Configuring And Analyzing Packet Sniffing; Overview - Avaya G250 Administration

Media gateway
Hide thumbs Also See for G250:
Table of Contents

Advertisement

Table 16: RTP statistics application CLI commands (continued)
Command
rtp-stat
qos-trap-rate-limit
rtp-stat-service
show rtp-stat sessions
show rtp-stat config
show rtp-stat detailed
show rtp-stat summary
show rtp-stat thresholds
show snmp
snmp-server
dynamic-trap-manager
snmp-server host

Configuring and analyzing packet sniffing

This section provides information about the G250/G350 packet sniffing service.

Overview

The G250/G350 packet sniffing service allows you to analyze packets that pass through the
G250/G350's interfaces. Packets are captured to a buffer based on criteria that you specify. The
buffer is then uploaded via FTP to a file that can be analyzed using the Ethereal analysis tool.
The packet sniffing service on the G250/G350 offers several advantages to the network
administrator. Since the capture file is saved in the libpcap format, which is the industry
standard, it is readable both by the S8300's t-ethereal software, and by standard versions of
Ethereal for Unix, Windows, and Linux (see http://www.ethereal.com).
Configuring and analyzing packet sniffing
Description
Configures the QoS trap rate limiter
Enables the RTP statistics application
Displays RTP sessions QoS statistics
Displays the RTP statistics application configuration
Displays a detailed QoS log for a specific RTP session
Displays a summary of the RTP statistics
Displays the configured RTP statistic thresholds
Displays SNMP trap configuration, including trap
destinations
Specifies the parameters of the dynamic trap manager
feature
Configures an SNMP trap destination.
2 of 2
Issue 1.1 June 2005
281

Advertisement

Table of Contents
loading

This manual is also suitable for:

G350

Table of Contents