m0n0wall: status
Mon Jun 25 15:16:00 CDT 2007
Note: make sure to remove any sensitive information
(passwords, maybe also IP addresses) before posting
information from this page in public places (like mailing lists)!
Passwords in config.xml have been automatically removed.
This status page includes the following information:
| System uptime |
3:16PM up 8 mins, 0 users, load averages: 0.00, 0.02, 0.00 |
| Interfaces |
rl0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 1500 options=40<POLLING> ether 00:c0:49:a7:22:92 media: Ethernet autoselect (10baseT/UTP) status: no carrier rl1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=40<POLLING> ether 00:c0:49:a7:24:3f media: Ethernet autoselect (100baseTX <full-duplex>) status: active sis0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=40<POLLING> inet 192.168.0.110 netmask 0xffffff00 broadcast 192.168.0.255 ether 00:d0:09:45:0d:d3 media: Ethernet autoselect (100baseTX <full-duplex>) status: active lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384 inet 127.0.0.1 netmask 0xff000000 ng0: flags=88d1<UP,POINTOPOINT,RUNNING,NOARP,SIMPLEX,MULTICAST> mtu 1492 inet 200.x.x.x --> 200.38.193.226 netmask 0xffffffff |
| Routing tables |
Routing tables Internet: Destination Gateway Flags Refs Use Netif Expire default 200.38.193.226 UGSc 2 664 ng0 127.0.0.1 127.0.0.1 UH 1 28 lo0 192.168.0 link#3 UC 2 0 sis0 192.168.0.1 00:18:de:45:9e:fb UHLW 2 1682 sis0 1067 192.168.0.103 00:0c:29:e2:81:46 UHLW 1 223 sis0 743 200.38.193.226 200.x.x.x UH 3 0 ng0 200.x.x.x lo0 UHS 0 0 lo0 |
| ipfw show |
ipfw: getsockopt(IP_FW_GET): Protocol not available |
| ipnat -lv |
List of active MAP/Redirect filters: map ng0 192.168.0.0/24 -> 0.0.0.0/32 proxy port ftp ftp/tcp map ng0 192.168.0.0/24 -> 0.0.0.0/32 portmap tcp/udp auto map ng0 192.168.0.0/24 -> 0.0.0.0/32 rdr ng0 0.0.0.0/0 port 25 -> 192.168.0.103 port 25 tcp rdr ng0 0.0.0.0/0 port 80 -> 192.168.0.103 port 80 tcp rdr ng0 0.0.0.0/0 port 110 -> 192.168.0.103 port 110 tcp rdr ng0 0.0.0.0/0 port 53 -> 192.168.0.103 port 53 udp rdr ng0 0.0.0.0/0 port 143 -> 192.168.0.103 port 143 tcp List of active sessions: MAP 192.168.0.1 3073 <- -> 200.x.x.x 1325 [64.74.197.73 80] age 459 use 0 sumd 0xd467/0xd467 pr 6 bkt 755/1340 flags 1 drop 0/0 ifp ng0 bytes 1226 pkts 9 MAP 192.168.0.1 3072 <- -> 200.x.x.x 1324 [64.74.197.73 80] age 458 use 0 sumd 0xd467/0xd467 pr 6 bkt 499/1084 flags 1 drop 0/0 ifp ng0 bytes 2079 pkts 9 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [200.77.192.4 32768] age 1191 use 0 sumd 0x252a/0x252a pr 17 bkt 706/1704 flags 2 drop 0/0 ifp ng0 bytes 289 pkts 4 MAP 192.168.0.1 3071 <- -> 200.x.x.x 1323 [209.85.171.166 80] age 17980 use 0 sumd 0xd467/0xd467 pr 6 bkt 499/29 flags 1 drop 0/0 ifp ng0 bytes 30011 pkts 47 MAP 192.168.0.1 3070 <- -> 200.x.x.x 1322 [64.74.197.73 80] age 445 use 0 sumd 0xd467/0xd467 pr 6 bkt 18/572 flags 1 drop 0/0 ifp ng0 bytes 1223 pkts 9 MAP 192.168.0.1 3069 <- -> 200.x.x.x 1321 [64.74.197.73 80] age 444 use 0 sumd 0xd467/0xd467 pr 6 bkt 1809/316 flags 1 drop 0/0 ifp ng0 bytes 2073 pkts 9 MAP 192.168.0.1 3068 <- -> 200.x.x.x 1320 [209.85.197.99 80] age 17964 use 0 sumd 0xd467/0xd467 pr 6 bkt 577/107 flags 1 drop 0/0 ifp ng0 bytes 1486 pkts 7 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [213.186.33.99 36931] age 1184 use 0 sumd 0x252a/0x252a pr 17 bkt 1890/1864 flags 2 drop 0/0 ifp ng0 bytes 273 pkts 4 MAP 192.168.0.1 3067 <- -> 200.x.x.x 1319 [74.53.59.227 80] age 17960 use 0 sumd 0xd467/0xd467 pr 6 bkt 465/2042 flags 1 drop 0/0 ifp ng0 bytes 1988 pkts 8 MAP 192.168.0.1 3066 <- -> 200.x.x.x 1318 [74.53.59.226 80] age 17961 use 0 sumd 0xd467/0xd467 pr 6 bkt 203/1780 flags 1 drop 0/0 ifp ng0 bytes 5638 pkts 16 MAP 192.168.0.1 3065 <- -> 200.x.x.x 1317 [74.53.59.226 80] age 17964 use 0 sumd 0xd467/0xd467 pr 6 bkt 1994/1524 flags 1 drop 0/0 ifp ng0 bytes 6607 pkts 19 MAP 192.168.0.1 3064 <- -> 200.x.x.x 1316 [74.53.59.227 80] age 17960 use 0 sumd 0xd467/0xd467 pr 6 bkt 1744/1274 flags 1 drop 0/0 ifp ng0 bytes 2923 pkts 11 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [200.77.213.251 33043] age 1182 use 0 sumd 0x252a/0x252a pr 17 bkt 896/1894 flags 2 drop 0/0 ifp ng0 bytes 289 pkts 4 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [74.53.59.133 1028] age 1172 use 0 sumd 0x252a/0x252a pr 17 bkt 2007/1981 flags 2 drop 0/0 ifp ng0 bytes 192 pkts 3 MAP 192.168.0.1 3063 <- -> 200.x.x.x 1315 [74.53.59.165 80] age 458 use 0 sumd 0xd467/0xd467 pr 6 bkt 1116/646 flags 1 drop 0/0 ifp ng0 bytes 12165 pkts 25 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [209.3.61.141 34308] age 1170 use 0 sumd 0x252a/0x252a pr 17 bkt 1895/1869 flags 2 drop 0/0 ifp ng0 bytes 273 pkts 4 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [213.251.175.220 53] age 1200 use 0 sumd 0x252a/0x252a pr 17 bkt 854/1852 flags 2 drop 0/0 ifp ng0 bytes 333 pkts 5 MAP 192.168.0.1 3062 <- -> 200.x.x.x 1314 [131.107.115.28 80] age 377 use 0 sumd 0xd467/0xd467 pr 6 bkt 234/788 flags 1 drop 0/0 ifp ng0 bytes 666 pkts 7 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [84.2.40.16 58700] age 1142 use 0 sumd 0x252a/0x252a pr 17 bkt 1907/858 flags 2 drop 0/0 ifp ng0 bytes 442 pkts 7 MAP 192.168.0.1 3061 <- -> 200.x.x.x 1313 [204.0.3.50 443] age 361 use 0 sumd 0xd467/0xd467 pr 6 bkt 943/1497 flags 1 drop 0/0 ifp ng0 bytes 1573 pkts 16 MAP 192.168.0.1 3060 <- -> 200.x.x.x 1312 [204.0.3.74 80] age 361 use 0 sumd 0xd467/0xd467 pr 6 bkt 49/603 flags 1 drop 0/0 ifp ng0 bytes 1053 pkts 10 MAP 192.168.0.1 3059 <- -> 200.x.x.x 1311 [204.0.3.50 443] age 352 use 0 sumd 0xd467/0xd467 pr 6 bkt 431/985 flags 1 drop 0/0 ifp ng0 bytes 2647 pkts 15 MAP 192.168.0.1 3058 <- -> 200.x.x.x 1310 [72.14.253.104 80] age 420 use 0 sumd 0xd467/0xd467 pr 6 bkt 840/370 flags 1 drop 0/0 ifp ng0 bytes 5092 pkts 18 MAP 192.168.0.1 3057 <- -> 200.x.x.x 1309 [216.38.169.102 443] age 346 use 0 sumd 0xd467/0xd467 pr 6 bkt 1565/1095 flags 1 drop 0/0 ifp ng0 bytes 5728 pkts 19 MAP 192.168.0.1 3056 <- -> 200.x.x.x 1308 [204.0.3.74 80] age 17930 use 0 sumd 0xd467/0xd467 pr 6 bkt 1072/1626 flags 1 drop 0/0 ifp ng0 bytes 8784 pkts 34 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [84.2.42.16 56246] age 1098 use 0 sumd 0x252a/0x252a pr 17 bkt 471/1469 flags 2 drop 0/0 ifp ng0 bytes 442 pkts 7 MAP 192.168.0.1 3055 <- -> 200.x.x.x 1307 [72.14.253.104 80] age 480 use 0 sumd 0xd467/0xd467 pr 6 bkt 72/1649 flags 1 drop 0/0 ifp ng0 bytes 18957 pkts 38 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [84.2.40.15 64236] age 1092 use 0 sumd 0x252a/0x252a pr 17 bkt 1942/893 flags 2 drop 0/0 ifp ng0 bytes 442 pkts 7 MAP 192.168.0.1 3052 <- -> 200.x.x.x 1304 [66.36.247.82 80] age 226 use 0 sumd 0xd467/0xd467 pr 6 bkt 418/972 flags 1 drop 0/0 ifp ng0 bytes 1981 pkts 9 MAP 192.168.0.1 3051 <- -> 200.x.x.x 1303 [64.74.197.73 80] age 224 use 0 sumd 0xd467/0xd467 pr 6 bkt 1295/1849 flags 1 drop 0/0 ifp ng0 bytes 1284 pkts 9 MAP 192.168.0.1 3050 <- -> 200.x.x.x 1302 [74.53.59.155 80] age 279 use 0 sumd 0xd467/0xd467 pr 6 bkt 1822/1352 flags 1 drop 0/0 ifp ng0 bytes 29719 pkts 50 MAP 192.168.0.1 3049 <- -> 200.x.x.x 1301 [64.74.197.73 80] age 224 use 0 sumd 0xd467/0xd467 pr 6 bkt 783/1337 flags 1 drop 0/0 ifp ng0 bytes 2106 pkts 9 MAP 192.168.0.1 3048 <- -> 200.x.x.x 1300 [66.36.247.82 80] age 223 use 0 sumd 0xd467/0xd467 pr 6 bkt 1441/1995 flags 1 drop 0/0 ifp ng0 bytes 136 pkts 3 MAP 192.168.0.1 3047 <- -> 200.x.x.x 1299 [66.36.247.82 80] age 222 use 0 sumd 0xd467/0xd467 pr 6 bkt 1185/1739 flags 1 drop 0/0 ifp ng0 bytes 11145 pkts 18 MAP 192.168.0.1 3046 <- -> 200.x.x.x 1298 [74.53.59.165 80] age 221 use 0 sumd 0xd467/0xd467 pr 6 bkt 858/388 flags 1 drop 0/0 ifp ng0 bytes 2262 pkts 9 MAP 192.168.0.1 3044 <- -> 200.x.x.x 1296 [209.85.197.99 80] age 17762 use 0 sumd 0xd467/0xd467 pr 6 bkt 574/104 flags 1 drop 0/0 ifp ng0 bytes 3145 pkts 11 MAP 192.168.0.1 3043 <- -> 200.x.x.x 1295 [64.74.197.73 80] age 220 use 0 sumd 0xd467/0xd467 pr 6 bkt 1294/1848 flags 1 drop 0/0 ifp ng0 bytes 1639 pkts 9 MAP 192.168.0.1 3042 <- -> 200.x.x.x 1294 [72.14.253.167 80] age 17744 use 0 sumd 0xd467/0xd467 pr 6 bkt 1216/746 flags 1 drop 0/0 ifp ng0 bytes 7857 pkts 15 MAP 192.168.0.1 3041 <- -> 200.x.x.x 1293 [64.74.197.73 80] age 219 use 0 sumd 0xd467/0xd467 pr 6 bkt 782/1336 flags 1 drop 0/0 ifp ng0 bytes 1739 pkts 9 MAP 192.168.0.1 3040 <- -> 200.x.x.x 1292 [64.74.197.73 80] age 219 use 0 sumd 0xd467/0xd467 pr 6 bkt 526/1080 flags 1 drop 0/0 ifp ng0 bytes 1282 pkts 9 MAP 192.168.0.1 3039 <- -> 200.x.x.x 1291 [64.74.197.73 80] age 218 use 0 sumd 0xd467/0xd467 pr 6 bkt 270/824 flags 1 drop 0/0 ifp ng0 bytes 2103 pkts 9 MAP 192.168.0.1 3038 <- -> 200.x.x.x 1290 [207.138.126.142 80] age 17740 use 0 sumd 0xd467/0xd467 pr 6 bkt 1269/799 flags 1 drop 0/0 ifp ng0 bytes 30018 pkts 39 MAP 192.168.0.1 3037 <- -> 200.x.x.x 1289 [64.74.197.73 80] age 217 use 0 sumd 0xd467/0xd467 pr 6 bkt 1805/312 flags 1 drop 0/0 ifp ng0 bytes 1643 pkts 9 MAP 192.168.0.1 3036 <- -> 200.x.x.x 1288 [74.53.59.226 80] age 17746 use 0 sumd 0xd467/0xd467 pr 6 bkt 711/241 flags 1 drop 0/0 ifp ng0 bytes 64616 pkts 97 MAP 192.168.0.1 3035 <- -> 200.x.x.x 1287 [74.53.59.226 80] age 17745 use 0 sumd 0xd467/0xd467 pr 6 bkt 455/2032 flags 1 drop 0/0 ifp ng0 bytes 31317 pkts 47 MAP 192.168.0.1 3034 <- -> 200.x.x.x 1286 [74.53.59.155 80] age 279 use 0 sumd 0xd467/0xd467 pr 6 bkt 1820/1350 flags 1 drop 0/0 ifp ng0 bytes 193115 pkts 224 MAP 192.168.0.1 3033 <- -> 200.x.x.x 1285 [74.53.59.227 80] age 473 use 0 sumd 0xd467/0xd467 pr 6 bkt 1996/1526 flags 1 drop 0/0 ifp ng0 bytes 10847 pkts 18 MAP 192.168.0.1 3032 <- -> 200.x.x.x 1284 [74.53.59.165 80] age 212 use 0 sumd 0xd467/0xd467 pr 6 bkt 1368/898 flags 1 drop 0/0 ifp ng0 bytes 25904 pkts 35 MAP 192.168.0.1 3006 <- -> 200.x.x.x 1510 [209.167.231.15 80] age 17488 use 0 sumd 0xd563/0xd563 pr 6 bkt 689/251 flags 1 drop 0/0 ifp ng0 bytes 2461 pkts 9 MAP 192.168.0.1 3005 <- -> 200.x.x.x 1509 [64.154.81.197 80] age 399 use 0 sumd 0xd563/0xd563 pr 6 bkt 1086/1671 flags 1 drop 0/0 ifp ng0 bytes 5317 pkts 16 MAP 192.168.0.1 3004 <- -> 200.x.x.x 1508 [66.35.234.154 80] age 1 use 0 sumd 0xd563/0xd563 pr 6 bkt 2011/549 flags 1 drop 0/0 ifp ng0 bytes 106457 pkts 148 MAP 192.168.0.1 3003 <- -> 200.x.x.x 1507 [66.35.234.154 80] age 1 use 0 sumd 0xd563/0xd563 pr 6 bkt 1755/293 flags 1 drop 0/0 ifp ng0 bytes 208367 pkts 248 MAP 192.168.0.1 2930 <- -> 200.x.x.x 1434 [64.154.81.197 80] age 322 use 0 sumd 0xd563/0xd563 pr 6 bkt 309/894 flags 1 drop 0/0 ifp ng0 bytes 3823 pkts 11 MAP 192.168.0.1 1187 <- -> 200.x.x.x 1455 [200.33.146.153 53] age 936 use 0 sumd 0xdc47/0xdc47 pr 17 bkt 460/25 flags 2 drop 0/0 ifp ng0 bytes 300 pkts 4 MAP 192.168.0.1 1188 <- -> 200.x.x.x 1456 [200.33.146.153 53] age 1164 use 0 sumd 0xdc47/0xdc47 pr 17 bkt 716/281 flags 2 drop 0/0 ifp ng0 bytes 3136 pkts 34 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [212.202.221.82 57748] age 664 use 0 sumd 0x252a/0x252a pr 17 bkt 926/1924 flags 2 drop 0/0 ifp ng0 bytes 273 pkts 4 MAP 192.168.0.1 1025 <- -> 200.x.x.x 1293 [200.33.146.153 53] age 688 use 0 sumd 0xdc47/0xdc47 pr 17 bkt 1975/1540 flags 2 drop 0/0 ifp ng0 bytes 906 pkts 8 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [207.248.224.72 32768] age 826 use 0 sumd 0x252a/0x252a pr 17 bkt 1410/361 flags 2 drop 0/0 ifp ng0 bytes 606 pkts 9 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [207.248.224.71 32768] age 808 use 0 sumd 0x252a/0x252a pr 17 bkt 1404/355 flags 2 drop 0/0 ifp ng0 bytes 737 pkts 11 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [200.38.221.66 3692] age 867 use 0 sumd 0x252a/0x252a pr 17 bkt 1595/546 flags 2 drop 0/0 ifp ng0 bytes 1440 pkts 24 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [148.244.150.132 32771] age 892 use 0 sumd 0x252a/0x252a pr 17 bkt 1997/1971 flags 2 drop 0/0 ifp ng0 bytes 1365 pkts 20 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [148.244.150.20 32781] age 838 use 0 sumd 0x252a/0x252a pr 17 bkt 1838/789 flags 2 drop 0/0 ifp ng0 bytes 1152 pkts 17 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [151.164.8.213 30263] age 459 use 0 sumd 0x252a/0x252a pr 17 bkt 1792/743 flags 2 drop 0/0 ifp ng0 bytes 502 pkts 8 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [151.164.8.207 36051] age 458 use 0 sumd 0x252a/0x252a pr 17 bkt 774/1772 flags 2 drop 0/0 ifp ng0 bytes 502 pkts 8 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [128.121.247.232 41751] age 599 use 0 sumd 0x252a/0x252a pr 17 bkt 338/1336 flags 2 drop 0/0 ifp ng0 bytes 1266 pkts 20 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [198.65.108.198 38158] age 573 use 0 sumd 0x252a/0x252a pr 17 bkt 1439/390 flags 2 drop 0/0 ifp ng0 bytes 1092 pkts 16 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [151.164.8.214 26073] age 444 use 0 sumd 0x252a/0x252a pr 17 bkt 266/1264 flags 2 drop 0/0 ifp ng0 bytes 502 pkts 8 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [65.68.49.31 33941] age 442 use 0 sumd 0x252a/0x252a pr 17 bkt 1055/6 flags 2 drop 0/0 ifp ng0 bytes 502 pkts 8 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [194.65.14.248 32768] age 503 use 0 sumd 0x252a/0x252a pr 17 bkt 1806/757 flags 2 drop 0/0 ifp ng0 bytes 333 pkts 5 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [213.13.158.11 32768] age 493 use 0 sumd 0x252a/0x252a pr 17 bkt 1164/115 flags 2 drop 0/0 ifp ng0 bytes 333 pkts 5 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [209.244.5.114 61431] age 346 use 0 sumd 0x252a/0x252a pr 17 bkt 249/223 flags 2 drop 0/0 ifp ng0 bytes 213 pkts 3 RDR 192.168.0.103 53 <- -> 200.x.x.x 53 [209.244.5.115 63335] age 327 use 0 sumd 0x252a/0x252a pr 17 bkt 245/219 flags 2 drop 0/0 ifp ng0 bytes 213 pkts 3 List of active host mappings: 192.168.0.1 -> 0.0.0.0 (use = 47 hv = 217) |
| ipfstat -v |
opts 0x40 name /dev/ipl IPv6 packets: in 0 out 0 input packets: blocked 22 passed 2673 nomatch 0 counted 0 short 0 output packets: blocked 0 passed 2650 nomatch 0 counted 0 short 0 input packets logged: blocked 22 passed 0 output packets logged: blocked 0 passed 0 packets logged: input 0 output 0 log failures: input 0 output 0 fragment state(in): kept 0 lost 0 not fragmented 0 fragment state(out): kept 0 lost 0 not fragmented 0 packet state(in): kept 172 lost 0 packet state(out): kept 18 lost 0 ICMP replies: 0 TCP RSTs sent: 0 Invalid source(in): 0 Result cache hits(in): 7 (out): 0 IN Pullups succeeded: 0 failed: 0 OUT Pullups succeeded: 0 failed: 0 Fastroute successes: 0 failures: 0 TCP cksum fails(in): 0 (out): 0 Packet log flags set: (0) none |
| ipfstat -nio |
@1 pass out quick on lo0 from any to any @2 pass out quick on sis0 proto udp from 192.168.0.110/32 port = 67 to any port = 68 @3 pass out quick on ng0 proto udp from any port = 68 to any port = 67 @4 pass out quick on sis0 from any to any keep state @5 pass out quick on ng0 from any to any keep state @6 block out log quick from any to any @1 pass in quick on lo0 from any to any @2 block in log quick from any to any with short @3 block in log quick from any to any with ipopt @4 pass in quick on sis0 proto udp from any port = 68 to 255.255.255.255/32 port = 67 @5 pass in quick on sis0 proto udp from any port = 68 to 192.168.0.110/32 port = 67 @6 block in log quick on ng0 from 192.168.0.0/24 to any @7 block in log quick on ng0 proto udp from any port = 67 to 192.168.0.0/24 port = 68 @8 pass in quick on ng0 proto udp from any port = 67 to any port = 68 @9 block in log quick on sis0 from !192.168.0.0/24 to any @10 block in log quick on ng0 from 10.0.0.0/8 to any @11 block in log quick on ng0 from 127.0.0.0/8 to any @12 block in log quick on ng0 from 172.16.0.0/12 to any @13 block in log quick on ng0 from 192.168.0.0/16 to any @14 skip 1 in proto tcp from any to any flags S/FSRA @15 block in log quick proto tcp from any to any @16 block in log quick on sis0 from any to any head 100 @1 pass in quick from 192.168.0.0/24 to 192.168.0.110/32 keep state group 100 @2 pass in quick from 192.168.0.0/24 to any keep state group 100 @17 block in log quick on ng0 from any to any head 200 @1 pass in quick proto udp from any to 192.168.0.103/32 port = 53 keep state group 200 @2 pass in quick proto tcp from any to 192.168.0.103/32 port = 80 keep state group 200 @3 pass in quick proto tcp from any to 192.168.0.103/32 port = 25 keep state group 200 @4 pass in quick proto tcp from any to 192.168.0.103/32 port = 110 keep state group 200 @5 pass in quick proto tcp from any to 192.168.0.103/32 port = 143 keep state group 200 @18 block in log quick from any to any |
| unparsed ipnat rules |
map ng0 192.168.0.0/24 -> 0/32 proxy port ftp ftp/tcp map ng0 192.168.0.0/24 -> 0/32 portmap tcp/udp auto map ng0 192.168.0.0/24 -> 0/32 rdr ng0 0/0 port 25 -> 192.168.0.103 port 25 tcp rdr ng0 0/0 port 80 -> 192.168.0.103 port 80 tcp rdr ng0 0/0 port 110 -> 192.168.0.103 port 110 tcp rdr ng0 0/0 port 53 -> 192.168.0.103 port 53 udp rdr ng0 0/0 port 143 -> 192.168.0.103 port 143 tcp |
| unparsed ipfilter rules |
# loopback pass in quick on lo0 all pass out quick on lo0 all # block short packets block in log quick all with short # block IP options block in log quick all with ipopts # allow access to DHCP server on LAN pass in quick on sis0 proto udp from any port = 68 to 255.255.255.255 port = 67 pass in quick on sis0 proto udp from any port = 68 to 192.168.0.110 port = 67 pass out quick on sis0 proto udp from 192.168.0.110 port = 67 to any port = 68 # WAN spoof check block in log quick on ng0 from 192.168.0.0/24 to any # allow our DHCP client out to the WAN # XXX - should be more restrictive # (not possible at the moment - need 'me' like in ipfw) pass out quick on ng0 proto udp from any port = 68 to any port = 67 block in log quick on ng0 proto udp from any port = 67 to 192.168.0.0/24 port = 68 pass in quick on ng0 proto udp from any port = 67 to any port = 68 # LAN/OPT spoof check (needs to be after DHCP because of broadcast addresses) block in log quick on sis0 from ! 192.168.0.0/24 to any # block anything from private networks on WAN interface block in log quick on ng0 from 10.0.0.0/8 to any block in log quick on ng0 from 127.0.0.0/8 to any block in log quick on ng0 from 172.16.0.0/12 to any block in log quick on ng0 from 192.168.0.0/16 to any # Block TCP packets that do not mark the start of a connection skip 1 in proto tcp all flags S/SAFR block in log quick proto tcp all #--------------------------------------------------------------------------- # group head 100 - LAN interface #--------------------------------------------------------------------------- block in log quick on sis0 all head 100 # let out anything from the firewall host itself and decrypted IPsec traffic pass out quick on sis0 all keep state #--------------------------------------------------------------------------- # group head 200 - WAN interface #--------------------------------------------------------------------------- block in log quick on ng0 all head 200 # let out anything from the firewall host itself and decrypted IPsec traffic pass out quick on ng0 all keep state # make sure the user cannot lock himself out of the webGUI pass in quick from 192.168.0.0/24 to 192.168.0.110 keep state group 100 # User-defined rules follow pass in quick proto udp from any to 192.168.0.103 port = 53 keep state group 200 pass in quick proto tcp from any to 192.168.0.103 port = 80 keep state group 200 pass in quick proto tcp from any to 192.168.0.103 port = 25 keep state group 200 pass in quick proto tcp from any to 192.168.0.103 port = 110 keep state group 200 pass in quick proto tcp from any to 192.168.0.103 port = 143 keep state group 200 pass in quick from 192.168.0.0/24 to any keep state group 100 #--------------------------------------------------------------------------- # default rules (just to be sure) #--------------------------------------------------------------------------- block in log quick all block out log quick all |
| unparsed ipfw rules |
add 50000 set 4 pass all from 192.168.0.110 to any add 50001 set 4 pass all from any to 192.168.0.110 |
| resolv.conf |
domain akbmono.net.mx nameserver 200.33.146.153 nameserver 200.33.146.161 |
| Processes |
USER PID %CPU %MEM VSZ RSS TT STAT STARTED TIME COMMAND root 0 0.0 0.0 0 0 ?? DLs 3:07PM 0:00.00 (swapper) root 393 0.0 0.9 1332 968 ?? SN 3:16PM 0:00.00 sh -c ps xauww 2>&1 root 372 0.0 1.1 2256 1268 ?? S 3:16PM 0:00.01 /usr/local/sbin/mini_httpd -c **.php|**.cgi -u root -maxproc 16 -i /var/run/mini_httpd.pid root 371 0.0 5.8 7188 6596 ?? SN 3:16PM 0:00.19 /usr/local/bin/php status.php root 182 0.0 0.7 1104 828 ?? I 3:08PM 0:00.01 /usr/local/bin/msntp -r -P no -l /var/run/msntp.pid -x 300 pool.ntp.org root 119 0.0 0.8 1336 888 ?? I 3:07PM 0:00.01 /bin/sh /etc/rc.initial console root 103 0.0 0.7 1332 840 con- I 3:07PM 0:00.02 /bin/sh /usr/local/bin/runmsntp.sh /var/run/runmsntp.pid /var/run/msntp.pid 300 pool.ntp.org root 99 0.0 1.3 1836 1504 ?? Is 3:07PM 0:00.00 /usr/local/sbin/dhcpd -cf /var/etc/dhcpd.conf sis0 nobody 97 0.0 0.7 1020 788 ?? I 3:07PM 0:00.00 /usr/local/sbin/dnsmasq root 92 0.0 1.1 2248 1224 ?? Ss 3:07PM 0:00.05 /usr/local/sbin/mini_httpd -c **.php|**.cgi -u root -maxproc 16 -i /var/run/mini_httpd.pid root 89 0.0 0.6 1004 704 ?? Ss 3:07PM 0:00.02 /usr/sbin/syslogd -ss root 84 0.0 1.1 1456 1224 ?? Ss 3:07PM 0:00.02 /sbin/ipmon -sD root 73 0.0 1.1 2256 1288 ?? Ss 3:07PM 0:00.03 /usr/local/sbin/mpd -b -d /var/etc -p /var/run/mpd.pid pppoe root 9 0.0 0.0 0 0 ?? DL 3:07PM 0:00.00 (vnlru) root 8 0.0 0.0 0 0 ?? DL 3:07PM 0:00.01 (syncer) root 7 0.0 0.0 0 0 ?? DL 3:07PM 0:00.00 (bufdaemon) root 6 0.0 0.0 0 0 ?? DL 3:07PM 0:00.00 (pagedaemon) root 5 0.0 0.0 0 0 ?? DL 3:07PM 0:00.00 (usbtask) root 4 0.0 0.0 0 0 ?? DL 3:07PM 0:00.00 (usb0) root 3 0.0 0.0 0 0 ?? DL 3:07PM 0:00.00 (taskqueue) root 2 0.0 0.0 0 0 ?? DL 3:07PM 0:00.00 (cryptoret) root 1 0.0 0.6 1060 696 ?? SLs 3:07PM 0:00.01 /sbin/init -- root 394 0.0 0.6 1080 680 ?? RN 3:16PM 0:00.00 ps xauww |
