/l3/users/30-03-2008/fbsd-net/fbsd2.unix.nt/root :1 :2 :3 :4 :5 :6 :7 :8 :9 :10 :11 :12 :13 :14 :15 :16 :17 :18 :19 :20 :21 :22 :23 :24 :25 :26 :27 :28 :29 :30 :31 :32 :33 :34 :35 :36 :37 :38 :39 :40 :41 :42 :43 :44 :45 :46 :47 :48 :49 :50 :51 :52 :53 :54 :55 :56 :57 :58 :59 :60 :61 :62 :63 :64 :65 :66 :67 :68 :69 :70 :71 :72 :73 |
|
#ifconfig re2 192.168.25.129/27 delete
|
#ifconfig re1 192.168.25.126/27 delete
|
#ifconfig re1 192.168.25.126/27 delete
|
#ifconfig re1 192.168.25.126/27 delete
|
#ifconfig re1 192.168.25.126/27 delete
|
#ifconfig re1 192.168.25.126/27 delete
|
#ifconfig re1 192.168.25.126/27 delete
|
#ifconfig re1 192.168.25.126/27 delete
|
#ifconfig re1 192.168.25.126/27 delete
|
#ifconfig re1 192.168.25.126/27 delete
|
#ifconfig re2 192.168.25.129/27
|
#ifconfig re2 192.168.25.129/27
|
#ifconfig re2 192.168.25.129/27
|
#ifconfig re2 192.168.25.129/27
|
#ifconfig re2 192.168.25.129/27
|
#ifconfig re2 192.168.25.129/27
|
#ifconfig re2 192.168.25.129/27
|
#ifconfig re2 192.168.25.129/27
|
#ifconfig re2 192.168.25.129/27
|
#ifconfig re1 192.168.25.126/27
|
#ifconfig re1 192.168.25.126/27
|
#ifconfig re1 192.168.25.126/27
|
#ifconfig re1 192.168.25.126/27
|
#ifconfig re1 192.168.25.126/27
|
#ifconfig re1 192.168.25.126/27
|
#ifconfig re1 192.168.25.126/27
|
#ifconfig re1 192.168.25.126/27
|
#ifconfig re1 192.168.25.126/27
|
#netstat -rn
Routing tables Internet: Destination Gateway Flags Refs Use Netif Expire 127.0.0.1 127.0.0.1 UH 0 193 lo0 192.168.16 link#1 UC 0 0 re0 192.168.16.203 00:16:35:7d:81:ee UHLW 1 613 re0 1161 192.168.16.254 00:04:76:a1:ef:bb UHLW 1 436 re0 1175 192.168.25.96/27 link#2 UC 0 0 re1 192.168.25.128/27 link#3 UC 0 0 re2 Internet6: Destination Gateway Flags Netif Expire ::1 ::1 UHL lo0 fe80::%lo0/64 fe80::1%lo0 U lo0 fe80::1%lo0 link#5 UHL lo0 ff01:5::/32 fe80::1%lo0 UC lo0 ff02::%lo0/32 fe80::1%lo0 UC lo0 |
#netstat -rn
Routing tables Internet: Destination Gateway Flags Refs Use Netif Expire 127.0.0.1 127.0.0.1 UH 0 193 lo0 192.168.16 link#1 UC 0 0 re0 192.168.16.203 00:16:35:7d:81:ee UHLW 1 613 re0 1161 192.168.16.254 00:04:76:a1:ef:bb UHLW 1 436 re0 1175 192.168.25.96/27 link#2 UC 0 0 re1 192.168.25.128/27 link#3 UC 0 0 re2 Internet6: Destination Gateway Flags Netif Expire ::1 ::1 UHL lo0 fe80::%lo0/64 fe80::1%lo0 U lo0 fe80::1%lo0 link#5 UHL lo0 ff01:5::/32 fe80::1%lo0 UC lo0 ff02::%lo0/32 fe80::1%lo0 UC lo0 |
#netstat -rn
Routing tables Internet: Destination Gateway Flags Refs Use Netif Expire 127.0.0.1 127.0.0.1 UH 0 193 lo0 192.168.16 link#1 UC 0 0 re0 192.168.16.203 00:16:35:7d:81:ee UHLW 1 613 re0 1161 192.168.16.254 00:04:76:a1:ef:bb UHLW 1 436 re0 1175 192.168.25.96/27 link#2 UC 0 0 re1 192.168.25.128/27 link#3 UC 0 0 re2 Internet6: Destination Gateway Flags Netif Expire ::1 ::1 UHL lo0 fe80::%lo0/64 fe80::1%lo0 U lo0 fe80::1%lo0 link#5 UHL lo0 ff01:5::/32 fe80::1%lo0 UC lo0 ff02::%lo0/32 fe80::1%lo0 UC lo0 |
#netstat -rn
Routing tables Internet: Destination Gateway Flags Refs Use Netif Expire 127.0.0.1 127.0.0.1 UH 0 193 lo0 192.168.16 link#1 UC 0 0 re0 192.168.16.203 00:16:35:7d:81:ee UHLW 1 613 re0 1161 192.168.16.254 00:04:76:a1:ef:bb UHLW 1 436 re0 1175 192.168.25.96/27 link#2 UC 0 0 re1 192.168.25.128/27 link#3 UC 0 0 re2 Internet6: Destination Gateway Flags Netif Expire ::1 ::1 UHL lo0 fe80::%lo0/64 fe80::1%lo0 U lo0 fe80::1%lo0 link#5 UHL lo0 ff01:5::/32 fe80::1%lo0 UC lo0 ff02::%lo0/32 fe80::1%lo0 UC lo0 |
#netstat -rn
Routing tables Internet: Destination Gateway Flags Refs Use Netif Expire 127.0.0.1 127.0.0.1 UH 0 193 lo0 192.168.16 link#1 UC 0 0 re0 192.168.16.203 00:16:35:7d:81:ee UHLW 1 613 re0 1161 192.168.16.254 00:04:76:a1:ef:bb UHLW 1 436 re0 1175 192.168.25.96/27 link#2 UC 0 0 re1 192.168.25.128/27 link#3 UC 0 0 re2 Internet6: Destination Gateway Flags Netif Expire ::1 ::1 UHL lo0 fe80::%lo0/64 fe80::1%lo0 U lo0 fe80::1%lo0 link#5 UHL lo0 ff01:5::/32 fe80::1%lo0 UC lo0 ff02::%lo0/32 fe80::1%lo0 UC lo0 |
#netstat -rn
Routing tables Internet: Destination Gateway Flags Refs Use Netif Expire 127.0.0.1 127.0.0.1 UH 0 193 lo0 192.168.16 link#1 UC 0 0 re0 192.168.16.203 00:16:35:7d:81:ee UHLW 1 613 re0 1161 192.168.16.254 00:04:76:a1:ef:bb UHLW 1 436 re0 1175 192.168.25.96/27 link#2 UC 0 0 re1 192.168.25.128/27 link#3 UC 0 0 re2 Internet6: Destination Gateway Flags Netif Expire ::1 ::1 UHL lo0 fe80::%lo0/64 fe80::1%lo0 U lo0 fe80::1%lo0 link#5 UHL lo0 ff01:5::/32 fe80::1%lo0 UC lo0 ff02::%lo0/32 fe80::1%lo0 UC lo0 |
#netstat -rn
