I've set up a transparent bridge, with pf in "pass all log" mode to capture
data to/from a particular subnet. I am gathering data about the traffic
that passes through this gateway in order to prepare for installing a
firewall.

I've captured a bit of data as pflog files. Then I've processed these files
with:

 tcpdump -n -e -tttt

Which results in data records like this:

2005-09-08 20:26:40.328379 rule 5/0(match): pass out on fxp0: IP 170.85.113.49.3
092 > 170.85.107.35.1500: . 1460:2920(1460) ack 1 win 63947

This has most of the data that I need, but it seems to be missing one thing
that I think is important. How can I determine if the traffic is
TCP/UDP/ICMP etc?

Reading the tcpdump man page did not lead me to an answer.

If I look at the raw logfiles with ethereal, I see that the "type" data is
there, but I don't know how to get it printed in the processed data file.

Suggestions?
-- 
U.S. Encouraged by Vietnam Vote - Officials Cite 83% Turnout Despite Vietcong 
Terror 
- New York Times 9/3/1967

Reply via email to