1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

DMZ packets show reverse source/dest IP

Discussion in 'Tomato Firmware' started by WireSharp, Apr 4, 2008.

  1. WireSharp

    WireSharp Addicted to LI Member

    I have set up DMZ on my Tomato to forward unsolicited packets from the WAN to another router on my network, a Linksys with Intrusion Protection. When I look at these packets in the QoS "View Details", the source and destination are reversed. For example I see:

    UDP 1026 ( 20701 Unclassified

    This is actually an unsolicited packet from the WAN that has been forwarded to my Linksys at I know this because in the log file on Tomato I get the following entry:

    Apr 3 21:30:50 user.warn kernel: ACCEPT IN=ppp0 OUT=br0 SRC= DST= LEN=512 TOS=0x00 PREC=0x00 TTL=67 ID=19449 PROTO=UDP SPT=20701 DPT=1026 LEN=492

    Is this supposed to be this way? Because it seems backwards to me. Thanks for a great firmware!
  2. Guyfromhe

    Guyfromhe Network Guru Member

    Thats how Ciscos show their Nat translations Local then Remote, maybe they were copying that..
  3. TexasFlood

    TexasFlood Network Guru Member

    Makes sense, since 3rd party firmware for Linksys routers is most if not all based on Linksys firmware and Cisco has owned linksys since, what, 2003?
  4. WireSharp

    WireSharp Addicted to LI Member

    Ok, well thats cool. Tomato is a great firmware and I thought I'd let people know about this bug in case they want to fix it (assuming its a bug and not just me being a newbie) :)

Share This Page