tailieunhanh - Red Hat Linux 7.2 Bible, Unlimited ed phần 7

Những tài liệu này được lưu trữ trong thư mục / usr / share / doc / kernel-doc thư mục *. Sau khi các mô-đun đã được xây dựng, chúng được cài đặt trong thư mục / lib/modules/ *. Tên của thư mục được dựa trên số lượng phát hành hiện tại của hạt nhân. | The Ethereal Capture window displays information on how many incoming and outgoing packets have crossed the interface since the capture began. The number of packets that are associated with each protocol Ethereal monitors is displayed along with the percentage of total packets associated with each protocol. For this example I opened a Web page resulting in TCP packets and ran the ping command resulting in ICMP packets . Figure 15-11 Ethernet activity is displayed by protocol as packets are captured. 6. Click Stop. The snapshot of data you just took will appear on the Ethereal window. Packets are displayed in the order in which they traversed the interface. 7. If you did not already ask to save the capture data to a file you may do so now by choosing File Save As. At this point you can start interpreting the data. Using Ethereal Filters If you are monitoring a busy server or a busy network Ethereal can gather so much data that it can become almost unusable. If you know what you are looking for however you can use Ethereal to filter what packets are captured based on values you enter. Filters in Ethereal are implemented using the pcap library type man pcap to read about it . The filter expressions you can use with Ethereal are described on the tcpdump man page. Here are some examples of filters that you could enter into the Filter box when you capture Ethernet data with Ethereal host The host primitive lets you only capture packets that are either to or from a particular host computer by IP address or host name . By preceding host with src or des you can indicate that you only want packages sent from a particular source or to a particular destination host. tcp port 80 You can enter a protocol name such as tcp ether udp or ip to limit captured packets to those that are assigned to that protocol. As shown in the previous example with tcp you could also indicate a port number such as 80 to monitor traffic to and from your Web server . You can filter for .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.