Rob Hudson wrote:
> Never thought about browsing having to do the same type of thing. Is
> there a way to see what NAT is doing behind the scenes? What kind of
> translations its making as traffic goes thru it?
If your NAT gateway runs Linux, take a look at
/proc/net/ip_masquerade. Here's what it says on my coyote box right
now.
Prc FromIP FPrt ToIP TPrt Masq Init-seq Delta PDelta Expires
(free=40958,40955,40960)
TCP C0A80004:0918 CFBD8304:0016 EE78 00000000 0 0 85095
TCP C0A80004:0917 CFBD8304:0016 EE77 00000000 0 0 55075
TCP C0A80004:032A CFBD8304:0016 FC3B 00000000 0 0 88848
UDP C0A80004:3333 CE0D1F0C:0035 EEFE 00000000 0 0 12379
UDP C0A80004:007B C0309950:007B EEF1 00000000 0 0 26489
TCP C0A80004:098F D8DADA1B:0016 EEFD 00000000 0 0 89999
TCP C0A80004:0926 CFBD8304:0016 EE8F 00000000 0 0 84044
For example, the last line says there's a TCP connection from
192.168.0.4 port 2342 (in hex, that's C0A80004:0926) to 207.189.131.4
port 22 (hex CFBD8304:0016). I can't tell you what the other fields
mean.
--
Bob Miller K<bob>
kbobsoft software consulting
http://kbobsoft.com [EMAIL PROTECTED]