forked from osmocom/wireshark
Fix up various product names and descriptions in the lists of file
formats we can read; include vendor names. We should be able to read TokenPeek captures, as well as captures from the Windows versions of EtherPeek. Don't list the version numbers for EtherPeek and TokenPeek - those are file format version numbers, not program version numbers. svn path=/trunk/; revision=4599
This commit is contained in:
parent
f953bd7415
commit
be0b8a2d31
18
README
18
README
|
@ -1,4 +1,4 @@
|
|||
$Id: README,v 1.52 2001/12/05 21:42:05 guy Exp $
|
||||
$Id: README,v 1.53 2002/01/22 22:38:02 guy Exp $
|
||||
|
||||
General Information
|
||||
------- -----------
|
||||
|
@ -87,16 +87,16 @@ to read multiple file types. You can read the following file
|
|||
formats:
|
||||
|
||||
libpcap (tcpdump -w, etc.) - this is Ethereal's native format
|
||||
snoop
|
||||
atmsnoop
|
||||
Shomiti
|
||||
LANalyzer
|
||||
Sniffer (compressed and uncompressed)
|
||||
snoop and atmsnoop
|
||||
Shomiti/Finisar Surveyor
|
||||
Novell LANalyzer
|
||||
Network General/Network Associates DOS-based Sniffer (compressed and
|
||||
uncompressed)
|
||||
Microsoft Network Monitor
|
||||
AIX's iptrace
|
||||
NetXray
|
||||
Sniffer Pro
|
||||
Etherpeek versions 5, 6, and 7 for Macintosh
|
||||
Cinco Networks NetXRray
|
||||
Network Associates Windows-based Sniffer
|
||||
AG Group/WildPackets EtherPeek/TokenPeek
|
||||
RADCOM's WAN/LAN Analyzer
|
||||
Lucent/Ascend access products
|
||||
HP-UX's nettl
|
||||
|
|
|
@ -24,21 +24,22 @@ or all of the packets in that capture file to another capture file.
|
|||
B<Editcap> knows how to read B<libpcap> capture files, including those
|
||||
of B<tcpdump>, B<Ethereal>, and other tools that write captures in that
|
||||
format. In addition, B<Editcap> can read capture files from B<snoop>
|
||||
(including B<Shomiti>) and B<atmsnoop>, B<LanAlyzer>, B<Sniffer>
|
||||
(compressed or uncompressed), Microsoft B<Network Monitor>, AIX's
|
||||
B<iptrace>, B<NetXray>, B<Sniffer Pro>, B<EtherPeek> versions 5, 6, and
|
||||
7 for Macintosh, B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router
|
||||
debug output, HP-UX's B<nettl>, the dump output from B<Toshiba's> ISDN
|
||||
routers, the output from B<i4btrace> from the ISDN4BSD project, the
|
||||
output in B<IPLog> format from the Cisco Secure Intrusion Detection
|
||||
System, B<pppd logs> (pppdump format), the output from VMS's
|
||||
B<TCPIPtrace> utility, the text output from the B<DBS Etherwatch> VMS
|
||||
utility, and traffic capture files from Visual Networks' Visual UpTime.
|
||||
There is no need to tell B<Editcap> what type of file you are reading;
|
||||
it will determine the file type by itself. B<Editcap> is also capable
|
||||
of reading any of these file formats if they are compressed using gzip.
|
||||
B<Editcap> recognizes this directly from the file; the '.gz' extension
|
||||
is not required for this purpose.
