03-15-2013
Bumping up posts or double posting is not permitted in these forums.
Please read the
rules, which you agreed to when you registered, if you have not already done so.
You may receive an infraction for this. If so, don't worry, just try to follow the rules more carefully. The infraction will expire in the near future
Thank You.
The UNIX and Linux Forums.
8 More Discussions You Might Find Interesting
1. Cybersecurity
Hi,
Can someone give me the clue on how to capture network traffic at gateway.
Thanx (2 Replies)
Discussion started by: kayode
2 Replies
2. Shell Programming and Scripting
Hello,
I have a Apache webserver running on RedHat. Its primary function is a proxy server for users accessing the internet. I have a transaction log that logs every transactions of every users. For users trying to access certain sites/content the transactions goes into a 302 redirect loop and... (2 Replies)
Discussion started by: bruno406
2 Replies
3. Infrastructure Monitoring
Hi all,
Got a strange one here, well not so much strange, different :-)
I need to work out if a server is particulary chatty, whether its talking / communicating heavily to a particular server, as Im planning to physically move the server to a different server, over a link. Hence the... (6 Replies)
Discussion started by: sbk1972
6 Replies
4. Shell Programming and Scripting
Hi,
On the server, we have app log files in this location /app/logs/error.log
On the same server, in a real time, we would like to replicate that into /var/ directory.
if someone has already done this, please share the script.
Thanks in advance. (4 Replies)
Discussion started by: lookinginfo
4 Replies
5. Shell Programming and Scripting
Dear experts,
I have an epoch time input file such as : -
1302451209564
1302483698948
1302485231072
1302490805383
1302519244700
1302492787481
1302505299145
1302506557022
1302532112140
1302501033105
1302511536485
1302512669550
I need the epoch time above to be converted into real... (4 Replies)
Discussion started by: aismann
4 Replies
6. Shell Programming and Scripting
Hi All Gurus,
I want to write a script (bash/ksh/csh) which will show real time network traffic ( TCP or UDP ) generated by per process/PID. For both
Linux/AIX system, as nethogs ( Linux package ) shows ?
Any suggestion is MOST welcome.
Thanks in Advance,
Amritendu Das (3 Replies)
Discussion started by: linux.amrit
3 Replies
7. Infrastructure Monitoring
If I would like to know what connection , data , traffic in a network port ( eth0 ) , what can I do ?
ps. because I always found the network is very slow , so I would like what the network port is doing .
Thanks
Login ID ust3 is currently in read-only mode for multiple infractions. Creating... (0 Replies)
Discussion started by: ust03
0 Replies
8. IP Networking
My son does homework on a school laptop. I was thinking about setting up a gateway on my home network, so that I can monitor web traffic and know if he is doing his homework without standing over his shoulder. Ideally I would like to use the Raspberry Pi Model b that I already have. However, I... (15 Replies)
Discussion started by: gandolf989
15 Replies
LEARN ABOUT OSF1
slattach
slattach(8) System Manager's Manual slattach(8)
NAME
slattach - Attaches a serial line to a network interface
SYNOPSIS
/usr/sbin/slattach [{+|-} {c|e|i}] ttyname [baudrate]
DESCRIPTION
The slattach command assigns a tty line to a network interface, allowing terminal devices to communicate across a network. The ttyname
argument is the name of any valid tty device in /dev. This can be either the full path name (for example, /dev/tty01) or the name in /dev
(for example, tty01). The optional baudrate argument is used to set the speed of the connection. The default speed is 9600 baud.
The tty line is attached to the first available network interface (sl0, sl1, already be configured with the local and remote addresses of
each end of the SLIP connection (see ifconfig(8)).
Only a person with superuser authority can attach a network interface.
To detach the interface, use the ifconfig interface_id down command after terminating the slattach process. interface_id is the name that
is shown by the netstat command.
FLAGS
Enables (+) or disables (- TCP header compression. Enables (+) or disables (- automatic TCP header compression. If enabled and the remote
system is using TCP header compression, TCP header compression is automatically enabled on the local system. If both local and remote sys-
tems have enabled this flag, TCP header compression is not used. One system must force the use of TCP header compression. Enables (+) or
disables (- ICMP traffic suppression. If enabled, ICMP traffic (like that generated by ping(8)) is not allowed to pass over the SLIP con-
nection.
When the system is booted, all flags are initially disabled. Once a flag is enabled, it remains enabled until the system is rebooted or
until another slattach command is issued with the flag disabled.
NOTES
The slattach command requires the Serial Line Internet Protocol (SLIP), which the kernel must support. If making a SLIP connection to
another Tru64 UNIX system, both systems must run slattach. If making a SLIP connection to a system not running the Tru64 UNIX operating
system, the other system must support the SLIP protocol.
EXAMPLES
To attach a tty device to a network interface, enter: /usr/sbin/slattach /dev/tty01 4800 This command attaches tty01 to a network interface
to be used by the Serial Line Internet Protocol (SLIP). The connection speed is 4800 baud.
To attach a tty device to a network interface at 19200 bits per second (bps), with TCP header compression enabled and ICMP traffic suppres-
sion disabled, enter: /usr/sbin/slattach +c -i /dev/tty01 19200
FILES
Specifies the command path Contains the slattach process ID
RELATED INFORMATION
Commands: netstat(1), ifconfig(8)
Specifications: SLIP is described in RFC1055. TCP header compression is described in RFC1144. delim off
slattach(8)