SRX

last person joined: yesterday 

Ask questions and share experiences about the SRX Series, vSRX, and cSRX.
Expand all | Collapse all

Help for SRX "datapath-debug"

  • 1.  Help for SRX "datapath-debug"

    Posted 07-24-2011 07:50

    I want to know the detail information of "datapath-debug" on SRX-3k,anybody can help me?Thank you very much!



  • 2.  RE: Help for SRX "datapath-debug"

    Posted 07-24-2011 08:34

    Please be more specific.  Are you looking at how to enable it, or simply how to decipher the output once you've enabled the traceoptions?



  • 3.  RE: Help for SRX "datapath-debug"

    Posted 07-24-2011 22:48
    Hi,sfouant, Thank you for your response.I have seen the KB16322 for "datapath-debug",however,on KB 16322,I am not understand very clearly.I want to known the more detail information for the "datapath-debug" which on KB 163222,thank you.


  • 4.  RE: Help for SRX "datapath-debug"

    Posted 07-24-2011 17:12

     

    for understanding, please refer to: http://www.juniper.net/techpubs/software/junos-security/junos-security10.1/junos-security-swconfig-security/topic-41983.html?searchid=1311552312909

     

    also, refer to KB16233 " How to use 'Flow Traceoptions' and the 'security datapath-debug' in SRX series"

     

    Solution:

    In order to debug the flow processing in SRX platforms, it is necessary to configure traceoptions.

    Flow traceoptions are configured under the "security flow traceoptions" stanza. It requires a configuration change instead of just an operational command as parameters need to be specified. For detailed information about traceoptions, also check KB16108.

    This article discusses the following:
    • Traceoption
    • Security datapath-debug

    Traceoption Feature (all SRX platforms)For all SRX platforms running all JUNOS versions, flow traceoptions are configured under "security flow traceoptions" stanza.

    The configuration can be done by specifying three components:
      1. Trace file, fize size, number of files:
        It is necessary to specify the file to which the trace will be logged. It is also possible to choose the file size and how many files will be saved, in case the output goes over the file size:

    set security flow traceoptions file flow-trace size 1m files 2 world-readable

      1. Trace flags:
        The flags indicate the level of tracing required.  For flow traceoptions, the "basic-datapath" flag is recommended:

    set security flow traceoptions flag basic-datapath

      1. Packet filters:
        By default, flow traceoptions logs all packets processed by the system. The recommendation is to configure packet filters to capture only the desired traffic. This is to avoid system overload as traffic load can be very high. It is not necessary to configure filters for both directions because reverse traffic matches the same filter. Packet filters can be configured with source and destination prefix and port (including ranges), interface and protocol.

    set security flow traceoptions packet-filter c2s source-prefix 1.1.1.10/32
    Below is a configuration example:
    {primary:node1}[edit security flow traceoptions]
    root@cumin# show
    file flow-trace size 1m files 2 world-readable;
    flag basic-datapath;
    packet-filter client {
    source-prefix 8.8.8.0/24;
    destination-prefix 1.1.1.0/24;
    }
    inactive: packet-filter outgoing {
    source-prefix 4.4.4.0/24;
    destination-prefix 1.1.1.0/23;
    }
    Note that part of the configuration is inactive. This can be very useful as the configuration doesn't need to be deleted, the user can activate it whenever needed.
    Below are the corresponding configuration commands:
    set security flow traceoptions file flow-trace
    set security flow traceoptions file size 1m
    set security flow traceoptions file files 2
    set security flow traceoptions file world-readable
    set security flow traceoptions flag basic-datapath
    set security flow traceoptions packet-filter client source-prefix 8.8.8.0/24
    set security flow traceoptions packet-filter client destination-prefix 1.1.1.0/24
    set security flow traceoptions packet-filter outgoing source-prefix 4.4.4.0/24
    set security flow traceoptions packet-filter outgoing destination-prefix 1.1.1.0/23
    deactivate set security flow traceoptions packet-filter outgoing
    In order to see the trace, use the command "show log <filename>". Match, trim and other show options can be used to help read the output; refer to KB16108.


    Security datapath-debug Feature (SRX3000 and SRX5000 platforms)
    Specifically for SRX5000 and SRX3000 platforms, flow traceoptions can also be configured using "security datapath-debug" stanza. This advanced feature includes both trace (debug) and packet capture capabilities.

