<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: shorewall &amp;amp; ipsec in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750385#M22197</link>
    <description># iptables -Ln&lt;BR /&gt;&lt;BR /&gt;iptables: Table does not exist (do you need to insmod?)</description>
    <pubDate>Sun, 19 Mar 2006 08:45:44 GMT</pubDate>
    <dc:creator>'chris'</dc:creator>
    <dc:date>2006-03-19T08:45:44Z</dc:date>
    <item>
      <title>shorewall &amp; ipsec</title>
      <link>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750379#M22191</link>
      <description>hi&lt;BR /&gt;&lt;BR /&gt;short information:&lt;BR /&gt;[1] local&lt;BR /&gt;[2] remote&lt;BR /&gt;&lt;BR /&gt;local network:&lt;BR /&gt;192.168.115.0/24&lt;BR /&gt;&lt;BR /&gt;remote firewall&lt;BR /&gt;201.X.X.2&lt;BR /&gt;&lt;BR /&gt;remote network:&lt;BR /&gt;192.168.0.0/24&lt;BR /&gt;192.168.2.0/24&lt;BR /&gt;192.168.1.0/24&lt;BR /&gt;&lt;BR /&gt;shorewall firewall is running on debian sarge ipsec gateway [1]  &lt;BR /&gt;gateway has 3 ipsec tunnels with the remote firewall [2]&lt;BR /&gt;&lt;BR /&gt;shorewall is active&lt;BR /&gt;ipsec tunnels are working !&lt;BR /&gt;&lt;BR /&gt;from the local network over ipsec gateway [1] &lt;BR /&gt;I can reach all ports (ping,smb etc.) from the remote site.&lt;BR /&gt;but from the remote site everything is blocked !&lt;BR /&gt;I cannot ping, smb etc.&lt;BR /&gt;&lt;BR /&gt;my shorewall configuration:&lt;BR /&gt;&lt;BR /&gt;zones:&lt;BR /&gt;net Net Internet&lt;BR /&gt;loc Local Private net&lt;BR /&gt;vpn1   A   VPN 192.168.0.0/24&lt;BR /&gt;vpn2   B   VPN 192.168.2.0/24&lt;BR /&gt;vpn3   C   VPN 192.168.1.0/24&lt;BR /&gt;&lt;BR /&gt;hosts:&lt;BR /&gt;vpn1          eth0:192.168.0.0/24&lt;BR /&gt;vpn2          eth0:192.168.2.0/24&lt;BR /&gt;vpn3          eth0:192.168.1.0/24&lt;BR /&gt;&lt;BR /&gt;interfaces:&lt;BR /&gt;net   eth0   detect   norfc1918,routefilter,blacklist,tcpflags,nosmurfs,logmartians&lt;BR /&gt;loc   eth1   detect   routeback&lt;BR /&gt;&lt;BR /&gt;masq:&lt;BR /&gt;eth0   eth1 &lt;BR /&gt;eth0:!192.168.0.0/24   192.168.115.0/24&lt;BR /&gt;eth0:!192.168.2.0/24   192.168.115.0/24&lt;BR /&gt;eth0:!192.168.1.0/24   192.168.115.0/24&lt;BR /&gt;&lt;BR /&gt;policy:&lt;BR /&gt;loc all ACCEPT&lt;BR /&gt;fw net ACCEPT&lt;BR /&gt;fw loc ACCEPT&lt;BR /&gt;net all DROP info&lt;BR /&gt;# The FOLLOWING POLICY MUST BE LAST&lt;BR /&gt;all all REJECT info&lt;BR /&gt;loc           vpn1        ACCEPT&lt;BR /&gt;vpn1          loc         ACCEPT&lt;BR /&gt;loc           vpn2        ACCEPT&lt;BR /&gt;vpn2          loc         ACCEPT&lt;BR /&gt;loc           vpn3        ACCEPT&lt;BR /&gt;vpn3          loc         ACCEPT&lt;BR /&gt;&lt;BR /&gt;roules:&lt;BR /&gt;ACCEPT   net   $FW   tcp   ssh,www,https,ftp&lt;BR /&gt;ACCEPT net fw udp https,domain&lt;BR /&gt;ACCEPT fw net udp domain&lt;BR /&gt;ACCEPT   net:201.X.X.2   $FW   tcp&lt;BR /&gt;ACCEPT   net:201.X.X.2   $FW   udp&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;knows someone howto allow all ports from the remote site [2]&lt;BR /&gt;to the local network behind the vpn gateway [1] ?&lt;BR /&gt;&lt;BR /&gt;greetings&lt;BR /&gt;chris&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 14 Mar 2006 05:05:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750379#M22191</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2006-03-14T05:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: shorewall &amp; ipsec</title>
      <link>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750380#M22192</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;Shorewall is merely a code generator that creates iptables code.&lt;BR /&gt;&lt;BR /&gt;You need an iptables statement that accepts all traffic on a particular port.&lt;BR /&gt;-A ACCEPT -s &lt;SOURCE ip="" address=""&gt; -p &lt;PORT&gt; &lt;BR /&gt;&lt;BR /&gt;SEP&lt;/PORT&gt;&lt;/SOURCE&gt;</description>
