Date: Tue, 21 Dec 2010 18:39:54 -0500 From: Michael Scheidell <michael.scheidell@secnap.com> To: <freebsd-security@freebsd.org> Subject: Re: packet capture and if_bridge ignore bpf rules Message-ID: <4D113ACA.5050104@secnap.com> In-Reply-To: <4D03A13F.7070204@secnap.com> References: <4D03A13F.7070204@secnap.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 12/11/10 11:05 AM, Michael Scheidell wrote: > I am just not working on tracking this down, and sometimes like to use > tcpdump/tshark to watch specific packets on a host to look for > 'interesting' things. > I think I have seen this since 6.x I don't remember it on 5.x, but > 5.x used 'bridge' and 6.x and 7.x are using if_bridge. > > system is 7.3, amd64. tried this on 6.x amd64, and i386. same results. > googled a lot and didn't see anything I could use. > im an idiot. its vlan trunked traffic, for tagged vlan packets. on the systems that don't look like they work: (tshark|tcpdump) -niem0 vlan and net 204.89.241.0/24 works just fine. -- Michael Scheidell, CTO o: 561-999-5000 d: 561-948-2259 ISN: 1259*1300 >*| *SECNAP Network Security Corporation * Certified SNORT Integrator * 2008-9 Hot Company Award Winner, World Executive Alliance * Five-Star Partner Program 2009, VARBusiness * Best in Email Security,2010: Network Products Guide * King of Spam Filters, SC Magazine 2008 ______________________________________________________________________ This email has been scanned and certified safe by SpammerTrap(r). For Information please see http://www.secnap.com/products/spammertrap/ ______________________________________________________________________
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4D113ACA.5050104>