Trouble Ethanalyzer Nexus7000 00
Trouble Ethanalyzer Nexus7000 00
7000
Contents
Introduction
Background Information
Output Options
Filter Options
Capture-Filter
Display-Filter
Write Options
Write
Capture-Ring-Buffer
Read Options
Decode-Internal with Detail Option
Examples of Capture-Filter Values
Capture Traffic to or from an IP Host
Capture Traffic Not on a Certain Protocol - Exclude ARP and DNS Traffic
Capture Only IP Traffic - Exclude Lower Layer Protocols like ARP and STP
Reject Ethernet Frames Based on MAC Address - Exclude Traffic That Belongs to the LLDP Multicast
Group
Known Issues
Related Information
Introduction
This document describes the Ethanalyzer, a Cisco NX-OS integrated packet capture tool for control packets
based upon Wireshark.
Background Information
Wireshark is an open-source, network protocol analyzer widely used across many industries and educational
institutions. It decodes packets captured by libpcap, the packet capture library. Cisco NX-OS runs on top of
the Linux kernel, which uses the libpcap library in order to support packet capture.
Ethanalyzer cannot:
• Warn you when your network experiences problems. However, Ethanalyzer can help you determine
the cause of the problem.
• Capture data plane traffic that is forwarded in hardware.
• Support interface-specific capture.
Output Options
This is a summary view of output from the ethanalyzer local interface inband command. The ? option
displays help.
Use the detail option for detailed protocol information. ^C can be used to abort and get the switch prompt
back in the middle of a capture if required.
Filter Options
Capture-Filter
Use the capture-filter option in order to select which packets to display or save to disk during capture. A
capture filter maintains a high rate of capture while it filters. Because full dissection has not been done on
the packets, the filter fields are predefined and limited.
Display-Filter
Use the display-filter option in order to change the view of a capture file (tmp file). A display filter uses
fully dissected packets, so you can do very complex and advanced filtering when you analyze a network
tracefile. However, the tmp file can fill quickly since it first captures all packets and then displays only the
desired packets.
In this example, limit-captured-frames is set to 5. With the capture-filter option, Ethanalyzer shows you five
packets which match the filter host 10.10.10.2. With the display-filter option, Ethanalyzer first captures five
packets then displays only the packets that match the filter ip.addr==10.10.10.2.
Write Options
Write
The write option lets you write the capture data to a file in one of the storage devices (such as bootflash or
logflash) on the Cisco Nexus 7000 Series Switch for later analysis. The capture file size is limited to 10 MB.
An example Ethanalyzer command with a write option is ethanalyzer local interface inband write
bootflash: capture_file_name. An example of a write option with capture-filter and an output file name of
first-capture is:
When the capture data is saved to a file, the captured packets are, by default, not displayed in the terminal
window. The display option forces Cisco NX-OS to display the packets while it saves the capture data to a
file.
Capture-Ring-Buffer
The capture-ring-buffer option creates multiple files after a specified number of seconds, a specified number
of files, or a specified file size. Definitions of those options are in this screen shot:
Read Options
The read option lets you read the saved file on the device itself.
You can also transfer the file to a server or a PC and read it with Wireshark or any other application that can
read cap or pcap files.
Decode-Internal with Detail Option
The decode-internal option reports internal information on how the Nexus 7000 forwards the packet. This
information helps you understand and troubleshoot the flow of packets through the CPU.
Convert the NX-OS index to hexadecimal, then use the show system internal pixm info ltl x command in
order to map the local target logic (LTL) index to a physical or logical interface.
Examples of Capture-Filter Values
Capture Traffic to or from an IP Host
host 10.1.1.1
net 172.16.7.0/24
net 172.16.7.0 mask 255.255.255.0
port 53
port 67 or port 68
Capture Traffic Not on a Certain Protocol - Exclude HTTP or SMTP Traffic
Capture Traffic Not on a Certain Protocol - Exclude ARP and DNS Traffic
Capture Only IP Traffic - Exclude Lower Layer Protocols like ARP and STP
ip
ip proto 89
Reject Ethernet Frames Based on MAC Address - Exclude Traffic That Belongs to the
LLDP Multicast Group
UDLD is Unidirectional Link Detection, VTP is the VLAN Trunking Protocol, and CDP is the Cisco
Discovery Protocol.
Note:
and = &&
or = ||
not = !
MAC address format : xx:xx:xx:xx:xx:xx
Known Issues
Cisco bug ID CSCue48854: Ethanalyzer capture-filter does not capture traffic from CPU on SUP2.
Cisco bug ID CSCvi02546: SUP3 generated packet can have FCS, this is expected behaviour.
Related Information
• Wireshark: CaptureFilters
• Wireshark: DisplayFilters
• Technical Support & Documentation - Cisco Systems