Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 699865 Details for
Bug 912666
Connection timeout if wireless and wired connections are both active
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
firewalld log
firewalld (text/plain), 64.78 KB, created by
Gianluca Sforna
on 2013-02-20 07:44:21 UTC
(
hide
)
Description:
firewalld log
Filename:
MIME Type:
Creator:
Gianluca Sforna
Created:
2013-02-20 07:44:21 UTC
Size:
64.78 KB
patch
obsolete
>2013-02-20 08:39:03 DEBUG1: start() >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -L >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -L >2013-02-20 08:39:03 DEBUG2: firewall.core.ebtables.ebtables: /sbin/ebtables -L >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -F >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -X >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -Z >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -F >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -X >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -Z >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -P INPUT ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -P OUTPUT ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -P FORWARD ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -P INPUT ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -P OUTPUT ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -P FORWARD ACCEPT >2013-02-20 08:39:03 DEBUG1: Loading firewalld config file '/etc/firewalld/firewalld.conf' >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N INPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N INPUT_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 2 -i lo -j ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 3 -j INPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 4 -j INPUT_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 5 -p icmp -j ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 6 -j REJECT --reject-with icmp-host-prohibited >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N FORWARD_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N FORWARD_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 2 -i lo -j ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 3 -j FORWARD_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 4 -j FORWARD_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 5 -p icmp -j ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 6 -j REJECT --reject-with icmp-host-prohibited >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N OUTPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I OUTPUT 1 -j OUTPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N PREROUTING_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I PREROUTING 1 -j PREROUTING_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N PREROUTING_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I PREROUTING 2 -j PREROUTING_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N POSTROUTING_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I POSTROUTING 1 -j POSTROUTING_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N INPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I INPUT 1 -j INPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N OUTPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I OUTPUT 1 -j OUTPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N FORWARD_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I FORWARD 1 -j FORWARD_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N PREROUTING_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I PREROUTING 1 -j PREROUTING_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N PREROUTING_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I PREROUTING 2 -j PREROUTING_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N POSTROUTING_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I POSTROUTING 1 -j POSTROUTING_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N POSTROUTING_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I POSTROUTING 2 -j POSTROUTING_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N OUTPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I OUTPUT 1 -j OUTPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N INPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N INPUT_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 2 -i lo -j ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 3 -j INPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 4 -j INPUT_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 5 -p ipv6-icmp -j ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 6 -j REJECT --reject-with icmp6-adm-prohibited >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N FORWARD_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N FORWARD_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 2 -i lo -j ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 3 -j FORWARD_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 4 -j FORWARD_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 5 -p ipv6-icmp -j ACCEPT >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 6 -j REJECT --reject-with icmp6-adm-prohibited >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N OUTPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I OUTPUT 1 -j OUTPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N PREROUTING_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I PREROUTING 1 -j PREROUTING_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N PREROUTING_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I PREROUTING 2 -j PREROUTING_ZONES >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N POSTROUTING_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I POSTROUTING 1 -j POSTROUTING_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N INPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I INPUT 1 -j INPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N OUTPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I OUTPUT 1 -j OUTPUT_direct >2013-02-20 08:39:03 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N FORWARD_direct >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I FORWARD 1 -j FORWARD_direct >2013-02-20 08:39:04 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/destination-unreachable.xml' >2013-02-20 08:39:04 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/router-solicitation.xml' >2013-02-20 08:39:04 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/redirect.xml' >2013-02-20 08:39:04 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/source-quench.xml' >2013-02-20 08:39:04 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/echo-request.xml' >2013-02-20 08:39:04 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/parameter-problem.xml' >2013-02-20 08:39:04 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/time-exceeded.xml' >2013-02-20 08:39:04 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/echo-reply.xml' >2013-02-20 08:39:04 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/router-advertisement.