HP3000-L Archives

June 2009, Week 2

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Jeff Kell <[log in to unmask]>
Reply To:
Jeff Kell <[log in to unmask]>
Date:
Fri, 12 Jun 2009 10:21:49 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (34 lines)
Simpkins, Terry wrote:
> I need to watch network traffic coming in on a specific port.
>
> I want to see the originating IP address of all traffic that comes to
> port 32075.
>
> Will any of the HP native commands/programs do that?  Or do I have to
> use a sniffer, or PC based tool on a spanning port on the switch?

The HP NMTRACE facility may very well be able to do this, but I never
learned the details, other than it is a horribly painful process (from
being walked through one once by the response center) resulting in you
reviewing crude dumps of the results.

A span port would do nicely, or stick a dumb hub between your 3000 and
it's usual network connection and you can sniff from any of the other
hub ports.  Be careful about speed and duplex, as the hub will make it
half-duplex if it isn't already.

Wireshark (formerly ethereal) is hard to beat for capture/analysis, it's
available for linux / mac / windows.  Fire it up on a computer attached
to the span port created above, and filter on "port 32075".  Or if you
just want TCP traffic, "tcp port 32075". 

If the "connectivity" you're trying to decipher involves a
windows/mac/linux thing on the other end, you can also run wireshark
natively on the "client" and capture real-time without the need for any
type of span/sniffer port.

Jeff

* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *

ATOM RSS1 RSS2