probe::netfilter.ip.forward — Called on an incoming IP packet addressed to some other computer
netfilter.ip.forward
data_hexA hexadecimal string representing the packet buffer contents
indev_nameName of network device packet was received on (if known)
synTCP SYN flag (if protocol is TCP; ipv4 only)
nf_stolenConstant used to signify a 'stolen' verdict
daddrA string representing the destination IP address
sportTCP or UDP source port (ipv4 only)
lengthThe length of the packet buffer contents, in bytes
urgTCP URG flag (if protocol is TCP; ipv4 only)
nf_acceptConstant used to signify an 'accept' verdict
indevAddress of net_device representing input device, 0 if unknown
data_strA string representing the packet buffer contents
ipproto_udpConstant used to signify that the packet protocol is UDP
rstTCP RST flag (if protocol is TCP; ipv4 only)
nf_dropConstant used to signify a 'drop' verdict
nf_repeatConstant used to signify a 'repeat' verdict
saddrA string representing the source IP address
dportTCP or UDP destination port (ipv4 only)
familyIP address family
nf_queueConstant used to signify a 'queue' verdict
ipproto_tcpConstant used to signify that the packet protocol is TCP
iphdrAddress of IP header
pfProtocol family -- either “ipv4” or “ipv6”
finTCP FIN flag (if protocol is TCP; ipv4 only)
outdev_nameName of network device packet will be routed to (if known)
nf_stopConstant used to signify a 'stop' verdict
outdevAddress of net_device representing output device, 0 if unknown
pshTCP PSH flag (if protocol is TCP; ipv4 only)
protocolPacket protocol from driver (ipv4 only)
ackTCP ACK flag (if protocol is TCP; ipv4 only)