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/cluster-suite.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/smtp.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/nfs.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/ipp-client.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/bacula-client.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/mdns.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/dhcpv6-client.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/ssh.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/imaps.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/samba.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/ftp.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/libvirt-tls.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/ntp.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/samba-client.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/vnc-server.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/openvpn.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/amanda-client.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/tftp.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/libvirt.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/ipsec.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/telnet.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/bacula.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/radius.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/ipp.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/http.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/dns.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/pop3s.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/tftp-client.xml' >2013-02-20 08:39:04 DEBUG1: Loading service file '/usr/lib/firewalld/services/https.xml' >2013-02-20 08:39:04 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/public.xml' >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_public -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_public_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_public_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_public -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_public_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_public_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_public 1 -t filter -j IN_ZONE_public_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_public 2 -t filter -j IN_ZONE_public_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_public 1 -t filter -j IN_ZONE_public_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_public 2 -t filter -j IN_ZONE_public_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/drop.xml' >2013-02-20 08:39:04 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/trusted.xml' >2013-02-20 08:39:04 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/work.xml' >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_work -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_work_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_work_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_work -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_work_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_work_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_work 1 -t filter -j IN_ZONE_work_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_work 2 -t filter -j IN_ZONE_work_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_work 1 -t filter -j IN_ZONE_work_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_work 2 -t filter -j IN_ZONE_work_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_work_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/home.xml' >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_home -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_home_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_home_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_home -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_home_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_home_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_home 1 -t filter -j IN_ZONE_home_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_home 2 -t filter -j IN_ZONE_home_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_home 1 -t filter -j IN_ZONE_home_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_home 2 -t filter -j IN_ZONE_home_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.modules.modules: /sbin/modprobe nf_conntrack_netbios_ns >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/dmz.xml' >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_dmz -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_dmz_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_dmz_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_dmz -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_dmz_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_dmz_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_dmz 1 -t filter -j IN_ZONE_dmz_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_dmz 2 -t filter -j IN_ZONE_dmz_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_dmz 1 -t filter -j IN_ZONE_dmz_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_dmz 2 -t filter -j IN_ZONE_dmz_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_dmz_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_dmz_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/external.xml' >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_external -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_external_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_external_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_external -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_external_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_external_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_external 1 -t filter -j IN_ZONE_external_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_external 2 -t filter -j IN_ZONE_external_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_external 1 -t filter -j IN_ZONE_external_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_external 2 -t filter -j IN_ZONE_external_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_external_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_external_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_external -t nat >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_external_deny -t nat >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_external_allow -t nat >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_external 1 -t nat -j POST_ZONE_external_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_external 2 -t nat -j POST_ZONE_external_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_external -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_external_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_external_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_external -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_external_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_external_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_external 1 -t filter -j FWDO_ZONE_external_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_external 2 -t filter -j FWDO_ZONE_external_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_external 1 -t filter -j FWDO_ZONE_external_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_external 2 -t filter -j FWDO_ZONE_external_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A POST_ZONE_external_allow -t nat -j MASQUERADE >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A FWDO_ZONE_external_allow -t filter -j ACCEPT >2013-02-20 08:39:04 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/internal.xml' >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_internal -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_internal_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_internal_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_internal -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_internal_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_internal_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_internal 1 -t filter -j IN_ZONE_internal_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_internal 2 -t filter -j IN_ZONE_internal_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_internal 1 -t filter -j IN_ZONE_internal_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_internal 2 -t filter -j IN_ZONE_internal_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG2: firewall.core.modules.modules: /sbin/modprobe nf_conntrack_netbios_ns >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2013-02-20 08:39:04 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/block.xml' >2013-02-20 08:39:04 DEBUG1: Using default zone 'public' >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_public -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_public_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_public_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_public -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_public_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_public_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_public 1 -t filter -j FWDO_ZONE_public_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_public 2 -t filter -j FWDO_ZONE_public_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_public 1 -t filter -j FWDO_ZONE_public_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_public 2 -t filter -j FWDO_ZONE_public_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDI_ZONE_public -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDI_ZONE_public_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDI_ZONE_public_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDI_ZONE_public -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDI_ZONE_public_deny -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDI_ZONE_public_allow -t filter >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDI_ZONE_public 1 -t filter -j FWDI_ZONE_public_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDI_ZONE_public 2 -t filter -j FWDI_ZONE_public_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDI_ZONE_public 1 -t filter -j FWDI_ZONE_public_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDI_ZONE_public 2 -t filter -j FWDI_ZONE_public_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public -t mangle >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public_deny -t mangle >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public_allow -t mangle >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N PRE_ZONE_public -t mangle >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N PRE_ZONE_public_deny -t mangle >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N PRE_ZONE_public_allow -t mangle >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PRE_ZONE_public 1 -t mangle -j PRE_ZONE_public_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PRE_ZONE_public 2 -t mangle -j PRE_ZONE_public_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I PRE_ZONE_public 1 -t mangle -j PRE_ZONE_public_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I PRE_ZONE_public 2 -t mangle -j PRE_ZONE_public_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public -t nat >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public_deny -t nat >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public_allow -t nat >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PRE_ZONE_public 