probe::netfilter.ip.forward — Called on an incoming IP packet addressed to some other computer
netfilter.ip.forward
outdev_nameName of network device packet will be routed to (if known)
indevAddress of net_device representing input device, 0 if unknown
finTCP FIN flag (if protocol is TCP; ipv4 only)
pfProtocol family -- either “ipv4” or “ipv6”
saddrA string representing the source IP address
sportTCP or UDP source port (ipv4 only)
synTCP SYN flag (if protocol is TCP; ipv4 only)
data_strA string representing the packet buffer contents
urgTCP URG flag (if protocol is TCP; ipv4 only)
nf_stopConstant used to signify a 'stop' verdict
nf_repeatConstant used to signify a 'repeat' verdict
nf_queueConstant used to signify a 'queue' verdict
ipproto_tcpConstant used to signify that the packet protocol is TCP
nf_acceptConstant used to signify an 'accept' verdict
lengthThe length of the packet buffer contents, in bytes
protocolPacket protocol from driver (ipv4 only)
data_hexA hexadecimal string representing the packet buffer contents
indev_nameName of network device packet was received on (if known)
iphdrAddress of IP header
nf_dropConstant used to signify a 'drop' verdict
ackTCP ACK flag (if protocol is TCP; ipv4 only)
familyIP address family
ipproto_udpConstant used to signify that the packet protocol is UDP
pshTCP PSH flag (if protocol is TCP; ipv4 only)
daddrA string representing the destination IP address
outdevAddress of net_device representing output device, 0 if unknown
dportTCP or UDP destination port (ipv4 only)
nf_stolenConstant used to signify a 'stolen' verdict
rstTCP RST flag (if protocol is TCP; ipv4 only)