TCP sessions is just one of the items disabled by -j... or by the classification of
traffic as "remote" unless it's specified as pseudoLocal by -m (ntop doesn't track
remote sessions)
Unumbered means not having an assigned ip address. Yes...
As to the tcpdump monitoring, I mean a host that is on another port on the same switch.
Let me try some ASCII art:
+------+
|Switch|
+------+
| |
(host | mirrored port
A) |
(ntop
host)
What you're trying to see is the traffic from host A to "anywhere" else.
What you do is put a hub in the path between A and the switch and setup a machine to
run tcpdump on. Then you run tcpdump on both that host, call it "M" and the ntop
host, recording a few 100 packets while A talks to somebody else.
+------+
|Switch|
+------+
| |
(host--+HUB+ |
M) | |
(host | mirrored port
A) |
(ntop
host)
What you'll record is the same traffic, as seen by "A" and by ntop.
When you match them up at the tcp/ip level (and, sorry, this has to be done by that
famous Spanish network admin - Manuel Labor) you should be able to see what the MAC
addresses are in the matching packets.
-----Burton
---------- Original Message ----------------------------------
From: Igor Schein <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
Date: Tue, 9 Jul 2002 19:35:50 -0400
>On Tue, Jul 09, 2002 at 06:31:46PM -0500, Burton M. Strauss III wrote:
>> Igor we've been through this on the list. Use -j | --border-sniffer-mode.
>>
>> First off, having an unnumbered port only means you MUST use -m, otherwise
>> all traffic is remote.
>
>By "unnumbered" you mean "ip-less", right? And by "MUST" you mean
>"MST in order for for active sessions to be listed", right? I don't
>have to use -m if I don't care about the sessions.
>
>>
>> The only way to be 100% sure is to try the experiment - running tcpdump on
>> your network.
>>
>> Limit it to traffic from, say, a specific host. On my network that would be
>>
>> tcpdump -i eth0 -c 100 -w filename ip and host 192.168.0.xxx
>>
>> You'll need to run it simultaneously on both the mirrored port and on a host
>> on the same switch port (you may have to insert a hub) as the one you pick
>> that isn't mirrored. And then compare the two captures...
>
>When you say "on the same switch port", do you mean "on a port which
>is on the same switch"? Sorry for being picky with the words, I just
>want to eliminate any ambiguity in interpretation of what you're
>saying.
>
>>
>> I'm pretty sure you will find that the MAC addresses have been re-written by
>> the switch to it's own MAC address. If the switch doesn't rewrite the
>> packets, you can run into spanning tree loops. It might even be in the docs
>> (or an option) for your switch.
>
>I need to think a bit more about what I need to do. I'm still not
>100% clear on what I'm looking for in this experiment.
>
>Thanks
>
>Igor
>_______________________________________________
>Ntop-dev mailing list
>[EMAIL PROTECTED]
>http://lists.ntop.org/mailman/listinfo/ntop-dev
>
__________________________________________________
D O T E A S Y - "Join the web hosting revolution!"
http://www.doteasy.com
_______________________________________________
Ntop-dev mailing list
[EMAIL PROTECTED]
http://lists.ntop.org/mailman/listinfo/ntop-dev