New in uOS: Route Trace Tool

Zyxel_Claudia
Zyxel_Claudia Posts: 164  Zyxel Employee
Network Detective-New Adventure Badge Network Detective Badge First Comment Friend Collector

Zyxel’s latest uOS 1.32 firmware introduces a valuable diagnostic utility for administrators - the Route Trace tool. This enhancement provides deep visibility into how traffic flows through your firewall, helping quickly identify routing behavior and policy impacts.

What Is Route Trace?

Route Trace allows administrators to simulate and analyze the path of live packets originating from a specific source IP address. By matching against real routing tables, policies, and VPN tunnels, it visually confirms:

  • Which outgoing interface is used.
  • How policy routes and destination settings affect traffic flow.

How It Works

To use Route Trace:

  1. Navigate to Packet Flow Explorer.
  2. Input matching criteria:
    • Source IP address (e.g., from your PC).
    • Send live traffic packet to Destination IP address (e.g., a ping).
    • Filter Protocol (e.g., ICMP).
  3. Click Capture.
  4. Observe the result:
    • Outgoing interface (e.g., GE1, GE2, or VPN).

Example

Suppose a device at 192.168.11.33 attempts to ping 10.1.1.1. Based on a policy route:

  • If destined for 10.1.1.1/32, traffic exits via GE1.
  • If destined for 10.1.1.4/24, traffic exits via GE2.

Route Trace confirms this by displaying:

  • The ICMP traffic type.
  • The matched interface (GE1 or GE2).

For route-based VPNs, it will show the virtual tunnel interface (VTI) as the outbound path, while in policy-based VPNs, the physical interface (e.g., Ge1) is shown.

Note: In ZLD, packets sent through Policy-based VPN, the interface is “doll”.