I have a number of clients (2 OpenBSD systems, 3 Windows 10 systems,
an Android phone or two, and a VoIP phone) all connected to the internet
through an OpenBSD firewall (currently 7.1/amd64, will be 7.2 soon).
I'm trying to track down which client(s) is/are responsible for a 5-fold
increase in my overall data usage last month (and, I suspect, a similar
ongoing data usage).

So, I'd like to modify the firewall to somehow record the per-IP-address
number of bytes passed by the firewall (I can then match up the IP addresses
with the dhcpd logs to find the offending client(s)).  This StackExchange
question-and-answer
  https://serverfault.com/questions/303931/getting-per-ip-traffic-stats-from-pf
gives a possible solution
> export netflow data for all your traffic, grab it with Flow-Tools,
> and feed it to something like JKFlow to parse (and graph/report on).
but that was as of 2011.

Is this still the most straightforward way to get per-IP traffic stats?
If so, can anyone point me to any reasonably up-to-date "big picture"
tutorials/documentation?  The closest I've come so far is this discussion
  https://www.pantz.org/software/flowtools/configflowtoolspfflow.html
but it's from 2006.

Thanks,
-- 
-- "Jonathan Thornburg [remove -color to reply]" <dr.j.thornb...@gmail-pink.com>
   currently on the west coast of Canada
   "Now back when I worked in banking, if someone went to Barclays,
    pretended to be me, borrowed UKP10,000 and legged it, that was
    `impersonation', and it was the bank's money that had been stolen,
    not my identity.  How did things change?" -- Ross Anderson

Reply via email to