/l3/users/10-09-2007/nt-bsdnet/fbsd3.unix.nt/root :1 :2 :3 :4 :5 :6 :7 :8 :9 :10 :11 :12 :13 :14 :15 :16 :17 :18 :19 :20 :21 :22 :23 :24 :25 :26 :27 :28 :29 :30 :31 :32 :33 :34 :35 :36 |
|
#vim frw.conf
7c7 < nat on $ext_if from $net to any -> ($ext_if) --- > nat pass on $ext_if from $net to any -> ($ext_if) |
#vim frw.conf
7c7 < nat on $ext_if from $net to any -> ($ext_if) --- > nat pass on $ext_if from $net to any -> ($ext_if) |
#vim frw.conf
7c7 < nat on $ext_if from $net to any -> ($ext_if) --- > nat pass on $ext_if from $net to any -> ($ext_if) |
#vim frw.conf
7c7 < nat on $ext_if from $net to any -> ($ext_if) --- > nat pass on $ext_if from $net to any -> ($ext_if) |
#vim frw.conf
7c7 < nat on $ext_if from $net to any -> ($ext_if) --- > nat pass on $ext_if from $net to any -> ($ext_if) |
#vim frw.conf
7c7 < nat on $ext_if from $net to any -> ($ext_if) --- > nat pass on $ext_if from $net to any -> ($ext_if) |
#vim frw.conf
7c7 < nat on $ext_if from $net to any -> ($ext_if) --- > nat pass on $ext_if from $net to any -> ($ext_if) |
#vim frw.conf
7c7 < nat on $ext_if from $net to any -> ($ext_if) --- > nat pass on $ext_if from $net to any -> ($ext_if) |
#vim frw.conf
7c7 < nat on $ext_if from $net to any -> ($ext_if) --- > nat pass on $ext_if from $net to any -> ($ext_if) |
#vim frw.conf
7c7 < nat on $ext_if from $net to any -> ($ext_if) --- > nat pass on $ext_if from $net to any -> ($ext_if) |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#pfctl -v -f frw.conf
No ALTQ support in kernel ALTQ related functions disabled table <allowed> const file "/etc/myfriends" int_if = "xl0" ext_if = "em0" net = "192.168.30.0/24" nat pass on em0 inet from 192.168.30.0/24 to any -> (em0) round-robin block drop in all block drop out all pass out quick on em0 proto icmp from any to <allowed> keep state pass in quick on em0 proto icmp from <allowed> to any keep state pass out quick on em0 inet proto udp from 192.168.15.237 to any port = domain keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = http keep state pass in quick on em0 inet proto tcp from <allowed> to 192.168.15.237 port = ssh keep state pass out quick on em0 inet proto tcp from 192.168.15.237 to any port = ssh keep state pass out quick on xl0 proto icmp all keep state pass in quick on xl0 proto icmp all keep state |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0 -p icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 7 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470> 16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694> 16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471> 16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695> 16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472> 16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695> 16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473> 16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695> 16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475> 16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696> ... 16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561> 16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967> 16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562> 16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967> 16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564> 16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968> 16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565> 16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968> 16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566> 16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968> |
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470> 16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694> 16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471> 16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695> 16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472> 16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695> 16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473> 16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695> 16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475> 16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696> ... 16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561> 16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967> 16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562> 16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967> 16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564> 16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968> 16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565> 16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968> 16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566> 16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968> |
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470> 16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694> 16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471> 16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695> 16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472> 16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695> 16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473> 16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695> 16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475> 16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696> ... 16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561> 16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967> 16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562> 16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967> 16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564> 16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968> 16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565> 16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968> 16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566> 16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968> |
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470> 16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694> 16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471> 16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695> 16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472> 16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695> 16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473> 16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695> 16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475> 16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696> ... 16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561> 16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967> 16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562> 16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967> 16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564> 16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968> 16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565> 16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968> 16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566> 16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968> |
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470> 16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694> 16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471> 16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695> 16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472> 16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695> 16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473> 16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695> 16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475> 16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696> ... 16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561> 16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967> 16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562> 16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967> 16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564> 16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968> 16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565> 16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968> 16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566> 16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968> |
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470> 16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694> 16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471> 16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695> 16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472> 16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695> 16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473> 16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695> 16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475> 16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696> ... 16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561> 16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967> 16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562> 16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967> 16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564> 16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968> 16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565> 16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968> 16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566> 16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968> |
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470> 16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694> 16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471> 16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695> 16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472> 16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695> 16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473> 16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695> 16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475> 16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696> ... 16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561> 16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967> 16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562> 16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967> 16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564> 16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968> 16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565> 16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968> 16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566> 16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968> |
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470> 16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694> 16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471> 16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695> 16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472> 16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695> 16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473> 16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695> 16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475> 16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696> ... 16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561> 16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967> 16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562> 16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967> 16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564> 16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968> 16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565> 16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968> 16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566> 16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968> |
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470> 16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694> 16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471> 16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695> 16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472> 16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695> 16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473> 16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695> 16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475> 16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696> ... 16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561> 16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967> 16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562> 16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967> 16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564> 16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968> 16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565> 16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968> 16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566> 16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968> |
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470> 16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694> 16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471> 16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695> 16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472> 16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695> 16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473> 16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695> 16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475> 16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696> ... 16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561> 16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967> 16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562> 16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967> 16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564> 16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968> 16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565> 16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968> 16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566> 16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968> |
#tcpdump -n -i em0
16:08:31.804871 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20096 win 501 <nop,nop,timestamp 37530694 25459470> 16:08:31.805779 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20096:20256(160) ack 1 win 33304 <nop,nop,timestamp 25459471 37530694> 16:08:31.806499 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20256 win 501 <nop,nop,timestamp 37530695 25459471> 16:08:31.807017 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20256:20432(176) ack 1 win 33304 <nop,nop,timestamp 25459472 37530695> 16:08:31.807374 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20432 win 501 <nop,nop,timestamp 37530695 25459472> 16:08:31.808226 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20432:20592(160) ack 1 win 33304 <nop,nop,timestamp 25459473 37530695> 16:08:31.808490 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20592 win 501 <nop,nop,timestamp 37530695 25459473> 16:08:31.809438 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20592:20768(176) ack 1 win 33304 <nop,nop,timestamp 25459475 37530695> 16:08:31.809742 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 20768 win 501 <nop,nop,timestamp 37530696 25459475> 16:08:31.810681 IP 192.168.15.237.22 > 192.168.15.180.55096: P 20768:20928(160) ack 1 win 33304 <nop,nop,timestamp 25459476 37530696> ... 16:08:32.896055 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 32864 win 501 <nop,nop,timestamp 37530967 25460561> 16:08:32.897022 IP 192.168.15.237.22 > 192.168.15.180.55096: P 32864:33024(160) ack 49 win 33304 <nop,nop,timestamp 25460562 37530967> 16:08:32.897432 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33024 win 501 <nop,nop,timestamp 37530967 25460562> 16:08:32.898818 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33024:33200(176) ack 49 win 33304 <nop,nop,timestamp 25460564 37530967> 16:08:32.899307 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33200 win 501 <nop,nop,timestamp 37530968 25460564> 16:08:32.899877 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33200:33360(160) ack 49 win 33304 <nop,nop,timestamp 25460565 37530968> 16:08:32.900310 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33360 win 501 <nop,nop,timestamp 37530968 25460565> 16:08:32.901108 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33360:33536(176) ack 49 win 33304 <nop,nop,timestamp 25460566 37530968> 16:08:32.901427 IP 192.168.15.180.55096 > 192.168.15.237.22: . ack 33536 win 501 <nop,nop,timestamp 37530968 25460566> 16:08:32.902381 IP 192.168.15.237.22 > 192.168.15.180.55096: P 33536:33696(160) ack 49 win 33304 <nop,nop,timestamp 25460568 37530968> |
Время первой команды журнала | 16:07:18 2007- 9-12 | |||||||||
Время последней команды журнала | 16:08:24 2007- 9-12 | |||||||||
Количество командных строк в журнале | 101 | |||||||||
Процент команд с ненулевым кодом завершения, % | 0.00 | |||||||||
Процент синтаксически неверно набранных команд, % | 0.00 | |||||||||
Суммарное время работы с терминалом *, час | 0.02 | |||||||||
Количество командных строк в единицу времени, команда/мин | 91.82 | |||||||||
Частота использования команд |
|
В журнал автоматически попадают все команды, данные в любом терминале системы.
Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.
Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
$ l s-l bash: l: command not found |
Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
$ test 5 -lt 4 |
Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
$ find / -name abc find: /home/devi-orig/.gnome2: Keine Berechtigung find: /home/devi-orig/.gnome2_private: Keine Berechtigung find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung find: /home/devi-orig/.metacity: Keine Berechtigung find: /home/devi-orig/.inkscape: Keine Berechtigung ^C |
Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
# id uid=0(root) gid=0(root) Gruppen=0(root) |
Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
$ vi ~/.bashrc
|
Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
$ patch ~/.bashrc |
Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.
Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.
Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.
Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора
Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.
Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.
Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:
$ whoami
user
$ #^ Интересно, кто я?в журнале это будет выглядеть так:
$ whoami
user
Интересно, кто я? |
Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:
$ whoami
user
$ cat > /dev/null #^ Интересно, кто я?
Программа whoami выводит имя пользователя, под которым мы зарегистрировались в системе. - Она не может ответить на вопрос о нашем назначении в этом мире.В журнале это будет выглядеть так:
$ whoami user
|
Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=
1 2 3 4Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.
LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008