| dhcpd.conf |
option domain-name "akbmono.net.mx";
default-lease-time 7200;
max-lease-time 86400;
authoritative;
log-facility local7;
ddns-update-style none;
subnet 192.168.0.0 netmask 255.255.255.0 {
pool {
range 192.168.0.0 192.168.0.255;
}
option routers 192.168.0.110;
option domain-name-servers 192.168.0.110;
} |
| ez-ipupdate.cache |
cat: /conf/ez-ipupdate.cache: No such file or directory |
| df |
Filesystem 512-blocks Used Avail Capacity Mounted on /dev/md0c 21758 20136 1622 93% / /dev/ad0a 13822 11122 2700 80% /cf procfs 8 8 0 100% /proc |
| racoon.conf |
cat: /var/etc/racoon.conf: No such file or directory |
| SPD |
No SPD entries. |
| SAD |
No SAD entries. |
| last 200 system log entries |
| last 50 filter log entries |
Jun 25 15:10:14 m0n0wall ipmon[84]: 15:10:13.656681 ng0 @0:15 b 212.23.166.71,80 -> 200.x.x.x,8466 PR tcp len 20 40 -A IN Jun 25 15:10:16 m0n0wall ipmon[84]: 15:10:16.035959 ng0 @0:15 b 212.23.166.70,80 -> 200.x.x.x,8510 PR tcp len 20 40 -A IN Jun 25 15:11:09 m0n0wall ipmon[84]: 15:11:08.641081 ng0 @0:17 b 200.67.188.217,1787 -> 200.x.x.x,135 PR tcp len 20 48 -S IN Jun 25 15:11:29 m0n0wall ipmon[84]: 15:11:28.681005 ng0 @0:15 b 212.23.166.71,80 -> 200.x.x.x,8466 PR tcp len 20 40 -A IN Jun 25 15:11:31 m0n0wall ipmon[84]: 15:11:31.058366 ng0 @0:15 b 212.23.166.70,80 -> 200.x.x.x,8510 PR tcp len 20 40 -A IN Jun 25 15:12:32 m0n0wall ipmon[84]: 15:12:31.627419 ng0 @0:17 b 24.81.234.15,813 -> 200.x.x.x,1080 PR tcp len 20 52 -S IN Jun 25 15:12:44 m0n0wall ipmon[84]: 15:12:43.703665 ng0 @0:15 b 212.23.166.71,80 -> 200.x.x.x,8466 PR tcp len 20 40 -AR IN Jun 25 15:12:46 m0n0wall ipmon[84]: 15:12:46.080718 ng0 @0:15 b 212.23.166.70,80 -> 200.x.x.x,8510 PR tcp len 20 40 -AR IN Jun 25 15:14:15 m0n0wall ipmon[84]: 15:14:15.229178 ng0 @0:15 b 209.85.197.147,80 -> 200.x.x.x,8487 PR tcp len 20 40 -AF IN Jun 25 15:14:16 m0n0wall ipmon[84]: 15:14:16.238398 ng0 @0:15 b 209.85.197.147,80 -> 200.x.x.x,8487 PR tcp len 20 40 -AF IN Jun 25 15:14:18 m0n0wall ipmon[84]: 15:14:18.249087 ng0 @0:15 b 209.85.197.147,80 -> 200.x.x.x,8487 PR tcp len 20 40 -AF IN Jun 25 15:14:22 m0n0wall ipmon[84]: 15:14:22.258684 ng0 @0:15 b 209.85.197.147,80 -> 200.x.x.x,8487 PR tcp len 20 40 -AF IN Jun 25 15:14:30 m0n0wall ipmon[84]: 15:14:30.269956 ng0 @0:15 b 209.85.197.147,80 -> 200.x.x.x,8487 PR tcp len 20 40 -AF IN Jun 25 15:15:14 m0n0wall ipmon[84]: 15:15:14.536591 ng0 @0:17 b 200.67.147.64,3159 -> 200.x.x.x,135 PR tcp len 20 52 -S IN Jun 25 15:15:17 m0n0wall ipmon[84]: 15:15:16.884352 ng0 @0:15 b 72.14.253.165,80 -> 200.x.x.x,4366 PR tcp len 20 40 -AF IN Jun 25 15:15:18 m0n0wall ipmon[84]: 15:15:17.895944 ng0 @0:15 b 72.14.253.165,80 -> 200.x.x.x,4366 PR tcp len 20 40 -AF IN Jun 25 15:15:20 m0n0wall ipmon[84]: 15:15:19.904368 ng0 @0:15 b 72.14.253.165,80 -> 200.x.x.x,4366 PR tcp len 20 40 -AF IN Jun 25 15:15:23 m0n0wall ipmon[84]: 15:15:23.559114 ng0 @0:17 b 200.67.202.200,2304 -> 200.x.x.x,135 PR tcp len 20 48 -S IN Jun 25 15:15:24 m0n0wall ipmon[84]: 15:15:23.914287 ng0 @0:15 b 72.14.253.165,80 -> 200.x.x.x,4366 PR tcp len 20 40 -AF IN Jun 25 15:15:32 m0n0wall ipmon[84]: 15:15:31.925084 ng0 @0:15 b 72.14.253.165,80 -> 200.x.x.x,4366 PR tcp len 20 40 -AF IN |
| ls /conf |
config.xml |
| ls /var/run |
dev.db dhcpd.pid dnsmasq.pid htpasswd ipmon.pid ld-elf.so.hints log mini_httpd.pid mpd.pid msntp.pid runmsntp.pid syslog.pid utmp |
