Hi all,
I'm trying to use MRTG to monitor and make graphs
of my P2P traffic.
I'm using IPP2P 0.5c - Iptables
1.2.9
The IPP2P was configured like this:
example three:
01# iptables -t mangle -A PREROUTING -p tcp -j CONNMARK --restore-mark 02# iptables -t mangle -A PREROUTING -p tcp -m mark ! --mark 0 -j ACCEPT 03# iptables -t mangle -A PREROUTING -p tcp -m ipp2p --edk -j MARK --set-mark 1 04# iptables -t mangle -A PREROUTING -p tcp -m ipp2p --dc -j MARK --set-mark 2 05# iptables -t mangle -A PREROUTING -p tcp -m ipp2p --gnu -j MARK --set-mark 3 06# iptables -t mangle -A PREROUTING -p tcp -m ipp2p --kazaa -j MARK --set-mark 4 07# iptables -t mangle -A PREROUTING -p tcp -m ipp2p --apple -j MARK --set-mark 5 08# iptables -t mangle -A PREROUTING -p tcp -j CONNMARK --save-mark 09# iptables -t mangle -A POSTROUTING -m mark --mark 1 -j ACCEPT 10# iptables -t mangle -A POSTROUTING -m mark --mark 2 -j ACCEPT 11# iptables -t mangle -A POSTROUTING -m mark --mark 3 -j ACCEPT 12# iptables -t mangle -A POSTROUTING -m mark --mark 4 -j ACCEPT 13# iptables -t mangle -A POSTROUTING -m mark --mark 5 -j ACCEPT I have only added the --soul and --bit networks,
with mark 6 and 7.......
And the command iptables -t mangle -L -n -v -x is
working fine.... SHowing all my P2P traffic of each different network
:
iptables -t mangle -L -n -v -x
Chain PREROUTING (policy ACCEPT 31197 packets, 5559838 bytes) pkts bytes target prot opt in out source destination 33059 9516328 CONNMARK tcp -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK restore 12001 5091047 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 MARK match !0x0 153 32656 MARK tcp -- * * 0.0.0.0/0 0.0.0.0/0 ipp2p v0.5c --edk MARK set 0x1 0 0 MARK tcp -- * * 0.0.0.0/0 0.0.0.0/0 ipp2p v0.5c --dc MARK set 0x2 0 0 MARK tcp -- * * 0.0.0.0/0 0.0.0.0/0 ipp2p v0.5c --gnu MARK set 0x3 57 24854 MARK tcp -- * * 0.0.0.0/0 0.0.0.0/0 ipp2p v0.5c --kazaa MARK set 0x4 0 0 MARK tcp -- * * 0.0.0.0/0 0.0.0.0/0 ipp2p v0.5c --apple MARK set 0x5 2 154 MARK tcp -- * * 0.0.0.0/0 0.0.0.0/0 ipp2p v0.5c --soul MARK set 0x6 0 0 MARK tcp -- * * 0.0.0.0/0 0.0.0.0/0 ipp2p v0.5c --bit MARK set 0x7 20324 4360417 CONNMARK tcp -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK save Chain INPUT (policy ACCEPT 16997 packets,
3182031 bytes)
pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 26178
packets, 7467918 bytes)
pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 17072 packets,
3252442 bytes)
pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 31071
packets, 5596377 bytes)
pkts bytes target prot opt in out source destination 11106 4799465 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match 0x1 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match 0x2 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match 0x3 657 269207 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match 0x4 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match 0x5 436 60031 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match 0x6 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match 0x7 MRTG is already working fine, monitoring my eth0
and eth1 traffic. Also my CPU / Memory usage......
Can someone help me ?
Best regards,
LEANDRO TRAVAGLIA
--- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.639 / Virus Database: 408 - Release Date: 22/3/2004 |