Annotation of embedaddon/ipguard/doc/README.tcpdump, revision 1.1

1.1     ! misho       1: 
        !             2: 00:0f:ea:d2:44:a4       192.168.1.1     - server MAC-IP pair
        !             3: 00:d0:b7:b5:ca:6b       192.168.1.10    - client MAC-IP pair
        !             4: 00:40:f4:53:e3:7d       192.168.1.66    - pirate MAC-IP pair
        !             5: de:ad:6b:a8:de:5b                       - ipguard fake MAC
        !             6: 
        !             7: #### Normal ARP session
        !             8: ################################
        !             9: 
        !            10: ## request client gratuitous
        !            11: 
        !            12: who-has 192.168.1.1 tell 192.168.1.1            requ client broadcast
        !            13:                                                 must not be answered
        !            14: 
        !            15: ## request client -> server
        !            16: 
        !            17: who-has 192.168.1.1 tell 192.168.1.10           requ client broadcast
        !            18: reply 192.168.1.1 is-at 00:0f:ea:d2:44:a4       resp server to client
        !            19: 
        !            20: ## request server -> client
        !            21: 
        !            22: who-has 192.168.1.10 tell 192.168.1.1           requ server broadcast
        !            23: reply 192.168.1.10 is-at 00:d0:b7:b5:ca:6b      resp client to server
        !            24: 
        !            25: #### Denied ARP by ipguard -n 2 fxp0
        !            26: ################################
        !            27: 
        !            28: ## request pirate gratuitous
        !            29: 
        !            30: who-has 192.168.1.66 tell 192.168.1.66          requ pirate broadcast
        !            31: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
        !            32: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
        !            33: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
        !            34: 
        !            35: ## request pirate -> server
        !            36: 
        !            37: who-has 192.168.1.1 tell 192.168.1.66           requ pirate broadcast
        !            38: reply 192.168.1.1 is-at 00:0f:ea:d2:44:a4       resp server to pirate
        !            39: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b       resp ipguard to pirate
        !            40: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b       resp ipguard to pirate
        !            41: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
        !            42: 
        !            43: #### Denied ARP by ipguard -x -n 2 fxp0
        !            44: ################################
        !            45: 
        !            46: ## request pirate gratuitous
        !            47: 
        !            48:     same as previous example
        !            49: 
        !            50: ## request pirate -> server
        !            51: 
        !            52:     same as previous example
        !            53: 
        !            54: ## request server -> pirate
        !            55: 
        !            56: who-has 192.168.1.66 tell 192.168.1.1           requ server broadcast
        !            57: reply 192.168.1.66 is-at 00:40:f4:53:e3:7d      resp pirate to server
        !            58: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to server
        !            59: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to server
        !            60: 
        !            61: #### Denied ARP by ipguard -z -x -n 2 fxp0
        !            62: ################################
        !            63: 
        !            64: ## request pirate (from client IP) gratuitous
        !            65: 
        !            66: who-has 192.168.1.10 tell 192.168.1.10          requ pirate broadcast
        !            67: reply 192.168.1.10 is-at 00:d0:b7:b5:ca:6b      resp client to pirate
        !            68: reply 192.168.1.10 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
        !            69: reply 192.168.1.10 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
        !            70: reply 192.168.1.10 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
        !            71: who-has 192.168.1.10 tell 192.168.1.10          requ fix ipguard broadcast
        !            72:                                                 with client MAC-IP
        !            73: 
        !            74: ## request pirate (from client IP) -> server
        !            75: 
        !            76: who-has 192.168.1.1 tell 192.168.1.10           requ pirate broadcast
        !            77: reply 192.168.1.1 is-at 00:0f:ea:d2:44:a4       resp server to pirate
        !            78: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b       resp ipguard to pirate
        !            79: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b       resp ipguard to pirate
        !            80: reply 192.168.1.10 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
        !            81: who-has 192.168.1.10 tell 192.168.1.10          requ fix ipguard broadcast
        !            82:                                                 with client MAC-IP
        !            83: 
        !            84: ## request pirate gratuitous
        !            85: 
        !            86: who-has 192.168.1.66 tell 192.168.1.66          requ pirate broadcast
        !            87: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
        !            88: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
        !            89: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
        !            90: who-has 192.168.1.66 tell 192.168.1.66          requ poison ipguard broadcast
        !            91:                                                 with fake MAC
        !            92: 
        !            93: ## request pirate -> server
        !            94: 
        !            95: who-has 192.168.1.1 tell 192.168.1.66           requ pirate broadcast
        !            96: reply 192.168.1.1 is-at 00:0f:ea:d2:44:a4       resp server to pirate
        !            97: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b       resp ipguard to pirate
        !            98: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b       resp ipguard to pirate
        !            99: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
        !           100: who-has 192.168.1.66 tell 192.168.1.66          requ poison ipguard broadcast
        !           101:                                                 with fake MAC
        !           102: 
        !           103: ##  $Id: README.tcpdump,v 1.8 2010/07/12 03:46:52 sead Exp $

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>