Name

probe::netfilter.ip.forward — Called on an incoming IP packet addressed to some other computer

Synopsis

netfilter.ip.forward 

Values

iphdr

Address of IP header

indev_name

Name of network device packet was received on (if known)

urg

TCP URG flag (if protocol is TCP; ipv4 only)

nf_stolen

Constant used to signify a 'stolen' verdict

psh

TCP PSH flag (if protocol is TCP; ipv4 only)

data_str

A string representing the packet buffer contents

indev

Address of net_device representing input device, 0 if unknown

family

IP address family

outdev

Address of net_device representing output device, 0 if unknown

pf

Protocol family -- either ipv4 or ipv6

nf_stop

Constant used to signify a 'stop' verdict

ipproto_tcp

Constant used to signify that the packet protocol is TCP

length

The length of the packet buffer contents, in bytes

fin

TCP FIN flag (if protocol is TCP; ipv4 only)

daddr

A string representing the destination IP address

saddr

A string representing the source IP address

nf_queue

Constant used to signify a 'queue' verdict

nf_repeat

Constant used to signify a 'repeat' verdict

ipproto_udp

Constant used to signify that the packet protocol is UDP

ack

TCP ACK flag (if protocol is TCP; ipv4 only)

nf_drop

Constant used to signify a 'drop' verdict

outdev_name

Name of network device packet will be routed to (if known)

syn

TCP SYN flag (if protocol is TCP; ipv4 only)

data_hex

A hexadecimal string representing the packet buffer contents

nf_accept

Constant used to signify an 'accept' verdict

protocol

Packet protocol from driver (ipv4 only)

sport

TCP or UDP source port (ipv4 only)

dport

TCP or UDP destination port (ipv4 only)

rst

TCP RST flag (if protocol is TCP; ipv4 only)