If you want to collect packet traces of virtual interfaces, follow the example below.
Execute hanetconfig print to check the physical interfaces bundled with the virtual interface which you want to obtain.
[IPv4,Patrol] Name Hostname Mode MAC Adder/Phys ip Interface List +-----------+---------------+----+-----------------+-------------------+ sha0 hostA t hme0,hme1 sha1 10.0.1.1 r hme0,hme1 sha12 - p 02:00:00:00:00:01 sha11 sha2 hostC d fjgi1000,fjgi1001 sha3 - p 02:00:00:00:00:10 sha2 sha4 192.168.10.50 n fjgi4 sha5 192.168.20.50 n fjgi5 sha6 192.168.100.50 c sha4,sha5 [IPv6] Name Hostname/prefix Mode Interface List +-----------+---------------------------------+----+-------------------+ sha10 - t qfe0,qfe1 sha10:2 hostB/64 sha11 fec0:1::123/64 d qfe2,qfe3 |
Execute the snoop command to collect packet traces.
If a virtual interface bundles several physical interfaces, execute the snoop(1M) command for all physical interfaces in the bundle.
Execution examples are shown below:
sha0 and sha1
# snoop -d hme0 -o /tmp/packet_trace.hme0 # snoop -d hme1 -o /tmp/packet_trace.hme1 |
sha2 and sha3
# snoop -d fjgi1000 -o /tmp/packet_trace.fjgi1000 # snoop -d fjgi1001 -o /tmp/packet_trace.fjgi1001 |
sha10 and sha10:2
# snoop -d qfe0 -o /tmp/packet_trace.qfe0 # snoop -d qfe1 -o /tmp/packet_trace.qfe1 |
sha11 and sha12
# snoop -d qfe2 -o /tmp/packet_trace.qfe2 # snoop -d qfe3 -o /tmp/packet_trace.qfe3 |
sha4, sha5, and sha6
# snoop -d fjgi4 -o /tmp/packet_trace.fjgi4 # snoop -d fjgi5 -o /tmp/packet_trace.fjgi5 |
Information
For the snoop(1M) command, refer to the Solaris manual.
Note
Even if you execute the snoop(1M) command for a virtual interface, you can not collect any packets.
Do not specify a virtual interface as the target for collecting packets by using the snoop(1M) command.