Note:
To display the debug trace, enable the
Default
disabled
Format
debug fip-snooping packet [{transmit | receive | filter {dst-mac mac-addr |
fip-proto-code code | src-intf unit/slot/port | src-mac mac-addr | vlan
vlan-id}]
Mode
User EXEC
Privileged EXEC
Parameter
Description
dst-mac
If the dst-mac filter option is given, trace output is filtered on matching the given Destination MAC
Address.
fip-proto-code
If the fip-proto-code filter option is given, trace output is filtered on matching the supported types.
The code variable can be in the range 1–15.
src-intf
If the src-intf filter option is given, trace output is filtered on matching the incoming source interface.
src-mac
If the src-mac filter option is given, trace output is filtered on matching the given Source MAC
Address.
vlan vlan-id
If the vlan filter option is given, trace output is filtered on matching the given VLAN ID. The id
variable can be in the range 1–4093.
no debug fip-snooping packet
Use this command in Privileged EXEC mode to disable FIP packet debug trace on transmit
or receive path with different filter options configured.
Format
no debug fip-snooping packet [{transmit | receive | filter {dst-mac mac-addr |
fip-proto-code code | src-intf unit/slot/port | src-mac mac-addr | vlan
vlan-id}]
Mode
User EXEC
Privileged EXEC
debug igmpsnooping packet
This command enables tracing of IGMP Snooping packets received and transmitted by the
switch.
Note:
To display the debug trace, enable the
Default
disabled
Format
debug igmpsnooping packet
Mode
Privileged EXEC
M6100 Series Switches
debug console
debug console
Utility Commands
245
command.
command.