Routing tables Internet: Destination Gateway Flags Refs Use Netif Expire 127.0.0.1 127.0.0.1 UH 0 193 lo0 192.168.16 link#1 UC 0 0 re0 192.168.16.203 00:16:35:7d:81:ee UHLW 1 613 re0 1161 192.168.16.254 00:04:76:a1:ef:bb UHLW 1 436 re0 1175 192.168.25.96/27 link#2 UC 0 0 re1 192.168.25.128/27 link#3 UC 0 0 re2 Internet6: Destination Gateway Flags Netif Expire ::1 ::1 UHL lo0 fe80::%lo0/64 fe80::1%lo0 U lo0 fe80::1%lo0 link#5 UHL lo0 ff01:5::/32 fe80::1%lo0 UC lo0 ff02::%lo0/32 fe80::1%lo0 UC lo0 |
#netstat -rn
Routing tables Internet: Destination Gateway Flags Refs Use Netif Expire 127.0.0.1 127.0.0.1 UH 0 193 lo0 192.168.16 link#1 UC 0 0 re0 192.168.16.203 00:16:35:7d:81:ee UHLW 1 613 re0 1161 192.168.16.254 00:04:76:a1:ef:bb UHLW 1 436 re0 1175 192.168.25.96/27 link#2 UC 0 0 re1 192.168.25.128/27 link#3 UC 0 0 re2 Internet6: Destination Gateway Flags Netif Expire ::1 ::1 UHL lo0 fe80::%lo0/64 fe80::1%lo0 U lo0 fe80::1%lo0 link#5 UHL lo0 ff01:5::/32 fe80::1%lo0 UC lo0 ff02::%lo0/32 fe80::1%lo0 UC lo0 |
#netstat -rn
Routing tables Internet: Destination Gateway Flags Refs Use Netif Expire 127.0.0.1 127.0.0.1 UH 0 193 lo0 192.168.16 link#1 UC 0 0 re0 192.168.16.203 00:16:35:7d:81:ee UHLW 1 613 re0 1161 192.168.16.254 00:04:76:a1:ef:bb UHLW 1 436 re0 1175 192.168.25.96/27 link#2 UC 0 0 re1 192.168.25.128/27 link#3 UC 0 0 re2 Internet6: Destination Gateway Flags Netif Expire ::1 ::1 UHL lo0 fe80::%lo0/64 fe80::1%lo0 U lo0 fe80::1%lo0 link#5 UHL lo0 ff01:5::/32 fe80::1%lo0 UC lo0 ff02::%lo0/32 fe80::1%lo0 UC lo0 |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ^C --- 192.168.25.158 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ^C --- 192.168.25.158 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ^C --- 192.168.25.158 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ^C --- 192.168.25.158 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ^C --- 192.168.25.158 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ^C --- 192.168.25.158 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ^C --- 192.168.25.158 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ^C --- 192.168.25.158 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ^C --- 192.168.25.158 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes ^C --- 192.168.25.97 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes ^C --- 192.168.25.97 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes ^C --- 192.168.25.97 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes ^C --- 192.168.25.97 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes ^C --- 192.168.25.97 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes ^C --- 192.168.25.97 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes ^C --- 192.168.25.97 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes ^C --- 192.168.25.97 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes ^C --- 192.168.25.97 ping statistics --- 2 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes c^C --- 192.168.25.97 ping statistics --- 5 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes c^C --- 192.168.25.97 ping statistics --- 5 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes c^C --- 192.168.25.97 ping statistics --- 5 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes c^C --- 192.168.25.97 ping statistics --- 5 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes c^C --- 192.168.25.97 ping statistics --- 5 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes c^C --- 192.168.25.97 ping statistics --- 5 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes c^C --- 192.168.25.97 ping statistics --- 5 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes c^C --- 192.168.25.97 ping statistics --- 5 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.97
PING 192.168.25.97 (192.168.25.97): 56 data bytes c^C --- 192.168.25.97 ping statistics --- 5 packets transmitted, 0 packets received, 100% packet loss |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down 64 bytes from 192.168.25.158: icmp_seq=11 ttl=64 time=0.924 ms 64 bytes from 192.168.25.158: icmp_seq=12 ttl=64 time=0.387 ms 64 bytes from 192.168.25.158: icmp_seq=13 ttl=64 time=0.386 ms ^C --- 192.168.25.158 ping statistics --- 14 packets transmitted, 3 packets received, 78% packet loss round-trip min/avg/max/stddev = 0.386/0.566/0.924/0.253 ms |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down 64 bytes from 192.168.25.158: icmp_seq=11 ttl=64 time=0.924 ms 64 bytes from 192.168.25.158: icmp_seq=12 ttl=64 time=0.387 ms 64 bytes from 192.168.25.158: icmp_seq=13 ttl=64 time=0.386 ms ^C --- 192.168.25.158 ping statistics --- 