How to use CLI command line "extension-filter" to capture packets?
Options

Zyxel_James
Posts: 788
Zyxel Employee





in Networking
Question: Some users may notice that some command line for capturing packets are unavailable after upgrading to the latest firmware version, how can we use it now?
Answer: For security concerns, we made some adjustments to the CLI command "extension-filter", some rules are not available now.
Originally, "extension-filter" allows any characters, but now, it has limitations. Here are the rules examples.
- arp
packet-trace interface ge1 extension-filter arp - host and port
packet-trace interface ge1 host 8.8.8.8 port 53 - host or host
packet-trace interface ge1 extension-filter match-host 8.8.8.8 8.8.4.4
packet-trace interface ge1 ip-proto tcp extension-filter match-host 1.1.1.1 2.2.2.2 - port or port
packet-trace interface ge1 extension-filter match-port 67 68 - (host or host) and port or port
packet-trace interface ge1 extension-filter match-host 192.168.1.1 8.8.8.8 match-port 67 68 - -e
packet-trace interface ge1 host 8.8.8.8 port 53 extension-filter link-header - -X
packet-trace interface ge1 extension-filter data-header - match-host, linker-header, data-header *Please note the order
packet-trace interface ge1 extension-filter match-host 8.8.8.8 8.8.4.4 link-header data-header.
Please note that before the adjustment, user may use "not" to excludes the host or port, for now, it's not allowed.
0
Categories
- All Categories
- 434 Beta Program
- 2.7K Nebula
- 174 Nebula Ideas
- 117 Nebula Status and Incidents
- 6.1K Security
- 417 USG FLEX H Series
- 297 Security Ideas
- 1.6K Switch
- 78 Switch Ideas
- 1.2K Wireless
- 43 Wireless Ideas
- 6.7K Consumer Product
- 269 Service & License
- 416 News and Release
- 87 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 4.1K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 83 About Community
- 87 Security Highlight