Folks, I have an outdoor wireless network and I only accept FORWARD packets when the IP address matchs with the MAC address I have on my iptables rules... (Bad english sorry) For example: iptables -j ACCEPT -A FORWARD -i eth1 -s 10.10.10.80 -m mac --mac-source 00:40:F4:93:40:82 iptables -j LOG -A FORWARD -i eth1 $pref "[rule 06]" iptables -j DROP -A FORWARD -i eth1 Any other connection that doesn't match the IP+MAC rules are dropped (or at least I think it was :)). The problem is: Recently I noticed a large traffic (MRTG) on the access points that doesn't seem to match with traffic of the clients connected to it... Looks like someone are being able to bypass iptables rules. So, I want to know if there is a way to the LOG target logs the MAC address of the connection too... Sorry about my english... I hope you can understand me... -- Marcelus Trojahn