TCPdump Tool |
The TCPdump tool can be used to identify networking-related issues. This packet analyzer captures the actual packets sent and received by the vmpro appliance.
Refer to the Additional Resources section for more information about the TCPdump tool.
To collect TCPdump information during communications, run the following commands:
bash-4.1# touch /var/tmp/tcp_capture
bash-4.1# ifconfig
eth0 Link encap:Ethernet HWaddr 00:0C:29:0F:DE:DA
inet addr:10.20.230.151 Bcast:10.20.231.255 Mask:255.255.248.0
inet6 addr: fe80::20c:29ff:fe0f:deda/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:567282 errors:0 dropped:0 overruns:0 frame:0
TX packets:382661 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:258956236 (246.9 MiB) TX bytes:112092397 (106.8 MiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:1821560 errors:0 dropped:0 overruns:0 frame:0
TX packets:1821560 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:296046060 (282.3 MiB) TX bytes:296046060 (282.3 MiB)
bash-4.1# tcpdump -i eth0 host 10.20.230.75 > /var/tmp/tcp_capture (10.20.230.75 being the NAS)
This page was generated by the BrainKeeper Enterprise Wiki, © 2018 |