On Apr 20, 2006, at 7:50 PM, Kevin Kinsey wrote:

jekillen wrote:
(cut)
Not without assistance, most likely ;-).

One link is to the inside network and the other is to static ip address
that is assigned but as yet has not been configured on the router to
receive requests from outside.
I admit, I am learning at this point. I've been watching the router security log and have seen just in the last week (as long as it has had the static ip's assigned)
several hundred broadcast amplification attempts blocked.
And I have been reading my root mail and am now interested in a tutorial or
some published specifics about how to interpret these messages.
I'm running v6 release on AMD64. I'm setting up to host a web site.
thanks in advance.
JK
PS in the mean time I will be going through what I have already.


Generally, "promiscuous mode" is pretty much what you
have guessed ... used in network analysis.  Software such
as bpf(4), and higher level apps such as netgraph, tcpdump,
ethereal, etc. use "promiscuous mode" to grab network traffic.
So, the first thing you ask yourself is, have I (or anyone allowed
to be "root") used any of this type of software?

There might be other explanations, but I'm not suitably
prepared to address them.

Kevin Kinsey
Actually I neglected to mention that I had used tcpdump on this machine
but not a 3 AM in the morning. But that is probably what it is all about.
JK
--
The idle mind knows not what it is it wants.
                -- Quintus Ennius

_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to