/l3/users/10-09-2007/nt-bsdnet/fbsd3.unix.nt/root :1 :2 :3 :4 :5 :6 :7 :8 :9 :10 :11 :12 :13 :14 :15 :16 :17 :18 :19 :20 :21 :22 :23 :24 :25 :26 :27 :28 :29 :30 :31 :32 :33 :34 :35 :36 |
|
#ssh root@192.168.15.242
Enter passphrase for key '/root/.ssh/id_rsa': Enter passphrase for key '/root/.ssh/id_rsa': Last login: Wed Sep 12 13:43:40 2007 from host180.unix.nt Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994 The Regents of the University of California. All rights reserved. FreeBSD 6.2-RELEASE (SMP) #0: Fri Jan 12 11:05:30 UTC 2007 Welcome to FreeBSD! Before seeking technical support, please use the following resources: o Security advisories and updated errata information for all releases are at http://www.FreeBSD.org/releases/ - always consult the ERRATA section ... unfamiliar with FreeBSD's directory layout, please refer to the hier(7) manual page. If you are not familiar with manual pages, type `man man'. You may also use sysinstall(8) to re-enter the installation and configuration utility. Edit /etc/motd to change this login announcement. Removing stale pidfile Agent pid 10140 Enter passphrase for /root/.ssh/id_rsa: Identity added: /root/.ssh/id_rsa (/root/.ssh/id_rsa) Identity added: /root/.ssh/id_dsa (/root/.ssh/id_dsa) Identity added: /root/.ssh/identity (root@fbsd1.unix.nt) |
#ssh-add
Enter passphrase for /root/.ssh/id_rsa: Identity added: /root/.ssh/id_rsa (/root/.ssh/id_rsa) Identity added: /root/.ssh/id_dsa (/root/.ssh/id_dsa) Identity added: /root/.ssh/identity (root@fbsd3.unix.nt) |
#/etc/rc.d/pf stop
~ ~ ~ ~ ~ out on em0 inet proto tcp from em0 to any port 80 pass ~ No ALTQ support in kernel ALTQ related functions disabled Disabling pf. No ALTQ support in kernel ALTQ related functions disabled pf disabled -- INSERT -- |
#make search lynx
The search target requires a keyword parameter or name parameter, e.g.: "make search key=somekeyword" or "make search name=somekeyword" make: don't know how to make lynx. Stop |
#make search name=
Port: ja-lynx-2.8.4.rel1 Path: /usr/ports/japanese/lynx Info: A terminal-based World-Wide Web Client with multi-byte modification Maint: ports@FreeBSD.org B-deps: R-deps: unzip-5.52_2 zip-2.32 WWW: Port: ja-lynx-2.8.5.dev7 Path: /usr/ports/japanese/lynx-current Info: A terminal-based World-Wide Web Client with multi-byte modification ... B-deps: gettext-0.14.5_2 libiconv-1.9.2_2 R-deps: gettext-0.14.5_2 libiconv-1.9.2_2 WWW: http://lynx.isc.org/current/ Port: lynx-ssl-2.8.5_2 Path: /usr/ports/www/lynx-ssl Info: A non-graphical, text-based World-Wide Web client with SSL support Maint: jharris@widomaker.com B-deps: R-deps: WWW: http://lynx.isc.org/ |
#pkg_add lynx-2.8.5_2
pkg_add: can't stat package file 'lynx-2.8.5_2' |
#cd usr/ports/www/lynx
bash: cd: usr/ports/www/lynx: No such file or directory |
#cd /sr/ports/www/lynx
|
#pkg_add -rnx-2.8.5_2
Error: FTP Unable to get ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/lynx-2.8.5_2.tbz: Operation not permitted pkg_add: unable to fetch 'ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/lynx-2.8.5_2.tbz' by URL |
#pkg_add -r lynx-2.8.5_2
Error: FTP Unable to get ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/lynx-2.8.5_2.tbz: File unavailable (e.g., file not found, no access) pkg_add: unable to fetch 'ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/lynx-2.8.5_2.tbz' by URL |
#/etc/rc.d/pf start
~ ~ ~ out on em0 inet proto tcp from em0 to any port 80 pass ~ Enabling pf. No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled -- INSERT -- pf enabled |
#pkg_add -r lynx-2.8.5_2
Error: FTP Unable to get ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/lynx-2.8.5_2.tbz: Operation not permitted pkg_add: unable to fetch 'ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/lynx-2.8.5_2.tbz' by URL |
#pfctl -f ~/frw.conf
~ ~ ~ ~ ~ out on em0 inet proto tcp from em0 to any port 80 pass ~ No ALTQ support in kernel ALTQ related functions disabled ~ -- INSERT -- |
#/etc/rc.d/pf stop
~ ~ ~ ~ ~ out on em0 inet proto tcp from em0 to any port 80 pass ~ No ALTQ support in kernel ALTQ related functions disabled Disabling pf. No ALTQ support in kernel ALTQ related functions disabled pf disabled -- INSERT -- |
#/etc/rc.d/pf start
