0% found this document useful (0 votes)
19 views4 pages

Sniffer Debug

The document contains a series of commands for debugging and network diagnostics, including enabling and disabling debug modes, setting flow filters, and executing ping and traceroute commands. It also includes instructions for sniffing packets with various filters and options. Additionally, there are sections dedicated to traffic shaping and DNS queries, demonstrating a comprehensive approach to network troubleshooting.

Uploaded by

Esteban Mongui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

Sniffer Debug

The document contains a series of commands for debugging and network diagnostics, including enabling and disabling debug modes, setting flow filters, and executing ping and traceroute commands. It also includes instructions for sniffing packets with various filters and options. Additionally, there are sections dedicated to traffic shaping and DNS queries, demonstrating a comprehensive approach to network troubleshooting.

Uploaded by

Esteban Mongui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

\\*============= Debug ==============*//

diagnose debug disable


diagnose debug flow trace stop
diagnose debug flow filter clear
diagnose debug reset
diagn debug enable
diagnose debug flow filter addr 10.34.111.2
diag debug console timestamp enable
diagnose debug flow show function-name enable
diagno deb flow trace start 10

diagnose debug disable


diagnose debug flow trace stop
diagnose debug flow filter clear
diagnose debug reset
diagn debug enable
diagnose debug flow filter addr 10.222.1.248 10.40.0.134 and
diag debug console timestamp enable
diagnose debug flow show function-name enable
diagno deb flow trace start 10

diagnose debug disable


diagnose debug flow trace stop
diagnose debug flow filter clear
diagnose debug reset
diagn debug enable
diagnose debug flow filter addr 10.150.4.6
diagnose debug flow filter daddr 10.220.0.151
diagnose debug flow show function-name enable
diagno deb flow trace start 100

diagnose debug disable


diagnose debug flow trace stop
diagnose debug flow filter clear
diagnose debug reset
diagn debug enable
diagnose debug flow filter port 80
diagnose debug flow filter addr 10.14.24.64
diagnose debug flow show function-name enable
diagno deb flow trace start 100

10.75.0.2
10.39.69.110
execute ping-options source 10.38.14.97
execute ping-options repeat-count 100
execute ping 10.220.0.183

execute traceroute-options source 10.34.89.21


execute traceroute 10.220.0.183

---------------------------------------

diagnose debug flow filter daddr 52.123.129.14


diagnose debug flow filter daddr 170.17.4.22
diagnose debug flow show function-name enable
diagno deb flow trace start 10
diagnose debug disable
diagnose debug flow trace stop
diagnose debug flow filter clear
diagnose debug reset
diagn debug enable
diagnose debug flow filter daddr 172.16.3.114
diagnose debug flow show function-name enable
diagno deb flow trace start 20

diagnose debug disable


diagnose debug flow trace stop
diagnose debug flow filter clear
diagnose debug reset
diagn debug enable
diagnose debug flow filter daddr 96.45.46.46
diagnose debug flow filter saddr 152.200.134.71
diagnose debug flow show function-name enable
diagno deb flow trace start 50

diagnose debug disable


diagnose debug flow trace stop
diagnose debug flow filter clear
diagnose debug reset
diagn debug enable
diagnose debug flow filter saddr 10.58.0.165
diagnose debug flow filter daddr 10.180.28.5
diagnose debug flow show function-name enable
diagno deb flow trace start 10

diagnose debug disable


diagnose debug flow trace stop
diagnose debug flow filter clear
diagnose debug reset
diagn debug enable
diagnose debug flow filter port 12433
diagnose debug flow show function-name enable
diagno deb flow trace start 10

