Rob Hudson wrote:

> Never thought about browsing having to do the same type of thing.  Is
> there a way to see what NAT is doing behind the scenes?  What kind of
> translations its making as traffic goes thru it?

If your NAT gateway runs Linux, take a look at
/proc/net/ip_masquerade.  Here's what it says on my coyote box right
now.

Prc FromIP   FPrt ToIP     TPrt Masq Init-seq  Delta PDelta Expires 
(free=40958,40955,40960)                                   
TCP C0A80004:0918 CFBD8304:0016 EE78 00000000      0      0   85095
TCP C0A80004:0917 CFBD8304:0016 EE77 00000000      0      0   55075
TCP C0A80004:032A CFBD8304:0016 FC3B 00000000      0      0   88848
UDP C0A80004:3333 CE0D1F0C:0035 EEFE 00000000      0      0   12379
UDP C0A80004:007B C0309950:007B EEF1 00000000      0      0   26489
TCP C0A80004:098F D8DADA1B:0016 EEFD 00000000      0      0   89999
TCP C0A80004:0926 CFBD8304:0016 EE8F 00000000      0      0   84044

For example, the last line says there's a TCP connection from
192.168.0.4 port 2342 (in hex, that's C0A80004:0926) to 207.189.131.4
port 22 (hex CFBD8304:0016).  I can't tell you what the other fields
mean.

-- 
Bob Miller                              K<bob>
kbobsoft software consulting
http://kbobsoft.com                     [EMAIL PROTECTED]

Reply via email to