I'm sure there is some internal size limit - nTop is rather memory intensive, so most buffers are limited to 'reasonable' (compromise) sizes, reused where possible, etc.
But that's the beauty of open source - you can downbload the source, increase the buffer size to whatever you need and recompile. As to WHERE to find it, I don't remember, it's been over five years since I really looked at the sources. Try global-headers.h. Description: Burton 0.75 -----Burton From: [email protected] [mailto:[email protected]] On Behalf Of Cabeza de Baca, Matthew Sent: Thursday, September 13, 2012 12:30 PM To: '[email protected]'; '[email protected]' Subject: [Ntop] BPF Character Limitation? Hello all. I have a rather complex BPF filter. We are installing a firewall and we are using NTOP to categorize the traffic on link. As we identify traffic and create firewall rules we want to mimic those in NTOP as excludes to whittle down the data we have to wade through and get to the little stuff that is transversing the link. My current BPF filter is 1,151 characters with no spaces and 1037 characters with spaces. If I add one more exclude, even changing : !(port 137) to !(port 137,53) the entire filter stops working. Are there limitations to the BPF format? Currently I have the filter set in ntop.conf using the -B switch. Any thoughts would be appreciated. Thank You. M _____ This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential or privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy the message. _____ Think Green! Please do not print this e-mail unless you need to. Thank you.
<<image001.jpg>>
_______________________________________________ Ntop mailing list [email protected] http://listgateway.unipi.it/mailman/listinfo/ntop
