At 07:42 AM 05/23/2002 -0700, Harry Putnam wrote: >Eric Sisler <[EMAIL PROTECTED]> writes: > > > I've just started working with iptables and I can't seem to find a way > > to list current masquerade / nat connections. With ipchains I'd use > > the command 'ipchains -nML' to get a table of masq'ed connections. Am > > I just missing something or is there no way to do this with iptables?
>I think you may be tripping over something I tripped over a while ago. >To list the `nat' table you must tell iptables what table to list. > > iptables -t nat -nL > >Where (-t=table) is `nat' I want to see active masq/nat connections rather than the rules. Output from my earlier command on a box running ipchains: [root@preston /root]# /sbin/ipchains -nML IP masquerading entries prot expire source destination ports TCP 56:12.24 xxx.xxx.x.xxx yyy.yy.yy.yy 1043 (62989) -> 1061 TCP 76:45.77 xxx.xxx.x.xxx yyy.yy.yy.yy 1033 (62985) -> 1061 TCP 113:39.16 xxx.xxx.x.xxx yyy.yy.y.y 1077 (63008) -> 23 Here you can see the protocol, expiration time, source IP, destination IP, source port, (masq'ed port) and destination port. Is there any way getting something similar with iptables? I don't use it all that much but it does come in handy when I'm trying to troubleshoot a masq'ed connection. -Eric Eric Sisler <[EMAIL PROTECTED]> Applications Specialist Westminster Public Library Westminster, CO USA Linux - Don't fear the Penguin. Want to know what we use Linux for? Visit http://gromit.westminster.lib.co.us/linux _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list