| 12345678910111213141516171819202122232425262728293031 | 
							- Source: tcpreplay
 
- Maintainer: Christoph Biedl <debian.axhn@manchmal.in-ulm.de>
 
- Homepage: http://tcpreplay.appneta.com/
 
- Standards-Version: 4.6.0
 
- Vcs-Browser: https://git.in-ulm.de/cbiedl/tcpreplay
 
- Vcs-Git: https://git.in-ulm.de/cbiedl/tcpreplay.git
 
- Build-Depends: debhelper-compat (= 13),
 
-     autogen,
 
-     libdumbnet-dev,
 
-     libpcap0.8-dev,
 
-     tcpdump,
 
- Priority: optional
 
- Rules-Requires-Root: no
 
- Section: net
 
- Package: tcpreplay
 
- Architecture: any
 
- Depends: ${misc:Depends}, ${shlibs:Depends},
 
- Description: Tool to replay saved tcpdump files at arbitrary speeds
 
-  Tcpreplay is aimed at testing the performance of a NIDS by
 
-  replaying real background network traffic in which to hide
 
-  attacks. Tcpreplay allows you to control the speed at which the
 
-  traffic is replayed, and can replay arbitrary tcpdump traces. Unlike
 
-  programmatically-generated artificial traffic which doesn't
 
-  exercise the application/protocol inspection that a NIDS performs,
 
-  and doesn't reproduce the real-world anomalies that appear on
 
-  production networks (asymmetric routes, traffic bursts/lulls,
 
-  fragmentation, retransmissions, etc.), tcpreplay allows for exact
 
-  replication of real traffic seen on real networks. It included the following
 
-  executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap
 
-  based captures are possible.
 
 
  |