From: "Jeffrey Race" Received: from [192.168.100.201] (HELO mail.2rosenthals.com) by 2rosenthals.com (CommuniGate Pro SMTP 5.1.3) with ESMTP id 1595814 for os2-wireless_users@2rosenthals.com; Fri, 18 Jan 2008 14:42:11 -0500 Received-SPF: none (secmgr-ny.randr: 12.154.55.32 is neither permitted nor denied by domain of attglobal.net) client-ip=12.154.55.32; envelope-from=jrace@attglobal.net; helo=kcout02.prserv.net; Received: from kcout02.prserv.net ([12.154.55.32]) by secmgr-ny.randr with esmtp (Exim 4.43) id 1JFx6G-0005Ae-3n for os2-wireless_users@2rosenthals.com; Fri, 18 Jan 2008 14:42:06 -0500 Received: from 600xjrnew60gb (209-6-203-175.c3-0.smr-ubr1.sbo-smr.ma.cable.rcn.com[209.6.203.175]) by prserv.net (kcout02) with SMTP id <2008011819414120200okfh6e> (Authid: usinet.jrace); Fri, 18 Jan 2008 19:41:42 +0000 X-Originating-IP: [209.6.203.175] To: "OS/2 Wireless Users Mailing List" Date: Fri, 18 Jan 2008 14:41:48 -0500 Priority: Normal X-Mailer: PMMail 2000 Standard (2.20.2717) For Windows 2000 (5.0.2195;4) In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Subject: Re: [OS2Wireless] Logging network activity from VPC X-Spam-Score: 0.0 (/) X-Spam-Report: _SUMMARY_ Message-ID: Well if you can't use IPTRACE from OS/2 you should be able to use a Windows program. See details of OS/2, Linux and Win utilities at page 11 of my Jeffrey Race On Fri, 18 Jan 2008 12:56:45 -0500 (EST), Hakan wrote: >Dave, > >>>To really trace TCP/IP traffic contents you need a sniffer >>>program that can do that. There are quite a few for Windows >>>and Linux, but I am not sure there is something for OS/2. >>> >>>These programs have device-drivers that hook to the >>>network card and can filter out and interpret TCP/IP >>>(or other protocols) packets from there. >>> >>>There are also dedicated LAN-sniffer machines that >>>can be attached to a router or switch that can monitor >>>or trace the traffic on a whole LAN ... >> >>I *think* it depends on VPC using virtual switch or not. In the former >>case a sniff on the host will *not* see any packets, I know 'cos I >>tried it, but the fake NAT the other mode uses ought to show up. >> >>Also bear in mind that if you use say a *nix box on the network to >>sniff then you need a hub and not a switch. Otherwise the sniffer won't >>see anything. There are methods around to sniff switches but it is a >>lot of faffing about. I keep a hub on my network and if I need to sniff >>a box I move it's ethernet cable and the *nix box's one to the hub. > >I was hoping that the 'net traffic originated by the Win application >running in VPC would then be "managed" by the host operating system, >i.e., eCS 1.2MR in my case, and that a program that logs all network >card traffic would log also this traffic. Given that I would not do >anything else on the 'net at the same time, I am hoping that it would >be feasible to figure out what the Win application sends and receives. > > >=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= >This message is sent to you because you are subscribed to > the mailing list . >To unsubscribe, E-mail to: >To switch to the DIGEST mode, E-mail to >To switch to the INDEX mode, E-mail to >Send administrative queries to >To subscribe (new addresses), E-mail to: and reply to the confirmation email. >Web archives are publicly available at: http://lists.2rosenthals.com > >This list is hosted by Rosenthal & Rosenthal, LLC >P.O. Box 281, Deer Park, NY 11729-0281. Non- >electronic communications related to content >contained in these messages should be directed >to the above address. (CAN-SPAM Act of 2003) > >=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= > > > >-- >No virus found in this incoming message. >Checked by AVG Free Edition. >Version: 7.5.516 / Virus Database: 269.19.6/1231 - Release Date: 1/18/2008 11:55 AM >