I'm implementing a monitoring application that tracks a specific TCP session. I know in advance the socket's source and destination IP addresses and port numbers. Will an appropriately defined 'pcap filter' eliminate the possibility of receiving fragmented IP packets with get_next_ex() in my application? If so, a suggested filter string would be greatly appreciated.
JWR
_______________________________________________ Winpcap-users mailing list [email protected] https://www.winpcap.org/mailman/listinfo/winpcap-users
