diff options
author | Anas Nashif <anas.nashif@intel.com> | 2012-11-04 06:54:55 -0800 |
---|---|---|
committer | Anas Nashif <anas.nashif@intel.com> | 2012-11-04 06:54:55 -0800 |
commit | 9a7f43d7ff4426a843b26762ca48a1a81a89bada (patch) | |
tree | 7db9208bcc9ad4b6e0e65f8265184b8520fee7e2 /README.tru64 | |
download | libpcap-9a7f43d7ff4426a843b26762ca48a1a81a89bada.tar.gz libpcap-9a7f43d7ff4426a843b26762ca48a1a81a89bada.tar.bz2 libpcap-9a7f43d7ff4426a843b26762ca48a1a81a89bada.zip |
Imported Upstream version 1.3.0upstream/1.3.0
Diffstat (limited to 'README.tru64')
-rw-r--r-- | README.tru64 | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/README.tru64 b/README.tru64 new file mode 100644 index 0000000..7fe1ef0 --- /dev/null +++ b/README.tru64 @@ -0,0 +1,49 @@ +The following instructions are applicable to Tru64 UNIX +(formerly Digital UNIX (formerly DEC OSF/1)) version 4.0, and +probably to later versions as well; at least some options apply to +Digital UNIX 3.2 - perhaps all do. + +In order to use kernel packet filtering on this system, you have +to configure it in such a way: + +Kernel configuration +-------------------- + +The packet filtering kernel option must be enabled at kernel +installation. If it was not the case, you can rebuild the kernel with +"doconfig -c" after adding the following line in the kernel +configuration file (/sys/conf/<HOSTNAME>): + + option PACKETFILTER + +or use "doconfig" without any arguments to add the packet filter driver +option via the kernel option menu (see the system administration +documentation for information on how to do this). + +Device configuration +-------------------- + +Devices used for packet filtering must be created thanks to +the following command (executed in the /dev directory): + + ./MAKEDEV pfilt + +Interface configuration +----------------------- + +In order to capture all packets on a network, you may want to allow +applications to put the interface on that network into "local copy" +mode, so that tcpdump can see packets sent by the host on which it's +running as well as packets received by that host, and to put the +interface into "promiscuous" mode, so that tcpdump can see packets on +the network segment not sent to the host on which it's running, by using +the pfconfig(1) command: + + pfconfig +c +p <network_device> + +or allow application to put any interface into "local copy" or +"promiscuous" mode by using the command: + + pfconfig +c +p -a + +Note: all instructions given require root privileges. |