Журнал лабораторных работ

Содержание

Журнал

Среда (09/12/07)

/dev/ttyp3
13:42:47
#exit
Connection to 192.168.15.242 closed.
13:42:52
#ssh root@192.168.15.242
Enter passphrase for key '/root/.ssh/id_rsa':
Enter passphrase for key '/root/.ssh/id_rsa':
Last login: Wed Sep 12 13:43:40 2007 from host180.unix.nt
Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994
        The Regents of the University of California.  All rights reserved.
FreeBSD 6.2-RELEASE (SMP) #0: Fri Jan 12 11:05:30 UTC 2007
Welcome to FreeBSD!
Before seeking technical support, please use the following resources:
o  Security advisories and updated errata information for all releases are
   at http://www.FreeBSD.org/releases/ - always consult the ERRATA section
...
unfamiliar with FreeBSD's directory layout, please refer to the hier(7)
manual page.  If you are not familiar with manual pages, type `man man'.
You may also use sysinstall(8) to re-enter the installation and
configuration utility.  Edit /etc/motd to change this login announcement.
Removing stale pidfile
Agent pid 10140
Enter passphrase for /root/.ssh/id_rsa:
Identity added: /root/.ssh/id_rsa (/root/.ssh/id_rsa)
Identity added: /root/.ssh/id_dsa (/root/.ssh/id_dsa)
Identity added: /root/.ssh/identity (root@fbsd1.unix.nt)
/dev/ttyp6
13:43:17
#exit
Connection to 192.168.15.242 closed.
13:43:23
#ssh-add
Enter passphrase for /root/.ssh/id_rsa:
Identity added: /root/.ssh/id_rsa (/root/.ssh/id_rsa)
Identity added: /root/.ssh/id_dsa (/root/.ssh/id_dsa)
Identity added: /root/.ssh/identity (root@fbsd3.unix.nt)
13:43:40
#/etc/rc.d/pf stop
~
~
~
~
~        out on em0 inet proto tcp from em0 to any  port 80
    pass
~                                                  No ALTQ support in kernel
ALTQ related functions disabled
Disabling pf.
No ALTQ support in kernel
ALTQ related functions disabled
pf disabled
-- INSERT --
/dev/ttyp3
13:44:44
#screen -x
/dev/ttyp9
13:50:16
#cd /usr/ports/

13:50:23
#make search lynx
The search target requires a keyword parameter or name parameter,
e.g.: "make search key=somekeyword"
or    "make search name=somekeyword"
make: don't know how to make lynx. Stop
13:50:33
#make search name=
Port:   ja-lynx-2.8.4.rel1
Path:   /usr/ports/japanese/lynx
Info:   A terminal-based World-Wide Web Client with multi-byte modification
Maint:  ports@FreeBSD.org
B-deps:
R-deps: unzip-5.52_2 zip-2.32
WWW:
Port:   ja-lynx-2.8.5.dev7
Path:   /usr/ports/japanese/lynx-current
Info:   A terminal-based World-Wide Web Client with multi-byte modification
...
B-deps: gettext-0.14.5_2 libiconv-1.9.2_2
R-deps: gettext-0.14.5_2 libiconv-1.9.2_2
WWW:    http://lynx.isc.org/current/
Port:   lynx-ssl-2.8.5_2
Path:   /usr/ports/www/lynx-ssl
Info:   A non-graphical, text-based World-Wide Web client with SSL support
Maint:  jharris@widomaker.com
B-deps:
R-deps:
WWW:    http://lynx.isc.org/
13:50:40
#pkg_add lynx-2.8.5_2
pkg_add: can't stat package file 'lynx-2.8.5_2'
13:51:11
#cd usr/ports/www/lynx
bash: cd: usr/ports/www/lynx: No such file or directory
13:51:32
#cd /sr/ports/www/lynx

13:51:35
#pkg_add -rnx-2.8.5_2
Error: FTP Unable to get ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/lynx-2.8.5_2.tbz: Operation not permitted
pkg_add: unable to fetch 'ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/lynx-2.8.5_2.tbz' by URL
13:52:06
#pkg_add -r lynx-2.8.5_2
Error: FTP Unable to get ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/lynx-2.8.5_2.tbz: File unavailable (e.g., file not found, no access)
pkg_add: unable to fetch 'ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/lynx-2.8.5_2.tbz' by URL
/dev/ttyp6
13:52:34
#/etc/rc.d/pf start
~
~
~        out on em0 inet proto tcp from em0 to any  port 80
    pass
~                                                  Enabling pf.
No ALTQ support in kernel
ALTQ related functions disabled
No ALTQ support in kernel
ALTQ related functions disabled
No ALTQ support in kernel
ALTQ related functions disabled
-- INSERT --
pf enabled
/dev/ttyp9
13:52:47
#pkg_add -r lynx-2.8.5_2
Error: FTP Unable to get ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/lynx-2.8.5_2.tbz: Operation not permitted
pkg_add: unable to fetch 'ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/lynx-2.8.5_2.tbz' by URL
/dev/ttyp6
13:55:23
#pfctl -f ~/frw.conf
~
~
~
~
~        out on em0 inet proto tcp from em0 to any  port 80
    pass
~                                                  No ALTQ support in kernel
ALTQ related functions disabled
~
-- INSERT --
13:56:42
#/etc/rc.d/pf stop
~
~
~
~
~        out on em0 inet proto tcp from em0 to any  port 80
    pass
~                                                  No ALTQ support in kernel
ALTQ related functions disabled
Disabling pf.
No ALTQ support in kernel
ALTQ related functions disabled
pf disabled
-- INSERT --
прошло 69 минут
15:06:12
#/etc/rc.d/pf start
~
~
~        out on em0 inet proto tcp from em0 to any  port 80
    pass
~                                                  Enabling pf.
No ALTQ support in kernel
ALTQ related functions disabled
No ALTQ support in kernel
ALTQ related functions disabled
No ALTQ support in kernel
ALTQ related functions disabled
-- INSERT --
pf enabled
15:06:40
#pfctl -f ~/frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
15:06:42
#vim frw.conf
прошло 23 минуты
15:30:38
#ifconfig -a
em0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        options=b<RXCSUM,TXCSUM,VLAN_MTU>
        inet 192.168.15.237 netmask 0xffffff00 broadcast 192.168.15.255
        ether 00:07:e9:3c:2c:15
        media: Ethernet autoselect (100baseTX <full-duplex>)
        status: active
xl0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 1500
        options=9<RXCSUM,VLAN_MTU>
        ether 00:04:76:a1:f0:5d
        media: Ethernet autoselect (100baseTX <full-duplex>)
        status: active
plip0: flags=108810<POINTOPOINT,SIMPLEX,MULTICAST,NEEDSGIANT> mtu 1500
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
        inet6 fe80::1%lo0 prefixlen 64 scopeid 0x4
        inet6 ::1 prefixlen 128
        inet 127.0.0.1 netmask 0xff000000
15:32:21
#ifconfig -a

15:32:21
#ifconfig -a
em0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        options=b<RXCSUM,TXCSUM,VLAN_MTU>
        inet 192.168.15.237 netmask 0xffffff00 broadcast 192.168.15.255
        ether 00:07:e9:3c:2c:15
        media: Ethernet autoselect (100baseTX <full-duplex>)
        status: active
xl0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        options=9<RXCSUM,VLAN_MTU>
        inet 192.168.30.1 netmask 0xffffff00 broadcast 192.168.30.255
        ether 00:04:76:a1:f0:5d
        media: Ethernet autoselect (100baseTX <full-duplex>)
        status: active
plip0: flags=108810<POINTOPOINT,SIMPLEX,MULTICAST,NEEDSGIANT> mtu 1500
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
        inet6 fe80::1%lo0 prefixlen 64 scopeid 0x4
        inet6 ::1 prefixlen 128
        inet 127.0.0.1 netmask 0xff000000
15:32:23
#ping 192.168.30.2
PING 192.168.30.2 (192.168.30.2): 56 data bytes
ping: sendto: Operation not permitted
ping: sendto: Operation not permitted
ping: sendto: Operation not permitted
^C
--- 192.168.30.2 ping statistics ---
3 packets transmitted, 0 packets received, 100% packet loss
15:32:46
#ifconfig -a

15:32:46
#vim frw.conf
11a12,13
> pass out quick on xl0 proto icmp from any to any keep state
> pass in quick on xl0 proto icmp from any to any keep state
15:35:42
#ifconfig -a

15:35:42
#pfctl -f ~/frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
15:35:58
#ping 192.168.30.2
PING 192.168.30.2 (192.168.30.2): 56 data bytes
64 bytes from 192.168.30.2: icmp_seq=20 ttl=64 time=0.391 ms
64 bytes from 192.168.30.2: icmp_seq=21 ttl=64 time=0.288 ms
64 bytes from 192.168.30.2: icmp_seq=22 ttl=64 time=0.305 ms
64 bytes from 192.168.30.2: icmp_seq=23 ttl=64 time=0.324 ms
64 bytes from 192.168.30.2: icmp_seq=24 ttl=64 time=0.340 ms
64 bytes from 192.168.30.2: icmp_seq=25 ttl=64 time=0.357 ms
64 bytes from 192.168.30.2: icmp_seq=26 ttl=64 time=0.272 ms
64 bytes from 192.168.30.2: icmp_seq=27 ttl=64 time=0.274 ms
64 bytes from 192.168.30.2: icmp_seq=28 ttl=64 time=0.284 ms
...
64 bytes from 192.168.30.2: icmp_seq=35 ttl=64 time=0.260 ms
64 bytes from 192.168.30.2: icmp_seq=36 ttl=64 time=0.272 ms
64 bytes from 192.168.30.2: icmp_seq=37 ttl=64 time=0.293 ms
64 bytes from 192.168.30.2: icmp_seq=38 ttl=64 time=0.309 ms
64 bytes from 192.168.30.2: icmp_seq=39 ttl=64 time=0.342 ms
64 bytes from 192.168.30.2: icmp_seq=40 ttl=64 time=0.356 ms
^C
--- 192.168.30.2 ping statistics ---
41 packets transmitted, 21 packets received, 48% packet loss
round-trip min/avg/max/stddev = 0.254/0.310/0.391/0.036 ms
/dev/ttyp9
15:36:27
#tcpdump -i em0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
8 packets received by filter
0 packets dropped by kernel
/dev/ttyp6
15:36:53
#ping 192.168.30.2
PING 192.168.30.2 (192.168.30.2): 56 data bytes
64 bytes from 192.168.30.2: icmp_seq=0 ttl=64 time=0.393 ms
64 bytes from 192.168.30.2: icmp_seq=1 ttl=64 time=0.270 ms
64 bytes from 192.168.30.2: icmp_seq=2 ttl=64 time=0.281 ms
64 bytes from 192.168.30.2: icmp_seq=3 ttl=64 time=0.347 ms
64 bytes from 192.168.30.2: icmp_seq=4 ttl=64 time=0.326 ms
64 bytes from 192.168.30.2: icmp_seq=5 ttl=64 time=0.361 ms
64 bytes from 192.168.30.2: icmp_seq=6 ttl=64 time=0.358 ms
64 bytes from 192.168.30.2: icmp_seq=7 ttl=64 time=0.385 ms
64 bytes from 192.168.30.2: icmp_seq=8 ttl=64 time=0.253 ms
^C
--- 192.168.30.2 ping statistics ---
9 packets transmitted, 9 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.253/0.330/0.393/0.048 ms
/dev/ttyp9
15:36:59
#tcpdump -i xl-n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
15:37:30.959402 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 0, length 64
15:37:30.959689 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 0, length 64
15:37:31.960342 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 1, length 64
15:37:31.960529 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 1, length 64
15:37:32.961320 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 2, length 64
15:37:32.961518 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 2, length 64
15:37:33.962302 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 3, length 64
15:37:33.962565 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 3, length 64
...
15:37:36.965241 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 6, length 64
15:37:36.965518 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 6, length 64
15:37:37.966223 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 7, length 64
15:37:37.966522 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 7, length 64
15:37:38.967202 IP 192.168.30.1 > 192.168.30.2: ICMP echo request, id 47897, seq 8, length 64
15:37:38.967373 IP 192.168.30.2 > 192.168.30.1: ICMP echo reply, id 47897, seq 8, length 64
^C
18 packets captured
18 packets received by filter
0 packets dropped by kernel
/dev/ttyp6
15:37:39
#pfctl -f ~/frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
/dev/ttyp9
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
15:37:40
#tcpdump -i xl0 -n -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
16:03:38.721529 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 0, length 64
16:03:38.721601 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 0, length 64
16:03:39.725704 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 1, length 64
16:03:39.725765 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 1, length 64
16:03:40.736207 IP 192.168.30.2 > 192.168.30.1: ICMP echo request, id 16431, seq 2, length 64
16:03:40.736264 IP 192.168.30.1 > 192.168.30.2: ICMP echo reply, id 16431, seq 2, length 64
...
16:03:54.577030 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 2, length 64
16:03:54.577085 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 2, length 64
16:03:55.577986 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 3, length 64
16:03:55.578072 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 3, length 64
16:03:56.579171 IP 192.168.30.2 > 192.168.15.237: ICMP echo request, id 17967, seq 4, length 64
16:03:56.579228 IP 192.168.15.237 > 192.168.30.2: ICMP echo reply, id 17967, seq 4, length 64
^C
24 packets captured
26 packets received by filter
0 packets dropped by kernel
/dev/ttyp6
15:40:35
#vim frw.conf
13a14
> nat on em0 inet from 192.168.30.0/24 to any -> em0
15:41:13
#pfctl -f ~/frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
/root/frw.conf:14: Rules must be in order: options, normalization, queueing, translation, filtering
pfctl: Syntax error in config file: pf rules not loaded
15:41:15
#vim frw.conf
/dev/ttyp3
15:41:41
#ssh root@192.168.15.242
ssh: connect to host 192.168.15.242 port 22: Host is down
/dev/ttyp6
15:41:55
#/etc/rc.d/pf stop
No ALTQ support in kernel
ALTQ related functions disabled
Disabling pf.
No ALTQ support in kernel
ALTQ related functions disabled
pf disabled
/dev/ttypd
15:41:56
#screen -x
15:42:06
#screen -x
15:42:08
#screen -x
15:42:09
#screen -x
15:42:09
#screen -x
/dev/ttyp6
15:42:09
#/etc/rc.d/pf start
syn on
~
set number
~        Enabling pf.
No ALTQ support in kernel
ALTQ related functions disabled
No ALTQ support in kernel
ALTQ related functions disabled
No ALTQ support in kernel
ALTQ related functions disabled
pf enabled
~
~
~
15:42:09
#/etc/rc.d/pf start
syn on
~
set number
~        Enabling pf.
No ALTQ support in kernel
ALTQ related functions disabled
No ALTQ support in kernel
ALTQ related functions disabled
No ALTQ support in kernel
ALTQ related functions disabled
pf enabled
~
~
~
15:42:09
#/etc/rc.d/pf start
~
~
~
:qw
   Enabling pf.
No ALTQ support in kernel
ALTQ related functions disabled
No ALTQ support in kernel
ALTQ related functions disabled
No ALTQ support in kernel
ALTQ related functions disabled
pf enabled
/dev/ttypd
15:42:10
#screen -x
15:42:11
#screen -x
15:42:12
#screen -x
/dev/ttyp3
15:42:13
#screen -x
15:42:18
#screen