      <pubDate>Tue, 14 Mar 2006 08:15:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750380#M22192</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-03-14T08:15:09Z</dc:date>
    </item>
    <item>
      <title>Re: shorewall &amp; ipsec</title>
      <link>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750381#M22193</link>
      <description>I've tried already to change roules on different ways.&lt;BR /&gt;If I try ping from the remote site, &lt;BR /&gt;then I get the following message in the log:&lt;BR /&gt;&lt;BR /&gt;Mar 14 18:34:10 ext kernel: Shorewall:rfc1918:DROP:IN=eth0 OUT=eth1 src=192.168.0.6 DST=192.168.115.2 LEN=60 TOS=0x00 PREC=0x00 TTL=126 ID=50162 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=5125&lt;BR /&gt;</description>
      <pubDate>Tue, 14 Mar 2006 12:41:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750381#M22193</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2006-03-14T12:41:35Z</dc:date>
    </item>
    <item>
      <title>Re: shorewall &amp; ipsec</title>
      <link>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750382#M22194</link>
      <description>--------------------------------------------------------------------------------------------------------&lt;BR /&gt;# shorewall show capabilities&lt;BR /&gt;&lt;BR /&gt;Shorewall-2.2.3 Chain capabilities at mydomain.net - Sam MÃ¤r 18 14:45:08 CET 2006&lt;BR /&gt;&lt;BR /&gt;Counters reset Sat Mar 18 14:45:04 CET 2006&lt;BR /&gt;&lt;BR /&gt;iptables: Table does not exist (do you need to insmod?)&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;&lt;BR /&gt;perhaps this is the problem ?&lt;BR /&gt;&lt;BR /&gt;# depmod -a&lt;BR /&gt;&lt;BR /&gt;seems not to help&lt;BR /&gt;&lt;BR /&gt;# iptables --version&lt;BR /&gt;iptables v1.2.11&lt;BR /&gt;&lt;BR /&gt;knows someone what's missing ?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sat, 18 Mar 2006 08:59:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750382#M22194</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2006-03-18T08:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: shorewall &amp; ipsec</title>
      <link>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750383#M22195</link>
      <description>can you send us "iptables -L" output?&lt;BR /&gt;&lt;BR /&gt;thanks,&lt;BR /&gt;Vitaly</description>
      <pubDate>Sat, 18 Mar 2006 15:33:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750383#M22195</guid>
      <dc:creator>Vitaly Karasik_1</dc:creator>
      <dc:date>2006-03-18T15:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: shorewall &amp; ipsec</title>
      <link>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750384#M22196</link>
      <description>shorewall is stopped:&lt;BR /&gt;&lt;BR /&gt;# iptables -L&lt;BR /&gt;Chain INPUT (policy DROP)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain FORWARD (policy DROP)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED&lt;BR /&gt;&lt;BR /&gt;Chain OUTPUT (policy ACCEPT)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;shorewall is started:&lt;BR /&gt;&lt;BR /&gt;# iptables -L&lt;BR /&gt;Chain INPUT (policy DROP)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere&lt;BR /&gt;eth0_in    all  --  anywhere             anywhere&lt;BR /&gt;eth1_in    all  --  anywhere             anywhere&lt;BR /&gt;Reject     all  --  anywhere             anywhere&lt;BR /&gt;LOG        all  --  anywhere             anywhere            LOG level info prefix `Shorewall:INPUT:REJECT:'&lt;BR /&gt;reject     all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain FORWARD (policy DROP)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;eth0_fwd   all  --  anywhere             anywhere&lt;BR /&gt;eth1_fwd   