Dell Force10 S60-44T FTOS Command Line Reference Guide for the S60 System FTOS - Page 514
range, debug ip packet Command Example Partial, Table 16-1.
View all Dell Force10 S60-44T manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 514 highlights
www.dell.com | support.dell.com Example Figure 16-3. debug ip packet Command Example (Partial) IP: s=10.1.2.62 (local), d=10.1.2.206 (Ma 0/0), len 54, sending TCP src=23, dst=40869, seq=2112994894, ack=606901739, win=8191 ACK PUSH IP: s=10.1.2.206 (Ma 0/0), d=10.1.2.62, len 40, rcvd TCP src=0, dst=0, seq=0, ack=0, win=0 IP: s=10.1.2.62 (local), d=10.1.2.206 (Ma 0/0), len 226, sending TCP src=23, dst=40869, seq=2112994896, ack=606901739, win=8192 ACK PUSH IP: s=10.1.2.216 (Ma 0/0), d=10.1.2.255, len 78, rcvd UDP src=0, dst=0 IP: s=10.1.2.62 (local), d=10.1.2.3 (Ma 0/0), len 1500, sending fragment IP Fragment, Ident = 4741, fragment offset = 0 ICMP type=0, code=0 IP: s=10.1.2.62 (local), d=10.1.2.3 (Ma 0/0), len 1500, sending fragment IP Fragment, Ident = 4741, fragment offset = 1480 IP: s=40.40.40.40 (local), d=224.0.0.5 (Gi 4/11), len 64, sending broad/multicast proto=89 IP: s=40.40.40.40 (local), d=224.0.0.6 (Gi 4/11), len 28, sending broad/multicast proto=2 IP: s=0.0.0.0, d=30.30.30.30, len 100, unroutable ICMP type=8, code=0 IP: s=0.0.0.0, d=30.30.30.30, len 100, unroutable ICMP type=8, code=0 Table 16-1. debug ip packet Command Example Fields Field s= d= len sending rcvd fragment sending broad/multicast proto unroutable TCP src= UDP src= ICMP type= IP Fragment Description Lists the source address of the packet and the name of the interface (in parentheses) that received the packet. Lists the destination address of the packet and the name of the interface (in parentheses) through which the packet is being sent out on the network. Displays the packet's length. The last part of each line lists the status of the packet. Displays the source and destination ports, the sequence number, the acknowledgement number, and the window size of the packets in that TCP packets. Displays the source and destination ports for the UDP packets. Displays the ICMP type and code. States that it is a fragment and displays the unique number identifying the fragment (Ident) and the offset (in 8-byte units) of this fragment (fragment offset) from the beginning of original datagram. Usage Information Use the count option to stop packets from flooding the user terminal when debugging is turned on. The access-group option supports only the equal to (eq) operator in TCP ACL rules. Port operators not equal to (neq), greater than (gt), less than (lt), or range are not supported in access-group option (see Figure 16-4). ARP packets (arp) and Ether-type (ether-type) are also not supported in access-group option. The entire rule is skipped to compose the filter. The access-group option pertains to: • IP Protocol Number 0 to 255 514 | IPv4 Routing