Sponsored Content
Operating Systems Solaris MAC spoofing a virtual NIC on Solaris 5.0 Post 302457998 by bartus11 on Wednesday 29th of September 2010 09:46:06 AM
Old 09-29-2010
It will not work. MAC address on logical interface (hte0:1, hte0:2 ...) is always the same as MAC address on physical interface on which it is created.
This User Gave Thanks to bartus11 For This Post:
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Changing MAC address of a NIC

All, I have a need to software change the MAC address of a NIC in a Sparc Ultra 10 - I believe there is a command that allows to do this at boot up? Is it a missing (to me) part of ifconfig ? If so, what is the syntax? All replies gratefully received ! Thanks Andrew (3 Replies)
Discussion started by: wretch
3 Replies

2. IP Networking

Binding Virtual IP address to NIC

Hi, I bound a virtual IP to a network card on my E450 server and I am getting this error when I reboot the server, saying, " retrying host, RPC time out. I had to break this sequence and allow other services to load. Of course they didn't load properly. Please how can I sort this out? I do need... (8 Replies)
Discussion started by: Ronny
8 Replies

3. Solaris

How to check Virtual NIC card speed on solaris

Hi, We have a 4 port Sun gigaswift NIC card on our sun fire server. If the card is a physical one I know how to check the settings/speed. But since this is a virtual card with 4 ports , I am not sure as how we can check the settings. Details ----------- root:/> ifconfig -a lo0:... (3 Replies)
Discussion started by: pray44u
3 Replies

4. HP-UX

how can I determine which NIC card is virtual NIC Card

how can I determine which NIC card is virtual NIC Card which condition can make a decision Does HP UX have Virtual Network Adapter Concept if ,it has where I can Find if I Install Virutal Network Adapter or which command that i can get it or which software can generate thanks (2 Replies)
Discussion started by: alert0919
2 Replies

5. Cybersecurity

MAC Address spoofing

There is a question in the SCO section asking for information on how to change the MAC address of a NIC. Is there a valid reason for wanting to change the MAC address? (1 Reply)
Discussion started by: jgt
1 Replies

6. Solaris

create Virtual NIC in Solaris 10

Hi All, does any body know how to create Virtual NIC in Solaris 10 if any one have good article or reference kindly provide me i try to Google but i didn't find good one (7 Replies)
Discussion started by: jamisux
7 Replies

7. OS X (Apple)

ethernet mac spoofing

I tried to use the command sudo ifconfig en0 ether xx:xx:xx:xx:xx:xx to do mac spoofing for internet connection in my office. It works only for 5 minutes. Every time after about 5mins, the Internet will be disconnected. :wall: Any one knows how to solve this problem? Thanks. (6 Replies)
Discussion started by: andrewust
6 Replies

8. Solaris

x86 Solaris 10 nic driver added but not attached. NIC is not detected.

I couldn't install my nic in solaris 10. I compiled and added the driver but failed to attach the driver and ifconfig output shows only loopback dev. Please see the following output and tell me whether my nic has been detected and why the driver failed to attach? My nic is detected in linux... (0 Replies)
Discussion started by: vectrum
0 Replies

9. Solaris

Change hostID of Solaris 10 virtual/guest machine installed by Virtual Box 4.1.12 on Windows-XP host

Trying to set or modify the randomly set hostID of a Solaris 10 virtual/guest machine that I installed on a Windows-XP host machine (using Virtual Box 4.1.12). I was able to set/modify the hostname of the Solaris 10 virtual/guest machine during installation as well as via the Virtual Box... (4 Replies)
Discussion started by: Matt_VB
4 Replies

10. Red Hat

creating virtual nic permenant

am try to create another network card as virtual eth0:1 but when i restart the server it want be appear i have to create it again what is the solution for this . (6 Replies)
Discussion started by: leganti
6 Replies
ARPWATCH(8)						      System Manager's Manual						       ARPWATCH(8)

NAME
arpwatch - keep track of ethernet/ip address pairings SYNOPSIS
arpwatch [ -dN ] [ -f datafile ] [ -i interface ] [ -n net[/width ]] [ -r file ] [ -u username ] [ -e username ] [ -s username ] DESCRIPTION
Arpwatch keeps track for MAC/IP address pairings. It syslogs activity and reports certain changes via email. Arpwatch uses pcap(3) to lis- ten for arp packets on a local ethernet/tokenring/fddi interface. The -d flag is used enable debugging. This also inhibits forking into the background and emailing the reports. Instead, they are sent to stderr. The -f flag is used to set the MAC/IP address database filename. The default is arp.dat. The -i flag is used to override the default interface. The -n flag specifies additional local networks. This can be useful to avoid "bogon" warnings when there is more than one network running on the same wire. If the optional width is not specified, the default netmask for the network's class is used. The -N flag disables reporting any bogons. The -r flag is used to specify a savefile (perhaps created by tcpdump(1) or pcapture(1)) to read from instead of reading from the network. In this case, arpwatch does not fork. If -u flag is used, arpwatch drops root privileges and changes user ID to username and group ID to that of the primary group of username. This is recommended for security reasons. If the -e flag is used, arpwatch sends e-mail messages to username rather than the default (root). If a single `-' character is given for the username, sending of e-mail is suppressed, but logging via syslog is still done as usual. (This can be useful during initial runs, to collect data without being flooded with messages about new stations.) If the -s flag is used, arpwatch sends e-mail messages with username as the return address, rather than the default (root). Note that an empty arp.dat file must be created before the first time you run arpwatch. Also, the default directory (where arp.dat is stored) must be owned by username if -u flag is used. REPORT MESSAGES
Here's a quick list of the report messages generated by arpwatch(1) (and arpsnmp(1)): new activity This MAC/IP address pair has been used for the first time six months or more. new station The MAC address has not been seen before. flip flop The MAC address has changed from the most recently seen address to the second most recently seen address. (If either the old or new MAC address is a DECnet address and it is less than 24 hours, the email version of the report is suppressed.) changed MAC address The host switched to a new MAC address. SYSLOG MESSAGES
Here are some of the syslog messages; note that messages that are reported are also sysloged. MAC broadcast The MAC address of the host is a broadcast address. ip broadcast The ip address of the host is a broadcast address. bogon The source ip address is not local to the local subnet. MAC broadcast The source MAC address was all ones or all zeros. MAC mismatch The source MAC address didn't match the address inside the arp packet. reused old MAC address The MAC address has changed from the most recently seen address to the third (or greater) least recently seen address. (This is similar to a flip flop.) suppressed DECnet flip flop A "flip flop" report was suppressed because one of the two addresses was a DECnet address. FILES
/usr/operator/arpwatch - default directory arp.dat - MAC/IP address database ethercodes.dat - vendor ethernet block list SEE ALSO
arpsnmp(8), arp(8), bpf(4), tcpdump(1), pcapture(1), pcap(3) AUTHORS
Craig Leres of the Lawrence Berkeley National Laboratory Network Research Group, University of California, Berkeley, CA. The current version is available via anonymous ftp: ftp://ftp.ee.lbl.gov/arpwatch.tar.gz BUGS
Please send bug reports to arpwatch@ee.lbl.gov. Attempts are made to suppress DECnet flip flops but they aren't always successful. Most error messages are posted using syslog. 4th Berkeley Distribution 8 October 2000 ARPWATCH(8)
All times are GMT -4. The time now is 11:07 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy