Starting from the date 2017.1.2 in the collecting routers data I have no captured data for port 23. In “Data collection” in Foris is a monitoring for port 23 = ON, the port is open. There is no my other rule for port forwarding this port.
The previous days it was on port 23 captured an average of 800-1000 records.
Tell me please, how to start control problem.
…
Edited 9.1.2017 — the problem remains - no data for port 23.
Chain ucollect_fake (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
1 41.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0xc0000/0xc0000
0 0.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:2323 redir ports 3692
1 40.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:23 redir ports 1392
0 0.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3128 redir ports 4497
0 0.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080 redir ports 9449
0 0.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 redir ports 1449
0 0.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8123 redir ports 9492
ALL Table: Filter
Chain INPUT (Policy: DROP, Packets: 0, Traffic: 0.00 B)
Pkts. Traffic Target Prot. In Out Source Destination Options
22 2.11 KB delegate_input all * * 0.0.0.0/0 0.0.0.0/0 -
Chain FORWARD (Policy: DROP, Packets: 0, Traffic: 0.00 B)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B delegate_forward all * * 0.0.0.0/0 0.0.0.0/0 -
Chain OUTPUT (Policy: DROP, Packets: 0, Traffic: 0.00 B)
Pkts. Traffic Target Prot. In Out Source Destination Options
24 1.80 KB delegate_output all * * 0.0.0.0/0 0.0.0.0/0 -
Chain accept (References: 12)
Pkts. Traffic Target Prot. In Out Source Destination Options
7 663.00 B turris all * * 0.0.0.0/0 0.0.0.0/0 -
7 663.00 B ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 -
Chain delegate_forward (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B forwarding_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for forwarding */
0 0.00 B ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0.00 B zone_lan_forward all br-lan * 0.0.0.0/0 0.0.0.0/0 -
0 0.00 B zone_wan_forward all eth1 * 0.0.0.0/0 0.0.0.0/0 -
0 0.00 B reject all * * 0.0.0.0/0 0.0.0.0/0 -
Chain delegate_input (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
12 938.00 B ACCEPT all lo * 0.0.0.0/0 0.0.0.0/0 -
10 1.20 KB input_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for input */
6 1.03 KB ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
1 40.00 B syn_flood tcp * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02
2 81.00 B ucollect_fake_accept all * * 0.0.0.0/0 0.0.0.0/0 -
0 0.00 B zone_lan_input all br-lan * 0.0.0.0/0 0.0.0.0/0 -
3 134.00 B zone_wan_input all eth1 * 0.0.0.0/0 0.0.0.0/0 -
0 0.00 B accept all * * 0.0.0.0/0 0.0.0.0/0 -
Chain delegate_output (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
12 938.00 B ACCEPT all * lo 0.0.0.0/0 0.0.0.0/0 -
12 907.00 B output_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for output */
5 244.00 B ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
1 238.00 B zone_lan_output all * br-lan 0.0.0.0/0 0.0.0.0/0 -
6 425.00 B zone_wan_output all * eth1 0.0.0.0/0 0.0.0.0/0 -
0 0.00 B accept all * * 0.0.0.0/0 0.0.0.0/0 -
Chain drop (References: 0)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B turris-log-incoming all eth1 * 0.0.0.0/0 0.0.0.0/0 -
0 0.00 B DROP all * * 0.0.0.0/0 0.0.0.0/0 -
Chain forwarding_rule (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B turris-nflog all * * 0.0.0.0/0 0.0.0.0/0 -
Chain input_rule (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
10 1.20 KB turris-nflog all * * 0.0.0.0/0 0.0.0.0/0 -
Chain output_rule (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
12 907.00 B turris-nflog all * * 0.0.0.0/0 0.0.0.0/0 -
Chain reject (References: 3)
Pkts. Traffic Target Prot. In Out Source Destination Options
3 134.00 B turris-log-incoming all eth1 * 0.0.0.0/0 0.0.0.0/0 -
3 134.00 B REJECT tcp * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset
0 0.00 B REJECT all * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
Chain syn_flood (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
1 40.00 B RETURN tcp * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 25/sec burst 50
0 0.00 B DROP all * * 0.0.0.0/0 0.0.0.0/0 -
