At 07:42 AM 05/23/2002 -0700, Harry Putnam wrote:

>Eric Sisler <[EMAIL PROTECTED]> writes:
>
> > I've just started working with iptables and I can't seem to find a way
> > to list current masquerade / nat connections.  With ipchains I'd use
> > the command 'ipchains -nML' to get a table of masq'ed connections.  Am
> > I just missing something or is there no way to do this with iptables?

>I think you may be tripping over something I tripped over a while ago.
>To list the `nat' table you must tell iptables what table to list.
>
>   iptables -t nat -nL
>
>Where (-t=table) is `nat'

I want to see active masq/nat connections rather than the rules.  Output 
from my earlier command on a box running ipchains:

[root@preston /root]# /sbin/ipchains -nML
IP masquerading entries
prot expire   source               destination          ports
TCP  56:12.24 xxx.xxx.x.xxx        yyy.yy.yy.yy         1043 (62989) -> 1061
TCP  76:45.77 xxx.xxx.x.xxx        yyy.yy.yy.yy         1033 (62985) -> 1061
TCP  113:39.16 xxx.xxx.x.xxx        yyy.yy.y.y           1077 (63008) -> 23

Here you can see the protocol, expiration time, source IP, destination IP, 
source port, (masq'ed port) and destination port.  Is there any way getting 
something similar with iptables?  I don't use it all that much but it does 
come in handy when I'm trying to troubleshoot a masq'ed connection.

-Eric


Eric Sisler <[EMAIL PROTECTED]>
Applications Specialist
Westminster Public Library
Westminster, CO USA

Linux - Don't fear the Penguin.
Want to know what we use Linux for?
Visit http://gromit.westminster.lib.co.us/linux



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to