Top
PRIMECLUSTER Global Link Services Configuration and AdministrationGuide 4.6Redundant Line Control Function
FUJITSU Software

6.1.3 Collecting packet traces

If you want to collect packet traces of virtual interfaces, follow the example below.

  1. Execute hanetconfig print to check the physical interfaces bundled with the virtual interface which you want to obtain.

    [IPv4,Patrol / Virtual NIC]                                                
     Name        Hostname        Mode Physical ipaddr   Interface List              
    +-----------+---------------+----+-----------------+---------------------------+
     sha0        192.168.1.110    t                     eth0,eth1                   
     sha1        192.168.10.110   d   192.168.10.10     eth2,eth3                   
     sha12       -                p   -                 sha1                        
     sha2        192.168.100.110  c                     eth4,eth5                   
  2. Execute the tcpdump command to collect packet traces.

    If a virtual interface bundles several physical interfaces, execute the tcpdump command for all physical interfaces in the bundle.

    Execution examples are shown below:

    • For Fast switching mode (sha0)

      # tcpdump -p -i eth0 -w /tmp/packet_trace.eth0
      # tcpdump -p -i eth1 -w /tmp/packet_trace.eth1
      # tcpdump -p -i sha0 -w /tmp/packet_trace.sha0
    • For NIC switching mode (sha1 and sha12)

      # tcpdump -p -i eth2 -w /tmp/packet_trace.eth2
      # tcpdump -p -i eth3 -w /tmp/packet_trace.eth3
    • For GS linkage mode (sha2)

      # tcpdump -p -i eth4 -w /tmp/packet_trace.eth4
      # tcpdump -p -i eth5 -w /tmp/packet_trace.eth5
      # tcpdump -p -i sha2 -w /tmp/packet_trace.sha2
    • For Virtual NIC mode (sha3)

      # tcpdump -p -i eth6 -w /tmp/packet_trace.eth6
      # tcpdump -p -i eth7 -w /tmp/packet_trace.eth7
      # tcpdump -p -i sha3 -w /tmp/packet_trace.sha3

    Information

    For the tcpdump command, refer to the Linux manual.

    Note

    When executing the tcpdump command, specify the -p option to collect packet traces in non-promiscuous mode.