We run "ntop" on a computer connected to our router, for traffic
analysis:
http://jdbates.blogspot.com/2012/02/this-is-followup-to-this-post-on-how-to.html
We forward all traffic sent and received on our WAN interface to the
"ntop" computer with the following lines in /etc/firewall.user:
iptables -A PREROUTING -t mangle -i eth0.1 -j TEE --gateway 192.168.1.7
iptables -A POSTROUTING -t mangle -o eth0.1 -j TEE --gateway 192.168.1.7
This works well, except that we also NAT traffic on our WAN interface.
We want to monitor traffic *before* NAT
Currently the source addresses of mirrored outgoing traffic are our
"private" addresses, e.g. 192.168.1.123, 192.168.1.234, etc. so these
rules happily mirror *outgoing* traffic before NAT
However the destination address of mirrored *incoming* traffic is our
"public" address. I guess I want to mirror incoming traffic after NAT,
so I tried "POSTROUTING" for incoming traffic:
iptables -A POSTROUTING -t mangle -i eth0.1 -j TEE --gateway 192.168.1.7
iptables -A POSTROUTING -t mangle -o eth0.1 -j TEE --gateway 192.168.1.7
- but I get the following error:
iptables v1.4.6: Can't use -i with POSTROUTING
Any advice, how to improve these rules to monitor traffic *before* NAT?
so analysis of incoming and outgoing traffic consistently references our
"private" addresses associated with the traffic?
Any general advice concerning this setup?
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html