Annotation of embedaddon/ipguard/doc/README.tcpdump, revision 1.1.1.1

1.1       misho       1: 
                      2: 00:0f:ea:d2:44:a4       192.168.1.1     - server MAC-IP pair
                      3: 00:d0:b7:b5:ca:6b       192.168.1.10    - client MAC-IP pair
                      4: 00:40:f4:53:e3:7d       192.168.1.66    - pirate MAC-IP pair
                      5: de:ad:6b:a8:de:5b                       - ipguard fake MAC
                      6: 
                      7: #### Normal ARP session
                      8: ################################
                      9: 
                     10: ## request client gratuitous
                     11: 
                     12: who-has 192.168.1.1 tell 192.168.1.1            requ client broadcast
                     13:                                                 must not be answered
                     14: 
                     15: ## request client -> server
                     16: 
                     17: who-has 192.168.1.1 tell 192.168.1.10           requ client broadcast
                     18: reply 192.168.1.1 is-at 00:0f:ea:d2:44:a4       resp server to client
                     19: 
                     20: ## request server -> client
                     21: 
                     22: who-has 192.168.1.10 tell 192.168.1.1           requ server broadcast
                     23: reply 192.168.1.10 is-at 00:d0:b7:b5:ca:6b      resp client to server
                     24: 
                     25: #### Denied ARP by ipguard -n 2 fxp0
                     26: ################################
                     27: 
                     28: ## request pirate gratuitous
                     29: 
                     30: who-has 192.168.1.66 tell 192.168.1.66          requ pirate broadcast
                     31: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
                     32: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
                     33: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
                     34: 
                     35: ## request pirate -> server
                     36: 
                     37: who-has 192.168.1.1 tell 192.168.1.66           requ pirate broadcast
                     38: reply 192.168.1.1 is-at 00:0f:ea:d2:44:a4       resp server to pirate
                     39: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b       resp ipguard to pirate
                     40: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b       resp ipguard to pirate
                     41: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
                     42: 
                     43: #### Denied ARP by ipguard -x -n 2 fxp0
                     44: ################################
                     45: 
                     46: ## request pirate gratuitous
                     47: 
                     48:     same as previous example
                     49: 
                     50: ## request pirate -> server
                     51: 
                     52:     same as previous example
                     53: 
                     54: ## request server -> pirate
                     55: 
                     56: who-has 192.168.1.66 tell 192.168.1.1           requ server broadcast
                     57: reply 192.168.1.66 is-at 00:40:f4:53:e3:7d      resp pirate to server
                     58: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to server
                     59: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to server
                     60: 
                     61: #### Denied ARP by ipguard -z -x -n 2 fxp0
                     62: ################################
                     63: 
                     64: ## request pirate (from client IP) gratuitous
                     65: 
                     66: who-has 192.168.1.10 tell 192.168.1.10          requ pirate broadcast
                     67: reply 192.168.1.10 is-at 00:d0:b7:b5:ca:6b      resp client to pirate
                     68: reply 192.168.1.10 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
                     69: reply 192.168.1.10 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
                     70: reply 192.168.1.10 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
                     71: who-has 192.168.1.10 tell 192.168.1.10          requ fix ipguard broadcast
                     72:                                                 with client MAC-IP
                     73: 
                     74: ## request pirate (from client IP) -> server
                     75: 
                     76: who-has 192.168.1.1 tell 192.168.1.10           requ pirate broadcast
                     77: reply 192.168.1.1 is-at 00:0f:ea:d2:44:a4       resp server to pirate
                     78: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b       resp ipguard to pirate
                     79: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b       resp ipguard to pirate
                     80: reply 192.168.1.10 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
                     81: who-has 192.168.1.10 tell 192.168.1.10          requ fix ipguard broadcast
                     82:                                                 with client MAC-IP
                     83: 
                     84: ## request pirate gratuitous
                     85: 
                     86: who-has 192.168.1.66 tell 192.168.1.66          requ pirate broadcast
                     87: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
                     88: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
                     89: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
                     90: who-has 192.168.1.66 tell 192.168.1.66          requ poison ipguard broadcast
                     91:                                                 with fake MAC
                     92: 
                     93: ## request pirate -> server
                     94: 
                     95: who-has 192.168.1.1 tell 192.168.1.66           requ pirate broadcast
                     96: reply 192.168.1.1 is-at 00:0f:ea:d2:44:a4       resp server to pirate
                     97: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b       resp ipguard to pirate
                     98: reply 192.168.1.1 is-at de:ad:6b:a8:de:5b       resp ipguard to pirate
                     99: reply 192.168.1.66 is-at de:ad:6b:a8:de:5b      resp ipguard to pirate
                    100: who-has 192.168.1.66 tell 192.168.1.66          requ poison ipguard broadcast
                    101:                                                 with fake MAC
                    102: 
                    103: ##  $Id: README.tcpdump,v 1.8 2010/07/12 03:46:52 sead Exp $

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>