I �m using NeTraMet Vers. 4.3 on an FreeBSD 4.2 System (i386)
with libpcap-04.


NeTraMet uses libpcap for monitoring and  get the packets on the LAN.

It could be that ethernet packets were dropped by the kernel and
NeTraMet, which happens when i capture some minutes of the LAN traffic
with tcpdump 3.5 .
Tcpdump gives an information about how many packets were filtered and
how many packet were dropped by the kernel.
NeTraMet doesn�t do this.
How could i be on the secure site, that NeTraMet get all packets.
If NeTraMet droppes the packets like tcpdump what can I do.


In the newsforum from NeTraMet someone says to boost the bpf buffer but
he didn�t know how.
(the counter it is referring to in /sys/net/bpf.c in the kernel.)
seems to be 
                # define BPF_BUFSIZE 4096
so i have to increase this.
And there for I have to recompile the c-source code, but which of the
source and how.
Where I have to put the binary??


Could you help me or give some hints?? 


Thanks in advance

Ren� Heimes

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to