Wireshark-users: Re: [Wireshark-users] Listening on Port mirrored interface
From: "William Murphy" <[email protected]>
Date: Sun, 18 Feb 2007 19:51:45 -0000
Hi Guy,
   Ya it seems I am really pointing my finger now at the os or card to
find out if I can change this.

Thanks for your input anyway

-----Original Message-----
From: [email protected]
[mailto:[email protected]] On Behalf Of Guy Harris
Sent: 18 February 2007 22:51
To: Community support list for Wireshark
Subject: Re: [Wireshark-users] Listening on Port mirrored interface

William Murphy wrote:
> Luis Ontanon wrote:
>> does snoop work in promiscuous mode?
> Supposedly....

Try snoop on your V440, capturing traffic on the interface connected to 
the switch's monitored port (i.e., the same port on which you tried 
tcpdump and *shark), and see if you see any traffic.

If it doesn't work - as I suspect it won't - this is not an issue with 
Wireshark/TShark, tcpdump, or even with the libpcap library that 
Wireshark/TShark, tcpdump, and a number of other applications use for 
capturing, as snoop doesn't use libpcap; it directly uses the same 
underlying OS mechanism that libpcap does.  It would, instead, be a 
problem with that underlying OS mechanism.

> i have tried with tethereal also and it has same effect.

Tethereal is just the name that TShark used to have, so trying Tethereal

is just reverting to an older version of TShark.
Wireshark-users mailing list
[email protected]
This email and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to whom they are addressed.
If you have received this email in error please notify the system manager.
This footnote also confirms that this email message has been swept for the
presence of computer viruses.