Lines Matching +full:display +full:- +full:interface
37 .Bk -words
41 .Op Fl i Ar interface
51 interface, normally
66 closes and then re-opens the log file when it receives
102 interface to syslog when a
107 .Bl -tag -width Ds
120 .It Fl i Ar interface
123 interface to use.
149 .Bl -tag -width /var/run/pflogd.pid -compact
158 (useful with a log-all rule to dump complete sessions):
159 .Bd -literal -offset indent
160 # pflogd -s 1600 -f suspicious.log port 80 and host evilhost
165 interface, excluding specific packets:
166 .Bd -literal -offset indent
167 # pflogd -i pflog3 -f network3.log "not (tcp and port 23)"
170 Display binary logs:
171 .Bd -literal -offset indent
172 # tcpdump -n -e -ttt -r /var/log/pflog
175 Display the logs in real time (this does not interfere with the
178 .Bd -literal -offset indent
179 # tcpdump -n -e -ttt -i pflog0
186 to packets logged on a specified interface, a rule number, a reason,
189 .Bl -tag -width "ruleset authpf " -compact
195 Interface name equals "kue0".
197 Interface name equals "kue0".
204 Also accepts "bad-offset", "fragment", "bad-timestamp", "short",
205 "normalize", "memory", "congestion", "ip-option", "proto-cksum",
206 "state-mismatch", "state-insert", "state-limit", "src-limit",
217 Display the logs in real time of inbound packets that were blocked on
218 the wi0 interface:
219 .Bd -literal -offset indent
220 # tcpdump -n -e -ttt -i pflog0 inbound and action block and on wi0