User Manual

AT8402 Utility Commands
Page 4 - 47 AT8402 CLI Reference Manual
Mode Privileged EXEC
4.10.8 debug igmpsnooping packet
This command enables tracing of IGMP Snooping packets received and transmitted by
the switch.
Default disabled
Format
debug igmpsnooping packet
Mode Privileged EXEC
4.10.8.1 no debug igmpsnooping packet
This command disables tracing of IGMP Snooping packets.
Format
no debug igmpsnooping packet
Mode Privileged EXEC
4.10.9 debug ping packet
This command enables tracing of ICMP echo requests and responses. The command
traces pings on the network port/ serviceport for switching packages. For routing
packages, pings are traced on the routing ports as well.
Default disabled
Format
debug ping packet
Mode Privileged EXEC
A sample output of the trace message is shown below.
<15> JAN 01 00:21:22 192.168.17.29-1 SIM[181040176]: sim_debug.c(128)
20 % Pkt TX - Intf: 1/0/1(1),
SRC_IP:10.50.50.2, DEST_IP:10.50.50.1, Type:ECHO_REQUEST
<15> JAN 01 00:21:22 192.168.17.29-1 SIM[182813968]: sim_debug.c(82) 21
% Pkt RX - Intf: 1/0/1(1), S
RC_IP:10.50.50.1, DEST_IP:10.50.50.2, Type:ECHO_REPLY
The following parameters are displayed in the trace message:
TX/RX TX refers to a packet transmitted by the device. RX refers to packets
received by the device.
Intf The interface that the packet came in or went out on. Format used is
slot/port (internal interface number).
SRC_IP The source IP address in the IP header in the packet.
DEST_IP The destination IP address in the IP header in the packet.
Type Type determines whether or not the ICMP message is a REQUEST or
a RESPONSE.
4.10.9.1 no debug ping packet
This command disables tracing of ICMP echo requests and responses.
Format
no debug ping packet