How to use CLI command line "extension-filter" to capture packets?

Zyxel_James
Posts: 664
Zyxel Employee





in Networking
Question: Some users may notice that some command line for capturing packets are unavailable after upgrading to the latest firmware version, how can we use it now?
Answer: For security concerns, we made some adjustments to the CLI command "extension-filter", some rules are not available now.
Originally, "extension-filter" allows any characters, but now, it has limitations. Here are the rules examples.
- arp
packet-trace interface ge1 extension-filter arp - host and port
packet-trace interface ge1 host 8.8.8.8 port 53 - host or host
packet-trace interface ge1 extension-filter match-host 8.8.8.8 8.8.4.4
packet-trace interface ge1 ip-proto tcp extension-filter match-host 1.1.1.1 2.2.2.2 - port or port
packet-trace interface ge1 extension-filter match-port 67 68 - (host or host) and port or port
packet-trace interface ge1 extension-filter match-host 192.168.1.1 8.8.8.8 match-port 67 68 - -e
packet-trace interface ge1 host 8.8.8.8 port 53 extension-filter link-header - -X
packet-trace interface ge1 extension-filter data-header - match-host, linker-header, data-header *Please note the order
packet-trace interface ge1 extension-filter match-host 8.8.8.8 8.8.4.4 link-header data-header.
Please note that before the adjustment, user may use "not" to excludes the host or port, for now, it's not allowed.
0
Categories
- All Categories
- 415 Beta Program
- 2.5K Nebula
- 155 Nebula Ideas
- 105 Nebula Status and Incidents
- 5.9K Security
- 318 USG FLEX H Series
- 286 Security Ideas
- 1.5K Switch
- 78 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.6K Consumer Product
- 256 Service & License
- 398 News and Release
- 86 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.7K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 87 About Community
- 78 Security Highlight