Setup guide

tool sniffer host
Description
The submenu shows the list of hosts that were participating in data excange you've sniffed.
Property Description
address (read-only: IP address) - the address of the host peek-rate (read-only; integer/integer) - the
maximum data-rate received/transmitted
rate (read-only: integer/integer) - current data-rate received/transmitted
total (read-only: integer/integer) - total packets received/transmitted
Example
In the following example we'll see the list of hosts:
[admin@Wandy] tool sniffer host> print
# ADDRESS RATE PEEK-RATE TOTAL
0 10.0.0.4 0bps/0bps 704bps/0bps 264/0
1 10.0.0.144 0bps/0bps 6.24kbps/12.2kbps 1092/2128
2 10.0.0.181 0bps/0bps 12.2kbps/6.24kbps 2994/1598
3 10.0.0.241 0bps/0bps 1.31kbps/4.85kbps 242/866
[admin@Wandy] tool sniffer host>
Packet Sniffer Connections
tool sniffer connection
Description
Here you can get a list of the connections that have been watched during the sniffing time.
Property Description
active (read-only: yes | no) - if yes the find active connections
bytes (read-only: integer) - bytes in the current connection
dst-address (read-only: IP address) - destination address
mss (read-only: integer) - Maximum Segment Size
resends (read-only: integer) - the number of packets resends in the current connection
src-address (read-only: IP address) - source address
Example
The example shows how to get the list of connections:
[admin@Wandy] tool sniffer connection> print
Flags: A - active
# SRC-ADDRESS DST-ADDRESS BYTES RESENDS MSS
0 A 10.0.0.241:1839 10.0.0.181:23 (telnet) 6/42 60/0 0/0
1 A 10.0.0.144:2265 10.0.0.181:22 (ssh) 504/252 504/0 0/0
[admin@Wandy] tool sniffer connection>
Sniff MAC Address
You can also see the source and destination MAC Addresses. To do so, at first stop the sniffer if it