VoIP Ethernet Capture TSBC5000
Applies to version(s): v2.10
Capturing using the internal host of the TSBC5000 internal host
The internal host of the TSBC5000 can be used for capturing packets that are mirrored from the VOIP0 and/or VOIP1 physical ports. This includes RTP traffic.
Start Capture
You need two SSH sessions to capture the traffic:
First, access the TSBC5000 management interface using SSH. Then, access the telecom baseboard using
telnet 172.31.1.1
Prompt is now:
0/tbgw>
To capture VoIP0 traffic:
mv88eMonitor 0x4 0x4 8 600
To capture VoIP1 traffic:
mv88eMonitor 0x8 0x8 8 600
In the example the duration is 600 seconds, thus will capture traffic for 10 minutes.
Note: We don't recommend to keep the capturing for a long time. This is only for debugging purpose.
Second, access the TSBC5000 management interface using SSH
start tbx_cli_tools_remote
[root@TB016635 ~]# tbx_cli_tools_remote
connect to tbrouter
Available remote hosts to control (TBX_GW_PORT=12358, local IPs 172.16.0.1 / 172.18.0.1). Press corresponding letter to control: a : TB016634.tbrouter b : TB016635.gateway c : TB016635.logtrace d : TB016635.stream_server e : TB016635.tboam_app f : TB016635.tbrouter <------------tbrouter g : TB016635.tbsnmpagent h : TB016635.tbsyslog i : TB016635.tbuctwriter j : TB016635.toolpack_engine k : TB016635.toolpack_sys_mgr l : TB016635.web_server
Press 'p'
Capture circular buffer size (nb of packets)? : 50000 <-- set the number of packets to capture Capture mode (1:In 2:Out 4:Monitor) (ex: 3=In+out) : 4 <-- Select 4 VLAN id (list, -1:All) (ex:151, 152, 153, 154) : -1 Convert DSA tags to VLAN tags : Yes Capture only firewall-protected VLANs : Yes
Press Enter to start the capture.
Stop Capture
Press 'P' (capital letter) to stop the capture.
- Access the telecom baseboard from the Tmedia using telnet.
telnet 172.31.1.1
- Stop the capture
mv88eMonitor 0 0 0
Download Capture
To download the voip_capture.cap file, use SSH secure copy ("sftp") to the Tmedia management port. This can be done on Windows using tools like Filezilla or WinSCP.
The file location of the capture is:
/lib/tb/toolpack/tbrouter/pcap