Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 Jun 2001 20:55:44 +0100
From:      "Heimes, Rene" <rh@com-con.net>
To:        <freebsd-questions@freebsd.org>, <freebsd-hackers@freebsd.org>
Subject:   again: how to compile bpf...
Message-ID:  <F54B610C5BFDE546BBA2F6CC595ACC75084981@Exchange2000.com-con.ag>

next in thread | raw e-mail | index | archive | help
I =B4m using NeTraMet Vers. 4.3 on an FreeBSD 4.2 System (i386)
with libpcap-04.


NeTraMet uses libpcap for monitoring and  get the packets on the LAN.

It could be that ethernet packets were dropped by the kernel and
NeTraMet, which happens when i capture some minutes of the LAN traffic
with tcpdump 3.5 .
Tcpdump gives an information about how many packets were filtered and
how many packet were dropped by the kernel.
NeTraMet doesn=B4t do this.
How could i be on the secure site, that NeTraMet get all packets.
If NeTraMet droppes the packets like tcpdump what can I do.


In the newsforum from NeTraMet someone says to boost the bpf buffer but
he didn=B4t know how.
(the counter it is referring to in /sys/net/bpf.c in the kernel.)
seems to be=20
		# define BPF_BUFSIZE 4096
so i have to increase this.
And there for I have to recompile the c-source code, but which of the
source and how.
Where I have to put the binary??


Could you help me or give some hints??=20


Thanks in advance

Ren=E9 Heimes

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?F54B610C5BFDE546BBA2F6CC595ACC75084981>