--- [EMAIL PROTECTED] wrote: > I'm trying to use tcpdump capture traffic on the external interface > of > my NAT/firewall/web/mail/etc. system in a quasi-private way, > specifically by excluding any traffic that comes from or is > ultimately > destined to NAT'ed boxes. Since packets which go from or to > 192.168.2.0/24 are NAT'ed before (and probably after) tcpdump sees > them, I don't believe I can accomplish this with a simple "not net > 192.168.2.0/24" filter on tcpdump; thus, I've turned to the "rulenum" > > or "rdr" feature of tcpdump's filter criteria, which works on packets > > logged by pf(4). > > I know that if I simply enable logging on all of the packets I want > to > see, using pf-based tcpdump filter criteria works like a charm. The > problem I have is that doing so will make for a rather gigantic > /var/log/pflog very quickly, a situation I'd like to avoid if > possible > (for disk space and possible performance issues). Thus, my question > is: > is it possible to enable pf logging without writing to > /var/log/pflog, > while still preserving tcpdump's ability to see packets on the pflog0 > > interface? Alternately, is there a better/simpler way to accomplish > my > tcpdump objective of not logging packets coming from or destined to > NAT'ed boxes?
You want to log packets to standard output but not to disk? Is that it? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com

