Source: tcpreplay
Maintainer: Christoph Biedl <debian.axhn@manchmal.in-ulm.de>
Homepage: http://tcpreplay.appneta.com/
Standards-Version: 4.6.0
Vcs-Browser: https://git.in-ulm.de/cbiedl/tcpreplay
Vcs-Git: https://git.in-ulm.de/cbiedl/tcpreplay.git
Build-Depends: debhelper-compat (= 13),
    autogen,
    libpcap0.8-dev,
    tcpdump,
Priority: optional
Rules-Requires-Root: no
Section: net

Package: tcpreplay
Architecture: amd64 arm64 armel hppa hurd-i386 i386 kfreebsd-amd64 kfreebsd-i386 m68k powerpc ppc64 ppc64el riscv64 s390x sh4 x32
Depends: ${misc:Depends}, ${shlibs:Depends},
Description: Tool to replay saved tcpdump files at arbitrary speeds
 Tcpreplay is aimed at testing the performance of a NIDS by
 replaying real background network traffic in which to hide
 attacks. Tcpreplay allows you to control the speed at which the
 traffic is replayed, and can replay arbitrary tcpdump traces. Unlike
 programmatically-generated artificial traffic which doesn't
 exercise the application/protocol inspection that a NIDS performs,
 and doesn't reproduce the real-world anomalies that appear on
 production networks (asymmetric routes, traffic bursts/lulls,
 fragmentation, retransmissions, etc.), tcpreplay allows for exact
 replication of real traffic seen on real networks. It included the following
 executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap
 based captures are possible.
