If you want to collect packet traces of virtual interfaces, follow the example below.
Execute hanetconfig print to check the physical interfaces bundled with the virtual interface which you want to obtain.
[IPv4,Patrol / Virtual NIC] Name Hostname Mode Physical ipaddr Interface List +-----------+---------------+----+-----------------+---------------------------+ sha0 192.168.1.110 t eth0,eth1 sha1 192.168.10.110 d 192.168.10.10 eth2,eth3 sha12 - p - sha1 sha2 192.168.100.110 c eth4,eth5 |
Execute the tcpdump command to collect packet traces.
If a virtual interface bundles several physical interfaces, execute the tcpdump command for all physical interfaces in the bundle.
Execution examples are shown below:
For Fast switching mode (sha0)
# tcpdump -p -i eth0 -w /tmp/packet_trace.eth0 # tcpdump -p -i eth1 -w /tmp/packet_trace.eth1 # tcpdump -p -i sha0 -w /tmp/packet_trace.sha0 |
For NIC switching mode (sha1 and sha12)
# tcpdump -p -i eth2 -w /tmp/packet_trace.eth2 # tcpdump -p -i eth3 -w /tmp/packet_trace.eth3 |
For GS linkage mode (sha2)
# tcpdump -p -i eth4 -w /tmp/packet_trace.eth4 # tcpdump -p -i eth5 -w /tmp/packet_trace.eth5 # tcpdump -p -i sha2 -w /tmp/packet_trace.sha2 |
For Virtual NIC mode (sha3)
# tcpdump -p -i eth6 -w /tmp/packet_trace.eth6 # tcpdump -p -i eth7 -w /tmp/packet_trace.eth7 # tcpdump -p -i sha3 -w /tmp/packet_trace.sha3 |
Information
For the tcpdump command, refer to the Linux manual.
Note
When executing the tcpdump command, specify the -p option to collect packet traces in non-promiscuous mode.