Solved

3c509 Promiscuous Mode

Posted on 2004-03-21
3
171 Views
Last Modified: 2010-05-18
I understand that the 3c509 can be put into promiscuous mode.  How do I get this capability or make this change?
0
Comment
Question by:Cindy-Costanza
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 67

Accepted Solution

by:
sirbounty earned 500 total points
ID: 10646165
Not according to Intel: http://www.intel.com/anypoint/support/Incompatible_BRadapters.htm

From 3com's site:
>>>
Note: This document was written for the 3C589, but can be applied to 3C5x9, 3C59x and 3C90x families as well.


Question: I need a promiscuous mode driver to use Novell's LANalyzer. Where can I obtain such a driver?


Answer: The EtherLink III MLID (3C589.COM) supports promiscuous mode operation. However, the adapter will not report bad packets. The Parallel Tasking technology incorporated into the EtherLink III family of adapters increases network performance by discarding bad packets. If you must capture bad packets, it is recommended that an EtherLink III adapter not be used.


Due to an architecture change in the ODI standard, MLIDs dated later than October of 1994 require an extra shim to be loaded to enabler the "Receive Monitor Stack". This file can be downloaded from Novell's download sites and the file name is VLMUP4.EXE. The driver for promiscuous mode operation is called RXMONSTK.COM and it is included with VLMUP4.EXE. An example load order to enable promiscuous mode operation goes as follows:


LSL.COM
RXMONSTK.COM
3C589.COM
IPXODI.COM
VLM.EXE


The symptom that indicates the need for RXMONSTK is the application (such as LANalyzer) will load, but does not appear to be receiving any packets.
<<<
http://support.3com.com/infodeli/inotes/techtran/24b2_5ea.htm

0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question