Chain turris (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00005E11_l_a_4_X dst LOG flags 0 level 7 prefix "turris-00005E11: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00005E11_l_a_4_X src LOG flags 0 level 7 prefix "turris-00005E11: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00415B11_l_a_4_X dst LOG flags 0 level 7 prefix "turris-00415B11: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00415B11_l_a_4_X src LOG flags 0 level 7 prefix "turris-00415B11: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00557B71_l_ap_4_X dst,dst LOG flags 0 level 7 prefix "turris-00557B71: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00557B71_l_ap_4_X src,src LOG flags 0 level 7 prefix "turris-00557B71: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_007E0511_l_a_4_X dst LOG flags 0 level 7 prefix "turris-007E0511: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_007E0511_l_a_4_X src LOG flags 0 level 7 prefix "turris-007E0511: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_009A7E41_l_a_4_X dst LOG flags 0 level 7 prefix "turris-009A7E41: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_009A7E41_l_a_4_X src LOG flags 0 level 7 prefix "turris-009A7E41: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00A704A1_l_a_4_X dst LOG flags 0 level 7 prefix "turris-00A704A1: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00A704A1_l_a_4_X src LOG flags 0 level 7 prefix "turris-00A704A1: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00CE6701_l_a_4_X dst LOG flags 0 level 7 prefix "turris-00CE6701: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00CE6701_l_a_4_X src LOG flags 0 level 7 prefix "turris-00CE6701: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00D05711_l_a_4_X dst LOG flags 0 level 7 prefix "turris-00D05711: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00D05711_l_a_4_X src LOG flags 0 level 7 prefix "turris-00D05711: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00DEAD51_l_a_4_X dst LOG flags 0 level 7 prefix "turris-00DEAD51: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00DEAD51_l_a_4_X src LOG flags 0 level 7 prefix "turris-00DEAD51: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00DEB060_lb_a_4_X dst LOG flags 0 level 7 prefix "turris-00DEB060: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00DEB060_lb_a_4_X src LOG flags 0 level 7 prefix "turris-00DEB060: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00FE0D01_l_a_4_X dst LOG flags 0 level 7 prefix "turris-00FE0D01: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00FE0D01_l_a_4_X src LOG flags 0 level 7 prefix "turris-00FE0D01: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_047C0DE1_l_a_4_X dst LOG flags 0 level 7 prefix "turris-047C0DE1: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_047C0DE1_l_a_4_X src LOG flags 0 level 7 prefix "turris-047C0DE1: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_06E7E701_l_a_4_X dst LOG flags 0 level 7 prefix "turris-06E7E701: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_06E7E701_l_a_4_X src LOG flags 0 level 7 prefix "turris-06E7E701: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_07E7E411_l_a_4_X dst LOG flags 0 level 7 prefix "turris-07E7E411: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_07E7E411_l_a_4_X src LOG flags 0 level 7 prefix "turris-07E7E411: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_0A566041_l_ap_4_X dst,dst LOG flags 0 level 7 prefix "turris-0A566041: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_0A566041_l_ap_4_X src,src LOG flags 0 level 7 prefix "turris-0A566041: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_0A7D7011_l_a_4_X dst LOG flags 0 level 7 prefix "turris-0A7D7011: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_0A7D7011_l_a_4_X src LOG flags 0 level 7 prefix "turris-0A7D7011: "
0 0.00 B LOG all * eth1 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_100FA4E0_lb_a_4_X dst LOG flags 0 level 7 prefix "turris-100FA4E0: "
0 0.00 B LOG all eth1 * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_100FA4E0_lb_a_4_X src LOG flags 0 level 7 prefix "turris-100FA4E0: "
0 0.00 B DROP all * eth1 0.0.0.0/0 0.0.0.0/0 match-set turris_00DEB060_lb_a_4_X dst
0 0.00 B DROP all eth1 * 0.0.0.0/0 0.0.0.0/0 match-set turris_00DEB060_lb_a_4_X src
0 0.00 B DROP all * eth1 0.0.0.0/0 0.0.0.0/0 match-set turris_100FA4E0_lb_a_4_X dst
0 0.00 B DROP all eth1 * 0.0.0.0/0 0.0.0.0/0 match-set turris_100FA4E0_lb_a_4_X src