all  --  anywhere             anywhere&lt;BR /&gt;Reject     all  --  anywhere             anywhere&lt;BR /&gt;LOG        all  --  anywhere             anywhere            LOG level info prefix `Shorewall:FORWARD:REJECT:'&lt;BR /&gt;reject     all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain OUTPUT (policy DROP)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere&lt;BR /&gt;fw2net     all  --  anywhere             anywhere&lt;BR /&gt;fw2loc     all  --  anywhere             anywhere&lt;BR /&gt;all2all    all  --  anywhere             192.168.0.0/24&lt;BR /&gt;all2all    all  --  anywhere             192.168.2.0/24&lt;BR /&gt;all2all    all  --  anywhere             192.168.1.0/24&lt;BR /&gt;all2all    all  --  anywhere             201.X.X.2&lt;BR /&gt;Reject     all  --  anywhere             anywhere&lt;BR /&gt;LOG        all  --  anywhere             anywhere            LOG level info prefix `Shorewall:OUTPUT:REJECT:'&lt;BR /&gt;reject     all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain AllowICMPs (2 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     icmp --  anywhere             anywhere            icmp fragmentation-needed&lt;BR /&gt;ACCEPT     icmp --  anywhere             anywhere            icmp time-exceeded&lt;BR /&gt;&lt;BR /&gt;Chain Drop (1 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;RejectAuth  all  --  anywhere             anywhere&lt;BR /&gt;dropBcast  all  --  anywhere             anywhere&lt;BR /&gt;AllowICMPs  icmp --  anywhere             anywhere&lt;BR /&gt;dropInvalid  all  --  anywhere             anywhere&lt;BR /&gt;DropSMB    all  --  anywhere             anywhere&lt;BR /&gt;DropUPnP   all  --  anywhere             anywhere&lt;BR /&gt;dropNotSyn  tcp  --  anywhere             anywhere&lt;BR /&gt;DropDNSrep  all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain DropDNSrep (2 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;DROP       udp  --  anywhere             anywhere            udp spt:domain&lt;BR /&gt;&lt;BR /&gt;Chain DropSMB (1 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;DROP       udp  --  anywhere             anywhere            udp dpt:loc-srv&lt;BR /&gt;DROP       udp  --  anywhere             anywhere            udp dpts:netbios-ns:netbios-ssn&lt;BR /&gt;DROP       udp  --  anywhere             anywhere            udp dpt:microsoft-ds&lt;BR /&gt;DROP       tcp  --  anywhere             anywhere            tcp dpt:loc-srv&lt;BR /&gt;DROP       tcp  --  anywhere             anywhere            tcp dpt:netbios-ssn&lt;BR /&gt;DROP       tcp  --  anywhere             anywhere            tcp dpt:microsoft-ds&lt;BR /&gt;&lt;BR /&gt;Chain DropUPnP (2 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;DROP       udp  --  anywhere             anywhere            udp dpt:1900&lt;BR /&gt;&lt;BR /&gt;Chain Reject (4 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;RejectAuth  all  --  anywhere             anywhere&lt;BR /&gt;dropBcast  all  --  anywhere             anywhere&lt;BR /&gt;AllowICMPs  icmp --  anywhere             anywhere&lt;BR /&gt;dropInvalid  all  --  anywhere             anywhere&lt;BR /&gt;RejectSMB  all  --  anywhere             anywhere&lt;BR /&gt;DropUPnP   all  --  anywhere             anywhere&lt;BR /&gt;dropNotSyn  tcp  --  anywhere             anywhere&lt;BR /&gt;DropDNSrep  all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain RejectAuth (2 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;reject     tcp  --  anywhere             anywhere            tcp dpt:auth&lt;BR /&gt;&lt;BR /&gt;Chain RejectSMB (1 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;reject     udp  --  anywhere             anywhere            udp dpt:loc-srv&lt;BR /&gt;reject     udp  --  anywhere             anywhere            