<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using the S/N/K-Series Router Debug Packet Filter to locate a Soft-forwarded Packet in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/using-the-s-n-k-series-router-debug-packet-filter-to-locate-a/m-p/49935#M631</link>
    <description>Article ID: 14661 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
S-Series, all firmware&lt;BR /&gt;
Matrix N-Series DFE, firmware 6.01.01.0020 and higher&lt;BR /&gt;
K-Series, all firmware &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Discussion&lt;/B&gt;&lt;BR /&gt;
The router "Debug IP/Packet" feature logs information about packets that are being processed through the router soft-path (rather than routed in hardware), and can be used to notify when frames that match a user-defined signature are processed. &lt;BR /&gt;
&lt;BR /&gt;
Here are the high-level options available in router configuration mode (with N-Series f/w 7.62.01.0007): &lt;BR /&gt;
N3(su)-&amp;gt;router&lt;BR /&gt;
N3(su-router)-&amp;gt;configure&lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug ?&lt;BR /&gt;
  ip                       debug ip applications&lt;BR /&gt;
  packet                   generic packet monitor&lt;BR /&gt;
  crypto                   debug crypto applications&lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug ip ?&lt;BR /&gt;
  bgp                      Border Gateway Protocol&lt;BR /&gt;
  ospf                     Open Shortest Path First&lt;BR /&gt;
  vrrp                     debug vrrp&lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug packet ?&lt;BR /&gt;
  show-statistics          Show global router statistics&lt;BR /&gt;
  clear-statistics         Clear global router statistics&lt;BR /&gt;
  filter                   Configure filters for packet monitor in current vrf&lt;BR /&gt;
  stop                     Stop the debug IP packet utility&lt;BR /&gt;
  restart                  Restart the debug IP packet utility&lt;BR /&gt;
  control                  Specify throttle, limit and/or verbose&lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug crypto ?&lt;BR /&gt;
  isakmp                   debug isakmp&lt;BR /&gt;
N3(su-router-config)-&amp;gt;&lt;BR /&gt;
One example of the use of this command set is with the '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;debug packet filter&lt;/PRE&gt;&lt;/DIV&gt;' command. This can come in handy, because sometimes the host complex of the switch does not allow a hardware-based flow to occur. There could be a multitude of reasons for this, such as sending to a specific but unlearned MAC address. The lack of a hardware flow means that the MAC address will not appear in the output of certain more common commands, such as '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;show mac&lt;/PRE&gt;&lt;/DIV&gt;' or '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;show nodealias&lt;/PRE&gt;&lt;/DIV&gt;'. In these instances, using '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;debug packet filter&lt;/PRE&gt;&lt;/DIV&gt;' on the source or destination MAC will help to discover why it's not being reported elsewhere. &lt;BR /&gt;
&lt;BR /&gt;
The output of these commands goes to syslog, so if Telneted or SSHed into the device, use the '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set logging here enable&lt;/PRE&gt;&lt;/DIV&gt;' (&lt;A href="http://bit.ly/1eAwEim" target="_blank" rel="nofollow noreferrer noopener"&gt;5569&lt;/A&gt;) command in order to make this session (but not all Telnet/SSH sessions) print syslog messages to the screen. &lt;BR /&gt;
&lt;BR /&gt;
This sample command sequence features output for a port which was disabled administratively (first message), then re-enabled (second message). Note that link does not drop unless the '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set forcelinkdown enable&lt;/PRE&gt;&lt;/DIV&gt;' (&lt;A href="http://bit.ly/1c9dOP2" target="_blank" rel="nofollow noreferrer noopener"&gt;5277&lt;/A&gt;) command is active also. &lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug packet filter ?&lt;BR /&gt;