    This stanza replaces "security flow traceoptions" with the objective of providing tracing capability for packet’s entire life cycle in datapath, from ingress to egress (not only flow processing). It augments the tracing capabilities with the following features:
      1. End-to-end debug:
    Ingress IOC:
    - mac-ingress (only SRX3000)
    - np-ingress *
    Ingress flow (lbt) *
    Flow processing *
    Route lookup (jexec)
    Egress flow (pot) *

    Egress IOC:
    - np-egress *
    - mac-egress (only SRX3000)
      1. Packet Dump: captures the first 100bytes of the packets including internal headers used by the system
      2. Packet Summary: prints a summary of the packet, including the following headers: *
      3. Meta header (used internally by the system)

        Flow header (used internally by the system)

        IP header of the actual packet

      1. Trace: specific debugging messages for product engineering use *
      2. preserve-trace-order: due to multi-threaded processing, traces can be written to the trace file out of order. This option adds an extra debug header with a sequence number that can be used by routing engine (RE) to keep trace order.
      3. record-pic-history: adds an extra debug header to record each PIC through which the packets are processed

        *     "security datapath-debug" is supported starting from JUNOS 9.6; however only items marked with "*" are supported. All items are supported in JUNOS 10.0 and later.


    Configuration

    The configuration is also done in 3 steps:
      1. Trace file, fize size, number of files:
        It is necessary to specify the file to which the trace will be logged. It is also possible to choose the file size and how many files will be saved in case the output goes over the file size:

    set security datapath-debug traceoptions file e2e-trace size 10m files 3 world-readable

      1. Action profile:
      2. With a custom action profile, it is strongly recommended to configure the following. All are optional, it depends on the type of trace desired.


        1. Specify the type of events to be traced and the action for each of them.

    set security datapath-debug action-profile custom-profile event np-egress count

        1. Enable preserve-trace-order, record-pic-history options:

    set security datapath-debug action-profile custom-profile preserve-trace-order

        1. Configure capture file if packet-dump option is used:

    set security datapath-debug capture-file e2e-packet-dump

        1. Enable flow module trace:

    set security datapath-debug action-profile custom-profile module flow flag all

      1. Packet filters:
        If the default action is deny, that means no packets are captured if a packet filter is not configured. The recommendation is to configure the filter as specific as possible in order to avoid system overload as traffic load can be very high. It is necessary to configure filters for both directions. Packet filters can be configured with source and destination prefix and port (including ranges), and protocol.

    set security datapath-debug packet-filter from-internal action-profile custom-profile
    set security datapath-debug packet-filter from-internal source-prefix 1.1.1.0/24
    set security datapath-debug packet-filter from-internal destination-prefix 4.4.4.0/24NOTE:  If "security datapath-debug" is configured and active, "security flow traceoptions" should be either deactivated or deleted, as no traces will be logged to the file specified under "security flow traceoptions".


    Configuration Example: 

    Below is an example of the configuration commands:
    set security datapath-debug traceoptions file e2e-trace
    set security datapath-debug traceoptions file size 10m
    set security datapath-debug traceoptions file files 3
    set security datapath-debug traceoptions file world-readable
    set security datapath-debug capture-file e2e-packet-dump
    set security datapath-debug action-profile custom-profile preserve-trace-order
    set security datapath-debug action-profile custom-profile record-pic-history
    set security datapath-debug action-profile custom-profile event np-ingress count
    set security datapath-debug action-profile custom-profile event np-egress count
    set security datapath-debug action-profile custom-profile event jexec trace
    set security datapath-debug action-profile custom-profile event lbt packet-dump
    set security datapath-debug action-profile custom-profile event pot packet-summary
    set security datapath-debug action-profile custom-profile module flow flag all
    set security datapath-debug packet-filter from-internal action-profile custom-profile
    set security datapath-debug packet-filter from-internal source-prefix 1.1.1.0/24
    set security datapath-debug packet-filter from-internal destination-prefix 4.4.4.0/24
    set security datapath-debug packet-filter from-external action-profile custom-profile
    set security datapath-debug packet-filter from-external source-prefix 4.4.4.0/24
    set security datapath-debug packet-filter from-external destination-prefix 1.1.1.0/24
    NOTE:  If "security datapath-debug" is configured and active, "security flow traceoptions" should be either deactivated or deleted, as no traces will be logged to the file specified under "security flow traceoptions".


