05-11-2015
tcpdump: BIOCVERSION: Invalid argument is the output I get
9 More Discussions You Might Find Interesting
1. Cybersecurity
Hello,
Is there a functional flow of the UNIX security system that I can view? (1 Reply)
Discussion started by: spanglerbrod
1 Replies
2. Programming
hello im facing a queer problem when i execute the foll code in unix
# include <stdio.h>
# include <unistd.h>
main(int argc,char *argv)
{
FILE *fp = fopen("/ras/chirag/fifotest/file.fifo","a");
int i=1;
fprintf(fp,argv);
printf("I SLEEP");
system("date");
for (i=0;i<50;i++)... (2 Replies)
Discussion started by: tej.buch
2 Replies
3. Programming
Any One help how to draw the flow chart for C programe ?
If any usefull link's. (1 Reply)
Discussion started by: sabari
1 Replies
4. Programming
Hi,
my program stops with a buffer overflow error, but i can't understand the problem. I have a file like:
int array; //global variable
void func(){
int i;
for(i=0;i<n;i++)array=-1;
...
}
I had the error when i added the array initialization.
the file is a part of a C project. What... (1 Reply)
Discussion started by: littleboyblu
1 Replies
5. Shell Programming and Scripting
i am in an epic quagmire of horrid misunderstanding.
its been a while since ive been in the scene, couldnt remember my login for the account i used to have here, so excuse the 1st post. i dont want it to seem like ima post n boogy. in any case here we go:
just recently installed mandriva... (6 Replies)
Discussion started by: SirDonkeyPunch
6 Replies
6. IP Networking
I have a number of Windows CE operator terminals. They have facility to print alarms/messages to ...
aser or Inkjet (so they're using PCL).
USB or IP. IP connection takes just the IP address.
Question
How could I create a service or daemon on a server to capture all this data?... (7 Replies)
Discussion started by: transistor
7 Replies
7. Shell Programming and Scripting
hi ,
I am new to scripting, i have a doubt can any one pls solve it for me
the code is not working
set users = (user1 user2 user3)
echo The users are
echo $users
echo Enter the USER NAME
set USER_NAME = $<
set i = 1;
for ( i = 1; i <= $#users; i++ )
if ( $USER_NAME == $users )... (1 Reply)
Discussion started by: Manju87
1 Replies
8. Shell Programming and Scripting
B()
{
}
A()
{
calling a function B
}
for condition
do
calling a function A
done
Shall after executing function B, the control will return back to loop?
Thanks in advance :) (2 Replies)
Discussion started by: ezee
2 Replies
9. Solaris
please find the below o/p for your reference
bash-3.00# fcinfo hba-port
HBA Port WWN: 21000024ff295a34
OS Device Name: /dev/cfg/c2
Manufacturer: QLogic Corp.
Model: 375-3356-02
Firmware Version: 05.03.02
FCode/BIOS Version: BIOS: 2.02; fcode: 2.01;... (3 Replies)
Discussion started by: sb200
3 Replies
ENC(4) BSD Kernel Interfaces Manual ENC(4)
NAME
enc -- Encapsulating Interface
SYNOPSIS
To compile this driver into the kernel, place the following line in your kernel configuration file:
device enc
DESCRIPTION
The enc interface is a software loopback mechanism that allows hosts or firewalls to filter ipsec(4) traffic using any firewall package that
hooks in via the pfil(9) framework.
The enc interface allows an administrator to see incoming and outgoing packets before and after they will be or have been processed by
ipsec(4) via tcpdump(1).
The ``enc0'' interface inherits all IPsec traffic. Thus all IPsec traffic can be filtered based on ``enc0'', and all IPsec traffic could be
seen by invoking tcpdump(1) on the ``enc0'' interface.
What can be seen with tcpdump(1) and what will be passed on to the firewalls via the pfil(9) framework can be independently controlled using
the following sysctl(8) variables:
Name Defaults Suggested
net.enc.out.ipsec_bpf_mask 0x00000003 0x00000001
net.enc.out.ipsec_filter_mask 0x00000001 0x00000001
net.enc.in.ipsec_bpf_mask 0x00000001 0x00000002
net.enc.in.ipsec_filter_mask 0x00000001 0x00000002
For the incoming path a value of 0x1 means ``before stripping off the outer header'' and 0x2 means ``after stripping off the outer header''.
For the outgoing path 0x1 means ``with only the inner header'' and 0x2 means ``with outer and inner headers''.
incoming path |------|
---- IPsec processing ---- (before) ---- (after) ----> | |
| Host |
<--- IPsec processing ---- (after) ----- (before) ---- | |
outgoing path |------|
Most people will want to run with the suggested defaults for ipsec_filter_mask and rely on the security policy database for the outer head-
ers.
EXAMPLES
To see the packets the processed via ipsec(4), adjust the sysctl(8) variables according to your need and run:
tcpdump -i enc0
SEE ALSO
tcpdump(1), bpf(4), ipf(4), ipfw(4), ipsec(4), pf(4), tcpdump(8)
BSD
November 28, 2007 BSD