Chain turris-log-incoming (References: 2)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00005E11_l_a_4_X src LOG flags 0 level 7 prefix "turris-00005E11: "
1 41.00 B ucollect_fake all * * 0.0.0.0/0 0.0.0.0/0 -
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00415B11_l_a_4_X src LOG flags 0 level 7 prefix "turris-00415B11: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00557B71_l_ap_4_X src,src LOG flags 0 level 7 prefix "turris-00557B71: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_007E0511_l_a_4_X src LOG flags 0 level 7 prefix "turris-007E0511: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_009A7E41_l_a_4_X src LOG flags 0 level 7 prefix "turris-009A7E41: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00A704A1_l_a_4_X src LOG flags 0 level 7 prefix "turris-00A704A1: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00CE6701_l_a_4_X src LOG flags 0 level 7 prefix "turris-00CE6701: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00D05711_l_a_4_X src LOG flags 0 level 7 prefix "turris-00D05711: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00DEAD51_l_a_4_X src LOG flags 0 level 7 prefix "turris-00DEAD51: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00DEB060_lb_a_4_X src LOG flags 0 level 7 prefix "turris-00DEB060: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_00FE0D01_l_a_4_X src LOG flags 0 level 7 prefix "turris-00FE0D01: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_047C0DE1_l_a_4_X src LOG flags 0 level 7 prefix "turris-047C0DE1: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_06E7E701_l_a_4_X src LOG flags 0 level 7 prefix "turris-06E7E701: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_07E7E411_l_a_4_X src LOG flags 0 level 7 prefix "turris-07E7E411: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_0A566041_l_ap_4_X src,src LOG flags 0 level 7 prefix "turris-0A566041: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_0A7D7011_l_a_4_X src LOG flags 0 level 7 prefix "turris-0A7D7011: "
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 match-set turris_100FA4E0_lb_a_4_X src LOG flags 0 level 7 prefix "turris-100FA4E0: "
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_00005E11_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_00415B11_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_00557B71_l_ap_4_X src,src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_007E0511_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_009A7E41_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_00A704A1_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_00CE6701_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_00D05711_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_00DEAD51_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_00DEB060_lb_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_00FE0D01_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_047C0DE1_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_06E7E701_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_07E7E411_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_0A566041_l_ap_4_X src,src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_0A7D7011_l_a_4_X src
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 match-set turris_100FA4E0_lb_a_4_X src
3 134.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 500 LOG flags 0 level 7 prefix "turris-00000000: "
Chain ucollect_fake (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B LOG all * * 0.0.0.0/0 0.0.0.0/0 mark match 0x80000/0xc0000 limit: avg 100/sec burst 200 LOG flags 0 level 7 prefix "ucollect-fake-open-inet: "
0 0.00 B DROP all * * 0.0.0.0/0 0.0.0.0/0 mark match 0x80000/0xc0000
Chain ucollect_fake_accept (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B ACCEPT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3692 mark match 0xc0000/0xc0000
1 40.00 B ACCEPT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:1392 mark match 0xc0000/0xc0000
0 0.00 B ACCEPT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4497 mark match 0xc0000/0xc0000
0 0.00 B ACCEPT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:9449 mark match 0xc0000/0xc0000
0 0.00 B ACCEPT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:1449 mark match 0xc0000/0xc0000
0 0.00 B ACCEPT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:9492 mark match 0xc0000/0xc0000
