blob: 47c35e0ed8942b01a2a300f1d694cefb72a8e9bf [file] [log] [blame]
Henrik Nordstromc2794132004-01-22 15:04:24 +00001Turn on kernel logging of matching packets. When this option is set
2for a rule, the Linux kernel will print some information on all
3matching packets (like most IP header fields) via the kernel log
4(where it can be read with
5.I dmesg
6or
7.IR syslogd (8)).
8This is a "non-terminating target", i.e. rule traversal continues at
9the next rule. So if you want to LOG the packets you refuse, use two
10separate rules with the same matching criteria, first using target LOG
11then DROP (or REJECT).
12.TP
Jan Engelhardtfea74bf2009-01-12 04:53:18 +010013\fB\-\-log\-level\fP \fIlevel\fP
Henrik Nordstromc2794132004-01-22 15:04:24 +000014Level of logging (numeric or see \fIsyslog.conf\fP(5)).
15.TP
Jan Engelhardtfea74bf2009-01-12 04:53:18 +010016\fB\-\-log\-prefix\fP \fIprefix\fP
Henrik Nordstromc2794132004-01-22 15:04:24 +000017Prefix log messages with the specified prefix; up to 29 letters long,
18and useful for distinguishing messages in the logs.
19.TP
Jan Engelhardtfea74bf2009-01-12 04:53:18 +010020\fB\-\-log\-tcp\-sequence\fP
Henrik Nordstromc2794132004-01-22 15:04:24 +000021Log TCP sequence numbers. This is a security risk if the log is
22readable by users.
23.TP
Jan Engelhardtfea74bf2009-01-12 04:53:18 +010024\fB\-\-log\-tcp\-options\fP
Henrik Nordstromc2794132004-01-22 15:04:24 +000025Log options from the TCP packet header.
26.TP
Jan Engelhardtfea74bf2009-01-12 04:53:18 +010027\fB\-\-log\-ip\-options\fP
Henrik Nordstromc2794132004-01-22 15:04:24 +000028Log options from the IP packet header.
John Langef46e1af2005-01-02 23:33:12 +000029.TP
Jan Engelhardtfea74bf2009-01-12 04:53:18 +010030\fB\-\-log\-uid\fP
John Langef46e1af2005-01-02 23:33:12 +000031Log the userid of the process which generated the packet.