Advertisement
Guest User

Untitled

a guest
Aug 6th, 2011
405
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.90 KB | None | 0 0
  1. dev:~# iptables -L
  2. Chain INPUT (policy ACCEPT)
  3. target prot opt source destination
  4. DROP icmp -- anywhere anywhere
  5.  
  6. Chain FORWARD (policy ACCEPT)
  7. target prot opt source destination
  8.  
  9. Chain OUTPUT (policy ACCEPT)
  10. target prot opt source destination
  11. dev:~# tcpdump -c 3 icmp
  12. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  13. listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
  14. 01:21:31.232498 IP XXX.XX.XXX.1 > XXX.XX.XXX.2: ICMP echo request, id 21360, seq 31, length 64
  15. 01:21:32.239395 IP XXX.XX.XXX.1 > XXX.XX.XXX.2: ICMP echo request, id 21360, seq 32, length 64
  16. 01:21:33.245899 IP XXX.XX.XXX.1 > XXX.XX.XXX.2: ICMP echo request, id 21360, seq 33, length 64
  17. 3 packets captured
  18. 3 packets received by filter
  19. 0 packets dropped by kernel
  20. dev:~#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement