Avaya BSGX4e User's Guide Page 354

  • Download
  • Add to my manuals
  • Print
  • Page
    / 456
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 353
354 BSGX4e Business Gateway User Guide
NN47928-102 Release 01.01
Limited Capture Example
The following example limits the packet captures to 10 packets on the eth0
interface:
> tcpdump -c 10 -i eth0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 68 bytes
16:16:11.294000 IP 192.168.22.60.1583 > 192.168.134.155.Telnet: . ack
2203345 win 65269
16:16:11.295000 IP 192.168.134.155.Telnet > 192.168.22.60.1583: P
1:148(147) ack 0 win 17520
16:16:11.295000 IP 192.168.134.155.Telnet > 192.168.22.60.1583: P
1:148(147) ack 0 win 17520
16:16:11.495000 IP 192.168.134.155.Telnet > 192.168.22.60.1583: P
148:425(277) ack 0 win 17520
16:16:11.495000 IP 192.168.134.155.Telnet > 192.168.22.60.1583: P
148:425(277) ack 0 win 17520
16:16:11.695000 IP 192.168.134.155.Telnet > 192.168.22.60.1583: P
425:617(192) ack 0 win 17520
16:16:11.696000 IP 192.168.134.155.Telnet > 192.168.22.60.1583: P
425:617(192) ack 0 win 17520
16:16:11.897000 IP 192.168.134.155.Telnet > 192.168.22.60.1583: P
617:809(192) ack 0 win 17520
16:16:11.898000 IP 192.168.134.155.Telnet > 192.168.22.60.1583: P
617:809(192) ack 0 win 17520
16:16:12.097000 IP 192.168.134.155.Telnet > 192.168.22.60.1583: P
809:1001(192) ack 0 win 17520
10 packets captured
10 packets received by filter
0 packets dropped by kernel
D: Prints the list of network interfaces available on the system and
on which interfaces tcpdump can capture packets.
The number and interface name are printed, possibly followed
by a text description of the interface.
The interface name or number can be supplied to the -i option,
which specifies on which interface to capture packets.
e: Prints the link-level header on each dump line.
f: Prints foreign Internet addresses numerically, instead of
symbolically
S: Prints absolute TCP sequence numbers.
u: Prints undecoded Network File System (NFS) handles.
L: Lists the known data link types for the interface and the exit.
R: Assumes ESP packets are based on old specifications. (RFC1825
to RFC1829)
Table 116. TCPDump Options (continued)
Option Description
Page view 353
1 2 ... 349 350 351 352 353 354 355 356 357 358 359 ... 455 456

Comments to this Manuals

No comments