Troubleshoot Packet Drops

This section describes how to troubleshoot packet drops.

Capture packet drops

Packet drops occur when packets are discarded or lost during transmission through a network device. These drops can happen for various reasons, such as hardware limitations, network congestion, or operational issues.

Why do you need to capture packet drops?

Capturing packet drops is crucial for troubleshooting and diagnosing network issues. It helps to:

  • Identify the exact location and cause for packet loss, which are essential for effective troubleshooting.
  • View the details of the captured packets.

Enable and manage packet capture on a router

This section provides instructions for configuring and managing packet capture on a router to analyze packet drops. Use this task when you encounter packet drops on your router to determine the root cause.

Follow these steps to configure and manage packet capture to analyze packet drops:

  1. Execute these commands to verify packet drops on the router.

    • show interface counter
    • show queue counters
    • show dropcounters
  2. Execute the show platform npu event-trap command to identify the error events causing the drops.

  3. Configure the router to enable packet capture. You can choose to capture all events, multiple events, or specific events.

    • To enable the router to capture all events, use the config platform cisco packet-debug drops enable command.
    • To enable the router to capture a specific event, use the config platform cisco packet-debug drops enable -e _event-ID_ command.
    • To enable the router to capture multiple events, use the config platform cisco packet-debug drops enable -e _event-ID_ -e _event-ID_ -e _event-ID_ command.
  4. Save captured packets for later analysis. You can use one of these methods to save the file.

    • To save the captured packets in a .pcap file, use the show platform npu packet-debug capture command.
    • To save the captured packets in a .pcap file and display packet decoding on the screen, use the show platform npu packet-debug capture -d command.
    • To save the captured packets with a specific file name, use the show platform npu packet-debug capture -f test.pcap command. You can later use this file for analysis in a tool like Wireshark.
    • To clear the captured packets, use the show platform npu packet-debug capture -c command.
    • To append output to an existing file for continuous capture, use the show platform npu packet-debug capture -a command.
  5. Verify packet capture status using the show platform npu packet-debug status command. To view the status, including events enabled for packet capture, use the show platform npu packet-debug status -d command.

  6. Disable packet capture on your router. You can choose to disable all packet capture or disable specific events.

    • To disable all packet capture and restore the original configuration, use the config platform cisco packet-debug drops disable command.
    • To disable packet capture for a specific events. Use the config platform cisco packet-debug drops disable -e _event-ID_ command.
    • To disable packet capture for multiple events, use the config platform cisco packet-debug drops disable -e _event-ID_ -e _event-ID_ -e _event-ID_ command.

Result: The router is configured to capture packet drops, providing data for effective network issue diagnosis.

Post-requisite: Analyze the captured packet data using tools like Wireshark to determine the root cause of packet drops.

Packet Drop Scenarios

Packet drops due to "ETHERNET_NO_TERMINATION_ON_L3_PORT"

This error indicates that the source IP address of the packet is invalid. To capture these packet drops, perform these commands.

  1. Execute the command show interface counter or show dropcounters counts to verify the packet drops.
cisco@sonic1:~$ show interface counters
IFACE          STATE     RX_OK           RX_BPS      RX_UTIL     RX_ERR      RX_DRP     RX_OVR     TX_OK        TX_BPS     TX_UTIL    TX_ERR      TX_DRP     TX_OVR
----------- ------- -------------  ------------    ---------   --------    --------   --------    -------     ---------  ---------  --------    --------   --------
Ethernet0       U            20       10.48 B/s        0.00%          0           0          0         21      0.20 B/s      0.00%         0           0        N/A
Ethernet4       U            19        0.16 B/s        0.00%          0           0          0         16      0.20 B/s      0.00%         0           0        N/A
Ethernet8       U  1,902,757,911   1717.56 MB/s       13.74%          0          26          0         57     52.39 B/s      0.00%         0           0        N/A

