Hello Daniel,
Many thanks for your response.
I try to obtain the differents informations.
On this run, 157 packets are lost.
f:netstat_udp.before
udp:
7802 datagrams received
0 with incomplete header
0 with bad data length field
0 with bad checksum
0 with no checksum
7802 input packets hardware-checksummed
0 output packets hardware-checksummed
0 dropped due to no socket
7794 broadcast/multicast datagrams dropped due to no socket
0 dropped due to missing IPsec protection
0 dropped due to full socket buffers
8 delivered
8 datagrams output
2 missed PCB cache
f:netstat_udp.after
udp:
7802 datagrams received
0 with incomplete header
0 with bad data length field
0 with bad checksum
0 with no checksum
7802 input packets hardware-checksummed
0 output packets hardware-checksummed
0 dropped due to no socket
7794 broadcast/multicast datagrams dropped due to no socket
0 dropped due to missing IPsec protection
0 dropped due to full socket buffers
8 delivered
8 datagrams output
2 missed PCB cache
diff
f:netstat_ip.before
ip:
15439 total packets received
0 bad header checksums
0 with size smaller than minimum
0 with data size < data length
0 with header length < data size
0 with data length < header length
0 with bad options
0 with incorrect version number
0 fragments received
0 fragments dropped (duplicates or out of space)
0 malformed fragments dropped
0 fragments dropped after timeout
0 packets reassembled ok
10335 packets for this host
0 packets for unknown/unsupported protocol
4296 packets forwarded
91 packets not forwardable
0 redirects sent
2107 packets sent from this host
0 packets sent with fabricated ip header
0 output packets dropped due to no bufs, etc.
0 output packets discarded due to no route
0 output datagrams fragmented
0 fragments created
0 datagrams that can't be fragmented
0 fragment floods
0 packets with ip length > max ip packet size
0 tunneling packets that can't find gif
0 datagrams with bad address in header
0 input datagrams checksum-processed by hardware
0 output datagrams checksum-processed by hardware
f:netstat_ip.after
ip:
16462 total packets received
0 bad header checksums
0 with size smaller than minimum
0 with data size < data length
0 with header length < data size
0 with data length < header length
0 with bad options
0 with incorrect version number
0 fragments received
0 fragments dropped (duplicates or out of space)
0 malformed fragments dropped
0 fragments dropped after timeout
0 packets reassembled ok
10342 packets for this host
0 packets for unknown/unsupported protocol
5139 packets forwarded
109 packets not forwardable
0 redirects sent
2112 packets sent from this host
0 packets sent with fabricated ip header
0 output packets dropped due to no bufs, etc.
0 output packets discarded due to no route
0 output datagrams fragmented
0 fragments created
0 datagrams that can't be fragmented
0 fragment floods
0 packets with ip length > max ip packet size
0 tunneling packets that can't find gif
0 datagrams with bad address in header
0 input datagrams checksum-processed by hardware
0 output datagrams checksum-processed by hardware
/home/work # tcpdump -nvvvXr bge0.pcap dst host 10.128.2.251
09:53:31.836876 172.19.40.169.1024 > 10.128.2.251.161: [udp sum ok]
|30|29|02|01|04|06|a0|1cGetRequest(28)|02|04|02|01|02|01|30|0e
|30|0c|06|08.1.3.6.1.2.1.1.1.0|05|00 (DF) [tos 0x10] (ttl 64, id 0)
0000: 4510 0047 0000 4000 4011 585f ac13 28a9 [EMAIL PROTECTED]@.X_�.(�
0010: 0a80 02fb 0400 00a1 0033 8f93 3029 0201 ...�...�.3..0)..
0020: 0004 0670 7562 6c69 63a0 1c02 0409 4b6a ...public�....Kj
0030: 7102 0100 0201 0030 0e30 0c06 082b 0601 q......0.0...+..
0040: 0201 0101 0005 00 .......
/home/work # tcpdump -nvvvXr bge0.pcap dst host 10.128.2.252
09:53:31.836878 172.19.40.169.1024 > 10.128.2.252.161: [udp sum ok]
|30|29|02|01|04|06|a0|1cGetRequest(28)|02|04|02|01|02|01|30|0e
|30|0c|06|08.1.3.6.1.2.1.1.1.0|05|00 (DF) [tos 0x10] (ttl 64, id 0)
0000: 4510 0047 0000 4000 4011 585e ac13 28a9 [EMAIL PROTECTED]@.X^�.(�
0010: 0a80 02fc 0400 00a1 0033 8f92 3029 0201 ...�...�.3..0)..
0020: 0004 0670 7562 6c69 63a0 1c02 0409 4b6a ...public�....Kj
0030: 7102 0100 0201 0030 0e30 0c06 082b 0601 q......0.0...+..
0040: 0201 0101 0005 00 .......
The shell use to get the informations
pfctl -s all > pfctl.before
netstat -sp udp > netstat_udp.before
netstat -sp ip > netstat_ip.before
pbge0=''
pbge1=''
tcpdump -n -i bge0 -w bge0.pcap &
pbge0=$!
tcpdump -n -i bge1 -w bge1.pcap &
pbge1=$!
sleep 3
echo attente fin du test
read bidon
[ -z "$pbge0" ] || kill -HUP $pbge0
sleep 3
[ -z "$pbge1" ] || kill -HUP $pbge1
sleep 3
netstat -sp udp > netstat_udp.after
netstat -sp ip > netstat_ip.after
pfctl -s all > pfctl.after
tcpdump -nr bge0.pcap net 10 | tee bge0.txt | wc -l
tcpdump -nr bge1.pcap net 10 | tee bge1.txt | wc -l