udp dpts:netbios-ns:netbios-ssn&lt;BR /&gt;reject     udp  --  anywhere             anywhere            udp dpt:microsoft-ds&lt;BR /&gt;reject     tcp  --  anywhere             anywhere            tcp dpt:loc-srv&lt;BR /&gt;reject     tcp  --  anywhere             anywhere            tcp dpt:netbios-ssn&lt;BR /&gt;reject     tcp  --  anywhere             anywhere            tcp dpt:microsoft-ds&lt;BR /&gt;&lt;BR /&gt;Chain all2all (9 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED&lt;BR /&gt;Reject     all  --  anywhere             anywhere&lt;BR /&gt;LOG        all  --  anywhere             anywhere            LOG level info prefix `Shorewall:all2all:REJECT:'&lt;BR /&gt;reject     all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain dropBcast (2 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;DROP       all  --  anywhere             anywhere            PKTTYPE = broadcast&lt;BR /&gt;DROP       all  --  anywhere             anywhere            PKTTYPE = multicast&lt;BR /&gt;&lt;BR /&gt;Chain dropInvalid (2 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;DROP       all  --  anywhere             anywhere            state INVALID&lt;BR /&gt;&lt;BR /&gt;Chain dropNotSyn (2 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;DROP       tcp  --  anywhere             anywhere            tcp flags:!SYN,RST,ACK/SYN&lt;BR /&gt;&lt;BR /&gt;Chain dynamic (4 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;&lt;BR /&gt;Chain eth0_fwd (1 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;dynamic    all  --  anywhere             anywhere            state INVALID,NEW&lt;BR /&gt;net2all    all  --  anywhere             anywhere&lt;BR /&gt;net2all    all  --  anywhere             192.168.0.0/24&lt;BR /&gt;net2all    all  --  anywhere             192.168.1.0/24&lt;BR /&gt;net2all    all  --  anywhere             192.168.2.0/24&lt;BR /&gt;net2all    all  --  anywhere             201.X.X.2&lt;BR /&gt;vpn_frwd   all  --  192.168.0.0/24       anywhere&lt;BR /&gt;vpn_frwd   all  --  192.168.1.0/24           anywhere&lt;BR /&gt;vpn_frwd   all  --  192.168.2.0/24       anywhere&lt;BR /&gt;vpn_frwd   all  --  201.X.X.2         anywhere&lt;BR /&gt;&lt;BR /&gt;Chain eth0_in (1 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;dynamic    all  --  anywhere             anywhere            state INVALID,NEW&lt;BR /&gt;net2fw     all  --  anywhere             anywhere&lt;BR /&gt;all2all    all  --  192.168.0.0/24       anywhere&lt;BR /&gt;all2all    all  --  192.168.1.0/24          anywhere&lt;BR /&gt;all2all    all  --  192.168.2.0/24       anywhere&lt;BR /&gt;all2all    all  --  201.X.X.2         anywhere&lt;BR /&gt;&lt;BR /&gt;Chain eth1_fwd (1 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;dynamic    all  --  anywhere             anywhere            state INVALID,NEW&lt;BR /&gt;loc2all    all  --  anywhere             anywhere&lt;BR /&gt;loc2vpn    all  --  anywhere             192.168.0.0/24&lt;BR /&gt;loc2vpn    all  --  anywhere             192.168.1.0/24&lt;BR /&gt;loc2vpn    all  --  anywhere             192.168.2.0/24&lt;BR /&gt;loc2vpn    all  --  anywhere             201.X.X.2&lt;BR /&gt;&lt;BR /&gt;Chain eth1_in (1 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;dynamic    all  --  anywhere             anywhere            state INVALID,NEW&lt;BR /&gt;loc2all    all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain fw2loc (1 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain fw2net (1 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     esp  --  anywhere             201.X.X.2&lt;BR /&gt;ACCEPT     ah   --  anywhere             201.X.X.2&lt;BR /&gt;ACCEPT     udp  --  anywhere             201.X.X.2        udp dpt:isakmp state NEW&lt;BR /&gt;ACCEPT     udp  --  anywhere             