Sponsored Content
Special Forums IP Networking add route to a subnet - Solaris 2.6 Post 49987 by jennifer on Thursday 15th of April 2004 12:45:48 AM
Old 04-15-2004
In my organisation, I have a private LAN (10.x.x.x) and a public LAN (172.x.x.x).
Machine in private LAN need to grep CAD license from public LAN.
I use the same method as what Cassy did on my Sun Machine and the settings is gone once the system reboots.

Any suggestion, how can I set the settings perm.

do we use the same methd on HPUX as well?
 

8 More Discussions You Might Find Interesting

1. Solaris

Setting up route on subnet

I was told this worked on an HP system (same network as the sun server I am trying to set this up on)> but I get "netmask: bad value"2when I try it on the Sun: route add net 199.42.23.192 netmask 255.255.255.192 204.104.63.30 1 I've tried many different iterations (leaving out netmask, only... (2 Replies)
Discussion started by: nhmeanie
2 Replies

2. IP Networking

Migrating existing Subnet to a new subnet and changing ip addresses in UNIX

Hi, My project needs to migrate the existing Subnet (255.255.255.0) to a new subnet and change the ipaddresses (currently C class). How can I do that. I need some information. John (0 Replies)
Discussion started by: johnmarsh
0 Replies

3. Red Hat

How to expose a box on the 63.x subnet with a route to the 192?

Hi all, I'm trying to expose a CentOS box on the 63.x subnet with a route to the 192 as our firewall doesn't allow a VPN. Would someone please let me know how I can do this? Thanks (0 Replies)
Discussion started by: tezarin
0 Replies

4. Solaris

Add route to solaris 10

I need to add a new route on solaris10 machine. I want that all traffic on the 23 port (telnet) use 192.168.200.1 gateway. How I do ? Thank you in advance. (1 Reply)
Discussion started by: arfry
1 Replies

5. Solaris

Changing the subnet mask on solaris 10

Hello, can anyone help me with the command to change the subnet mask on solaris 10? The mask is currently 255.255.255.255 I will like to change it to 255.255.2555.0. Thank you (5 Replies)
Discussion started by: cjashu
5 Replies

6. Solaris

Couldn't add route on Solaris 10

Hi Solaris Experts, I am trying to add a routing table entry on our 5.1 Generic_144488-12 sun4v sparc Solaris 10 SUNW,SPARC-Enterprise-T5220 so that it is possible to ping 10.56.9.34 node # netstat -rnv IRE Table: IPv4 Destination Mask Gateway Device Mxfrg Rtt Ref Flg Out In/Fwd ... (2 Replies)
Discussion started by: gjackson123
2 Replies

7. Solaris

Solaris 11 2nd nic for different subnet

I have a Solaris 11 machine with 2 network cables attached. The first one is the default route and is working okay. I am trying to activate the second on another subnet, but am sure missing something. The first one is on 10.30.128. and with it everything works fine, but when I try to add the... (0 Replies)
Discussion started by: ad101
0 Replies

8. Solaris

Solaris 2nd nic for different subnet

posted this on the other sub-forum https://www.unix.com/unix-for-dummies-questions-and-answers/246504-solaris-11-2nd-nic-different-subnet.html apologies if linking is not appropriate Thanks for your help. (0 Replies)
Discussion started by: ad101
0 Replies
ARPSPOOF(8)						      System Manager's Manual						       ARPSPOOF(8)

NAME
arpspoof - intercept packets on a switched LAN SYNOPSIS
arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host DESCRIPTION
arpspoof redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies. This is an extremely effective way of sniffing traffic on a switch. Kernel IP forwarding (or a userland program which accomplishes the same, e.g. fragrouter(8)) must be turned on ahead of time. OPTIONS
-i interface Specify the interface to use. -c own|host|both Specify which hardware address t use when restoring the arp configuration; while cleaning up, packets can be send with the own address as well as with the address of the host. Sending packets with a fake hw address can disrupt connectivity with certain switch/ap/bridge configurations, however it works more reliably than using the own address, which is the default way arpspoof cleans up afterwards. -t target Specify a particular host to ARP poison (if not specified, all hosts on the LAN). Repeat to specify multiple hosts. -r Poison both hosts (host and target) to capture traffic in both directions. (only valid in conjuntion with -t) host Specify the host you wish to intercept packets for (usually the local gateway). SEE ALSO
dsniff(8), fragrouter(8) AUTHOR
Dug Song <dugsong@monkey.org> ARPSPOOF(8)
All times are GMT -4. The time now is 09:57 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy