HPE GreenLake Administration
- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- collecting tcpdump through loopback interface
Operating System - HP-UX
1835947
Members
3329
Online
110088
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-17-2008 06:37 PM
03-17-2008 06:37 PM
collecting tcpdump through loopback interface
hi,
I am facing problems while trying to collect the TCPDump on HP-UX machine through the loopback interface lo0. Below is the problem details.
#ifconfig lo0
lo0: flags=849
inet 127.0.0.1 netmask ff000000
#tcpdump -i lo0
tcpdump: stat: /dev/lo0/: No such file or directory
#
Please help me with this issue
I am facing problems while trying to collect the TCPDump on HP-UX machine through the loopback interface lo0. Below is the problem details.
#ifconfig lo0
lo0: flags=849
inet 127.0.0.1 netmask ff000000
#tcpdump -i lo0
tcpdump: stat: /dev/lo0/: No such file or directory
#
Please help me with this issue
1 REPLY 1
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-18-2008 05:40 PM
03-18-2008 05:40 PM
Re: collecting tcpdump through loopback interface
libpcap (what tcpdump uses) uses DLPI to communicate with the interface. the loopback interface on HP-UX is "special" and contained entirely within the TCP/IP stack and so there is not really a "loopback" device with a DLPI interface.
So, you cannot use tcpdump against lo0 on HP-UX.
However, many tools (eg wireshark) can, IIRC read nettl traces, and you can use nettl against lo0.
If you wanted lo0 but not necessarily for 127.0.0.1 traffic...
Similarly, traffic to a system's own IP addresses (other than loopback) is caught by the stack before it goes to the driver for the interface with that IP address assigned. This is a performance optimization. However, you can use ndd to tell the stack to let the interface driver loop the traffic back. This then causes the traffic to go past the promiscuous mode taps and be seen via libpcap.
Getting really far out there...
I've no idea what would happen (or even if it could be done) if someone were to try to "down" lo0 and assign 127.0.0.1 to a logical interface on one of the physical interfaces in the system. I've never tried it and wouldn't suggest it ever be tried anywhere near a production network... It would probably be better to just use nettl for lo0 traffic, and file an enhancement request with the response center to get a way to do libpcap to lo0.
So, you cannot use tcpdump against lo0 on HP-UX.
However, many tools (eg wireshark) can, IIRC read nettl traces, and you can use nettl against lo0.
If you wanted lo0 but not necessarily for 127.0.0.1 traffic...
Similarly, traffic to a system's own IP addresses (other than loopback) is caught by the stack before it goes to the driver for the interface with that IP address assigned. This is a performance optimization. However, you can use ndd to tell the stack to let the interface driver loop the traffic back. This then causes the traffic to go past the promiscuous mode taps and be seen via libpcap.
Getting really far out there...
I've no idea what would happen (or even if it could be done) if someone were to try to "down" lo0 and assign 127.0.0.1 to a logical interface on one of the physical interfaces in the system. I've never tried it and wouldn't suggest it ever be tried anywhere near a production network... It would probably be better to just use nettl for lo0 traffic, and file an enhancement request with the response center to get a way to do libpcap to lo0.
there is no rest for the wicked yet the virtuous have no pillows
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Events and news
Customer resources
© Copyright 2025 Hewlett Packard Enterprise Development LP