How to use CLI command line "extension-filter" to capture packets?
Zyxel_James
Posts: 663 Zyxel Employee
in Networking
Question: Some users may notice that some command line for capturing packets are unavailable after upgrading to the latest firmware version, how can we use it now?
Answer: For security concerns, we made some adjustments to the CLI command "extension-filter", some rules are not available now.
Originally, "extension-filter" allows any characters, but now, it has limitations. Here are the rules examples.
- arp
packet-trace interface ge1 extension-filter arp - host and port
packet-trace interface ge1 host 8.8.8.8 port 53 - host or host
packet-trace interface ge1 extension-filter match-host 8.8.8.8 8.8.4.4
packet-trace interface ge1 ip-proto tcp extension-filter match-host 1.1.1.1 2.2.2.2 - port or port
packet-trace interface ge1 extension-filter match-port 67 68 - (host or host) and port or port
packet-trace interface ge1 extension-filter match-host 192.168.1.1 8.8.8.8 match-port 67 68 - -e
packet-trace interface ge1 host 8.8.8.8 port 53 extension-filter link-header - -X
packet-trace interface ge1 extension-filter data-header - match-host, linker-header, data-header *Please note the order
packet-trace interface ge1 extension-filter match-host 8.8.8.8 8.8.4.4 link-header data-header.
Please note that before the adjustment, user may use "not" to excludes the host or port, for now, it's not allowed.
0
Categories
- All Categories
- 415 Beta Program
- 2.5K Nebula
- 152 Nebula Ideas
- 101 Nebula Status and Incidents
- 5.8K Security
- 296 USG FLEX H Series
- 281 Security Ideas
- 1.5K Switch
- 77 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.5K Consumer Product
- 254 Service & License
- 396 News and Release
- 85 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.6K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 87 About Community
- 76 Security Highlight