04-15-2004
In my organisation, I have a private LAN (10.x.x.x) and a public LAN (172.x.x.x).
Machine in private LAN need to grep CAD license from public LAN.
I use the same method as what Cassy did on my Sun Machine and the settings is gone once the system reboots.
Any suggestion, how can I set the settings perm.
do we use the same methd on HPUX as well?
8 More Discussions You Might Find Interesting
1. Solaris
I was told this worked on an HP system (same network as the sun server I am trying to set this up on)> but I get "netmask: bad value"2when I try it on the Sun:
route add net 199.42.23.192 netmask 255.255.255.192 204.104.63.30 1
I've tried many different iterations (leaving out netmask, only... (2 Replies)
Discussion started by: nhmeanie
2 Replies
2. IP Networking
Hi,
My project needs to migrate the existing Subnet (255.255.255.0) to a new subnet and change the ipaddresses (currently C class). How can I do that. I need some information.
John (0 Replies)
Discussion started by: johnmarsh
0 Replies
3. Red Hat
Hi all,
I'm trying to expose a CentOS box on the 63.x subnet with a route to the 192 as our firewall doesn't allow a VPN. Would someone please let me know how I can do this?
Thanks (0 Replies)
Discussion started by: tezarin
0 Replies
4. Solaris
I need to add a new route on solaris10 machine.
I want that all traffic on the 23 port (telnet) use 192.168.200.1 gateway.
How I do ?
Thank you in advance. (1 Reply)
Discussion started by: arfry
1 Replies
5. Solaris
Hello,
can anyone help me with the command to change the subnet mask on solaris 10? The mask is currently 255.255.255.255 I will like to change it to 255.255.2555.0.
Thank you (5 Replies)
Discussion started by: cjashu
5 Replies
6. Solaris
Hi Solaris Experts,
I am trying to add a routing table entry on our 5.1 Generic_144488-12 sun4v sparc Solaris 10 SUNW,SPARC-Enterprise-T5220 so that it is possible to ping 10.56.9.34 node
# netstat -rnv
IRE Table: IPv4
Destination Mask Gateway Device Mxfrg Rtt Ref
Flg Out In/Fwd ... (2 Replies)
Discussion started by: gjackson123
2 Replies
7. Solaris
I have a Solaris 11 machine with 2 network cables attached. The first one is the default route and is working okay. I am trying to activate the second on another subnet, but am sure missing something.
The first one is on 10.30.128. and with it everything works fine,
but when I try to add the... (0 Replies)
Discussion started by: ad101
0 Replies
8. Solaris
posted this on the other sub-forum
https://www.unix.com/unix-for-dummies-questions-and-answers/246504-solaris-11-2nd-nic-different-subnet.html
apologies if linking is not appropriate
Thanks for your help. (0 Replies)
Discussion started by: ad101
0 Replies
LEARN ABOUT DEBIAN
arpspoof
ARPSPOOF(8) System Manager's Manual ARPSPOOF(8)
NAME
arpspoof - intercept packets on a switched LAN
SYNOPSIS
arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host
DESCRIPTION
arpspoof redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies. This
is an extremely effective way of sniffing traffic on a switch.
Kernel IP forwarding (or a userland program which accomplishes the same, e.g. fragrouter(8)) must be turned on ahead of time.
OPTIONS
-i interface
Specify the interface to use.
-c own|host|both
Specify which hardware address t use when restoring the arp configuration; while cleaning up, packets can be send with the own
address as well as with the address of the host. Sending packets with a fake hw address can disrupt connectivity with certain
switch/ap/bridge configurations, however it works more reliably than using the own address, which is the default way arpspoof cleans
up afterwards.
-t target
Specify a particular host to ARP poison (if not specified, all hosts on the LAN). Repeat to specify multiple hosts.
-r Poison both hosts (host and target) to capture traffic in both directions. (only valid in conjuntion with -t)
host Specify the host you wish to intercept packets for (usually the local gateway).
SEE ALSO
dsniff(8), fragrouter(8)
AUTHOR
Dug Song <dugsong@monkey.org>
ARPSPOOF(8)