Diagnostics
Example IPv4 capture filters
n
Capture traffic to and from IP host 192.168.1.1:
ip host 192.168.1.1
n
Capture traffic from IP host 192.168.1.1:
ip src host 192.168.1.1
Capture traffic to IP host 192.168.1.1:
n
ip dst host 192.168.1.1
Capture traffic for a particular IP protocol:
n
ip proto protocol
where protocol is a number in the range of 1 to 255 or one of the following keywords: icmp,
icmp6, igmp, pim, ah, esp, vrrp, udp, or tcp.
Capture traffic to and from a TCP port 80:
n
ip proto tcp and port 80
Capture traffic to UDP port 53:
n
ip proto udp and dst port 53
Capture traffic from UDP port 53:
n
ip proto udp and src port 53
n
Capture to and from IP host 10.0.0.1 but filter out ports 22 and 80:
ip host 10.0.0.1 and not (port 22 or port 80)
Example Ethernet capture filters
n
Capture Ethernet packets to and from a host with a MACaddress of 00:40:D0:13:35:36:
ether host 00:40:D0:13:35:36
n
Capture Ethernet packets from host 00:40:D0:13:35:36:
ether src 00:40:D0:13:35:36:
Capture Ethernet packets to host 00:40:D0:13:35:36:
n
ether dst 00:40:D0:13:35:36
Capture packets from the command line
You can start packet capture at the command line with the
can schedule the network analyzer to run based on a specified event or at a particular time. See
Configure packet capture for the network analyzer
IX20 User Guide
analyzer start
command. Alternatively, you
for information about scheduling packet capturing.
Analyze network traffic
1107