Note:
Ethernet packets received on a VLAN interface are identified by their VLAN tag.
Note:
However, decrypted IPSec packets received on a VLAN interface are stored with
a dummy header.
G350-001> show capture-dummy-headers
MAC
-----------------
00:00:01:00:00:00
00:00:01:00:00:01
00:00:0a:00:0a:02
00:00:0c:a0:b0:01
00:00:21:20:10:01
00:00:21:40:10:02
00:00:31:00:00:01
Thus in the example appearing in
The Source address of
●
frame-relay or PPP interface.
The Destination address of
●
the serial interface on the media module in slot number 4, on port number 1, with channel
group number 2.
Simulating packets
Capture lists support the IP simulate command. Refer to
Packet sniffing CLI commands
The following sections list the various packet sniffing CLI commands, by context.
Description
----------------------------------------------------
Src/dst address of Packet to/from frame-relay or PPP
Decrypted IPSec packet
Interface FastEthernet 10/2
Interface Vlan 1
Interface Serial 2/1:1
Interface Serial 4/1:2
Interface Dialer 1
Figure
33:
indicates that the packet arrived from a
00:00:01:00:00:00
00:00:21:40:10:02
Configuring and analyzing packet sniffing
indicates that the packet is being sent to
Simulating packets
Issue 1.1 June 2005
on page 463.
299