[KLUG Members] help with IPtables on ClarkConnect box

Richard Harding rick at ricksweb.info
Tue Jun 8 07:37:39 EDT 2004


I have set up a ClarkConnect firewall box to replace an old SonicWall 
hardware device. The ClarkConnect uses IPTables on a RH platform it seems.

The problem I am having centers on this, I have two Windows Terminal 
Servers on the internal network. One is Win2k that is the current 
production server. The second is Win2k3 and is a test server that one 
off-site office logs into. What I was doing with the Sonicwall was to 
forward based on the source IP address. The site has a static IP and it 
was no problem. It is not an option in the ClarkConnect box, however I 
can add custom rules in the rc.firewall.local script.

Here is how it kinda works:

xxx.xxx.xxx.3 - external facing IP with firewall
|
|
|---------if source IP is xxx.xxx.xxx.xxx forward port 3389 to 
xxx.xxx.xxx.177
|
|---------else forward port 3390 to xxx.xxx.xxx.251

I am attaching the output of iptables-save and iptables -nvL. I have 
tried added a rule like this, but it did not work.
iptables -A FORWARD -s 207.73.170.2 -d xxx.xxx.xxx.177 -i eth0 -o eth1 
-p tcp -m tcp --dport 3389 -j ACCEPT

Thanks for any help you can offer.

Rick


-------------- next part --------------
# Generated by iptables-save v1.2.8 on Tue Jun  8 07:33:49 2004
*mangle
:PREROUTING ACCEPT [111913:51572140]
:INPUT ACCEPT [7152:650933]
:FORWARD ACCEPT [104703:50915507]
:OUTPUT ACCEPT [763:62606]
:POSTROUTING ACCEPT [95874:49868313]
COMMIT
# Completed on Tue Jun  8 07:33:49 2004
# Generated by iptables-save v1.2.8 on Tue Jun  8 07:33:49 2004
*nat
:PREROUTING ACCEPT [17186:1620006]
:POSTROUTING ACCEPT [261:13676]
:OUTPUT ACCEPT [512:14957]
-A PREROUTING -d xxx.xxx.xxx.3 -p tcp -m tcp --dport 22 -j DNAT --to-destination xxx.xxx.xxx.199:22
-A PREROUTING -d xxx.xxx.xxx.3 -p tcp -m tcp --dport 53 -j DNAT --to-destination xxx.xxx.xxx.199:53
-A PREROUTING -d xxx.xxx.xxx.3 -p udp -m udp --dport 53 -j DNAT --to-destination xxx.xxx.xxx.199:53
-A PREROUTING -d xxx.xxx.xxx.3 -p tcp -m tcp --dport 80 -j DNAT --to-destination xxx.xxx.xxx.199:80
-A PREROUTING -d xxx.xxx.xxx.3 -p tcp -m tcp --dport 8080 -j DNAT --to-destination xxx.xxx.xxx.250:8080
-A PREROUTING -d xxx.xxx.xxx.3 -p tcp -m tcp --dport 1494 -j DNAT --to-destination xxx.xxx.xxx.251:1494
-A PREROUTING -d xxx.xxx.xxx.3 -p tcp -m tcp --dport 3389 -j DNAT --to-destination xxx.xxx.xxx.251:3389
-A POSTROUTING -o ipsec0 -j ACCEPT
-A POSTROUTING -s xxx.xxx.xxx.128/255.255.255.128 -d xxx.xxx.xxx.199 -p tcp -m tcp --dport 22 -j SNAT --to-source xxx.xxx.xxx.129
-A POSTROUTING -s xxx.xxx.xxx.128/255.255.255.128 -d xxx.xxx.xxx.199 -p tcp -m tcp --dport 53 -j SNAT --to-source xxx.xxx.xxx.129
-A POSTROUTING -s xxx.xxx.xxx.128/255.255.255.128 -d xxx.xxx.xxx.199 -p udp -m udp --dport 53 -j SNAT --to-source xxx.xxx.xxx.129
-A POSTROUTING -s xxx.xxx.xxx.128/255.255.255.128 -d xxx.xxx.xxx.199 -p tcp -m tcp --dport 80 -j SNAT --to-source xxx.xxx.xxx.129
-A POSTROUTING -s xxx.xxx.xxx.128/255.255.255.128 -d xxx.xxx.xxx.250 -p tcp -m tcp --dport 8080 -j SNAT --to-source xxx.xxx.xxx.129
-A POSTROUTING -s xxx.xxx.xxx.128/255.255.255.128 -d xxx.xxx.xxx.251 -p tcp -m tcp --dport 1494 -j SNAT --to-source xxx.xxx.xxx.129
-A POSTROUTING -s xxx.xxx.xxx.128/255.255.255.128 -d xxx.xxx.xxx.251 -p tcp -m tcp --dport 3389 -j SNAT --to-source xxx.xxx.xxx.129
-A POSTROUTING -o eth0 -j MASQUERADE
COMMIT
# Completed on Tue Jun  8 07:33:49 2004
# Generated by iptables-save v1.2.8 on Tue Jun  8 07:33:49 2004
*filter
:INPUT DROP [0:0]
:FORWARD DROP [3:133]
:OUTPUT DROP [0:0]
:accept-log - [0:0]
:drop-lan - [0:0]
:drop-log - [0:0]
:drop-reserved - [0:0]
-A INPUT -s 207.101.79.184 -i eth0 -j DROP
-A INPUT -s 76.51.188.9 -i eth0 -j DROP
-A INPUT -s 218.224.60.28 -i eth0 -j DROP
-A INPUT -s 153.45.13.38 -i eth0 -j DROP
-A INPUT -i lo -j ACCEPT
-A INPUT -i ! eth0 -j ACCEPT
-A INPUT -s 127.0.0.0/255.0.0.0 -i eth0 -j drop-reserved
-A INPUT -s 2.0.0.0/255.0.0.0 -i eth0 -j drop-reserved
-A INPUT -s 96.0.0.0/224.0.0.0 -i eth0 -j drop-reserved
-A INPUT -s 169.254.0.0/255.255.0.0 -i eth0 -j drop-reserved
-A INPUT -s 223.0.0.0/255.0.0.0 -i eth0 -j drop-reserved
-A INPUT -s 224.0.0.0/240.0.0.0 -i eth0 -j drop-reserved
-A INPUT -s 240.0.0.0/240.0.0.0 -i eth0 -j drop-reserved
-A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A INPUT -d xxx.xxx.xxx.3 -i eth0 -p udp -m udp --sport 67 --dport 68 -j ACCEPT
-A INPUT -d xxx.xxx.xxx.3 -i eth0 -p tcp -m tcp --sport 67 --dport 68 -j ACCEPT
-A INPUT -i eth2 -p udp -m udp --sport 68 --dport 67 -j ACCEPT
-A INPUT -i eth2 -p tcp -m tcp --sport 68 --dport 67 -j ACCEPT
-A INPUT -s 192.168.0.0/255.255.255.0 -i eth2 -p tcp -m tcp --dport 53 -j ACCEPT
-A INPUT -s 192.168.0.0/255.255.255.0 -i eth2 -p udp -m udp --dport 53 -j ACCEPT
-A INPUT -d xxx.xxx.xxx.3 -i eth0 -p tcp -m tcp --dport 1875 -j ACCEPT
-A INPUT -d xxx.xxx.xxx.3 -i eth0 -p 47 -j ACCEPT
-A INPUT -d xxx.xxx.xxx.3 -i eth0 -p tcp -m tcp --dport 1723 -j ACCEPT
-A INPUT -d xxx.xxx.xxx.3 -i eth0 -p udp -m udp --sport 500 --dport 500 -j ACCEPT
-A INPUT -d xxx.xxx.xxx.3 -i eth0 -p esp -j ACCEPT
-A INPUT -d xxx.xxx.xxx.3 -i eth0 -p ah -j ACCEPT
-A INPUT -d xxx.xxx.xxx.3 -i eth0 -p udp -m udp --dport 1024:65535 -j ACCEPT
-A INPUT -d xxx.xxx.xxx.3 -i eth0 -p tcp -m tcp --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth0 -j DROP
-A FORWARD -s 207.101.79.184 -i eth0 -j DROP
-A FORWARD -s 76.51.188.9 -i eth0 -j DROP
-A FORWARD -s 218.224.60.28 -i eth0 -j DROP
-A FORWARD -s 153.45.13.38 -i eth0 -j DROP
-A FORWARD -d xxx.xxx.xxx.199 -i eth0 -o eth1 -p tcp -m tcp --dport 22 -j ACCEPT
-A FORWARD -d xxx.xxx.xxx.199 -i eth0 -o eth1 -p tcp -m tcp --dport 53 -j ACCEPT
-A FORWARD -d xxx.xxx.xxx.199 -i eth0 -o eth1 -p udp -m udp --dport 53 -j ACCEPT
-A FORWARD -d xxx.xxx.xxx.199 -i eth0 -o eth1 -p tcp -m tcp --dport 80 -j ACCEPT
-A FORWARD -d xxx.xxx.xxx.250 -i eth0 -o eth1 -p tcp -m tcp --dport 8080 -j ACCEPT
-A FORWARD -d xxx.xxx.xxx.251 -i eth0 -o eth1 -p tcp -m tcp --dport 1494 -j ACCEPT
-A FORWARD -d xxx.xxx.xxx.251 -i eth0 -o eth1 -p tcp -m tcp --dport 3389 -j ACCEPT
-A FORWARD -o eth0 -p tcp -m tcp --dport 111 -j drop-lan
-A FORWARD -o eth0 -p udp -m udp --dport 111 -j drop-lan
-A FORWARD -o eth0 -p tcp -m tcp --dport 137:139 -j drop-lan
-A FORWARD -o eth0 -p udp -m udp --dport 137:139 -j drop-lan
-A FORWARD -o eth0 -p tcp -m tcp --dport 635 -j drop-lan
-A FORWARD -o eth0 -p udp -m udp --dport 635 -j drop-lan
-A FORWARD -s 192.168.0.0/255.255.255.0 -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A FORWARD -d 192.168.0.0/255.255.255.0 -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A FORWARD -s 192.168.0.0/255.255.255.0 -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A FORWARD -d 192.168.0.0/255.255.255.0 -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A FORWARD -s 192.168.0.0/255.255.255.0 -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A FORWARD -d 192.168.0.0/255.255.255.0 -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A FORWARD -s 192.168.0.0/255.255.255.0 -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A FORWARD -d 192.168.0.0/255.255.255.0 -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A FORWARD -s 192.168.0.0/255.255.255.0 -d xxx.xxx.xxx.128/255.255.255.128 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -s 192.168.0.0/255.255.255.0 -d xxx.xxx.xxx.128/255.255.255.128 -j DROP
-A FORWARD -s xxx.xxx.xxx.128/255.255.255.128 -d 192.168.0.0/255.255.255.0 -j ACCEPT
-A FORWARD -i ! eth0 -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -m limit --limit 3/min --limit-burst 3 -j LOG --log-prefix "Stray FORWARD packet: " --log-level debug
-A FORWARD -j DROP
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o ! eth0 -j ACCEPT
-A OUTPUT -p icmp -j ACCEPT
-A OUTPUT -s xxx.xxx.xxx.3 -o eth0 -p tcp -m tcp --sport 68 --dport 67 -j ACCEPT
-A OUTPUT -s xxx.xxx.xxx.3 -o eth0 -p udp -m udp --sport 68 --dport 67 -j ACCEPT
-A OUTPUT -o eth2 -p tcp -m tcp --sport 67 --dport 68 -j ACCEPT
-A OUTPUT -o eth2 -p udp -m udp --sport 67 --dport 68 -j ACCEPT
-A OUTPUT -d 192.168.0.0/255.255.255.0 -o eth2 -p tcp -m tcp --sport 53 -j ACCEPT
-A OUTPUT -d 192.168.0.0/255.255.255.0 -o eth2 -p udp -m udp --sport 53 -j ACCEPT
-A OUTPUT -s xxx.xxx.xxx.3 -o eth0 -p tcp -m tcp --sport 1875 -j ACCEPT
-A OUTPUT -s xxx.xxx.xxx.3 -o eth0 -p 47 -j ACCEPT
-A OUTPUT -s xxx.xxx.xxx.3 -o eth0 -p tcp -m tcp --sport 1723 -j ACCEPT
-A OUTPUT -s xxx.xxx.xxx.3 -o eth0 -p udp -m udp --sport 500 --dport 500 -j ACCEPT
-A OUTPUT -s xxx.xxx.xxx.3 -o eth0 -p esp -j ACCEPT
-A OUTPUT -s xxx.xxx.xxx.3 -o eth0 -p ah -j ACCEPT
-A OUTPUT -s xxx.xxx.xxx.3 -o eth0 -p tcp -m tcp --sport 1024:65535 -j ACCEPT
-A OUTPUT -s xxx.xxx.xxx.3 -o eth0 -p udp -m udp --sport 1024:65535 -j ACCEPT
-A OUTPUT -o eth0 -j DROP
-A accept-log -j LOG --log-prefix "Accept with log: "
-A accept-log -j ACCEPT
-A drop-lan -j DROP
-A drop-log -j LOG --log-prefix "Drop with log: "
-A drop-log -j DROP
-A drop-reserved -j DROP
COMMIT
-------------- next part --------------
Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  eth0   *       207.101.79.184       0.0.0.0/0
    0     0 DROP       all  --  eth0   *       76.51.188.9          0.0.0.0/0
    0     0 DROP       all  --  eth0   *       218.224.60.28        0.0.0.0/0
    0     0 DROP       all  --  eth0   *       153.45.13.38         0.0.0.0/0
   60  3744 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
 2250  374K ACCEPT     all  --  !eth0  *       0.0.0.0/0            0.0.0.0/0
    0     0 drop-reserved  all  --  eth0   *       127.0.0.0/8          0.0.0.0/0
    0     0 drop-reserved  all  --  eth0   *       2.0.0.0/8            0.0.0.0/0
    0     0 drop-reserved  all  --  eth0   *       96.0.0.0/3           0.0.0.0/0
    0     0 drop-reserved  all  --  eth0   *       169.254.0.0/16       0.0.0.0/0
    0     0 drop-reserved  all  --  eth0   *       223.0.0.0/8          0.0.0.0/0
    0     0 drop-reserved  all  --  eth0   *       224.0.0.0/4          0.0.0.0/0
    0     0 drop-reserved  all  --  eth0   *       240.0.0.0/4          0.0.0.0/0
  495 13860 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0          icmp type 0
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0          icmp type 3
    1    56 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0          icmp type 11
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0          icmp type 8
    0     0 ACCEPT     udp  --  eth0   *       0.0.0.0/0            xxx.xxx.xxx.3       udp spt:67 dpt:68
    0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            xxx.xxx.xxx.3       tcp spt:67 dpt:68
    0     0 ACCEPT     udp  --  eth2   *       0.0.0.0/0            0.0.0.0/0          udp spt:68 dpt:67
    0     0 ACCEPT     tcp  --  eth2   *       0.0.0.0/0            0.0.0.0/0          tcp spt:68 dpt:67
    0     0 ACCEPT     tcp  --  eth2   *       192.168.0.0/24       0.0.0.0/0          tcp dpt:53
    0     0 ACCEPT     udp  --  eth2   *       192.168.0.0/24       0.0.0.0/0          udp dpt:53
    0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            xxx.xxx.xxx.3       tcp dpt:1875
   20  1622 ACCEPT     47   --  eth0   *       0.0.0.0/0            xxx.xxx.xxx.3
    8   392 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            xxx.xxx.xxx.3       tcp dpt:1723
    0     0 ACCEPT     udp  --  eth0   *       0.0.0.0/0            xxx.xxx.xxx.3       udp spt:500 dpt:500
    0     0 ACCEPT     esp  --  eth0   *       0.0.0.0/0            xxx.xxx.xxx.3
    0     0 ACCEPT     ah   --  eth0   *       0.0.0.0/0            xxx.xxx.xxx.3
   16  3321 ACCEPT     udp  --  eth0   *       0.0.0.0/0            xxx.xxx.xxx.3       udp dpts:1024:65535
   69 31546 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            xxx.xxx.xxx.3       tcp dpts:1024:65535 state RELATED,ESTABLISHED
 4426  241K DROP       all  --  eth0   *       0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy DROP 3 packets, 133 bytes)
 pkts bytes target     prot opt in     out     source               destination
    3   144 DROP       all  --  eth0   *       207.101.79.184       0.0.0.0/0
    0     0 DROP       all  --  eth0   *       76.51.188.9          0.0.0.0/0
    1    52 DROP       all  --  eth0   *       218.224.60.28        0.0.0.0/0
    0     0 DROP       all  --  eth0   *       153.45.13.38         0.0.0.0/0
    0     0 ACCEPT     tcp  --  eth0   eth1    0.0.0.0/0            xxx.xxx.xxx.199     tcp dpt:22
    0     0 ACCEPT     tcp  --  eth0   eth1    0.0.0.0/0            xxx.xxx.xxx.199     tcp dpt:53
  302 72616 ACCEPT     udp  --  eth0   eth1    0.0.0.0/0            xxx.xxx.xxx.199     udp dpt:53
 3785  325K ACCEPT     tcp  --  eth0   eth1    0.0.0.0/0            xxx.xxx.xxx.199     tcp dpt:80
 2225  492K ACCEPT     tcp  --  eth0   eth1    0.0.0.0/0            xxx.xxx.xxx.250     tcp dpt:8080
    0     0 ACCEPT     tcp  --  eth0   eth1    0.0.0.0/0            xxx.xxx.xxx.251     tcp dpt:1494
12379 1192K ACCEPT     tcp  --  eth0   eth1    0.0.0.0/0            xxx.xxx.xxx.251     tcp dpt:3389
    0     0 drop-lan   tcp  --  *      eth0    0.0.0.0/0            0.0.0.0/0          tcp dpt:111
    0     0 drop-lan   udp  --  *      eth0    0.0.0.0/0            0.0.0.0/0          udp dpt:111
    0     0 drop-lan   tcp  --  *      eth0    0.0.0.0/0            0.0.0.0/0          tcp dpts:137:139
    0     0 drop-lan   udp  --  *      eth0    0.0.0.0/0            0.0.0.0/0          udp dpts:137:139
    0     0 drop-lan   tcp  --  *      eth0    0.0.0.0/0            0.0.0.0/0          tcp dpt:635
    0     0 drop-lan   udp  --  *      eth0    0.0.0.0/0            0.0.0.0/0          udp dpt:635
    0     0 ACCEPT     icmp --  *      *       192.168.0.0/24       0.0.0.0/0          icmp type 0
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            192.168.0.0/24     icmp type 0
    0     0 ACCEPT     icmp --  *      *       192.168.0.0/24       0.0.0.0/0          icmp type 3
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            192.168.0.0/24     icmp type 3
    0     0 ACCEPT     icmp --  *      *       192.168.0.0/24       0.0.0.0/0          icmp type 11
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            192.168.0.0/24     icmp type 11
    0     0 ACCEPT     icmp --  *      *       192.168.0.0/24       0.0.0.0/0          icmp type 8
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            192.168.0.0/24     icmp type 8
    0     0 ACCEPT     all  --  *      *       192.168.0.0/24       xxx.xxx.xxx.128/25  state RELATED,ESTABLISHED
    0     0 DROP       all  --  *      *       192.168.0.0/24       xxx.xxx.xxx.128/25
    0     0 ACCEPT     all  --  *      *       xxx.xxx.xxx.128/25    192.168.0.0/24
44143   13M ACCEPT     all  --  !eth0  *       0.0.0.0/0            0.0.0.0/0
32764   35M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0          state RELATED,ESTABLISHED
 1404  197K LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0          limit: avg 3/min burst 3 LOG flags 0 level 7 prefix `Stray FORWARD packet: '
 9618 1119K DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
   60  3744 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0
  185 38221 ACCEPT     all  --  *      !eth0   0.0.0.0/0            0.0.0.0/0
  507 17188 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     tcp  --  *      eth0    xxx.xxx.xxx.3         0.0.0.0/0          tcp spt:68 dpt:67
    0     0 ACCEPT     udp  --  *      eth0    xxx.xxx.xxx.3         0.0.0.0/0          udp spt:68 dpt:67
    0     0 ACCEPT     tcp  --  *      eth2    0.0.0.0/0            0.0.0.0/0          tcp spt:67 dpt:68
    0     0 ACCEPT     udp  --  *      eth2    0.0.0.0/0            0.0.0.0/0          udp spt:67 dpt:68
    0     0 ACCEPT     tcp  --  *      eth2    0.0.0.0/0            192.168.0.0/24     tcp spt:53
    0     0 ACCEPT     udp  --  *      eth2    0.0.0.0/0            192.168.0.0/24     udp spt:53
    0     0 ACCEPT     tcp  --  *      eth0    xxx.xxx.xxx.3         0.0.0.0/0          tcp spt:1875
   21 13389 ACCEPT     47   --  *      eth0    xxx.xxx.xxx.3         0.0.0.0/0
    7   464 ACCEPT     tcp  --  *      eth0    xxx.xxx.xxx.3         0.0.0.0/0          tcp spt:1723
    0     0 ACCEPT     udp  --  *      eth0    xxx.xxx.xxx.3         0.0.0.0/0          udp spt:500 dpt:500
    0     0 ACCEPT     esp  --  *      eth0    xxx.xxx.xxx.3         0.0.0.0/0
    0     0 ACCEPT     ah   --  *      eth0    xxx.xxx.xxx.3         0.0.0.0/0
   62  7680 ACCEPT     tcp  --  *      eth0    xxx.xxx.xxx.3         0.0.0.0/0          tcp spts:1024:65535
    4   304 ACCEPT     udp  --  *      eth0    xxx.xxx.xxx.3         0.0.0.0/0          udp spts:1024:65535
    0     0 DROP       all  --  *      eth0    0.0.0.0/0            0.0.0.0/0

Chain accept-log (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0          LOG flags 0 level 4 prefix `Accept with log: '
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain drop-lan (6 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain drop-log (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0          LOG flags 0 level 4 prefix `Drop with log: '
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain drop-reserved (7 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0


More information about the Members mailing list