Pkts bytes target prot opt in out source destinationħ133268 1057227727 ACCEPT tcp - * * 10.10.1.1 0.0.0.0/0 tcp spt:80Ĭhain FORWARD (policy ACCEPT 0 packets, 0 bytes)Ĭhain OUTPUT (policy ACCEPT 7133268 packets, 1057227727 bytes)ħ133268 1057227727 ACCEPT tcp - * * 0.0.0.0/0 10.10.1. We will use a capture filter to just capture traffic destined to port 162, and a display filter to select precisely the community string of those packets. You can then check traffic counted with the command iptables -nvxL as root.Įxample output: Chain INPUT (policy ACCEPT 7133268 packets, 1057227727 bytes) Where 10.10.1.1:80 is the host:port you want to count traffic to (you can't use a hostname). A OUTPUT -d 10.10.1.1 -p tcp -m tcp -dport 80 -j ACCEPT A INPUT -s 10.10.1.1 -p tcp -m tcp -sport 80 -j ACCEPT If you're not already using it, you can use an open Accept configuration, but have a rule in place to do the counting.įor example, on RHEL your /etc/sysconfig/iptables file could look something like: *filter TShark: Capture and Display Filters for HTTP/HTTPS 0 I am running CentOS v5.8 64bit.
0 Comments
Leave a Reply. |