from small one page howto to huge articles all in one place

search text in:




Other .linuxhowtos.org sites:gentoo.linuxhowtos.org



Last additions:
using iotop to find disk usage hogs

using iotop to find disk usage hogs

words:

887

views:

209612

userrating:


May 25th. 2007:
Words

486

Views

258612

why adblockers are bad


Workaround and fixes for the current Core Dump Handling vulnerability affected kernels

Workaround and fixes for the current Core Dump Handling vulnerability affected kernels

words:

161

views:

149912

userrating:


April, 26th. 2006:

Druckversion
You are here: manpages





ct action in tc

Section: Linux (8)
Updated: 14 May 2020
Index Return to Main Contents
 

NAME

ct - tc connection tracking action  

SYNOPSIS


tc ... action ct commit [ force ] [ zone ZONE ] [ mark MASKED_MARK ] [ label MASKED_LABEL ] [ nat NAT_SPEC ]


tc ... action ct [ nat ] [ zone ZONE ]


tc ... action ct clear

 

DESCRIPTION

The ct action is a tc action for sending packets and interacting with the netfilter conntrack module.

It can (as shown in the synopsis, in order):

Send the packet to conntrack, and commit the connection, while configuring a 32bit mark, 128bit label, and src/dst nat.

Send the packet to conntrack, which will mark the packet with the connection's state and configured metadata (mark/label), and execute previous configured nat.

Clear the packet's of previous connection tracking state.

 

OPTIONS

zone ZONE
Specify a conntrack zone number on which to send the packet to conntrack.
mark MASKED_MARK
Specify a masked 32bit mark to set for the connection (only valid with commit).
label MASKED_LABEL
Specify a masked 128bit label to set for the connection (only valid with commit).
nat NAT_SPEC
Where NAT_SPEC := {src|dst} addr addr1-addr2] [port port1-port2]]

Specify src/dst and range of nat to configure for the connection (only valid with commit).

src/dst- configure src or dst nat
addr1/addr2- IPv4/IPv6 addresses
port1/port2- Port numbers
nat
Restore any previous configured nat.
clear
Remove any conntrack state and metadata (mark/label) from the packet (must only option specified).
force
Forces conntrack direction for a previously committed connections, so that current direction will become the original direction (only valid with commit).

 

EXAMPLES

Example showing natted firewall in conntrack zone 2, and conntrack mark usage:

#Add ingress qdisc on eth0 and eth1 interfaces

$ tc qdisc add dev eth0 ingress
$ tc qdisc add dev eth1 ingress

#Setup filters on eth0, allowing opening new connections in zone 2, and doing src nat + mark for each new connection
$ tc filter add dev eth0 ingress prio 1 chain 0 proto ip flower ip_proto tcp ct_state-trk 
action ct zone 2 pipe action goto chain 2
$ tc filter add dev eth0 ingress prio 1 chain 2 proto ip flower ct_state +trk+new 
action ct zone 2 commit mark 0xbb nat src addr 5.5.5.7 pipe action mirred egress redirect dev eth1
$ tc filter add dev eth0 ingress prio 1 chain 2 proto ip flower ct_zone 2 ct_mark 0xbb ct_state +trk+est 
action ct nat pipe action mirred egress redirect dev eth1

#Setup filters on eth1, allowing only established connections of zone 2 through, and reverse nat (dst nat in this case)
$ tc filter add dev eth1 ingress prio 1 chain 0 proto ip flower ip_proto tcp ct_state-trk 
action ct zone 2 pipe action goto chain 1
$ tc filter add dev eth1 ingress prio 1 chain 1 proto ip flower ct_zone 2 ct_mark 0xbb ct_state +trk+est 
action ct nat pipe action mirred egress redirect dev eth0

 

SEE ALSO

tc(8), t-flower(8) t-mirred(8)  

AUTHORS

Paul Blakey <paulb@mellanox.com>

Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>

Yossi Kuperman <yossiku@mellanox.com>


 

Index

NAME
SYNOPSIS
DESCRIPTION
OPTIONS
EXAMPLES
SEE ALSO
AUTHORS





Support us on Content Nation
rdf newsfeed | rss newsfeed | Atom newsfeed
- Powered by LeopardCMS - Running on Gentoo -
Copyright 2004-2025 Sascha Nitsch Unternehmensberatung GmbH
Valid XHTML1.1 : Valid CSS
- Level Triple-A Conformance to Web Content Accessibility Guidelines 1.0 -
- Copyright and legal notices -
Time to create this page: 12.8 ms