PFLOG(4) BSD Kernel Interfaces Manual PFLOG(4)NAME
pflog -- packet filter logging interface
SYNOPSIS
device pflog
DESCRIPTION
The pflog interface is a pseudo-device which makes visible all packets logged by the packet filter, pf(4). Logged packets can easily be mon-
itored in real time by invoking tcpdump(1) on the pflog interface, or stored to disk using pflogd(8).
The pflog0 interface is created automatically at boot if both pf(4) and pflogd(8) are enabled; further instances can be created using
ifconfig(8).
Each packet retrieved on this interface has a header associated with it of length PFLOG_HDRLEN. This header documents the address family,
interface name, rule number, reason, action, and direction of the packet that was logged. This structure, defined in <net/if_pflog.h> looks
like
struct pfloghdr {
u_int8_t length;
sa_family_t af;
u_int8_t action;
u_int8_t reason;
char ifname[IFNAMSIZ];
char ruleset[PF_RULESET_NAME_SIZE];
u_int32_t rulenr;
u_int32_t subrulenr;
uid_t uid;
pid_t pid;
uid_t rule_uid;
pid_t rule_pid;
u_int8_t dir;
u_int8_t pad[3];
};
EXAMPLES
Create a pflog interface and monitor all packets logged on it:
# ifconfig pflog1 up
# tcpdump -n -e -ttt -i pflog1
SEE ALSO tcpdump(1)inet(4), inet6(4), netintro(4), pf(4), ifconfig(8), pflogd(8)HISTORY
The pflog device first appeared in OpenBSD 3.0.
BSD December 10, 2001 BSD
Check Out this Related Man Page
PFLOG(4) BSD Kernel Interfaces Manual PFLOG(4)NAME
pflog -- packet filter logging interface
SYNOPSIS
device pflog
DESCRIPTION
The pflog interface is a pseudo-device which makes visible all packets logged by the packet filter, pf(4). Logged packets can easily be mon-
itored in real time by invoking tcpdump(1) on the pflog interface, or stored to disk using pflogd(8).
The pflog0 interface is created automatically at boot if both pf(4) and pflogd(8) are enabled; further instances can be created using
ifconfig(8).
Each packet retrieved on this interface has a header associated with it of length PFLOG_HDRLEN. This header documents the address family,
interface name, rule number, reason, action, and direction of the packet that was logged. This structure, defined in <net/if_pflog.h> looks
like
struct pfloghdr {
u_int8_t length;
sa_family_t af;
u_int8_t action;
u_int8_t reason;
char ifname[IFNAMSIZ];
char ruleset[PF_RULESET_NAME_SIZE];
u_int32_t rulenr;
u_int32_t subrulenr;
uid_t uid;
pid_t pid;
uid_t rule_uid;
pid_t rule_pid;
u_int8_t dir;
u_int8_t pad[3];
};
EXAMPLES
Create a pflog interface and monitor all packets logged on it:
# ifconfig pflog1 up
# tcpdump -n -e -ttt -i pflog1
SEE ALSO tcpdump(1)inet(4), inet6(4), netintro(4), pf(4), ifconfig(8), pflogd(8)HISTORY
The pflog device first appeared in OpenBSD 3.0.
BSD December 10, 2001 BSD
Hey,
I currently have a set of captured sessions thru ethereal, saved in pflog files, basically its a tcpdump, which i need to go thru and sort the applications/protocols in order of the times they were used. I also need to change the headers of the packets, basically the source and destination... (0 Replies)
Hello,
SNMP reports from my Linux server a large number of "ipInAddrErrors" on several of my systems. According to one description, these packets are discarded datagrams due to:
How do I determine what packets these are? Can tcpdump help? If so, can anyone suggest a filter? (1 Reply)
Hi, can anyone please suggest a tool to dump i/o packets just like tcpdump does for network traffic. Basically I have a complex dataflow that needs to be optimized and I want to see how packets go to/from disk - what goes randomly and sequentially.
Thanks (8 Replies)
Hi,
I want to capture a certain type of packets (selected according to the protocol) coming to my PC and then transmit them to another PC. I had the idea to use tcpdump to filter input packets and extract those chosen. Well my questions are:
1- after filtering input packets, those that have not... (1 Reply)
Hi,
Can anyone explain why do I see same request twice in tcpdump package when I use "tcpdump -i any"?
So I'm tracing packets on eth1.800 interface, but using "tcpdump -i any" to capture them. What I see is that the requests/responses from my side seem to appear as duplicate in the pcap file,... (1 Reply)
I've recently started learning to use TCPdump, and I find it pretty interesting. There's one thing I don't understand. When I tell it to capture packets on, say, the WiFi interface en1, it often captures packets sent or received by other hosts on the network. How can it do this? My... (3 Replies)