~ ~ ~ out on em0 inet proto tcp from em0 to any port 80 pass ~ Enabling pf. No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled -- INSERT -- pf enabled |
#pfctl -f ~/frw.conf
No ALTQ support in kernel ALTQ related functions disabled |
#vim frw.conf
|
#ifconfig -a
em0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=b<RXCSUM,TXCSUM,VLAN_MTU> inet 192.168.15.237 netmask 0xffffff00 broadcast 192.168.15.255 ether 00:07:e9:3c:2c:15 media: Ethernet autoselect (100baseTX <full-duplex>) status: active xl0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 1500 options=9<RXCSUM,VLAN_MTU> ether 00:04:76:a1:f0:5d media: Ethernet autoselect (100baseTX <full-duplex>) status: active plip0: flags=108810<POINTOPOINT,SIMPLEX,MULTICAST,NEEDSGIANT> mtu 1500 lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x4 inet6 ::1 prefixlen 128 inet 127.0.0.1 netmask 0xff000000 |
#ifconfig -a
|
#ifconfig -a
em0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=b<RXCSUM,TXCSUM,VLAN_MTU> inet 192.168.15.237 netmask 0xffffff00 broadcast 192.168.15.255 ether 00:07:e9:3c:2c:15 media: Ethernet autoselect (100baseTX <full-duplex>) status: active xl0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=9<RXCSUM,VLAN_MTU> inet 192.168.30.1 netmask 0xffffff00 broadcast 192.168.30.255 ether 00:04:76:a1:f0:5d media: Ethernet autoselect (100baseTX <full-duplex>) status: active plip0: flags=108810<POINTOPOINT,SIMPLEX,MULTICAST,NEEDSGIANT> mtu 1500 lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x4 inet6 ::1 prefixlen 128 inet 127.0.0.1 netmask 0xff000000 |
#ping 192.168.30.2
PING 192.168.30.2 (192.168.30.2): 56 data bytes ping: sendto: Operation not permitted ping: sendto: Operation not permitted ping: sendto: Operation not permitted ^C --- 192.168.30.2 ping statistics --- 3 packets transmitted, 0 packets received, 100% packet loss |
#ifconfig -a
|
#vim frw.conf
11a12,13 > pass out quick on xl0 proto icmp from any to any keep state > pass in quick on xl0 proto icmp from any to any keep state |
#ifconfig -a
|
#pfctl -f ~/frw.conf
No ALTQ support in kernel ALTQ related functions disabled |
#ping 192.168.30.2
PING 192.168.30.2 (192.168.30.2): 56 data bytes 64 bytes from 192.168.30.2: icmp_seq=20 ttl=64 time=0.391 ms 64 bytes from 192.168.30.2: icmp_seq=21 ttl=64 time=0.288 ms 64 bytes from 192.168.30.2: icmp_seq=22 ttl=64 time=0.305 ms 64 bytes from 192.168.30.2: icmp_seq=23 ttl=64 time=0.324 ms 64 bytes from 192.168.30.2: icmp_seq=24 ttl=64 time=0.340 ms 64 bytes from 192.168.30.2: icmp_seq=25 ttl=64 time=0.357 ms 64 bytes from 192.168.30.2: icmp_seq=26 ttl=64 time=0.272 ms 64 bytes from 192.168.30.2: icmp_seq=27 ttl=64 time=0.274 ms 64 bytes from 192.168.30.2: icmp_seq=28 ttl=64 time=0.284 ms ... 64 bytes from 192.168.30.2: icmp_seq=35 ttl=64 time=0.260 ms 64 bytes from 192.168.30.2: icmp_seq=36 ttl=64 time=0.272 ms 64 bytes from 192.168.30.2: icmp_seq=37 ttl=64 time=0.293 ms 64 bytes from 192.168.30.2: icmp_seq=38 ttl=64 time=0.309 ms 64 bytes from 192.168.30.2: icmp_seq=39 ttl=64 time=0.342 ms 64 bytes from 192.168.30.2: icmp_seq=40 ttl=64 time=0.356 ms ^C --- 192.168.30.2 ping statistics --- 41 packets transmitted, 21 packets received, 48% packet loss round-trip min/avg/max/stddev = 0.254/0.310/0.391/0.036 ms |
#tcpdump -i em0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 8 packets received by filter 0 packets dropped by kernel |
#ping 192.168.30.2
PING 192.168.30.2 (192.168.30.2): 56 data bytes 64 bytes from 192.168.30.2: icmp_seq=0 ttl=64 time=0.393 ms 64 bytes from 192.168.30.2: icmp_seq=1 ttl=64 time=0.270 ms 64 bytes from 192.168.30.2: icmp_seq=2 ttl=64 time=0.281 ms 64 bytes from 192.168.30.2: icmp_seq=3 ttl=64 time=0.347 ms 64 bytes from 192.168.30.2: icmp_seq=4 ttl=64 time=0.326 ms 64 bytes from 192.168.30.2: icmp_seq=5 ttl=64 time=0.361 ms 64 bytes from 192.168.30.2: icmp_seq=6 ttl=64 time=0.358 ms 64 bytes from 192.168.30.2: icmp_seq=7 ttl=64 time=0.385 ms 64 bytes from 192.168.30.2: icmp_seq=8 ttl=64 time=0.253 ms ^C --- 192.168.30.2 ping statistics --- 9 packets transmitted, 9 packets received, 0% packet loss round-trip min/avg/max/stddev = 0.253/0.330/0.393/0.048 ms |
#tcpdump -i xl-n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 15:37:30.959402 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 0, length 64 15:37:30.959689 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 0, length 64 15:37:31.960342 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 1, length 64 15:37:31.960529 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 1, length 64 15:37:32.961320 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 2, length 64 15:37:32.961518 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 2, length 64 15:37:33.962302 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 3, length 64 15:37:33.962565 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 3, length 64 ... 15:37:36.965241 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 6, length 64 15:37:36.965518 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 6, length 64 15:37:37.966223 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 7, length 64 15:37:37.966522 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 7, length 64 15:37:38.967202 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 8, length 64 15:37:38.967373 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 8, length 64 ^C 18 packets captured 18 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes 16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64 16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64 16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64 16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64 16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64 16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64 ... 16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64 16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64 16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64 16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64 16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64 16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64 ^C 24 packets captured 26 packets received by filter 0 packets dropped by kernel |
#pfctl -f ~/frw.conf
No ALTQ support in kernel ALTQ related functions disabled /root/frw.conf:14: Rules must be in order: options, normalization, queueing, translation, filtering pfctl: Syntax error in config file: pf rules not loaded |
#vim frw.conf
|
#ssh root@192.168.15.242
ssh: connect to host 192.168.15.242 port 22: Host is down |
#/etc/rc.d/pf stop
No ALTQ support in kernel ALTQ related functions disabled Disabling pf. No ALTQ support in kernel ALTQ related functions disabled pf disabled |
#screen -x
|
#screen -x
|
#screen -x
|
#screen -x
|
#/etc/rc.d/pf start
syn on ~ set number ~ Enabling pf. No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled pf enabled ~ ~ ~ |
#/etc/rc.d/pf start
syn on ~ set number ~ Enabling pf. No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled pf enabled ~ ~ ~ |
#/etc/rc.d/pf start
~ ~ ~ :qw Enabling pf. No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled pf enabled |
#screen -x
|
#screen -x
|
#screen
|
#screen
|
#screen
|
#screen
|
#screen
|
#screen
|
#pfctl -N
[root@fbsd3:~]# [root@fbsd3:~]# [root@fbsd3:~]# [root@fbsd3:~]# pfctl -N No ALTQ support in kernel ALTQ related functions disabled [root@fbsd3:~]# No ALTQ support in kernel ALTQ related functions disabled |
#pfctl -sr
pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state [root@fbsd3:~]# vim /etc/ No ALTQ support in kernel ALTQ related functions disabled block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#vim
|
#vim frw.conf
14c14 < nat on em0 inet from 192.168.30.0/24 to any -> em0 --- > nat on em0 inet from xl0:92.168.30.0/24 to any -> em0 |
#vim frw.conf
14c14 < nat on em0 inet from 192.168.30.0/24 to any -> em0 --- > nat on em0 inet from xl0:92.168.30.0/24 to any -> em0 |
#vim frw.conf
14c14 < nat on em0 inet from 192.168.30.0/24 to any -> em0 --- > nat on em0 inet from xl0:92.168.30.0/24 to any -> em0 |
#vim .vimrc
|
#vim .vimrc
|
#vim .vimrc
|
#vim frw.conf
|
#vim frw.conf
|
#vim frw.conf
|
#vim frw.conf
|
#vim frw.conf
14c14 < nat on em0 inet from xl0:92.168.30.0/24 to any -> em0 --- > nat on em0 inet from xl0:192.168.30.0/24 to any -> em0 |
#vim frw.conf
14c14 < nat on em0 inet from xl0:92.168.30.0/24 to any -> em0 --- > nat on em0 inet from xl0:192.168.30.0/24 to any -> em0 |
#vim frw.conf
14c14 < nat on em0 inet from xl0:92.168.30.0/24 to any -> em0 --- > nat on em0 inet from xl0:192.168.30.0/24 to any -> em0 |
#pfctl -f frw.conf
~ ~ ~ ~ ~ nat on em0 inet from xl0:192.168.30.0/24 to any -> $(em0) No ALTQ support in kernel ALTQ related functions disabled no IP address found for xl0:192.168.30.0/24 frw.conf:14: could not parse host specification pfctl: Syntax error in config file: pf rules not loaded |
#pfctl -f frw.conf
~ ~ ~ ~ ~ nat on em0 inet from xl0:192.168.30.0/24 to any -> $(em0) No ALTQ support in kernel ALTQ related functions disabled no IP address found for xl0:192.168.30.0/24 frw.conf:14: could not parse host specification pfctl: Syntax error in config file: pf rules not loaded |
#vim frw.conf
14c14 < nat on em0 inet from xl0:192.168.30.0/24 to any -> em0 --- > nat on em0 inet from xl0:192.168.30.0/24 to any -> $(em0) |
#vim frw.conf
14c14 < nat on em0 inet from xl0:192.168.30.0/24 to any -> em0 --- > nat on em0 inet from xl0:192.168.30.0/24 to any -> $(em0) |
#vim frw.conf
14c14 < nat on em0 inet from xl0:192.168.30.0/24 to any -> em0 --- > nat on em0 inet from xl0:192.168.30.0/24 to any -> $(em0) |
#pfctl -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled no IP address found for xl0:192.168.30.0/24 frw.conf:14: could not parse host specification frw.conf:14: macro '' not defined pfctl: Syntax error in config file: pf rules not loaded |
#pfctl -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled no IP address found for xl0:192.168.30.0/24 frw.conf:14: could not parse host specification frw.conf:14: macro '' not defined pfctl: Syntax error in config file: pf rules not loaded |
Время первой команды журнала | 13:42:47 2007- 9-12 | |||||||||||||||||||||||||||||||||||||||
Время последней команды журнала | 15:45:45 2007- 9-12 | |||||||||||||||||||||||||||||||||||||||
Количество командных строк в журнале | 101 | |||||||||||||||||||||||||||||||||||||||
Процент команд с ненулевым кодом завершения, % | 32.67 | |||||||||||||||||||||||||||||||||||||||
Процент синтаксически неверно набранных команд, % | 0.00 | |||||||||||||||||||||||||||||||||||||||
Суммарное время работы с терминалом *, час | 0.89 | |||||||||||||||||||||||||||||||||||||||
Количество командных строк в единицу времени, команда/мин | 1.89 | |||||||||||||||||||||||||||||||||||||||
Частота использования команд |
|
В журнал автоматически попадают все команды, данные в любом терминале системы.
Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.
Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
$ l s-l bash: l: command not found |
Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
$ test 5 -lt 4 |
Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
$ find / -name abc find: /home/devi-orig/.gnome2: Keine Berechtigung find: /home/devi-orig/.gnome2_private: Keine Berechtigung find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung find: /home/devi-orig/.metacity: Keine Berechtigung find: /home/devi-orig/.inkscape: Keine Berechtigung ^C |
Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
# id uid=0(root) gid=0(root) Gruppen=0(root) |
Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
$ vi ~/.bashrc
|
Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
$ patch ~/.bashrc |
Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.
Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.
Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.
Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора
Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.
Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.
Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:
$ whoami
user
$ #^ Интересно, кто я?в журнале это будет выглядеть так:
$ whoami
user
Интересно, кто я? |
Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:
$ whoami
user
$ cat > /dev/null #^ Интересно, кто я?
Программа whoami выводит имя пользователя, под которым мы зарегистрировались в системе. - Она не может ответить на вопрос о нашем назначении в этом мире.В журнале это будет выглядеть так:
$ whoami user
|
Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=
1 2 3 4Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.
LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008