|
||||
and B<atmsnoop>, Shomiti/Finisar B<Surveyor>, Novell B<LANalyzer>,
|
||||
Network General/Network Associates DOS-based B<Sniffer> (compressed or
|
||||
uncompressed), Microsoft B<Network Monitor>, AIX's B<iptrace>, Cinco
|
||||
Networks B<NetXRay>, Network Associates Windows-based B<Sniffer>, AG
|
||||
Group/WildPackets B<EtherPeek> and B<TokenPeek>, B<RADCOM>'s WAN/LAN
|
||||
analyzer, B<Lucent/Ascend> router debug output, HP-UX's B<nettl>, the
|
||||
dump output from B<Toshiba's> ISDN routers, the output from B<i4btrace>
|
||||
from the ISDN4BSD project, the output in B<IPLog> format from the Cisco
|
||||
Secure Intrusion Detection System, B<pppd logs> (pppdump format), the
|
||||
output from VMS's B<TCPIPtrace> utility, the text output from the B<DBS
|
||||
Etherwatch> VMS utility, and traffic capture files from Visual Networks'
|
||||
Visual UpTime. There is no need to tell B<Editcap> what type of file
|
||||
you are reading; it will determine the file type by itself. B<Editcap>
|
||||
is also capable of reading any of these file formats if they are
|
||||
compressed using gzip. B<Editcap> recognizes this directly from the
|
||||
file; the '.gz' extension is not required for this purpose.
|
||||
|
||||
By default, it writes the capture file in B<libpcap> format, and writes
|
||||
all of the packets in the capture file to the output file. The B<-F>
|
||||
|
|
|
@ -39,21 +39,23 @@ interactively browse packet data from a live network or from a
|
|||
previously saved capture file. B<Ethereal>'s native capture file format
|
||||
is B<libpcap> format, which is also the format used by B<tcpdump> and
|
||||
various other tools. In addition, B<Ethereal> can read capture files
|
||||
from B<snoop> (including B<Shomiti>) and B<atmsnoop>, B<LanAlyzer>,
|
||||
B<Sniffer> (compressed or uncompressed), Microsoft B<Network Monitor>,
|
||||
AIX's B<iptrace>, B<NetXray>, B<Sniffer Pro>, B<EtherPeek> versions 5,
|
||||
6, and 7 for Macintosh, B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend>
|
||||
router debug output, HP-UX's B<nettl>, the dump output from B<Toshiba's>
|
||||
ISDN routers, the output from B<i4btrace> from the ISDN4BSD project, the
|
||||
output in B<IPLog> format from the Cisco Secure Intrusion Detection
|
||||
System, B<pppd logs> (pppdump format), the output from VMS's
|
||||
B<TCPIPtrace> utility, the text output from the B<DBS Etherwatch> VMS
|
||||
utility, and traffic capture files from Visual Networks' Visual Uptime.
|
||||
There is no need to tell B<Ethereal> what type of file you are reading;
|
||||
it will determine the file type by itself. B<Ethereal> is also capable
|
||||
of reading any of these file formats if they are compressed using gzip.
|
||||
B<Ethereal> recognizes this directly from the file; the '.gz' extension
|
||||
is not required for this purpose.
|
||||
from B<snoop> and B<atmsnoop>, Shomiti/Finisar B<Surveyor>, Novell
|
||||
B<LANalyzer>, Network General/Network Associates DOS-based B<Sniffer>
|
||||
(compressed or uncompressed), Microsoft B<Network Monitor>, AIX's
|
||||
B<iptrace>, Cinco Networks B<NetXRay>, Network Associates Windows-based
|
||||
B<Sniffer>, AG Group/WildPackets B<EtherPeek> and B<TokenPeek>,
|
||||
B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router debug output,
|
||||
HP-UX's B<nettl>, the dump output from B<Toshiba's> ISDN routers, the
|
||||
output from B<i4btrace> from the ISDN4BSD project, the output in
|
||||
B<IPLog> format from the Cisco Secure Intrusion Detection System, B<pppd
|
||||
logs> (pppdump format), the output from VMS's B<TCPIPtrace> utility, the
|
||||
text output from the B<DBS Etherwatch> VMS utility, and traffic capture
|
||||
files from Visual Networks' Visual UpTime. There is no need to tell
|
||||
B<Ethereal> what type of file you are reading; it will determine the
|
||||
file type by itself. B<Ethereal> is also capable of reading any of
|
||||
these file formats if they are compressed using gzip. B<Ethereal>
|
||||
recognizes this directly from the file; the '.gz' extension is not
|
||||
required for this purpose.
|
||||
|
||||
Like other protocol analyzers, B<Ethereal>'s main window shows 3 views
|
||||
of a packet. It shows a summary line, briefly describing what the
|
||||
|
|
|
@ -20,22 +20,23 @@ B<Mergecap> is a program that combines multiple saved capture files into
|
|||
a single output file specified by the B<-w> argument. B<Mergecap> knows
|
||||
how to read B<libpcap> capture files, including those of B<tcpdump>,
|
||||
B<Ethereal>, and other tools that write captures in that format. In
|
||||
addition, B<Mergecap> can read capture files from B<snoop> (including
|
||||
B<Shomiti>) and B<atmsnoop>, B<LanAlyzer>, B<Sniffer> (compressed or
|
||||
uncompressed), Microsoft B<Network Monitor>, AIX's B<iptrace>,
|
||||
B<NetXray>, B<Sniffer Pro>, B<EtherPeek> versions 5, 6, and 7 for
|
||||
Macintosh, B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router debug
|
||||
output, HP-UX's B<nettl>, the dump output from B<Toshiba's> ISDN
|
||||
routers, the output from B<i4btrace> from the ISDN4BSD project, the
|
||||
output in B<IPLog> format from the Cisco Secure Intrusion Detection
|
||||
System, B<pppd logs> (pppdump format), the output from VMS's
|
||||
B<TCPIPtrace> utility, the text output from the B<DBS Etherwatch> VMS
|
||||
utility, and traffic capture files from Visual Networks' Visual UpTime.
|
||||
There is no need to tell B<Mergecap> what type of file you are reading;
|
||||
it will determine the file type by itself. B<Mergecap> is also capable
|
||||
of reading any of these file formats if they are compressed using gzip.
|
||||
B<Mergecap> recognizes this directly from the file; the '.gz' extension
|
||||
is not required for this purpose.
|
||||
addition, B<Mergecap> can read capture files from B<snoop> and
|
||||
B<atmsnoop>, Shomiti/Finisar B<Surveyor>, Novell B<LANalyzer>, Network
|
||||
General/Network Associates DOS-based B<Sniffer> (compressed or
|
||||
uncompressed), Microsoft B<Network Monitor>, AIX's B<iptrace>, Cinco
|
||||
Networks B<NetXRay>, Network Associates Windows-based B<Sniffer>, AG
|
||||
Group/WildPackets B<EtherPeek> and B<TokenPeek>, B<RADCOM>'s WAN/LAN
|
||||
analyzer, B<Lucent/Ascend> router debug output, HP-UX's B<nettl>, the
|
||||
dump output from B<Toshiba's> ISDN routers, the output from B<i4btrace>
|
||||
from the ISDN4BSD project, the output in B<IPLog> format from the Cisco
|
||||
Secure Intrusion Detection System, B<pppd logs> (pppdump format), the
|
||||
output from VMS's B<TCPIPtrace> utility, the text output from the B<DBS
|
||||
Etherwatch> VMS utility, and traffic capture files from Visual Networks'
|
||||
Visual UpTime. There is no need to tell B<Mergecap> what type of file
|
||||
you are reading; it will determine the file type by itself. B<Mergecap>
|
||||
is also capable of reading any of these file formats if they are
|
||||
compressed using gzip. B<Mergecap> recognizes this directly from the
|
||||
file; the '.gz' extension is not required for this purpose.
|
||||
|
||||
By default, it writes the capture file in B<libpcap> format, and writes
|
||||
all of the packets in both input capture files to the output file. The
|
||||
|
|
|
@ -37,21 +37,23 @@ capture file, either printing a decoded form of those packets to the
|
|||
standard output or writing the packets to a file. B<Tethereal>'s native
|
||||
capture file format is B<libpcap> format, which is also the format used
|
||||
by B<tcpdump> and various other tools. In addition, B<Tethereal> can
|
||||
read capture files from B<snoop> (including B<Shomiti>) and B<atmsnoop>,
|
||||
B<LanAlyzer>, B<Sniffer> (compressed or uncompressed), Microsoft
|
||||
B<Network Monitor>, AIX's B<iptrace>, B<NetXray>, B<Sniffer Pro>,
|
||||
B<EtherPeek> versions 5, 6, and 7 for Macintosh, B<RADCOM>'s WAN/LAN
|
||||
analyzer, B<Lucent/Ascend> router debug output, HP-UX's B<nettl>, the
|
||||
dump output from B<Toshiba's> ISDN routers, the output from B<i4btrace>
|
||||
from the ISDN4BSD project, the output in B<IPLog> format from the Cisco
|
||||
Secure Intrusion Detection System, B<pppd logs> (pppdump format), the
|
||||
output from VMS's B<TCPIPtrace> utility, the text output from the B<DBS
|
||||
Etherwatch> VMS utility, and traffic capture files from Visual Networks'
|
||||
Visual UpTime. There is no need to tell B<Tethereal> what type of file
|
||||
you are reading; it will determine the file type by itself.
|
||||
B<Tethereal> is also capable of reading any of these file formats if
|
||||
they are compressed using gzip. B<Tethereal> recognizes this directly
|
||||
from the file; the '.gz' extension is not required for this purpose.
|
||||
read capture files from B<snoop> and B<atmsnoop>, Shomiti/Finisar
|
||||
B<Surveyor>, Novell B<LANalyzer>, Network General/Network Associates
|
||||
DOS-based B<Sniffer> (compressed or uncompressed), Microsoft B<Network
|
||||
Monitor>, AIX's B<iptrace>, Cinco Networks B<NetXRay>, Network
|
||||
Associates Windows-based B<Sniffer>, AG Group/WildPackets B<EtherPeek>
|
||||
and B<TokenPeek>, B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router
|
||||
debug output, HP-UX's B<nettl>, the dump output from B<Toshiba's> ISDN
|
||||
routers, the output from B<i4btrace> from the ISDN4BSD project, the
|
||||
output in B<IPLog> format from the Cisco Secure Intrusion Detection
|
||||
System, B<pppd logs> (pppdump format), the output from VMS's
|
||||
B<TCPIPtrace> utility, the text output from the B<DBS Etherwatch> VMS
|
||||
utility, and traffic capture files from Visual Networks' Visual UpTime.
|
||||
There is no need to tell B<Tethereal> what type of file you are reading;
|
||||
it will determine the file type by itself. B<Tethereal> is also capable
|
||||
of reading any of these file formats if they are compressed using gzip.
|
||||
B<Tethereal> recognizes this directly from the file; the '.gz' extension
|
||||
is not required for this purpose.
|
||||
|
||||
If the B<-w> flag is not specified, B<Tethereal> prints a decoded form
|
||||
of the packets it captures or reads; otherwise, it writes those packets
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
/* file.c
|
||||
*
|
||||
* $Id: file.c,v 1.78 2002/01/18 00:48:37 guy Exp $
|
||||
* $Id: file.c,v 1.79 2002/01/22 22:38:05 guy Exp $
|
||||
*
|
||||
* Wiretap Library
|
||||
* Copyright (c) 1998 by Gilbert Ramirez <gram@alumni.rice.edu>
|
||||
|
@ -374,11 +374,11 @@ static const struct file_type_info {
|
|||
NULL, NULL },
|
||||
|
||||
/* WTAP_FILE_ETHERPEEK_MAC_V56 */
|
||||
{ "EtherPeek trace (Macintosh V5 & V6)", NULL,
|
||||
{ "EtherPeek/TokenPeek trace (V5 & V6 file format)", NULL,
|
||||
NULL, NULL },
|
||||
|
||||
/* WTAP_FILE_ETHERPEEK_MAC_V7 */
|
||||
{ "EtherPeek trace (Macintosh V7)", NULL,
|
||||
{ "EtherPeek/TokenPeek trace (V7 file format)", NULL,
|
||||
NULL, NULL },
|
||||
|
||||
/* WTAP_FILE_VMS */
|
||||
|
|
Loading…
Reference in New Issue