  vlan-in-list             VLAN ID or range of IDs (1-4094)&lt;BR /&gt;
  vlan-out-list            VLAN ID or range of IDs (1-4094)&lt;BR /&gt;
  port-in-list             Interface selection, 'media.slot.port' format&lt;BR /&gt;
  port-out-list            Interface selection, 'media.slot.port' format&lt;BR /&gt;
  src-mac                  48-bit hardware address of source&lt;BR /&gt;
  dest-mac                 48-bit hardware address of destination&lt;BR /&gt;
  etype                    ether type number in hex, ex. 800&lt;BR /&gt;
  access-list              Access list to filter IPv4 or IPv6 packets&lt;BR /&gt;
  arp                      ARP with IP network addr to filter packets&lt;BR /&gt;
  &lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug packet filter src-mac ?&lt;BR /&gt;
                    MAC address&lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug packet filter src-mac 00-14-22-d6-b4-02 ?&lt;BR /&gt;
  vlan-in-list             VLAN ID or range of IDs (1-4094)&lt;BR /&gt;
  vlan-out-list            VLAN ID or range of IDs (1-4094)&lt;BR /&gt;
  port-in-list             Interface selection, 'media.slot.port' format&lt;BR /&gt;
  port-out-list            Interface selection, 'media.slot.port' format&lt;BR /&gt;
  dest-mac                 48-bit hardware address of destination&lt;BR /&gt;
  etype                    ether type number in hex, ex. 800&lt;BR /&gt;
  access-list              Access list to filter IPv4 or IPv6 packets&lt;BR /&gt;
  arp                      ARP with IP network addr to filter packets&lt;BR /&gt;
  &lt;BR /&gt;
N3(su-router-config)-&amp;gt;set logging here enable&lt;BR /&gt;
Logging here has been enabled for server 5.&lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug packet filter src-mac 00-14-22-d6-b4-02&lt;BR /&gt;
 &lt;BR /&gt;
&amp;lt;165&amp;gt;May 16 19:17:06 0.0.0.0 DbgIpPkt[1][5],&lt;BR /&gt;
  RECEIVE:   ARP request, on ge.1.101,&lt;BR /&gt;
  FATE:      Forwarding discontinued, Discard all pkts, cause: PORT_DISABLED,&lt;BR /&gt;
 flow disallowed,&lt;BR /&gt;
  PKT-ORIG:  InPort(ge.1.101) LEN(64) DA(FF:FF:FF:FF:FF:FF)&lt;BR /&gt;
 SA(00:14:22:D6:B4:02) ETYPE(0806) SIP(10.26.192.202) DIP(10.26.192.1)&lt;BR /&gt;
  .&lt;BR /&gt;
&amp;lt;165&amp;gt;May 16 19:17:22 0.0.0.0 DbgIpPkt[1][10],&lt;BR /&gt;
  RECEIVE:   on ge.1.101, vlan 1,&lt;BR /&gt;
  FATE:      out port ge.1.104, vlan 1, flow allowed,&lt;BR /&gt;
  PKT-ORIG:  InPort(ge.1.101) LEN(66) DA(00:11:88:05:5F:CD)&lt;BR /&gt;
 SA(00:14:22:D6:B4:02) ETYPE(0800) SIP(10.26.192.202) DIP(63.80.138.75) V ER(4)&lt;BR /&gt;
 HLEN(5) TOTALLEN(48) PROTO(6) TOS(0) TTL(128) TCP_DST(80) TCP_SRC(2052)&lt;BR /&gt;
  .&lt;BR /&gt;
debug packet stop&lt;BR /&gt;
N3(su-router-config)-&amp;gt;exit&lt;BR /&gt;
N3(su-router)-&amp;gt;exit&lt;BR /&gt;
N3(su)-&amp;gt;&lt;BR /&gt;
For more detail, please &lt;A href="http://extranet.enterasys.com/downloads/" target="_blank" rel="nofollow noreferrer noopener"&gt;consult&lt;/A&gt; the Configuration Guide and CLI Reference Guide for your product and firmware version.&lt;BR /&gt;
See also: &lt;A href="http://bit.ly/1d6GSDK" target="_blank" rel="nofollow noreferrer noopener"&gt;14495&lt;/A&gt;.&lt;BR /&gt;
See also this &lt;A href="https://www.youtube.com/watch?v=y6fQbRaJ14k&amp;amp;#38;list=PLvQMiI4QwvHTFYkDRLl_8NUE8Ijp5Zm8n&amp;amp;#38;index=53" target="_blank" rel="nofollow noreferrer noopener"&gt;HowTo Video&lt;/A&gt; which demonstrates use of the "Debug IP/Packet" feature.</description>
    <pubDate>Tue, 31 Dec 2013 23:26:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2013-12-31T23:26:00Z</dc:date>
    <item>
      <title>Using the S/N/K-Series Router Debug Packet Filter to locate a Soft-forwarded Packet</title>
      <link>https://community.extremenetworks.com/t5/faqs/using-the-s-n-k-series-router-debug-packet-filter-to-locate-a/m-p/49935#M631</link>
      <description>Article ID: 14661 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
S-Series, all firmware&lt;BR /&gt;
Matrix N-Series DFE, firmware 6.01.01.0020 and higher&lt;BR /&gt;
K-Series, all firmware &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Discussion&lt;/B&gt;&lt;BR /&gt;
The router "Debug IP/Packet" feature logs information about packets that are being processed through the router soft-path (rather than routed in hardware), and can be used to notify when frames that match a user-defined signature are processed. &lt;BR /&gt;
&lt;BR /&gt;
Here are the high-level options available in router configuration mode (with N-Series f/w 7.62.01.0007): &lt;BR /&gt;
N3(su)-&amp;gt;router&lt;BR /&gt;
N3(su-router)-&amp;gt;configure&lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug ?&lt;BR /&gt;
  ip                       debug ip applications&lt;BR /&gt;
  packet                   generic packet monitor&lt;BR /&gt;
  crypto                   debug crypto applications&lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug ip ?&lt;BR /&gt;
  bgp                      Border Gateway Protocol&lt;BR /&gt;
  ospf                     Open Shortest Path First&lt;BR /&gt;
  vrrp                     debug vrrp&lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug packet ?&lt;BR /&gt;
  show-statistics          Show global router statistics&lt;BR /&gt;
  clear-statistics         Clear global router statistics&lt;BR /&gt;
  filter                   Configure filters for packet monitor in current vrf&lt;BR /&gt;
  stop                     Stop the debug IP packet utility&lt;BR /&gt;
  restart                  Restart the debug IP packet utility&lt;BR /&gt;
  control                  Specify throttle, limit and/or verbose&lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug crypto ?&lt;BR /&gt;
  isakmp                   debug isakmp&lt;BR /&gt;
N3(su-router-config)-&amp;gt;&lt;BR /&gt;
One example of the use of this command set is with the '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;debug packet filter&lt;/PRE&gt;&lt;/DIV&gt;' command. This can come in handy, because sometimes the host complex of the switch does not allow a hardware-based flow to occur. There could be a multitude of reasons for this, such as sending to a specific but unlearned MAC address. The lack of a hardware flow means that the MAC address will not appear in the output of certain more common commands, such as '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;show mac&lt;/PRE&gt;&lt;/DIV&gt;' or '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;show nodealias&lt;/PRE&gt;&lt;/DIV&gt;'. In these instances, using '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;debug packet filter&lt;/PRE&gt;&lt;/DIV&gt;' on the source or destination MAC will help to discover why it's not being reported elsewhere. &lt;BR /&gt;
&lt;BR /&gt;
The output of these commands goes to syslog, so if Telneted or SSHed into the device, use the '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set logging here enable&lt;/PRE&gt;&lt;/DIV&gt;' (&lt;A href="http://bit.ly/1eAwEim" target="_blank" rel="nofollow noreferrer noopener"&gt;5569&lt;/A&gt;) command in order to make this session (but not all Telnet/SSH sessions) print syslog messages to the screen. &lt;BR /&gt;
&lt;BR /&gt;
This sample command sequence features output for a port which was disabled administratively (first message), then re-enabled (second message). Note that link does not drop unless the '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set forcelinkdown enable&lt;/PRE&gt;&lt;/DIV&gt;' (&lt;A href="http://bit.ly/1c9dOP2" target="_blank" rel="nofollow noreferrer noopener"&gt;5277&lt;/A&gt;) command is active also. &lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug packet filter ?&lt;BR /&gt;
  vlan-in-list             VLAN ID or range of IDs (1-4094)&lt;BR /&gt;
  vlan-out-list            VLAN ID or range of IDs (1-4094)&lt;BR /&gt;
  port-in-list             Interface selection, 'media.slot.port' format&lt;BR /&gt;
  port-out-list            Interface selection, 'media.slot.port' format&lt;BR /&gt;
  src-mac                  48-bit hardware address of source&lt;BR /&gt;
  dest-mac                 48-bit hardware address of destination&lt;BR /&gt;
  etype                    ether type number in hex, ex. 800&lt;BR /&gt;
  access-list              Access list to filter IPv4 or IPv6 packets&lt;BR /&gt;
  arp                      ARP with IP network addr to filter packets&lt;BR /&gt;
  &lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug packet filter src-mac ?&lt;BR /&gt;
                    MAC address&lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug packet filter src-mac 00-14-22-d6-b4-02 ?&lt;BR /&gt;
  vlan-in-list             VLAN ID or range of IDs (1-4094)&lt;BR /&gt;
  vlan-out-list            VLAN ID or range of IDs (1-4094)&lt;BR /&gt;
  port-in-list             Interface selection, 'media.slot.port' format&lt;BR /&gt;
  port-out-list            Interface selection, 'media.slot.port' format&lt;BR /&gt;
  dest-mac                 48-bit hardware address of destination&lt;BR /&gt;
  etype                    ether type number in hex, ex. 800&lt;BR /&gt;
  access-list              Access list to filter IPv4 or IPv6 packets&lt;BR /&gt;
  arp                      ARP with IP network addr to filter packets&lt;BR /&gt;
  &lt;BR /&gt;
N3(su-router-config)-&amp;gt;set logging here enable&lt;BR /&gt;
Logging here has been enabled for server 5.&lt;BR /&gt;
N3(su-router-config)-&amp;gt;debug packet filter src-mac 00-14-22-d6-b4-02&lt;BR /&gt;
 &lt;BR /&gt;
&amp;lt;165&amp;gt;May 16 19:17:06 0.0.0.0 DbgIpPkt[1][5],&lt;BR /&gt;
  RECEIVE:   ARP request, on ge.1.101,&lt;BR /&gt;
  FATE:      Forwarding discontinued, Discard all pkts, cause: PORT_DISABLED,&lt;BR /&gt;
 flow disallowed,&lt;BR /&gt;
  PKT-ORIG:  InPort(ge.1.101) LEN(64) DA(FF:FF:FF:FF:FF:FF)&lt;BR /&gt;
 SA(00:14:22:D6:B4:02) ETYPE(0806) SIP(10.26.192.202) DIP(10.26.192.1)&lt;BR /&gt;
  .&lt;BR /&gt;
&amp;lt;165&amp;gt;May 16 19:17:22 0.0.0.0 DbgIpPkt[1][10],&lt;BR /&gt;
  RECEIVE:   on ge.1.101, vlan 1,&lt;BR /&gt;
  FATE:      out port ge.1.104, vlan 1, flow allowed,&lt;BR /&gt;
  PKT-ORIG:  InPort(ge.1.101) LEN(66) DA(00:11:88:05:5F:CD)&lt;BR /&gt;
 SA(00:14:22:D6:B4:02) ETYPE(0800) SIP(10.26.192.202) DIP(63.80.138.75) V ER(4)&lt;BR /&gt;
 HLEN(5) TOTALLEN(48) PROTO(6) TOS(0) TTL(128) TCP_DST(80) TCP_SRC(2052)&lt;BR /&gt;
  .&lt;BR /&gt;
debug packet stop&lt;BR /&gt;
N3(su-router-config)-&amp;gt;exit&lt;BR /&gt;
N3(su-router)-&amp;gt;exit&lt;BR /&gt;
N3(su)-&amp;gt;&lt;BR /&gt;
For more detail, please &lt;A href="http://extranet.enterasys.com/downloads/" target="_blank" rel="nofollow noreferrer noopener"&gt;consult&lt;/A&gt; the Configuration Guide and CLI Reference Guide for your product and firmware version.&lt;BR /&gt;
See also: &lt;A href="http://bit.ly/1d6GSDK" target="_blank" rel="nofollow noreferrer noopener"&gt;14495&lt;/A&gt;.&lt;BR /&gt;
See also this &lt;A href="https://www.youtube.com/watch?v=y6fQbRaJ14k&amp;amp;#38;list=PLvQMiI4QwvHTFYkDRLl_8NUE8Ijp5Zm8n&amp;amp;#38;index=53" target="_blank" rel="nofollow noreferrer noopener"&gt;HowTo Video&lt;/A&gt; which demonstrates use of the "Debug IP/Packet" feature.</description>
      <pubDate>Tue, 31 Dec 2013 23:26:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/using-the-s-n-k-series-router-debug-packet-filter-to-locate-a/m-p/49935#M631</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2013-12-31T23:26:00Z</dc:date>
    </item>
  </channel>
</rss>

