@@ -31,20 +31,22 @@ ftf-cli --firewall-system 'linux_netfilter' \
3131 --src-ip 172.17.11.5 \
3232 --dst-ip 2.2.2.2
3333
34+ > 🛈 SYSTEM: Processing packet: [172.17.11.5]:50000 =tcp=> [2.2.2.2]:443
3435> 🛈 ROUTER: Packet inbound-interface: docker0
3536> 🛈 ROUTER: Packet inbound-route: 172.17.0.0/16, scope link
36- > 🛈 FIREWALL: Processing Chain: Table nat ip4 | Chain PREROUTING ip4 nat
37+ > 🛈 FIREWALL: Processing Chain: Table " nat" ip4 | Chain " PREROUTING" ip4 nat (1 rules)
3738> 🛈 FIREWALL: > Chain PREROUTING | Rule 0 | Match => jump
38- > 🛈 FIREWALL: > Chain PREROUTING | Sub-Chain: DOCKER
39+ > 🛈 FIREWALL: > Chain PREROUTING | Sub-Chain: DOCKER (2 rules)
3940> 🛈 FIREWALL: > Chain DOCKER | Rule 0 | Match => return
4041> 🛈 ROUTER: Packet outbound-interface: wan
41- > 🛈 ROUTER: Packet outbound-route: 0.0.0.0/0, gw 10.255.255.254, metric 600, scope remote
42- > 🛈 FIREWALL: Processing Chain: Table filter ip4 | Chain FORWARD ip4 filter
42+ > 🛈 ROUTER: Packet outbound-route: 0.0.0.0/0, gw 10.255.255.254, metric 600, scope global
43+ > 🛈 FIREWALL: Processing Chain: Table " filter" ip4 | Chain " FORWARD" ip4 filter (5 rules)
4344> 🛈 FIREWALL: > Chain FORWARD | Rule 0 | Match => jump
44- > 🛈 FIREWALL: > Chain FORWARD | Sub-Chain: DOCKER-USER
45+ > 🛈 FIREWALL: > Chain FORWARD | Sub-Chain: DOCKER-USER (1 rules)
4546> 🛈 FIREWALL: > Chain DOCKER-USER | Rule 0 | Match => return
4647> 🛈 FIREWALL: > Chain FORWARD | Rule 1 | Match => drop
47- > ✖ FIREWALL: Packet blocked by rule: {' action' : ' drop' , ' seq' : 1, ' raw' : Rule: # 101 "TEST DROP" | Matches: [proto_l3 == ip4 & ip_daddr == ['2.2.2.2/32']]}
48+ > ✖ FIREWALL: Packet blocked by rule: Seq 1, Action: drop, Rule: # 101 "TEST IP4-DADDR DROP"
49+ > > Matches: {' proto_l3' : {' ==' : ' ip4' }, ' ip_daddr' : {' ==' : [' 2.2.2.2/32' ]}}
4850```
4951
5052----
0 commit comments