probe::netfilter.ip.forward — Called on an incoming IP packet addressed to some other computer
netfilter.ip.forward
outdev_nameName of network device packet will be routed to (if known)
ipproto_tcpConstant used to signify that the packet protocol is TCP
sportTCP or UDP source port (ipv4 only)
saddrA string representing the source IP address
familyIP address family
pshTCP PSH flag (if protocol is TCP; ipv4 only)
data_hexA hexadecimal string representing the packet buffer contents
nf_acceptConstant used to signify an 'accept' verdict
data_strA string representing the packet buffer contents
nf_dropConstant used to signify a 'drop' verdict
nf_queueConstant used to signify a 'queue' verdict
finTCP FIN flag (if protocol is TCP; ipv4 only)
rstTCP RST flag (if protocol is TCP; ipv4 only)
outdevAddress of net_device representing output device, 0 if unknown
protocolPacket protocol from driver (ipv4 only)
indevAddress of net_device representing input device, 0 if unknown
dportTCP or UDP destination port (ipv4 only)
daddrA string representing the destination IP address
ackTCP ACK flag (if protocol is TCP; ipv4 only)
urgTCP URG flag (if protocol is TCP; ipv4 only)
nf_stopConstant used to signify a 'stop' verdict
synTCP SYN flag (if protocol is TCP; ipv4 only)
iphdrAddress of IP header
lengthThe length of the packet buffer contents, in bytes
pfProtocol family -- either “ipv4” or “ipv6”
indev_nameName of network device packet was received on (if known)
nf_repeatConstant used to signify a 'repeat' verdict
ipproto_udpConstant used to signify that the packet protocol is UDP
nf_stolenConstant used to signify a 'stolen' verdict