anywhere            udp dpt:domain&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain icmpdef (0 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;&lt;BR /&gt;Chain loc2all (2 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain loc2vpn (4 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain net2all (6 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED&lt;BR /&gt;Drop       all  --  anywhere             anywhere&lt;BR /&gt;LOG        all  --  anywhere             anywhere            LOG level info prefix `Shorewall:net2all:DROP:'&lt;BR /&gt;DROP       all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain net2fw (1 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     esp  --  201.X.X.2         anywhere&lt;BR /&gt;ACCEPT     ah   --  201.X.X.2         anywhere&lt;BR /&gt;ACCEPT     udp  --  201.X.X.2         anywhere            udp dpt:isakmp state NEW&lt;BR /&gt;ACCEPT     tcp  --  anywhere             anywhere            multiport dports ssh,www,https,ftp,re-mail-ck&lt;BR /&gt;ACCEPT     udp  --  anywhere             anywhere            multiport dports https,domain,isakmp,4500&lt;BR /&gt;ACCEPT     tcp  --  201.X.X.2         anywhere&lt;BR /&gt;ACCEPT     udp  --  201.X.X.2         anywhere&lt;BR /&gt;ACCEPT     icmp --  201.X.X.2         anywhere&lt;BR /&gt;net2all    all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain reject (11 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;DROP       all  --  anywhere             anywhere            PKTTYPE = broadcast&lt;BR /&gt;DROP       all  --  anywhere             anywhere            PKTTYPE = multicast&lt;BR /&gt;DROP       all  --  255.255.255.255      anywhere&lt;BR /&gt;DROP       all  --  BASE-ADDRESS.MCAST.NET/4  anywhere&lt;BR /&gt;REJECT     tcp  --  anywhere             anywhere            reject-with tcp-reset&lt;BR /&gt;REJECT     udp  --  anywhere             anywhere            reject-with icmp-port-unreachable&lt;BR /&gt;REJECT     icmp --  anywhere             anywhere            reject-with icmp-host-unreachable&lt;BR /&gt;REJECT     all  --  anywhere             anywhere            reject-with icmp-host-prohibited&lt;BR /&gt;&lt;BR /&gt;Chain shorewall (0 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;&lt;BR /&gt;Chain smurfs (0 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;LOG        all  --  255.255.255.255      anywhere            LOG level info prefix `Shorewall:smurfs:DROP:'&lt;BR /&gt;DROP       all  --  255.255.255.255      anywhere&lt;BR /&gt;LOG        all  --  BASE-ADDRESS.MCAST.NET/4  anywhere            LOG level info prefix `Shorewall:smurfs:DROP:'&lt;BR /&gt;DROP       all  --  BASE-ADDRESS.MCAST.NET/4  anywhere&lt;BR /&gt;&lt;BR /&gt;Chain vpn2loc (1 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     all  --  anywhere             anywhere&lt;BR /&gt;&lt;BR /&gt;Chain vpn_frwd (4 references)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;all2all    all  --  anywhere             anywhere&lt;BR /&gt;vpn2loc    all  --  anywhere             anywhere&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sat, 18 Mar 2006 16:17:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750384#M22196</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2006-03-18T16:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: shorewall &amp; ipsec</title>
      <link>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750385#M22197</link>
      <description># iptables -Ln&lt;BR /&gt;&lt;BR /&gt;iptables: Table does not exist (do you need to insmod?)</description>
      <pubDate>Sun, 19 Mar 2006 08:45:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/shorewall-amp-ipsec/m-p/3750385#M22197</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2006-03-19T08:45:44Z</dc:date>
    </item>
  </channel>
</rss>

