Annotation of embedaddon/ipguard/doc/README.tcpdump, revision 1.1.1.1
1.1 misho 1:
2: 00:0f:ea:d2:44:a4 192.168.1.1 - server MAC-IP pair
3: 00:d0:b7:b5:ca:6b 192.168.1.10 - client MAC-IP pair
4: 00:40:f4:53:e3:7d 192.168.1.66 - pirate MAC-IP pair
5: de:ad:6b:a8:de:5b - ipguard fake MAC
6:
7: #### Normal ARP session
8: ################################
9:
10: ## request client gratuitous
11:
12: who-has 192.168.1.1 tell 192.168.1.1 requ client broadcast
13: must not be answered
14:
15: ## request client -> server
16:
17: who-has 192.168.1.1 tell 192.168.1.10 requ client broadcast
18: reply 192.168.1.1 is-at 00:0f:ea:d2:44:a4 resp server to client
19:
20: ## request server -> client
21:
22: who-has 192.168.1.10 tell 192.168.1.1 requ server broadcast
23: reply 192.168.1.10 is-at 00:d0:b7:b5:ca:6b resp client to server
24:
25: #### Denied ARP by ipguard -n 2 fxp0
26: ################################
27:
28: ## request pirate gratuitous
29:
30: who-has 192.168.1.66 tell 192.168.1.66 requ pirate broadcast
31: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
32: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
33: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
34:
35: ## request pirate -> server
36:
37: who-has 192.168.1.1 tell 192.168.1.66 requ pirate broadcast
38: reply 192.168.1.1 is-at 00:0f:ea:d2:44:a4 resp server to pirate
39: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
40: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
41: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
42:
43: #### Denied ARP by ipguard -x -n 2 fxp0
44: ################################
45:
46: ## request pirate gratuitous
47:
48: same as previous example
49:
50: ## request pirate -> server
51:
52: same as previous example
53:
54: ## request server -> pirate
55:
56: who-has 192.168.1.66 tell 192.168.1.1 requ server broadcast
57: reply 192.168.1.66 is-at 00:40:f4:53:e3:7d resp pirate to server
58: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b resp ipguard to server
59: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b resp ipguard to server
60:
61: #### Denied ARP by ipguard -z -x -n 2 fxp0
62: ################################
63:
64: ## request pirate (from client IP) gratuitous
65:
66: who-has 192.168.1.10 tell 192.168.1.10 requ pirate broadcast
67: reply 192.168.1.10 is-at 00:d0:b7:b5:ca:6b resp client to pirate
68: reply 192.168.1.10 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
69: reply 192.168.1.10 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
70: reply 192.168.1.10 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
71: who-has 192.168.1.10 tell 192.168.1.10 requ fix ipguard broadcast
72: with client MAC-IP
73:
74: ## request pirate (from client IP) -> server
75:
76: who-has 192.168.1.1 tell 192.168.1.10 requ pirate broadcast
77: reply 192.168.1.1 is-at 00:0f:ea:d2:44:a4 resp server to pirate
78: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
79: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
80: reply 192.168.1.10 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
81: who-has 192.168.1.10 tell 192.168.1.10 requ fix ipguard broadcast
82: with client MAC-IP
83:
84: ## request pirate gratuitous
85:
86: who-has 192.168.1.66 tell 192.168.1.66 requ pirate broadcast
87: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
88: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
89: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
90: who-has 192.168.1.66 tell 192.168.1.66 requ poison ipguard broadcast
91: with fake MAC
92:
93: ## request pirate -> server
94:
95: who-has 192.168.1.1 tell 192.168.1.66 requ pirate broadcast
96: reply 192.168.1.1 is-at 00:0f:ea:d2:44:a4 resp server to pirate
97: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
98: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
99: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b resp ipguard to pirate
100: who-has 192.168.1.66 tell 192.168.1.66 requ poison ipguard broadcast
101: with fake MAC
102:
103: ## $Id: README.tcpdump,v 1.8 2010/07/12 03:46:52 sead Exp $
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>