| config.xml |
<?xml version="1.0"?>
<m0n0wall>
<version>1.6</version>
<lastchange>1182802029</lastchange>
<system>
<hostname>m0n0wall</hostname>
<domain>akbmono.net.mx</domain>
<dnsallowoverride/>
<username>admin</username>
<password>xxxxx</password>
<timezone>America/Mexico_City</timezone>
<time-update-interval>300</time-update-interval>
<timeservers>pool.ntp.org</timeservers>
<webgui>
<protocol>http</protocol>
<port/>
<certificate/>
<private-key/>
</webgui>
<harddiskstandby/>
</system>
<interfaces>
<lan>
<if>sis0</if>
<ipaddr>192.168.0.110</ipaddr>
<subnet>24</subnet>
<media/>
<mediaopt/>
</lan>
<wan>
<if>rl1</if>
<mtu/>
<blockpriv/>
<media/>
<mediaopt/>
<spoofmac/>
<ipaddr>pppoe</ipaddr>
</wan>
</interfaces>
<staticroutes/>
<pppoe>
<username>akbalroot</username>
<password>xxxxx</password>
<provider/>
<timeout/>
</pppoe>
<pptp/>
<bigpond/>
<dyndns>
<type>dyndns</type>
<username/>
<password/>
<host/>
<mx/>
<server/>
<port/>
</dyndns>
<dnsupdate/>
<dhcpd>
<lan>
<enable/>
<range>
<from>192.168.0.0</from>
<to>192.168.0.255</to>
</range>
</lan>
</dhcpd>
<pptpd>
<mode/>
<redir/>
<localip/>
<remoteip/>
</pptpd>
<dnsmasq>
<enable/>
</dnsmasq>
<snmpd>
<syslocation/>
<syscontact/>
<rocommunity>public</rocommunity>
</snmpd>
<diag>
<ipv6nat>
<ipaddr/>
</ipv6nat>
</diag>
<bridge>
<filteringbridge/>
</bridge>
<syslog>
<nentries>50</nentries>
<remoteserver/>
<resolve/>
</syslog>
<nat>
<rule>
<protocol>tcp</protocol>
<external-port>25</external-port>
<target>192.168.0.103</target>
<local-port>25</local-port>
<interface>wan</interface>
<descr>SMTP Akbal</descr>
</rule>
<rule>
<protocol>tcp</protocol>
<external-port>80</external-port>
<target>192.168.0.103</target>
<local-port>80</local-port>
<interface>wan</interface>
<descr>Web Akbal</descr>
</rule>
<rule>
<protocol>tcp</protocol>
<external-port>110</external-port>
<target>192.168.0.103</target>
<local-port>110</local-port>
<interface>wan</interface>
<descr>POP3 Akbal</descr>
</rule>
<rule>
<protocol>udp</protocol>
<external-port>53</external-port>
<target>192.168.0.103</target>
<local-port>53</local-port>
<interface>wan</interface>
<descr>DNS Akbal</descr>
</rule>
<rule>
<protocol>tcp</protocol>
<external-port>143</external-port>
<target>192.168.0.103</target>
<local-port>143</local-port>
<interface>wan</interface>
<descr>IMAP Akbal</descr>
</rule>
</nat>
<filter>
<rule>
<interface>wan</interface>
<protocol>udp</protocol>
<source>
<any/>
</source>
<destination>
<address>192.168.0.103</address>
<port>53</port>
</destination>
<descr>NAT DNS Akbal</descr>
</rule>
<rule>
<interface>wan</interface>
<protocol>tcp</protocol>
<source>
<any/>
</source>
<destination>
<address>192.168.0.103</address>
<port>80</port>
</destination>
<descr>NAT Web Akbal</descr>
</rule>
<rule>
<interface>wan</interface>
<protocol>tcp</protocol>
<source>
<any/>
</source>
<destination>
<address>192.168.0.103</address>
<port>25</port>
</destination>
<descr>NAT SMTP Akbal</descr>
</rule>
<rule>
<interface>wan</interface>
<protocol>tcp</protocol>
<source>
<any/>
</source>
<destination>
<address>192.168.0.103</address>
<port>110</port>
</destination>
<descr>NAT POP3 Akbal</descr>
</rule>
<rule>
<interface>wan</interface>
<protocol>tcp</protocol>
<source>
<any/>
</source>
<destination>
<address>192.168.0.103</address>
<port>143</port>
</destination>
<descr>NAT IMAP Akbal</descr>
</rule>
<rule>
<type>pass</type>
<descr>Default LAN -> any</descr>
<interface>lan</interface>
<source>
<network>lan</network>
</source>
<destination>
<any/>
</destination>
</rule>
<tcpidletimeout/>
</filter>
<shaper/>
<ipsec/>
<aliases/>
<proxyarp/>
<wol/>
<vlans/>
</m0n0wall>
|