How to use CLI command line "extension-filter" to capture packets?
Options
Zyxel_James
Posts: 809
Zyxel Employee
Zyxel Employee
in Networking
Question: Some users may notice that some command line for capturing packets are unavailable after upgrading to the latest firmware version, how can we use it now?
Answer: For security concerns, we made some adjustments to the CLI command "extension-filter", some rules are not available now.
Originally, "extension-filter" allows any characters, but now, it has limitations. Here are the rules examples.
- arp
packet-trace interface ge1 extension-filter arp - host and port
packet-trace interface ge1 host 8.8.8.8 port 53 - host or host
packet-trace interface ge1 extension-filter match-host 8.8.8.8 8.8.4.4
packet-trace interface ge1 ip-proto tcp extension-filter match-host 1.1.1.1 2.2.2.2 - port or port
packet-trace interface ge1 extension-filter match-port 67 68 - (host or host) and port or port
packet-trace interface ge1 extension-filter match-host 192.168.1.1 8.8.8.8 match-port 67 68 - -e
packet-trace interface ge1 host 8.8.8.8 port 53 extension-filter link-header - -X
packet-trace interface ge1 extension-filter data-header - match-host, linker-header, data-header *Please note the order
packet-trace interface ge1 extension-filter match-host 8.8.8.8 8.8.4.4 link-header data-header.
Please note that before the adjustment, user may use "not" to excludes the host or port, for now, it's not allowed.
0
Categories
- All Categories
- 442 Beta Program
- 2.9K Nebula
- 213 Nebula Ideas
- 127 Nebula Status and Incidents
- 6.4K Security
- 551 USG FLEX H Series
- 341 Security Ideas
- 1.7K Switch
- 84 Switch Ideas
- 1.4K Wireless
- 52 Wireless Ideas
- 6.9K Consumer Product
- 295 Service & License
- 471 News and Release
- 90 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 4.7K FAQ
- 34 Documents
- 87 About Community
- 102 Security Highlight