In article <[EMAIL PROTECTED]> you wrote:
> How to determine normal/peak rate of packets with SYN to my debian box, for
> using this value
> in iptables limit match.
A method is adding multiple limited accept routes with logging, then you can
do a binary search. Another thing is to run a connect
In article <[EMAIL PROTECTED]> you wrote:
> How to determine normal/peak rate of packets with SYN to my debian box, for using
> this value
> in iptables limit match.
A method is adding multiple limited accept routes with logging, then you can
do a binary search. Another thing is to run a connect
Hi,
why not just do a rule like:
iptable -A FORWARD -m state --state NEW -j ACCEPT
them you can count how many packet/bytes with:
iptables -L -v -x
if you want to go further you can do something like:
#!/bin/sh
$packets=$(iptables -L -v -x | awk '/state NEW/' {print $1})
echo $packet
Hi,
why not just do a rule like:
iptable -A FORWARD -m state --state NEW -j ACCEPT
them you can count how many packet/bytes with:
iptables -L -v -x
if you want to go further you can do something like:
#!/bin/sh
$packets=$(iptables -L -v -x | awk '/state NEW/' {print $1})
echo $packet
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
hi list,
| How to determine normal/peak rate of packets with SYN to my debian
box, for using this value
| in iptables limit match.
here you are:
- --- CUT ---
#!/bin/sh
TEMPFILE=`tempfile`
SCOREFILE="/tmp/scorefile"
MYHOST="10.0.0.254"
while [ 1
> How to determine normal/peak rate of packets with SYN to my
> debian box, for using this value in iptables limit match.
tcpdump plus perl?
binary search with iptables limit and LOG target?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
hi list,
| How to determine normal/peak rate of packets with SYN to my debian
box, for using this value
| in iptables limit match.
here you are:
- --- CUT ---
#!/bin/sh
TEMPFILE=`tempfile`
SCOREFILE="/tmp/scorefile"
MYHOST="10.0.0.254"
while [ 1 -eq 1
> How to determine normal/peak rate of packets with SYN to my
> debian box, for using this value in iptables limit match.
tcpdump plus perl?
binary search with iptables limit and LOG target?
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL
8 matches
Mail list logo