Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerEdge FN I/O Module Command Line Reference Guide 9.10(0.0)

PDF

debug ip packet

View a log of IP packets sent and received.

Syntax debug ip packet [access-group name] [count value] [ interface]

To disable debugging, use the no debug ip packet [access-group name] [count value] [ interface] command.

Parameters
access-group name Enter the keywords access-group then the access list name (maximum 16 characters) to limit the debug output based on the defined rules in the ACL.
count value (OPTIONAL) Enter the keyword count then the count value. The range is from 1 to 65534. The default is Infinity.
interface (OPTIONAL) Enter the following keywords and slot/port or number information:
  • For the Management interface, enter the keyword ManagementEthernet then the slot/port information. The slot range is from 0 to 1 and the port range is 0.
  • For a Port Channel interface, enter the keywords port-channel then a number. The range is from 1 to 128.
  • For a 10-Gigabit Ethernet interface, enter the keyword TenGigabitEthernet then the slot/port information.
  • For a VLAN, enter the keyword vlan then a number from 1 to 4094.
Command Modes EXEC Privilege
Supported Modes Full–Switch
Command History
Version Description
9.9(0.0) Introduced on the FN IOM.
8.3.16.1 Introduced on the MXL 10/40GbE Switch IO Module.
Usage Information The following describes the debug ip packet command in the following example.
Field Description
s= Lists the source address of the packet and the name of the interface (in parentheses) that received the packet.
d= Lists the destination address of the packet and the name of the interface (in parentheses) through which the packet is being sent out on the network.
len Displays the packet’s length.
sending, rcvd, fragment, sending broad/multicast proto, unroutable The last part of each line lists the status of the packet.
TCP src= Displays the source and destination ports, the sequence number, the acknowledgement number, and the window size of the packets in that TCP packets.
UDP src= Displays the source and destination ports for the UDP packets.
ICMP type= Displays the ICMP type and code.
IP Fragment States that it is a fragment and displays the unique number identifying the fragment (Ident) and the offset (in 8-byte units) of this fragment (fragment offset) from the beginning of the original datagram.
Example
IP: s=10.1.2.62 (local), d=10.1.2.206 (Ma 0/0), len 54, sending
                                             TCP src=23, dst=40869, seq=2112994894, ack=606901739, win=8191 ACK PUSH
                                             IP: s=10.1.2.206 (Ma 0/0), d=10.1.2.62, len 40, rcvd
                                             TCP src=0, dst=0, seq=0, ack=0, win=0
                                             IP: s=10.1.2.62 (local), d=10.1.2.206 (Ma 0/0), len 226, sending
                                             TCP src=23, dst=40869, seq=2112994896, ack=606901739, win=8192 ACK PUSH
                                             IP: s=10.1.2.216 (Ma 0/0), d=10.1.2.255, len 78, rcvd
                                             UDP src=0, dst=0
                                             IP: s=10.1.2.62 (local), d=10.1.2.3 (Ma 0/0), len 1500, sending fragment
                                             IP Fragment, Ident = 4741, fragment offset = 0
                                             ICMP type=0, code=0
                                             IP: s=10.1.2.62 (local), d=10.1.2.3 (Ma 0/0), len 1500, sending fragment
                                             IP Fragment, Ident = 4741, fragment offset = 1480
                                             IP: s=40.40.40.40 (local), d=224.0.0.5 (Te 1/8), len 64, sending broad/multicast
                                             proto=89
                                             IP: s=40.40.40.40 (local), d=224.0.0.6 (Te 1/8), len 28, sending broad/multicast
                                             proto=2
                                             IP: s=0.0.0.0, d=30.30.30.30, len 100, unroutable
                                             ICMP type=8, code=0
                                             IP: s=0.0.0.0, d=30.30.30.30, len 100, unroutable
                                             ICMP type=8, code=0
                                             
                                          
Usage Information

To stop packets from flooding the user terminal when debugging is turned on, use the count option.

The access-group option supports only the equal to ( eq) operator in TCP ACL rules. Port operators not equal to ( neq), greater than ( gt), less than ( lt), or range are not supported in access-group option (refer to the following example). ARP packets ( arp) and Ether-type ( ether-type) are also not supported in the access-group option. The entire rule is skipped to compose the filter.

The access-group option pertains to:
  • IP protocol number: from 0 to 255
  • Internet control message protocol ( icmp) but not the ICMP message type (from 0 to 255)
  • Any internet protocol ( ip)
  • Transmission Control Protocol ( tcp) but not on the rst, syn, or urg bits
  • User Datagram Protocol ( udp)

In the case of ambiguous access control list rules, the debug ip packet access-control command is disabled. A message appears identifying the error (refer to the Example below).

Example (Error Messages)
Dell#debug ip packet access-group test
                                             %Error: port operator GT not supported in access-list debug
                                             %Error: port operator LT not supported in access-list debug
                                             %Error: port operator RANGE not supported in access-list debug
                                             %Error: port operator NEQ not supported in access-list debug
                                             
                                             Dell#00:10:45: %RPM0-P:CP
                                             %IPMGR-3-DEBUG_IP_PACKET_ACL_AMBIGUOUS_EXP: Ambiguous rules not
                                             supported in access-list debug, access-list debugging is turned off
                                             Dell#
                                          

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\