Setup guide

filter-protocol (all-frames | ip-only | mac-only-no-ip; default: ip-only) - specific protocol group to
filter
all-frames - sniff all packets
ip-only - sniff IP packets only
mac-only-no-ip - sniff non-IP packets only
filter-address1 (IP address/mask:port; default: 0.0.0.0/0:0-65535) - criterion of choosing the
packets to process
filter-address2 (IP address/mask:port; default: 0.0.0.0/0:0-65535) - criterion of choosing the
packets to process
running (yes | no; default: no) - if the sniffer is started then the value is yes otherwise no
Notes
filter-address1 and filter-address2 are used to specify the two participients in communication (i.e.
they will match only in the case if one of them matches the source address and the other one
matches the destination address of a packet). These properties are taken in account only if
filter-protocol is ip-only.
Not only Ethernal (
http://www.ethereal.com
) and Packetyzer (
http://www.packetyzer.com
) can
receive the sniffer's stream but also Wandy's program trafr
(http://www.Wandy.com/download.html) that runs on any IA32 Linux computer and saves
received packets libpcap file format.
Example
In the following example streaming-server will be added, streaming will be enabled, file-name
will be set to test and packet sniffer will be started and stopped after some time:
[admin@Wandy] tool sniffer>set streaming-server=10.0.0.241 \
\... streaming-enabled=yes file-name=test
[admin@Wandy] tool sniffer> prin
interface: all
only-headers: no
memory-limit: 10
file-name: "test"
file-limit: 10
streaming-enabled: yes
streaming-server: 10.0.0.241
filter-stream: yes
filter-protocol: ip-only
filter-address1: 0.0.0.0/0:0-65535
filter-address2: 0.0.0.0/0:0-65535
running: no
[admin@Wandy] tool sniffer>start
[admin@Wandy] tool sniffer>stop
Running Packet Sniffer
Command name: /tool sniffer start, /tool sniffer stop, /tool sniffer save
Description
The commands are used to control runtime operation of the packet sniffer. The start command is
used to start/reset sniffering, stop - stops sniffering. To save currently sniffed packets in a specific