Home
last modified time | relevance | path

Searched refs:eth0 (Results 1 – 25 of 92) sorted by relevance

1234

/external/iptables/extensions/
Dlibipt_SNAT.txlate1 iptables-translate -t nat -A postrouting -o eth0 -j SNAT --to 1.2.3.4
2 nft add rule ip nat postrouting oifname "eth0" counter snat to 1.2.3.4
4 iptables-translate -t nat -A postrouting -o eth0 -j SNAT --to 1.2.3.4-1.2.3.6
5 nft add rule ip nat postrouting oifname "eth0" counter snat to 1.2.3.4-1.2.3.6
7 iptables-translate -t nat -A postrouting -p tcp -o eth0 -j SNAT --to 1.2.3.4:1-1023
8 nft add rule ip nat postrouting oifname "eth0" ip protocol tcp counter snat to 1.2.3.4:1-1023
10 iptables-translate -t nat -A postrouting -o eth0 -j SNAT --to 1.2.3.4 --random
11 nft add rule ip nat postrouting oifname "eth0" counter snat to 1.2.3.4 random
13 iptables-translate -t nat -A postrouting -o eth0 -j SNAT --to 1.2.3.4 --random --persistent
14 nft add rule ip nat postrouting oifname "eth0" counter snat to 1.2.3.4 random,persistent
Dlibip6t_SNAT.txlate1 ip6tables-translate -t nat -A postrouting -o eth0 -p tcp -j SNAT --to [fec0::1234]:80
2 nft add rule ip6 nat postrouting oifname "eth0" meta l4proto tcp counter snat to [fec0::1234]:80
4 ip6tables-translate -t nat -A postrouting -o eth0 -p tcp -j SNAT --to [fec0::1234]:1-20
5 nft add rule ip6 nat postrouting oifname "eth0" meta l4proto tcp counter snat to [fec0::1234]:1-20
7 ip6tables-translate -t nat -A postrouting -o eth0 -p tcp -j SNAT --to [fec0::1234]:123 --random
8 nft add rule ip6 nat postrouting oifname "eth0" meta l4proto tcp counter snat to [fec0::1234]:123 r…
10 ip6tables-translate -t nat -A postrouting -o eth0 -p tcp -j SNAT --to [fec0::1234]:123 --random-ful…
11 nft add rule ip6 nat postrouting oifname "eth0" meta l4proto tcp counter snat to [fec0::1234]:123 f…
Dlibipt_DNAT.txlate1 iptables-translate -t nat -A prerouting -p tcp -o eth0 -j DNAT --to-destination 1.2.3.4
2 nft add rule ip nat prerouting oifname "eth0" ip protocol tcp counter dnat to 1.2.3.4
7 iptables-translate -t nat -A prerouting -p tcp -o eth0 -j DNAT --to-destination 1.2.3.4:1-1023
8 nft add rule ip nat prerouting oifname "eth0" ip protocol tcp counter dnat to 1.2.3.4:1-1023
10 iptables-translate -t nat -A prerouting -p tcp -o eth0 -j DNAT --to-destination 1.2.3.4 --random
11 nft add rule ip nat prerouting oifname "eth0" ip protocol tcp counter dnat to 1.2.3.4 random
13 iptables-translate -t nat -A prerouting -p tcp -o eth0 -j DNAT --to-destination 1.2.3.4 --random --…
14 nft add rule ip nat prerouting oifname "eth0" ip protocol tcp counter dnat to 1.2.3.4 random,persis…
Dlibxt_udp.txlate1 iptables-translate -A INPUT -p udp -i eth0 --sport 53 -j ACCEPT
2 nft add rule ip filter INPUT iifname "eth0" udp sport 53 counter accept
4 iptables-translate -A OUTPUT -p udp -o eth0 --dport 53:66 -j DROP
5 nft add rule ip filter OUTPUT oifname "eth0" udp dport 53-66 counter drop
Dlibxt_TEE.txlate1 # iptables-translate -t mangle -A PREROUTING -j TEE --gateway 192.168.0.2 --oif eth0
2 # nft add rule ip mangle PREROUTING counter dup to 192.168.0.2 device eth0
10 ip6tables-translate -t mangle -A PREROUTING -j TEE --gateway ab12:00a1:1112:acba:: --oif eth0
