


NEMESIS-IGMP(1)					  NEMESIS-IGMP(1)


NAME
       nemesis-igmp - IGMP Protocol (The Nemesis Project)

SYNOPSIS
       nemesis-igmp  [-v?]  [-c IGMP-code ] [-d Ethernet-device ]
       [-D destination-IP-address ]  [-F  fragmentation-offset	]
       [-H  source-MAC-address	] [-i IGMP-group-IP-address ] [-I
       IP-ID ] [-M destination-MAC-address ] [-O  IP-options-file
       ] [-p IGMP-type ] [-P payload-file ] [-S source-IP-address
       ] [-t IP-tos ] [-T IP-TTL ]

DESCRIPTION
       The Nemesis Project is designed	to  be	a  command  line-
       based, portable human IP stack for UNIX like systems.  The
       suite is broken down by protocol,  and  should  allow  for
       useful  scripting  of  injected packet streams from simple
       shell scripts.

       nemesis-igmp provides an interface  to  craft  and  inject
       IGMP  packets  allowing the user to specify any portion of
       an IGMP packet as well as lower-level IP	 packet	 informa-
       tion.

IGMP Options
       -c ICMP-code (unused field)
	      Specify the IGMP-code or the value for the one-byte
	      field following the IGMP type field.  This value is
	      normally unused.

       -i IGMP-group-IP-address
	      Specify  the  the	 IGMP-group-IP-address within the
	      IGMP header.

       -p IGMP-type
	      Specify  the  IGMP-type  within  the  IGMP  header.
	      Valid IGMP-type values:

	      17 (IGMP membership query)
	      18 (IGMP V1 membership report)
	      22 (IGMP V2 membership report)
	      23 (IGMP leave group)

	      Only one type may be specified at a time.

       -P payload-file
	      This  will  case	nemesis-igmp to use the specified
	      payload-file as the  payload  when  injecting  IGMP
	      packets.	For packets injected using the raw inter-
	      face (where -d is not used),  the	 maximum  payload
	      size  is	65467  bytes.  For packets injected using
	      the link layer interface (where -d  IS  used),  the
	      maximum  payload	size is 1432 bytes.  Payloads can
	      also be  read  from  stdin  by  specifying  '-P  -'
	      instead of a payload file.



			 9 December 2002			1





NEMESIS-IGMP(1)					  NEMESIS-IGMP(1)


       -v verbose-mode
	      Display the injected packet in human readable form.
	      Use twice to see a hexdump of the injected  packet.

IP OPTIONS
       -D destination-IP-address
	      Specify  the  destination-IP-address  within the IP
	      header.

       -F fragmentation-offset
	      Specify the  fragmentation  offset  within  the  IP
	      header.

       -I IP-ID
	      Specify the IP-ID within the IP header.

       -O IP-options-file
	      This  will  cause nemesis-igmp to use the specified
	      IP-options-file as the options when building the IP
	      header for the injectect packet.	IP options can be
	      up to 40 bytes in length.	 The IP options file must
	      be created manually based upon the desired options.
	      IP options can also be read from stdin by	 specify-
	      ing '-O -' instead of an IP-options-file.

       -S source-IP-address
	      Specify the source-IP-address within the IP header.

       -t IP-TOS
	      Specify the IP-type-of-service (TOS) within the  IP
	      header.  Valid type of service values:

	      2	 (Minimize monetary cost)
	      4	 (Maximize reliability)
	      8	 (Maximize throughput)
	      24 (Minimize delay)

	      Note: type of service values cannot be combined.

       -T IP-TTL
	      IP-time-to-live (TTL) within the IP header.

DATA LINK OPTIONS
       -d Ethernet-device
	      Specify  the  name  of  Ethernet-device to use (eg.
	      ne0, fxp0, eth0).

       -H source-MAC-address
	      Specify the source-MAC-address (XX:XX:XX:XX:XX:XX).

       -M destination-MAC-address
	      Specify	       the	   destintion-MAC-address
	      (XX:XX:XX:XX:XX:XX).




			 9 December 2002			2





NEMESIS-IGMP(1)					  NEMESIS-IGMP(1)


DIAGNOSTICS
       Nemesis-igmp returns 0 on a successful exit, 1 if it exits
       on an error.

BUGS
       Send   concise	and   clearly	written	 bug  reports  to
       jeff@snort.org

AUTHOR
       Jeff Nathan <jeff@snort.org>

       Originally   developed	by   Mark   Grimes   <mark@state-
       ful.net>

SEE ALSO
       nemesis-arp(1), nemesis-dns(1), nemesis-ethernet(1), neme-
       sis-icmp(1),  nemesis-ip(1),   nemesis-ospf(1),	 nemesis-
       rip(1), nemesis-tcp(1), nemesis-udp(1)







































			 9 December 2002			3


