seperated the input file formats into list elements, instead of a "floating text"

svn path=/trunk/; revision=10676
This commit is contained in:
Ulf Lamping 2004-04-23 19:53:36 +00:00
parent 049b0f9cf3
commit 8c96276fec
1 changed files with 87 additions and 20 deletions

View File

@ -41,26 +41,93 @@ B<Ethereal> is a GUI network protocol analyzer. It lets you
interactively browse packet data from a live network or from a
previously saved capture file. B<Ethereal>'s native capture file format
is B<libpcap> format, which is also the format used by B<tcpdump> and
various other tools. In addition, B<Ethereal> can read capture files
from B<snoop> and B<atmsnoop>, Shomiti/Finisar B<Surveyor> captures,
Novell B<LANalyzer> captures, Network General/Network Associates
DOS-based B<Sniffer> (compressed or uncompressed) captures, Microsoft
B<Network Monitor> captures, files from AIX's B<iptrace>, Cinco Networks
B<NetXRay> captures, captures from Network Associates Windows-based
B<Sniffer>, AG Group/WildPackets
B<EtherPeek>/B<TokenPeek>/B<AiroPeek>/B<EtherHelp> captures, captures
from B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router debug output,
files from HP-UX's B<nettl>, the dump output from B<Toshiba's> ISDN
routers, the output from B<i4btrace> from the ISDN4BSD project, the
output in B<IPLog> format from the Cisco Secure Intrusion Detection
System, B<pppd logs> (pppdump format), the output from VMS's
B<TCPIPtrace>/B<TCPtrace>/B<UCX$TRACE> utilities, the text output from
the B<DBS Etherwatch> VMS utility, traffic capture files from Visual
Networks' Visual UpTime, the output from B<CoSine> L2 debug, the output
from Accellent's 5Views LAN agents, captures in Endace Measurement
Systems' ERF format, Linux Bluez Bluetooth stack B<hcidump -w> traces,
captures from Network Instruments Observer version 9, and traces from
the EyeSDN USB S0. There is no need to tell B<Ethereal> what type of
various other tools.
B<Ethereal> can read / import the following file formats:
=over 4
=item *
libpcap, tcpdump and various other tools using tcpdump's capture format
=item *
B<snoop> and B<atmsnoop>
=item *
Shomiti/Finisar B<Surveyor> captures
=item *
Novell B<LANalyzer> captures
=item *
Microsoft B<Network Monitor> captures
=item *
AIX's B<iptrace> captures
=item *
Cinco Networks B<NetXRay> captures
=item *
Network Associates Windows-based B<Sniffer> captures
=item *
Network General/Network Associates DOS-based B<Sniffer> (compressed or uncompressed) captures
=item *
AG Group/WildPackets B<EtherPeek>/B<TokenPeek>/B<AiroPeek>/B<EtherHelp>/B<PacketGrabber> captures
=item *
B<RADCOM>'s WAN/LAN analyzer captures
=item *
Network Instruments B<Observer> version 9 captures
=item *
B<Lucent/Ascend> router debug output
=item *
files from HP-UX's B<nettl>
=item *
B<Toshiba's> ISDN routers dump output
=item *
the output from B<i4btrace> from the ISDN4BSD project
=item *
traces from the B<EyeSDN> USB S0.
=item *
the output in B<IPLog> format from the Cisco Secure Intrusion Detection System
=item *
B<pppd logs> (pppdump format)
=item *
the output from VMS's B<TCPIPtrace>/B<TCPtrace>/B<UCX$TRACE> utilities
=item *
the text output from the B<DBS Etherwatch> VMS utility
=item *
Visual Networks' B<Visual UpTime> traffic capture
=item *
the output from B<CoSine> L2 debug
=item *
the output from Accellent's B<5Views> LAN agents
=item *
Endace Measurement Systems' ERF format captures
=item *
Linux Bluez Bluetooth stack B<hcidump -w> traces
=back 4
There is no need to tell B<Ethereal> what type of
file you are reading; it will determine the file type by itself.
B<Ethereal> is also capable of reading any of these file formats if they
are compressed using gzip. B<Ethereal> recognizes this directly from