Cisco â€å“this Mailbox Is in Use. Try Again Later.ã¢â‚¬â

Configuration Examples for Wireshark

Case: Displaying a Brief Output from a .pcap File

You can display the output from a .pcap file by entering:

                                                Device                #                                  show monitor capture file flash:mycap.pcap brief                                Starting the bundle display ........ Press Ctrl + Shift + half dozen to get out    i 0.000000000   x.10.10.2 -> ten.10.10.one   ICMP 114 Echo (ping) request  id=0x002e, seq=0/0, ttl=254   ii 0.000051000   10.x.10.ane -> x.10.x.2   ICMP 114 Echo (ping) reply    id=0x002e, seq=0/0, ttl=255 (asking in i)   3 0.000908000   10.10.ten.ii -> 10.10.10.ane   ICMP 114 Echo (ping) request  id=0x002e, seq=one/256, ttl=254   four 0.001782000   10.10.10.1 -> 10.10.x.2   ICMP 114 Echo (ping) respond    id=0x002e, seq=1/256, ttl=255 (request in three)   five 0.002961000   10.10.10.2 -> x.10.x.i   ICMP 114 Repeat (ping) request  id=0x002e, seq=two/512, ttl=254   half dozen 0.003676000   10.10.x.1 -> x.ten.x.2   ICMP 114 Repeat (ping) respond    id=0x002e, seq=two/512, ttl=255 (request in 5)   seven 0.004835000   10.10.ten.2 -> 10.10.10.one   ICMP 114 Echo (ping) request  id=0x002e, seq=3/768, ttl=254   viii 0.005579000   10.10.10.1 -> 10.10.10.2   ICMP 114 Repeat (ping) reply    id=0x002e, seq=3/768, ttl=255 (request in seven)   9 0.006850000   10.10.10.2 -> ten.x.ten.1   ICMP 114 Echo (ping) request  id=0x002e, seq=four/1024, ttl=254  x 0.007586000   10.10.10.1 -> x.10.10.two   ICMP 114 Echo (ping) answer    id=0x002e, seq=4/1024, ttl=255 (asking in ix)  11 0.008768000   10.ten.10.2 -> x.10.x.i   ICMP 114 Echo (ping) asking  id=0x002e, seq=5/1280, ttl=254  12 0.009497000   x.10.10.i -> 10.10.x.ii   ICMP 114 Echo (ping) respond    id=0x002e, seq=5/1280, ttl=255 (request in 11)  13 0.010695000   x.10.10.two -> 10.10.10.one   ICMP 114 Echo (ping) asking  id=0x002e, seq=6/1536, ttl=254  fourteen 0.011427000   10.10.10.i -> 10.10.10.two   ICMP 114 Echo (ping) reply    id=0x002e, seq=6/1536, ttl=255 (asking in xiii)  15 0.012728000   x.10.10.2 -> 10.x.x.1   ICMP 114 Echo (ping) asking  id=0x002e, seq=7/1792, ttl=254  16 0.013458000   10.10.10.1 -> 10.x.ten.2   ICMP 114 Echo (ping) respond    id=0x002e, seq=7/1792, ttl=255 (request in fifteen)  17 0.014652000   10.10.10.2 -> x.10.10.1   ICMP 114 Echo (ping) request  id=0x002e, seq=8/2048, ttl=254  18 0.015394000   10.10.10.one -> ten.10.x.two   ICMP 114 Echo (ping) reply    id=0x002e, seq=8/2048, ttl=255 (asking in 17)  19 0.016682000   10.10.10.2 -> x.10.10.1   ICMP 114 Echo (ping) asking  id=0x002e, seq=9/2304, ttl=254  20 0.017439000   10.10.ten.ane -> 10.ten.x.two   ICMP 114 Repeat (ping) reply    id=0x002e, seq=9/2304, ttl=255 (request in 19)  21 0.018655000   10.10.10.two -> 10.10.10.1   ICMP 114 Echo (ping) asking  id=0x002e, seq=x/2560, ttl=254  22 0.019385000   x.ten.10.1 -> x.ten.10.2   ICMP 114 Echo (ping) reply    id=0x002e, seq=10/2560, ttl=255 (request in 21)  23 0.020575000   10.10.x.2 -> x.10.10.one   ICMP 114 Echo (ping) asking  id=0x002e, seq=11/2816, ttl=254  --More‹                          

Example: Displaying Detailed Output from a .pcap File

You can display the detailed .pcap file output by entering:

                                                Device                #                                  show monitor capture file flash:mycap.pcap detailed                                Starting the packet brandish ........ Printing Ctrl + Shift + half-dozen to exit  Frame ane: 114 bytes on wire (912 bits), 114 bytes captured (912 bits) on interface 0     Interface id: 0     Encapsulation type: Ethernet (1)     Arrival Time: Nov  6, 2015 eleven:44:48.322497000 UTC     [Time shift for this packet: 0.000000000 seconds]     Epoch Time: 1446810288.322497000 seconds     [Time delta from previous captured frame: 0.000000000 seconds]     [Fourth dimension delta from previous displayed frame: 0.000000000 seconds]     [Fourth dimension since reference or get-go frame: 0.000000000 seconds]     Frame Number: i     Frame Length: 114 bytes (912 bits)     Capture Length: 114 bytes (912 bits)     [Frame is marked: Fake]     [Frame is ignored: Faux]     [Protocols in frame: eth:ip:icmp:data] Ethernet 2, Src: Cisco_f3:63:46 (00:e1:6d:f3:63:46), Dst: Cisco_31:f1:c6 (00:e1:6d:31:f1:c6)     Destination: Cisco_31:f1:c6 (00:e1:6d:31:f1:c6)         Accost: Cisco_31:f1:c6 (00:e1:6d:31:f1:c6)         .... ..0. .... .... .... .... = LG fleck: Globally unique address (manufactory default)         .... ...0 .... .... .... .... = IG bit: Individual address (unicast)     Source: Cisco_f3:63:46 (00:e1:6d:f3:63:46)         Address: Cisco_f3:63:46 (00:e1:6d:f3:63:46)         .... ..0. .... .... .... .... = LG bit: Globally unique accost (manufacturing plant default)         .... ...0 .... .... .... .... = IG bit: Individual address (unicast)     Type: IP (0x0800) Cyberspace Protocol Version iv, Src: 10.10.10.ii (10.10.10.two), Dst: 10.10.10.1 (10.10.10.1)     Version: iv     Header length: 20 bytes     Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Non-ECT (Not ECN-Capable Transport))         0000 00.. = Differentiated Services Codepoint: Default (0x00)         .... ..00 = Explicit Congestion Notification: Non-ECT (Not ECN-Capable Ship) (0x00)     Total Length: 100     Identification: 0x04ba (1210)     Flags: 0x00         0... .... = Reserved bit: Non gear up         .0.. .... = Don't fragment: Not set         ..0. .... = More fragments: Not set up     Fragment offset: 0     Time to live: 254     Protocol: ICMP (1)     Header checksum: 0x8fc8 [validation disabled]         [Good: False]         [Bad: False]     Source: 10.10.ten.ii (10.10.10.2)     Destination: x.10.10.ane (10.x.10.1) Cyberspace Command Message Protocol     Type: 8 (Echo (ping) request)     Code: 0     Checksum: 0xe4db [correct]     Identifier (Be): 46 (0x002e)     Identifier (LE): 11776 (0x2e00)     Sequence number (BE): 0 (0x0000)     Sequence number (LE): 0 (0x0000)     Information (72 bytes)  0000  00 00 00 00 09 c9 8f 77 ab cd ab cd ab cd ab cd   .......w........ 0010  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0020  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0030  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0040  ab cd ab cd ab cd ab cd                           ........         Data: 0000000009c98f77abcdabcdabcdabcdabcdabcdabcdabcd...         [Length: 72]  Frame 2: 114 bytes on wire (912 bits), 114 bytes captured (912 bits) on interface 0     Interface id: 0                          

Case: Displaying a Package Dump Output from a .pcap File.

Yous tin can brandish the packet dump output by entering:

                                                Device                #                                  show monitor capture file flash:mycap.pcap dump                                Starting the packet brandish ........ Printing Ctrl + Shift + 6 to leave  0000  00 e1 6d 31 f1 c6 00 e1 6d f3 63 46 08 00 45 00   ..m1....g.cF..E. 0010  00 64 04 ba 00 00 fe 01 8f c8 0a 0a 0a 02 0a 0a   .d.............. 0020  0a 01 08 00 e4 db 00 2e 00 00 00 00 00 00 09 c9   ................ 0030  8f 77 ab cd ab cd ab cd ab cd ab cd ab cd ab cd   .westward.............. 0040  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0050  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0060  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0070  ab cd                                             ..  0000  00 e1 6d 31 f1 80 00 e1 6d 31 f1 lxxx 08 00 45 00   ..m1....m1....Due east. 0010  00 64 04 ba 00 00 ff 01 8e c8 0a 0a 0a 01 0a 0a   .d.............. 0020  0a 02 00 00 ec db 00 2e 00 00 00 00 00 00 09 c9   ................ 0030  8f 77 ab cd ab cd ab cd ab cd ab cd ab cd ab cd   .west.............. 0040  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0050  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0060  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0070  ab cd                                             ..  0000  00 e1 6d 31 f1 c6 00 e1 6d f3 63 46 08 00 45 00   ..m1....m.cF..E. 0010  00 64 04 bb 00 00 fe 01 8f c7 0a 0a 0a 02 0a 0a   .d.............. 0020  0a 01 08 00 e4 d7 00 2e 00 01 00 00 00 00 09 c9   ................ 0030  8f 7a ab cd ab cd ab cd ab cd ab cd ab cd ab cd   .z.............. 0040  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................                          

Example: Displaying Packets from a .pcap File using a Brandish Filter

You can brandish the .pcap file packets output by entering:

                                                Device                #                                  prove monitor capture file flash:mycap.pcap brandish-filter "ip.src == x.x.x.2" brief                                Starting the packet display ........ Press Ctrl + Shift + 6 to get out    1 0.000000000   ten.ten.10.2 -> 10.ten.ten.1   ICMP 114 Echo (ping) request  id=0x002e, seq=0/0, ttl=254   three 0.000908000   ten.10.10.two -> 10.10.10.1   ICMP 114 Repeat (ping) request  id=0x002e, seq=one/256, ttl=254   5 0.002961000   10.10.10.2 -> 10.10.10.1   ICMP 114 Echo (ping) asking  id=0x002e, seq=2/512, ttl=254   7 0.004835000   10.x.x.2 -> 10.10.x.1   ICMP 114 Echo (ping) request  id=0x002e, seq=3/768, ttl=254   9 0.006850000   10.ten.10.ii -> ten.ten.ten.1   ICMP 114 Repeat (ping) asking  id=0x002e, seq=4/1024, ttl=254  11 0.008768000   10.x.10.2 -> x.x.10.one   ICMP 114 Echo (ping) request  id=0x002e, seq=v/1280, ttl=254  13 0.010695000   10.ten.10.2 -> 10.ten.10.1   ICMP 114 Echo (ping) request  id=0x002e, seq=six/1536, ttl=254  fifteen 0.012728000   10.10.x.2 -> 10.10.10.one   ICMP 114 Echo (ping) asking  id=0x002e, seq=7/1792, ttl=254  17 0.014652000   10.10.10.2 -> 10.10.x.1   ICMP 114 Repeat (ping) request  id=0x002e, seq=8/2048, ttl=254  nineteen 0.016682000   10.10.10.ii -> 10.x.10.i   ICMP 114 Echo (ping) asking  id=0x002e, seq=9/2304, ttl=254  21 0.018655000   10.10.x.2 -> ten.x.ten.1   ICMP 114 Repeat (ping) request  id=0x002e, seq=ten/2560, ttl=254  23 0.020575000   10.10.10.2 -> 10.10.x.1   ICMP 114 Echo (ping) request  id=0x002e, seq=11/2816, ttl=254                          

Example: Displaying the Number of Packets Captured in a .pcap File

You can brandish the number of packets captured in a .pcap file past inbound:

                                                Device                #                                  prove monitor capture file wink:mycap.pcap packet-count                                File proper name:           /flash/mycap.pcap Number of packets:   50                          

Instance: Displaying a Unmarried Packet Dump from a .pcap File

You lot tin brandish a unmarried bundle dump from a .pcap file by entering:

                                                Device                #                                  show monitor capture file wink:mycap.pcap packet-number x dump                                Starting the packet display ........ Printing Ctrl + Shift + 6 to leave  0000  00 e1 6d 31 f1 80 00 e1 6d 31 f1 80 08 00 45 00   ..m1....m1....East. 0010  00 64 04 be 00 00 ff 01 8e c4 0a 0a 0a 01 0a 0a   .d.............. 0020  0a 02 00 00 ec ce 00 2e 00 04 00 00 00 00 09 c9   ................ 0030  8f 80 ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0040  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0050  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0060  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0070  ab cd                          

Case: Displaying Statistics of Packets Captured in a .pcap File

Yous can brandish the statistics of the packets captured in a .pcap file by entering:

                                                Device                #                                  show monitor capture file flash:mycap.pcap statistics "h225,counter"                                ================== H225 Message and Reason Counter ================== RAS-Messages: Call Signalling: =====================================================================                          

Example: Uncomplicated Capture and Display

This example shows how to monitor traffic in the Layer iii interface Gigabit Ethernet ane/0/1:

Pace one: Define a capture signal to match on the relevant traffic by entering:

                                                      Device                  #                                      monitor capture mycap interface GigabitEthernet1/0/three in                                                        Device                  #                                      monitor capture mycap friction match ipv4 any whatsoever                                                        Device                  #                                      monitor capture mycap limit duration lx packets 50                                                        Device                  #                                      monitor capture mycap buffer size 100                                                

To avoid high CPU utilization, a low parcel count and duration equally limits has been set.

Footstep two: Confirm that the capture point has been correctly divers by entering:

                                                      Device                  #                                      prove monitor capture mycap parameter                                    monitor capture mycap interface GigabitEthernet1/0/three in    monitor capture mycap match ipv4  any whatever    monitor capture mycap buffer size 100    monitor capture mycap limit packets 50 duration 60                                      Device                  #                                      show monitor capture mycap                                    Status Information for Capture mycap   Target Type:    Interface: GigabitEthernet1/0/iii, Management: in    Status : Inactive   Filter Details:    IPv4     Source IP:  whatsoever     Destination IP:  any    Protocol: any   Buffer Details:    Buffer Type: LINEAR (default)    Buffer Size (in MB): 100   File Details:    File not associated   Limit Details:    Number of Packets to capture: 50    Packet Capture elapsing: 60    Packet Size to capture: 0 (no limit)    Parcel sampling rate: 0 (no sampling)                              

Step 3: Start the capture process and brandish the results.

                                                      Device                  #                                      monitor capture mycap start display                                    Starting the packet display ........ Press Ctrl + Shift + half dozen to go out    one   0.000000   10.ten.x.2 -> 10.x.10.1   ICMP 114 Echo (ping) request  id=0x0030, seq=0/0, ttl=254   2   0.003682   ten.10.10.2 -> 10.10.x.ane   ICMP 114 Echo (ping) request  id=0x0030, seq=ane/256, ttl=254   3   0.006586   10.10.10.2 -> 10.10.10.i   ICMP 114 Echo (ping) request  id=0x0030, seq=2/512, ttl=254   4   0.008941   x.10.ten.2 -> x.10.x.1   ICMP 114 Repeat (ping) request  id=0x0030, seq=3/768, ttl=254   5   0.011138   x.10.10.2 -> 10.x.x.i   ICMP 114 Repeat (ping) asking  id=0x0030, seq=iv/1024, ttl=254   half dozen   0.014099   10.10.10.2 -> ten.x.ten.1   ICMP 114 Echo (ping) request  id=0x0030, seq=five/1280, ttl=254   seven   0.016868   x.10.10.2 -> 10.10.ten.one   ICMP 114 Repeat (ping) request  id=0x0030, seq=vi/1536, ttl=254   eight   0.019210   10.10.ten.2 -> 10.10.10.1   ICMP 114 Repeat (ping) request  id=0x0030, seq=seven/1792, ttl=254   9   0.024785   ten.10.x.two -> x.10.10.i   ICMP 114 Echo (ping) request  id=0x0030, seq=eight/2048, ttl=254  --More--                              

Step four: Delete the capture indicate by entering:

                                                      Device                  #                                      no monitor capture mycap                                                

Note

A finish control is not required in this particular case since we take set a limit and the capture will automatically stop one time that limit is reached.


For more data on syntax to be used for pcap statistics, refer the "Additional References" section.

Example: Elementary Capture and Store

This example shows how to capture packets to a filter:

Step 1: Define a capture point to friction match on the relevant traffic and acquaintance information technology to a file by entering:

                                                      Device                  #                                      monitor capture mycap interface GigabitEthernet1/0/3 in                                                        Device                  #                                      monitor capture mycap match ipv4 whatsoever whatsoever                                                        Device                  #                                      monitor capture mycap limit duration lx packets 50                                                        Device                  #                                      monitor capture mycap file location flash:mycap.pcap                                                

Stride 2: Confirm that the capture point has been correctly defined by entering:

                                                      Device                  #                                      bear witness monitor capture mycap parameter                                    monitor capture mycap interface GigabitEthernet1/0/3 in    monitor capture mycap match ipv4  whatever whatsoever    monitor capture mycap file location flash:mycap.pcap    monitor capture mycap limit packets l duration threescore                                      Device                  #                                      prove monitor capture mycap                                    Status Information for Capture mycap   Target Type:    Interface: GigabitEthernet1/0/3, Direction: in    Status : Inactive   Filter Details:    IPv4     Source IP:  any     Destination IP:  any    Protocol: whatever   Buffer Details:    Buffer Type: LINEAR (default)   File Details:    Associated file name: wink:mycap.pcap   Limit Details:    Number of Packets to capture: 50    Bundle Capture duration: 60    Bundle Size to capture: 0 (no limit)    Packet sampling rate: 0 (no sampling)                              

Pace three: Launch packet capture by entering:

                                                      Device                  #                                      monitor capture mycap start                                                

Step 4: Display extended capture statistics during runtime by entering:

                                                      Device                  #                                                            show monitor capture mycap capture-statistics                                    Capture statistics collected at software:         Capture duration - 15 seconds         Packets received - xl         Packets dropped - 0         Packets oversized - 0         Packets errored - 0         Packets sent - 40         Bytes received - 7280         Bytes dropped - 0         Bytes oversized - 0         Bytes errored - 0         Bytes sent ¬ 4560                              

Step 5: Later sufficient time has passed, stop the capture past entering:

                                                      Device                  #                                      monitor capture mycap stop                                    Capture statistics collected at software (Buffer & Wireshark):         Capture duration - twenty seconds         Packets received - 50         Packets dropped - 0         Packets oversized - 0                              

Annotation

Alternatively, you could allow the capture performance end automatically after the time has elapsed or the packet count has been met.

The mycap.pcap file now contains the captured packets.


Step 6: Brandish extended capture statistics after stop by inbound:

                                                      Device                  #                                                            prove monitor capture mycap capture-statistics                                    Capture statistics collected at software:         Capture duration - 20 seconds         Packets received - l         Packets dropped - 0         Packets oversized - 0         Packets errored - 0         Packets sent - 50         Bytes received - 8190         Bytes dropped - 0         Bytes oversized - 0         Bytes errored - 0         Bytes sent ¬ 5130                              

Stride vii: Display the packets by entering:

                                                      Device                  #                                      show monitor capture file flash:mycap.pcap                                    Starting the packet display ........ Press Ctrl + Shift + 6 to leave    1 0.000000000   x.10.10.2 -> x.x.x.i   ICMP 114 Echo (ping) asking  id=0x0031, seq=0/0, ttl=254   two 0.002555000   10.10.ten.2 -> ten.10.x.1   ICMP 114 Echo (ping) request  id=0x0031, seq=1/256, ttl=254   3 0.006199000   10.ten.10.ii -> ten.10.10.1   ICMP 114 Echo (ping) request  id=0x0031, seq=2/512, ttl=254   4 0.009199000   ten.10.10.ii -> 10.x.10.ane   ICMP 114 Echo (ping) asking  id=0x0031, seq=three/768, ttl=254   5 0.011647000   10.10.10.2 -> 10.10.ten.1   ICMP 114 Repeat (ping) request  id=0x0031, seq=4/1024, ttl=254   6 0.014168000   ten.x.10.2 -> 10.x.ten.1   ICMP 114 Echo (ping) request  id=0x0031, seq=v/1280, ttl=254   7 0.016737000   10.x.x.2 -> 10.10.10.1   ICMP 114 Echo (ping) asking  id=0x0031, seq=vi/1536, ttl=254   8 0.019403000   10.10.10.2 -> ten.10.10.1   ICMP 114 Echo (ping) request  id=0x0031, seq=7/1792, ttl=254   nine 0.022151000   10.x.x.ii -> ten.10.10.1   ICMP 114 Echo (ping) request  id=0x0031, seq=8/2048, ttl=254  10 0.024722000   ten.ten.10.ii -> 10.ten.10.1   ICMP 114 Echo (ping) request  id=0x0031, seq=9/2304, ttl=254  xi 0.026890000   10.ten.10.ii -> 10.ten.x.i   ICMP 114 Echo (ping) asking  id=0x0031, seq=10/2560, ttl=254  12 0.028862000   10.10.10.2 -> x.x.10.1   ICMP 114 Echo (ping) request  id=0x0031, seq=11/2816, ttl=254  --More than--                              

For more information on syntax to be used for pcap statistics, refer the "Boosted References" department.

Stride eight: Delete the capture indicate by entering:

                                                      Device                  #                                      no monitor capture mycap                                                

Instance: Using Buffer Capture

This example shows how to utilise buffer capture:

Pace one: Launch a capture session with the buffer capture option by entering:

                                                      Device                  #                                      monitor capture mycap interface GigabitEthernet1/0/3 in                                                        Device                  #                                      monitor capture mycap match ipv4 whatsoever whatsoever                                                        Device                  #                                      monitor capture mycap buffer circular size 1                                                        Device                  #                                      monitor capture mycap get-go                                                

Step 2: Determine whether the capture is active past entering:

                                                      Device                  #                                      show monitor capture mycap                                    Status Information for Capture mycap   Target Type:    Interface: GigabitEthernet1/0/3, Management: in    Status : Active   Filter Details:    IPv4     Source IP:  whatever     Destination IP:  any    Protocol: whatever   Buffer Details:    Buffer Type: Circular    Buffer Size (in MB): ane   File Details:    File not associated   Limit Details:    Number of Packets to capture: 0 (no limit)    Packet Capture duration: 0 (no limit)    Packet Size to capture: 0 (no limit)    Maximum number of packets to capture per 2d: k    Package sampling rate: 0 (no sampling)                              

Step iii: Display extended capture statistics during runtime by inbound:

                                                      Device                  #                                      evidence monitor capture mycap capture-statistics                                    Capture statistics collected at software:         Capture duration - 88 seconds         Packets received - 1000         Packets dropped - 0         Packets oversized - 0         Packets errored - 0         Packets sent - thou         Bytes received - 182000         Bytes dropped - 0         Bytes oversized - 0         Bytes errored - 0         Bytes sent - 114000                              

Stride 4: Stop the capture by entering:

                                                      Device                  #                                      monitor capture mycap stop                                    Capture statistics collected at software (Buffer):         Capture elapsing - 2185 seconds         Packets received - 51500         Packets dropped - 0         Packets oversized - 0                              

Step 5: Brandish extended capture statistics after stop by entering:

                                                      Device                  #                                      show monitor capture mycap capture-statistics                                    Capture statistics nerveless at software:         Capture duration - 156 seconds         Packets received - 2000         Packets dropped - 0         Packets oversized - 0         Packets errored - 0         Packets sent - 2000         Bytes received - 364000         Bytes dropped - 0         Bytes oversized - 0         Bytes errored - 0         Bytes sent - 228000                              

Step 6: Make up one's mind whether the capture is active past entering:

                                                      Device                  #                                      testify monitor capture mycap                                    Status Information for Capture mycap   Target Blazon:    Interface: GigabitEthernet1/0/iii, Management: in    Status : Inactive   Filter Details:    IPv4     Source IP:  whatever     Destination IP:  whatever    Protocol: any   Buffer Details:    Buffer Type: Round    Buffer Size (in MB): i   File Details:    File not associated   Limit Details:    Number of Packets to capture: 0 (no limit)    Packet Capture duration: 0 (no limit)    Packet Size to capture: 0 (no limit)    Maximum number of packets to capture per second: one thousand    Parcel sampling rate: 0 (no sampling)                              

Step 7: Display the packets in the buffer by entering:

                                                      Device                  #                                      show monitor capture mycap buffer cursory                                    Starting the bundle display ........ Printing Ctrl + Shift + half-dozen to exit    1   0.000000   ten.x.ten.2 -> 10.10.ten.1   ICMP 114 Echo (ping) request  id=0x0038, seq=40057/31132, ttl=254   ii   0.000030   10.x.10.two -> 10.10.10.i   ICMP 114 Echo (ping) request  id=0x0038, seq=40058/31388, ttl=254   3   0.000052   10.10.ten.2 -> ten.10.10.1   ICMP 114 Echo (ping) request  id=0x0038, seq=40059/31644, ttl=254   4   0.000073   ten.ten.x.2 -> 10.10.x.one   ICMP 114 Repeat (ping) request  id=0x0038, seq=40060/31900, ttl=254   5   0.000094   ten.10.x.ii -> 10.10.ten.one   ICMP 114 Echo (ping) request  id=0x0038, seq=40061/32156, ttl=254   6   0.000115   10.10.10.2 -> ten.ten.10.i   ICMP 114 Echo (ping) request  id=0x0038, seq=40062/32412, ttl=254   seven   0.000137   x.ten.10.ii -> x.10.10.1   ICMP 114 Repeat (ping) asking  id=0x0038, seq=40063/32668, ttl=254   8   0.000158   x.10.x.2 -> 10.10.10.i   ICMP 114 Repeat (ping) request  id=0x0038, seq=40064/32924, ttl=254   ix   0.000179   10.10.10.ii -> ten.10.10.1   ICMP 114 Repeat (ping) asking  id=0x0038, seq=40065/33180, ttl=254  10   0.000200   10.10.10.2 -> 10.10.10.1   ICMP 114 Echo (ping) request  id=0x0038, seq=40066/33436, ttl=254  11   0.000221   10.10.10.2 -> 10.10.10.one   ICMP 114 Echo (ping) request  id=0x0038, seq=40067/33692, ttl=254  12   0.000243   10.10.10.ii -> x.x.ten.i   ICMP 114 Echo (ping) request  id=0x0038, seq=40068/33948, ttl=254  --More than--                              

Notice that the packets have been buffered.

Step 8: Brandish the packets in other display modes.

                                                      Device                  #                                      testify monitor capture mycap buffer detailed                                    Starting the packet display ........ Press Ctrl + Shift + 6 to exit  Frame 1: 114 bytes on wire (912 bits), 114 bytes captured (912 $.25) on interface 0     Interface id: 0     Encapsulation type: Ethernet (1)     Arrival Time: Nov  six, 2015 18:10:06.297972000 UTC     [Time shift for this packet: 0.000000000 seconds]     Epoch Time: 1446833406.297972000 seconds     [Time delta from previous captured frame: 0.000000000 seconds]     [Time delta from previous displayed frame: 0.000000000 seconds]     [Fourth dimension since reference or first frame: 0.000000000 seconds]     Frame Number: 1     Frame Length: 114 bytes (912 bits)     Capture Length: 114 bytes (912 bits)     [Frame is marked: Faux]     [Frame is ignored: False]     [Protocols in frame: eth:ip:icmp:data] Ethernet 2, Src: Cisco_f3:63:46 (00:e1:6d:f3:63:46), Dst: Cisco_31:f1:c6 (00:e1:6d:31:f1:c6)     Destination: Cisco_31:f1:c6 (00:e1:6d:31:f1:c6)         Address: Cisco_31:f1:c6 (00:e1:6d:31:f1:c6)         .... ..0. .... .... .... .... = LG bit: Globally unique address (mill default)         .... ...0 .... .... .... .... = IG scrap: Individual address (unicast)     Source: Cisco_f3:63:46 (00:e1:6d:f3:63:46)         Address: Cisco_f3:63:46 (00:e1:6d:f3:63:46)         .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)         .... ...0 .... .... .... .... = IG fleck: Individual accost (unicast)     Type: IP (0x0800) Internet Protocol Version four, Src: 10.10.10.2 (ten.10.x.2), Dst: 10.10.10.one (10.10.ten.i)     Version: iv     Header length: 20 bytes     Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT (Not ECN-Capable Transport))         0000 00.. = Differentiated Services Codepoint: Default (0x00)         .... ..00 = Explicit Congestion Notification: Non-ECT (Not ECN-Capable Transport) (0x00)     Total Length: 100     Identification: 0xabdd (43997)     Flags: 0x00         0... .... = Reserved bit: Not set         .0.. .... = Don't fragment: Not set         ..0. .... = More than fragments: Non ready     Fragment start: 0     Time to live: 254     Protocol: ICMP (i)     Header checksum: 0xe8a4 [validation disabled]         [Good: False]         [Bad: False]     Source: 10.ten.ten.two (10.ten.10.ii)     Destination: 10.10.ten.1 (10.10.10.1) Internet Control Message Protocol     Type: 8 (Repeat (ping) request)     Lawmaking: 0     Checksum: 0xa620 [correct]     Identifier (BE): 56 (0x0038)     Identifier (LE): 14336 (0x3800)     Sequence number (BE): 40057 (0x9c79)     Sequence number (LE): 31132 (0x799c)     Information (72 bytes)  0000  00 00 00 00 0b 15 30 63 ab cd ab cd ab cd ab cd   ......0c........ 0010  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0020  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0030  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0040  ab cd ab cd ab cd ab cd                           ........         Information: 000000000b153063abcdabcdabcdabcdabcdabcdabcdabcd...         [Length: 72]  Frame ii: 114 bytes on wire (912 bits), 114 bytes captured (912 bits) on interface 0                                      Device                  #                                      show monitor capture mycap buffer dump                                    Starting the packet display ........ Press Ctrl + Shift + 6 to exit  0000  00 e1 6d 31 f1 c6 00 e1 6d f3 63 46 08 00 45 00   ..m1....g.cF..E. 0010  00 64 ab dd 00 00 fe 01 e8 a4 0a 0a 0a 02 0a 0a   .d.............. 0020  0a 01 08 00 a6 20 00 38 9c 79 00 00 00 00 0b 15   ..... .8.y...... 0030  30 63 ab cd ab cd ab cd ab cd ab cd ab cd ab cd   0c.............. 0040  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0050  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0060  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0070  ab cd                                             ..  0000  00 e1 6d 31 f1 c6 00 e1 6d f3 63 46 08 00 45 00   ..m1....chiliad.cF..E. 0010  00 64 ab de 00 00 iron 01 e8 a3 0a 0a 0a 02 0a 0a   .d.............. 0020  0a 01 08 00 a6 1d 00 38 9c 7a 00 00 00 00 0b 15   .......8.z...... 0030  thirty 65 ab cd ab cd ab cd ab cd ab cd ab cd ab cd   0e.............. 0040  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0050  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0060  ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd   ................ 0070  ab cd                              

Stride ix: Articulate the buffer past entering:

                                                      Device                  #                                      monitor capture mycap clear                                                

Note

NOTE - Clearing the buffer deletes the buffer along with the contents.



Note

If you lot require the buffer contents to be displayed, run the clear commands after show commands.


Footstep x: Restart the traffic, await for 10 seconds, then display the buffer contents by entering:


Annotation

Nosotros cannot run evidence from buffer during an agile capture. Capture should be stopped before running show from buffer. Nosotros can even so run a show on a pcap file during an active capture in both file and buffer manner. In file fashion, we can display the packets in the current capture session's pcap file as well when the capture is active.
                                                      Device                  #                                      monitor capture mycap kickoff                                    Switch#  show monitor capture mycap  Status Information for Capture mycap   Target Type:    Interface: GigabitEthernet1/0/3, Management: in    Status : Active   Filter Details:    IPv4     Source IP:  any     Destination IP:  whatsoever    Protocol: whatever   Buffer Details:    Buffer Type: Round    Buffer Size (in MB): ane   File Details:    File non associated   Limit Details:    Number of Packets to capture: 0 (no limit)    Packet Capture duration: 0 (no limit)    Packet Size to capture: 0 (no limit)    Maximum number of packets to capture per second: 1000    Packet sampling charge per unit: 0 (no sampling)                              

Step 11: Stop the packet capture and brandish the buffer contents past entering:

                                                      Device                  #                                      monitor capture mycap stop                                    Capture statistics nerveless at software (Buffer):  Capture duration - 111 seconds  Packets received - 5000  Packets dropped - 0  Packets oversized - 0                              

Footstep 12: Make up one's mind whether the capture is active past entering:

                                                      Device                  #                                      show monitor capture mycap                                    Status Information for Capture mycap  Target Type:   Interface: GigabitEthernet1/0/iii, Direction: in  Status : Inactive Filter Details:  IPv4   Source IP: any   Destination IP: whatsoever  Protocol: any Buffer Details:  Buffer Type: CIRCULAR  Buffer Size (in MB): i File Details:  File not associated Limit Details:  Number of Packets to capture: 0 (no limit)   Packet Capture duration: 0 (no limit)  Packet Size to capture: 0 (no limit)  Maximum number of packets to capture per second: 1000  Package sampling rate: 0 (no sampling)              

Step 13: Brandish the packets in the buffer by inbound:

                                                      Device                  #                                      show monitor capture mycap buffer brief                                    Starting the packet display ........ Press Ctrl + Shift + six to leave    one 0.000000000   10.10.10.2 -> ten.ten.10.ane   ICMP 114 Repeat (ping) request  id=0x0039, seq=0/0, ttl=254   2 0.000030000   10.10.10.2 -> 10.10.10.ane   ICMP 114 Repeat (ping) request  id=0x0039, seq=1/256, ttl=254   three 0.000051000   x.10.10.2 -> ten.10.10.one   ICMP 114 Echo (ping) request  id=0x0039, seq=two/512, ttl=254   4 0.000072000   10.10.10.2 -> 10.10.x.ane   ICMP 114 Echo (ping) request  id=0x0039, seq=3/768, ttl=254   5 0.000093000   10.ten.10.two -> x.10.x.one   ICMP 114 Repeat (ping) request  id=0x0039, seq=4/1024, ttl=254   6 0.000114000   10.10.x.ii -> 10.10.ten.ane   ICMP 114 Repeat (ping) request  id=0x0039, seq=5/1280, ttl=254   seven 0.000136000   10.10.10.2 -> ten.ten.10.1   ICMP 114 Echo (ping) request  id=0x0039, seq=6/1536, ttl=254   eight 0.000157000   10.ten.ten.2 -> x.10.10.1   ICMP 114 Echo (ping) asking  id=0x0039, seq=7/1792, ttl=254   nine 0.000178000   ten.10.ten.2 -> x.10.10.1   ICMP 114 Echo (ping) request  id=0x0039, seq=8/2048, ttl=254  10 0.000199000   10.10.x.2 -> 10.10.10.1   ICMP 114 Echo (ping) request  id=0x0039, seq=ix/2304, ttl=254  11 0.000220000   ten.10.ten.two -> 10.10.10.1   ICMP 114 Echo (ping) request  id=0x0039, seq=10/2560, ttl=254  12 0.000241000   ten.x.x.2 -> ten.x.ten.1   ICMP 114 Repeat (ping) request  id=0x0039, seq=xi/2816, ttl=254  --More‹                              

Step 14: Store the buffer contents to the mycap.pcap file in the internal wink: storage device past inbound:

                                                      Device                  #                                      monitor capture mycap export flash:mycap.pcap                                    Exported Successfully                              

Annotation

The current implementation of export is such that when the command is run, export is "started" but not complete when it returns the prompt to the user. So we have to wait for a bulletin display on the panel from Wireshark before information technology can run a brandish of packets in the file.


Step 15: Display capture packets from the file by entering:

                                                      Device                  #                                                            show monitor capture file flash:mycap.pcap                                    Starting the package display ........ Printing Ctrl + Shift + 6 to exit    ane 0.000000000   10.10.10.2 -> 10.x.10.1   ICMP 114 Echo (ping) request  id=0x0039, seq=0/0, ttl=254   2 0.000030000   10.10.10.2 -> ten.10.10.1   ICMP 114 Echo (ping) request  id=0x0039, seq=1/256, ttl=254   iii 0.000051000   10.10.10.ii -> 10.10.10.ane   ICMP 114 Echo (ping) request  id=0x0039, seq=2/512, ttl=254   four 0.000072000   10.ten.10.2 -> 10.10.10.1   ICMP 114 Echo (ping) request  id=0x0039, seq=iii/768, ttl=254   five 0.000093000   10.10.10.2 -> 10.10.10.one   ICMP 114 Repeat (ping) request  id=0x0039, seq=4/1024, ttl=254   vi 0.000114000   ten.10.10.two -> 10.10.10.1   ICMP 114 Echo (ping) request  id=0x0039, seq=5/1280, ttl=254   seven 0.000136000   10.10.10.2 -> x.10.10.1   ICMP 114 Echo (ping) request  id=0x0039, seq=6/1536, ttl=254   eight 0.000157000   ten.x.x.ii -> ten.10.10.one   ICMP 114 Echo (ping) request  id=0x0039, seq=seven/1792, ttl=254   9 0.000178000   10.10.10.2 -> ten.10.10.1   ICMP 114 Echo (ping) asking  id=0x0039, seq=8/2048, ttl=254  10 0.000199000   10.10.x.two -> 10.10.ten.one   ICMP 114 Echo (ping) request  id=0x0039, seq=nine/2304, ttl=254  11 0.000220000   10.10.10.ii -> 10.10.ten.1   ICMP 114 Echo (ping) request  id=0x0039, seq=10/2560, ttl=254  12 0.000241000   10.10.10.2 -> 10.x.ten.one   ICMP 114 Echo (ping) request  id=0x0039, seq=11/2816, ttl=254  --More--                              

Stride 16: Delete the capture point by entering:

                                                      Device                  #                                      no monitor capture mycap                                                

Example: Uncomplicated Capture and Store of Packets in Egress Management

This example shows how to capture packets to a filter:

Step one: Define a capture point to match on the relevant traffic and associate it to a file by entering:

                                                      Device                  #                                      monitor capture mycap interface Gigabit i/0/ane out match ipv4 whatever any                                                        Device                  #                                      monitor capture mycap limit duration sixty packets 100                                                        Device                  #                                      monitor capture mycap file location wink:mycap.pcap buffer-size xc                                                

Step two: Confirm that the capture point has been correctly defined by entering:

                                                      Device                  #                                      evidence monitor capture mycap parameter                                    monitor capture mycap interface GigabitEthernet1/0/1 out    monitor capture mycap match ipv4  whatever whatsoever    monitor capture mycap file location flash:mycap.pcap buffer-size ninety    monitor capture mycap limit packets 100 duration threescore                                      Device                  #                                      show monitor capture mycap                                    Status Information for Capture mycap   Target Type:    Interface: GigabitEthernet1/0/1, Management: out    Condition : Inactive   Filter Details:    IPv4     Source IP:  any     Destination IP:  whatsoever    Protocol: any   Buffer Details:    Buffer Type: LINEAR (default)   File Details:    Associated file name: flash:mycap.pcap    Size of buffer(in MB): 90   Limit Details:    Number of Packets to capture: 100    Packet Capture duration: 60    Package Size to capture: 0 (no limit)    Packets per second: 0 (no limit)    Packet sampling rate: 0 (no sampling)              

Stride 3: Launch packet capture past entering:

                                                      Device                  #                                      monitor capture mycap start                                    A file by the same capture file name already exists, overwrite?[confirm] Turning on lock-pace style                                      Device                  # *Oct 14 09:35:32.661: %BUFCAP-6-ENABLE: Capture Point mycap enabled.                              

Note

Allow the capture performance stop automatically after the time has elapsed or the packet count has been met. When you meet the following bulletin in the output, will know that the capture operation has stopped:

                          *October fourteen 09:36:34.632: %BUFCAP-6-DISABLE_ASYNC: Capture Point mycap disabled. Rea son : Wireshark Session Ended                                                  

The mycap.pcap file now contains the captured packets.


Step 4: Brandish the packets by entering:

                                                      Device                  #                                      testify monitor capture file flash:mycap.pcap                                    Starting the packet display ........ Press Ctrl + Shift + 6 to exit    0.000000    10.1.one.xxx -> 20.i.ane.2     UDP Source port: 20001  Destination port: 20002   1.000000    ten.1.1.31 -> 20.1.ane.two     UDP Source port: 20001  Destination port: 20002   2.000000    10.1.1.32 -> twenty.i.1.2     UDP Source port: 20001  Destination port: 20002   3.000000    ten.1.i.33 -> xx.1.1.2     UDP Source port: 20001  Destination port: 20002   four.000000    10.one.one.34 -> xx.1.1.two     UDP Source port: 20001  Destination port: 20002   5.000000    x.1.1.35 -> 20.1.1.2     UDP Source port: 20001  Destination port: 20002   half-dozen.000000    x.1.1.36 -> 20.1.ane.2     UDP Source port: 20001  Destination port: 20002   7.000000    10.1.ane.37 -> 20.i.1.2     UDP Source port: 20001  Destination port: 20002   eight.000000    ten.i.ane.38 -> xx.1.one.2     UDP Source port: 20001  Destination port: 20002   9.000000    10.1.1.39 -> 20.one.1.two     UDP Source port: 20001  Destination port: 20002                              

Pace 5: Delete the capture point past inbound:

                                                      Device                  #                                      no monitor capture mycap                                                

Configuration Examples for Embedded Parcel Capture

Example: Managing Packet Data Capture

The following instance shows how to manage parcel data capture:

                                                Device                >                                  enable                                                  Device                #                                  monitor capture mycap kickoff                                                  Device                #                                  monitor capture mycap access-­list v4acl                                                  Device                #                                  monitor capture mycap limit duration 1000                                                  Device                #                                  monitor capture mycap interface GigabitEthernet 0/0/1 both                                                  Device                #                                  monitor capture mycap buffer circular size ten                                                  Device                #                                  monitor capture mycap showtime                                                  Device                #                                  monitor capture mycap export tftp://10.1.88.9/mycap.pcap                                                  Device                #                                  monitor capture mycap stop                                                  Device                #                                  cease                                          

Example: Monitoring and Maintaining Captured Data

The post-obit case shows how to dump packets in ASCII format:
                                                      Device                  #                                      show monitor capture mycap buffer dump                                    Starting the parcel display ........ Press Ctrl + Shift + 6 to get out  0 0000: 01005E00 00020000 0C07AC1D 080045C0 ..^...........Due east. 0010: 00300000 00000111 CFDC091D 0002E000 .0.............. 0020: 000207C1 07C1001C 802A0000 10030AFA .........*...... 0030: 1D006369 73636F00 0000091D 0001 ..example....... one 0000: 01005E00 0002001B 2BF69280 080046C0 ..^.....+.....F. 0010: 00200000 00000102 44170000 0000E000 . ......D....... 0020: 00019404 00001700 E8FF0000 0000 .............. two 0000: 01005E00 0002001B 2BF68680 080045C0 ..^.....+.....E. 0010: 00300000 00000111 CFDB091D 0003E000 .0.............. 0020: 000207C1 07C1001C 88B50000 08030A6E ...............n 0030: 1D006369 73636F00 0000091D 0001 ..example....... 3 0000: 01005E00 000A001C 0F2EDC00 080045C0 ..^...........E. 0010: 003C0000 00000258 CE7F091D 0004E000 .<.....10........ 0020: 000A0205 F3000000 00000000 00000000 ................ 0030: 00000000 00D10001 000C0100 01000000 ................ 0040: 000F0004 00080501 0300              
The following case shows how to display the listing of commands used to configure the capture named mycap:
                                                      Device                  #                                      show monitor capture mycap parameter                                    monitor capture mycap interface GigabitEthernet i/0/one both monitor capture mycap match any monitor capture mycap buffer size 10 monitor capture mycap limit pps thou              
The following example shows how to debug the capture betoken:
                                                      Device                  #                                      debug epc capture-­bespeak                                    EPC capture indicate operations debugging is on                                      Device                  #                                      monitor capture mycap outset                                    *Jun 4 xiv:17:15.463: EPC CP: Starting the capture cap1 *Jun 4 xiv:17:xv.463: EPC CP: (brief=3, detailed=4, dump=five) = 0 *Jun 4 14:17:15.463: EPC CP: final check before activation *Jun 4 14:17:xv.463: EPC CP: setting up c3pl infra *Jun four 14:17:15.463: EPC CP: Setup c3pl acl-­class-­policy *Jun four 14:17:xv.463: EPC CP: Creating a class *Jun 4 14:17:15.464: EPC CP: Creating a form : Successful *Jun 4 14:17:15.464: EPC CP: course-­map Created *Jun iv 14:17:xv.464: EPC CP: creating policy-­name epc_policy_cap1 *Jun four 14:17:15.464: EPC CP: Creating Policy epc_policy_cap1 of type 49 and customer type 21 *Jun iv 14:17:15.464: EPC CP: Storing a Policy *Jun iv 14:17:fifteen.464: EPC CP: calling ppm_store_policy with epc_policy *Jun iv 14:17:xv.464: EPC CP: Creating Policy : Successful *Jun 4 14:17:15.464: EPC CP: policy-­map created *Jun four xiv:17:xv.464: EPC CP: creating filter for ANY *Jun 4 14:17:15.464: EPC CP: Adding acl to course : Successful *Jun 4 14:17:15.464: EPC CP: Setup c3pl class to policy *Jun 4 fourteen:17:fifteen.464: EPC CP: Attaching Class to Policy *Jun iv 14:17:fifteen.464: EPC CP: Attaching epc_class_cap1 to epc_policy_cap1 *Jun 4 14:17:15.464: EPC CP: Attaching Course to Policy : Successful *Jun iv 14:17:15.464: EPC CP: setting upwardly c3pl qos *Jun 4 14:17:xv.464: EPC CP: DBG> Ready packet rate limit to yard *Jun 4 14:17:15.464: EPC CP: creating action for policy_map epc_policy_cap1 class_map epc_class_cap1 *Jun four 14:17:15.464: EPC CP: DBG> Set up packet charge per unit limit to 1000 *Jun 4 fourteen:17:15.464: EPC CP: Activating Interface GigabitEthernet1/0/1 direction both *Jun 4 14:17:fifteen.464: EPC CP: Id fastened 0 *Jun 4 14:17:15.464: EPC CP: inserting into active lists *Jun four 14:17:xv.464: EPC CP: Id attached 0 *Jun 4 14:17:15.465: EPC CP: inserting into active lists *Jun 4 fourteen:17:15.465: EPC CP: Activating Vlan *Jun 4 fourteen:17:15.465: EPC CP: Deleting all temp interfaces *Jun 4 14:17:fifteen.465: %BUFCAP-­half dozen-­ENABLE: Capture Point cap1 enabled. *Jun 4 fourteen:17:xv.465: EPC CP: Active Capture 1                                      Device                  #                                      monitor capture mycap1 stop                                    *Jun 4 14:17:31.963: EPC CP: Stopping the capture cap1 *Jun 4 xiv:17:31.963: EPC CP: Warning: unable to unbind capture cap1 *Jun 4 xiv:17:31.963: EPC CP: Deactivating policy-­map *Jun 4 14:17:31.963: EPC CP: Policy epc_policy_cap1 *Jun 4 14:17:31.964: EPC CP: Deactivating policy-­map Successful *Jun 4 14:17:31.964: EPC CP: removing povision feature *Jun iv 14:17:31.964: EPC CP: Constitute action for policy-­map epc_policy_cap1 class-­map epc_class_cap1 *Jun 4 14:17:31.964: EPC CP: cleanning up c3pl infra *Jun iv 14:17:31.964: EPC CP: Removing Class epc_class_cap1 from Policy *Jun four fourteen:17:31.964: EPC CP: Removing Class from epc_policy_cap1 *Jun 4 14:17:31.964: EPC CP: Successfully removed *Jun 4 14:17:31.964: EPC CP: Removing acl mac from class *Jun 4 14:17:31.964: EPC CP: Removing acl from class : Successful *Jun 4 14:17:31.964: EPC CP: Removing all policies *Jun iv fourteen:17:31.964: EPC CP: Removing Policy epc_policy_cap1 *Jun iv xiv:17:31.964: EPC CP: Removing Policy : Successful *Jun iv 14:17:31.964: EPC CP: Removing course epc_class_cap1 *Jun 4 14:17:31.965: EPC CP: Removing class : Successful *Jun 4 14:17:31.965: %BUFCAP-­half-dozen-­DISABLE: Capture Point cap1 disabled. *Jun 4 14:17:31.965: EPC CP: Active Capture 0              
The following case shows how to debug the Embedded Bundle Capture (EPC) provisioning:
                                                      Device                  #                                      debug epc provision                                    EPC provisionioning debugging is on                                      Device                  #                                      monitor capture mycap outset                                    *Jun four 14:17:54.991: EPC PROV: No action found for policy-­map epc_policy_cap1 class-­map epc_class_cap1 *Jun 4 fourteen:17:54.991: EPC PROV: *Jun 4 fourteen:17:54.991: Attempting to install service policy epc_policy_cap1 *Jun 4 14:17:54.992: EPC PROV: Attached service policy to epc idb subblock *Jun four 14:17:54.992: EPC PROV: Successful. Create feature object *Jun iv fourteen:17:54.992: EPC PROV: *Jun iv 14:17:54.992: Attempting to install service policy epc_policy_cap1 *Jun 4 fourteen:17:54.992: EPC PROV: Successful. Create characteristic object *Jun iv 14:17:54.992: %BUFCAP-­6-­ENABLE: Capture Point cap1 enabled.                                      Device                  #                                      monitor capture mycap stop                                    *Jun 4 14:18:02.503: EPC PROV: Successful. Remove feature object *Jun 4 14:xviii:02.504: EPC PROV: Successful. Remove characteristic object *Jun 4 xiv:18:02.504: EPC PROV: Destroyed epc idb subblock *Jun 4 14:18:02.504: EPC PROV: Found action for policy-­map epc_policy_cap1 class-­map epc_class_cap1 *Jun iv xiv:18:02.504: EPC PROV: Deleting EPC activity *Jun 4 14:18:02.504: EPC PROV: Successful. CLASS_REMOVE, policy-­map epc_policy_cap1, form epc_class_cap1 *Jun 4 fourteen:18:02.504: %BUFCAP-­vi-­DISABLE: Capture Point cap1 disabled.                              

garciaquede1984.blogspot.com

Source: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3650/software/release/16-1/configuration_guide/b_161_consolidated_3650_cg/b_161_consolidated_3650_cg_chapter_0110000.html

0 Response to "Cisco â€å“this Mailbox Is in Use. Try Again Later.ã¢â‚¬â"

Publicar un comentario

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel