How to use CLI command line "extension-filter" to capture packets?

Zyxel_James
Zyxel_James Posts: 610  Zyxel Employee
First Anniversary 10 Comments Friend Collector First Answer

Question: Some users may notice that some command line for capturing packets are unavailable after upgrading to the latest firmware version, how can we use it now?

Answer: For security concerns, we made some adjustments to the CLI command "extension-filter", some rules are not available now.

Originally, "extension-filter" allows any characters, but now, it has limitations. Here are the rules examples.

  1. arp
    packet-trace interface ge1 extension-filter arp
  2. host and port
    packet-trace interface ge1 host 8.8.8.8 port 53
  3. host or host
    packet-trace interface ge1 extension-filter match-host 8.8.8.8 8.8.4.4
    packet-trace interface ge1 ip-proto tcp extension-filter match-host 1.1.1.1 2.2.2.2
  4. port or port
    packet-trace interface ge1 extension-filter match-port 67 68
  5. (host or host) and port or port
    packet-trace interface ge1 extension-filter match-host 192.168.1.1 8.8.8.8 match-port 67 68
  6. -e
    packet-trace interface ge1 host 8.8.8.8 port 53 extension-filter link-header
  7. -X
    packet-trace interface ge1 extension-filter data-header
  8. match-host, linker-header, data-header *Please note the order
    packet-trace interface ge1 extension-filter match-host 8.8.8.8 8.8.4.4 link-header data-header.

Please note that before the adjustment, user may use "not" to excludes the host or port, for now, it's not allowed.