there's also
netstat -M
although if you are using a 2.4 kernel you need
cat /proc/net/ip_conntrack
On Wed, May 23, 2001 at 11:58:43AM -0700, Bob Miller wrote:
> Rob Hudson wrote:
>
> > Never thought about browsing having to do the same type of thing. Is
> > there a way to see what NAT is doing behind the scenes? What kind of
> > translations its making as traffic goes thru it?
>
> If your NAT gateway runs Linux, take a look at
> /proc/net/ip_masquerade. Here's what it says on my coyote box right
> now.
>
> Prc FromIP FPrt ToIP TPrt Masq Init-seq Delta PDelta Expires
>(free=40958,40955,40960)
> TCP C0A80004:0918 CFBD8304:0016 EE78 00000000 0 0 85095
> TCP C0A80004:0917 CFBD8304:0016 EE77 00000000 0 0 55075
> TCP C0A80004:032A CFBD8304:0016 FC3B 00000000 0 0 88848
> UDP C0A80004:3333 CE0D1F0C:0035 EEFE 00000000 0 0 12379
> UDP C0A80004:007B C0309950:007B EEF1 00000000 0 0 26489
> TCP C0A80004:098F D8DADA1B:0016 EEFD 00000000 0 0 89999
> TCP C0A80004:0926 CFBD8304:0016 EE8F 00000000 0 0 84044
>
> For example, the last line says there's a TCP connection from
> 192.168.0.4 port 2342 (in hex, that's C0A80004:0926) to 207.189.131.4
> port 22 (hex CFBD8304:0016). I can't tell you what the other fields
> mean.
>
> --
> Bob Miller K<bob>
> kbobsoft software consulting
> http://kbobsoft.com [EMAIL PROTECTED]