03-14-2012
command invocation
Hello,
I've tested something like this:
tcpdump -r /tmp/out.out > /tmp/out.ra 2> /dev/null
works fine - there is no status message visible.
if I place in a bash-script this line:
$(tcpdump -r /tmp/out.out > /tmp/out.ra 2> /dev/null)
I get status information on executing
. I also tried to assign result to var - doesn't work.
1. How does 'tcpdump' knows if script or user manually typed in command?
2. How to suppress these status lines I get from tcpdump when calling from script?
thanx in advance..
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
sqlplus -s /nolog <<! set serveroutput on size 100000 @/path_of_my_script exit !
hi, i encountered the above statment in a unix script file and i have some questions, would appreciate if someone can enlighten me.
1. What is the purpose of <<! ?
2. What is the purpose of exit ? does it exit... (4 Replies)
Discussion started by: new2ss
4 Replies
2. Shell Programming and Scripting
Hi,
Had this weird issue that need expertise help.
Here is the scenario.
I have Server A (Unix) and Server B (Windows 2000). I need to invoke a script on Server B from Server A. If it was a windows to windows invocation, I could have done it with WMI. How do I go about it from Unix to... (4 Replies)
Discussion started by: hollysmoke
4 Replies
3. Solaris
i have an issue where it appears i'm running version 3.24 of xscreensaver but when the screensaver actually activates it shows version 4.12 on the xscreensaver unlock/lock screen. the node is running solaris 8 which is connected to a server running irix. the node has no .xscreensaver in any of the... (1 Reply)
Discussion started by: nixwins
1 Replies
4. AIX
Hi all,
I'm trying to do JVM invocation from C++ in AIX 6.1. So inorder to do that, i'm loading libjvm.a.
When i load the libjvm.a from the path where jre is installed (i.e /usr/java5/jre/bin/classic), it loads correctly and the program works correctly.
But according to my requirement, the... (0 Replies)
Discussion started by: d_ccc
0 Replies
5. Red Hat
Hello sir,
I am using VNC package for invoking the remote desktop to and from a FEDORA 8 machine and a WINDOWS XP machine. I have downloaded the VNC for both OSs and run it successfully.
1)When I invoked WINDOWS XP server, the I got it successfully as :-... (0 Replies)
Discussion started by: nsharath
0 Replies
6. Shell Programming and Scripting
Hello,
I am trying to learn how to pass something more than a one-command startup for gnome-terminal.
I will give an example of what I'm trying to do here:
#! /bin/bash
#
#TODO write this for gnome and xterm
USAGE="
______________________________________________
${0##*/}
run... (0 Replies)
Discussion started by: Narnie
0 Replies
7. Shell Programming and Scripting
Dear All,
I have a directory when i received files by means of FTP, i want to invoke my shell scripts as soon as file hit the directory, if the files hit 10 times then the shell scripts should also get executed 10 times.
thanks
rajesh (1 Reply)
Discussion started by: guddu_12
1 Replies
8. Shell Programming and Scripting
It looks like if matching and deleting the last line confuses 'sed' so it does not recognize '$' address. Consider:
sed -e '/^3/d' -e '$ a text'
supposed to delete a line starting with '3' and then append 'text' after the last line of input. But, if it is the last line of input which starts... (2 Replies)
Discussion started by: msz59
2 Replies
ENC(4) BSD Kernel Interfaces Manual ENC(4)
NAME
enc -- Encapsulating Interface
SYNOPSIS
To compile this driver into the kernel, place the following line in your kernel configuration file:
device enc
DESCRIPTION
The enc interface is a software loopback mechanism that allows hosts or firewalls to filter ipsec(4) traffic using any firewall package that
hooks in via the pfil(9) framework.
The enc interface allows an administrator to see incoming and outgoing packets before and after they will be or have been processed by
ipsec(4) via tcpdump(1).
The ``enc0'' interface inherits all IPsec traffic. Thus all IPsec traffic can be filtered based on ``enc0'', and all IPsec traffic could be
seen by invoking tcpdump(1) on the ``enc0'' interface.
What can be seen with tcpdump(1) and what will be passed on to the firewalls via the pfil(9) framework can be independently controlled using
the following sysctl(8) variables:
Name Defaults Suggested
net.enc.out.ipsec_bpf_mask 0x00000003 0x00000001
net.enc.out.ipsec_filter_mask 0x00000001 0x00000001
net.enc.in.ipsec_bpf_mask 0x00000001 0x00000002
net.enc.in.ipsec_filter_mask 0x00000001 0x00000002
For the incoming path a value of 0x1 means ``before stripping off the outer header'' and 0x2 means ``after stripping off the outer header''.
For the outgoing path 0x1 means ``with only the inner header'' and 0x2 means ``with outer and inner headers''.
incoming path |------|
---- IPsec processing ---- (before) ---- (after) ----> | |
| Host |
<--- IPsec processing ---- (after) ----- (before) ---- | |
outgoing path |------|
Most people will want to run with the suggested defaults for ipsec_filter_mask and rely on the security policy database for the outer head-
ers.
EXAMPLES
To see the packets the processed via ipsec(4), adjust the sysctl(8) variables according to your need and run:
tcpdump -i enc0
SEE ALSO
tcpdump(1), bpf(4), ipf(4), ipfw(4), ipsec(4), pf(4), tcpdump(8)
BSD
November 28, 2007 BSD