diff options
author | guy <guy@f5534014-38df-0310-8fa8-9805f1628bb7> | 2002-01-29 09:45:58 +0000 |
---|---|---|
committer | guy <guy@f5534014-38df-0310-8fa8-9805f1628bb7> | 2002-01-29 09:45:58 +0000 |
commit | 87859a653d416075359509af21692f78d896ddfa (patch) | |
tree | aee45c0a61eaedb10e87afe5ffa3f90d2f08d731 /doc | |
parent | 0be04089580b08e9e65fb8bc0f1104a223c75556 (diff) |
Untested support for AiroPeek captures.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@4619 f5534014-38df-0310-8fa8-9805f1628bb7
Diffstat (limited to 'doc')
-rw-r--r-- | doc/editcap.pod | 25 | ||||
-rw-r--r-- | doc/ethereal.pod.template | 2 | ||||
-rw-r--r-- | doc/mergecap.pod | 25 | ||||
-rw-r--r-- | doc/tethereal.pod.template | 26 |
4 files changed, 40 insertions, 38 deletions
diff --git a/doc/editcap.pod b/doc/editcap.pod index e2bb90102c..8c3d23dde1 100644 --- a/doc/editcap.pod +++ b/doc/editcap.pod @@ -28,18 +28,19 @@ and B<atmsnoop>, Shomiti/Finisar B<Surveyor>, Novell B<LANalyzer>, Network General/Network Associates DOS-based B<Sniffer> (compressed or uncompressed), Microsoft B<Network Monitor>, AIX's B<iptrace>, Cinco Networks B<NetXRay>, Network Associates Windows-based B<Sniffer>, AG -Group/WildPackets B<EtherPeek> and B<TokenPeek>, B<RADCOM>'s WAN/LAN -analyzer, B<Lucent/Ascend> router debug output, HP-UX's B<nettl>, the -dump output from B<Toshiba's> ISDN routers, the output from B<i4btrace> -from the ISDN4BSD project, the output in B<IPLog> format from the Cisco -Secure Intrusion Detection System, B<pppd logs> (pppdump format), the -output from VMS's B<TCPIPtrace> utility, the text output from the B<DBS -Etherwatch> VMS utility, and traffic capture files from Visual Networks' -Visual UpTime. There is no need to tell B<Editcap> what type of file -you are reading; it will determine the file type by itself. B<Editcap> -is also capable of reading any of these file formats if they are -compressed using gzip. B<Editcap> recognizes this directly from the -file; the '.gz' extension is not required for this purpose. +Group/WildPackets B<EtherPeek>/B<TokenPeek>/B<AiroPeek>, B<RADCOM>'s +WAN/LAN analyzer, B<Lucent/Ascend> router debug output, HP-UX's +B<nettl>, the dump output from B<Toshiba's> ISDN routers, the output +from B<i4btrace> from the ISDN4BSD project, the output in B<IPLog> +format from the Cisco Secure Intrusion Detection System, B<pppd logs> +(pppdump format), the output from VMS's B<TCPIPtrace> utility, the text +output from the B<DBS Etherwatch> VMS utility, and traffic capture files +from Visual Networks' Visual UpTime. There is no need to tell +B<Editcap> what type of file you are reading; it will determine the file +type by itself. B<Editcap> is also capable of reading any of these file +formats if they are compressed using gzip. B<Editcap> recognizes this +directly from the file; the '.gz' extension is not required for this +purpose. By default, it writes the capture file in B<libpcap> format, and writes all of the packets in the capture file to the output file. The B<-F> diff --git a/doc/ethereal.pod.template b/doc/ethereal.pod.template index c234739fd8..28e54260da 100644 --- a/doc/ethereal.pod.template +++ b/doc/ethereal.pod.template @@ -43,7 +43,7 @@ from B<snoop> and B<atmsnoop>, Shomiti/Finisar B<Surveyor>, Novell B<LANalyzer>, Network General/Network Associates DOS-based B<Sniffer> (compressed or uncompressed), Microsoft B<Network Monitor>, AIX's B<iptrace>, Cinco Networks B<NetXRay>, Network Associates Windows-based -B<Sniffer>, AG Group/WildPackets B<EtherPeek> and B<TokenPeek>, +B<Sniffer>, AG Group/WildPackets B<EtherPeek>/B<TokenPeek>/B<AiroPeek>, B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router debug output, HP-UX's B<nettl>, the dump output from B<Toshiba's> ISDN routers, the output from B<i4btrace> from the ISDN4BSD project, the output in diff --git a/doc/mergecap.pod b/doc/mergecap.pod index 57345dea12..afe8e273a7 100644 --- a/doc/mergecap.pod +++ b/doc/mergecap.pod @@ -25,18 +25,19 @@ B<atmsnoop>, Shomiti/Finisar B<Surveyor>, Novell B<LANalyzer>, Network General/Network Associates DOS-based B<Sniffer> (compressed or uncompressed), Microsoft B<Network Monitor>, AIX's B<iptrace>, Cinco Networks B<NetXRay>, Network Associates Windows-based B<Sniffer>, AG -Group/WildPackets B<EtherPeek> and B<TokenPeek>, B<RADCOM>'s WAN/LAN -analyzer, B<Lucent/Ascend> router debug output, HP-UX's B<nettl>, the -dump output from B<Toshiba's> ISDN routers, the output from B<i4btrace> -from the ISDN4BSD project, the output in B<IPLog> format from the Cisco -Secure Intrusion Detection System, B<pppd logs> (pppdump format), the -output from VMS's B<TCPIPtrace> utility, the text output from the B<DBS -Etherwatch> VMS utility, and traffic capture files from Visual Networks' -Visual UpTime. There is no need to tell B<Mergecap> what type of file -you are reading; it will determine the file type by itself. B<Mergecap> -is also capable of reading any of these file formats if they are -compressed using gzip. B<Mergecap> recognizes this directly from the -file; the '.gz' extension is not required for this purpose. +Group/WildPackets B<EtherPeek>/B<TokenPeek>/B<AiroPeek>, B<RADCOM>'s +WAN/LAN analyzer, B<Lucent/Ascend> router debug output, HP-UX's +B<nettl>, the dump output from B<Toshiba's> ISDN routers, the output +from B<i4btrace> from the ISDN4BSD project, the output in B<IPLog> +format from the Cisco Secure Intrusion Detection System, B<pppd logs> +(pppdump format), the output from VMS's B<TCPIPtrace> utility, the text +output from the B<DBS Etherwatch> VMS utility, and traffic capture files +from Visual Networks' Visual UpTime. There is no need to tell +B<Mergecap> what type of file you are reading; it will determine the +file type by itself. B<Mergecap> is also capable of reading any of +these file formats if they are compressed using gzip. B<Mergecap> +recognizes this directly from the file; the '.gz' extension is not +required for this purpose. By default, it writes the capture file in B<libpcap> format, and writes all of the packets in both input capture files to the output file. The diff --git a/doc/tethereal.pod.template b/doc/tethereal.pod.template index 90d7b26846..8814e260a8 100644 --- a/doc/tethereal.pod.template +++ b/doc/tethereal.pod.template @@ -41,19 +41,19 @@ read capture files from B<snoop> and B<atmsnoop>, Shomiti/Finisar B<Surveyor>, Novell B<LANalyzer>, Network General/Network Associates DOS-based B<Sniffer> (compressed or uncompressed), Microsoft B<Network Monitor>, AIX's B<iptrace>, Cinco Networks B<NetXRay>, Network -Associates Windows-based B<Sniffer>, AG Group/WildPackets B<EtherPeek> -and B<TokenPeek>, B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router -debug output, HP-UX's B<nettl>, the dump output from B<Toshiba's> ISDN -routers, the output from B<i4btrace> from the ISDN4BSD project, the -output in B<IPLog> format from the Cisco Secure Intrusion Detection -System, B<pppd logs> (pppdump format), the output from VMS's -B<TCPIPtrace> utility, the text output from the B<DBS Etherwatch> VMS -utility, and traffic capture files from Visual Networks' Visual UpTime. -There is no need to tell B<Tethereal> what type of file you are reading; -it will determine the file type by itself. B<Tethereal> is also capable -of reading any of these file formats if they are compressed using gzip. -B<Tethereal> recognizes this directly from the file; the '.gz' extension -is not required for this purpose. +Associates Windows-based B<Sniffer>, AG Group/WildPackets +B<EtherPeek>/B<TokenPeek>/B<AiroPeek>, B<RADCOM>'s WAN/LAN analyzer, +B<Lucent/Ascend> router debug output, HP-UX's B<nettl>, the dump output +from B<Toshiba's> ISDN routers, the output from B<i4btrace> from the +ISDN4BSD project, the output in B<IPLog> format from the Cisco Secure +Intrusion Detection System, B<pppd logs> (pppdump format), the output +from VMS's B<TCPIPtrace> utility, the text output from the B<DBS +Etherwatch> VMS utility, and traffic capture files from Visual Networks' +Visual UpTime. There is no need to tell B<Tethereal> what type of file +you are reading; it will determine the file type by itself. +B<Tethereal> is also capable of reading any of these file formats if +they are compressed using gzip. B<Tethereal> recognizes this directly +from the file; the '.gz' extension is not required for this purpose. If the B<-w> flag is not specified, B<Tethereal> prints a decoded form of the packets it captures or reads; otherwise, it writes those packets |