Simulating Packets; Packet Sniffing Cli Commands - Avaya G250 Administration

Media gateway
Hide thumbs Also See for G250:
Table of Contents

Advertisement

Note:
Ethernet packets received on a VLAN interface are identified by their VLAN tag.
Note:
However, decrypted IPSec packets received on a VLAN interface are stored with
a dummy header.
G350-001> show capture-dummy-headers
MAC
-----------------
00:00:01:00:00:00
00:00:01:00:00:01
00:00:0a:00:0a:02
00:00:0c:a0:b0:01
00:00:21:20:10:01
00:00:21:40:10:02
00:00:31:00:00:01
Thus in the example appearing in
The Source address of
frame-relay or PPP interface.
The Destination address of
the serial interface on the media module in slot number 4, on port number 1, with channel
group number 2.

Simulating packets

Capture lists support the IP simulate command. Refer to

Packet sniffing CLI commands

The following sections list the various packet sniffing CLI commands, by context.
Description
----------------------------------------------------
Src/dst address of Packet to/from frame-relay or PPP
Decrypted IPSec packet
Interface FastEthernet 10/2
Interface Vlan 1
Interface Serial 2/1:1
Interface Serial 4/1:2
Interface Dialer 1
Figure
33:
indicates that the packet arrived from a
00:00:01:00:00:00
00:00:21:40:10:02
Configuring and analyzing packet sniffing
indicates that the packet is being sent to
Simulating packets
Issue 1.1 June 2005
on page 463.
299

Advertisement

Table of Contents
loading

This manual is also suitable for:

G350

Table of Contents