Analyzing The Capture File - Avaya G250 Administration

Media gateway
Hide thumbs Also See for G250:
Table of Contents

Advertisement

9. Optionally use the show upload status 10 command to view upload status. For
example:
G350-001(super)# show upload status 10
Module #10
===========
Module
Source file
Destination file : pub/capfile.cap
Host
Running state
Failure display
Last warning

Analyzing the capture file

The uploaded capture file is in libpcap format and can therefore be viewed by most sniffer
applications, including tcpdump, Ethereal and Tethereal.
If you uploaded the capture file to an S3800 server, view the file using Tethereal, a
command-line version of Ethereal available on the S3800. See the Tethereal man pages for
more information about the Tethereal application.
If you uploaded the capture file to a remote server, you can view the file using the industry
standard Ethereal application. The latest version of Ethereal for Windows, Linux, UNIX, and
other platforms can be downloaded from http://www.ethereal.com.
Note:
Ethereal allows you to create filter expressions to filter the packets in the capture
Note:
file and display desired files only. For example, you can display only packets with
a specific source address, or only those received from a specific interface. See
Identifying the interface
The following figure shows a sample Ethereal screen.
: 10
: sniffer
: 149.49.43.96
: Executing
: (null)
: No-warning
on page 298.
Configuring and analyzing packet sniffing
Issue 1.1 June 2005
297

Advertisement

Table of Contents
loading

This manual is also suitable for:

G350

Table of Contents