VoIP Ethernet Capture TMG800 A
(New VOIP capture page specific to TMG800) |
(remove table of contents + rename section) |
||
Line 1: | Line 1: | ||
+ | __NOTOC__ | ||
=== '''''Applies to version v2.7''''' === | === '''''Applies to version v2.7''''' === | ||
− | {{DISPLAYTITLE: | + | {{DISPLAYTITLE:VoIP Ethernet Capture TMG800}} |
== Capturing using the TMG800's internal host == | == Capturing using the TMG800's internal host == | ||
The TMG800's internal host can be used for capturing packets that are mirrored from the VOIP0 and/or VOIP1 physical ports. | The TMG800's internal host can be used for capturing packets that are mirrored from the VOIP0 and/or VOIP1 physical ports. | ||
− | === | + | === Start Capture === |
You need '''two''' SSH sessions to capture the traffic: <br /> | You need '''two''' SSH sessions to capture the traffic: <br /> | ||
Line 22: | Line 23: | ||
− | === Stop | + | === Stop Capture === |
When you're ready, stop the capture by pressing '''control-C''' on the shell that was running tcpdump command<br /> | When you're ready, stop the capture by pressing '''control-C''' on the shell that was running tcpdump command<br /> | ||
You will see something like this: | You will see something like this: | ||
Line 30: | Line 31: | ||
− | === Download | + | === Download Capture === |
To download the capture, use SSH secure copy ("sftp") to the Tmedia management port. This can be done on Windows using tools like '''Filezilla''' or '''WinSCP'''.<br /> | To download the capture, use SSH secure copy ("sftp") to the Tmedia management port. This can be done on Windows using tools like '''Filezilla''' or '''WinSCP'''.<br /> | ||
The file will be located in | The file will be located in | ||
/root | /root | ||
− | == | + | == References == |
*[[VoIP_Ethernet_Capture|VoIP Ethernet Capture]] | *[[VoIP_Ethernet_Capture|VoIP Ethernet Capture]] |
Revision as of 12:56, 24 February 2015
Applies to version v2.7
Capturing using the TMG800's internal host
The TMG800's internal host can be used for capturing packets that are mirrored from the VOIP0 and/or VOIP1 physical ports.
Start Capture
You need two SSH sessions to capture the traffic:
First, access the Tmedia management interface using SSH. Then, access the telecom baseboard using telnet 172.31.1.1 ( prompt is tml> )
To capture VoIP0 traffic:
mv88eMonitor 0x1 0x1 2 600
To capture VoIP1 traffic:
mv88eMonitor 0x2 0x2 2 600
In the example the duration is 600 seconds, thus will capture traffic for 10 minutes
Second, access the Tmedia management interface using SSH ( prompt is [root@TBxxxxxx ~]# )
tcpdump -i mgmt0 -s 1500 -w capture_file.cap
You will see something like this:
tcpdump: listening on mgmt0, link-type EN10MB (Ethernet), capture size 1500 bytes
Stop Capture
When you're ready, stop the capture by pressing control-C on the shell that was running tcpdump command
You will see something like this:
364 packets captured 590 packets received by filter 0 packets dropped by kernel
Download Capture
To download the capture, use SSH secure copy ("sftp") to the Tmedia management port. This can be done on Windows using tools like Filezilla or WinSCP.
The file will be located in
/root