Журнал лабораторных работ

Содержание

Журнал

Среда (09/12/07)

/dev/ttypg
16:07:18
#vim frw.conf
7c7
< nat on $ext_if from $net to any -> ($ext_if)
---
> nat pass on $ext_if from $net to any -> ($ext_if)
16:07:18
#vim frw.conf
7c7
< nat on $ext_if from $net to any -> ($ext_if)
---
> nat pass on $ext_if from $net to any -> ($ext_if)
16:07:18
#vim frw.conf
7c7
< nat on $ext_if from $net to any -> ($ext_if)
---
> nat pass on $ext_if from $net to any -> ($ext_if)
16:07:18
#vim frw.conf
7c7
< nat on $ext_if from $net to any -> ($ext_if)
---
> nat pass on $ext_if from $net to any -> ($ext_if)
16:07:18
#vim frw.conf
7c7
< nat on $ext_if from $net to any -> ($ext_if)
---
> nat pass on $ext_if from $net to any -> ($ext_if)
16:07:18
#vim frw.conf
7c7
< nat on $ext_if from $net to any -> ($ext_if)
---
> nat pass on $ext_if from $net to any -> ($ext_if)
16:07:18
#vim frw.conf
7c7
< nat on $ext_if from $net to any -> ($ext_if)
---
> nat pass on $ext_if from $net to any -> ($ext_if)
16:07:18
#vim frw.conf
7c7
< nat on $ext_if from $net to any -> ($ext_if)
---
> nat pass on $ext_if from $net to any -> ($ext_if)
16:07:18
#vim frw.conf
7c7
< nat on $ext_if from $net to any -> ($ext_if)
---
> nat pass on $ext_if from $net to any -> ($ext_if)
16:07:18
#vim frw.conf
7c7
< nat on $ext_if from $net to any -> ($ext_if)
---
> nat pass on $ext_if from $net to any -> ($ext_if)
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:54
#pfctl -v -f frw.conf
No ALTQ support in kernel
ALTQ related functions disabled
table <allowed> const file "/etc/myfriends"
int_if = "xl0"
ext_if = "em0"
net = "192.168.30.0/24"
nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin
block drop in all
block drop out all
pass out quick on em0 proto icmp from any to <allowed> keep state
pass in quick on em0 proto icmp from <allowed> to any keep state
pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state
pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state
pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state
pass out quick on xl0 proto icmp all keep state
pass in quick on xl0 proto icmp all keep state
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:07:57
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
13 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:04
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:20
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
7 packets received by filter
0 packets dropped by kernel
16:08:24
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470>
16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694>
16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471>
16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695>
16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472>
16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695>
16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473>
16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695>
16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475>
16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696>
...
16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561>
16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967>
16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562>
16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967>
16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564>
16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968>
16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565>
16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968>
16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566>
16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968>
16:08:24
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470>
16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694>
16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471>
16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695>
16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472>
16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695>
16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473>
16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695>
16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475>
16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696>
...
16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561>
16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967>
16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562>
16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967>
16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564>
16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968>
16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565>
16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968>
16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566>
16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968>
16:08:24
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470>
16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694>
16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471>
16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695>
16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472>
16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695>
16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473>
16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695>
16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475>
16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696>
...
16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561>
16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967>
16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562>
16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967>
16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564>
16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968>
16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565>
16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968>
16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566>
16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968>
16:08:24
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470>
16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694>
16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471>
16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695>
16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472>
16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695>
16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473>
16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695>
16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475>
16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696>
...
16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561>
16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967>
16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562>
16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967>
16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564>
16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968>
16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565>
16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968>
16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566>
16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968>
16:08:24
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470>
16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694>
16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471>
16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695>
16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472>
16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695>
16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473>
16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695>
16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475>
16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696>
...
16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561>
16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967>
16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562>
16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967>
16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564>
16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968>
16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565>
16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968>
16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566>
16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968>
16:08:24
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470>
16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694>
16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471>
16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695>
16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472>
16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695>
16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473>
16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695>
16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475>
16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696>
...
16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561>
16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967>
16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562>
16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967>
16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564>
16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968>
16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565>
16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968>
16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566>
16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968>
16:08:24
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470>
16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694>
16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471>
16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695>
16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472>
16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695>
16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473>
16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695>
16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475>
16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696>
...
16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561>
16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967>
16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562>
16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967>
16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564>
16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968>
16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565>
16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968>
16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566>
16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968>
16:08:24
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470>
16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694>
16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471>
16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695>
16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472>
16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695>
16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473>
16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695>
16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475>
16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696>
...
16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561>
16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967>
16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562>
16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967>
16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564>
16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968>
16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565>
16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968>
16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566>
16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968>
16:08:24
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470>
16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694>
16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471>
16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695>
16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472>
16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695>
16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473>
16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695>
16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475>
16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696>
...
16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561>
16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967>
16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562>
16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967>
16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564>
16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968>
16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565>
16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968>
16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566>
16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968>
16:08:24
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470>
16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694>
16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471>
16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695>
16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472>
16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695>
16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473>
16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695>
16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475>
16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696>
...
16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561>
16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967>
16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562>
16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967>
16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564>
16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968>
16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565>
16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968>
16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566>
16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968>
16:08:24
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470>
16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694>
16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471>
16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695>
16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472>
16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695>
16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473>
16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695>
16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475>
16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696>
...
16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561>
16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967>
16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562>
16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967>
16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564>
16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968>
16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565>
16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968>
16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566>
16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968>

Статистика

Время первой команды журнала16:07:18 2007- 9-12
Время последней команды журнала16:08:24 2007- 9-12
Количество командных строк в журнале101
Процент команд с ненулевым кодом завершения, % 0.00
Процент синтаксически неверно набранных команд, % 0.00
Суммарное время работы с терминалом *, час 0.02
Количество командных строк в единицу времени, команда/мин91.82
Частота использования команд
tcpdump71|======================================================================| 70.30%
pfctl20|===================| 19.80%
vim10|=========| 9.90%
____
*) Интервалы неактивности длительностью 30 минут и более не учитываются

Справка

Для того чтобы использовать LiLaLo, не нужно знать ничего особенного: всё происходит само собой. Однако, чтобы ведение и последующее использование журналов было как можно более эффективным, желательно иметь в виду следующее:
  1. В журнал автоматически попадают все команды, данные в любом терминале системы.

  2. Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.

  3. Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
    $ l s-l
    bash: l: command not found
    

  4. Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
    $ test 5 -lt 4
    Обратите внимание на то, что код завершения команды может быть отличен от нуля не только в тех случаях, когда команда была выполнена с ошибкой. Многие команды используют код завершения, например, для того чтобы показать результаты проверки

  5. Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
    $ find / -name abc
    find: /home/devi-orig/.gnome2: Keine Berechtigung
    find: /home/devi-orig/.gnome2_private: Keine Berechtigung
    find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung
    find: /home/devi-orig/.metacity: Keine Berechtigung
    find: /home/devi-orig/.inkscape: Keine Berechtigung
    ^C
    

  6. Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
    # id
    uid=0(root) gid=0(root) Gruppen=0(root)
    

  7. Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
    $ vi ~/.bashrc
    2a3,5
    >    if [ -f /usr/local/etc/bash_completion ]; then
    >         . /usr/local/etc/bash_completion
    >        fi
    

  8. Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
    $ patch ~/.bashrc
    В данном случае изменения применяются к файлу ~/.bashrc

  9. Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.

    Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.

  10. Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.

  11. Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора

  12. Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.

  13. Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.

  14. Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:

    $ whoami
    
    user
    
    $ #^ Интересно, кто я?
    
    в журнале это будет выглядеть так:
    $ whoami
    
    user
    
    Интересно, кто я?

  15. Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:

    $ whoami
    
    user
    
    $ cat > /dev/null #^ Интересно, кто я?
    
    Программа whoami выводит имя пользователя, под которым 
    мы зарегистрировались в системе.
    -
    Она не может ответить на вопрос о нашем назначении 
    в этом мире.
    
    В журнале это будет выглядеть так:
    $ whoami
    user
    
    Интересно, кто я?
    Программа whoami выводит имя пользователя, под которым
    мы зарегистрировались в системе.

    Она не может ответить на вопрос о нашем назначении
    в этом мире.
    Для разделения нескольких абзацев между собой используйте символ "-", один в строке.

  16. Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=

  17. Содержимое файла может быть показано в журнале. Для этого его нужно вывести с помощью программы cat. Если вывод команды отметить симоволами #!, содержимое файла будет показано в журнале в специально отведённой для этого секции.
  18. Для того чтобы вставить скриншот интересующего вас окна в журнал, нужно воспользоваться командой l3shot. После того как команда вызвана, нужно с помощью мыши выбрать окно, которое должно быть в журнале.
  19. Команды в журнале расположены в хронологическом порядке. Если две команды давались одна за другой, но на разных терминалах, в журнале они будут рядом, даже если они не имеют друг к другу никакого отношения.
    1
        2
    3   
        4
    
    Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.

О программе

LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008

$Id$