On Thu, 19 Aug 2004, Pat Ellison wrote:
> Also if anybody would be gracious enough to send me any weird lines that
> they get that is
> out of the norm such as this one I came accross.
> 09:16:50.302903 rl0 @0:17 b 188.8.131.52 -> 184.108.40.206 PR icmp len 20 56
> icmp unreach/port for 220.127.116.11,13794 - 192.168.0.34,4675 PR udp len 20 61
> 09:26:54.775565 rl0 @0:15 b 18.104.22.168,63021 -> 22.214.171.124,13802 PR tcp
> len 20 40 -AR IN
> |-Time---------| IF ? ? Src , Port Dest , Port ? Prot ?
> ? ? ? ?
These things get messy with line wrap. :-)
> -S ? Are these TCP packet flags? Ack Syn etc?
> -AF ?
> -AFP ?
> -AP ?
The items in the above example are, in order:
Rule (group:number) *
Disposition (b = blocked, p = passed)
"PR" is constant, meaning "protocol"
IP protocol (e.g. tcp, udp, etc.)
"len" is constant, meaning "length"
IP header length
Total packet length (including header)
For TCP only, TCP flags (Syn, Ack, Psh, Fin, Rst, Urg)
Direction (IN or OUT) **
* The group and number match the values displayed by "ipfstat -hnio",
though the formatting is less covenient in the latter.
** In m0n0wall, this is usually "IN", since m0n0wall's rules do most
filtering on the incoming sides of the interfaces. E.g. outbound traffic
from LAN->WAN is actually filtered as it comes in on LAN.