Advertisement
Guest User

Untitled

a guest
Jun 26th, 2017
100
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 26.71 KB | None | 0 0
  1. localhost dem # shorewall dump
  2.  
  3. Shorewall 4.4.10 Dump at localhost - Thu Nov 11 17:10:52 EET 2010
  4.  
  5. Counters reset Thu Nov 11 17:10:18 EET 2010
  6.  
  7. Chain INPUT (policy DROP 0 packets, 0 bytes)
  8. pkts bytes target prot opt in out source destination
  9. 4 384 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW
  10. 1 111 net2fw all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
  11. 4 384 loc2fw all -- eth0 * 0.0.0.0/0 0.0.0.0/0
  12. 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
  13. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  14. 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
  15. 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
  16. 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
  17.  
  18. Chain FORWARD (policy DROP 0 packets, 0 bytes)
  19. pkts bytes target prot opt in out source destination
  20. 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW
  21. 0 0 net2loc all -- wlan0 eth0 0.0.0.0/0 0.0.0.0/0
  22. 0 0 loc2net all -- eth0 wlan0 0.0.0.0/0 0.0.0.0/0
  23. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  24. 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
  25. 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
  26. 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
  27.  
  28. Chain OUTPUT (policy DROP 0 packets, 0 bytes)
  29. pkts bytes target prot opt in out source destination
  30. 2 141 fw2net all -- * wlan0 0.0.0.0/0 0.0.0.0/0
  31. 0 0 fw2loc all -- * eth0 0.0.0.0/0 0.0.0.0/0
  32. 0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
  33. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  34. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
  35.  
  36. Chain Drop (0 references)
  37. pkts bytes target prot opt in out source destination
  38. 0 0 all -- * * 0.0.0.0/0 0.0.0.0/0
  39. 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113
  40. 0 0 dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0
  41. 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 4
  42. 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 11
  43. 0 0 dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0
  44. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,445
  45. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139
  46. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpts:1024:65535
  47. 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,139,445
  48. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900
  49. 0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
  50. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53
  51.  
  52. Chain Reject (5 references)
  53. pkts bytes target prot opt in out source destination
  54. 4 384 all -- * * 0.0.0.0/0 0.0.0.0/0
  55. 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113
  56. 4 384 dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0
  57. 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 4
  58. 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 11
  59. 0 0 dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0
  60. 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,445
  61. 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139
  62. 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpts:1024:65535
  63. 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,139,445
  64. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900
  65. 0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
  66. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53
  67.  
  68. Chain dropBcast (2 references)
  69. pkts bytes target prot opt in out source destination
  70. 4 384 DROP all -- * * 0.0.0.0/0 172.16.255.255
  71. 0 0 DROP all -- * * 0.0.0.0/0 192.168.1.255
  72. 0 0 DROP all -- * * 0.0.0.0/0 255.255.255.255
  73. 0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4
  74.  
  75. Chain dropInvalid (2 references)
  76. pkts bytes target prot opt in out source destination
  77. 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
  78.  
  79. Chain dropNotSyn (2 references)
  80. pkts bytes target prot opt in out source destination
  81. 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x17/0x02
  82.  
  83. Chain dynamic (2 references)
  84. pkts bytes target prot opt in out source destination
  85.  
  86. Chain fw2loc (1 references)
  87. pkts bytes target prot opt in out source destination
  88. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  89. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
  90.  
  91. Chain fw2net (1 references)
  92. pkts bytes target prot opt in out source destination
  93. 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:67:68
  94. 2 141 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  95. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
  96.  
  97. Chain loc2fw (1 references)
  98. pkts bytes target prot opt in out source destination
  99. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  100. 4 384 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
  101. 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:loc2fw:REJECT:'
  102. 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
  103.  
  104. Chain loc2net (1 references)
  105. pkts bytes target prot opt in out source destination
  106. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  107. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
  108.  
  109. Chain logdrop (0 references)
  110. pkts bytes target prot opt in out source destination
  111. 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
  112.  
  113. Chain logreject (0 references)
  114. pkts bytes target prot opt in out source destination
  115. 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
  116.  
  117. Chain net2fw (1 references)
  118. pkts bytes target prot opt in out source destination
  119. 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:67:68
  120. 1 111 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  121. 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
  122. 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2fw:REJECT:'
  123. 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
  124.  
