Skip to main content


fingerprint rejection summary — display details related to the current inbound connection


fingerprint rejection summary


In order to use this command, you must have the Policy Tools suite installed. Passive OS fingerprinting is installed as part of the Policy Tools suite. This functionality yields information about inbound connections. For more information about installing the Policy Tools suite see “Installing Partner Modules”.

This command displays the genre, detail, receptions and rejections related to the current inbound connection.

Passive operating system fingerprinting runs as a daemon that Momentum communicates with over a socket, /tmp/p0fd. This daemon is started using the command: /etc/init.d/ecp0f start . The fingerprints are all included in the ecp0f package and are located here: /opt/msys/ecelerity/3rdParty/etc/p0f/. These fingerprints do not need to be modified.

See Also

Was this page helpful?