    Verify
    Configuration:

    Use "show security datapath-debug action-profile" command to see the active action-profiles. The output below shows an example with two packet filters:
    root@cumin> show security datapath-debug action-profile
    End to end debug action profile
    Packet Filter from-internal: Profile name: custom-profile
    np-ingress: packet-summary,count,record-history
    np-egress: record-history
    lbt: record-history
    Packet Filter from-external: Profile name: custom-profile
    np-ingress: packet-summary,count,record-history
    np-egress: record-history
    lbt: record-history

    Display Trace Output:

    In order to see the flow module trace, use the command "show log <filename>". Match, trim and other show options can be used to help read the output; refer to KB16108. Below is an example with the preserve-trace-order and record-pic-history options enabled. Note that the output was filtered with "except" option to remove the PIC history and thread id information. This is very usefull if the objective is to check only the flow processing:
    root@cumin> sh log e2e-trace | except "thread_id" | except "pic history"
    Dec 22 13:39:03 cumin clear-log[8981]: logfile cleared
    CP flow starts, mbuf=0x78c02400, ifl_idx=72, ctxt_type=0xd
    cp_flow_fast_lookup
    cp_flow_first_sanity_check: in <reth0.0>, out <N/A>
    cp_flow_first_create_session
    CP allocates a CP session
    CP couldn't find session, creates a pending session 624
    CP fwd pkt to SPU ==*21*==, iif: 84, flag: 0x00000100
    SPU received an event, type 80
    SPU received pak with event message from CP, cp_sess_id=00000270 a
    in_ifp <client:reth0.0>
    flow_process_pkt_exception: setting rtt in lpak to 2f5c48a8
    flow_process_pkt_exception: local_flag: 0x00000100
    reth0.0:1.1.1.11->4.4.4.10, icmp, (8/0)
    find flow: table 0x5e15e4a0, hash 247136(0x7ffff), sa 1.1.1.11, da 4.4.4.10, sp 52992, dp 512, proto 1, tok 512
    no session found, start first path. in_tunnel - 0, from_cp_flag - 2048
    flow_first_create_session
    flow_first_in_dst_nat: in <reth0.0>, out <N/A> dst_adr 4.4.4.10, sp 52992, dp 512
    chose interface reth0.0 as incoming nat if.
    flow_first_rule_dst_xlate: DST no-xlate: 0.0.0.0(0) to 4.4.4.10(512)
    flow_first_routing: call flow_route_lookup(): src_ip 1.1.1.11, x_dst_ip 4.4.4.10, in ifp reth0.0, out ifp N/A sp 52992, dp 512,
    ip_proto 1, tos 0
    Doing DESTINATION addr route-lookup
    routed (x_dst_ip 4.4.4.10) from client (reth0.0 in 1) to reth3.0, Next-hop: 4.4.4.10
    policy search from zone client-> zone vpn-ssg
    app 0, timeout 60s, curr ageout 60s
    flow_first_src_xlate: 1.1.1.11/52992 -> 4.4.4.10/512 | 4.4.4.10/512 -> 0.0.0.0/52992: nat_src_xlated: False,
    nat_src_xlate_failed: False
    flow_first_src_xlate: src nat 0.0.0.0(52992) to 4.4.4.10(512) returns status: 0, rule/pool id: 0/0, pst_nat: False.
    dip id = 0/0, 1.1.1.11/52992->1.1.1.11/52992
    flow_first_get_out_ifp: 1000 -> cone nat test
    choose interface reth3.0 as outgoing phy if
    is_loop_pak: No loop: on ifp: reth3.0, addr: 4.4.4.10, rtt_idx:0
    check nsrp pak fwd: in_tun=0x0, VSD 1 for out ifp reth3.0
    vsd 1 is active
    policy is NULL (wx/pim scenario)
    sm_flow_interest_check: app_id 0, policy 6, app_svc_en 0, flags 0x2. not interested
    flow_first_service_lookup(): natp(0x3802d3b0): app_id, 0(0).
    service lookup identified service 0.
    flow_first_final_check: in <reth0.0>, out <reth3.0>
    install vector flow_fast_ha_fwd_check_vector
    install vector flow_ttl_vector
    install vector flow_icmp_info_process_vector
    install vector flow_frag_list_vector
    install vector flow_send_vector
    install vector NULL
    create new vector list 220-135a83c8.
    Session (id:279) created for first pak 220
    flow_first_install_session======> 0x3802d3b0
    nsp 0x3802d3b0, nsp2 0x3802d42c
    make_nsp_ready_no_resolve()
    route lookup: dest-ip 1.1.1.11 orig ifp reth0.0 output_ifp reth0.0 orig-zone 8 out-zone 8 vsd 1
    route to 1.1.1.11
    SPU send install sess to CP cp_sess_id=00000270, spu_sess_id=00000117, natp=0x3802d3b0
    flow found or created a pending session.
    flow_process_pkt_exception: Freeing lpak 2f95a710 associated with mbuf 0xe6a3a00
    ----- flow_process_pkt rc 0xf (fp rc 0)
    flow process pak fast ifl 69 in_ifp reth3.0
    flow_np_session_id2nsp: NP hdr: session id - 279, Flag - 0
    flow session id 279
    vsd 1 is active
    mbuf 0xe707600, exit nh 0x982f3c2
    ----- flow_process_pkt rc 0x0 (fp rc 0)
    For packet summary and trace actions, use also "show log <filename>". Below is an example with "packet-summary" and "record-pic-history" options enabled. This information is useful when debugging packet loss inside the system. The recommendation is to use np-egress event with packet-summary action, together with record-pic-history option;  this is because logging on the egress side shows the complete path the packet had through the system.
    {primary:node1}
    root@cumin> show log e2e-trace
    Dec 22 12:42:29 cumin clear-log[5294]: logfile cleared
    Dec 22 12:42:37 12:42:07.877927:CID-01:FPC-03:PIC-02:THREAD_ID-00:FINDEX:0:SEQ:185:TC:1
    PIC History: ->C1/F3/P1->C1/F4/P0->C1/F4/P1->C1/F3/P2
    Meta: Src: F4/P1 Dst: F3/P2
    IP: saddr 1.1.1.11 daddr 4.4.4.10 proto 1 len 60

