Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Parsing PPPoE #10

Open
JonTheNiceGuy opened this issue Mar 29, 2019 · 0 comments
Open

Parsing PPPoE #10

JonTheNiceGuy opened this issue Mar 29, 2019 · 0 comments

Comments

@JonTheNiceGuy
Copy link

Hi,

I have install softflowd on a mirrored port from a DSL router. I have configured the port to mirror the PPPoE interface, so if I run tcpdump as follows:

root@probe:~# tcpdump -s 0 -n -i eth0 pppoes or pppoed
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
09:25:05.146280 PPPoE  [ses 0x8d7] IP 198.51.100.35.443 > 192.0.2.100.61849: Flags [.], ack 3343061665, win 6, length 0
09:25:05.182469 PPPoE  [ses 0x8d7] IP 198.51.100.133.443 > 192.0.2.100.61179: Flags [.], ack 3289005988, win 360, options [nop,nop,TS val 1686785279 ecr 2184070007], length 0

You can see the PPPoE packets being captured, but I'm not seeing that being sent upstream to the Netflow collector.

Is there any way to break out the PPPoE packets in softflowd?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant