mirror of
https://github.com/opnsense/src.git
synced 2026-03-27 13:13:13 -04:00
IPv4 addresses/ports. When doing traffic testing of actual code that /does/ things to the packet (rather than say, 'bridge.c'), it's typically a good idea to use a variety of cache-busting and flow-tracking-busting packet spreads. The pkt-gen method of testing an IP range was to walk it linearly - which is fine, but not useful enough. This can be used to completely randomize the source/destination addresses (eg to test out flow-tracking-busting) and to keep the destination fixed whilst randomising the source (eg to test out what a DDoS may look like.) Tested: * Intel ixgbe 10G (82599) netmap Differential Revision: https://reviews.freebsd.org/D2309 MFC after: 2 weeks Sponsored by: Norse Corp, Inc. |
||
|---|---|---|
| .. | ||
| bridge.c | ||
| Makefile | ||
| pkt-gen.c | ||
| README | ||
| vale-ctl.c | ||
$FreeBSD$ This directory contains examples that use netmap pkt-gen a packet sink/source using the netmap API bridge a two-port jumper wire, also using the native API vale-ctl the program to control VALE bridges