there's also 

netstat -M


although if you are using a 2.4 kernel you need
cat /proc/net/ip_conntrack



On Wed, May 23, 2001 at 11:58:43AM -0700, Bob Miller wrote:
> Rob Hudson wrote:
> 
> > Never thought about browsing having to do the same type of thing.  Is
> > there a way to see what NAT is doing behind the scenes?  What kind of
> > translations its making as traffic goes thru it?
> 
> If your NAT gateway runs Linux, take a look at
> /proc/net/ip_masquerade.  Here's what it says on my coyote box right
> now.
> 
> Prc FromIP   FPrt ToIP     TPrt Masq Init-seq  Delta PDelta Expires 
>(free=40958,40955,40960)                                   
> TCP C0A80004:0918 CFBD8304:0016 EE78 00000000      0      0   85095
> TCP C0A80004:0917 CFBD8304:0016 EE77 00000000      0      0   55075
> TCP C0A80004:032A CFBD8304:0016 FC3B 00000000      0      0   88848
> UDP C0A80004:3333 CE0D1F0C:0035 EEFE 00000000      0      0   12379
> UDP C0A80004:007B C0309950:007B EEF1 00000000      0      0   26489
> TCP C0A80004:098F D8DADA1B:0016 EEFD 00000000      0      0   89999
> TCP C0A80004:0926 CFBD8304:0016 EE8F 00000000      0      0   84044
> 
> For example, the last line says there's a TCP connection from
> 192.168.0.4 port 2342 (in hex, that's C0A80004:0926) to 207.189.131.4
> port 22 (hex CFBD8304:0016).  I can't tell you what the other fields
> mean.
> 
> -- 
> Bob Miller                              K<bob>
> kbobsoft software consulting
> http://kbobsoft.com                     [EMAIL PROTECTED]

Reply via email to