1 -t nat -j PRE_ZONE_public_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PRE_ZONE_public 2 -t nat -j PRE_ZONE_public_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_public -t nat >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_public_deny -t nat >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_public_allow -t nat >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_public 1 -t nat -j POST_ZONE_public_deny >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_public 2 -t nat -j POST_ZONE_public_allow >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A INPUT_ZONES -t filter -i + -j IN_ZONE_public >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A INPUT_ZONES -t filter -i + -j IN_ZONE_public >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A FORWARD_ZONES -t filter -o + -j FWDO_ZONE_public >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A FORWARD_ZONES -t filter -o + -j FWDO_ZONE_public >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A FORWARD_ZONES -t filter -i + -j FWDI_ZONE_public >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A FORWARD_ZONES -t filter -i + -j FWDI_ZONE_public >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A PREROUTING_ZONES -t mangle -i + -j PRE_ZONE_public >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A PREROUTING_ZONES -t nat -i + -j PRE_ZONE_public >2013-02-20 08:39:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A POSTROUTING_ZONES -t nat -o + -j POST_ZONE_public >2013-02-20 08:39:04 DEBUG1: config.IcmpTypeAdded('redirect') >2013-02-20 08:39:04 DEBUG1: config.IcmpTypeAdded('router-solicitation') >2013-02-20 08:39:04 DEBUG1: config.IcmpTypeAdded('parameter-problem') >2013-02-20 08:39:04 DEBUG1: config.IcmpTypeAdded('destination-unreachable') >2013-02-20 08:39:04 DEBUG1: config.IcmpTypeAdded('echo-request') >2013-02-20 08:39:04 DEBUG1: config.IcmpTypeAdded('echo-reply') >2013-02-20 08:39:04 DEBUG1: config.IcmpTypeAdded('source-quench') >2013-02-20 08:39:04 DEBUG1: config.IcmpTypeAdded('time-exceeded') >2013-02-20 08:39:04 DEBUG1: config.IcmpTypeAdded('router-advertisement') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('cluster-suite') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('pop3s') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('bacula-client') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('smtp') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('ipp') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('radius') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('bacula') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('ftp') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('mdns') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('samba') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('dhcpv6-client') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('https') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('openvpn') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('imaps') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('samba-client') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('http') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('dns') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('ntp') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('vnc-server') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('telnet') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('libvirt') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('ssh') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('ipsec') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('ipp-client') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('amanda-client') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('tftp-client') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('nfs') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('tftp') >2013-02-20 08:39:04 DEBUG1: config.ServiceAdded('libvirt-tls') >2013-02-20 08:39:04 DEBUG1: config.ZoneAdded('drop') >2013-02-20 08:39:04 DEBUG1: config.ZoneAdded('work') >2013-02-20 08:39:04 DEBUG1: config.ZoneAdded('internal') >2013-02-20 08:39:04 DEBUG1: config.ZoneAdded('external') >2013-02-20 08:39:04 DEBUG1: config.ZoneAdded('trusted') >2013-02-20 08:39:04 DEBUG1: config.ZoneAdded('home') >2013-02-20 08:39:04 DEBUG1: config.ZoneAdded('dmz') >2013-02-20 08:39:04 DEBUG1: config.ZoneAdded('public') >2013-02-20 08:39:04 DEBUG1: config.ZoneAdded('block') >2013-02-20 08:39:05 DEBUG1: zone.addInterface('', 'wlan0') >2013-02-20 08:39:05 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I INPUT_ZONES 1 -t filter -i wlan0 -j IN_ZONE_public >2013-02-20 08:39:05 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I INPUT_ZONES 1 -t filter -i wlan0 -j IN_ZONE_public >2013-02-20 08:39:05 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FORWARD_ZONES 1 -t filter -o wlan0 -j FWDO_ZONE_public >2013-02-20 08:39:05 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FORWARD_ZONES 1 -t filter -o wlan0 -j FWDO_ZONE_public >2013-02-20 08:39:05 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FORWARD_ZONES 1 -t filter -i wlan0 -j FWDI_ZONE_public >2013-02-20 08:39:05 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FORWARD_ZONES 1 -t filter -i wlan0 -j FWDI_ZONE_public >2013-02-20 08:39:05 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PREROUTING_ZONES 1 -t mangle -i wlan0 -j PRE_ZONE_public >2013-02-20 08:39:06 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PREROUTING_ZONES 1 -t nat -i wlan0 -j PRE_ZONE_public >2013-02-20 08:39:06 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POSTROUTING_ZONES 1 -t nat -o wlan0 -j POST_ZONE_public >2013-02-20 08:39:06 DEBUG1: zone.InterfaceAdded('public', 'wlan0') >2013-02-20 08:39:06 DEBUG1: direct.passthrough('ipv4', '--table','nat','--delete','POSTROUTING','--source','192.168.100.0/24','-p','tcp','!','--destination','192.168.100.0/24','--jump','MASQUERADE','--to-ports','1024-65535') >2013-02-20 08:39:06 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table nat --delete POSTROUTING --source 192.168.100.0/24 -p tcp ! --destination 192.168.100.0/24 --jump MASQUERADE --to-ports 1024-65535 >2013-02-20 08:39:06 DEBUG2: '/sbin/iptables --table nat --delete POSTROUTING --source 192.168.100.0/24 -p tcp ! --destination 192.168.100.0/24 --jump MASQUERADE --to-ports 1024-65535' failed: iptables: No chain/target/match by that name. >2013-02-20 08:39:06 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table nat --delete POSTROUTING --source 192.168.100.0/24 -p tcp ! --destination 192.168.100.0/24 --jump MASQUERADE --to-ports 1024-65535' failed: iptables: No chain/target/match by that name. >2013-02-20 08:39:06 DEBUG1: direct.passthrough('ipv4', '--table','nat','--delete','POSTROUTING','--source','192.168.100.0/24','-p','udp','!','--destination','192.168.100.0/24','--jump','MASQUERADE','--to-ports','1024-65535') >2013-02-20 08:39:06 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table nat --delete POSTROUTING --source 192.168.100.0/24 -p udp ! --destination 192.168.100.0/24 --jump MASQUERADE --to-ports 1024-65535 >2013-02-20 08:39:06 DEBUG2: '/sbin/iptables --table nat --delete POSTROUTING --source 192.168.100.0/24 -p udp ! --destination 192.168.100.0/24 --jump MASQUERADE --to-ports 1024-65535' failed: iptables: No chain/target/match by that name. >2013-02-20 08:39:06 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table nat --delete POSTROUTING --source 192.168.100.0/24 -p udp ! --destination 192.168.100.0/24 --jump MASQUERADE --to-ports 1024-65535' failed: iptables: No chain/target/match by that name. >2013-02-20 08:39:06 DEBUG1: direct.passthrough('ipv4', '--table','nat','--delete','POSTROUTING','--source','192.168.100.0/24','!','--destination','192.168.100.0/24','--jump','MASQUERADE') >2013-02-20 08:39:06 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table nat --delete POSTROUTING --source 192.168.100.0/24 ! --destination 192.168.100.0/24 --jump MASQUERADE >2013-02-20 08:39:06 DEBUG2: '/sbin/iptables --table nat --delete POSTROUTING --source 192.168.100.0/24 ! --destination 192.168.100.0/24 --jump MASQUERADE' failed: iptables: No chain/target/match by that name. >2013-02-20 08:39:06 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table nat --delete POSTROUTING --source 192.168.100.0/24 ! --destination 192.168.100.0/24 --jump MASQUERADE' failed: iptables: No chain/target/match by that name. >2013-02-20 08:39:06 DEBUG1: direct.passthrough('ipv4', '--table','filter','--delete','FORWARD','--destination','192.168.100.0/24','--out-interface','virbr1','--match','state','--state','ESTABLISHED,RELATED','--jump','ACCEPT') >2013-02-20 08:39:06 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --delete FORWARD --destination 192.168.100.0/24 --out-interface virbr1 --match state --state ESTABLISHED,RELATED --jump ACCEPT >2013-02-20 08:39:06 DEBUG2: '/sbin/iptables --table filter --delete FORWARD --destination 192.168.100.0/24 --out-interface virbr1 --match state --state ESTABLISHED,RELATED --jump ACCEPT' failed: WARNING: The state match is obsolete. Use conntrack instead. >iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:06 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table filter --delete FORWARD --destination 192.168.100.0/24 --out-interface virbr1 --match state --state ESTABLISHED,RELATED --jump ACCEPT' failed: WARNING: The state match is obsolete. Use conntrack instead. >iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:06 DEBUG1: direct.passthrough('ipv4', '--table','filter','--delete','FORWARD','--source','192.168.100.0/24','--in-interface','virbr1','--jump','ACCEPT') >2013-02-20 08:39:06 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --delete FORWARD --source 192.168.100.0/24 --in-interface virbr1 --jump ACCEPT >2013-02-20 08:39:06 DEBUG2: '/sbin/iptables --table filter --delete FORWARD --source 192.168.100.0/24 --in-interface virbr1 --jump ACCEPT' failed: iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:06 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table filter --delete FORWARD --source 192.168.100.0/24 --in-interface virbr1 --jump ACCEPT' failed: iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:06 DEBUG1: direct.passthrough('ipv4', '--table','filter','--delete','FORWARD','--in-interface','virbr1','--out-interface','virbr1','--jump','ACCEPT') >2013-02-20 08:39:06 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --delete FORWARD --in-interface virbr1 --out-interface virbr1 --jump ACCEPT >2013-02-20 08:39:06 DEBUG2: '/sbin/iptables --table filter --delete FORWARD --in-interface virbr1 --out-interface virbr1 --jump ACCEPT' failed: iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:06 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table filter --delete FORWARD --in-interface virbr1 --out-interface virbr1 --jump ACCEPT' failed: iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:06 DEBUG1: direct.passthrough('ipv4', '--table','filter','--delete','FORWARD','--out-interface','virbr1','--jump','REJECT') >2013-02-20 08:39:06 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --delete FORWARD --out-interface virbr1 --jump REJECT >2013-02-20 08:39:06 DEBUG2: '/sbin/iptables --table filter --delete FORWARD --out-interface virbr1 --jump REJECT' failed: iptables: No chain/target/match by that name. >2013-02-20 08:39:06 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table filter --delete FORWARD --out-interface virbr1 --jump REJECT' failed: iptables: No chain/target/match by that name. >2013-02-20 08:39:07 DEBUG1: direct.passthrough('ipv4', '--table','filter','--delete','FORWARD','--in-interface','virbr1','--jump','REJECT') >2013-02-20 08:39:07 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --delete FORWARD --in-interface virbr1 --jump REJECT >2013-02-20 08:39:07 DEBUG2: '/sbin/iptables --table filter --delete FORWARD --in-interface virbr1 --jump REJECT' failed: iptables: No chain/target/match by that name. >2013-02-20 08:39:07 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table filter --delete FORWARD --in-interface virbr1 --jump REJECT' failed: iptables: No chain/target/match by that name. >2013-02-20 08:39:07 DEBUG1: direct.passthrough('ipv4', '--table','filter','--delete','INPUT','--in-interface','virbr1','--protocol','udp','--destination-port','53','--jump','ACCEPT') >2013-02-20 08:39:07 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --delete INPUT --in-interface virbr1 --protocol udp --destination-port 53 --jump ACCEPT >2013-02-20 08:39:07 DEBUG2: '/sbin/iptables --table filter --delete INPUT --in-interface virbr1 --protocol udp --destination-port 53 --jump ACCEPT' failed: iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:07 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table filter --delete INPUT --in-interface virbr1 --protocol udp --destination-port 53 --jump ACCEPT' failed: iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:07 DEBUG1: direct.passthrough('ipv4', '--table','filter','--delete','INPUT','--in-interface','virbr1','--protocol','tcp','--destination-port','53','--jump','ACCEPT') >2013-02-20 08:39:07 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --delete INPUT --in-interface virbr1 --protocol tcp --destination-port 53 --jump ACCEPT >2013-02-20 08:39:07 DEBUG2: '/sbin/iptables --table filter --delete INPUT --in-interface virbr1 --protocol tcp --destination-port 53 --jump ACCEPT' failed: iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:07 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table filter --delete INPUT --in-interface virbr1 --protocol tcp --destination-port 53 --jump ACCEPT' failed: iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:07 DEBUG1: direct.passthrough('ipv4', '--table','mangle','--delete','POSTROUTING','--out-interface','virbr1','--protocol','udp','--destination-port','68','--jump','CHECKSUM','--checksum-fill') >2013-02-20 08:39:07 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table mangle --delete POSTROUTING --out-interface virbr1 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill >2013-02-20 08:39:07 DEBUG2: '/sbin/iptables --table mangle --delete POSTROUTING --out-interface virbr1 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill' failed: iptables: No chain/target/match by that name. >2013-02-20 08:39:07 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table mangle --delete POSTROUTING --out-interface virbr1 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill' failed: iptables: No chain/target/match by that name. >2013-02-20 08:39:07 DEBUG1: direct.passthrough('ipv4', '--table','filter','--delete','INPUT','--in-interface','virbr1','--protocol','udp','--destination-port','67','--jump','ACCEPT') >2013-02-20 08:39:07 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --delete INPUT --in-interface virbr1 --protocol udp --destination-port 67 --jump ACCEPT >2013-02-20 08:39:07 DEBUG2: '/sbin/iptables --table filter --delete INPUT --in-interface virbr1 --protocol udp --destination-port 67 --jump ACCEPT' failed: iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:07 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table filter --delete INPUT --in-interface virbr1 --protocol udp --destination-port 67 --jump ACCEPT' failed: iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:07 DEBUG1: direct.passthrough('ipv4', '--table','filter','--delete','INPUT','--in-interface','virbr1','--protocol','tcp','--destination-port','67','--jump','ACCEPT') >2013-02-20 08:39:07 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --delete INPUT --in-interface virbr1 --protocol tcp --destination-port 67 --jump ACCEPT >2013-02-20 08:39:07 DEBUG2: '/sbin/iptables --table filter --delete INPUT --in-interface virbr1 --protocol tcp --destination-port 67 --jump ACCEPT' failed: iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:07 DEBUG1: COMMAND_FAILED: '/sbin/iptables --table filter --delete INPUT --in-interface virbr1 --protocol tcp --destination-port 67 --jump ACCEPT' failed: iptables: Bad rule (does a matching rule exist in that chain?). >2013-02-20 08:39:07 DEBUG1: direct.passthrough('ipv4', '--table','filter','--insert','INPUT','--in-interface','virbr1','--protocol','tcp','--destination-port','67','--jump','ACCEPT') >2013-02-20 08:39:07 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --insert INPUT --in-interface virbr1 --protocol tcp --destination-port 67 --jump ACCEPT >2013-02-20 08:39:07 DEBUG1: direct.passthrough('ipv4', '--table','filter','--insert','INPUT','--in-interface','virbr1','--protocol','udp','--destination-port','67','--jump','ACCEPT') >2013-02-20 08:39:07 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --insert INPUT --in-interface virbr1 --protocol udp --destination-port 67 --jump ACCEPT >2013-02-20 08:39:08 DEBUG1: direct.passthrough('ipv4', '--table','mangle','--insert','POSTROUTING','--out-interface','virbr1','--protocol','udp','--destination-port','68','--jump','CHECKSUM','--checksum-fill') >2013-02-20 08:39:08 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table mangle --insert POSTROUTING --out-interface virbr1 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill >2013-02-20 08:39:08 DEBUG1: direct.passthrough('ipv4', '--table','filter','--insert','INPUT','--in-interface','virbr1','--protocol','tcp','--destination-port','53','--jump','ACCEPT') >2013-02-20 08:39:08 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --insert INPUT --in-interface virbr1 --protocol tcp --destination-port 53 --jump ACCEPT >2013-02-20 08:39:08 DEBUG1: direct.passthrough('ipv4', '--table','filter','--insert','INPUT','--in-interface','virbr1','--protocol','udp','--destination-port','53','--jump','ACCEPT') >2013-02-20 08:39:08 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --insert INPUT --in-interface virbr1 --protocol udp --destination-port 53 --jump ACCEPT >2013-02-20 08:39:08 DEBUG1: direct.passthrough('ipv4', '--table','filter','--insert','FORWARD','--in-interface','virbr1','--jump','REJECT') >2013-02-20 08:39:08 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --insert FORWARD --in-interface virbr1 --jump REJECT >2013-02-20 08:39:08 DEBUG1: direct.passthrough('ipv4', '--table','filter','--insert','FORWARD','--out-interface','virbr1','--jump','REJECT') >2013-02-20 08:39:08 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --insert FORWARD --out-interface virbr1 --jump REJECT >2013-02-20 08:39:08 DEBUG1: direct.passthrough('ipv4', '--table','filter','--insert','FORWARD','--in-interface','virbr1','--out-interface','virbr1','--jump','ACCEPT') >2013-02-20 08:39:08 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --insert