  125. Chain net2loc (1 references)
  126. pkts bytes target prot opt in out source destination
  127. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  128. 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
  129. 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2loc:REJECT:'
  130. 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
  131.  
  132. Chain reject (12 references)
  133. pkts bytes target prot opt in out source destination
  134. 0 0 DROP all -- * * 0.0.0.0/0 172.16.255.255
  135. 0 0 DROP all -- * * 0.0.0.0/0 192.168.1.255
  136. 0 0 DROP all -- * * 0.0.0.0/0 255.255.255.255
  137. 0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0
  138. 0 0 DROP 2 -- * * 0.0.0.0/0 0.0.0.0/0
  139. 0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset
  140. 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
  141. 0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-unreachable
  142. 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
  143.  
  144. Chain shorewall (0 references)
  145. pkts bytes target prot opt in out source destination
  146.  
  147. Log (/var/log/messages)
  148.  
  149. Nov 11 13:37:12 OUTPUT:REJECT:IN= OUT=eth0 SRC=172.16.0.3 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=17388 DF PROTO=TCP SPT=49140 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  150. Nov 11 13:37:12 OUTPUT:REJECT:IN= OUT=eth0 SRC=172.16.0.3 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=58966 DF PROTO=TCP SPT=49141 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  151. Nov 11 13:37:12 OUTPUT:REJECT:IN= OUT=eth0 SRC=172.16.0.3 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=39544 DF PROTO=TCP SPT=49142 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  152. Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=16264 DF PROTO=TCP SPT=58096 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  153. Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=59986 DF PROTO=TCP SPT=58097 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  154. Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=209.85.229.101 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=4801 DF PROTO=TCP SPT=55550 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  155. Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=209.85.229.100 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=21338 DF PROTO=TCP SPT=37745 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  156. Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=209.85.229.102 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=41802 DF PROTO=TCP SPT=55590 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  157. Nov 11 13:37:32 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=20034 DF PROTO=TCP SPT=58101 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  158. Nov 11 13:37:32 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=27782 DF PROTO=TCP SPT=58102 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  159. Nov 11 13:37:32 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=46900 DF PROTO=TCP SPT=58103 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  160. Nov 11 13:37:33 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=64675 DF PROTO=TCP SPT=58104 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  161. Nov 11 13:37:33 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=16001 DF PROTO=TCP SPT=58105 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  162. Nov 11 13:37:49 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=53780 DF PROTO=TCP SPT=58106 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  163. Nov 11 13:37:49 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=34355 DF PROTO=TCP SPT=58107 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  164. Nov 11 13:37:50 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=21129 DF PROTO=TCP SPT=58108 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  165. Nov 11 13:37:50 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=60942 DF PROTO=TCP SPT=58109 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  166. Nov 11 13:38:01 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=53233 DF PROTO=TCP SPT=58110 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  167. Nov 11 13:38:01 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=58673 DF PROTO=TCP SPT=58111 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  168. Nov 11 16:41:23 net2fw:REJECT:IN=wlan0 OUT= SRC=192.168.1.1 DST=192.168.1.100 LEN=408 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=1031 DPT=49796 LEN=388
  169.  
  170. NAT Table
  171.  
  172. Chain PREROUTING (policy ACCEPT 4 packets, 384 bytes)
  173. pkts bytes target prot opt in out source destination
  174.  
  175. Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
  176. pkts bytes target prot opt in out source destination
  177.  
  178. Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
  179. pkts bytes target prot opt in out source destination
  180. 0 0 wlan0_masq all -- * wlan0 0.0.0.0/0 0.0.0.0/0
  181.  
  182. Chain wlan0_masq (1 references)
  183. pkts bytes target prot opt in out source destination
  184. 0 0 MASQUERADE all -- * * 172.16.0.0/16 0.0.0.0/0
  185.  
  186. Mangle Table
  187.  
  188. Chain PREROUTING (policy ACCEPT 5 packets, 495 bytes)
  189. pkts bytes target prot opt in out source destination
  190. 5 495 tcpre all -- * * 0.0.0.0/0 0.0.0.0/0
  191.  
  192. Chain INPUT (policy ACCEPT 5 packets, 495 bytes)
  193. pkts bytes target prot opt in out source destination
  194.  
