If we just wanted to look at traffic that went out to the IPSec world, we could use:

iptables -I FORWARD -j LOG -o ipsec+

Clearly there are many more combinations possible.

It is therefore possible to write rules that log inbound and outbound traffic, or to construct several rules that differentiate between the two.

Rate Limiting

iptables has the facility for rate-limiting the log messages that are generated, in order to avoid denial of service issues arising out of logging these access attempts. To achieve this, use the following option:

--limit rate

rate is the maximum average matching rate, specified as a number with an optional /second, /minute, /hour, or /day suffix. The default is 3/hour.

--limit-burst number

number is the maximum initial number of packets to match. This number gets recharged by one every time the limit specified above is not reached, up to this number. The default is 5.

iptables has many more options. Perform a web search for manpage iptables to find the relevant documentation.

The LOG rules configured by default (e.g. Default Deny:) are all limited to:

--limit 3/hour --limit-burst 5

182

Appendix C – System Log

Page 186
Image 186
SnapGear 2.0.1 user manual Rate Limiting, Appendix C System Log