Вы бы посмотрели сами (в консоли)
Код:
>pcapdump -?
pcapdump (pc). Packet capturing.
Usage:
pcapdump Show capture status
pcapdump -start [<interface(s)>] [-size=<value>] [-snaplen=<value>]
[-count=<value>] [-out] [-out-nocap] [-eth=<Ethernet Address>]
[-ethsrc=<Ethernet Address>] [-ethdest=<Ethernet Address>] [-ip=<IP4
Address>] [-ipsrc=<IP4 Address>] [-ipdest=<IP4 Address>]
[-port=<0...65535>] [-srcport=<0...65535>] [-destport=<0...65535>]
[-proto=<0...255>] [-icmp] [-tcp] [-udp] [-promisc]
Start capture
pcapdump -stop [<interface(s)>]
Stop capture
pcapdump -status Show capture status
pcapdump -show [<interface(s)>]
Show a captured packets brief
pcapdump -write [<interface(s)>] [-filename=<String>]
Write the captured packets to disk
pcapdump -wipe Remove all captured packets from memory
pcapdump -cleanup Remove all captured packets, release capture
mode and delete all written capture files
from disk
Option reference:
-cleanup Remove all captured packets, release capture
mode and delete all written capture files from
disk.
-count=<value> Number of packets to capture.
-destport=<0...65535> Destination TCP/UDP port filter.
-eth=<Ethernet Address> Ethernet address filter.
-ethdest=<Ethernet Address> Ethernet destination address filter.
-ethsrc=<Ethernet Address> Ethernet source address filter.
-filename=<String> Filename for capture file.
-icmp ICMP filter.
-ip=<IP4 Address> IP address filter.
-ipdest=<IP4 Address> Destination IP address filter.
-ipsrc=<IP4 Address> Source IP address filter.
-out Realtime packet brief dumped to console.
-out-nocap Unbuffered (not stored in memory) realtime
packet brief dumped to console.
-port=<0...65535> TCP/UDP port filter.
-promisc Set iface in promiscuous mode.
-proto=<0...255> IP protocol filter.
-show Show a captured packets brief.
-size=<value> Size (kb) of buffer to store captured packets in
memory (default 512kb).
-snaplen=<value> Maximum length of each packet to capture.
-srcport=<0...65535> Source TCP/UDP port filter.
-start Start capture.
-status Show capture status.
-stop Stop capture.
-tcp TCP filter.
-udp UDP filter.
-wipe Remove all captured packets from memory.
-write Write the captured packets to disk.
Фактически, чтобы запустить сбор пакетов, надо выполнить команду
Код:
pcapdump -start <интерфейс> <опции фильтрации>
После того, как будет готово, остановите командой
Код:
pcapdump -stop <интерфейс>
А после - выгрузите в файл (в ФС DFL) командой
Код:
pcapdump -write <интерфейс> -filename=<имя файла>
Далее вам нужна утилита pscp из комплекта PuTTY. С ее помощью легко скачать файл на локальный компьютер
Код:
pscp.exe -pw <ваш пароль admin> admin@<адрес DFL>:<имя файла> <имя файла>.pcap
В завершение удаляем "награбленное"
Код:
pcapdump -cleanup
_________________
Хотите хороший девайс? D-Link DFL!
Хотите считать с него трафик?
http://www.raresoftware.ru/products/lan/dfltc
