User guide

Using Diagnostic Tools
Chapter 23: Maintenance 741
Table 156: IP Tools Fields
In this field…
Do this…
Tool Select the desired tool.
Source Address Select the IP address from which the packets should originate. This can
be any of the following:
Auto. Automatically select a connected or enabled interface
form which to send the packets.
A connected Internet connection
An enabled internal network
This field is only enabled if you selected the Ping or Traceroute tools.
Address Type the IP address or DNS name for which to run the tool.
Using Packet Sniffer
The Safe@Office appliance includes the Packet Sniffer tool, which enables you to capture
packets from any internal network or Safe@Office port. This is useful for troubleshooting
network problems and for collecting data about network behavior.
If desired, you can configure Packet Sniffer to capture each packet twice: once before
firewall processing and once after firewall processing. This allows you to observe exactly
what the Safe@Office firewall does to your packets.
The Safe@Office appliance saves the captured packets to a file on your computer. You can
use a free protocol analyzer, such as Ethereal or Wireshark, to analyze the file, or you can
send it to technical support. Wireshark runs on all popular computing platforms and can be
downloaded from http://www.wireshark.org. Ethereal can be downloaded from
http://www.ethereal.com.
Note: If you enabled the Packet Sniffer's Firewall Monitor option, and you would like to
view the results in Ethereal/Wireshark, you must do the following: open the capture
file, click Edit > Preferences, in the left pane click Protocols > Ethernet, and select the
Attempt to interpret as Firewall-1 monitor file check box. The capture file will display the
interface name on which the packet was captured, and the packet’s processing