BTW: Here's an example frag causing port 0...
startime srcip srcp dstip dstp pro pkts
17:01:18.307 1.1.69.40 0 2.2.16.61 0 6 4
17:01:18.187 1.1.69.40 2969 2.2.16.61 25 6 18
17:01:18.188 2.2.16.61 25 1.1.69.40 2969 6 18
This is an SMTP flow that started a new flow at t.187 then a second frag
flow at t.307.
.40 was the client so I would suspect that a large email was sent caused the
need for larger packets and ultimately the need for fragmentation.
Look through your flow logs with something like:
flow-cat ft* | flow-print -f 5 | awk '{if(($5==0 && $8==0 && $9==6)) print
$0}'
Any output you get should be a fragged TCP packet else an actual TCP flow on
port 0 (which can happen, it's just rare).
On 2/2/05 12:21 PM, "Dustin" <[EMAIL PROTECTED]> wrote:
> Hello,
>
> This may have been discussed, but I don't find any results in the archives.
>
> We are troubleshooting some performance issues, have Cisco routers, and just
> started using flow-tools to capture data. I've issued flowstat with the
> following args:
>
> flow-stat -f5 -p -S2
>
> # port flows octets packets
> #
> 0 425 68968722 51238
> 445 10886 51125320 372789
> 1494 710 26667144 524757
> 31889 1800 21081243 50199
> 3905 101 20985596 19102
>
> As you can see, most of the traffic is generated with lower number of sessions
> & packets, but w/ higher amount of data. We would like to know exactly what
> this traffic is, why is the majority of traffic lumped into "port 0"?
>
> TIA,
>
> Dustin
>
>
> _______________________________________________
> Flow-tools mailing list
> [EMAIL PROTECTED]
> http://mailman.splintered.net/mailman/listinfo/flow-tools
--
Adam Powers
Senior Security Engineer
Advanced Technology Group
c. 678.725.1028
o. 770.225.6521
f. 770.225.6501
e. [EMAIL PROTECTED]
AOL IM: adampowers22
StealthWatch by Lancope - Security through network intelligence�
_______________________________________________
Flow-tools mailing list
[EMAIL PROTECTED]
http://mailman.splintered.net/mailman/listinfo/flow-tools