\\*============== iprope and port ================*//


diagnose debug disable
diagnose debug flow trace stop
diagnose debug flow filter clear
diagnose debug reset
diagn debug enable
diagnose debug flow filter daddr 10.227.3.2
diagnose debug flow filter port 9051
diagnose debug flow show function-name enable
diagnose debug flow show iprope enable
diagno deb flow trace start 10

diagnose debug disable


diagnose debug flow trace stop
diagnose debug flow filter clear
diagnose debug reset
diagn debug enable
diagnose debug flow filter addr 172.16.3.151
diagnose debug flow show function-name enable
diagnose debug flow show iprope enable
diagno deb flow trace start 20

https://magic3.oohrd.com

policy-4294967295 is matched, act-drop

\\*================= traffic Shaping ==============*//


diagnose debug disable
diagnose debug flow trace stop
diagnose debug flow filter clear
diagnose debug reset
diag debug enable
diag debug flow filter saddr 10.25.225.40
diag debug console timestamp enable
diag debug flow show iprope enable
diag debug flow show function-name enable
diag debug flow trace start 10
diag debug enable
\\*============= Sniffer ============*//
diagnose sniffer packet any icmp 4
diagnose sniffer packet any "dst host 10.34.111.2" 4 0 l

diagnose sniffer packet any '(ether[6:4]=0x788c77a1) and (ether[10:2]=0x2220)' 4 0


l // confirmada

diagnose sniffer packet any "(ether[6:4]=0xa852d471) and (ether[10:2]=0xa680)"


//src
diagnose sniffer packet any "((ether[0:4]=0xa852d471) and (ether[4:2]=0xa680)) or
icmp"
diagnose sniffer packet any "(ether[0:4]=0xa852d471) and (ether[4:2]=0xa680)"
//dst
diagnose sniffer packet any "()(ether[0:4]=0xa852d471) and (ether[4:2]=0xa680)) or
((ether[6:4]=0xa852d471) and (ether[10:2]=0xa680))" // cualquier src o dst

diagnose sniffer packet any "host 10.58.0.200 and host 172.16.50.12 " 4 0 l
diagnose sniffer packet any "host 10.58.0.200 and net 10.224.25.0/24 " 4 0 l
diagnose sniffer packet any "portrange 7615-7615" 4 0 l
diagnose sniffer packet any "tcp port 7615" 4 0 l
diagnose sniffer packet any 'net 10.15.183.0/24' 4 0 l

diagnose sniffer packe a "none" 4 0 l


diagnose sniffer packet any "dst host 10.226.7.8 and ICM" 4 20
diagnose sniffer packet any "host 10.35.83.18 and port " 4 0 l
diagnose sniffer packet any "host 10.200.2.11 and icmp" 4
diag sniffer packet any 'src host 10.58.0.251 and dst host 10.224.24.25' 4 10
diag sniffer packet wan1 'src host 10.109.16.137 and dst host 172.26.48.21' 1 3

diag sniffer packet internal2 /// verifica vlan desde els witch

0:sin número de paquetes


1: print header of packets
2: print header and data from ip of packets
3: print header and data from ethernet of packets (if available)
4: print header of packets with interface name
5: print header and data from ip of packets with interface name
6: print header and data from ethernet of packets (if available) with intf name

diagnose sniffer packet any // any o cualquier puerto puede ser port2, port3...
diagnose sniffer packe port2
diagnose sniffer packet any 'host 10.75.17.6' 4 0 // 4 y 0 son relacionados con la
lista de arriba en este caso 0= sin numero de paquetes
-----------------------Other
Options---------------------------------------------------
diagnose sniffer packet port4 icmp // por protocolo desde una interfaz
SITE-A # diagnose sniffer packet port4 "icmp && host 10.0.1.10"
2.107362 10.0.1.10 -> 8.8.8.8: icmp: echo request //src
2.116815 8.8.8.8 -> 10.0.1.10: icmp: echo reply //dst
SITE-A # diagnose sniffer packet port4 "icmp && src host 10.0.1.10" // solo el
origen en un ping hay las dos
SITE-A # diagnose sniffer packet port4 "icmp && dst host 10.0.1.10"
\\*============== Consultas de DNS ==============*//
SITE-A # diagnose sniffer packet port4 "udp && host 10.0.1.10"
SITE-A # diagnose sniffer packet port4 "udp && port 53 && host 10.0.1.10" // puerto
especifico
diagnose sniffer packet port4 "udp && port 53 && src host 10.0.1.10"

You might also like