<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Packet capture EXOS 22.3.1.4 in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/packet-capture-exos-22-3-1-4/m-p/49605#M13174</link>
    <description>Hi Goncalo,&lt;BR /&gt;
&lt;BR /&gt;
6 months before i play around and test this feature also - X460 - 22.2.x. I was also disappointed because it does not really help in field (customers environment) - it can help in lab environment.&lt;BR /&gt;
&lt;BR /&gt;
The heaviest burden is that only CPU bound traffic are captured (reliable). BUT on a modern LAN Switch most traffic is handled by ASIC not by CPU. Thats the why you not see what you expect.&lt;BR /&gt;
&lt;BR /&gt;
This feature is (from my point of view) only a fall-out for GTAC and developers to analyse why CPU or bcmRX process load is heavy. (It seems) that all cases are not considered.&lt;BR /&gt;
&lt;BR /&gt;
Maybe you can get better results if you redirect interesting Traffic via ACL to CPU (that is a possible Action with Extreme ACLS). But i never test this. &lt;BR /&gt;
&lt;BR /&gt;
Another possibility is to use "Mirroring to Remote IP Addresses". &lt;BR /&gt;
But you can see at this thread below - it works also not satisfactory ;-(&lt;BR /&gt;
&lt;A href="https://community.extremenetworks.com/extreme/topics/exos-using-new-feature-mirroring-to-remote-ip-addresses" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.extremenetworks.com/extreme/topics/exos-using-new-feature-mirroring-to-remote-ip-a...&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
i hope EXOS developers will retouch and improve in both cases.&lt;BR /&gt;
&lt;BR /&gt;
At Fortigate firewalls for example you have the same problem with sniffing/debugging and ASIC-based traffic handling. There you can disable this "Network process offload" for specific traffic to see and debug all interessted traffic with sniffer and debug tools. &lt;BR /&gt;
That will be what i wish for EXOS too.&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
Matthias&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Mon, 05 Mar 2018 15:31:00 GMT</pubDate>
    <dc:creator>M_Nees</dc:creator>
    <dc:date>2018-03-05T15:31:00Z</dc:date>
    <item>
      <title>Packet capture EXOS 22.3.1.4</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/packet-capture-exos-22-3-1-4/m-p/49604#M13173</link>
      <description>Hi, I am trying to do a capture on a switchport i have used different commands, but it looks like they only capture internal traffic.&lt;BR /&gt;
&lt;BR /&gt;
This command should capture packets only on port X and on Vlan X&lt;BR /&gt;
&lt;BR /&gt;
 debug packet capture ports 2:3 on vlan Administrativa-C cmd-args "-c 50"&lt;BR /&gt;
when i open the capture in wireshark i see packets from another vlan also the only packets i see are broadcast and arp request. &lt;BR /&gt;
&lt;BR /&gt;
I wonder if this is the correct command, or if there is an issue with packet capture on EXOS 22.3.1.4&lt;BR /&gt;
&lt;BR /&gt;
Regards&lt;BR /&gt;
Gonçalo Reis&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Mar 2018 19:49:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/packet-capture-exos-22-3-1-4/m-p/49604#M13173</guid>
      <dc:creator>GONÇALO_NUNO_CO</dc:creator>
      <dc:date>2018-03-02T19:49:00Z</dc:date>
    </item>
    <item>
      <title>RE: Packet capture EXOS 22.3.1.4</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/packet-capture-exos-22-3-1-4/m-p/49605#M13174</link>
      <description>Hi Goncalo,&lt;BR /&gt;
&lt;BR /&gt;
6 months before i play around and test this feature also - X460 - 22.2.x. I was also disappointed because it does not really help in field (customers environment) - it can help in lab environment.&lt;BR /&gt;
&lt;BR /&gt;
The heaviest burden is that only CPU bound traffic are captured (reliable). BUT on a modern LAN Switch most traffic is handled by ASIC not by CPU. Thats the why you not see what you expect.&lt;BR /&gt;
&lt;BR /&gt;
This feature is (from my point of view) only a fall-out for GTAC and developers to analyse why CPU or bcmRX process load is heavy. (It seems) that all cases are not considered.&lt;BR /&gt;
&lt;BR /&gt;
Maybe you can get better results if you redirect interesting Traffic via ACL to CPU (that is a possible Action with Extreme ACLS). But i never test this. &lt;BR /&gt;
&lt;BR /&gt;
Another possibility is to use "Mirroring to Remote IP Addresses". &lt;BR /&gt;
But you can see at this thread below - it works also not satisfactory ;-(&lt;BR /&gt;
&lt;A href="https://community.extremenetworks.com/extreme/topics/exos-using-new-feature-mirroring-to-remote-ip-addresses" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.extremenetworks.com/extreme/topics/exos-using-new-feature-mirroring-to-remote-ip-a...&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
i hope EXOS developers will retouch and improve in both cases.&lt;BR /&gt;
&lt;BR /&gt;
At Fortigate firewalls for example you have the same problem with sniffing/debugging and ASIC-based traffic handling. There you can disable this "Network process offload" for specific traffic to see and debug all interessted traffic with sniffer and debug tools. &lt;BR /&gt;
That will be what i wish for EXOS too.&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
Matthias&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Mon, 05 Mar 2018 15:31:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/packet-capture-exos-22-3-1-4/m-p/49605#M13174</guid>
      <dc:creator>M_Nees</dc:creator>
      <dc:date>2018-03-05T15:31:00Z</dc:date>
    </item>
    <item>
      <title>RE: Packet capture EXOS 22.3.1.4</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/packet-capture-exos-22-3-1-4/m-p/49606#M13175</link>
      <description>Hi Matthias, thanks for the info. Now it makes sense what i was seing in the pcap files.&lt;BR /&gt;
&lt;BR /&gt;
Regards&lt;BR /&gt;
Gonçalo</description>
      <pubDate>Mon, 05 Mar 2018 15:31:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/packet-capture-exos-22-3-1-4/m-p/49606#M13175</guid>
      <dc:creator>GONÇALO_NUNO_CO</dc:creator>
      <dc:date>2018-03-05T15:31:00Z</dc:date>
    </item>
  </channel>
</rss>

