01-21-2015
Something is, though. That's what "promiscuous mode" means, it will receive packets to any destination. Things like wireshark and tcpdump use it to monitor the connection.
What programs / services are you running? You need to find what is putting it into that mode. Whatever it is, is what I suspect is messing up your connection.
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
How would you convert lets say a 1000 minutes to hours, minutes, seconds (1 Reply)
Discussion started by: Vozx
1 Replies
2. Shell Programming and Scripting
I have to check for a directory content: every time it is filled with a file, I have to launch a bash script.
So: how to do an ls every 5 minutes (avoiding cron), telling the script to start if the file has appeared in the dir?
Have you got better ideas?
Thanks in advance! (5 Replies)
Discussion started by: canduc17
5 Replies
3. Solaris
Dear all,
I am a newbie in solaris and I need your advice.
I have a Solaris version 5.9 installed on Sunfire V240.
I am able to ssh the machine from putty remotely.
My problem is that I cannot see the display from KVM switch I have connected to it. I need also to be able to see the GUI... (2 Replies)
Discussion started by: mbouster
2 Replies
4. SCO
Hi all
I have installed a demo version of SCO OpenServer 5.0.2, I finally found it is Desktop Interface, I would like to know how to change its interface to dos based interface?
If you have any ideas, please tell me then. Thank you (2 Replies)
Discussion started by: TinhNhi
2 Replies
5. IP Networking
This is my situation
DOS pc serial cable (sl0) Linux Pc eth1
192.168.0.10 <-------------------->192.168.0.2 <------------>192.168.0.1 (router)
I connected the linux pc and the dos pc with a SLIP (serial line internet protocol), so they can communicate in the sl0 interface.
... (3 Replies)
Discussion started by: mghis
3 Replies
6. UNIX for Dummies Questions & Answers
I have a RHEL 5 system with a bonded interface configure using only one network port (eth0). So I have config file for ifcfg-bond0 and ifcfg-eth. I'd like to configure eth5 to be the second SLAVE in the bond. My question is, after I modify ifcfg-eth5, can I add eth5 to the bond0 interface without... (1 Reply)
Discussion started by: westmoreland
1 Replies
7. UNIX for Beginners Questions & Answers
Hi, please help with below time conversion to minutes.
one column values:
2 minutes 16 seconds 420 msec
43 seconds 750 msec
0 days 3 hours 29 minutes 58 seconds 480 msec
11 seconds 150 msec
I need output in minutes(total elapsed time in minutes) (2 Replies)
Discussion started by: ramu.badugula
2 Replies
8. Shell Programming and Scripting
Hi all,
System Ubuntu 16.04.3 LTS
i have the following log
INFO 2019-02-07 15:13:31,099 module.py:700] default: "POST /join/8550614e-3e94-4fa5-9ab2-135eefa69c1b HTTP/1.0" 500 2042
INFO 2019-02-07 15:13:31,569 module.py:700] default: "POST /join/6cb9c452-dcb1-45f3-bcca-e33f5d450105... (15 Replies)
Discussion started by: charli1
15 Replies
9. Shell Programming and Scripting
Hello all,
Info:
System RedHat 7.5
I need to create a script that based on the creation time,
if the file is older then 5 minutes then execute some stuff, if not exit.
I thought to get the creation time and minutes like this.
CreationTime=$(stat -c %y /tmp/test.log | awk -F" " '{ print... (3 Replies)
Discussion started by: charli1
3 Replies
LEARN ABOUT SUSE
capinfos
CAPINFOS(1) The Wireshark Network Analyzer CAPINFOS(1)
NAME
capinfos - Prints information about capture files
SYNOPSIS
capinfos [ -t ] [ -E ] [ -c ] [ -s ] [ -d ] [ -u ] [ -a ] [ -e ] [ -y ] [ -i ] [ -z ] [ -x ] [ -h ] <infile> ...
DESCRIPTION
Capinfos is a program that reads one or more capture files and returns some or all available statistics of each <infile>.
The user specifies which statistics to report by specifying flags corresponding to the statistic. If no flags are specified, Capinfos will
report all statistics available.
Capinfos is able to detect and read the same capture files that are supported by Wireshark. The input files don't need a specific filename
extension; the file format and an optional gzip compression will be automatically detected. Near the beginning of the DESCRIPTION section
of wireshark(1) or http://www.wireshark.org/docs/man-pages/wireshark.html <http://www.wireshark.org/docs/man-pages/wireshark.html> is a
detailed description of the way Wireshark handles this, which is the same way Capinfos handles this.
OPTIONS
-t Displays the capture type of the capture file.
-E Displays the per-file encapsulation of the capture file.
-c Counts the number of packets in the capture file.
-s Displays the size of the file, in bytes. This reports the size of the capture file itself.
-d Displays the total length of all packets in the file, in bytes. This counts the size of the packets as they appeared in their original
form, not as they appear in this file. For example, if a packet was originally 1514 bytes and only 256 of those bytes were saved to
the capture file (if packets were captured with a snaplen or other slicing option), Capinfos will consider the packet to have been 1514
bytes.
-u Displays the capture duration, in seconds. This is the difference in time between the earliest packet seen and latest packet seen.
-a Displays the start time of the capture. Capinfos considers the earliest timestamp seen to be the start time, so the first packet in
the capture is not necessarily the earliest - if packets exist "out-of-order", time-wise, in the capture, Capinfos detects this.
-e Displays the end time of the capture. Capinfos considers the latest timestamp seen to be the end time, so the last packet in the
capture is not necessarily the latest - if packets exist "out-of-order", time-wise, in the capture, Capinfos detects this.
-y Displays the average data rate, in bytes/sec
-i Displays the average data rate, in bits/sec
-z displays the average packet size, in bytes
-x displays the average packet rate, in packets/sec
-h Prints the help listing and exits.
SEE ALSO
tcpdump(8), pcap(3), wireshark(1), mergecap(1), editcap(1), tshark(1), dumpcap(1)
NOTES
Capinfos is part of the Wireshark distribution. The latest version of Wireshark can be found at <http://www.wireshark.org>.
HTML versions of the Wireshark project man pages are available at: http://www.wireshark.org/docs/man-pages
<http://www.wireshark.org/docs/man-pages>.
AUTHORS
Original Author
-------- ------
Ian Schorr <ian[AT]ianschorr.com>
Contributors
------------
Gerald Combs <gerald[AT]wireshark.org>
1.2.8 2010-05-05 CAPINFOS(1)