[j-nsp] TCPDUMP on High-end SRX
mahmoud yasin
eng_mahmood48 at yahoo.com
Wed Dec 12 02:46:58 EST 2012
Thank you All
________________________________
From: Tim Eberhard <xmin0s at gmail.com>
To: 叶雨飞 <sunyucong at gmail.com>
Cc: mahmoud yasin <eng_mahmood48 at yahoo.com>; "juniper-nsp at puck.nether.net" <juniper-nsp at puck.nether.net>
Sent: Tuesday, December 11, 2012 10:27 PM
Subject: Re: [j-nsp] TCPDUMP on High-end SRX
That will *only* grab traffic to the control plane, not through the interfaces. For what its worth.
-Tim Eberhard
On Tue, Dec 11, 2012 at 12:24 PM, 叶雨飞 <sunyucong at gmail.com> wrote:
monitor traffic no-resolve interface xxxxx write-file xxx.pcap
>
>or, if you prefer, simply start shell then tcpdump -i xxx -n -p -w xxxx.pcap
>
>
>On Tue, Dec 11, 2012 at 9:00 AM, mahmoud yasin <eng_mahmood48 at yahoo.com> wrote:
>> Hi
>>
>> How to use TCPDump to capture the In/Out traffic from the firewall interface (device self generated traffic).
>> Also how to read the output using wireshark (how to get a copy of the file)?
>> This is required for High-end firewalls.
>>
>> Regards
>> Myasin
>> _______________________________________________
>> juniper-nsp mailing list juniper-nsp at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/juniper-nsp
>_______________________________________________
>juniper-nsp mailing list juniper-nsp at puck.nether.net
>https://puck.nether.net/mailman/listinfo/juniper-nsp
>
More information about the juniper-nsp
mailing list