/freebsd/contrib/libpcap/ |
H A D | pcap.3pcap.in | 33 provides a high level interface to packet capture systems. All packets 36 It also supports saving captured packets to a ``savefile'', and reading 37 packets from a ``savefile''. 112 To open a handle for a ``savefile'' from which to read packets, given the 135 which is the handle used for reading packets from the capture stream or 148 TCP headers of packets - you can set the "snapshot length" for the 166 packets passing through the switch are sent, a network adapter receives 167 all packets on the LAN, including unicast or multicast packets not sent 171 Normally, the adapter will discard those packets; however, many network 173 packets, even if they are not sent to an address that the adapter [all …]
|
H A D | pcap_loop.3pcap | 22 pcap_loop, pcap_dispatch \- process packets from a live capture or savefile 40 processes packets from a live capture or ``savefile'' until 42 packets are processed, the end of the ``savefile'' is 55 is equivalent to infinity, so that packets are processed until another 59 processes packets from a live capture or ``savefile'' until 61 packets are processed, the end of the current bufferful of packets is 68 is the maximum number of packets to process before returning, but is not 70 bufferful of packets is read at a time, so fewer than 72 packets may be processed. A value of 78 causes all the packets received in one buffer to be processed when [all …]
|
H A D | pcap_breakloop.3pcap | 39 to return rather than looping; they will return the number of packets 42 if no packets have been processed so far. If the loop is currently 43 blocked waiting for packets to arrive, 60 The flag is checked in loops reading packets from the OS - a signal by 62 processing a set of packets returned by the OS. 68 if the signal interrupted a call reading packets in a live capture, 71 packets arrive and the call completes. 97 Note that if pcap_breakloop() unblocks the thread capturing packets, and 99 be packets in the buffer that arrived before pcap_breakloop() were 100 called but that weren't yet provided to libpcap, those packets will not [all …]
|
H A D | pcap_stats.3pcap | 51 number of packets received; 54 number of packets dropped because there was no room in the operating 55 system's buffer when they arrived, because packets weren't being read 59 number of packets dropped by the network interface or its driver. 64 might count packets whether they passed any filter set with 66 or not, or it might count only packets that pass the filter. 67 It also might, or might not, count packets dropped because there was no 72 the operating system, it would count packets that don't pass the filter. 77 might, or might not, count packets not yet read from the operating 81 no packets were dropped by the interface, or it might mean that the [all …]
|
/freebsd/sbin/ping/tests/ |
H A D | test_ping.py | 200 :keyword count: Number of packets to send, defaults to 1 202 :keyword dup: Duplicate packets, defaults to `False` 304 1 packets transmitted, 1 packets received, 0.0% packet loss 320 1 packets transmitted, 1 packets received, 0.0% packet loss 336 1 packets transmitted, 1 packets received, 0.0% packet loss 351 1 packets transmitted, 0 packets received, 100.0% packet loss 366 1 packets transmitted, 1 packets received, 0.0% packet loss 381 1 packets transmitted, 0 packets received, 100.0% packet loss 398 3 packets transmitted, 3 packets received, 0.0% packet loss 413 3 packets transmitted, 0 packets received, 100.0% packet loss [all …]
|
/freebsd/tools/tools/crypto/ |
H A D | ipsecstats.c | 106 AHSTAT(ahs.ahs_input, "input packets processed"); in main() 107 AHSTAT(ahs.ahs_output, "output packets processed"); in main() 110 AHSTAT(ahs.ahs_notdb, "packets with no SA"); in main() 111 AHSTAT(ahs.ahs_badkcr, "packets with bad kcr"); in main() 112 AHSTAT(ahs.ahs_badauth, "packets with bad authentication"); in main() 113 AHSTAT(ahs.ahs_noxform, "packets with no xform"); in main() 114 AHSTAT(ahs.ahs_qfull, "packets dropped packet 'cuz queue full"); in main() 115 AHSTAT(ahs.ahs_wrap, "packets dropped for replace counter wrap"); in main() 116 AHSTAT(ahs.ahs_replay, "packets dropped for possible replay"); in main() 117 AHSTAT(ahs.ahs_badauthl, "packets dropped for bad authenticator length"); in main() [all …]
|
/freebsd/share/man/man4/ |
H A D | ng_car.4 | 77 Committed burst packets are counted as green, extended burst packets are 78 counted as yellow and exceeding packets are counted as red. 83 Committed burst packets are counted as green, peak burst packets are counted 84 as yellow and exceeding packets are counted as red. 92 When normal burst exceeded and extended burst is used, packets are counted 100 Committed burst packets are counted as green, exceeding packets are delayed 102 Packets dropped by queue counted as red. 103 Queue parameters are hardcoded: length 99 packets, min_th 8 packets, max_p 100%. 113 rates are measured in packets per second and bursts are in packets. 130 uint8_t green_action; /* Action for green packets */ [all …]
|
H A D | divert.4 | 32 Divert sockets allow to intercept and re-inject packets flowing through 50 A divert socket bound to a divert port will receive all packets diverted 53 Packets may also be written to a divert port, in which case they re-enter 56 By reading from and writing to a divert socket, matching packets 59 .Sh READING PACKETS 60 Packets are diverted either as they are ``incoming'' or ``outgoing.'' 61 Incoming packets are diverted after reception on an IP interface, 62 whereas outgoing packets are diverted before next hop forwarding. 64 Diverted packets may be read unaltered via 79 .Sh WRITING PACKETS [all …]
|
H A D | inet.4 | 170 Boolean: enable/disable accepting of source-routed IP packets (default false). 172 Boolean: allow forwarding of, and ICMP responses to, packets with addresses in 175 Boolean: allow forwarding of, and ICMP responses to, packets with addresses in 181 Boolean: enable/disable forwarding of IP packets. 195 Fragmented packets are hashed to buckets. 197 The system must compare the incoming packets to the existing reassembly queues 207 Integer: maximum number of fragmented packets the host will accept and 209 0 means that the host will not accept any fragmented packets for that VNET. 223 0 means that the host will not accept any fragmented packets for the VNET. 241 By setting this variable to 0, all IP options in the incoming packets [all …]
|
H A D | ng_tag.4 | 59 for matching packets, a destination hook for non-matching packets, 74 Packets with matched tags are forwarded to 82 Tag list of packets leaving the node is extended with a new tag 99 New hooks are initially configured to drop all incoming packets 101 to forward all packets to non-matching hook), 102 and to forward all outgoing packets without any tag appending. 104 Data payload of packets passing through the node is completely 116 incoming packets on a hook. 142 Matching and non-matching incoming packets are delivered out the hooks named 157 packets. [all …]
|
H A D | siftr.4 | 69 is to capture IPv4 TCP/IP packets. 106 controls how many inbound/outbound packets for a given TCP connection will cause 125 Set to any other value, only packets where either the source or destination 356 Number of TCP packets that traversed up the network stack. 357 This only includes inbound TCP packets during the periods when 363 Number of TCP packets that traversed down the network stack. 364 This only includes outbound TCP packets during the periods when 374 Number of inbound packets that were not processed because of failed 380 Number of outbound packets that were not processed because of failed 386 Number of inbound packets that were not processed because of failure to find the [all …]
|
H A D | ng_vjc.4 | 63 Packets received on the 66 Packets received on the other three hooks will be uncompressed as appropriate. 71 Van Jacobson compression only applies to TCP packets. 74 (i.e., common case) TCP packets are actually compressed. 78 Other TCP packets are run through the state machine but not 82 Other non-TCP IP packets are forwarded unchanged to 106 Upstream (uncompressed) IP packets. 108 Downstream compressed TCP packets. 110 Downstream uncompressed TCP packets. 112 Downstream uncompressed IP packets. [all …]
|
H A D | ip6.4 | 45 IPv6 packets contain an IPv6 header that is not provided as part of the 57 All IPv6 packets begin with an IPv6 header. 63 To directly access IPv6 headers from received packets and specify them 127 IPv6 allows header options on packets to manipulate the behavior of the 160 Get or set the interface from which multicast packets will be sent. 250 Get or set whether additional information about subsequent packets will 263 Get or set whether the hop limit header field from subsequent packets 272 .\" packets will be provided as ancillary data along with the payload in 282 Get or set whether the hop-by-hop options from subsequent packets will be 302 Get or set whether the destination options from subsequent packets will [all …]
|
/freebsd/sbin/ipf/ipf/ |
H A D | ipfilter.4 | 22 selectively filter fragmented IP packets 24 selectively filter packets with IP options 26 send back an ICMP error/TCP reset for blocked packets 39 in addition, supports temporary storage of pre-authenticated rules for passing packets through 44 Inverted host/net matchingTCP/UDP packets by port number or a port number 47 ICMP packets by type/code 49 "established" TCP packets 53 "short" (fragmented) IP packets with incomplete headers can be filtered 56 Service) field in packets 71 it matches a rule setup to look for suspicious packets [all …]
|
H A D | ipf.4 | 79 u_short fr_icmpm; /* data for ICMP packets (mask) */ 112 FR_OUTQUE 0x000004 /* outgoing packets */ 113 FR_INQUE 0x000008 /* ingoing packets */ 117 FR_LOGBODY 0x000020 /* log the body of packets too */ 162 There are two flags which can be set to log packets independently of the 163 rules used. These allow for packets which are either passed or blocked 180 Statistics on the various operations performed by this package on packets 181 is kept inside the kernel. These statistics apply to packets traversing 203 u_long fr_pass; /* packets allowed */ 204 u_long fr_block; /* packets denied */ [all …]
|
H A D | ipf.5 | 10 and drop packets (block rules) and those that allow packets through (pass 50 # Allow all ICMP packets in 57 pass in proto icmp from any to any # Allow all ICMP packets in 64 firewall rule set or which packets should be blocked or allowed in. 82 any further. Packets that are blocked on the "in" side are never seen by 94 rules provide the administrator with the ability to count packets and 97 path. For outbound packets, count rules are applied before NAT and 107 becomes full, the packets will end up being dropped. 117 For non-UDP packets, there are builtin checks that are applied in addition 132 packets via each network interface but it is also because of the hosts, [all …]
|
/freebsd/share/man/man5/ |
H A D | pf.conf.5 | 39 packet filter modifies, drops or passes packets according to rules or 57 Ethernet filtering provides rule-based blocking or passing of Ethernet packets. 67 Packet filtering provides rule-based blocking or passing of packets. 276 Some hosts (notably web servers on Solaris) send TCP packets even after closing 282 can prevent blocking of such packets. 312 The state if both hosts have sent packets. 501 option is used to enable or disable the reassembly of fragmented packets, 532 A TCP RST is returned for blocked TCP packets, 533 an SCTP ABORT chunk is returned for blocked SCTP packets, 534 an ICMP UNREACHABLE is returned for blocked UDP packets, [all …]
|
/freebsd/contrib/tcpdump/ |
H A D | tcpdump.1.in | 153 \fITcpdump\fP prints out a description of the contents of packets on a 165 read packets from a network interface. It can also be run with the 168 only packets that match 176 flag, continue capturing packets until it is interrupted by a SIGINT 182 flag, it will capture packets until it is interrupted by a SIGINT or 183 SIGTERM signal or the specified number of packets have been processed. 187 finishes capturing packets, it will report counts of: 189 packets ``captured'' (this is the number of packets that 193 packets ``received by filter'' (the meaning of this depends on the OS on 197 specified on the command line, on some OSes it counts packets regardless [all …]
|
/freebsd/share/examples/ipfilter/ |
H A D | rules.txt | 2 # block all incoming TCP packets on le0 from host "foo" to any destination. 9 # block all outgoing TCP packets on le0 from any host to port 23 of host bar. 16 # block all inbound packets. 20 # pass through packets to and from localhost. 37 # block all outbound packets. 41 # allow any packets destined for localhost out. 59 # block all ICMP packets. 68 # allow packets coming from foo to bar through. 72 # allow any TCP packets from the same subnet as foo is on through to host 77 # allow in UDP packets which are NOT from port 53 and are destined for [all …]
|
H A D | examples.txt | 18 [Image] Logging packets to network devices 20 Authenticating packets 21 Pre-authenticating packets 31 # setup default to block all packets. 34 # pass packets from host firewall to any destination 46 # drop all inbound packets from localhost coming from ethernet 81 # block all incoming ICMP packets 87 # allow all IP packets in which are protocol 4 94 # prevent any packets destined for NFS from coming in 108 To filter out these nasties, it is possible to select fragmented packets out [all …]
|
/freebsd/sbin/ipfw/ |
H A D | ipfw.8 | 202 Packets are passed to the firewall 216 Depending on the action and certain system settings, packets 223 and matches all packets. 243 i.e., rules that match packets with the same 5-tuple 260 for all packets (not only these matched by the rule) but 392 counters (total or current packets or bytes). 485 Note that as packets flow through the stack, headers can be 488 E.g., incoming packets will include the MAC header when 492 but the same packets will have the MAC header stripped off when 512 match on those packets. [all …]
|
/freebsd/sbin/ipf/ipsend/ |
H A D | iptest.1 | 4 iptest \- automatically generate a packets to test IP functionality 30 Run IP test group #1. This group of tests generates packets with the IP 33 3 (ip_v < 4), 4 (ip_v > 4), 5 (ip_len < packetsize, long packets), 34 6 (ip_len > packet size, short packets), 7 (Zero length fragments), 39 Run IP test group #2. This group of tests generates packets with the IP 44 Run IP test group #3. This group of tests generates packets with the ICMP 49 9-10, 13-14 and 17-18 - shortened packets). 52 Run IP test group #4. This group of tests generates packets with the UDP 59 Run IP test group #5. This group of tests generates packets with the TCP 69 an attempt to exhaust the network buffers used for holding packets for later [all …]
|
/freebsd/sbin/ping/ |
H A D | ping.8 | 37 packets to network hosts 177 between transmissions, further missing packets cause a bell only 178 if the maximum number of unreceived packets has increased. 193 packets. 201 packets. 210 Outputs packets as fast as they come back or one hundred times per second, 219 This provides a rapid display of how many packets are being dropped. 233 is an IP address identifying an interface from which the packets will be sent. 238 is a name of an interface (e.g., `em0') from which the packets will be sent. 257 sends that many packets as fast as possible before falling into its normal [all …]
|
/freebsd/tools/tools/mctest/ |
H A D | mctest.cc | 83 // absorb and record packets 88 // @param number ///< number of packets we're expecting 156 timeval packets[number]; in sink() local 180 * 1/N packets from each, otherwise the clients will overwhelm in sink() 191 gettimeofday(&packets[ntohl(*(int *)packet)], 0); in sink() 197 cout << "Missed " << number - n << " packets." << endl; in sink() 200 cout << "sec: " << packets[i].tv_sec << " usec: " << in sink() 201 packets[i].tv_usec << endl; in sink() 203 timersub(&packets[i+1], &packets[i], &result); in sink() 222 struct timeval *packets; ///< The timestamps of returning packets member [all …]
|
/freebsd/usr.sbin/ipfwpcap/ |
H A D | ipfwpcap.8 | 29 .Nd "copy diverted packets to a file in tcpdump format" 41 utility is used to copy diverted packets to a file in 44 The interesting packets are diverted by 49 The packets are then dropped unless 58 Writes packets back to the 67 Diverted packets will silently disappear if nothing is listening on the 77 packets. 91 argument is the path to the file to write captured packets to. 102 as a background job listening to port 8091 and reflecting the packets 109 rule to divert all packets from 192.0.2.101 to port 8091.
|