/netfilter capabilities:
- NAT: Available
- Packet Mangling: Available
- Multi-port Match: Available
- Extended Multi-port Match: Available
- Connection Tracking Match: Available
- Extended Connection Tracking Match Support: Available
- Packet Type Match: Not available
- Policy Match: Not available
- Physdev Match: Not available
- Physdev-is-bridged Support: Not available
- Packet length Match: Not available
- IP range Match: Not available
- Recent Match: Not available
- Owner Match: Not available
- Ipset Match: Not available
- CONNMARK Target: Not available
- Connmark Match: Not available
- Raw Table: Not available
- IPP2P Match: Not available
- CLASSIFY Target: Not available
- Extended REJECT: Available
- Repeat match: Not available
- MARK Target: Not available
- Mangle FORWARD Chain: Available
- Comments: Not available
- Address Type Match: Not available
- TCPMSS Match: Not available
- Hashlimit Match: Not available
- NFQUEUE Target: Not available
- Realm Match: Not available
- Helper Match: Not available
- Connlimit Match: Not available
- Time Match: Not available
- Goto Support: Available
- LOGMARK Target: Not available
- IPMARK Target: Not available
- LOG Target: Available
- Persistent SNAT: Available
- TPROXY Target: Not available
- FLOW Classifier: Available
- Active Internet connections (servers and established)
- Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
- tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN 6859/smbd
- tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN 6638/cupsd
- tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN 6859/smbd
- tcp 0 0 192.168.1.100:53158 213.179.58.83:6667 ESTABLISHED 24428/kvirc4
- udp 0 0 172.16.0.145:137 0.0.0.0:* 6864/nmbd
- udp 0 0 192.168.1.100:137 0.0.0.0:* 6864/nmbd
- udp 0 0 0.0.0.0:137 0.0.0.0:* 6864/nmbd
- udp 0 0 172.16.0.145:138 0.0.0.0:* 6864/nmbd
- udp 0 0 192.168.1.100:138 0.0.0.0:* 6864/nmbd
- udp 0 0 0.0.0.0:138 0.0.0.0:* 6864/nmbd
- udp 0 0 0.0.0.0:631 0.0.0.0:* 6638/cupsd
- Traffic Control
- RTNETLINK answers: Operation not supported
- Dump terminated
- RTNETLINK answers: Operation not supported
- Dump terminated
- RTNETLINK answers: Operation not supported
- Dump terminated
- TC Filters
- RTNETLINK answers: Operation not supported
- Dump terminated
- RTNETLINK answers: Operation not supported
- Dump terminated
- RTNETLINK answers: Operation not supported
- Dump terminated
- localhost dem #
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement