Unix/Linux Go Back    

OpenSolaris 2009.06 - man page for log2pcap (opensolaris section 1)

Linux & Unix Commands - Search Man Pages
Man Page or Keyword Search:   man
Select Man Page Set:       apropos Keyword Search (sections above)

LOG2PCAP(1)				  User Commands 			      LOG2PCAP(1)

       log2pcap - Extract network traces from Samba log files

       log2pcap [-h] [-q] [logfile] [pcap_file]

       This tool is part of the samba(7) suite.

       log2pcap reads in a samba log file and generates a pcap file (readable by most sniffers,
       such as ethereal or tcpdump) based on the packet dumps in the log file.

       The log file must have a log level of at least 5 to get the SMB header/parameters right,
       10 to get the first 512 data bytes of the packet and 50 to get the whole packet.

	   If this parameter is specified the output file will be a hex dump, in a format that is
	   readable by the text2pcap utility.

	   Be quiet. No warning messages about missing or incomplete data will be given.

	   Samba log file. log2pcap will try to read the log from stdin if the log file is not

	   Name of the output file to write the pcap (or hexdump) data to. If this argument is
	   not specified, output data will be written to stdout.

	   Print a summary of command line options.

       Extract all network traffic from all samba log files:

			  $ log2pcap < /var/log/* > trace.pcap

       Convert to pcap using text2pcap:

		$ log2pcap -h samba.log | text2pcap -T 139,139 - trace.pcap

       This man page is correct for version 3.0 of the Samba suite.

       Only SMB data is extracted from the samba logs, no LDAP, NetBIOS lookup or other data.

       The generated TCP and IP headers don't contain a valid checksum.

       text2pcap(1), ethereal(1)

       The original Samba software and related utilities were created by Andrew Tridgell. Samba
       is now developed by the Samba Team as an Open Source project similar to the way the Linux
       kernel is developed.

       This manpage was written by Jelmer Vernooij.

       See attributes(5) for descriptions of the following attributes:

       |Availability	    | SUNWsmbar, SUNWsmbau |
       |Interface Stability | External		   |
       Source for Samba is available on http://opensolaris.org.

       Samba(7) delivers the set of four SMF(5) services as can be seen from the following

	    $ svcs samba wins winbind swat
	   disabled	  Apr_21   svc:/network/samba:default
	   disabled	  Apr_21   svc:/network/winbind:default
	   disabled	  Apr_21   svc:/network/wins:default
	   disabled	  Apr_21   svc:/network/swat:default

       where the services are:

	   runs the smbd daemon managing the CIFS sessions

	   runs the nmbd daemon enabling the browsing (WINS)

	   runs the winbindd daemon making the domain idmap

	   Samba Web Administration Tool is a service providing access to browser-based Samba
	   administration interface and on-line documentation.	The service runs on software
	   loopback network interface on port 901/tcp, i.e. opening "http://localhost:901/" in
	   browser will access the SWAT service on local machine.

       Please note: SWAT uses HTTP Basic Authentication scheme where user name and passwords are
       sent over the network in clear text. In the SWAT case the user name is root. Transferring
       such sensitive data is advisable only on the software loopback network interface or over
       secure networks.

Samba 3.0				    01/19/2009				      LOG2PCAP(1)
Unix & Linux Commands & Man Pages : ©2000 - 2018 Unix and Linux Forums

All times are GMT -4. The time now is 10:13 AM.