Blame man/man8/tc-xt.8

Packit Service 3880ab
.TH "iptables action in tc" 8 "3 Mar 2016" "iproute2" "Linux"
Packit Service 3880ab
Packit Service 3880ab
.SH NAME
Packit Service 3880ab
xt - tc iptables action
Packit Service 3880ab
.SH SYNOPSIS
Packit Service 3880ab
.in +8
Packit Service 3880ab
.ti -8
Packit Service 3880ab
.BR tc " ... " "action xt \-j"
Packit Service 3880ab
.IR TARGET " [ " TARGET_OPTS " ]"
Packit Service 3880ab
.SH DESCRIPTION
Packit Service 3880ab
The
Packit Service 3880ab
.B xt
Packit Service 3880ab
action allows to call arbitrary iptables targets for packets matching the filter
Packit Service 3880ab
this action is attached to.
Packit Service 3880ab
.SH OPTIONS
Packit Service 3880ab
.TP
Packit Service 3880ab
.BI -j " TARGET \fR[\fI TARGET_OPTS \fR]"
Packit Service 3880ab
Perform a jump to the given iptables target, optionally passing any target
Packit Service 3880ab
specific options in
Packit Service 3880ab
.IR TARGET_OPTS .
Packit Service 3880ab
.SH EXAMPLES
Packit Service 3880ab
The following will attach a
Packit Service 3880ab
.B u32
Packit Service 3880ab
filter to the
Packit Service 3880ab
.B ingress
Packit Service 3880ab
qdisc matching ICMP replies and using the
Packit Service 3880ab
.B xt
Packit Service 3880ab
action to make the kernel yell 'PONG' each time:
Packit Service 3880ab
Packit Service 3880ab
.RS
Packit Service 3880ab
.EX
Packit Service 3880ab
tc qdisc add dev eth0 ingress
Packit Service 3880ab
tc filter add dev eth0 parent ffff: proto ip u32 \\
Packit Service 3880ab
	match ip protocol 1 0xff \\
Packit Service 3880ab
	match ip icmp_type 0 0xff \\
Packit Service 3880ab
	action xt -j LOG --log-prefix PONG
Packit Service 3880ab
.EE
Packit Service 3880ab
.RE
Packit Service 3880ab
.SH SEE ALSO
Packit Service 3880ab
.BR tc (8),
Packit Service 3880ab
.BR tc-u32 (8),
Packit Service 3880ab
.BR iptables-extensions (8)