15:42:18
#screen
15:42:18
#screen
15:42:18
#screen
15:42:18
#screen
15:42:18
#screen
/dev/ttypg
15:42:57
#pfctl -N
[root@fbsd3:~]#
[root@fbsd3:~]#
[root@fbsd3:~]#
[root@fbsd3:~]# pfctl -N
No ALTQ support in kernel
ALTQ related functions disabled
[root@fbsd3:~]#
                No ALTQ support in kernel
ALTQ related functions disabled
15:43:05
#pfctl -sr
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
[root@fbsd3:~]# vim /etc/
                         No ALTQ support in kernel
ALTQ related functions disabled
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
15:43:11
#vim
15:43:11
#vim frw.conf
14c14
< nat on em0 inet from 192.168.30.0/24 to any -> em0
---
> nat on em0 inet from xl0:92.168.30.0/24 to any -> em0
15:43:11
#vim frw.conf
14c14
< nat on em0 inet from 192.168.30.0/24 to any -> em0
---
> nat on em0 inet from xl0:92.168.30.0/24 to any -> em0
15:43:11
#vim frw.conf
14c14
< nat on em0 inet from 192.168.30.0/24 to any -> em0
---
> nat on em0 inet from xl0:92.168.30.0/24 to any -> em0
15:44:37
#vim .vimrc
15:44:37
#vim .vimrc
15:44:37
#vim .vimrc
/dev/ttyp6
15:44:50
#vim frw.conf
15:44:50
#vim frw.conf
15:44:50
#vim frw.conf
15:44:50
#vim frw.conf
15:44:50
#vim frw.conf
/dev/ttypg
15:44:54
#vim frw.conf
14c14
< nat on em0 inet from xl0:92.168.30.0/24 to any -> em0
---
> nat on em0 inet from xl0:192.168.30.0/24 to any -> em0
15:44:54
#vim frw.conf
14c14
< nat on em0 inet from xl0:92.168.30.0/24 to any -> em0
---
> nat on em0 inet from xl0:192.168.30.0/24 to any -> em0
15:44:54
#vim frw.conf
14c14
< nat on em0 inet from xl0:92.168.30.0/24 to any -> em0
---
> nat on em0 inet from xl0:192.168.30.0/24 to any -> em0
15:45:19
#pfctl -f frw.conf
~
~
~
~
~
    nat on em0 inet from xl0:192.168.30.0/24 to any -> $(em0)
                                                            No ALTQ support in kernel
ALTQ related functions disabled
no IP address found for xl0:192.168.30.0/24
frw.conf:14: could not parse host specification
pfctl: Syntax error in config file: pf rules not loaded
15:45:19
#pfctl -f frw.conf
~
~
~
~
~
    nat on em0 inet from xl0:192.168.30.0/24 to any -> $(em0)
                                                            No ALTQ support in kernel
ALTQ related functions disabled
no IP address found for xl0:192.168.30.0/24
frw.conf:14: could not parse host specification
pfctl: Syntax error in config file: pf rules not loaded
15:45:30
#vim frw.conf
14c14
< nat on em0 inet from xl0:192.168.30.0/24 to any -> em0
---
> nat on em0 inet from xl0:192.168.30.0/24 to any -> $(em0)
15:45:30
#vim frw.conf
14c14
< nat on em0 inet from xl0:192.168.30.0/24 to any -> em0
---
> nat on em0 inet from xl0:192.168.30.0/24 to any -> $(em0)
15:45:30
#vim frw.conf
14c14
< nat on em0 inet from xl0:192.168.30.0/24 to any -> em0
---
> nat on em0 inet from xl0:192.168.30.0/24 to any -> $(em0)
15:45:45
#pfctl -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
no IP address found for xl0:192.168.30.0/24
frw.conf:14: could not parse host specification
frw.conf:14: macro '' not defined
pfctl: Syntax error in config file: pf rules not loaded
15:45:45
#pfctl -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
no IP address found for xl0:192.168.30.0/24
frw.conf:14: could not parse host specification
frw.conf:14: macro '' not defined
pfctl: Syntax error in config file: pf rules not loaded

Статистика

Время первой команды журнала13:42:47 2007- 9-12
Время последней команды журнала15:45:45 2007- 9-12
Количество командных строк в журнале101
Процент команд с ненулевым кодом завершения, %32.67
Процент синтаксически неверно набранных команд, % 0.00
Суммарное время работы с терминалом *, час 0.89
Количество командных строк в единицу времени, команда/мин 1.89
Частота использования команд
tcpdump22|=====================| 21.78%
vim22|=====================| 21.78%
screen16|===============| 15.84%
pfctl11|==========| 10.89%
/etc/rc.d/pf8|=======| 7.92%
ifconfig5|====| 4.95%
pkg_add4|===| 3.96%
ping3|==| 2.97%
cd3|==| 2.97%
ssh2|=| 1.98%
exit2|=| 1.98%
make2|=| 1.98%
ssh-add1|| 0.99%
____
*) Интервалы неактивности длительностью 30 минут и более не учитываются

Справка

Для того чтобы использовать LiLaLo, не нужно знать ничего особенного: всё происходит само собой. Однако, чтобы ведение и последующее использование журналов было как можно более эффективным, желательно иметь в виду следующее:
  1. В журнал автоматически попадают все команды, данные в любом терминале системы.

  2. Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.

  3. Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
    $ l s-l
    bash: l: command not found
    

  4. Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
    $ test 5 -lt 4
    Обратите внимание на то, что код завершения команды может быть отличен от нуля не только в тех случаях, когда команда была выполнена с ошибкой. Многие команды используют код завершения, например, для того чтобы показать результаты проверки

  5. Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
    $ find / -name abc
    find: /home/devi-orig/.gnome2: Keine Berechtigung
    find: /home/devi-orig/.gnome2_private: Keine Berechtigung
    find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung
    find: /home/devi-orig/.metacity: Keine Berechtigung
    find: /home/devi-orig/.inkscape: Keine Berechtigung
    ^C
    

  6. Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
    # id
    uid=0(root) gid=0(root) Gruppen=0(root)
    

  7. Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
    $ vi ~/.bashrc
    2a3,5
    >    if [ -f /usr/local/etc/bash_completion ]; then
    >         . /usr/local/etc/bash_completion
    >        fi
    

  8. Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
    $ patch ~/.bashrc
    В данном случае изменения применяются к файлу ~/.bashrc

  9. Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.

    Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.

  10. Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.

  11. Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора

  12. Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.

  13. Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.

  14. Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:

    $ whoami
    
    user
    
    $ #^ Интересно, кто я?
    
    в журнале это будет выглядеть так:
    $ whoami
    
    user
    
    Интересно, кто я?

  15. Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:

    $ whoami
    
    user
    
    $ cat > /dev/null #^ Интересно, кто я?
    
    Программа whoami выводит имя пользователя, под которым 
    мы зарегистрировались в системе.
    -
    Она не может ответить на вопрос о нашем назначении 
    в этом мире.
    
    В журнале это будет выглядеть так:
    $ whoami
    user
    
    Интересно, кто я?
    Программа whoami выводит имя пользователя, под которым
    мы зарегистрировались в системе.

    Она не может ответить на вопрос о нашем назначении
    в этом мире.
    Для разделения нескольких абзацев между собой используйте символ "-", один в строке.

  16. Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=

  17. Содержимое файла может быть показано в журнале. Для этого его нужно вывести с помощью программы cat. Если вывод команды отметить симоволами #!, содержимое файла будет показано в журнале в специально отведённой для этого секции.
  18. Для того чтобы вставить скриншот интересующего вас окна в журнал, нужно воспользоваться командой l3shot. После того как команда вызвана, нужно с помощью мыши выбрать окно, которое должно быть в журнале.
  19. Команды в журнале расположены в хронологическом порядке. Если две команды давались одна за другой, но на разных терминалах, в журнале они будут рядом, даже если они не имеют друг к другу никакого отношения.
    1
        2
    3   
        4
    
    Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.

О программе

LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008

$Id$