Date: Tue, 21 Dec 2010 18:39:54 -0500 From: Michael Scheidell <michael.scheidell@secnap.com> To: <freebsd-security@freebsd.org> Subject: Re: packet capture and if_bridge ignore bpf rules Message-ID: <4D113ACA.5050104@secnap.com> In-Reply-To: <4D03A13F.7070204@secnap.com> References: <4D03A13F.7070204@secnap.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 12/11/10 11:05 AM, Michael Scheidell wrote:
> I am just not working on tracking this down, and sometimes like to use
> tcpdump/tshark to watch specific packets on a host to look for
> 'interesting' things.
> I think I have seen this since 6.x I don't remember it on 5.x, but
> 5.x used 'bridge' and 6.x and 7.x are using if_bridge.
>
> system is 7.3, amd64. tried this on 6.x amd64, and i386. same results.
> googled a lot and didn't see anything I could use.
>
im an idiot. its vlan trunked traffic, for tagged vlan packets.
on the systems that don't look like they work:
(tshark|tcpdump) -niem0 vlan and net 204.89.241.0/24
works just fine.
--
Michael Scheidell, CTO
o: 561-999-5000
d: 561-948-2259
ISN: 1259*1300
>*| *SECNAP Network Security Corporation
* Certified SNORT Integrator
* 2008-9 Hot Company Award Winner, World Executive Alliance
* Five-Star Partner Program 2009, VARBusiness
* Best in Email Security,2010: Network Products Guide
* King of Spam Filters, SC Magazine 2008
______________________________________________________________________
This email has been scanned and certified safe by SpammerTrap(r).
For Information please see http://www.secnap.com/products/spammertrap/
______________________________________________________________________
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4D113ACA.5050104>