FORWARD --in-interface virbr1 --out-interface virbr1 --jump ACCEPT >2013-02-20 08:39:08 DEBUG1: direct.passthrough('ipv4', '--table','filter','--insert','FORWARD','--source','192.168.100.0/24','--in-interface','virbr1','--jump','ACCEPT') >2013-02-20 08:39:08 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --insert FORWARD --source 192.168.100.0/24 --in-interface virbr1 --jump ACCEPT >2013-02-20 08:39:08 DEBUG1: direct.passthrough('ipv4', '--table','filter','--insert','FORWARD','--destination','192.168.100.0/24','--out-interface','virbr1','--match','state','--state','ESTABLISHED,RELATED','--jump','ACCEPT') >2013-02-20 08:39:08 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table filter --insert FORWARD --destination 192.168.100.0/24 --out-interface virbr1 --match state --state ESTABLISHED,RELATED --jump ACCEPT >2013-02-20 08:39:09 DEBUG1: direct.passthrough('ipv4', '--table','nat','--insert','POSTROUTING','--source','192.168.100.0/24','!','--destination','192.168.100.0/24','--jump','MASQUERADE') >2013-02-20 08:39:09 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table nat --insert POSTROUTING --source 192.168.100.0/24 ! --destination 192.168.100.0/24 --jump MASQUERADE >2013-02-20 08:39:09 DEBUG1: direct.passthrough('ipv4', '--table','nat','--insert','POSTROUTING','--source','192.168.100.0/24','-p','udp','!','--destination','192.168.100.0/24','--jump','MASQUERADE','--to-ports','1024-65535') >2013-02-20 08:39:09 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table nat --insert POSTROUTING --source 192.168.100.0/24 -p udp ! --destination 192.168.100.0/24 --jump MASQUERADE --to-ports 1024-65535 >2013-02-20 08:39:09 DEBUG1: direct.passthrough('ipv4', '--table','nat','--insert','POSTROUTING','--source','192.168.100.0/24','-p','tcp','!','--destination','192.168.100.0/24','--jump','MASQUERADE','--to-ports','1024-65535') >2013-02-20 08:39:09 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables --table nat --insert POSTROUTING --source 192.168.100.0/24 -p tcp ! --destination 192.168.100.0/24 --jump MASQUERADE --to-ports 1024-65535 >2013-02-20 08:40:14 DEBUG1: zone.getZones() >2013-02-20 08:40:18 DEBUG1: zone.getInterfaces('block') >2013-02-20 08:40:18 DEBUG1: zone.getServices('block') >2013-02-20 08:40:18 DEBUG1: zone.getPorts('block') >2013-02-20 08:40:18 DEBUG1: zone.getForwardPorts('block') >2013-02-20 08:40:18 DEBUG1: zone.getIcmpBlocks('block') >2013-02-20 08:40:18 DEBUG1: zone.getInterfaces('drop') >2013-02-20 08:40:18 DEBUG1: zone.getServices('drop') >2013-02-20 08:40:18 DEBUG1: zone.getPorts('drop') >2013-02-20 08:40:18 DEBUG1: zone.getForwardPorts('drop') >2013-02-20 08:40:18 DEBUG1: zone.getIcmpBlocks('drop') >2013-02-20 08:40:18 DEBUG1: zone.getInterfaces('work') >2013-02-20 08:40:18 DEBUG1: zone.getServices('work') >2013-02-20 08:40:18 DEBUG1: zone.getPorts('work') >2013-02-20 08:40:18 DEBUG1: zone.getForwardPorts('work') >2013-02-20 08:40:18 DEBUG1: zone.getIcmpBlocks('work') >2013-02-20 08:40:18 DEBUG1: zone.getInterfaces('internal') >2013-02-20 08:40:18 DEBUG1: zone.getServices('internal') >2013-02-20 08:40:18 DEBUG1: zone.getPorts('internal') >2013-02-20 08:40:18 DEBUG1: zone.getForwardPorts('internal') >2013-02-20 08:40:18 DEBUG1: zone.getIcmpBlocks('internal') >2013-02-20 08:40:18 DEBUG1: zone.getInterfaces('external') >2013-02-20 08:40:18 DEBUG1: zone.getServices('external') >2013-02-20 08:40:18 DEBUG1: zone.getPorts('external') >2013-02-20 08:40:18 DEBUG1: zone.getForwardPorts('external') >2013-02-20 08:40:18 DEBUG1: zone.getIcmpBlocks('external') >2013-02-20 08:40:18 DEBUG1: zone.getInterfaces('home') >2013-02-20 08:40:18 DEBUG1: zone.getServices('home') >2013-02-20 08:40:18 DEBUG1: zone.getPorts('home') >2013-02-20 08:40:18 DEBUG1: zone.getForwardPorts('home') >2013-02-20 08:40:18 DEBUG1: zone.getIcmpBlocks('home') >2013-02-20 08:40:18 DEBUG1: zone.getInterfaces('dmz') >2013-02-20 08:40:18 DEBUG1: zone.getServices('dmz') >2013-02-20 08:40:18 DEBUG1: zone.getPorts('dmz') >2013-02-20 08:40:18 DEBUG1: zone.getForwardPorts('dmz') >2013-02-20 08:40:18 DEBUG1: zone.getIcmpBlocks('dmz') >2013-02-20 08:40:19 DEBUG1: zone.getInterfaces('public') >2013-02-20 08:40:19 DEBUG1: zone.getServices('public') >2013-02-20 08:40:19 DEBUG1: zone.getPorts('public') >2013-02-20 08:40:19 DEBUG1: zone.getForwardPorts('public') >2013-02-20 08:40:19 DEBUG1: zone.getIcmpBlocks('public') >2013-02-20 08:40:19 DEBUG1: zone.getInterfaces('trusted') >2013-02-20 08:40:19 DEBUG1: zone.getServices('trusted') >2013-02-20 08:40:19 DEBUG1: zone.getPorts('trusted') >2013-02-20 08:40:19 DEBUG1: zone.getForwardPorts('trusted') >2013-02-20 08:40:19 DEBUG1: zone.getIcmpBlocks('trusted') >2013-02-20 08:40:26 DEBUG1: zone.getZones() >2013-02-20 08:40:29 DEBUG1: zone.getInterfaces('block') >2013-02-20 08:40:29 DEBUG1: zone.getServices('block') >2013-02-20 08:40:29 DEBUG1: zone.getPorts('block') >2013-02-20 08:40:29 DEBUG1: zone.getForwardPorts('block') >2013-02-20 08:40:29 DEBUG1: zone.getIcmpBlocks('block') >2013-02-20 08:40:29 DEBUG1: zone.getInterfaces('drop') >2013-02-20 08:40:29 DEBUG1: zone.getServices('drop') >2013-02-20 08:40:29 DEBUG1: zone.getPorts('drop') >2013-02-20 08:40:29 DEBUG1: zone.getForwardPorts('drop') >2013-02-20 08:40:29 DEBUG1: zone.getIcmpBlocks('drop') >2013-02-20 08:40:29 DEBUG1: zone.getInterfaces('work') >2013-02-20 08:40:29 DEBUG1: zone.getServices('work') >2013-02-20 08:40:29 DEBUG1: zone.getPorts('work') >2013-02-20 08:40:29 DEBUG1: zone.getForwardPorts('work') >2013-02-20 08:40:29 DEBUG1: zone.getIcmpBlocks('work') >2013-02-20 08:40:29 DEBUG1: zone.getInterfaces('internal') >2013-02-20 08:40:29 DEBUG1: zone.getServices('internal') >2013-02-20 08:40:29 DEBUG1: zone.getPorts('internal') >2013-02-20 08:40:29 DEBUG1: zone.getForwardPorts('internal') >2013-02-20 08:40:29 DEBUG1: zone.getIcmpBlocks('internal') >2013-02-20 08:40:29 DEBUG1: zone.getInterfaces('external') >2013-02-20 08:40:29 DEBUG1: zone.getServices('external') >2013-02-20 08:40:29 DEBUG1: zone.getPorts('external') >2013-02-20 08:40:29 DEBUG1: zone.getForwardPorts('external') >2013-02-20 08:40:29 DEBUG1: zone.getIcmpBlocks('external') >2013-02-20 08:40:29 DEBUG1: zone.getInterfaces('home') >2013-02-20 08:40:29 DEBUG1: zone.getServices('home') >2013-02-20 08:40:29 DEBUG1: zone.getPorts('home') >2013-02-20 08:40:29 DEBUG1: zone.getForwardPorts('home') >2013-02-20 08:40:29 DEBUG1: zone.getIcmpBlocks('home') >2013-02-20 08:40:29 DEBUG1: zone.getInterfaces('dmz') >2013-02-20 08:40:29 DEBUG1: zone.getServices('dmz') >2013-02-20 08:40:29 DEBUG1: zone.getPorts('dmz') >2013-02-20 08:40:29 DEBUG1: zone.getForwardPorts('dmz') >2013-02-20 08:40:29 DEBUG1: zone.getIcmpBlocks('dmz') >2013-02-20 08:40:29 DEBUG1: zone.getInterfaces('public') >2013-02-20 08:40:29 DEBUG1: zone.getServices('public') >2013-02-20 08:40:29 DEBUG1: zone.getPorts('public') >2013-02-20 08:40:29 DEBUG1: zone.getForwardPorts('public') >2013-02-20 08:40:29 DEBUG1: zone.getIcmpBlocks('public') >2013-02-20 08:40:29 DEBUG1: zone.getInterfaces('trusted') >2013-02-20 08:40:29 DEBUG1: zone.getServices('trusted') >2013-02-20 08:40:29 DEBUG1: zone.getPorts('trusted') >2013-02-20 08:40:29 DEBUG1: zone.getForwardPorts('trusted') >2013-02-20 08:40:29 DEBUG1: zone.getIcmpBlocks('trusted') >2013-02-20 08:40:34 DEBUG1: zone.addInterface('', 'em1') >2013-02-20 08:40:34 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I INPUT_ZONES 1 -t filter -i em1 -j IN_ZONE_public >2013-02-20 08:40:34 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I INPUT_ZONES 1 -t filter -i em1 -j IN_ZONE_public >2013-02-20 08:40:34 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FORWARD_ZONES 1 -t filter -o em1 -j FWDO_ZONE_public >2013-02-20 08:40:34 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FORWARD_ZONES 1 -t filter -o em1 -j FWDO_ZONE_public >2013-02-20 08:40:34 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FORWARD_ZONES 1 -t filter -i em1 -j FWDI_ZONE_public >2013-02-20 08:40:34 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FORWARD_ZONES 1 -t filter -i em1 -j FWDI_ZONE_public >2013-02-20 08:40:34 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PREROUTING_ZONES 1 -t mangle -i em1 -j PRE_ZONE_public >2013-02-20 08:40:34 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PREROUTING_ZONES 1 -t nat -i em1 -j PRE_ZONE_public >2013-02-20 08:40:34 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POSTROUTING_ZONES 1 -t nat -o em1 -j POST_ZONE_public >2013-02-20 08:40:34 DEBUG1: zone.InterfaceAdded('public', 'em1') >2013-02-20 08:40:55 DEBUG1: zone.getZones() >2013-02-20 08:40:58 DEBUG1: zone.getInterfaces('block') >2013-02-20 08:40:58 DEBUG1: zone.getServices('block') >2013-02-20 08:40:58 DEBUG1: zone.getPorts('block') >2013-02-20 08:40:58 DEBUG1: zone.getForwardPorts('block') >2013-02-20 08:40:58 DEBUG1: zone.getIcmpBlocks('block') >2013-02-20 08:40:58 DEBUG1: zone.getInterfaces('drop') >2013-02-20 08:40:58 DEBUG1: zone.getServices('drop') >2013-02-20 08:40:58 DEBUG1: zone.getPorts('drop') >2013-02-20 08:40:58 DEBUG1: zone.getForwardPorts('drop') >2013-02-20 08:40:58 DEBUG1: zone.getIcmpBlocks('drop') >2013-02-20 08:40:58 DEBUG1: zone.getInterfaces('work') >2013-02-20 08:40:58 DEBUG1: zone.getServices('work') >2013-02-20 08:40:58 DEBUG1: zone.getPorts('work') >2013-02-20 08:40:58 DEBUG1: zone.getForwardPorts('work') >2013-02-20 08:40:58 DEBUG1: zone.getIcmpBlocks('work') >2013-02-20 08:40:58 DEBUG1: zone.getInterfaces('internal') >2013-02-20 08:40:58 DEBUG1: zone.getServices('internal') >2013-02-20 08:40:58 DEBUG1: zone.getPorts('internal') >2013-02-20 08:40:58 DEBUG1: zone.getForwardPorts('internal') >2013-02-20 08:40:58 DEBUG1: zone.getIcmpBlocks('internal') >2013-02-20 08:40:58 DEBUG1: zone.getInterfaces('external') >2013-02-20 08:40:58 DEBUG1: zone.getServices('external') >2013-02-20 08:40:58 DEBUG1: zone.getPorts('external') >2013-02-20 08:40:58 DEBUG1: zone.getForwardPorts('external') >2013-02-20 08:40:59 DEBUG1: zone.getIcmpBlocks('external') >2013-02-20 08:40:59 DEBUG1: zone.getInterfaces('home') >2013-02-20 08:40:59 DEBUG1: zone.getServices('home') >2013-02-20 08:40:59 DEBUG1: zone.getPorts('home') >2013-02-20 08:40:59 DEBUG1: zone.getForwardPorts('home') >2013-02-20 08:40:59 DEBUG1: zone.getIcmpBlocks('home') >2013-02-20 08:40:59 DEBUG1: zone.getInterfaces('dmz') >2013-02-20 08:40:59 DEBUG1: zone.getServices('dmz') >2013-02-20 08:40:59 DEBUG1: zone.getPorts('dmz') >2013-02-20 08:40:59 DEBUG1: zone.getForwardPorts('dmz') >2013-02-20 08:40:59 DEBUG1: zone.getIcmpBlocks('dmz') >2013-02-20 08:40:59 DEBUG1: zone.getInterfaces('public') >2013-02-20 08:40:59 DEBUG1: zone.getServices('public') >2013-02-20 08:40:59 DEBUG1: zone.getPorts('public') >2013-02-20 08:40:59 DEBUG1: zone.getForwardPorts('public') >2013-02-20 08:40:59 DEBUG1: zone.getIcmpBlocks('public') >2013-02-20 08:40:59 DEBUG1: zone.getInterfaces('trusted') >2013-02-20 08:40:59 DEBUG1: zone.getServices('trusted') >2013-02-20 08:40:59 DEBUG1: zone.getPorts('trusted') >2013-02-20 08:40:59 DEBUG1: zone.getForwardPorts('trusted') >2013-02-20 08:40:59 DEBUG1: zone.getIcmpBlocks('trusted') >2013-02-20 08:41:38 DEBUG1: zone.removeInterface('', 'em1') >2013-02-20 08:41:38 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -D INPUT_ZONES -t filter -i em1 -j IN_ZONE_public >2013-02-20 08:41:38 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -D INPUT_ZONES -t filter -i em1 -j IN_ZONE_public >2013-02-20 08:41:38 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -D FORWARD_ZONES -t filter -o em1 -j FWDO_ZONE_public >2013-02-20 08:41:38 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -D FORWARD_ZONES -t filter -o em1 -j FWDO_ZONE_public >2013-02-20 08:41:38 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -D FORWARD_ZONES -t filter -i em1 -j FWDI_ZONE_public >2013-02-20 08:41:38 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -D FORWARD_ZONES -t filter -i em1 -j FWDI_ZONE_public >2013-02-20 08:41:38 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -D PREROUTING_ZONES -t mangle -i em1 -j PRE_ZONE_public >2013-02-20 08:41:38 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -D PREROUTING_ZONES -t nat -i em1 -j PRE_ZONE_public >2013-02-20 08:41:38 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -D POSTROUTING_ZONES -t nat -o em1 -j POST_ZONE_public >2013-02-20 08:41:38 DEBUG1: zone.InterfaceRemoved('public', 'em1')
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 912666
: 699865 |
699867
|
699868