Chain zone_lan_dest_accept (References: 4)
Pkts. Traffic Target Prot. In Out Source Destination Options
1 238.00 B accept all * br-lan 0.0.0.0/0 0.0.0.0/0 -
Chain zone_lan_forward (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B forwarding_lan_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for forwarding */
0 0.00 B zone_wan_dest_accept tcp * * 0.0.0.0/0 0.0.0.0/0 /* Default ven */
0 0.00 B zone_wan_dest_accept udp * * 0.0.0.0/0 0.0.0.0/0 /* Default ven */
0 0.00 B zone_wan_dest_accept all * * 0.0.0.0/0 0.0.0.0/0 /* forwarding lan -> wan */
0 0.00 B accept all * * 0.0.0.0/0 0.0.0.0/0 ctstate DNAT /* Accept port forwards */
0 0.00 B zone_lan_dest_accept all * * 0.0.0.0/0 0.0.0.0/0 -
Chain zone_lan_input (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B input_lan_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for input */
0 0.00 B accept all * * 0.0.0.0/0 0.0.0.0/0 ctstate DNAT /* Accept port redirections */
0 0.00 B zone_lan_src_accept all * * 0.0.0.0/0 0.0.0.0/0 -
Chain zone_lan_output (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
1 238.00 B output_lan_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for output */
1 238.00 B zone_lan_dest_accept all * * 0.0.0.0/0 0.0.0.0/0 -
Chain zone_lan_src_accept (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B accept all br-lan * 0.0.0.0/0 0.0.0.0/0 -
Chain zone_wan_dest_REJECT (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B reject all * eth1 0.0.0.0/0 0.0.0.0/0 -
Chain zone_wan_dest_accept (References: 4)
Pkts. Traffic Target Prot. In Out Source Destination Options
6 425.00 B accept all * eth1 0.0.0.0/0 0.0.0.0/0 -
Chain zone_wan_forward (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B MINIUPNPD all * * 0.0.0.0/0 0.0.0.0/0 -
0 0.00 B forwarding_wan_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for forwarding */
0 0.00 B zone_lan_dest_accept esp * * 0.0.0.0/0 0.0.0.0/0 /* VPN */
0 0.00 B zone_lan_dest_accept udp * * 0.0.0.0/0 0.0.0.0/0 udp dpt:500 /* VPN */
0 0.00 B accept all * * 0.0.0.0/0 0.0.0.0/0 ctstate DNAT /* Accept port forwards */
0 0.00 B zone_wan_dest_REJECT all * * 0.0.0.0/0 0.0.0.0/0 -
Chain zone_wan_input (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
3 134.00 B input_wan_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for input */
0 0.00 B accept udp * * 0.0.0.0/0 0.0.0.0/0 udp dpt:68 /* Allow-DHCP-Renew */
0 0.00 B accept icmp * * 0.0.0.0/0 0.0.0.0/0 icmptype 8 /* Allow-Ping */
0 0.00 B accept 2 * * 0.0.0.0/0 0.0.0.0/0 /* Allow-IGMP */
0 0.00 B accept all * * 0.0.0.0/0 0.0.0.0/0 ctstate DNAT /* Accept port redirections */
3 134.00 B zone_wan_src_REJECT all * * 0.0.0.0/0 0.0.0.0/0 -
Chain zone_wan_output (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
6 425.00 B output_wan_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for output */
6 425.00 B zone_wan_dest_accept all * * 0.0.0.0/0 0.0.0.0/0 -
Chain zone_wan_src_REJECT (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
3 134.00 B reject all eth1 * 0.0.0.0/0 0.0.0.0/0 -
Table: NAT
Chain PREROUTING (Policy: ACCEPT, Packets: 1, Traffic: 41.00 B)
Pkts. Traffic Target Prot. In Out Source Destination Options
3 122.00 B delegate_prerouting all * * 0.0.0.0/0 0.0.0.0/0 -
2 81.00 B ucollect_fake all * * 0.0.0.0/0 0.0.0.0/0 -
Chain POSTROUTING (Policy: ACCEPT, Packets: 2, Traffic: 356.00 B)
Pkts. Traffic Target Prot. In Out Source Destination Options
10 887.00 B delegate_postrouting all * * 0.0.0.0/0 0.0.0.0/0 -
Chain delegate_postrouting (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
10 887.00 B postrouting_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for postrouting */
1 238.00 B zone_lan_postrouting all * br-lan 0.0.0.0/0 0.0.0.0/0 -
7 465.00 B zone_wan_postrouting all * eth1 0.0.0.0/0 0.0.0.0/0 -
Chain delegate_prerouting (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
3 122.00 B prerouting_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for prerouting */
0 0.00 B zone_lan_prerouting all br-lan * 0.0.0.0/0 0.0.0.0/0 -
3 122.00 B zone_wan_prerouting all eth1 * 0.0.0.0/0 0.0.0.0/0 -
Chain ucollect_fake (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
1 41.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0xc0000/0xc0000
0 0.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:2323 redir ports 3692
