Are there any good examples of using the TRACE target in iptables to
follow a packet through the system?
I googled some of the examples, but they all seem fairly simple (and not
very useful).
Also, if you see an incoming packet from a new connection that ends up
creating state, is there any way to also trace any packets that might be
generated in response (such as a SYN-ACK or an RESET or a
Port-Unreachable, etc.) as part of the same flow?
Thanks,
-Philip
--
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html