*Maybe* making the device behaves in promiscuous mode to allow these
packets enters into kernel's network stack.
i.e.
# ifconfig [dev] +promisc
# ifconfig [dev] -promisc
or
# ip link set [dev] promisc on
# ip link set [dev] promisc off
What are you doing?
Someone can explain me why when tcpdump or wireshark are capturing
packets, neither ifconfig nor iproute shows the “PROMISC” flag? but
dmesg indeed show “device [dev] entered promiscuous mode”.
On 07/05/2011 11:35 AM, Andrey wrote:
Hello,
I have traffic that was captured in promiscuous mode, therefore it is
not destined to my computer.
From what I understand netfilter/iptables does not work in promiscuous
mode therefore it will not see the traffic when I replay it.
My question is can I make iptables work in promiscuous mode, if I can then how?
Regards,
Andrey
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html