14 packets transmitted, 3 packets received, 78% packet loss round-trip min/avg/max/stddev = 0.386/0.566/0.924/0.253 ms |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down 64 bytes from 192.168.25.158: icmp_seq=11 ttl=64 time=0.924 ms 64 bytes from 192.168.25.158: icmp_seq=12 ttl=64 time=0.387 ms 64 bytes from 192.168.25.158: icmp_seq=13 ttl=64 time=0.386 ms ^C --- 192.168.25.158 ping statistics --- 14 packets transmitted, 3 packets received, 78% packet loss round-trip min/avg/max/stddev = 0.386/0.566/0.924/0.253 ms |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down 64 bytes from 192.168.25.158: icmp_seq=11 ttl=64 time=0.924 ms 64 bytes from 192.168.25.158: icmp_seq=12 ttl=64 time=0.387 ms 64 bytes from 192.168.25.158: icmp_seq=13 ttl=64 time=0.386 ms ^C --- 192.168.25.158 ping statistics --- 14 packets transmitted, 3 packets received, 78% packet loss round-trip min/avg/max/stddev = 0.386/0.566/0.924/0.253 ms |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down 64 bytes from 192.168.25.158: icmp_seq=11 ttl=64 time=0.924 ms 64 bytes from 192.168.25.158: icmp_seq=12 ttl=64 time=0.387 ms 64 bytes from 192.168.25.158: icmp_seq=13 ttl=64 time=0.386 ms ^C --- 192.168.25.158 ping statistics --- 14 packets transmitted, 3 packets received, 78% packet loss round-trip min/avg/max/stddev = 0.386/0.566/0.924/0.253 ms |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down 64 bytes from 192.168.25.158: icmp_seq=11 ttl=64 time=0.924 ms 64 bytes from 192.168.25.158: icmp_seq=12 ttl=64 time=0.387 ms 64 bytes from 192.168.25.158: icmp_seq=13 ttl=64 time=0.386 ms ^C --- 192.168.25.158 ping statistics --- 14 packets transmitted, 3 packets received, 78% packet loss round-trip min/avg/max/stddev = 0.386/0.566/0.924/0.253 ms |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down 64 bytes from 192.168.25.158: icmp_seq=11 ttl=64 time=0.924 ms 64 bytes from 192.168.25.158: icmp_seq=12 ttl=64 time=0.387 ms 64 bytes from 192.168.25.158: icmp_seq=13 ttl=64 time=0.386 ms ^C --- 192.168.25.158 ping statistics --- 14 packets transmitted, 3 packets received, 78% packet loss round-trip min/avg/max/stddev = 0.386/0.566/0.924/0.253 ms |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down 64 bytes from 192.168.25.158: icmp_seq=11 ttl=64 time=0.924 ms 64 bytes from 192.168.25.158: icmp_seq=12 ttl=64 time=0.387 ms 64 bytes from 192.168.25.158: icmp_seq=13 ttl=64 time=0.386 ms ^C --- 192.168.25.158 ping statistics --- 14 packets transmitted, 3 packets received, 78% packet loss round-trip min/avg/max/stddev = 0.386/0.566/0.924/0.253 ms |
#ping 192.168.25.158
PING 192.168.25.158 (192.168.25.158): 56 data bytes ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down ping: sendto: Host is down 64 bytes from 192.168.25.158: icmp_seq=11 ttl=64 time=0.924 ms 64 bytes from 192.168.25.158: icmp_seq=12 ttl=64 time=0.387 ms 64 bytes from 192.168.25.158: icmp_seq=13 ttl=64 time=0.386 ms ^C --- 192.168.25.158 ping statistics --- 14 packets transmitted, 3 packets received, 78% packet loss round-trip min/avg/max/stddev = 0.386/0.566/0.924/0.253 ms |
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 14:42:41.775114 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 891671959:891672151(192) ack 1212302582 win 33304 <nop,nop,timestamp 138355523 23876225> 14:42:41.775315 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 192 win 32640 <nop,nop,timestamp 23876233 138355523> 14:42:43.574936 IP fbsd2.unix.nt.64180 > debian.unix.nt.domain: 29660+ PTR? 203.16.168.192.in-addr.arpa. (45) 14:42:43.575189 IP debian.unix.nt.domain > fbsd2.unix.nt.64180: 29660* 1/1/1 (111) 14:42:43.576025 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 192:512(320) ack 1 win 33304 <nop,nop,timestamp 138356524 23876233> 14:42:43.576550 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 512 win 32640 <nop,nop,timestamp 23876413 138356524> 14:42:45.374271 IP fbsd2.unix.nt.65038 > debian.unix.nt.domain: 29661+ PTR? 254.16.168.192.in-addr.arpa. (45) 14:42:45.374488 IP debian.unix.nt.domain > fbsd2.unix.nt.65038: 29661* 1/1/1 (103) ... 14:42:58.542563 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 4800:5104(304) ack 1 win 33304 <nop,nop,timestamp 138364842 23877731> 14:42:58.542802 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5104 win 32640 <nop,nop,timestamp 23877911 138364842> 14:43:00.342021 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5104:5408(304) ack 1 win 33304 <nop,nop,timestamp 138365842 23877911> 14:43:00.342200 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5408 win 32640 <nop,nop,timestamp 23878091 138365842> 14:43:02.141496 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5408:5712(304) ack 1 win 33304 <nop,nop,timestamp 138366842 23878091> 14:43:02.141676 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5712 win 32640 <nop,nop,timestamp 23878271 138366842> ^C 45 packets captured 48 packets received by filter 0 packets dropped by kernel |
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 14:42:41.775114 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 891671959:891672151(192) ack 1212302582 win 33304 <nop,nop,timestamp 138355523 23876225> 14:42:41.775315 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 192 win 32640 <nop,nop,timestamp 23876233 138355523> 14:42:43.574936 IP fbsd2.unix.nt.64180 > debian.unix.nt.domain: 29660+ PTR? 203.16.168.192.in-addr.arpa. (45) 14:42:43.575189 IP debian.unix.nt.domain > fbsd2.unix.nt.64180: 29660* 1/1/1 (111) 14:42:43.576025 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 192:512(320) ack 1 win 33304 <nop,nop,timestamp 138356524 23876233> 14:42:43.576550 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 512 win 32640 <nop,nop,timestamp 23876413 138356524> 14:42:45.374271 IP fbsd2.unix.nt.65038 > debian.unix.nt.domain: 29661+ PTR? 254.16.168.192.in-addr.arpa. (45) 14:42:45.374488 IP debian.unix.nt.domain > fbsd2.unix.nt.65038: 29661* 1/1/1 (103) ... 14:42:58.542563 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 4800:5104(304) ack 1 win 33304 <nop,nop,timestamp 138364842 23877731> 14:42:58.542802 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5104 win 32640 <nop,nop,timestamp 23877911 138364842> 14:43:00.342021 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5104:5408(304) ack 1 win 33304 <nop,nop,timestamp 138365842 23877911> 14:43:00.342200 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5408 win 32640 <nop,nop,timestamp 23878091 138365842> 14:43:02.141496 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5408:5712(304) ack 1 win 33304 <nop,nop,timestamp 138366842 23878091> 14:43:02.141676 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5712 win 32640 <nop,nop,timestamp 23878271 138366842> ^C 45 packets captured 48 packets received by filter 0 packets dropped by kernel |
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 14:42:41.775114 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 891671959:891672151(192) ack 1212302582 win 33304 <nop,nop,timestamp 138355523 23876225> 14:42:41.775315 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 192 win 32640 <nop,nop,timestamp 23876233 138355523> 14:42:43.574936 IP fbsd2.unix.nt.64180 > debian.unix.nt.domain: 29660+ PTR? 203.16.168.192.in-addr.arpa. (45) 14:42:43.575189 IP debian.unix.nt.domain > fbsd2.unix.nt.64180: 29660* 1/1/1 (111) 14:42:43.576025 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 192:512(320) ack 1 win 33304 <nop,nop,timestamp 138356524 23876233> 14:42:43.576550 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 512 win 32640 <nop,nop,timestamp 23876413 138356524> 14:42:45.374271 IP fbsd2.unix.nt.65038 > debian.unix.nt.domain: 29661+ PTR? 254.16.168.192.in-addr.arpa. (45) 14:42:45.374488 IP debian.unix.nt.domain > fbsd2.unix.nt.65038: 29661* 1/1/1 (103) ... 14:42:58.542563 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 4800:5104(304) ack 1 win 33304 <nop,nop,timestamp 138364842 23877731> 14:42:58.542802 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5104 win 32640 <nop,nop,timestamp 23877911 138364842> 14:43:00.342021 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5104:5408(304) ack 1 win 33304 <nop,nop,timestamp 138365842 23877911> 14:43:00.342200 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5408 win 32640 <nop,nop,timestamp 23878091 138365842> 14:43:02.141496 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5408:5712(304) ack 1 win 33304 <nop,nop,timestamp 138366842 23878091> 14:43:02.141676 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5712 win 32640 <nop,nop,timestamp 23878271 138366842> ^C 45 packets captured 48 packets received by filter 0 packets dropped by kernel |
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 14:42:41.775114 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 891671959:891672151(192) ack 1212302582 win 33304 <nop,nop,timestamp 138355523 23876225> 14:42:41.775315 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 192 win 32640 <nop,nop,timestamp 23876233 138355523> 14:42:43.574936 IP fbsd2.unix.nt.64180 > debian.unix.nt.domain: 29660+ PTR? 203.16.168.192.in-addr.arpa. (45) 14:42:43.575189 IP debian.unix.nt.domain > fbsd2.unix.nt.64180: 29660* 1/1/1 (111) 14:42:43.576025 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 192:512(320) ack 1 win 33304 <nop,nop,timestamp 138356524 23876233> 14:42:43.576550 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 512 win 32640 <nop,nop,timestamp 23876413 138356524> 14:42:45.374271 IP fbsd2.unix.nt.65038 > debian.unix.nt.domain: 29661+ PTR? 254.16.168.192.in-addr.arpa. (45) 14:42:45.374488 IP debian.unix.nt.domain > fbsd2.unix.nt.65038: 29661* 1/1/1 (103) ... 14:42:58.542563 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 4800:5104(304) ack 1 win 33304 <nop,nop,timestamp 138364842 23877731> 14:42:58.542802 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5104 win 32640 <nop,nop,timestamp 23877911 138364842> 14:43:00.342021 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5104:5408(304) ack 1 win 33304 <nop,nop,timestamp 138365842 23877911> 14:43:00.342200 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5408 win 32640 <nop,nop,timestamp 23878091 138365842> 14:43:02.141496 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5408:5712(304) ack 1 win 33304 <nop,nop,timestamp 138366842 23878091> 14:43:02.141676 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5712 win 32640 <nop,nop,timestamp 23878271 138366842> ^C 45 packets captured 48 packets received by filter 0 packets dropped by kernel |
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 14:42:41.775114 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 891671959:891672151(192) ack 1212302582 win 33304 <nop,nop,timestamp 138355523 23876225> 14:42:41.775315 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 192 win 32640 <nop,nop,timestamp 23876233 138355523> 14:42:43.574936 IP fbsd2.unix.nt.64180 > debian.unix.nt.domain: 29660+ PTR? 203.16.168.192.in-addr.arpa. (45) 14:42:43.575189 IP debian.unix.nt.domain > fbsd2.unix.nt.64180: 29660* 1/1/1 (111) 14:42:43.576025 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 192:512(320) ack 1 win 33304 <nop,nop,timestamp 138356524 23876233> 14:42:43.576550 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 512 win 32640 <nop,nop,timestamp 23876413 138356524> 14:42:45.374271 IP fbsd2.unix.nt.65038 > debian.unix.nt.domain: 29661+ PTR? 254.16.168.192.in-addr.arpa. (45) 14:42:45.374488 IP debian.unix.nt.domain > fbsd2.unix.nt.65038: 29661* 1/1/1 (103) ... 14:42:58.542563 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 4800:5104(304) ack 1 win 33304 <nop,nop,timestamp 138364842 23877731> 14:42:58.542802 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5104 win 32640 <nop,nop,timestamp 23877911 138364842> 14:43:00.342021 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5104:5408(304) ack 1 win 33304 <nop,nop,timestamp 138365842 23877911> 14:43:00.342200 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5408 win 32640 <nop,nop,timestamp 23878091 138365842> 14:43:02.141496 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5408:5712(304) ack 1 win 33304 <nop,nop,timestamp 138366842 23878091> 14:43:02.141676 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5712 win 32640 <nop,nop,timestamp 23878271 138366842> ^C 45 packets captured 48 packets received by filter 0 packets dropped by kernel |
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 14:42:41.775114 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 891671959:891672151(192) ack 1212302582 win 33304 <nop,nop,timestamp 138355523 23876225> 14:42:41.775315 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 192 win 32640 <nop,nop,timestamp 23876233 138355523> 14:42:43.574936 IP fbsd2.unix.nt.64180 > debian.unix.nt.domain: 29660+ PTR? 203.16.168.192.in-addr.arpa. (45) 14:42:43.575189 IP debian.unix.nt.domain > fbsd2.unix.nt.64180: 29660* 1/1/1 (111) 14:42:43.576025 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 192:512(320) ack 1 win 33304 <nop,nop,timestamp 138356524 23876233> 14:42:43.576550 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 512 win 32640 <nop,nop,timestamp 23876413 138356524> 14:42:45.374271 IP fbsd2.unix.nt.65038 > debian.unix.nt.domain: 29661+ PTR? 254.16.168.192.in-addr.arpa. (45) 14:42:45.374488 IP debian.unix.nt.domain > fbsd2.unix.nt.65038: 29661* 1/1/1 (103) ... 14:42:58.542563 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 4800:5104(304) ack 1 win 33304 <nop,nop,timestamp 138364842 23877731> 14:42:58.542802 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5104 win 32640 <nop,nop,timestamp 23877911 138364842> 14:43:00.342021 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5104:5408(304) ack 1 win 33304 <nop,nop,timestamp 138365842 23877911> 14:43:00.342200 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5408 win 32640 <nop,nop,timestamp 23878091 138365842> 14:43:02.141496 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5408:5712(304) ack 1 win 33304 <nop,nop,timestamp 138366842 23878091> 14:43:02.141676 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5712 win 32640 <nop,nop,timestamp 23878271 138366842> ^C 45 packets captured 48 packets received by filter 0 packets dropped by kernel |
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 14:42:41.775114 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 891671959:891672151(192) ack 1212302582 win 33304 <nop,nop,timestamp 138355523 23876225> 14:42:41.775315 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 192 win 32640 <nop,nop,timestamp 23876233 138355523> 14:42:43.574936 IP fbsd2.unix.nt.64180 > debian.unix.nt.domain: 29660+ PTR? 203.16.168.192.in-addr.arpa. (45) 14:42:43.575189 IP debian.unix.nt.domain > fbsd2.unix.nt.64180: 29660* 1/1/1 (111) 14:42:43.576025 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 192:512(320) ack 1 win 33304 <nop,nop,timestamp 138356524 23876233> 14:42:43.576550 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 512 win 32640 <nop,nop,timestamp 23876413 138356524> 14:42:45.374271 IP fbsd2.unix.nt.65038 > debian.unix.nt.domain: 29661+ PTR? 254.16.168.192.in-addr.arpa. (45) 14:42:45.374488 IP debian.unix.nt.domain > fbsd2.unix.nt.65038: 29661* 1/1/1 (103) ... 14:42:58.542563 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 4800:5104(304) ack 1 win 33304 <nop,nop,timestamp 138364842 23877731> 14:42:58.542802 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5104 win 32640 <nop,nop,timestamp 23877911 138364842> 14:43:00.342021 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5104:5408(304) ack 1 win 33304 <nop,nop,timestamp 138365842 23877911> 14:43:00.342200 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5408 win 32640 <nop,nop,timestamp 23878091 138365842> 14:43:02.141496 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5408:5712(304) ack 1 win 33304 <nop,nop,timestamp 138366842 23878091> 14:43:02.141676 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5712 win 32640 <nop,nop,timestamp 23878271 138366842> ^C 45 packets captured 48 packets received by filter 0 packets dropped by kernel |
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 14:42:41.775114 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 891671959:891672151(192) ack 1212302582 win 33304 <nop,nop,timestamp 138355523 23876225> 14:42:41.775315 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 192 win 32640 <nop,nop,timestamp 23876233 138355523> 14:42:43.574936 IP fbsd2.unix.nt.64180 > debian.unix.nt.domain: 29660+ PTR? 203.16.168.192.in-addr.arpa. (45) 14:42:43.575189 IP debian.unix.nt.domain > fbsd2.unix.nt.64180: 29660* 1/1/1 (111) 14:42:43.576025 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 192:512(320) ack 1 win 33304 <nop,nop,timestamp 138356524 23876233> 14:42:43.576550 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 512 win 32640 <nop,nop,timestamp 23876413 138356524> 14:42:45.374271 IP fbsd2.unix.nt.65038 > debian.unix.nt.domain: 29661+ PTR? 254.16.168.192.in-addr.arpa. (45) 14:42:45.374488 IP debian.unix.nt.domain > fbsd2.unix.nt.65038: 29661* 1/1/1 (103) ... 14:42:58.542563 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 4800:5104(304) ack 1 win 33304 <nop,nop,timestamp 138364842 23877731> 14:42:58.542802 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5104 win 32640 <nop,nop,timestamp 23877911 138364842> 14:43:00.342021 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5104:5408(304) ack 1 win 33304 <nop,nop,timestamp 138365842 23877911> 14:43:00.342200 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5408 win 32640 <nop,nop,timestamp 23878091 138365842> 14:43:02.141496 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5408:5712(304) ack 1 win 33304 <nop,nop,timestamp 138366842 23878091> 14:43:02.141676 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5712 win 32640 <nop,nop,timestamp 23878271 138366842> ^C 45 packets captured 48 packets received by filter 0 packets dropped by kernel |
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 14:42:41.775114 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 891671959:891672151(192) ack 1212302582 win 33304 <nop,nop,timestamp 138355523 23876225> 14:42:41.775315 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 192 win 32640 <nop,nop,timestamp 23876233 138355523> 14:42:43.574936 IP fbsd2.unix.nt.64180 > debian.unix.nt.domain: 29660+ PTR? 203.16.168.192.in-addr.arpa. (45) 14:42:43.575189 IP debian.unix.nt.domain > fbsd2.unix.nt.64180: 29660* 1/1/1 (111) 14:42:43.576025 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 192:512(320) ack 1 win 33304 <nop,nop,timestamp 138356524 23876233> 14:42:43.576550 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 512 win 32640 <nop,nop,timestamp 23876413 138356524> 14:42:45.374271 IP fbsd2.unix.nt.65038 > debian.unix.nt.domain: 29661+ PTR? 254.16.168.192.in-addr.arpa. (45) 14:42:45.374488 IP debian.unix.nt.domain > fbsd2.unix.nt.65038: 29661* 1/1/1 (103) ... 14:42:58.542563 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 4800:5104(304) ack 1 win 33304 <nop,nop,timestamp 138364842 23877731> 14:42:58.542802 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5104 win 32640 <nop,nop,timestamp 23877911 138364842> 14:43:00.342021 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5104:5408(304) ack 1 win 33304 <nop,nop,timestamp 138365842 23877911> 14:43:00.342200 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5408 win 32640 <nop,nop,timestamp 23878091 138365842> 14:43:02.141496 IP fbsd2.unix.nt.ssh > debian3.unix.nt.4521: P 5408:5712(304) ack 1 win 33304 <nop,nop,timestamp 138366842 23878091> 14:43:02.141676 IP debian3.unix.nt.4521 > fbsd2.unix.nt.ssh: . ack 5712 win 32640 <nop,nop,timestamp 23878271 138366842> ^C 45 packets captured 48 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i re1 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 14:56:06.495500 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 31, length 64 14:56:08.296847 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 32, length 64 14:56:10.098250 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 33, length 64 14:56:11.899463 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 34, length 64 ^C 4 packets captured 21 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i re1 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 14:56:06.495500 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 31, length 64 14:56:08.296847 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 32, length 64 14:56:10.098250 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 33, length 64 14:56:11.899463 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 34, length 64 ^C 4 packets captured 21 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i re1 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 14:56:06.495500 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 31, length 64 14:56:08.296847 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 32, length 64 14:56:10.098250 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 33, length 64 14:56:11.899463 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 34, length 64 ^C 4 packets captured 21 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i re1 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 14:56:06.495500 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 31, length 64 14:56:08.296847 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 32, length 64 14:56:10.098250 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 33, length 64 14:56:11.899463 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 34, length 64 ^C 4 packets captured 21 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i re1 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 14:56:06.495500 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 31, length 64 14:56:08.296847 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 32, length 64 14:56:10.098250 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 33, length 64 14:56:11.899463 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 34, length 64 ^C 4 packets captured 21 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i re1 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 14:56:06.495500 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 31, length 64 14:56:08.296847 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 32, length 64 14:56:10.098250 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 33, length 64 14:56:11.899463 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 34, length 64 ^C 4 packets captured 21 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i re1 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 14:56:06.495500 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 31, length 64 14:56:08.296847 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 32, length 64 14:56:10.098250 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 33, length 64 14:56:11.899463 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 34, length 64 ^C 4 packets captured 21 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i re1 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 14:56:06.495500 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 31, length 64 14:56:08.296847 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 32, length 64 14:56:10.098250 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 33, length 64 14:56:11.899463 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 34, length 64 ^C 4 packets captured 21 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i re1 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 14:56:06.495500 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 31, length 64 14:56:08.296847 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 32, length 64 14:56:10.098250 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 33, length 64 14:56:11.899463 IP 192.168.25.1 > 192.168.25.126: ICMP echo request, id 25462, seq 34, length 64 ^C 4 packets captured 21 packets received by filter 0 packets dropped by kernel |
#route add -net 192.168.25.0/27 192.168.25.97
add net 192.168.25.0: gateway 192.168.25.97 |
#route add -net 192.168.25.0/27 192.168.25.97
add net 192.168.25.0: gateway 192.168.25.97 |
#route add -net 192.168.25.0/27 192.168.25.97
add net 192.168.25.0: gateway 192.168.25.97 |
#route add -net 192.168.25.0/27 192.168.25.97
add net 192.168.25.0: gateway 192.168.25.97 |
#route add -net 192.168.25.0/27 192.168.25.97
add net 192.168.25.0: gateway 192.168.25.97 |
#route add -net 192.168.25.0/27 192.168.25.97
add net 192.168.25.0: gateway 192.168.25.97 |
#route add -net 192.168.25.0/27 192.168.25.97
add net 192.168.25.0: gateway 192.168.25.97 |
#route add -net 192.168.25.0/27 192.168.25.97
add net 192.168.25.0: gateway 192.168.25.97 |
#route add -net 192.168.25.0/27 192.168.25.97
add net 192.168.25.0: gateway 192.168.25.97 |
Время первой команды журнала | 17:32:28 2008- 3-31 | |||||||||||||||
Время последней команды журнала | 17:56:12 2008- 3-31 | |||||||||||||||
Количество командных строк в журнале | 101 | |||||||||||||||
Процент команд с ненулевым кодом завершения, % | 26.73 | |||||||||||||||
Процент синтаксически неверно набранных команд, % | 0.00 | |||||||||||||||
Суммарное время работы с терминалом *, час | 0.40 | |||||||||||||||
Количество командных строк в единицу времени, команда/мин | 4.26 | |||||||||||||||
Частота использования команд |
|
В журнал автоматически попадают все команды, данные в любом терминале системы.
Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.
Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
$ l s-l bash: l: command not found |
Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
$ test 5 -lt 4 |
Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
$ find / -name abc find: /home/devi-orig/.gnome2: Keine Berechtigung find: /home/devi-orig/.gnome2_private: Keine Berechtigung find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung find: /home/devi-orig/.metacity: Keine Berechtigung find: /home/devi-orig/.inkscape: Keine Berechtigung ^C |
Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
# id uid=0(root) gid=0(root) Gruppen=0(root) |
Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
$ vi ~/.bashrc
|
Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
$ patch ~/.bashrc |
Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.
Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.
Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.
Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора
Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.
Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.
Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:
$ whoami
user
$ #^ Интересно, кто я?в журнале это будет выглядеть так:
$ whoami
user
Интересно, кто я? |
Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:
$ whoami
user
$ cat > /dev/null #^ Интересно, кто я?
Программа whoami выводит имя пользователя, под которым мы зарегистрировались в системе. - Она не может ответить на вопрос о нашем назначении в этом мире.В журнале это будет выглядеть так:
$ whoami user
|
Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=
1 2 3 4Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.
LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008