  195. Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
  196. pkts bytes target prot opt in out source destination
  197. 0 0 tcfor all -- * * 0.0.0.0/0 0.0.0.0/0
  198.  
  199. Chain OUTPUT (policy ACCEPT 2 packets, 141 bytes)
  200. pkts bytes target prot opt in out source destination
  201. 2 141 tcout all -- * * 0.0.0.0/0 0.0.0.0/0
  202.  
  203. Chain POSTROUTING (policy ACCEPT 2 packets, 141 bytes)
  204. pkts bytes target prot opt in out source destination
  205. 2 141 tcpost all -- * * 0.0.0.0/0 0.0.0.0/0
  206.  
  207. Chain tcfor (1 references)
  208. pkts bytes target prot opt in out source destination
  209.  
  210. Chain tcout (1 references)
  211. pkts bytes target prot opt in out source destination
  212.  
  213. Chain tcpost (1 references)
  214. pkts bytes target prot opt in out source destination
  215.  
  216. Chain tcpre (1 references)
  217. pkts bytes target prot opt in out source destination
  218.  
  219. Conntrack Table (21 out of 65536)
  220.  
  221. tcp 6 424195 ESTABLISHED src=172.16.0.120 dst=66.249.92.104 sport=37702 dport=80 src=66.249.92.104 dst=172.16.0.120 sport=80 dport=37702 [ASSURED] use=2
  222. tcp 6 424486 ESTABLISHED src=172.16.0.120 dst=92.123.73.59 sport=39157 dport=80 src=92.123.73.59 dst=172.16.0.120 sport=80 dport=39157 [ASSURED] use=2
  223. tcp 6 424484 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51970 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51970 [ASSURED] use=2
  224. tcp 6 424439 ESTABLISHED src=172.16.0.120 dst=209.85.227.16 sport=59831 dport=993 src=209.85.227.16 dst=172.16.0.120 sport=993 dport=59831 [ASSURED] use=2
  225. tcp 6 424484 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51969 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51969 [ASSURED] use=2
  226. tcp 6 424468 ESTABLISHED src=172.16.0.120 dst=209.85.229.100 sport=37198 dport=80 src=209.85.229.100 dst=172.16.0.120 sport=80 dport=37198 [ASSURED] use=2
  227. tcp 6 424484 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51967 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51967 [ASSURED] use=2
  228. tcp 6 424484 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51973 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51973 [ASSURED] use=2
  229. tcp 6 424492 ESTABLISHED src=172.16.0.120 dst=92.123.73.50 sport=33341 dport=80 src=92.123.73.50 dst=172.16.0.120 sport=80 dport=33341 [ASSURED] use=2
  230. tcp 6 424601 ESTABLISHED src=172.16.0.120 dst=209.85.227.16 sport=48942 dport=993 src=209.85.227.16 dst=172.16.0.120 sport=993 dport=48942 [ASSURED] use=2
  231. tcp 6 424468 ESTABLISHED src=172.16.0.120 dst=209.85.229.100 sport=37200 dport=80 src=209.85.229.100 dst=172.16.0.120 sport=80 dport=37200 [ASSURED] use=2
  232. tcp 6 424493 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51968 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51968 [ASSURED] use=2
  233. tcp 6 424467 ESTABLISHED src=172.16.0.120 dst=209.85.229.100 sport=37199 dport=80 src=209.85.229.100 dst=172.16.0.120 sport=80 dport=37199 [ASSURED] use=2
  234. tcp 6 424484 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51965 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51965 [ASSURED] use=2
  235. tcp 6 424375 ESTABLISHED src=172.16.0.120 dst=209.85.227.16 sport=59816 dport=993 src=209.85.227.16 dst=172.16.0.120 sport=993 dport=59816 [ASSURED] use=2
  236. tcp 6 424469 ESTABLISHED src=172.16.0.120 dst=209.85.229.102 sport=51203 dport=80 src=209.85.229.102 dst=172.16.0.120 sport=80 dport=51203 [ASSURED] use=2
  237. tcp 6 424484 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51966 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51966 [ASSURED] use=2
  238. tcp 6 431984 ESTABLISHED src=192.168.1.100 dst=213.179.58.83 sport=53158 dport=6667 src=213.179.58.83 dst=192.168.1.100 sport=6667 dport=53158 [ASSURED] use=2
  239. tcp 6 424473 ESTABLISHED src=172.16.0.120 dst=66.249.92.104 sport=37703 dport=80 src=66.249.92.104 dst=172.16.0.120 sport=80 dport=37703 [ASSURED] use=2
  240. tcp 6 424383 ESTABLISHED src=172.16.0.120 dst=209.85.227.16 sport=59818 dport=993 src=209.85.227.16 dst=172.16.0.120 sport=993 dport=59818 [ASSURED] use=2
  241. tcp 6 424490 ESTABLISHED src=172.16.0.120 dst=92.123.73.50 sport=33340 dport=80 src=92.123.73.50 dst=172.16.0.120 sport=80 dport=33340 [ASSURED] use=2
  242.  
