Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 653060 Details for
Bug 878214
systemctl status firewalld.service - failed
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
nr 2 # gedit /var/log/firewalld &
firewall_villa_log_2.txt (text/plain), 35.00 KB, created by
Flóki Pálsson
on 2012-11-27 19:46:52 UTC
(
hide
)
Description:
nr 2 # gedit /var/log/firewalld &
Filename:
MIME Type:
Creator:
Flóki Pálsson
Created:
2012-11-27 19:46:52 UTC
Size:
35.00 KB
patch
obsolete
>2012-11-27 19:28:59 DEBUG1: start() >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -F >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -X >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -Z >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -P INPUT ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -P OUTPUT ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -P FORWARD ACCEPT >2012-11-27 19:28:59 DEBUG1: Loading firewalld config file '/etc/firewalld/firewalld.conf' >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N INPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N INPUT_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 2 -i lo -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 3 -j INPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 4 -j INPUT_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 5 -p icmp -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 6 -j REJECT --reject-with icmp-host-prohibited >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N FORWARD_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N FORWARD_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 2 -i lo -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 3 -j FORWARD_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 4 -j FORWARD_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 5 -p icmp -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 6 -j REJECT --reject-with icmp-host-prohibited >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N OUTPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I OUTPUT 1 -j OUTPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N PREROUTING_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I PREROUTING 1 -j PREROUTING_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N PREROUTING_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I PREROUTING 2 -j PREROUTING_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N POSTROUTING_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I POSTROUTING 1 -j POSTROUTING_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N INPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I INPUT 1 -j INPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N OUTPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I OUTPUT 1 -j OUTPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N FORWARD_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I FORWARD 1 -j FORWARD_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N PREROUTING_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I PREROUTING 1 -j PREROUTING_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N PREROUTING_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I PREROUTING 2 -j PREROUTING_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N POSTROUTING_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I POSTROUTING 1 -j POSTROUTING_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N POSTROUTING_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I POSTROUTING 2 -j POSTROUTING_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N OUTPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I OUTPUT 1 -j OUTPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N INPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N INPUT_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 2 -i lo -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 3 -j INPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 4 -j INPUT_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 5 -p ipv6-icmp -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 6 -j REJECT --reject-with icmp6-adm-prohibited >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N FORWARD_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N FORWARD_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 2 -i lo -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 3 -j FORWARD_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 4 -j FORWARD_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 5 -p ipv6-icmp -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 6 -j REJECT --reject-with icmp6-adm-prohibited >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N OUTPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I OUTPUT 1 -j OUTPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N PREROUTING_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I PREROUTING 1 -j PREROUTING_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N PREROUTING_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I PREROUTING 2 -j PREROUTING_ZONES >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N POSTROUTING_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I POSTROUTING 1 -j POSTROUTING_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N INPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I INPUT 1 -j INPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N OUTPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I OUTPUT 1 -j OUTPUT_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N FORWARD_direct >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I FORWARD 1 -j FORWARD_direct >2012-11-27 19:28:59 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/echo-request.xml' >2012-11-27 19:28:59 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/time-exceeded.xml' >2012-11-27 19:28:59 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/source-quench.xml' >2012-11-27 19:28:59 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/router-advertisement.xml' >2012-11-27 19:28:59 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/destination-unreachable.xml' >2012-11-27 19:28:59 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/parameter-problem.xml' >2012-11-27 19:28:59 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/echo-reply.xml' >2012-11-27 19:28:59 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/router-solicitation.xml' >2012-11-27 19:28:59 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/redirect.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/bacula-client.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/libvirt.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/ipp.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/imaps.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/cluster-suite.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/http.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/tftp-client.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/mdns.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/nfs.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/dhcpv6-client.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/pop3s.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/https.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/dns.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/openvpn.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/ipp-client.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/radius.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/samba.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/libvirt-tls.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/samba-client.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/ipsec.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/amanda-client.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/ftp.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/tftp.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/telnet.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/bacula.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/smtp.xml' >2012-11-27 19:28:59 DEBUG1: Loading service file '/usr/lib/firewalld/services/ssh.xml' >2012-11-27 19:28:59 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/home.xml' >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_home -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_home_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_home_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_home -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_home_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_home_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_home 1 -t filter -j IN_ZONE_home_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_home 2 -t filter -j IN_ZONE_home_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_home 1 -t filter -j IN_ZONE_home_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_home 2 -t filter -j IN_ZONE_home_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.modules.modules: /sbin/modprobe nf_conntrack_netbios_ns >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/drop.xml' >2012-11-27 19:28:59 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/work.xml' >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_work -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_work_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_work_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_work -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_work_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_work_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_work 1 -t filter -j IN_ZONE_work_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_work 2 -t filter -j IN_ZONE_work_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_work 1 -t filter -j IN_ZONE_work_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_work 2 -t filter -j IN_ZONE_work_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_work_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/external.xml' >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_external -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_external_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_external_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_external -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_external_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_external_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_external 1 -t filter -j IN_ZONE_external_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_external 2 -t filter -j IN_ZONE_external_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_external 1 -t filter -j IN_ZONE_external_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_external 2 -t filter -j IN_ZONE_external_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_external_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_external_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_external -t nat >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_external_deny -t nat >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_external_allow -t nat >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_external 1 -t nat -j POST_ZONE_external_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_external 2 -t nat -j POST_ZONE_external_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_external -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_external_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_external_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_external -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_external_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_external_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_external 1 -t filter -j FWDO_ZONE_external_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_external 2 -t filter -j FWDO_ZONE_external_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_external 1 -t filter -j FWDO_ZONE_external_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_external 2 -t filter -j FWDO_ZONE_external_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A POST_ZONE_external_allow -t nat -j MASQUERADE >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A FWDO_ZONE_external_allow -t filter -j ACCEPT >2012-11-27 19:28:59 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/dmz.xml' >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_dmz -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_dmz_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_dmz_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_dmz -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_dmz_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_dmz_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_dmz 1 -t filter -j IN_ZONE_dmz_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_dmz 2 -t filter -j IN_ZONE_dmz_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_dmz 1 -t filter -j IN_ZONE_dmz_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_dmz 2 -t filter -j IN_ZONE_dmz_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_dmz_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_dmz_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/internal.xml' >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_internal -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_internal_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_internal_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_internal -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_internal_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_internal_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_internal 1 -t filter -j IN_ZONE_internal_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_internal 2 -t filter -j IN_ZONE_internal_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_internal 1 -t filter -j IN_ZONE_internal_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_internal 2 -t filter -j IN_ZONE_internal_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.modules.modules: /sbin/modprobe nf_conntrack_netbios_ns >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/block.xml' >2012-11-27 19:28:59 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/public.xml' >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_public -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_public_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_public_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_public -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_public_deny -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_public_allow -t filter >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_public 1 -t filter -j IN_ZONE_public_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_public 2 -t filter -j IN_ZONE_public_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_public 1 -t filter -j IN_ZONE_public_deny >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_public 2 -t filter -j IN_ZONE_public_allow >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/trusted.xml' >2012-11-27 19:28:59 DEBUG1: Loading zone file '/etc/firewalld/zones/public.xml' >2012-11-27 19:28:59 WARNING: Ignoring deprecated attribute name='public' >2012-11-27 19:28:59 DEBUG1: Overloads zone 'public' ('/usr/lib/firewalld/zones/public.xml') >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 139 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 445 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 139 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 445 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.modules.modules: /sbin/modprobe nf_conntrack_netbios_ns >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 2049 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 2049 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-27 19:28:59 DEBUG2: firewall.core.modules.modules: /sbin/modprobe nf_conntrack_netbios_ns >2012-11-27 19:28:59 DEBUG1: Using default zone 'public' >2012-11-27 19:28:59 DEBUG1: config.IcmpTypeAdded('redirect') >2012-11-27 19:28:59 DEBUG1: config.IcmpTypeAdded('router-solicitation') >2012-11-27 19:28:59 DEBUG1: config.IcmpTypeAdded('parameter-problem') >2012-11-27 19:28:59 DEBUG1: config.IcmpTypeAdded('destination-unreachable') >2012-11-27 19:28:59 DEBUG1: config.IcmpTypeAdded('echo-request') >2012-11-27 19:28:59 DEBUG1: config.IcmpTypeAdded('echo-reply') >2012-11-27 19:28:59 DEBUG1: config.IcmpTypeAdded('source-quench') >2012-11-27 19:28:59 DEBUG1: config.IcmpTypeAdded('time-exceeded') >2012-11-27 19:28:59 DEBUG1: config.IcmpTypeAdded('router-advertisement') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('cluster-suite') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('pop3s') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('bacula-client') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('smtp') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('ipp') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('radius') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('bacula') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('ftp') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('mdns') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('samba') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('dhcpv6-client') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('https') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('openvpn') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('imaps') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('samba-client') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('http') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('dns') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('telnet') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('libvirt') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('ssh') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('ipsec') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('ipp-client') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('amanda-client') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('tftp-client') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('nfs') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('tftp') >2012-11-27 19:28:59 DEBUG1: config.ServiceAdded('libvirt-tls') >2012-11-27 19:28:59 DEBUG1: config.ZoneAdded('block') >2012-11-27 19:28:59 DEBUG1: config.ZoneAdded('drop') >2012-11-27 19:28:59 DEBUG1: config.ZoneAdded('work') >2012-11-27 19:28:59 DEBUG1: config.ZoneAdded('internal') >2012-11-27 19:28:59 DEBUG1: config.ZoneAdded('external') >2012-11-27 19:28:59 DEBUG1: config.ZoneAdded('home') >2012-11-27 19:28:59 DEBUG1: config.ZoneAdded('dmz') >2012-11-27 19:28:59 DEBUG1: config.ZoneAdded('public') >2012-11-27 19:28:59 DEBUG1: config.ZoneAdded('trusted')
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 878214
:
652329
| 653060 |
653659
|
656347
|
657460