Skip to content

Commit

Permalink
Pick up the "README.tru64" file from Ethereal, and change it to refer to
Browse files Browse the repository at this point in the history
tcpdump, for the benefit of Digital^H^H^H^H^H^H^HTru64 UNIX users.
  • Loading branch information
yuguy committed Jan 24, 2001
1 parent a6e177c commit e191909
Show file tree
Hide file tree
Showing 2 changed files with 50 additions and 0 deletions.
1 change: 1 addition & 0 deletions FILES
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ Makefile.in
README
README.aix
README.linux
README.tru64
SUNOS4/nit_if.o.sparc
SUNOS4/nit_if.o.sun3
SUNOS4/nit_if.o.sun4c.4.0.3c
Expand Down
49 changes: 49 additions & 0 deletions README.tru64
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
The following instructions are applicable to Tru64 UNIX
(formerly Digital UNIX (formerly DEC OSF/1)) version 4.0, and
probably to later versions as well; at least some options apply to
Digital UNIX 3.2 - perhaps all do.

In order to use kernel packet filtering on this system, you have
to configure it in such a way:

Kernel configuration
--------------------

The packet filtering kernel option must be enabled at kernel
installation. If it was not the case, you can rebuild the kernel with
"doconfig -c" after adding the following line in the kernel
configuration file (/sys/conf/<HOSTNAME>):

option PACKETFILTER

or use "doconfig" without any arguments to add the packet filter driver
option via the kernel option menu (see the system administration
documentation for information on how to do this).

Device configuration
--------------------

Devices used for packet filtering must be created thanks to
the following command (executed in the /dev directory):

./MAKEDEV pfilt

Interface configuration
-----------------------

In order to capture all packets on a network, you may want to allow
applications to put the interface on that network into "local copy"
mode, so that tcpdump can see packets sent by the host on which it's
running as well as packets received by that host, and to put the
interface into "promiscuous" mode, so that tcpdump can see packets on
the network segment not sent to the host on which it's running, by using
the pfconfig(1) command:

pfconfig +c +p <network_device>

or allow application to put any interface into "local copy" or
"promiscuous" mode by using the command:

pfconfig +c +p -a

Note: all instructions given require root privileges.

0 comments on commit e191909

Please sign in to comment.