Solved

3c509 Promiscuous Mode

Posted on 2004-03-21
3
167 Views
Last Modified: 2010-05-18
I understand that the 3c509 can be put into promiscuous mode.  How do I get this capability or make this change?
0
Comment
Question by:Cindy-Costanza
3 Comments
 
LVL 67

Accepted Solution

by:
sirbounty earned 500 total points
ID: 10646165
Not according to Intel: http://www.intel.com/anypoint/support/Incompatible_BRadapters.htm

From 3com's site:
>>>
Note: This document was written for the 3C589, but can be applied to 3C5x9, 3C59x and 3C90x families as well.


Question: I need a promiscuous mode driver to use Novell's LANalyzer. Where can I obtain such a driver?


Answer: The EtherLink III MLID (3C589.COM) supports promiscuous mode operation. However, the adapter will not report bad packets. The Parallel Tasking technology incorporated into the EtherLink III family of adapters increases network performance by discarding bad packets. If you must capture bad packets, it is recommended that an EtherLink III adapter not be used.


Due to an architecture change in the ODI standard, MLIDs dated later than October of 1994 require an extra shim to be loaded to enabler the "Receive Monitor Stack". This file can be downloaded from Novell's download sites and the file name is VLMUP4.EXE. The driver for promiscuous mode operation is called RXMONSTK.COM and it is included with VLMUP4.EXE. An example load order to enable promiscuous mode operation goes as follows:


LSL.COM
RXMONSTK.COM
3C589.COM
IPXODI.COM
VLM.EXE


The symptom that indicates the need for RXMONSTK is the application (such as LANalyzer) will load, but does not appear to be receiving any packets.
<<<
http://support.3com.com/infodeli/inotes/techtran/24b2_5ea.htm

0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to complete an 'Apply Security' to a drive 25 100
Application deployments and asset inventory 1 45
Fastest SSD 10 65
Two systems one speaker system re-question 29 70
In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now