Avaya G430 Manual page 397

Administering branch gateway
Hide thumbs Also See for G430:
Table of Contents

Advertisement

2. You can use the show capture-buffer hex command to view a hex dump of
Example
The following is an example of the show capture-buffer hex command:
Gxxx-001> show capture-buffer hex
Frame number: 1
Time relative to first frame (D H:M:S:Micro-S): 0, 0:0:0.0
Packet time: 14/01/1970-13:24:55.583598
Frame length: 60 bytes
Capture Length: 60 bytes
00000000:ffff ffff ffff 0040 0da9 4201 0806 0001
00000010:0800 0604 0001 0040 0da9 4201 9531 4e7a
00000020:0000 0000 0000 9531 4e7a 0000 0000 0000
00000030:0000 0000 0000 0000 0000 0000
Frame number: 2
Time relative to first frame (D H:M:S:Micro-S): 0, 0:0:0.76838
Packet time: 14/01/1970-13:24:55.660436
Frame length: 60 bytes
Capture Length: 60 bytes
00000000:ffff ffff ffff 0040 0d8a 5455 0806 0001
00000010:0800 0604 0001 0040 0d8a 5455 9531 4e6a
00000020:0000 0000 0000 9531 4e6a 0000 0000 0000
00000030:0000 0000 0000 0000 0000 0000
Uploading the capture file
Procedure
Once the packet sniffing service is stopped, upload the capture file to a server for
viewing and analysis.
The capture file may contain sensitive information, such as usernames and
passwords of non-encrypted protocols. It is therefore advisable to upload the capture
file over a secure channel – via VPN or using SCP (Secure Copy).
In most cases, you can upload the capture file to a remote server. However, in cases
where the capture file is very large, or you encounter a WAN problem, you can upload
the capture file to an S8300 Server and view it using Tethereal, which is a command-
line version of Ethereal.
Related topics:
Uploading the capture file to a remote server or USB mass storage device
Uploading the capture file to an S8300 Server
Administering Avaya G430 Branch Gateway
the captured packets.
However, for a proper analysis of the captured packets, you should upload the
capture file and analyze it using a sniffer application, as described in the following
sections.
Note:
.......@..B.....
.......@..B..1Nz
.......1Nz......
............
.......@..TU....
.......@..TU.1Nj
.......1Nj......
............
on page 398
Monitoring applications
on page 398
October 2013
397

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents