opnsense-src/tools/tools/netmap
Adrian Chadd 56717743f2 Update pkt-gen to optionally use randomised source/destination
IPv4 addresses/ports.

When doing traffic testing of actual code that /does/ things to the
packet (rather than say, 'bridge.c'), it's typically a good idea to
use a variety of cache-busting and flow-tracking-busting packet
spreads.  The pkt-gen method of testing an IP range was to walk
it linearly - which is fine, but not useful enough.

This can be used to completely randomize the source/destination
addresses (eg to test out flow-tracking-busting) and to keep the
destination fixed whilst randomising the source (eg to test out
what a DDoS may look like.)

Tested:

* Intel ixgbe 10G (82599) netmap

Differential Revision:	https://reviews.freebsd.org/D2309
MFC after:	2 weeks
Sponsored by:	Norse Corp, Inc.
2015-04-19 17:07:51 +00:00
..
bridge.c This new version of netmap brings you the following: 2014-02-15 04:53:04 +00:00
Makefile NO_MAN= has been deprecated in favor of MAN= for some time, go ahead 2014-04-13 05:21:56 +00:00
pkt-gen.c Update pkt-gen to optionally use randomised source/destination 2015-04-19 17:07:51 +00:00
README This new version of netmap brings you the following: 2014-02-15 04:53:04 +00:00
vale-ctl.c Update to the current version of netmap. 2014-08-16 15:00:01 +00:00

$FreeBSD$

This directory contains examples that use netmap

	pkt-gen		a packet sink/source using the netmap API

	bridge		a two-port jumper wire, also using the native API

	vale-ctl	the program to control VALE bridges