Re: packet capture and if_bridge ignore bpf rules

看板FB_security作者時間15年前 (2010/12/22 08:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/2 (看更多)
On 12/11/10 11:05 AM, Michael Scheidell wrote: > I am just not working on tracking this down, and sometimes like to use > tcpdump/tshark to watch specific packets on a host to look for > 'interesting' things. > I think I have seen this since 6.x I don't remember it on 5.x, but > 5.x used 'bridge' and 6.x and 7.x are using if_bridge. > > system is 7.3, amd64. tried this on 6.x amd64, and i386. same results. > googled a lot and didn't see anything I could use. > im an idiot. its vlan trunked traffic, for tagged vlan packets. on the systems that don't look like they work: (tshark|tcpdump) -niem0 vlan and net 204.89.241.0/24 works just fine. -- Michael Scheidell, CTO o: 561-999-5000 d: 561-948-2259 ISN: 1259*1300 >*| *SECNAP Network Security Corporation * Certified SNORT Integrator * 2008-9 Hot Company Award Winner, World Executive Alliance * Five-Star Partner Program 2009, VARBusiness * Best in Email Security,2010: Network Products Guide * King of Spam Filters, SC Magazine 2008 ______________________________________________________________________ This email has been scanned and certified safe by SpammerTrap(r). For Information please see http://www.secnap.com/products/spammertrap/ ______________________________________________________________________ _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1D4J-_jF (FB_security)
文章代碼(AID): #1D4J-_jF (FB_security)