Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 19 Jun 2004 21:53:51 +0300
From:      Viktor Ivanov <viktor.ivanov@gmail.com>
To:        Anton Alin-Adrian <aanton@spintech.ro>
Cc:        freebsd-hackers@freebsd.org
Subject:   Re: ipfw2 test utility
Message-ID:  <7f4bda010406191153200d2757@mail.gmail.com>
In-Reply-To: <40D467D5.5000100@spintech.ro>
References:  <7f4bda01040619034050be53a2@mail.gmail.com> <40D467D5.5000100@spintech.ro>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 19 Jun 2004 19:20:37 +0300, Anton Alin-Adrian
<aanton@spintech.ro> wrote:
> 
> See nemesistcp from ports.

Isn't this a tool to generate packets, like ipsend(1) and iptest(1)?

> 
> I doubt. Faster with logging & scripts.

Do you mean ipfw's log option? If I wanted to see which rule number a packet is
matching, should I add 'log' to every rule? And how much log messages
would generate
if I have thousands of packets coming through every second?



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?7f4bda010406191153200d2757>