Debug Igmpsnooping Packet - NETGEAR M6100 Series Reference Manual

Hide thumbs Also See for M6100 Series:
Table of Contents

Advertisement

Note:
To display the debug trace, enable the
Default
disabled
Format
debug fip-snooping packet [{transmit | receive | filter {dst-mac mac-addr |
fip-proto-code code | src-intf unit/slot/port | src-mac mac-addr | vlan
vlan-id}]
Mode
User EXEC
Privileged EXEC
Parameter
Description
dst-mac
If the dst-mac filter option is given, trace output is filtered on matching the given Destination MAC
Address.
fip-proto-code
If the fip-proto-code filter option is given, trace output is filtered on matching the supported types.
The code variable can be in the range 1–15.
src-intf
If the src-intf filter option is given, trace output is filtered on matching the incoming source interface.
src-mac
If the src-mac filter option is given, trace output is filtered on matching the given Source MAC
Address.
vlan vlan-id
If the vlan filter option is given, trace output is filtered on matching the given VLAN ID. The id
variable can be in the range 1–4093.
no debug fip-snooping packet
Use this command in Privileged EXEC mode to disable FIP packet debug trace on transmit
or receive path with different filter options configured.
Format
no debug fip-snooping packet [{transmit | receive | filter {dst-mac mac-addr |
fip-proto-code code | src-intf unit/slot/port | src-mac mac-addr | vlan
vlan-id}]
Mode
User EXEC
Privileged EXEC

debug igmpsnooping packet

This command enables tracing of IGMP Snooping packets received and transmitted by the
switch.
Note:
To display the debug trace, enable the
Default
disabled
Format
debug igmpsnooping packet
Mode
Privileged EXEC
M6100 Series Switches
debug console
debug console
Utility Commands
245
command.
command.

Advertisement

Table of Contents
loading

Table of Contents