New option have added – collection attack fingerprint in pcap format

Hello, Community!

Nice news about new features!

Since commit.
we could collect 500 packets with full payload to the .pcap file dump for future investigation with tcpdump/wireshark.

This option could be used only for mirror ports with netmap or PF_RING.

Feature could be enabled with this option:

collect_attack_pcap_dumps = on

Feedback are welcome!