cisco@sonic1:~$ show interface counters
IFACE        STATE        RX_OK          RX_BPS      RX_UTIL     RX_ERR      RX_DRP     RX_OVR     TX_OK         TX_BPS     TX_UTIL    TX_ERR      TX_DRP    TX_OVR
----------- ------- -------------  ------------    ---------   --------    --------   --------    -------     ---------   ---------   --------   --------  --------
Ethernet0     U               20       0.16 B/s         0.00%         0           0          0         22      1.18 B/s       0.00%         0           0       N/A
Ethernet4     U                        0.97 B/s         0.00%         0           0          0         17      1.18 B/s       0.00%         0           0       N/A
Ethernet8     U    2,441,487,781   1764.41 MB/s        14.12%         0          43          0         74     56.79 B/s       0.00%         0           0       N/A


cisco@sonic1:~$ show drop count
IFACE         STATE   RX_ERR      RX_DROPS    TX_ERR      TX_DROPS
----------- ------- --------    ----------  --------    ----------
Ethernet0      U           0             0         0             0
Ethernet4      U           0             0         0             0
Ethernet8      U           0            49         0             0

cisco@sonic1:~$ show drop count | grep Ethernet8

IFACE         STATE   RX_ERR      RX_DROPS     TX_ERR     TX_DROPS
----------- ------- --------    ----------   --------   ----------
Ethernet8     U            0            54          0            0
  1. Execute the show platform npu event-trap command to determine the event causing the packet drops.
cisco@sonic1:~$ sudo show platform npu event-trap

+-------------------------------------------------------------------------------------------------------------------------------------------------------+
 |                                                                   event trap counter                                                                  |
 +-------------------------------------------------+----------------------+------------------+--------------------------+-----------------+--------------+
 |                   event.meter                   | counter_or_meter/oid |    meter_type    |      Green Pkt/Byte      | Yellow Pkt/Byte | Red Pkt/Byte |
 +-------------------------------------------------+----------------------+------------------+--------------------------+-----------------+--------------+
 |    ETHERNET_NO_TERMINATION_ON_L3_PORT(4).15    |   la_meter_set/566   | PER_IFG_EXACT(2)  |      0/0                 |       0/0       |     0/0      |
 |    ETHERNET_NO_TERMINATION_ON_L3_PORT(4).16    |   la_meter_set/566   | PER_IFG_EXACT(2)  |      0/0                 |       0/0       |     0/0      |
 |    ETHERNET_NO_TERMINATION_ON_L3_PORT(4).17    |   la_meter_set/566   | PER_IFG_EXACT(2)  |      0/0                 |       0/0       |     0/0      |

In this example, the packet drops are caused by the ETHERNET_NO_TERMINATION_ON_L3_PORT error events. The event ID is indicated in parenthesis (4).

  1. Enable the packet drops for the event ID 4.
cisco@sonic1#sudo su
cisco@sonic1# config platform cisco packet-debug drops enable -e 4
Trap event ETHERNET_NO_TERMINATION_ON_L3_PORT configured successfully.Packet capture enabled.  Event list updated.
  1. Capture packets in a .pcap file and display packet on the screen using the show platform npu packet-debug capture -d command.
cisco@sonic1# show platform npu packet-debug capture -d
Wrote 10 packets to pcap file.  dump captured in /var/dump/capture_0.pcap

/usr/local/lib/python3.11/dist-packages/scapy/layers/ipsec.py:471: CryptographyDeprecationWarning: Blowfish has been deprecated
  cipher=algorithms.Blowfish,
/usr/local/lib/python3.11/dist-packages/scapy/layers/ipsec.py:485: CryptographyDeprecationWarning: CAST5 has been deprecated
  cipher=algorithms.CAST5,
====================== Packet: 1    ======================
###[ Ethernet ]### 
  dst       = 0a:0b:0c:0d:0e:0f
  src       = 00:00:00:00:00:00
  type      = n_802_1Q
###[ 802.1Q ]### 
     prio      = 0
     id        = 0
     vlan      = 100
     type      = 0x7106
###[ Punt ]### 
        next_header= 1
        fwd_header_type= 0
        reserved1 = 0
        next_header_offset= 35
        source    = Ingress Trap
        punt_code = ETHERNET_NO_TERMINATION_ON_L3_PORT(4)
        lpts_flow_type= 0
        source_sp = Ethernet8
        destination_sp= 65535
        source_lp = 1028
        destination_lp= 4
        reserved2 = 0
        relay_id  = 0
        time_stamp= 0x62443587d6c0
        receive_time= 0x3587d1ec
        version   = 1
        reserved3 = 0
        encap_qos_tag= 0
        qos_group = 0
        fwd_qos_tag= 0
        expansion = 0
###[ Ethernet ]### 
           dst       = 12:34:56:78:9a:bd
           src       = 00:ca:fe:de:ad:00
           type      = n_802_1Q
###[ 802.1Q ]### 
              prio      = 0
              id        = 0
              vlan      = 0
              type      = 0x7103
###[ Raw ]### 

====================== Packet: 2    ======================
###[ Ethernet ]### 
  dst       = 0a:0b:0c:0d:0e:0f
  src       = 00:00:00:00:00:00
  type      = n_802_1Q
###[ 802.1Q ]### 
     prio      = 0
     id        = 0
     vlan      = 100
     type      = 0x7106
###[ Punt ]### 
        next_header= 1
        fwd_header_type= 0
        reserved1 = 0
        next_header_offset= 35
        source    = Ingress Trap
        punt_code = ETHERNET_NO_TERMINATION_ON_L3_PORT(4)
        lpts_flow_type= 0
        source_sp = Ethernet8
        destination_sp= 65535
        source_lp = 1028
        destination_lp= 4
        reserved2 = 0
        relay_id  = 0
        time_stamp= 0x62453587db76
        receive_time= 0x3587d6b5
        version   = 1
        reserved3 = 0
        encap_qos_tag= 0
        qos_group = 0
        fwd_qos_tag= 0
        expansion = 0
###[ Ethernet ]### 
           dst       = 12:34:56:78:9a:bd
           src       = 00:ca:fe:de:ad:00
           type      = n_802_1Q
###[ 802.1Q ]### 
              prio      = 0
              id        = 0
              vlan      = 0
              type      = 0x7103
  1. Disable packet drops for the event 4.
cisco@sonic1# config platform cisco packet-debug drops disable -e 4
Trap event ETHERNET_NO_TERMINATION_ON_L3_PORT configured successfully.Packet capture disabled.
  1. Once the drop counters are configured, use "show dropcounters count" command to find out the drop.
cisco@sonic1:~$ show dropcounters count

IFACE         STATE   RX_ERR     RX_DROPS     TX_ERR      TX_DROPS     
----------- ------- --------   ----------   --------    ----------   
Ethernet0      U           0            0          0             0       
Ethernet4      U           0            0          0             0       
Ethernet8      U           0           54          0             0      

Packet drops due to "L3_DROP_ADJ"

  1. Execute the command show interface counter or show dropcounters counts to verify the packet drops.
   cisco@sonic:~$ show interface counter
      IFACE    STATE          RX_OK    RX_BPS    RX_UTIL    RX_ERR         RX_DRP    RX_OVR          TX_OK    TX_BPS    TX_UTIL    TX_ERR    TX_DRP    TX_OVR
-----------  -------  -------------  --------  ---------  --------  -------------  --------  -------------  --------  ---------  --------  --------  --------
  Ethernet0        U  6,734,329,932  0.00 B/s      0.00%         0  2,739,201,357         0         46,484  2.66 B/s      0.00%         0         0         0
  Ethernet8        U         44,806  2.66 B/s      0.00%         0              0         0  3,995,172,133  2.66 B/s      0.00%         0         0         0
 Ethernet16        D              0  0.00 B/s      0.00%         0              0         0              0  0.00 B/s      0.00%         0         0         0
 Ethernet24        U         43,753  2.67 B/s      0.00%         0              0         0         43,753  2.67 B/s      0.00%         0         0         0

cisco@sonic:~$ show dropcounters counts
      IFACE    STATE    RX_ERR    RX_DROPS    TX_ERR    TX_DROPS
-----------  -------  --------  ----------  --------  ----------
  Ethernet0        U         0  2739201357         0           0
  Ethernet8        U         0           0         0           0
 Ethernet16        D         0           0         0           0
  1. Execute the command show platform event-trap command to determine the event causing the packet drops.
cisco@sonic1:~$ sudo show platform npu event-trap

