I'm implementing a monitoring application that tracks a specific TCP
session.  I know in advance the socket's source and destination IP addresses
and port numbers.  Will an appropriately defined 'pcap filter' eliminate the
possibility of receiving fragmented IP packets with get_next_ex() in my
application?  If so, a suggested filter string would be greatly appreciated.

 

JWR

 

_______________________________________________
Winpcap-users mailing list
[email protected]
https://www.winpcap.org/mailman/listinfo/winpcap-users

Reply via email to