1 40.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:23 redir ports 1392
0 0.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3128 redir ports 4497
0 0.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080 redir ports 9449
0 0.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 redir ports 1449
0 0.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8123 redir ports 9492
Chain zone_lan_postrouting (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
1 238.00 B postrouting_lan_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for postrouting */
0 0.00 B SNAT tcp * * 192.168.2.0/24 192.168.2.110 tcp dpt:5001 /* NAS interface (reflection) */ to:192.168.2.1
0 0.00 B SNAT udp * * 192.168.2.0/24 192.168.2.110 udp dpt:5001 /* NAS interface (reflection) */ to:192.168.2.1
0 0.00 B SNAT tcp * * 192.168.2.0/24 192.168.2.110 tcp dpt:443 /* NAS HTTPS (reflection) */ to:192.168.2.1
Chain zone_lan_prerouting (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B prerouting_lan_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for prerouting */
0 0.00 B DNAT tcp * * 192.168.2.0/24 10.109.54.199 tcp dpt:5001 /* NAS interface (reflection) */ to:192.168.2.110:5001
0 0.00 B DNAT udp * * 192.168.2.0/24 10.109.54.199 udp dpt:5001 /* NAS interface (reflection) */ to:192.168.2.110:5001
0 0.00 B DNAT tcp * * 192.168.2.0/24 10.109.54.199 tcp dpt:443 /* NAS HTTPS (reflection) */ to:192.168.2.110:443
Chain zone_wan_postrouting (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
7 465.00 B postrouting_wan_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for postrouting */
7 465.00 B MASQUERADE all * * 0.0.0.0/0 0.0.0.0/0 -
Chain zone_wan_prerouting (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
1 41.00 B MINIUPNPD all * * 0.0.0.0/0 0.0.0.0/0 -
3 122.00 B prerouting_wan_rule all * * 0.0.0.0/0 0.0.0.0/0 /* user chain for prerouting */
0 0.00 B REDIRECT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 /* Turris Honeypot */ redir ports 58732
0 0.00 B DNAT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:5001 /* NAS interface */ to:192.168.2.110:5001
0 0.00 B DNAT udp * * 0.0.0.0/0 0.0.0.0/0 udp dpt:5001 /* NAS interface */ to:192.168.2.110:5001
0 0.00 B DNAT tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 /* NAS HTTPS */ to:192.168.2.110:443
Table: Mangle
Chain PREROUTING (Policy: ACCEPT, Packets: 20, Traffic: 2.02 KB)
Pkts. Traffic Target Prot. In Out Source Destination Options
22 2.11 KB fwmark all * * 0.0.0.0/0 0.0.0.0/0 -
20 2.02 KB ucollect_fake all * * 0.0.0.0/0 0.0.0.0/0 -
Chain FORWARD (Policy: ACCEPT, Packets: 0, Traffic: 0.00 B)
Pkts. Traffic Target Prot. In Out Source Destination Options
0 0.00 B mssfix all * * 0.0.0.0/0 0.0.0.0/0 -
Chain ucollect_fake (References: 1)
Pkts. Traffic Target Prot. In Out Source Destination Options
20 2.02 KB MARK all * * 0.0.0.0/0 0.0.0.0/0 MARK and 0xfff3ffff
0 0.00 B MARK tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:2323 MARK xset 0x40000/0xc0000
1 40.00 B MARK tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:23 MARK xset 0x40000/0xc0000
0 0.00 B MARK tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3128 MARK xset 0x40000/0xc0000
0 0.00 B MARK tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080 MARK xset 0x40000/0xc0000
1 666.00 B MARK tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 MARK xset 0x40000/0xc0000
0 0.00 B MARK tcp * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8123 MARK xset 0x40000/0xc0000
18 1.33 KB RETURN all * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x40000/0xc0000
0 0.00 B MARK all * * 0.0.0.0/0 127.0.0.1 MARK xset 0x80000/0xc0000
1 40.00 B MARK all * * 0.0.0.0/0 10.109.54.199 MARK xset 0x80000/0xc0000
1 666.00 B MARK all * * 0.0.0.0/0 192.168.2.1 MARK xset 0x80000/0xc0000
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x80000/0xc0000
0 0.00 B MARK all * * 0.0.0.0/0 0.0.0.0/0 match-set ucollect_fake_exc_inet src,dst,dst MARK or 0xc0000
0 0.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 mark match 0xc0000/0xc0000
1 666.00 B RETURN all * * 0.0.0.0/0 0.0.0.0/0 socket --nowildcard
1 40.00 B MARK all * * 0.0.0.0/0 0.0.0.0/0 MARK or 0xc0000
Table: Raw
Chain PREROUTING (Policy: ACCEPT, Packets: 22, Traffic: 2.11 KB)
Pkts. Traffic Target Prot. In Out Source Destination Options
22 2.11 KB delegate_notrack all * * 0.0.0.0/0 0.0.0.0/0 -