+-------------------------------------------------------------------------------------------------------------------------------------------------------+
 |                                                                   event trap counter                                                                  |
 +-------------------------------------------------+----------------------+------------------+--------------------------+-----------------+--------------+
 |                   event.meter                   | counter_or_meter/oid |    meter_type    |      Green Pkt/Byte      | Yellow Pkt/Byte | Red Pkt/Byte |
 +-------------------------------------------------+----------------------+------------------+--------------------------+-----------------+--------------+
 |              L3_DROP_ADJ(110).15                |   la_meter_set/582   | PER_IFG_EXACT(2) |      0/0                 |       0/0       |     0/0      |
 |              L3_DROP_ADJ(110).16                |   la_meter_set/582   | PER_IFG_EXACT(2) |      0/0                 |       0/0       |     0/0      |
 |              L3_DROP_ADJ(110).17                |   la_meter_set/582   | PER_IFG_EXACT(2) |      0/0                 |       0/0       |     0/0      |

In this example, the packet drops are caused by the L3_DROP_ADJ events. The event ID is indicated in parenthesis (110).

  1. Enable the packet drops for the event ID 110. You can either enable all events or enable packet drops for a specific event.
cisco@sonic1#sudo su
root@sonic:/home/cisco# config platform cisco packet-debug drops enable -e 110
Trap event L3_DROP_ADJ configured successfully.Packet capture enabled.  Event list updated.
  1. Capture packets in a .pcap file and display packet on the screen using the show platform npu packet-debug capture -d command.
cisco@sonic1# show platform npu packet-debug capture -d
Wrote 8 packets to pcap file.  dump captured in /var/dump/capture_0.pcap

====================== Packet: 1    ======================
###[ Ethernet ]### 
  dst       = 0a:0b:0c:0d:0e:0f
  src       = 00:00:00:00:00:00
  type      = n_802_1Q
###[ 802.1Q ]### 
     prio      = 0
     id        = 0
     vlan      = 100
     type      = 0x7106
###[ Punt ]### 
        next_header= 1
        fwd_header_type= 2
        reserved1 = 0
        next_header_offset= 49
        source    = Ingress Trap
        punt_code = L3_DROP_ADJ(110)
        lpts_flow_type= 0
        source_sp = Ethernet8
        destination_sp= 65535
        source_lp = 1028
        destination_lp= 110
        reserved2 = 0
        relay_id  = 0
        time_stamp= 0x63ca2ba79e08
        receive_time= 0x2ba79817
        version   = 1
        reserved3 = 0
        encap_qos_tag= 0
        qos_group = 0
        fwd_qos_tag= 0
        expansion = 0
###[ Ethernet ]### 
           dst       = 12:34:56:78:9a:bd
           src       = 00:ca:fe:de:ad:00
           type      = n_802_1Q
###[ 802.1Q ]### 
              prio      = 0
              id        = 0
              vlan      = 0
              type      = 0x7103
###[ Raw ]### 
  1. Disable packet capture for the event 110.
cisco@sonic1# config platform cisco packet-debug drops disable -e 110
Trap event L3_DROP_ADJ configured successfully.Packet capture disabled.
  1. Once the drop counters are configured, use the show dropcounters count command to find out the drop.
cisco@sonic1# show dropcounters count
      IFACE    STATE    RX_ERR    RX_DROPS    TX_ERR    TX_DROPS
-----------  -------  --------  ----------  --------  ----------
  Ethernet0        U         0  2918431854         0           0
  Ethernet8        U         0           0         0           0
  Ethernet16       D         0           0         0           0  

View all packet drop events

  1. Execute the command show interface counter or show dropcounters counts to verify the packet drops.
cisco@sonic1:~$ show interface counters
IFACE          STATE     RX_OK           RX_BPS      RX_UTIL     RX_ERR      RX_DRP     RX_OVR     TX_OK        TX_BPS     TX_UTIL    TX_ERR      TX_DRP     TX_OVR
----------- ------- -------------  ------------    ---------   --------    --------   --------    -------     ---------  ---------  --------    --------   --------
Ethernet0       U            20       10.48 B/s        0.00%          0           0          0         21      0.20 B/s      0.00%         0           0        N/A
Ethernet4       U            19        0.16 B/s        0.00%          0           0          0         16      0.20 B/s      0.00%         0           0        N/A
Ethernet8       U  1,902,757,911   1717.56 MB/s       13.74%          0          26          0         57     52.39 B/s      0.00%         0           0        N/A

cisco@sonic1:~$ show interface counters
IFACE        STATE        RX_OK          RX_BPS      RX_UTIL     RX_ERR      RX_DRP     RX_OVR     TX_OK         TX_BPS     TX_UTIL    TX_ERR      TX_DRP    TX_OVR
----------- ------- -------------  ------------    ---------   --------    --------   --------    -------     ---------   ---------   --------   --------  --------
Ethernet0     U               20       0.16 B/s         0.00%         0           0          0         22      1.18 B/s       0.00%         0           0       N/A
Ethernet4     U                        0.97 B/s         0.00%         0           0          0         17      1.18 B/s       0.00%         0           0       N/A
Ethernet8     U    2,441,487,781   1764.41 MB/s        14.12%         0          43          0         74     56.79 B/s       0.00%         0           0       N/A


cisco@sonic1:~$ show drop count
IFACE         STATE   RX_ERR      RX_DROPS    TX_ERR      TX_DROPS
----------- ------- --------    ----------  --------    ----------
Ethernet0      U           0             0         0             0
Ethernet4      U           0             0         0             0
Ethernet8      U           0            49         0             0

cisco@sonic1:~$ show drop count | grep Ethernet8

IFACE         STATE   RX_ERR      RX_DROPS     TX_ERR     TX_DROPS
----------- ------- --------    ----------   --------   ----------
Ethernet8     U            0            54          0            0
  1. Enable packet capture for all drop events.
cisco@sonic1#sudo su
cisco@sonic1# config platform cisco packet-debug drops enable
Trap event ETHERNET_L2_DLP_NOT_FOUND configured successfully.Trap event MPLS_ROUTER_ALERT_LABEL configured successfully.Trap event L3_ASBR_TABLE_MISS configured successfully.Trap event ETHERNET_SAME_INTERFACE configured successfully.Trap event OAMP_ETH_MULTICAST_DA_NO_MATCH configured successfully.Trap event L3_INGRESS_MONITOR configured successfully.Trap event ETHERNET_UNKNOWN_L3 configured successfully.Trap event OAMP_PFC_DROP_INVALID_RX configured successfully.Trap event IPV4_NON_COMP_MC configured successfully.Trap event APP_IP_INACTIVITY configured successfully.Trap event L3_L3_SAME_TUNNEL_INTF configured successfully.Trap event ETHERNET_L2CP1 configured successfully.Trap event MPLS_IPV4_OVER_IPV6_EXPLICIT_NULL configured successfully.Trap event L3_TX_DROP configured successfully.Trap event MPLS_TTL_IS_ZERO configured successfully.Trap event ETHERNET_PADDING_RESIDUE_IN_SECOND_LINE configured successfully.Trap event OAMP_BFD_INVALID_UDP_PORT configured successfully.Trap event L3_DROP_ADJ configured successfully.Trap event ETHERNET_SMAC_MISS configured successfully.Trap event ETHERNET_ACCEPTABLE_FORMAT configured successfully.Trap event L3_INVALID_SPI configured successfully.Trap event ETHERNET_UNKNOWN_UC configured successfully.Trap event APP_SGACL_DROP configured successfully.Trap event IPV6_ZERO_PAYLOAD configured successfully.Trap event L3_NO_VPN_LABEL_FOUND configured successfully.Trap event L3_TX_MTU_FAILURE configured successfully.Trap event MPLS_UNKNOWN_PROTOCOL_AFTER_BOS configured successfully.Trap event ETHERNET_PFC_SAMPLE configured successfully.Trap event OAMP_CFM_SESSION_RECEIVED configured successfully.Trap event ETHERNET_SVI_EGRESS_DHCP configured successfully.Trap event OAMP_ETH_REMOTE_SA_NO_MATCH configured successfully.Trap event L3_IP_MC_EGRESS_PUNT configured successfully.Trap event ETHERNET_DOT1X_DROP configured successfully.Trap event MPLS_FORWARDING_DISABLED configured successfully.Trap event ETHERNET_NO_PWE_L3_DEST configured successfully.Trap event L3_USER_TRAP2 configured successfully.Trap event MPLS_PWHE_FWD_UNCONFIGURED_SLICE configured successfully.Trap event ETHERNET_RX_CFM_NON_OFFLOAD configured successfully.Trap event OAMP_ETH_CCM_TLV_NO_MATCH configured successfully.Trap event OAMP_PFC_LOOKUP_FAILED configured successfully.Trap event IPV4_OPTIONS_EXIST_RX configured successfully.Trap event IPV6_ILLEGAL_DIP configured successfully.Trap event ETHERNET_ISIS_OVER_L2 configured successfully.Trap event L3_NO_HBM_ACCESS_SIP configured successfully.Trap event MPLS_ILM_VRF_LABEL_MISS configured successfully.Trap event L3_TTL_OR_HOP_LIMIT_IS_ONE configured successfully.Trap event ETHERNET_PFC_DIRECT_SAMPLE configured successfully.Trap event ETHERNET_SPLIT_HORIZON configured successfully.Trap event OAMP_ETH_REMOTE_FLAG_CHANGE configured successfully.Trap event L3_IP_MC_DROP configured successfully.Trap event OAMP_SESSION_RECEIVED configured successfully.Packet capture enabled.  Event list updated.
  1. View all configured event traps.
   cisco@sonic1# sudo show platform npu event-trap
  
 +-------------------------------------------------------------------------------------------------------------------------------------------------------+
 |                                                                   event trap counter                                                                  |
 +-------------------------------------------------+----------------------+------------------+--------------------------+-----------------+--------------+
 |                   event.meter                   | counter_or_meter/oid |    meter_type    |      Green Pkt/Byte      | Yellow Pkt/Byte | Red Pkt/Byte |
 +-------------------------------------------------+----------------------+------------------+--------------------------+-----------------+--------------+
 |         ETHERNET_ACCEPTABLE_FORMAT(0).0         |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |         ETHERNET_ACCEPTABLE_FORMAT(0).1         |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |         ETHERNET_ACCEPTABLE_FORMAT(0).2         |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |         ETHERNET_ACCEPTABLE_FORMAT(0).25        |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |              ETHERNET_ACL_DROP(1).0             |   la_meter_set/565   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |              ETHERNET_ACL_DROP(1).1             |   la_meter_set/565   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |              ETHERNET_ACL_DROP(1).2             |   la_meter_set/565   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |           ETHERNET_ACL_FORCE_PUNT(2).0          |   la_meter_set/441   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |     ETHERNET_NO_TERMINATION_ON_L3_PORT(4).0     |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |     ETHERNET_NO_TERMINATION_ON_L3_PORT(4).1     |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |     ETHERNET_NO_TERMINATION_ON_L3_PORT(4).2     |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |     ETHERNET_NO_TERMINATION_ON_L3_PORT(4).3     |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |          ETHERNET_CISCO_PROTOCOLS(5).0          |   la_meter_set/567   | PER_IFG_EXACT(2) |     805207/233873528     |       0/0       |     0/0      |
 |              ETHERNET_DA_ERROR(6).0             |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |              ETHERNET_DA_ERROR(6).1             |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |              ETHERNET_DA_ERROR(6).2             |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |              ETHERNET_DA_ERROR(6).3             |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |           ETHERNET_DHCPV4_CLIENT(7).0           |   la_meter_set/441   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |           ETHERNET_DHCPV4_SERVER(8).0           |   la_meter_set/441   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |           ETHERNET_DHCPV6_CLIENT(9).0           |   la_meter_set/441   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |           ETHERNET_DHCPV6_SERVER(10).0          |   la_meter_set/441   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |             ETHERNET_DISABLED(11).0             |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |             ETHERNET_DISABLED(11).1             |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |             ETHERNET_DISABLED(11).2             |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |            ETHERNET_DOT1X_DROP(14).0            |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |            ETHERNET_DOT1X_DROP(14).1            |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |            ETHERNET_DOT1X_DROP(14).2            |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |            ETHERNET_DOT1X_DROP(14).3            |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |            ETHERNET_DOT1X_DROP(14).4            |  la_meter_set/2505   | PER_IFG_EXACT(2) |           0/0            |       0/0       |     0/0      |
 |
 
  1. Capture packets in a .pcap file and display them on the screen using the show platform npu packet-debug capture -d command.
cisco@sonic1# show platform npu packet-debug capture -d
Wrote 10 packets to pcap file.  dump captured in /var/dump/capture_0.pcap

/usr/local/lib/python3.11/dist-packages/scapy/layers/ipsec.py:471: CryptographyDeprecationWarning: Blowfish has been deprecated
  cipher=algorithms.Blowfish,
/usr/local/lib/python3.11/dist-packages/scapy/layers/ipsec.py:485: CryptographyDeprecationWarning: CAST5 has been deprecated
  cipher=algorithms.CAST5,
====================== Packet: 1    ======================
###[ Ethernet ]### 
  dst       = 0a:0b:0c:0d:0e:0f
  src       = 00:00:00:00:00:00
  type      = n_802_1Q
###[ 802.1Q ]### 
     prio      = 0
     id        = 0
     vlan      = 100
     type      = 0x7106
###[ Punt ]### 
        next_header= 1
        fwd_header_type= 0
        reserved1 = 0
        next_header_offset= 35
        source    = Ingress Trap
        punt_code = ETHERNET_NO_TERMINATION_ON_L3_PORT(4)
        lpts_flow_type= 0
        source_sp = Ethernet8
        destination_sp= 65535
        source_lp = 1028
        destination_lp= 4
        reserved2 = 0
        relay_id  = 0
        time_stamp= 0x62443587d6c0
        receive_time= 0x3587d1ec
        version   = 1
        reserved3 = 0
        encap_qos_tag= 0
        qos_group = 0
        fwd_qos_tag= 0
        expansion = 0
###[ Ethernet ]### 
           dst       = 12:34:56:78:9a:bd
           src       = 00:ca:fe:de:ad:00
           type      = n_802_1Q
###[ 802.1Q ]### 
              prio      = 0
              id        = 0
              vlan      = 0
              type      = 0x7103
###[ Raw ]### 

====================== Packet: 2    ======================
###[ Ethernet ]### 
  dst       = 0a:0b:0c:0d:0e:0f
  src       = 00:00:00:00:00:00
  type      = n_802_1Q
###[ 802.1Q ]### 
     prio      = 0
     id        = 0
     vlan      = 100
     type      = 0x7106
###[ Punt ]### 
        next_header= 1
        fwd_header_type= 0
        reserved1 = 0
        next_header_offset= 35
        source    = Ingress Trap
        punt_code = ETHERNET_NO_TERMINATION_ON_L3_PORT(4)
        lpts_flow_type= 0
        source_sp = Ethernet8
        destination_sp= 65535
        source_lp = 1028
        destination_lp= 4
        reserved2 = 0
        relay_id  = 0
        time_stamp= 0x62453587db76
        receive_time= 0x3587d6b5
        version   = 1
        reserved3 = 0
        encap_qos_tag= 0
        qos_group = 0
        fwd_qos_tag= 0
        expansion = 0
###[ Ethernet ]### 
           dst       = 12:34:56:78:9a:bd
           src       = 00:ca:fe:de:ad:00
           type      = n_802_1Q
###[ 802.1Q ]### 
              prio      = 0
              id        = 0
              vlan      = 0
              type      = 0x7103
  1. Clear all captured packets.
cisco@sonic1# show platform npu packet-debug capture -c
Wrote 0 packets to pcap file.  dump captured in /var/dump/capture_0.pcap
Capture buffer is cleared.