11 nft add rule ip6 mangle PREROUTING counter dup to ab12:a1:1112:acba:: device eth0
Dlibxt_tcp.txlate1 iptables-translate -A INPUT -p tcp -i eth0 --sport 53 -j ACCEPT
2 nft add rule ip filter INPUT iifname "eth0" tcp sport 53 counter accept
4 iptables-translate -A OUTPUT -p tcp -o eth0 --dport 53:66 -j DROP
5 nft add rule ip filter OUTPUT oifname "eth0" tcp dport 53-66 counter drop
Dlibxt_SYNPROXY.man25 tcpdump -pni eth0 -c 1 'tcp[tcpflags] == (tcp-syn|tcp-ack)'
50 iptables \-t raw \-A PREROUTING \-i eth0 \-p tcp \-\-dport 80
59 iptables \-A INPUT \-i eth0 \-p tcp \-\-dport 80
66 iptables \-A INPUT \-i eth0 \-p tcp \-\-dport 80 \-m state \-\-state INVALID \-j DROP
Dlibxt_TEE.man10 To forward all incoming traffic on eth0 to an Network Layer logging box:
12 \-t mangle \-A PREROUTING \-i eth0 \-j TEE \-\-gateway 2001:db8::1
Dlibxt_rateest.man80 iptables \-t mangle \-A POSTROUTING \-o eth0 \-j RATEEST \-\-rateest\-name eth0
89 \-m rateest \-\-rateest\-delta \-\-rateest1 eth0 \-\-rateest\-bps1 2.5mbit \-\-rateest\-gt
94 \-\-rateest2 eth0 \-\-rateest\-bps2 2.5mbit \-j CONNMARK \-\-set\-mark 2
/external/iproute2/doc/actions/
Dmirred-usage46 1) redirecting eth0 to eth0
47 2) eth0->eth1-> eth0
48 3) eth0->lo-> eth1-> eth0
65 1) Mirror all packets arriving on eth0 to be sent out on eth1.
69 tc qdisc add dev eth0 ingress
70 tc filter add dev eth0 parent ffff: protocol ip prio 10 u32 \
77 2) Host A is hooked up to us on eth0
79 # redirect all packets arriving on ingress of lo to eth0
83 match u32 0 0 flowid 1:2 action mirred egress redirect dev eth0
90 Ping would fail since all packets are heading out eth0
[all …]
Dgact-usage28 tc qdisc add dev eth0 ingress
31 tc filter add dev eth0 parent ffff: protocol ip prio 6 u32 match ip src \
50 tc filter add dev eth0 parent ffff: protocol ip prio 6 u32 match ip src \
65 tc filter add dev eth0 parent ffff: protocol ip prio 6 u32 match ip src \
70 tc -s filter show parent ffff: dev eth0
Difb-README55 $TC qdisc add dev eth0 ingress
57 # redirect all IP packets arriving in eth0 to ifb0
59 $TC filter add dev eth0 parent ffff: protocol ip prio 10 u32 \
85 [root@jmandrake]:~# $TC -s filter show parent ffff: dev eth0
108 qdisc ingress ffff: dev eth0 ----------------
/external/linux-kselftest/tools/testing/selftests/net/
Dicmp_redirect.sh192 ip -netns h1 li add eth0 type veth peer name r1h1
193 ip -netns h1 li set r1h1 netns r1 name eth0 up
196 ip -netns h1 li set r2h1 netns r2 name eth0 up
198 ip -netns h2 li add eth0 type veth peer name r2h2
199 ip -netns h2 li set eth0 up
225 ip -netns h1 li set eth0 master br0 up
231 ip -netns h2 addr add dev eth0 ${H2_N2_IP}/24
232 ip -netns h2 ro add default via ${R2_N2_IP} dev eth0
233 ip -netns h2 -6 addr add dev eth0 ${H2_N2_IP6}/64 nodad
234 ip -netns h2 -6 ro add default via ${R2_N2_IP6} dev eth0
[all …]
Dfib_nexthop_multiprefix.sh111 ip -netns h${i} li add eth0 type veth peer name r1h${i}
112 ip -netns h${i} li set eth0 up
115 ip -netns h${i} addr add dev eth0 172.16.10${i}.1/24
116 ip -netns h${i} -6 addr add dev eth0 2001:db8:10${i}::1/64
121 ip -netns h0 nexthop add id 4 via 172.16.100.254 dev eth0
122 ip -netns h0 nexthop add id 6 via 2001:db8:100::64 dev eth0
158 run_cmd ip -netns h${hostid} li set eth0 mtu ${mtu}
Dtraceroute.sh197 connect_ns host-1 eth0 - 2000:101::3/64 router-1 eth0 - -
198 ip netns exec router-1 ip link set dev eth0 master ${brdev}
261 connect_ns host-1 eth0 1.0.1.3/24 - \
269 connect_ns host-2 eth0 1.0.2.4/24 - \
/external/tcpdump/win32/src/
Dether_ntohost.c46 static struct ether_entry *eth0 = NULL; variable
149 for (e = eth0; e; e = next) { in free_ethers()
154 eth0 = NULL; in free_ethers()
185 e->next = eth0; in init_ethers()
186 eth0 = e; in init_ethers()
212 for (cache = eth0; cache; cache = cache->next) in ether_ntohost()
/external/bcc/tools/
Ddcsnoop_example.txt17 0.003180 1643 snmpd M net/ipv4/neigh/eth0/retrans_time_ms
18 0.003192 1643 snmpd M ipv4/neigh/eth0/retrans_time_ms
19 0.003197 1643 snmpd M neigh/eth0/retrans_time_ms
20 0.003203 1643 snmpd M eth0/retrans_time_ms
22 0.003245 1643 snmpd M ipv6/neigh/eth0/retrans_time_ms
23 0.003249 1643 snmpd M neigh/eth0/retrans_time_ms
24 0.003252 1643 snmpd M eth0/retrans_time_ms
26 0.003287 1643 snmpd M conf/eth0/forwarding
27 0.003292 1643 snmpd M eth0/forwarding
Dhardirqs_example.txt32 eth0 11441
34 The HARDIRQ column prints the interrupt action name. While tracing, the eth0
73 eth0 7498
98 eth0 6972
123 eth0 7152
127 shows that most time was spent processing for eth0 (network interface), which
158 eth0 16015
186 eth0 9743
327 hardirq = 'eth0'
632 eth0 34
/external/iproute2/examples/
DREADME.cbq23 # correct only for ETHERNET (eth0,1,2..) linux interfaces. It works for
53 # DEVICE=eth0,10Mbit,1Mbit
61 # DEVICE: eth0 - device where we do control our traffic
63 # 1Mbit - "weight" of :1 class (parent for all shapers for eth0),
65 # 100Mbit adapter's example: DEVICE=eth0,100Mbit,10Mbit
68 # is smart :) You can put only 'DEVICE=eth0' into cbq-*
69 # config file for eth0.
99 # BACKBONE -----eth0-| linux |-eth1------*[our client]
114 # DEVICE=eth0,10Mbit,1Mbit
/external/bcc/tests/
Dwrapper.sh.in29 sudo ip netns exec $ns ip link set $ns.in name eth0
30 sudo ip netns exec $ns ip addr add dev eth0 172.16.1.2/24
31 sudo ip netns exec $ns ip link set eth0 up
32 sudo ip netns exec $ns ethtool -K eth0 tx off
/external/linux-kselftest/tools/testing/selftests/netfilter/
Dbridge_brouter.sh30 ip link add veth0 netns ns0 type veth peer name eth0 netns ns1
35 ip link add veth1 netns ns0 type veth peer name eth0 netns ns2
55 ip -net ns$i link set eth0 up
56 ip -net ns$i addr add 10.0.0.1$i/24 dev eth0
Dnft_flowtable.sh69 ip link add veth0 netns nsr1 type veth peer name eth0 netns ns1
72 ip link add veth1 netns nsr2 type veth peer name eth0 netns ns2
93 ip -net ns1 link set eth0 mtu 9000
96 ip -net ns2 link set eth0 mtu 2000
111 ip -net ns$i link set eth0 up
112 ip -net ns$i addr add 10.0.$i.99/24 dev eth0
114 ip -net ns$i addr add dead:$i::99/64 dev eth0
/external/autotest/client/site_tests/network_NegotiatedLANSpeed/
Dcontrol14 job.run_test('network_NegotiatedLANSpeed', iface_name = 'eth0', tag = 'eth0')
/external/curl/tests/data/
Dtest156040 we got https://[fe80::20c:29ff:fe9c:409b%25eth0]/hello.html
42 we got eth0
/external/iproute2/testsuite/tests/tc/
Dcls-testbed.t61 ts_tc "cls-testbed" "tree listing" qdisc list dev eth0
62 ts_tc "cls-testbed" "tree class listing" class list dev eth0

1234