From owner-freebsd-hackers Tue Sep 4 14:46:12 2001 Delivered-To: freebsd-hackers@freebsd.org Received: from aries.ai.net (aries.ai.net [205.134.163.4]) by hub.freebsd.org (Postfix) with ESMTP id C494F37B401; Tue, 4 Sep 2001 14:46:01 -0700 (PDT) Received: from blood (pool-138-88-75-252.res.east.verizon.net [138.88.75.252]) by aries.ai.net (8.9.3/8.9.3) with SMTP id RAA11869; Tue, 4 Sep 2001 17:52:49 -0400 (EDT) (envelope-from deepak@ai.net) Reply-To: From: "Deepak Jain" To: "freebsd-isp@FreeBSD. ORG" Cc: "freebsd-hackers@FreeBSD. ORG" Subject: Flow cache on FreeBSD? Date: Tue, 4 Sep 2001 17:50:05 -0400 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4522.1200 Importance: Normal Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG Is there a way to provide functionality similar to ip flow cache stats on a FreeBSD router? Let me clarify, I am talking about being able to easily see groupings of traffic go through a FreeBSD box. So if a downstream customer is being attacked, a simple table in realtime [or near real-time] will show the attack characteristics [ip ranges, packet types, general number of packets, etc].? Thanks, Deepak Jain AiNET To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message