forked from osmocom/wireshark
seperated the input file formats into list elements, instead of a "floating text"
svn path=/trunk/; revision=10676
This commit is contained in:
parent
049b0f9cf3
commit
8c96276fec
107
doc/ethereal.pod
107
doc/ethereal.pod
|
@ -41,26 +41,93 @@ B<Ethereal> is a GUI network protocol analyzer. It lets you
|
|||
interactively browse packet data from a live network or from a
|
||||
previously saved capture file. B<Ethereal>'s native capture file format
|
||||
is B<libpcap> format, which is also the format used by B<tcpdump> and
|
||||
various other tools. In addition, B<Ethereal> can read capture files
|
||||
from B<snoop> and B<atmsnoop>, Shomiti/Finisar B<Surveyor> captures,
|
||||
Novell B<LANalyzer> captures, Network General/Network Associates
|
||||
DOS-based B<Sniffer> (compressed or uncompressed) captures, Microsoft
|
||||
B<Network Monitor> captures, files from AIX's B<iptrace>, Cinco Networks
|
||||
B<NetXRay> captures, captures from Network Associates Windows-based
|
||||
B<Sniffer>, AG Group/WildPackets
|
||||
B<EtherPeek>/B<TokenPeek>/B<AiroPeek>/B<EtherHelp> captures, captures
|
||||
from B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router debug output,
|
||||
files from HP-UX's B<nettl>, the dump output from B<Toshiba's> ISDN
|
||||
routers, the output from B<i4btrace> from the ISDN4BSD project, the
|
||||
output in B<IPLog> format from the Cisco Secure Intrusion Detection
|
||||
System, B<pppd logs> (pppdump format), the output from VMS's
|
||||
B<TCPIPtrace>/B<TCPtrace>/B<UCX$TRACE> utilities, the text output from
|
||||
the B<DBS Etherwatch> VMS utility, traffic capture files from Visual
|
||||
Networks' Visual UpTime, the output from B<CoSine> L2 debug, the output
|
||||
from Accellent's 5Views LAN agents, captures in Endace Measurement
|
||||
Systems' ERF format, Linux Bluez Bluetooth stack B<hcidump -w> traces,
|
||||
captures from Network Instruments Observer version 9, and traces from
|
||||
the EyeSDN USB S0. There is no need to tell B<Ethereal> what type of
|
||||
various other tools.
|
||||
|
||||
B<Ethereal> can read / import the following file formats:
|
||||
|
||||
=over 4
|
||||
|
||||
=item *
|
||||
libpcap, tcpdump and various other tools using tcpdump's capture format
|
||||
|
||||
=item *
|
||||
B<snoop> and B<atmsnoop>
|
||||
|
||||
=item *
|
||||
Shomiti/Finisar B<Surveyor> captures
|
||||
|
||||
=item *
|
||||
Novell B<LANalyzer> captures
|
||||
|
||||
=item *
|
||||
Microsoft B<Network Monitor> captures
|
||||
|
||||
=item *
|
||||
AIX's B<iptrace> captures
|
||||
|
||||
=item *
|
||||
Cinco Networks B<NetXRay> captures
|
||||
|
||||
=item *
|
||||
Network Associates Windows-based B<Sniffer> captures
|
||||
|
||||
=item *
|
||||
Network General/Network Associates DOS-based B<Sniffer> (compressed or uncompressed) captures
|
||||
|
||||
=item *
|
||||
AG Group/WildPackets B<EtherPeek>/B<TokenPeek>/B<AiroPeek>/B<EtherHelp>/B<PacketGrabber> captures
|
||||
|
||||
=item *
|
||||
B<RADCOM>'s WAN/LAN analyzer captures
|
||||
|
||||
=item *
|
||||
Network Instruments B<Observer> version 9 captures
|
||||
|
||||
=item *
|
||||
B<Lucent/Ascend> router debug output
|
||||
|
||||
=item *
|
||||
files from HP-UX's B<nettl>
|
||||
|
||||
=item *
|
||||
B<Toshiba's> ISDN routers dump output
|
||||
|
||||
=item *
|
||||
the output from B<i4btrace> from the ISDN4BSD project
|
||||
|
||||
=item *
|
||||
traces from the B<EyeSDN> USB S0.
|
||||
|
||||
=item *
|
||||
the output in B<IPLog> format from the Cisco Secure Intrusion Detection System
|
||||
|
||||
=item *
|
||||
B<pppd logs> (pppdump format)
|
||||
|
||||
=item *
|
||||
the output from VMS's B<TCPIPtrace>/B<TCPtrace>/B<UCX$TRACE> utilities
|
||||
|
||||
=item *
|
||||
the text output from the B<DBS Etherwatch> VMS utility
|
||||
|
||||
=item *
|
||||
Visual Networks' B<Visual UpTime> traffic capture
|
||||
|
||||
=item *
|
||||
the output from B<CoSine> L2 debug
|
||||
|
||||
=item *
|
||||
the output from Accellent's B<5Views> LAN agents
|
||||
|
||||
=item *
|
||||
Endace Measurement Systems' ERF format captures
|
||||
|
||||
=item *
|
||||
Linux Bluez Bluetooth stack B<hcidump -w> traces
|
||||
|
||||
=back 4
|
||||
|
||||
There is no need to tell B<Ethereal> what type of
|
||||
file you are reading; it will determine the file type by itself.
|
||||
B<Ethereal> is also capable of reading any of these file formats if they
|
||||
are compressed using gzip. B<Ethereal> recognizes this directly from
|
||||
|
|
Loading…
Reference in New Issue