<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: cppcap and IPv6 host filters in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cppcap-and-IPv6-host-filters/m-p/154357#M26145</link>
    <description>&lt;P&gt;Hey Chris, thanks for that idea. While fw6 monitor -F works for very simple scenarios and the performance impact is not as bad as with tcpdump, it is still much more ressource intensive compared to cppcap. And we have all the overhead from the multiple chain position capturing.&lt;/P&gt;
&lt;P&gt;I will try asking the sk owner first, if that does not work, I will file a TAC case. Just wanted to ask community first, maybe I am just doing it wrong.&lt;/P&gt;</description>
    <pubDate>Tue, 02 Aug 2022 13:59:19 GMT</pubDate>
    <dc:creator>Tobias_Moritz</dc:creator>
    <dc:date>2022-08-02T13:59:19Z</dc:date>
    <item>
      <title>cppcap and IPv6 host filters</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cppcap-and-IPv6-host-filters/m-p/154272#M26114</link>
      <description>&lt;P&gt;Hello Check Mates,&lt;/P&gt;
&lt;P&gt;cppcap is out for quite a while now, but everytime when I want to do IPv6 captures with it, I am struggeling with the filter syntax.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk141412" target="_self"&gt;sk141412&lt;/A&gt; tells us, that IPv6 is supported and the filter syntax is the one from libpcap. However, filter strings with IPv6 hosts which work in tcpdump do not work with cppcap.&lt;/P&gt;
&lt;PRE data-unlink="true"&gt;cppcap -f 'host 2a02:26f0:12d:58c::4b36 or host 2a02:26f0:12d:59c::4b36' -o test.pcap -w 10M -W 2&lt;/PRE&gt;
&lt;P data-unlink="true"&gt;is not showing any error message, but also not capturing traffic.&lt;/P&gt;
&lt;PRE data-unlink="true"&gt;cppcap -f 'host c1-word-view-15.cdn.office.net' -o test.pcap -w 10M -W 2&lt;/PRE&gt;
&lt;P data-unlink="true"&gt;is capturing the IPv6 traffic, showing exactly the IPv6 addresses in capture, that I used for the filter above. The FQDN used here resolves to the two IPv6 addresses shown above.&lt;/P&gt;
&lt;P data-unlink="true"&gt;When using tcpdump:&lt;/P&gt;
&lt;PRE data-unlink="true"&gt;tcpdump -i eth0 -w test.pcap host 2a02:26f0:12d:58c::4b36 or host 2a02:26f0:12d:59c::4b36&lt;/PRE&gt;
&lt;P data-unlink="true"&gt;it is working fine.&lt;/P&gt;
&lt;P data-unlink="true"&gt;Am I holding it wrong? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;Does anyone got cppcap to work with IPv6 host filter strings?&lt;/P&gt;
&lt;P data-unlink="true"&gt;The workaround in using tcpdump instead of cppcap is not suitable in production, because of the load (as mentioned in the sk).&lt;/P&gt;
&lt;P data-unlink="true"&gt;The workround in using FQDN instead of IPv6 address in filter string is not suitable for obvious reasons.&lt;/P&gt;
&lt;P data-unlink="true"&gt;Version: R80.40 JHF T161.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;Thank you for any ideas!&lt;/P&gt;</description>
      <pubDate>Mon, 01 Aug 2022 13:53:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cppcap-and-IPv6-host-filters/m-p/154272#M26114</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2022-08-01T13:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: cppcap and IPv6 host filters</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cppcap-and-IPv6-host-filters/m-p/154344#M26139</link>
      <description>&lt;P&gt;Can you get what you need from "fw monitor" rather than tcpdump?&lt;/P&gt;
&lt;P&gt;Otherwise if the syntax is not operating as you expect I would work the examples through further with TAC.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2022 13:22:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cppcap-and-IPv6-host-filters/m-p/154344#M26139</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-08-02T13:22:25Z</dc:date>
    </item>
    <item>
      <title>Re: cppcap and IPv6 host filters</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cppcap-and-IPv6-host-filters/m-p/154357#M26145</link>
      <description>&lt;P&gt;Hey Chris, thanks for that idea. While fw6 monitor -F works for very simple scenarios and the performance impact is not as bad as with tcpdump, it is still much more ressource intensive compared to cppcap. And we have all the overhead from the multiple chain position capturing.&lt;/P&gt;
&lt;P&gt;I will try asking the sk owner first, if that does not work, I will file a TAC case. Just wanted to ask community first, maybe I am just doing it wrong.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2022 13:59:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cppcap-and-IPv6-host-filters/m-p/154357#M26145</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2022-08-02T13:59:19Z</dc:date>
    </item>
  </channel>
</rss>

