Sniffer Debug
Sniffer Debug
10.75.0.2
10.39.69.110
execute ping-options source 10.38.14.97
execute ping-options repeat-count 100
execute ping 10.220.0.183
---------------------------------------
https://magic3.oohrd.com
diagnose sniffer packet any "host 10.58.0.200 and host 172.16.50.12 " 4 0 l
diagnose sniffer packet any "host 10.58.0.200 and net 10.224.25.0/24 " 4 0 l
diagnose sniffer packet any "portrange 7615-7615" 4 0 l
diagnose sniffer packet any "tcp port 7615" 4 0 l
diagnose sniffer packet any 'net 10.15.183.0/24' 4 0 l
diag sniffer packet internal2 /// verifica vlan desde els witch
diagnose sniffer packet any // any o cualquier puerto puede ser port2, port3...
diagnose sniffer packe port2
diagnose sniffer packet any 'host 10.75.17.6' 4 0 // 4 y 0 son relacionados con la
lista de arriba en este caso 0= sin numero de paquetes
-----------------------Other
Options---------------------------------------------------
diagnose sniffer packet port4 icmp // por protocolo desde una interfaz
SITE-A # diagnose sniffer packet port4 "icmp && host 10.0.1.10"
2.107362 10.0.1.10 -> 8.8.8.8: icmp: echo request //src
2.116815 8.8.8.8 -> 10.0.1.10: icmp: echo reply //dst
SITE-A # diagnose sniffer packet port4 "icmp && src host 10.0.1.10" // solo el
origen en un ping hay las dos
SITE-A # diagnose sniffer packet port4 "icmp && dst host 10.0.1.10"
\\*============== Consultas de DNS ==============*//
SITE-A # diagnose sniffer packet port4 "udp && host 10.0.1.10"
SITE-A # diagnose sniffer packet port4 "udp && port 53 && host 10.0.1.10" // puerto
especifico
diagnose sniffer packet port4 "udp && port 53 && src host 10.0.1.10"