The filter compiler tries to resolve the host namese, so you can do something like
host localhost and port 2404
but this will filter the packets with the loopback IP address.
...which won't capture packets sent over "real" interfaces, as they won't have the loopback interface as source or destination.
If, when he says
Is it possible to filter all the TCP/IP traffic from / to the pc runnning WinPcap, without have to know its IP address ?
he means he only wants to see traffic to or from the machine running the WinPcap-based application, then he should not run in promiscuous mode; that'll ensure that unicast packets not sent to or from the machine in question won't be captured. It *will* capture broadcast or multicast packets; to eliminate those, don't capture in promiscuous mode *and* use a filter that includes "not broadcast and not multicast", e.g.
not broadcast && not multicast && port 2404
================================================================== This is the WinPcap users list. It is archived at http://www.mail-archive.com/[email protected]/
To unsubscribe use mailto: [EMAIL PROTECTED]
==================================================================
