aboutsummaryrefslogtreecommitdiffstats
path: root/doc
diff options
context:
space:
mode:
authorguy <guy@f5534014-38df-0310-8fa8-9805f1628bb7>2002-01-29 09:45:58 +0000
committerguy <guy@f5534014-38df-0310-8fa8-9805f1628bb7>2002-01-29 09:45:58 +0000
commit87859a653d416075359509af21692f78d896ddfa (patch)
treeaee45c0a61eaedb10e87afe5ffa3f90d2f08d731 /doc
parent0be04089580b08e9e65fb8bc0f1104a223c75556 (diff)
Untested support for AiroPeek captures.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@4619 f5534014-38df-0310-8fa8-9805f1628bb7
Diffstat (limited to 'doc')
-rw-r--r--doc/editcap.pod25
-rw-r--r--doc/ethereal.pod.template2
-rw-r--r--doc/mergecap.pod25
-rw-r--r--doc/tethereal.pod.template26
4 files changed, 40 insertions, 38 deletions
diff --git a/doc/editcap.pod b/doc/editcap.pod
index e2bb90102c..8c3d23dde1 100644
--- a/doc/editcap.pod
+++ b/doc/editcap.pod
@@ -28,18 +28,19 @@ and B<atmsnoop>, Shomiti/Finisar B<Surveyor>, Novell B<LANalyzer>,
Network General/Network Associates DOS-based B<Sniffer> (compressed or
uncompressed), Microsoft B<Network Monitor>, AIX's B<iptrace>, Cinco
Networks B<NetXRay>, Network Associates Windows-based B<Sniffer>, AG
-Group/WildPackets B<EtherPeek> and B<TokenPeek>, B<RADCOM>'s WAN/LAN
-analyzer, B<Lucent/Ascend> router debug output, HP-UX's B<nettl>, the
-dump output from B<Toshiba's> ISDN routers, the output from B<i4btrace>
-from the ISDN4BSD project, the output in B<IPLog> format from the Cisco
-Secure Intrusion Detection System, B<pppd logs> (pppdump format), the
-output from VMS's B<TCPIPtrace> utility, the text output from the B<DBS
-Etherwatch> VMS utility, and traffic capture files from Visual Networks'
-Visual UpTime. There is no need to tell B<Editcap> what type of file
-you are reading; it will determine the file type by itself. B<Editcap>
-is also capable of reading any of these file formats if they are
-compressed using gzip. B<Editcap> recognizes this directly from the
-file; the '.gz' extension is not required for this purpose.
+Group/WildPackets B<EtherPeek>/B<TokenPeek>/B<AiroPeek>, B<RADCOM>'s
+WAN/LAN analyzer, B<Lucent/Ascend> router debug output, HP-UX's
+B<nettl>, the dump output from B<Toshiba's> ISDN routers, the output
+from B<i4btrace> from the ISDN4BSD project, the output in B<IPLog>
+format from the Cisco Secure Intrusion Detection System, B<pppd logs>
+(pppdump format), the output from VMS's B<TCPIPtrace> utility, the text
+output from the B<DBS Etherwatch> VMS utility, and traffic capture files
+from Visual Networks' Visual UpTime. There is no need to tell
+B<Editcap> what type of file you are reading; it will determine the file
+type by itself. B<Editcap> is also capable of reading any of these file
+formats if they are compressed using gzip. B<Editcap> recognizes this
+directly from the file; the '.gz' extension is not required for this
+purpose.
By default, it writes the capture file in B<libpcap> format, and writes
all of the packets in the capture file to the output file. The B<-F>
diff --git a/doc/ethereal.pod.template b/doc/ethereal.pod.template
index c234739fd8..28e54260da 100644
--- a/doc/ethereal.pod.template
+++ b/doc/ethereal.pod.template
@@ -43,7 +43,7 @@ from B<snoop> and B<atmsnoop>, Shomiti/Finisar B<Surveyor>, Novell
B<LANalyzer>, Network General/Network Associates DOS-based B<Sniffer>
(compressed or uncompressed), Microsoft B<Network Monitor>, AIX's
B<iptrace>, Cinco Networks B<NetXRay>, Network Associates Windows-based
-B<Sniffer>, AG Group/WildPackets B<EtherPeek> and B<TokenPeek>,
+B<Sniffer>, AG Group/WildPackets B<EtherPeek>/B<TokenPeek>/B<AiroPeek>,
B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router debug output,
HP-UX's B<nettl>, the dump output from B<Toshiba's> ISDN routers, the
output from B<i4btrace> from the ISDN4BSD project, the output in
diff --git a/doc/mergecap.pod b/doc/mergecap.pod
index 57345dea12..afe8e273a7 100644
--- a/doc/mergecap.pod
+++ b/doc/mergecap.pod
@@ -25,18 +25,19 @@ B<atmsnoop>, Shomiti/Finisar B<Surveyor>, Novell B<LANalyzer>, Network
General/Network Associates DOS-based B<Sniffer> (compressed or
uncompressed), Microsoft B<Network Monitor>, AIX's B<iptrace>, Cinco
Networks B<NetXRay>, Network Associates Windows-based B<Sniffer>, AG
-Group/WildPackets B<EtherPeek> and B<TokenPeek>, B<RADCOM>'s WAN/LAN
-analyzer, B<Lucent/Ascend> router debug output, HP-UX's B<nettl>, the
-dump output from B<Toshiba's> ISDN routers, the output from B<i4btrace>
-from the ISDN4BSD project, the output in B<IPLog> format from the Cisco
-Secure Intrusion Detection System, B<pppd logs> (pppdump format), the
-output from VMS's B<TCPIPtrace> utility, the text output from the B<DBS
-Etherwatch> VMS utility, and traffic capture files from Visual Networks'
-Visual UpTime. There is no need to tell B<Mergecap> what type of file
-you are reading; it will determine the file type by itself. B<Mergecap>
-is also capable of reading any of these file formats if they are
-compressed using gzip. B<Mergecap> recognizes this directly from the
-file; the '.gz' extension is not required for this purpose.
+Group/WildPackets B<EtherPeek>/B<TokenPeek>/B<AiroPeek>, B<RADCOM>'s
+WAN/LAN analyzer, B<Lucent/Ascend> router debug output, HP-UX's
+B<nettl>, the dump output from B<Toshiba's> ISDN routers, the output
+from B<i4btrace> from the ISDN4BSD project, the output in B<IPLog>
+format from the Cisco Secure Intrusion Detection System, B<pppd logs>
+(pppdump format), the output from VMS's B<TCPIPtrace> utility, the text
+output from the B<DBS Etherwatch> VMS utility, and traffic capture files
+from Visual Networks' Visual UpTime. There is no need to tell
+B<Mergecap> what type of file you are reading; it will determine the
+file type by itself. B<Mergecap> is also capable of reading any of
+these file formats if they are compressed using gzip. B<Mergecap>
+recognizes this directly from the file; the '.gz' extension is not
+required for this purpose.
By default, it writes the capture file in B<libpcap> format, and writes
all of the packets in both input capture files to the output file. The
diff --git a/doc/tethereal.pod.template b/doc/tethereal.pod.template
index 90d7b26846..8814e260a8 100644
--- a/doc/tethereal.pod.template
+++ b/doc/tethereal.pod.template
@@ -41,19 +41,19 @@ read capture files from B<snoop> and B<atmsnoop>, Shomiti/Finisar
B<Surveyor>, Novell B<LANalyzer>, Network General/Network Associates
DOS-based B<Sniffer> (compressed or uncompressed), Microsoft B<Network
Monitor>, AIX's B<iptrace>, Cinco Networks B<NetXRay>, Network
-Associates Windows-based B<Sniffer>, AG Group/WildPackets B<EtherPeek>
-and B<TokenPeek>, B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router
-debug output, HP-UX's B<nettl>, the dump output from B<Toshiba's> ISDN
-routers, the output from B<i4btrace> from the ISDN4BSD project, the
-output in B<IPLog> format from the Cisco Secure Intrusion Detection
-System, B<pppd logs> (pppdump format), the output from VMS's
-B<TCPIPtrace> utility, the text output from the B<DBS Etherwatch> VMS
-utility, and traffic capture files from Visual Networks' Visual UpTime.
-There is no need to tell B<Tethereal> what type of file you are reading;
-it will determine the file type by itself. B<Tethereal> is also capable
-of reading any of these file formats if they are compressed using gzip.
-B<Tethereal> recognizes this directly from the file; the '.gz' extension
-is not required for this purpose.
+Associates Windows-based B<Sniffer>, AG Group/WildPackets
+B<EtherPeek>/B<TokenPeek>/B<AiroPeek>, B<RADCOM>'s WAN/LAN analyzer,
+B<Lucent/Ascend> router debug output, HP-UX's B<nettl>, the dump output
+from B<Toshiba's> ISDN routers, the output from B<i4btrace> from the
+ISDN4BSD project, the output in B<IPLog> format from the Cisco Secure
+Intrusion Detection System, B<pppd logs> (pppdump format), the output
+from VMS's B<TCPIPtrace> utility, the text output from the B<DBS
+Etherwatch> VMS utility, and traffic capture files from Visual Networks'
+Visual UpTime. There is no need to tell B<Tethereal> what type of file
+you are reading; it will determine the file type by itself.
+B<Tethereal> is also capable of reading any of these file formats if
+they are compressed using gzip. B<Tethereal> recognizes this directly
+from the file; the '.gz' extension is not required for this purpose.
If the B<-w> flag is not specified, B<Tethereal> prints a decoded form
of the packets it captures or reads; otherwise, it writes those packets