VoIP Ethernet Capture TMG800 A

From TBwiki
(Difference between revisions)
Jump to: navigation, search
(remove table of contents + rename section)
(References)
 
(6 intermediate revisions by 4 users not shown)
Line 1: Line 1:
 
__NOTOC__
 
__NOTOC__
=== '''''Applies to version v2.7''''' ===
+
=== '''''Applies to version(s): v2.7''''' ===
 
{{DISPLAYTITLE:VoIP Ethernet Capture TMG800}}
 
{{DISPLAYTITLE:VoIP Ethernet Capture TMG800}}
  
== Capturing using the TMG800's internal host ==
+
== Capturing using the [[TMG800]]'s internal host ==
The TMG800's internal host can be used for capturing packets that are mirrored from the VOIP0 and/or VOIP1 physical ports.
+
The [[TMG800]]'s internal host can be used for capturing packets that are mirrored from the VOIP0 and/or VOIP1 physical ports. This includes RTP traffic.
  
 
=== Start Capture ===
 
=== Start Capture ===
 
You need '''two''' SSH sessions to capture the traffic: <br />
 
You need '''two''' SSH sessions to capture the traffic: <br />
  
'''First''', access the [[Tmedia]] management interface using SSH. Then, access the telecom baseboard using telnet 172.31.1.1 ( prompt is '''tml>''' )<br />
+
'''First''', access the [[Tmedia]] management interface using SSH. Then, access the telecom baseboard using  
 +
telnet 172.31.1.1
 +
Prompt is now
 +
tml>
 
To capture VoIP0 traffic:  
 
To capture VoIP0 traffic:  
 
  mv88eMonitor 0x1 0x1 2 600
 
  mv88eMonitor 0x1 0x1 2 600
 
To capture VoIP1 traffic:  
 
To capture VoIP1 traffic:  
 
  mv88eMonitor 0x2 0x2 2 600
 
  mv88eMonitor 0x2 0x2 2 600
In the example the duration is 600 seconds, thus will capture traffic for 10 minutes
+
In the example the duration is 600 seconds, thus will capture traffic for 10 minutes.
 +
 
 +
Note: We don't recommend to keep the capturing for a long time. This is only for debugging purpose.
 
<br />
 
<br />
 
<br />
 
<br />
'''Second''', access the [[Tmedia]] management interface using SSH ( prompt is '''[root@TBxxxxxx ~]#''' )<br />
+
'''Second''', access the [[Tmedia]] management interface using SSH.
  tcpdump -i mgmt0 -s 1500 -w capture_file.cap
+
Prompt is now
 +
[root@TBxxxxxx ~]#
 +
To dump the content of the VOIP traffic in the file voip_capture.cap
 +
  tcpdump -i mgmt0 -s 1500 -w voip_capture.cap
 
You will see something like this:
 
You will see something like this:
 
  tcpdump: listening on mgmt0, link-type EN10MB (Ethernet), capture size 1500 bytes
 
  tcpdump: listening on mgmt0, link-type EN10MB (Ethernet), capture size 1500 bytes
Line 30: Line 38:
 
  0 packets dropped by kernel
 
  0 packets dropped by kernel
  
 +
*Access the telecom baseboard from the [[Tmedia]] using telnet.
 +
telnet 172.31.1.1
 +
*Stop the capture
 +
mv88eMonitor 0 0 0
  
 
=== Download Capture ===
 
=== Download Capture ===
To download the capture, use SSH secure copy ("sftp") to the Tmedia management port. This can be done on Windows using tools like '''Filezilla''' or '''WinSCP'''.<br />
+
To download the voip_capture.cap file, use SSH secure copy ("sftp") to the Tmedia management port. This can be done on Windows using tools like [https://filezilla-project.org/ Filezilla] or [http://winscp.net/ WinSCP].<br />
 
The file will be located in  
 
The file will be located in  
 
  /root
 
  /root
Line 38: Line 50:
 
== References ==
 
== References ==
 
*[[VoIP_Ethernet_Capture|VoIP Ethernet Capture]]
 
*[[VoIP_Ethernet_Capture|VoIP Ethernet Capture]]
 +
*[[VoIP Ethernet Capture FreeSBC A|FreeSBC VoIP Ethernet Capture]]

Latest revision as of 22:40, 25 March 2018

Applies to version(s): v2.7

Capturing using the TMG800's internal host

The TMG800's internal host can be used for capturing packets that are mirrored from the VOIP0 and/or VOIP1 physical ports. This includes RTP traffic.

Start Capture

You need two SSH sessions to capture the traffic:

First, access the Tmedia management interface using SSH. Then, access the telecom baseboard using

telnet 172.31.1.1

Prompt is now

tml>

To capture VoIP0 traffic:

mv88eMonitor 0x1 0x1 2 600

To capture VoIP1 traffic:

mv88eMonitor 0x2 0x2 2 600

In the example the duration is 600 seconds, thus will capture traffic for 10 minutes.

Note: We don't recommend to keep the capturing for a long time. This is only for debugging purpose.

Second, access the Tmedia management interface using SSH. Prompt is now

[root@TBxxxxxx ~]#

To dump the content of the VOIP traffic in the file voip_capture.cap

tcpdump -i mgmt0 -s 1500 -w voip_capture.cap

You will see something like this:

tcpdump: listening on mgmt0, link-type EN10MB (Ethernet), capture size 1500 bytes


Stop Capture

When you're ready, stop the capture by pressing control-C on the shell that was running tcpdump command
You will see something like this:

364 packets captured
590 packets received by filter
0 packets dropped by kernel
  • Access the telecom baseboard from the Tmedia using telnet.
telnet 172.31.1.1
  • Stop the capture
mv88eMonitor 0 0 0

Download Capture

To download the voip_capture.cap file, use SSH secure copy ("sftp") to the Tmedia management port. This can be done on Windows using tools like Filezilla or WinSCP.
The file will be located in

/root

References

Personal tools