Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

Dell Command Line Reference Guide for the S4048–ON System 9.14.2.8

debug ip packet

View a log of IP packets sent and received.

Syntax
debug ip packet [access-group name] [count value] [interface]

To disable debugging, use the no debug ip packet [access-group name] [count value] [interface] command.

Parameters
access-group name
Enter the keyword access-group then the access list name (maximum 16 characters) to limit the debug output based on the defined rules in the ACL.
count value
(OPTIONAL) Enter the keyword count then the count value. The range is from 1 to 65534. The default is Infinity.
interface
(OPTIONAL) Enter the following keywords and the interface information:
  • For the Management interface on the stack-unit, enter the keyword ManagementEthernet then the slot/port information.
  • For a port channel interface, enter the keywords port-channel then a number.
  • For a VLAN interface, enter the keyword vlan then a number from 1 to 4094.
Command Modes
EXEC Privilege
Command History

This guide is platform-specific. For command information about other platforms, see the relevant Dell EMC Networking OS Command Line Reference Guide.

Version
Description
9.10(0.1)
Introduced on the S6010-ON and S4048T-ON.
9.10(0.0)
Introduced on the S3148.
9.10(0.0)
Introduced on the S6100–ON.
9.8(2.0)
Introduced on the S3100 series.
9.8(1.0)
Introduced on the Z9100–ON.
9.8(0.0P5)
Introduced on the S4048-ON.
9.8(0.0P2)
Introduced on the S3048-ON.
9.7(0.0)
Introduced on the S6000-ON.
9.2(1.0)
Introduced on the Z9500.
9.0.2.0
Introduced on the S6000.
8.3.19.0
Introduced on the S4820T.
8.3.11.1
Introduced on the Z9000.
8.5.1.0
Added support for 4-port 40G line cards on the E-Series.
8.3.7.0
Introduced on the S4810.
8.2.1.0
Added support for 4094 VLANs on the E-Series (the prior limit was 2094).
8.1.1.0
Introduced on the E-Series.
7.6.1.0
Added the access-group option.
7.6.1.0
Introduced on the S-Series.
7.5.1.0
Introduced on the C-Series.
6.3.1.0
Added the count option.
Usage Information
The following describes the debug ip packet command in the following example.
Field
Description
s=
Lists the source address of the packet and the name of the interface (in parentheses) that received the packet.
d=
Lists the destination address of the packet and the name of the interface (in parentheses) through which the packet is being sent out on the network.
len
Displays the packet’s length.
sending, rcvd, fragment, sending broad/multicast proto, unroutable
The last part of each line lists the status of the packet.
TCP src=
Displays the source and destination ports, the sequence number, the acknowledgement number, and the window size of the packets in that TCP packets.
UDP src=
Displays the source and destination ports for the UDP packets.
ICMP type=
Displays the ICMP type and code.
IP Fragment
States that it is a fragment and displays the unique number identifying the fragment (Ident) and the offset (in 8-byte units) of this fragment (fragment offset) from the beginning of the original datagram.
Example
IP: s=10.1.2.62 (local), d=10.1.2.206 (Ma 1/1), len 54, sending
    TCP src=23, dst=40869, seq=2112994894, ack=606901739, win=8191 ACK PUSH
IP: s=10.1.2.206 (Ma 1/1), d=10.1.2.62, len 40, rcvd
    TCP src=0, dst=0, seq=0, ack=0, win=0
IP: s=10.1.2.62 (local), d=10.1.2.206 (Ma 1/1), len 226, sending
    TCP src=23, dst=40869, seq=2112994896, ack=606901739, win=8192 ACK PUSH
IP: s=10.1.2.216 (Ma 1/1), d=10.1.2.255, len 78, rcvd
    UDP src=0, dst=0
IP: s=10.1.2.62 (local), d=10.1.2.3 (Ma 1/1), len 1500, sending fragment
    IP Fragment, Ident = 4741, fragment offset = 0
    ICMP type=0, code=0
IP: s=10.1.2.62 (local), d=10.1.2.3 (Ma 1/1), len 1500, sending fragment
    IP Fragment, Ident = 4741, fragment offset = 1480
IP: s=40.40.40.40 (local), d=224.0.0.5 (Te 4/11), len 64, sending broad/multicast
proto=89
IP: s=40.40.40.40 (local), d=224.0.0.6 (Te 4/11), len 28, sending broad/multicast
proto=2
IP: s=0.0.0.0, d=30.30.30.30, len 100, unroutable
   ICMP type=8, code=0
IP: s=0.0.0.0, d=30.30.30.30, len 100, unroutable
   ICMP type=8, code=0
Usage Information

To stop packets from flooding the user terminal when debugging is turned on, use the count option.

The access-group option supports only the equal to (eq) operator in TCP ACL rules. Port operators not equal to (neq), greater than (gt), less than (lt), or range are not supported in access-group option (refer to the following example). ARP packets (arp) and Ether-type (ether-type) are also not supported in the access-group option. The entire rule is skipped to compose the filter.

The access-group option pertains to:
  • IP protocol number: from 0 to 255
  • Internet control message protocol (icmp) but not the ICMP message type (from 0 to 255)
  • Any internet protocol (ip)
  • Transmission Control Protocol (tcp) but not on the rst, syn, or urg bits
  • User Datagram Protocol (udp)

In the case of ambiguous access control list rules, the debug ip packet access-control command is disabled. A message appears identifying the error (refer to the Example below).

Example (Error Messages)
DellEMC# debug ip packet access-group test
%Error: port operator GT not supported in access-list debug
%Error: port operator LT not supported in access-list debug
%Error: port operator RANGE not supported in access-list debug
%Error: port operator NEQ not supported in access-list debug

DellEMC#00:10:45: %RPM0-P:CP
%IPMGR-3-DEBUG_IP_PACKET_ACL_AMBIGUOUS_EXP: Ambiguous rules not
supported in access-list debug, access-list debugging is turned off
DellEMC#

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\