    Dec 22 12:42:39 (Timeout): 12:42:07.878300:CID-01:FPC-03:PIC-01:THREAD_ID-00:FINDEX:1:SEQ:185:TC:1
    PIC History: ->C1/F3/P2->C1/F4/P1->C1/F3/P1
    Meta: Src: F4/P1 Dst: F3/P1
    IP: saddr 4.4.4.10 daddr 1.1.1.11 proto 1 len 60
    Check KB16118 for detail about meta header output.




  • 5.  RE: Help for SRX "datapath-debug"

    Posted 07-24-2011 17:12


    Display Counters:


    In order to see the counters, use "show security datapath-debug counters". Below is an example showing counters for np-ingress and np-egress, for a system with only one IOC on FPC 3 in both nodes of the cluster. The output is shown for all packet filters configured and active. This is usefull to see if traffic that is entering is also leaving the system:

    root@cumin> show security datapath-debug counters
    Datapath debug counters
    Packet Filter from-internal:
    np-ingress
    Chassis 2 FPC 3 : 0
    np-ingress
    Chassis 1 FPC 3 : 4
    np-egress
    Chassis 2 FPC 3 : 0
    np-egress
    Chassis 1 FPC 3 : 4
    Packet Filter from-external:
    np-ingress
    Chassis 2 FPC 3 : 0
    np-ingress
    Chassis 1 FPC 3 : 4
    np-egress
    Chassis 2 FPC 3 : 0
    np-egress
    Chassis 1 FPC 3 : 4

    Start and Stop Packet Capture:

    In order to execute packet capture, it is necessary to enable it via an operational command:

    request security datapath-debug capture start

    In order to stop the packet capture, use the operational command:

    request security datapath-debug capture stop


    View Packet Capture:

    In order to see the capture, use "show security datapath-debug capture". The example below is a capture done at the first ingress point (np-ingress). The recommendation is either to use capture at the ingress and/or egress point to confirm packets have correct header information before and after being processed by the system. Other capture points could be used when these specific points need to be investigated.

    root@cumin> show security datapath-debug capture
    Packet 1, len 74: (C1/F3/P1/SEQ:192:np-ingress)
    99 00 00 5f 11 00 0d 10 97 09 20 01 03 00 00 00
    00 00 00 00 ff 01 00 c0 4d 00 00 00 00 00 00 00
    00 10 db ff 60 00 00 0f fe aa de b0 08 00 45 00
    00 3c 85 37 00 00 80 01 ab 70 01 01 01 0b 04 04
    04 0a 08 00 84 5b 02 00 c7 00
    Packet 2, len 74: (C1/F3/P2/SEQ:192:np-ingress)
    b8 00 00 5d 01 00 0e 15 94 09 00 01 01 00 00 00
    01 4d 00 00 ff 01 00 c0 4e 00 00 00 00 00 00 00
    00 10 db ff 60 03 00 12 1e a8 3a 99 08 00 45 00
    00 3c f4 cc 00 00 40 01 7b db 04 04 04 0a 01 01
    01 0b 00 00 8c 5b 02 00 c7 00

     


    Configuration Example Recommendation from JTAC

    In summary, below is the configuration recommendation from JTAC using the options shown above and that would provide good basic information for troubleshooting. 

    • flow module is enabled
    • np-ingress and np-egress events are enabled with count action
    • packet-summary is enabled on egress side (np-egress), in combination with "record-pic-history"
    • packet-dump is configured in both ingress and egress sides, but deactivated so it can be used only when specific need exists.
    • two packet filters are configured, one for each traffic direction
    • preserve-trace-order is enabled to ensure correct order of the messages
    set security datapath-debug traceoptions file e2e-trace
    set security datapath-debug traceoptions file size 10m
    set security datapath-debug traceoptions file files 3
    set security datapath-debug traceoptions file world-readable
    set security datapath-debug capture-file e2e-packet-dump
    set security datapath-debug action-profile custom-profile preserve-trace-order
    set security datapath-debug action-profile custom-profile record-pic-history
    set security datapath-debug action-profile custom-profile event np-ingress count
    deactivate security datapath-debug action-profile custom-profile event np-ingress packet-dump
    set security datapath-debug action-profile custom-profile event np-egress count
    set security datapath-debug action-profile custom-profile event np-egress packet-summary
    deactivate security datapath-debug action-profile custom-profile event np-egress packet-dump
    set security datapath-debug action-profile custom-profile module flow flag all
    set security datapath-debug packet-filter from-internal action-profile custom-profile
    set security datapath-debug packet-filter from-internal source-prefix 1.1.1.0/24
    set security datapath-debug packet-filter from-internal destination-prefix 4.4.4.0/24
    set security datapath-debug packet-filter from-external action-profile custom-profile
    set security datapath-debug packet-filter from-external source-prefix 4.4.4.0/24
    set security datapath-debug packet-filter from-external destination-prefix 1.1.1.0/24



  • 6.  RE: Help for SRX "datapath-debug"

    Posted 07-24-2011 22:54

    hi,Raheel,

    Thank you for your response,the information which you tell me,I have seen it before,however the information on KB 163222 not very detail,can you tell me more detail information about "datapath-debug"?thank you.



  • 7.  RE: Help for SRX "datapath-debug"

    Posted 07-25-2011 13:43

    hi Zhoukangle

    could you please be more specific? what exactly you are looking for so i can able to assist.

     

    thanks,

    raheel



  • 8.  RE: Help for SRX "datapath-debug"

    Posted 07-25-2011 19:17

    Hi,Raheel,

    Thank you for your response,for the datapath-debug,some command I can not very clearly for they meaning,as:


    set security datapath-debug capture-file e2e-packet-dump
    set security datapath-debug action-profile custom-profile preserve-trace-orderset security datapath-debug action-profile custom-profile record-pic-historyset security datapath-debug action-profile custom-profile event np-ingress count
    set security datapath-debug action-profile custom-profile event np-egress countset security datapath-debug action-profile custom-profile event np-egress packet-summary
    set security datapath-debug action-profile custom-profile module flow flag all
    set security datapath-debug packet-filter from-internal action-profile custom-profileset security datapath-debug packet-filter from-internal source-prefix 1.1.1.0/24set security datapath-debug packet-filter from-internal destination-prefix 4.4.4.0/24set security datapath-debug packet-filter from-external action-profile custom-profileset security datapath-debug packet-filter from-external source-prefix 4.4.4.0/24set security datapath-debug packet-filter from-external destination-prefix 1.1.1.0/24

     

    thank you. 🙂



  • 9.  RE: Help for SRX "datapath-debug"

    Posted 07-29-2011 03:27

    How Datapath-debug works

    datapath-1.PNG

     

    Configuration- Filter:

    • E2E is filter based, the packet will be filtered when it enters the router, and matched packet will be marked with a e2e mark.
    • The downstream modules look at the e2e mark to decide whether to trace
    • The filter is only applied once.

    Filter support:

    • IPv4 source/dest prefix, protocol
    • L4 source/dest port
    • IPv6 source/dest prefix
    • Ingress Interface

    Datapath-debug configuration: filter
    Source/Destination prefix filter uses the same filter syntax, but can be set with IPv6 address
    If no source/desination prefix predicate exist, the filter will match both IPv4 and IPv6 traffic
    If only interface predicate exist, the filter will match IPv4/IPv6, AND non-IP traffic

    Example:
    1. Match IPv6 traffic with source prefix 2002::1:2:3
    packet-filter 1 {
      source-prefix 2002::1:2:3/128;
    }
    2. Match IPv4 and IPv6 traffic with tcp port 80
    packet-filter 2 {
        protocol tcp;
        destination-port 80;
    }

    Match any traffic come in to interface ge-0/1/3
    Including IP, and non-IP(i.e. ARP)
    Packet-filter 3 {
      interface ge-0/1/3
    }
    Interface support
    ge, ae, reth

    Configuration – ACTION
    At an e2e event, a subset of the following actions can be configured

    • Trace
    • Count
    • Packet-dump (binary capture)
    • Packet-summary


    Each event has its own set of actions.

    Configuration – ACTION PROFILE

    Action Profile: a profile which map each events with actions
    Action profile are named, it needs to be attach to filter to be effective

     action-profile  a1 {
             event np-ingress {
                 trace
                 packet-summary
              }
              event lbt {
                 packet-dump
              }
              module flow {
                 flag all
              }
        }

    Configuration – ACTION PROFILE additional options

     

    Additional options can be specified in an action profile
     - Record-pic-history
       * The trace output will show the pic history:
         C1/F0/P0->C1/F1/P0->C1/F0/P1
     - Preserve-trace-order
       * For each packet, its trace output will be sorted in time-order


    Configuration – FILTER/EVENT/ACTION
    Putting the previous concept together, this configuration applies action profile a1 to packets matching filter p1

    Datapath-debug {
        action-profile  a1 {
             event np-ingress {
                 trace
                 packet-summary
              }
        }
        packet-filter p1 {
             source-prefix 88.1.2.1/24
             action-profile a1
        }
    }

     

    configuration – OUTPUT FILE

    Text output: traceoption file
    Binary output (packet capture): capture-file
    File names are relative to /var/log
    Example:


    datapath-debug {
        traceoption {
             file trace-output
        }
        capture-file capture-output
        ….
    }

    CONFIGURATION - EXAMPLE

    Example: a complete configuration
    Print trace message at np-ingress, np-egress, lbt for packet matching 88.1.2.1/24, sort trace with time order.


    Security datapath-debug {
        traceoption {
               file trace-output
        }
        capture-file capture-output
        action-profile a1 {
               preserve-trace-order
               event np-ingress {
                      trace;
               }
               event lbt {
                       trace
               }
        }
        packet-filter p1 {
               source-prefix 88.1.2.1/24
               action-profile a1
        }
    }    



  • 10.  RE: Help for SRX "datapath-debug"
    Best Answer

    Posted 07-29-2011 03:34


    Trace output - example

     

    datapath-2.PNG

     


    Datapath-debug – Trace reorder example

    datapath-3.PNG

     

    DATAPATH-DEBUG Operational command – counter/capture

    Show counters counted by the “count” action
    Show security datapath-debug counters
    Start/stop capture (capture is NOT automatically started)
    Request security datapath-debug capture start
    Request security datapath-debug capture stop
    Show capture
    Show security datapath-debug capture

    DATAPATH-DEBUG Packet capture

     

    In 10.4 and later the datapath-debug capture file can be written as pcap format

    Maximum capture length can be specified

    The pcap capture file can be latered opened by tcpdump

     

    Security datapath-debug {

        capture-file file1 format pcap

        maximum-capture-size 1000

    }

     

    hope it helps

     

    thanks,

    raheel

     

     

     

     



  • 11.  RE: Help for SRX "datapath-debug"

    Posted 07-29-2011 08:11

    thank you.



  • 12.  RE: Help for SRX "datapath-debug"

    Posted 07-30-2011 03:20

    Wonderful post and explanation

     

    alex.



  • 13.  RE: Help for SRX "datapath-debug"

    Posted 07-01-2014 23:57

    Hi Raheel,

     

    Best explanation of packet debuggin found so far 🙂

     

    Highly apprecaited.

     

    regards