.TH ipmon 8 .SH NAME ipmon \- monitors /dev/ipl for logged packets .SH SYNOPSIS .B ipmon [ .B \-sfN ] [ ] .SH DESCRIPTION .LP \fBipmon\fP opens \fB/dev/ipl\fP for reading and awaits data to be saved from the packet filter. The binary data read from the device is reprinted in human readable for, however, IP#'s are not mapped back to hostnames, nor are ports mapped back to service names. The output goes to standard output by default or a filename, if given on the command line. Should the \fB\-s\fP option be used, output is instead sent to \fBsyslogd(8)\fP. Messages sent via syslog have the day, month and year removed from the message, but the time (including microseconds), as recorded in the log, is still included. .SH OPTIONS .TP .B \-s Packet information read in will be sent through syslogd rather than saved to a file. The following levels are used: .IP .B LOG_INFO \- packets logged using the "log" keyword as the action rather than pass or block. .IP .B LOG_NOTICE \- packets logged which are also passed .IP .B LOG_WARNING \- packets logged which are also blocked .IP .B LOG_ERR \- packets which have been logged and which can be considered "short". .TP .B \-f Flush the current packet log buffer. The number of bytes flushed is displayed, even should the result be zero. .TP .B \-N IP addresses and port numbers will be mapped, where possible, back into hostnames and service names. .SH DIAGNOSTICS \fBipmon\fP expects data that it reads to be consistent with how it should be saved and will abort if it fails an assertion which detects an anomaly in the recorded data. .SH FILES /dev/ipl .SH SEE ALSO ipf(1), ipfstat(1) .SH BUGS