  243. IP Configuration
  244.  
  245. 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
  246. inet 127.0.0.1/8 scope host lo
  247. 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
  248. inet 172.16.0.145/16 brd 172.16.255.255 scope global eth0
  249. 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
  250. inet 192.168.1.100/24 brd 192.168.1.255 scope global wlan0
  251.  
  252. IP Stats
  253.  
  254. 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
  255. link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
  256. RX: bytes packets errors dropped overrun mcast
  257. 19726 279 0 0 0 0
  258. TX: bytes packets errors dropped carrier collsns
  259. 19726 279 0 0 0 0
  260. 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
  261. link/ether 00:1d:72:f1:d4:e0 brd ff:ff:ff:ff:ff:ff
  262. RX: bytes packets errors dropped overrun mcast
  263. 3080433 11494 0 0 0 0
  264. TX: bytes packets errors dropped carrier collsns
  265. 1290107 11663 0 0 0 0
  266. 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
  267. link/ether 00:21:6b:11:16:f2 brd ff:ff:ff:ff:ff:ff
  268. RX: bytes packets errors dropped overrun mcast
  269. 46753244 50779 0 0 0 0
  270. TX: bytes packets errors dropped carrier collsns
  271. 5357583 40351 0 0 0 0
  272.  
  273. Bridges
  274.  
  275. bridge name bridge id STP enabled interfaces
  276.  
  277. /proc
  278.  
  279. /proc/version = Linux version 2.6.35-gentoo-r8 (root@localhost) (gcc version 4.4.4 (Gentoo 4.4.4-r2 p1.2, pie-0.4.5) ) #10 SMP PREEMPT Fri Oct 29 13:12:35 EEST 2010
  280. /proc/sys/net/ipv4/ip_forward = 1
  281. /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
  282. /proc/sys/net/ipv4/conf/all/proxy_arp = 0
  283. /proc/sys/net/ipv4/conf/all/arp_filter = 0
  284. /proc/sys/net/ipv4/conf/all/arp_ignore = 0
  285. /proc/sys/net/ipv4/conf/all/rp_filter = 0
  286. /proc/sys/net/ipv4/conf/all/log_martians = 0
  287. /proc/sys/net/ipv4/conf/default/proxy_arp = 0
  288. /proc/sys/net/ipv4/conf/default/arp_filter = 0
  289. /proc/sys/net/ipv4/conf/default/arp_ignore = 0
  290. /proc/sys/net/ipv4/conf/default/rp_filter = 0
  291. /proc/sys/net/ipv4/conf/default/log_martians = 1
  292. /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
  293. /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
  294. /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
  295. /proc/sys/net/ipv4/conf/eth0/rp_filter = 0
  296. /proc/sys/net/ipv4/conf/eth0/log_martians = 1
  297. /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
  298. /proc/sys/net/ipv4/conf/lo/arp_filter = 0
  299. /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
  300. /proc/sys/net/ipv4/conf/lo/rp_filter = 0
  301. /proc/sys/net/ipv4/conf/lo/log_martians = 1
  302. /proc/sys/net/ipv4/conf/wlan0/proxy_arp = 0
  303. /proc/sys/net/ipv4/conf/wlan0/arp_filter = 0
  304. /proc/sys/net/ipv4/conf/wlan0/arp_ignore = 0
  305. /proc/sys/net/ipv4/conf/wlan0/rp_filter = 0
  306. /proc/sys/net/ipv4/conf/wlan0/log_martians = 1
  307. RTNETLINK answers: Operation not supported
  308. Dump terminated
  309.  
  310. Routing Table
  311.  
  312. 192.168.1.0/24 dev wlan0 proto kernel scope link src 192.168.1.100 metric 2
  313. 172.16.0.0/16 dev eth0 proto kernel scope link src 172.16.0.145 metric 1
  314. 127.0.0.0/8 via 127.0.0.1 dev lo
  315. default via 192.168.1.1 dev wlan0 proto static
  316.  
  317. ARP
  318.  
  319. ? (192.168.1.1) at 00:21:00:32:d7:e1 [ether] on wlan0
  320.  
  321. Modules
  322.  
  323. iptable_mangle 1208 1
  324. iptable_nat 2979 1
  325. ipt_MASQUERADE 1458 1
  326. nf_conntrack_ipv4 8617 15 iptable_nat,nf_nat
  327. nf_defrag_ipv4 1091 1 nf_conntrack_ipv4
  328. nf_nat 12597 2 ipt_MASQUERADE,iptable_nat
  329.  
  330. Shorewall has detected the following iptables/netfilter capabilities:
  331. NAT: Available
  332. Packet Mangling: Available
  333. Multi-port Match: Available
  334. Extended Multi-port Match: Available
  335. Connection Tracking Match: Available
  336. Extended Connection Tracking Match Support: Available
  337. Packet Type Match: Not available
  338. Policy Match: Not available
  339. Physdev Match: Not available
  340. Physdev-is-bridged Support: Not available
  341. Packet length Match: Not available
  342. IP range Match: Not available
  343. Recent Match: Not available
  344. Owner Match: Not available
  345. Ipset Match: Not available
  346. CONNMARK Target: Not available
  347. Connmark Match: Not available
  348. Raw Table: Not available
  349. IPP2P Match: Not available
  350. CLASSIFY Target: Not available
  351. Extended REJECT: Available
  352. Repeat match: Not available
  353. MARK Target: Not available
  354. Mangle FORWARD Chain: Available
  355. Comments: Not available
  356. Address Type Match: Not available
  357. TCPMSS Match: Not available
  358. Hashlimit Match: Not available
  359. NFQUEUE Target: Not available
  360. Realm Match: Not available
  361. Helper Match: Not available
  362. Connlimit Match: Not available
  363. Time Match: Not available
  364. Goto Support: Available
  365. LOGMARK Target: Not available
  366. IPMARK Target: Not available
  367. LOG Target: Available
  368. Persistent SNAT: Available
  369. TPROXY Target: Not available
  370. FLOW Classifier: Available
  371.  
  372. Active Internet connections (servers and established)
  373. Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
  374. tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN 6859/smbd
  375. tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN 6638/cupsd
  376. tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN 6859/smbd
  377. tcp 0 0 192.168.1.100:53158 213.179.58.83:6667 ESTABLISHED 24428/kvirc4
  378. udp 0 0 172.16.0.145:137 0.0.0.0:* 6864/nmbd
  379. udp 0 0 192.168.1.100:137 0.0.0.0:* 6864/nmbd
  380. udp 0 0 0.0.0.0:137 0.0.0.0:* 6864/nmbd
  381. udp 0 0 172.16.0.145:138 0.0.0.0:* 6864/nmbd
  382. udp 0 0 192.168.1.100:138 0.0.0.0:* 6864/nmbd
  383. udp 0 0 0.0.0.0:138 0.0.0.0:* 6864/nmbd
  384. udp 0 0 0.0.0.0:631 0.0.0.0:* 6638/cupsd
  385.  
  386. Traffic Control
  387.  
  388. RTNETLINK answers: Operation not supported
  389. Dump terminated
  390. RTNETLINK answers: Operation not supported
  391. Dump terminated
  392. RTNETLINK answers: Operation not supported
  393. Dump terminated
  394.  
  395. TC Filters
  396.  
  397. RTNETLINK answers: Operation not supported
  398. Dump terminated
  399. RTNETLINK answers: Operation not supported
  400. Dump terminated
  401. RTNETLINK answers: Operation not supported
  402. Dump terminated
  403. localhost dem #
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement