03-10-2011
is it possible by the above method
in case
1. when the packets come from say system A and its destination is C.
2.before forwarding it to C from the current system i need to introdude the delay
3. and i want it run like a demon process delaying every packet...
9 More Discussions You Might Find Interesting
1. Red Hat
I have a linux redhat box , our security department in my company informed me that my server's IP sends So many traffic in my network ,
This box I am using it as FTP server to store the other servers logs .
My question briefly is how to check my outbound packets which are going from my PC to the... (1 Reply)
Discussion started by: DarkSoul
1 Replies
2. Cybersecurity
Hello,
I am currently trying to limit incoming UDP length 20 packets on a per IP basis to 5 a second using IPTables on a Linux machine (CentOS 5.2).
Basically, if an IP is sending more than 5 length 20 UDP packet a second to the local machine, I would like the machine to drop the excess... (1 Reply)
Discussion started by: tomboy123
1 Replies
3. UNIX for Dummies Questions & Answers
Hi all,
I am new to Linux kernel.
we have a c file that counts the no. of sends and received packets in each interface, and indicate the user about the error/drop ration of incoming and outgoing packets.
in our Linux box , the incoming packets are dropped at random interval.
we have our... (1 Reply)
Discussion started by: kannandv
1 Replies
4. IP Networking
hello,
i am searching a way to delay the incoming packets before it goes out of the system may i know how can i approach to this problem? (3 Replies)
Discussion started by: sameer kulkarni
3 Replies
5. Linux
I am looking for an iptables command to allow incoming UDP packets for my Linux server
also is there a command I can use to set the default action for outgoing packets to accept?
Thank you (1 Reply)
Discussion started by: crimputt
1 Replies
6. Cybersecurity
Hi!
I have a debian linux VPS and i am wondering how would someone be able to hack into it , in what ways ?
I've asked a more knowledgeable friend and he said the only way someone would be able to get into my VPS is via FTP or SSH, are there some other ways someone can enter my machine ?
I... (18 Replies)
Discussion started by: ParanoiaUser
18 Replies
7. IP Networking
Hello, I'm trying to route all packets arriving at a particular interface by entering the same interface
the virtual interface eth1: 2 and now everything is routed by default gw configured on eth1.
eth1 Link encap:Ethernet HWaddr 0a:0e:64:18:52:72
inet addr:192.168.10.15
eth1:2 ... (1 Reply)
Discussion started by: faka
1 Replies
8. Red Hat
HI,
I have a Centos linux box and there is interface connect to internet.
I stop the iptables in this box .
After a few day , I find the linux box have been hacked and install some perl script into the box .
Could anyone tell me how the hacker can login into the centos box without knowing... (1 Reply)
Discussion started by: chuikingman
1 Replies
9. IP Networking
Hi folks,
I have a debian server running an Apache daemon on the eth0 interface. Now from time to time the server has to open an openvpn connection (tun0) to other networks to get some data from there. During this period the Apache is no longer reachable under it's IP address on eth0 because all... (6 Replies)
Discussion started by: flyingwalrus
6 Replies
LEARN ABOUT MOJAVE
pcap_stats
PCAP_STATS(3PCAP) PCAP_STATS(3PCAP)
NAME
pcap_stats - get capture statistics
SYNOPSIS
#include <pcap/pcap.h>
int pcap_stats(pcap_t *p, struct pcap_stat *ps);
DESCRIPTION
pcap_stats() fills in the struct pcap_stat pointed to by its second argument. The values represent packet statistics from the start of the
run to the time of the call.
pcap_stats() is supported only on live captures, not on ``savefiles''; no statistics are stored in ``savefiles'', so no statistics are
available when reading from a ``savefile''.
A struct pcap_stat has the following members:
ps_recv
number of packets received;
ps_drop
number of packets dropped because there was no room in the operating system's buffer when they arrived, because packets
weren't being read fast enough;
ps_ifdrop
number of packets dropped by the network interface or its driver.
The statistics do not behave the same way on all platforms. ps_recv might count packets whether they passed any filter set with pcap_set-
filter(3PCAP) or not, or it might count only packets that pass the filter. It also might, or might not, count packets dropped because
there was no room in the operating system's buffer when they arrived. ps_drop is not available on all platforms; it is zero on platforms
where it's not available. If packet filtering is done in libpcap, rather than in the operating system, it would count packets that don't
pass the filter. Both ps_recv and ps_drop might, or might not, count packets not yet read from the operating system and thus not yet seen
by the application. ps_ifdrop might, or might not, be implemented; if it's zero, that might mean that no packets were dropped by the
interface, or it might mean that the statistic is unavailable, so it should not be treated as an indication that the interface did not drop
any packets.
RETURN VALUE
pcap_stats() returns 0 on success and returns -1 if there is an error or if p doesn't support packet statistics. If -1 is returned,
pcap_geterr() or pcap_perror() may be called with p as an argument to fetch or display the error text.
SEE ALSO
pcap(3PCAP), pcap_geterr(3PCAP)
3 January 2014 PCAP_STATS(3PCAP)