I'm sure there is some internal size limit - nTop is rather memory
intensive, so most buffers are limited to 'reasonable' (compromise) sizes,
reused where possible, etc.

 

But that's the beauty of open source - you can downbload the source,
increase the buffer size to whatever you need and recompile.

 

As to WHERE to find it, I don't remember, it's been over five years since I
really looked at the sources. Try global-headers.h.

 

Description: Burton 0.75

-----Burton

 

 

 

 

From: [email protected]
[mailto:[email protected]] On Behalf Of Cabeza de Baca,
Matthew
Sent: Thursday, September 13, 2012 12:30 PM
To: '[email protected]'; '[email protected]'
Subject: [Ntop] BPF Character Limitation?

 

Hello all.

 

I have a rather complex BPF filter.  We are installing a firewall and we are
using NTOP to categorize the traffic on link.  As we identify traffic and
create firewall rules we want to mimic those in NTOP as excludes to whittle
down the data we have to wade through and get to the little stuff that is
transversing the link.

 

My current BPF filter is 1,151 characters with no spaces and 1037 characters
with spaces.  If I add one more exclude, even changing : !(port 137) to
!(port 137,53) the entire filter stops working.

 

Are there limitations to the BPF format?  Currently I have the filter set in
ntop.conf using the -B switch.

 

Any thoughts would be appreciated.

 

Thank You.

 

M

 

  _____  


This e-mail message, including any attachments, is for the
sole use of the intended recipient(s) and may contain
confidential or privileged information. Any unauthorized
review, use, disclosure or distribution is prohibited. If
you are not the intended recipient, please contact the
sender by reply e-mail and destroy the message.

  _____  


Think Green! Please do not print this e-mail unless you need to. Thank you.

<<image001.jpg>>

_______________________________________________
Ntop mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop

Reply via email to