![]() Show System Processes running with PIDs.Option ‘4′ is particularly useful, in that it shows the associated interface for the directional trafficĭiagnose sniffer packet any ‘net 10.0.0.0/8 and host 172.16.16.14 and port 3389′ĭiagnose sniffer packet any ‘host 10.4.131.97 and host 172.16.16.14 and port 3389′ 4 The Options field at the end are as follow:Ģ: print header and data from ip of packetsģ: print header and data from ethernet of packets (if available)Ĥ: print header of packets with interface nameĥ: print header and data from ip of packets with interface nameĦ: print header and data from ethernet of packets (if available) with intf name You can narrow your search by filtering on any or the following: The command syntax:ĭiagnose sniffer packet ‘net z.z.z.z/p and/or host x.x.x.x and/or port yyy’ ![]() Diagnose debug enable - enable output on remote consoleĭiagnose sniffer command can be used from cli. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |