Примерно вот такую картину наблюдаю....
1364305330.180 1 192.168.1.7 TCP_DENIED/407 4488 GET http://yandex.ru/ - HIER_NONE/- text/html
1364305330.213 31 192.168.1.7 TCP_MISS/302 735 GET http://yandex.ru/ user@DOMAIN.RU HIER_DIRECT/77.88.21.11 text/html
1364305330.215 1 192.168.1.7 TCP_DENIED/407 4597 GET http://www.yandex.ru/ - HIER_NONE/- text/html
1364305391.508 3 192.168.1.7 TCP_DENIED/407 4388 GET http://www.tns-counter.ru/V13a**551e3394b103c2cce17518c926d0dfbc**yandex_ru/ru/CP1251/tmsec=yandex_main/0 - HIER_NONE/- text/html
1364305391.513 4 192.168.1.7 TCP_DENIED/407 4777 GET http://yabs.yandex.ru/count/K1VVcLqf-VG40002ZhzU6XK5KPK2cmPf... - HIER_NONE/- text/html
1364305391.538 61322 192.168.1.7 TCP_MISS/200 145252 GET http://www.yandex.ru/ user@DOMAIN.RU HIER_DIRECT/87.250.251.3 text/html
1364305391.581 66 192.168.1.7 TCP_MISS/302 712 GET http://yabs.yandex.ru/count/K1VVcLqf-VG40002ZhzU6XK5KPK2cmPf... user@DOMAIN.RU HIER_DIRECT/93.158.134.91 -
1364305391.591 6 192.168.1.7 TCP_DENIED/407 4409 GET http://mc.yandex.ru/watch/722545 - HIER_NONE/- text/html
1364305391.592 4 192.168.1.7 TCP_DENIED/407 4782 GET http://yabs.yandex.ru/count/K1VVcGikAGa40000ZhzU6XK5KP6yq4ba...? - HIER_NONE/- text/html
1364305391.597 84 192.168.1.7 TCP_MISS/200 671 GET http://www.tns-counter.ru/V13a**551e3394b103c2cce17518c926d0dfbc**yandex_ru/ru/CP1251/tmsec=yandex_main/0 user@DOMAIN.RU HIER_DIRECT/217.73.200.220 image/gif
1364305391.628 3 192.168.1.7 TCP_DENIED/407 4515 GET http://bs.serving-sys.com/BurstingPipe/adServer.bs? - HIER_NONE/- text/html
1364305391.639 45 192.168.1.7 TCP_MISS/200 697 GET http://yabs.yandex.ru/count/K1VVcGikAGa40000ZhzU6XK5KP6yq4ba...? user@DOMAIN.RU HIER_DIRECT/93.158.134.91 image/gif
1364305391.645 52 192.168.1.7 TCP_MISS/302 738 GET http://mc.yandex.ru/watch/722545 user@DOMAIN.RU HIER_DIRECT/87.250.250.119 -
1364305391.655 9 192.168.1.7 TCP_DENIED/407 4543 GET http://mc.yandex.ru/watch/722545/1 - HIER_NONE/- text/html
1364305391.655 25 192.168.1.7 TCP_IMS_HIT/304 461 GET http://bs.serving-sys.com/BurstingPipe/adServer.bs? user@DOMAIN.RU HIER_NONE/- image/gif
1364305391.657 7 192.168.1.7 TCP_DENIED/407 6056 GET http://awaps.yandex.ru/0/c1/tgFtaeLDK0yb01A7xvQF08v1ztbTEKv8... - HIER_NONE/- text/html
1364305391.694 37 192.168.1.7 TCP_MISS/200 701 GET http://mc.yandex.ru/watch/722545/1 user@DOMAIN.RU HIER_DIRECT/87.250.250.119 image/gif
1364305391.727 2 192.168.1.7 TCP_DENIED/407 3769 CONNECT yandex.st:443 - HIER_NONE/- text/html
1364305391.768 109 192.168.1.7 TCP_MISS/200 32922 GET http://awaps.yandex.ru/0/c1/tgFtaeLDK0yb01A7xvQF08v1ztbTEKv8... user@DOMAIN.RU HIER_DIRECT/77.88.21.131 application/x-shockwave-flash
1364305391.792 0 192.168.1.7 TCP_DENIED/407 4629 GET http://suggest.yandex.ru/suggest-ya.cgi? - HIER_NONE/- text/html
1364305391.835 41 192.168.1.7 TCP_MISS/200 601 GET http://suggest.yandex.ru/suggest-ya.cgi? user@DOMAIN.RU HIER_DIRECT/87.250.251.63 text/javascript
1364305391.904 0 192.168.1.7 TCP_DENIED/407 4200 GET http://yandex.ru/opensearch.xml - HIER_NONE/- text/html
1364305391.949 44 192.168.1.7 TCP_MISS/200 1021 GET http://yandex.ru/opensearch.xml user@DOMAIN.RU HIER_DIRECT/77.88.21.11 text/xml
1364305406.880 15151 192.168.1.7 TCP_MISS/200 3704 CONNECT yandex.st:443 user@DOMAIN.RU HIER_DIRECT/213.180.204.215 -
tcpdump -n -v host yandex.ru
tcpdump: WARNING: bce0: no IPv4 address assigned
tcpdump: listening on bce0, link-type EN10MB (Ethernet), capture size 65535 bytes
17:36:33.968647 IP (tos 0x0, ttl 64, id 1803, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.101.44361 > 213.180.193.11.80: Flags [S], cksum 0xb00c (correct), seq 4237179005, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 154751 ecr 0], length 0
17:36:33.981182 IP (tos 0x0, ttl 50, id 22087, offset 0, flags [DF], proto TCP (6), length 60)
213.180.193.11.80 > 192.168.1.101.44361: Flags [S.], cksum 0xd1f7 (correct), seq 183351630, ack 4237179006, win 65535, options [mss 1360,nop,wscale 6,sackOK,TS val 1246285795 ecr 154751], length 0
17:36:33.981210 IP (tos 0x0, ttl 64, id 1804, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.101.44361 > 213.180.193.11.80: Flags [.], cksum 0xfc49 (correct), ack 1, win 1032, options [nop,nop,TS val 154764 ecr 1246285795], length 0
17:36:33.981366 IP (tos 0x0, ttl 64, id 1805, offset 0, flags [DF], proto TCP (6), length 846)
192.168.1.101.44361 > 213.180.193.11.80: Flags [P.], cksum 0x02f4 (correct), seq 1:795, ack 1, win 1032, options [nop,nop,TS val 154764 ecr 1246285795], length 794
17:36:33.994009 IP (tos 0x0, ttl 50, id 22584, offset 0, flags [DF], proto TCP (6), length 52)
213.180.193.11.80 > 192.168.1.101.44361: Flags [.], cksum 0xf92f (correct), ack 795, win 1019, options [nop,nop,TS val 1246285808 ecr 154764], length 0
17:36:33.998996 IP (tos 0x0, ttl 50, id 22810, offset 0, flags [DF], proto TCP (6), length 458)
213.180.193.11.80 > 192.168.1.101.44361: Flags [P.], cksum 0xec75 (correct), seq 1:407, ack 795, win 1032, options [nop,nop,TS val 1246285813 ecr 154764], length 406
17:36:34.088759 IP (tos 0x0, ttl 50, id 26153, offset 0, flags [DF], proto TCP (6), length 458)
213.180.193.11.80 > 192.168.1.101.44361: Flags [P.], cksum 0xec1b (correct), seq 1:407, ack 795, win 1032, options [nop,nop,TS val 1246285903 ecr 154764], length 406
17:36:34.088767 IP (tos 0x0, ttl 64, id 1819, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.101.44361 > 213.180.193.11.80: Flags [.], cksum 0xf71b (correct), ack 407, win 1032, options [nop,nop,TS val 154872 ecr 1246285813], length 0
17:37:34.019242 IP (tos 0x0, ttl 64, id 4088, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.101.44361 > 213.180.193.11.80: Flags [F.], cksum 0x0d00 (correct), seq 795, ack 407, win 1032, options [nop,nop,TS val 214802 ecr 1246285813], length 0
17:37:34.031686 IP (tos 0x0, ttl 50, id 50738, offset 0, flags [DF], proto TCP (6), length 52)
213.180.193.11.80 > 192.168.1.101.44361: Flags [.], cksum 0x227f (correct), ack 796, win 1032, options [nop,nop,TS val 1246345845 ecr 214802], length 0
17:37:34.031749 IP (tos 0x0, ttl 50, id 50739, offset 0, flags [DF], proto TCP (6), length 52)
213.180.193.11.80 > 192.168.1.101.44361: Flags [F.], cksum 0x227e (correct), seq 407, ack 796, win 1032, options [nop,nop,TS val 1246345845 ecr 214802], length 0
17:37:34.031814 IP (tos 0x0, ttl 64, id 4089, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.101.44361 > 213.180.193.11.80: Flags [.], cksum 0x2271 (correct), ack 408, win 1032, options [nop,nop,TS val 214815 ecr 1246345845], length 0
17:37:35.173634 IP (tos 0x0, ttl 64, id 4379, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.101.26444 > 77.88.21.11.80: Flags [S], cksum 0x2212 (correct), seq 1144654352, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 215957 ecr 0], length 0
17:37:35.186550 IP (tos 0x0, ttl 50, id 0, offset 0, flags [DF], proto TCP (6), length 60)
77.88.21.11.80 > 192.168.1.101.26444: Flags [S.], cksum 0x1a23 (correct), seq 3797624775, ack 1144654353, win 17796, options [mss 1360,sackOK,TS val 477404195 ecr 215957,nop,wscale 9], length 0
17:37:35.186576 IP (tos 0x0, ttl 64, id 4382, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.101.26444 > 77.88.21.11.80: Flags [.], cksum 0x89fc (correct), ack 1, win 1032, options [nop,nop,TS val 215970 ecr 477404195], length 0
17:37:35.186753 IP (tos 0x0, ttl 64, id 4383, offset 0, flags [DF], proto TCP (6), length 682)
192.168.1.101.26444 > 77.88.21.11.80: Flags [P.], cksum 0xb2a7 (correct), seq 1:631, ack 1, win 1032, options [nop,nop,TS val 215970 ecr 477404195], length 630
17:37:35.199946 IP (tos 0x0, ttl 50, id 48110, offset 0, flags [DF], proto TCP (6), length 52)
77.88.21.11.80 > 192.168.1.101.26444: Flags [.], cksum 0x8b65 (correct), ack 631, win 38, options [nop,nop,TS val 477404198 ecr 215970], length 0
17:37:35.208586 IP (tos 0x0, ttl 50, id 48111, offset 0, flags [DF], proto TCP (6), length 268)
77.88.21.11.80 > 192.168.1.101.26444: Flags [P.], cksum 0x71d4 (correct), seq 1:217, ack 631, win 38, options [nop,nop,TS val 477404201 ecr 215970], length 216
17:37:35.209429 IP (tos 0x0, ttl 50, id 48112, offset 0, flags [DF], proto TCP (6), length 549)
77.88.21.11.80 > 192.168.1.101.26444: Flags [P.], cksum 0xf765 (correct), seq 217:714, ack 631, win 38, options [nop,nop,TS val 477404201 ecr 215970], length 497
17:37:35.209436 IP (tos 0x0, ttl 64, id 4387, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.101.26444 > 77.88.21.11.80: Flags [.], cksum 0x84a9 (correct), ack 714, win 1024, options [nop,nop,TS val 215992 ecr 477404201], length 0