Sponsored Content
Full Discussion: TCP/IP Inerface
Operating Systems AIX TCP/IP Inerface Post 302175052 by srllee on Thursday 13th of March 2008 12:05:32 AM
Old 03-13-2008
TCP/IP Inerface

Hi,

Is there anyway to bring down ethernet interface using non-root ID?

Appreciate if you could advice how to do that using non-root ID and what are previleges required in order to perform the tasks.

Thanks
 

10 More Discussions You Might Find Interesting

1. Cybersecurity

Tcp/ip

!HELLO , What is the maximum number of hosts on a TCP/IP internet? plz can u help me. :rolleyes: (2 Replies)
Discussion started by: smdakram
2 Replies

2. UNIX for Advanced & Expert Users

Tcp wrapper

I installed tcp wrappers version 7.6 and modify my inetd.conf file from ftp stream tcp6 nowait root /usr/sbin/in.ftpd in.ftpd to ftp stream tcp6 nowait root /usr/local/bin/tcpd /usr/sbin/in.ftpd -l created /etc/hosts.allow file and modify it... (19 Replies)
Discussion started by: hassan2
19 Replies

3. IP Networking

X.25 to TCP/IP conversion

Hello , I need to convert X.25 packets to IP packets how should i proceed .......... Please help me , regarding this matter or atleast suggest me some material which can be read regarding this . Bye (2 Replies)
Discussion started by: manjunath
2 Replies

4. IP Networking

Tcp\ip

I have written a TCP/IP client and server program. The client sends a message to the server and then the server sends a file back to the client. The client reads the buffer and stores it another file in the client side. I need to know what are the various exceptions that I need to handle in... (0 Replies)
Discussion started by: Rajeshsu
0 Replies

5. UNIX for Advanced & Expert Users

about TCP connection

Hi Experts, need help about release or refresh TCP Connection: i have the sample like below : application log connection: 0500 ( 192.168.0.1:36053) 00919 2007/05/10 23:30:25 112 13 2007/05/10 23:30:25 1969/12/31 17:00:00 0500 ( 192.168.0.1:36054) 00920 2007/05/10 23:30:26 000 00... (3 Replies)
Discussion started by: bucci
3 Replies

6. Shell Programming and Scripting

TCP/IP Source

can u tell me from where do i get TCP/IP Source code plz. (2 Replies)
Discussion started by: pradeep83rawat
2 Replies

7. Programming

Help with TCP Options in C

Hello everybody, It's me again, i need your help! I was almost finishing a program when it crashed, because of TCP segments with the TCP Options enabled. I am able to control every field of every packet i receive, except of those using TCP Options. Is there a way to determine if a packet is... (0 Replies)
Discussion started by: Zykl0n-B
0 Replies

8. Programming

SSL over TCP/IP

I am trying to develop a c++ application which will communicate with client through SSL(Not https).We are using self-signed certificates. I have installed openssl and boost library. I have tried some boost sample code also and its working. Boost C++ Libraries -... (2 Replies)
Discussion started by: johnbach
2 Replies

9. IP Networking

TCP/IP troubleshooting

Hello all, Can somebody please tell what is the best book out there that can help me learn TCP troubleshooting and understaning the TCP options like window scaling, large receive offload? I would like to understand how all the TCP tuning parameters function. Is there a book out there that can... (4 Replies)
Discussion started by: Pouchie1
4 Replies

10. Solaris

Too much TCP retransmitted and TCP duplicate on server Oracle Solaris 10

I have problem with oracle solaris 10 running on oracle sparc T4-2 server. Os information: 5.10 Generic_150400-03 sun4v sparc sun4v Output from tcpstat.d script TCP bytes: out outRetrans in inDup inUnorder 6833763 7300 98884 0... (2 Replies)
Discussion started by: insatiable1610
2 Replies
ARPWATCH(8)						      System Manager's Manual						       ARPWATCH(8)

NAME
arpwatch - keep track of ethernet/ip address pairings SYNOPSIS
arpwatch [ -dN ] [ -f datafile ] [ -i interface ] [ -n net[/width ]] [ -r file ] [ -u username ] [ -e username ] [ -s username ] DESCRIPTION
Arpwatch keeps track for ethernet/ip address pairings. It syslogs activity and reports certain changes via email. Arpwatch uses pcap(3) to listen for arp packets on a local ethernet interface. The -d flag is used enable debugging. This also inhibits forking into the background and emailing the reports. Instead, they are sent to stderr. The -f flag is used to set the ethernet/ip address database filename. The default is arp.dat. The -i flag is used to override the default interface. The -n flag specifies additional local networks. This can be useful to avoid "bogon" warnings when there is more than one network running on the same wire. If the optional width is not specified, the default netmask for the network's class is used. The -N flag disables reporting any bogons. The -r flag is used to specify a savefile (perhaps created by tcpdump(1) or pcapture(1)) to read from instead of reading from the network. In this case, arpwatch does not fork. If -u flag is used, arpwatch drops root privileges and changes user ID to username and group ID to that of the primary group of username. This is recommended for security reasons. If the -e flag is used, arpwatch sends e-mail messages to username rather than the default (root). If a single `-' character is given for the username, sending of e-mail is suppressed, but logging via syslog is still done as usual. (This can be useful during initial runs, to collect data without being flooded with messages about new stations.) If the -s flag is used, arpwatch sends e-mail messages with username as the return address, rather than the default (root). Note that an empty arp.dat file must be created before the first time you run arpwatch. Also, the default directory (where arp.dat is stored) must be owned by username if -u flag is used. REPORT MESSAGES
Here's a quick list of the report messages generated by arpwatch(1) (and arpsnmp(1)): new activity This ethernet/ip address pair has been used for the first time six months or more. new station The ethernet address has not been seen before. flip flop The ethernet address has changed from the most recently seen address to the second most recently seen address. (If either the old or new ethernet address is a DECnet address and it is less than 24 hours, the email version of the report is suppressed.) changed ethernet address The host switched to a new ethernet address. SYSLOG MESSAGES
Here are some of the syslog messages; note that messages that are reported are also sysloged. ethernet broadcast The mac ethernet address of the host is a broadcast address. ip broadcast The ip address of the host is a broadcast address. bogon The source ip address is not local to the local subnet. ethernet broadcast The source mac or arp ethernet address was all ones or all zeros. ethernet mismatch The source mac ethernet address didn't match the address inside the arp packet. reused old ethernet address The ethernet address has changed from the most recently seen address to the third (or greater) least recently seen address. (This is similar to a flip flop.) suppressed DECnet flip flop A "flip flop" report was suppressed because one of the two addresses was a DECnet address. FILES
/usr/operator/arpwatch - default directory arp.dat - ethernet/ip address database ethercodes.dat - vendor ethernet block list SEE ALSO
arpsnmp(8), arp(8), bpf(4), tcpdump(1), pcapture(1), pcap(3) AUTHORS
Craig Leres of the Lawrence Berkeley National Laboratory Network Research Group, University of California, Berkeley, CA. The current version is available via anonymous ftp: ftp://ftp.ee.lbl.gov/arpwatch.tar.gz BUGS
Please send bug reports to arpwatch@ee.lbl.gov. Attempts are made to suppress DECnet flip flops but they aren't always successful. Most error messages are posted using syslog. 4th Berkeley Distribution 8 October 2000 ARPWATCH(8)
All times are GMT -4. The time now is 04:32 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy