Troubleshoot Packet Drops
This section describes how to troubleshoot packet drops.
Capture packet drops
Packet drops occur when packets are discarded or lost during transmission through a network device. These drops can happen for various reasons, such as hardware limitations, network congestion, or operational issues.
Why do you need to capture packet drops?
Capturing packet drops is crucial for troubleshooting and diagnosing network issues. It helps to:
- Identify the exact location and cause for packet loss, which are essential for effective troubleshooting.
- View the details of the captured packets.
Enable and manage packet capture on a router
This section provides instructions for configuring and managing packet capture on a router to analyze packet drops. Use this task when you encounter packet drops on your router to determine the root cause.
Follow these steps to configure and manage packet capture to analyze packet drops:
Execute these commands to verify packet drops on the router.
show interface counter
show queue counters
show dropcounters
Execute the
show platform npu event-trap
command to identify the error events causing the drops.Configure the router to enable packet capture. You can choose to capture all events, multiple events, or specific events.
- To enable the router to capture all events, use the
config platform cisco packet-debug drops enable
command. - To enable the router to capture a specific event, use the
config platform cisco packet-debug drops enable -e _event-ID_
command. - To enable the router to capture multiple events, use the
config platform cisco packet-debug drops enable -e _event-ID_ -e _event-ID_ -e _event-ID_
command.
- To enable the router to capture all events, use the
Save captured packets for later analysis. You can use one of these methods to save the file.
- To save the captured packets in a
.pcap
file, use theshow platform npu packet-debug capture
command. - To save the captured packets in a
.pcap
file and display packet decoding on the screen, use theshow platform npu packet-debug capture -d
command. - To save the captured packets with a specific file name, use the
show platform npu packet-debug capture -f test.pcap
command. You can later use this file for analysis in a tool like Wireshark. - To clear the captured packets, use the
show platform npu packet-debug capture -c
command. - To append output to an existing file for continuous capture, use the
show platform npu packet-debug capture -a
command.
- To save the captured packets in a
Verify packet capture status using the
show platform npu packet-debug status
command. To view the status, including events enabled for packet capture, use theshow platform npu packet-debug status -d
command.Disable packet capture on your router. You can choose to disable all packet capture or disable specific events.
- To disable all packet capture and restore the original configuration, use the
config platform cisco packet-debug drops disable
command. - To disable packet capture for a specific events. Use the
config platform cisco packet-debug drops disable -e _event-ID_
command. - To disable packet capture for multiple events, use the
config platform cisco packet-debug drops disable -e _event-ID_ -e _event-ID_ -e _event-ID_
command.
- To disable all packet capture and restore the original configuration, use the
Result: The router is configured to capture packet drops, providing data for effective network issue diagnosis.
Post-requisite: Analyze the captured packet data using tools like Wireshark to determine the root cause of packet drops.
Packet Drop Scenarios
Packet drops due to "ETHERNET_NO_TERMINATION_ON_L3_PORT"
This error indicates that the source IP address of the packet is invalid. To capture these packet drops, perform these commands.
- Execute the command
show interface counter
orshow dropcounters counts
to verify the packet drops.
cisco@sonic1:~$ show interface counters
IFACE STATE RX_OK RX_BPS RX_UTIL RX_ERR RX_DRP RX_OVR TX_OK TX_BPS TX_UTIL TX_ERR TX_DRP TX_OVR
----------- ------- ------------- ------------ --------- -------- -------- -------- ------- --------- --------- -------- -------- --------
Ethernet0 U 20 10.48 B/s 0.00% 0 0 0 21 0.20 B/s 0.00% 0 0 N/A
Ethernet4 U 19 0.16 B/s 0.00% 0 0 0 16 0.20 B/s 0.00% 0 0 N/A
Ethernet8 U 1,902,757,911 1717.56 MB/s 13.74% 0 26 0 57 52.39 B/s 0.00% 0 0 N/A
cisco@sonic1:~$ show interface counters
IFACE STATE RX_OK RX_BPS RX_UTIL RX_ERR RX_DRP RX_OVR TX_OK TX_BPS TX_UTIL TX_ERR TX_DRP TX_OVR
----------- ------- ------------- ------------ --------- -------- -------- -------- ------- --------- --------- -------- -------- --------
Ethernet0 U 20 0.16 B/s 0.00% 0 0 0 22 1.18 B/s 0.00% 0 0 N/A
Ethernet4 U 0.97 B/s 0.00% 0 0 0 17 1.18 B/s 0.00% 0 0 N/A
Ethernet8 U 2,441,487,781 1764.41 MB/s 14.12% 0 43 0 74 56.79 B/s 0.00% 0 0 N/A
cisco@sonic1:~$ show drop count
IFACE STATE RX_ERR RX_DROPS TX_ERR TX_DROPS
----------- ------- -------- ---------- -------- ----------
Ethernet0 U 0 0 0 0
Ethernet4 U 0 0 0 0
Ethernet8 U 0 49 0 0
cisco@sonic1:~$ show drop count | grep Ethernet8
IFACE STATE RX_ERR RX_DROPS TX_ERR TX_DROPS
----------- ------- -------- ---------- -------- ----------
Ethernet8 U 0 54 0 0
- Execute the
show platform npu event-trap
command to determine the event causing the packet drops.
cisco@sonic1:~$ sudo show platform npu event-trap
+-------------------------------------------------------------------------------------------------------------------------------------------------------+
| event trap counter |
+-------------------------------------------------+----------------------+------------------+--------------------------+-----------------+--------------+
| event.meter | counter_or_meter/oid | meter_type | Green Pkt/Byte | Yellow Pkt/Byte | Red Pkt/Byte |
+-------------------------------------------------+----------------------+------------------+--------------------------+-----------------+--------------+
| ETHERNET_NO_TERMINATION_ON_L3_PORT(4).15 | la_meter_set/566 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_NO_TERMINATION_ON_L3_PORT(4).16 | la_meter_set/566 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_NO_TERMINATION_ON_L3_PORT(4).17 | la_meter_set/566 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
In this example, the packet drops are caused by the ETHERNET_NO_TERMINATION_ON_L3_PORT error events. The event ID is indicated in parenthesis (4).
- Enable the packet drops for the event ID 4.
cisco@sonic1#sudo su
cisco@sonic1# config platform cisco packet-debug drops enable -e 4
Trap event ETHERNET_NO_TERMINATION_ON_L3_PORT configured successfully.Packet capture enabled. Event list updated.
- Capture packets in a
.pcap
file and display packet on the screen using theshow platform npu packet-debug capture -d
command.
cisco@sonic1# show platform npu packet-debug capture -d
Wrote 10 packets to pcap file. dump captured in /var/dump/capture_0.pcap
/usr/local/lib/python3.11/dist-packages/scapy/layers/ipsec.py:471: CryptographyDeprecationWarning: Blowfish has been deprecated
cipher=algorithms.Blowfish,
/usr/local/lib/python3.11/dist-packages/scapy/layers/ipsec.py:485: CryptographyDeprecationWarning: CAST5 has been deprecated
cipher=algorithms.CAST5,
====================== Packet: 1 ======================
###[ Ethernet ]###
dst = 0a:0b:0c:0d:0e:0f
src = 00:00:00:00:00:00
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 100
type = 0x7106
###[ Punt ]###
next_header= 1
fwd_header_type= 0
reserved1 = 0
next_header_offset= 35
source = Ingress Trap
punt_code = ETHERNET_NO_TERMINATION_ON_L3_PORT(4)
lpts_flow_type= 0
source_sp = Ethernet8
destination_sp= 65535
source_lp = 1028
destination_lp= 4
reserved2 = 0
relay_id = 0
time_stamp= 0x62443587d6c0
receive_time= 0x3587d1ec
version = 1
reserved3 = 0
encap_qos_tag= 0
qos_group = 0
fwd_qos_tag= 0
expansion = 0
###[ Ethernet ]###
dst = 12:34:56:78:9a:bd
src = 00:ca:fe:de:ad:00
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 0
type = 0x7103
###[ Raw ]###
====================== Packet: 2 ======================
###[ Ethernet ]###
dst = 0a:0b:0c:0d:0e:0f
src = 00:00:00:00:00:00
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 100
type = 0x7106
###[ Punt ]###
next_header= 1
fwd_header_type= 0
reserved1 = 0
next_header_offset= 35
source = Ingress Trap
punt_code = ETHERNET_NO_TERMINATION_ON_L3_PORT(4)
lpts_flow_type= 0
source_sp = Ethernet8
destination_sp= 65535
source_lp = 1028
destination_lp= 4
reserved2 = 0
relay_id = 0
time_stamp= 0x62453587db76
receive_time= 0x3587d6b5
version = 1
reserved3 = 0
encap_qos_tag= 0
qos_group = 0
fwd_qos_tag= 0
expansion = 0
###[ Ethernet ]###
dst = 12:34:56:78:9a:bd
src = 00:ca:fe:de:ad:00
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 0
type = 0x7103
- Disable packet drops for the event 4.
cisco@sonic1# config platform cisco packet-debug drops disable -e 4
Trap event ETHERNET_NO_TERMINATION_ON_L3_PORT configured successfully.Packet capture disabled.
- Once the drop counters are configured, use "show dropcounters count" command to find out the drop.
cisco@sonic1:~$ show dropcounters count
IFACE STATE RX_ERR RX_DROPS TX_ERR TX_DROPS
----------- ------- -------- ---------- -------- ----------
Ethernet0 U 0 0 0 0
Ethernet4 U 0 0 0 0
Ethernet8 U 0 54 0 0
Packet drops due to "L3_DROP_ADJ"
- Execute the command
show interface counter
orshow dropcounters counts
to verify the packet drops.
cisco@sonic:~$ show interface counter
IFACE STATE RX_OK RX_BPS RX_UTIL RX_ERR RX_DRP RX_OVR TX_OK TX_BPS TX_UTIL TX_ERR TX_DRP TX_OVR
----------- ------- ------------- -------- --------- -------- ------------- -------- ------------- -------- --------- -------- -------- --------
Ethernet0 U 6,734,329,932 0.00 B/s 0.00% 0 2,739,201,357 0 46,484 2.66 B/s 0.00% 0 0 0
Ethernet8 U 44,806 2.66 B/s 0.00% 0 0 0 3,995,172,133 2.66 B/s 0.00% 0 0 0
Ethernet16 D 0 0.00 B/s 0.00% 0 0 0 0 0.00 B/s 0.00% 0 0 0
Ethernet24 U 43,753 2.67 B/s 0.00% 0 0 0 43,753 2.67 B/s 0.00% 0 0 0
cisco@sonic:~$ show dropcounters counts
IFACE STATE RX_ERR RX_DROPS TX_ERR TX_DROPS
----------- ------- -------- ---------- -------- ----------
Ethernet0 U 0 2739201357 0 0
Ethernet8 U 0 0 0 0
Ethernet16 D 0 0 0 0
- Execute the command
show platform event-trap
command to determine the event causing the packet drops.
cisco@sonic1:~$ sudo show platform npu event-trap
+-------------------------------------------------------------------------------------------------------------------------------------------------------+
| event trap counter |
+-------------------------------------------------+----------------------+------------------+--------------------------+-----------------+--------------+
| event.meter | counter_or_meter/oid | meter_type | Green Pkt/Byte | Yellow Pkt/Byte | Red Pkt/Byte |
+-------------------------------------------------+----------------------+------------------+--------------------------+-----------------+--------------+
| L3_DROP_ADJ(110).15 | la_meter_set/582 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| L3_DROP_ADJ(110).16 | la_meter_set/582 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| L3_DROP_ADJ(110).17 | la_meter_set/582 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
In this example, the packet drops are caused by the L3_DROP_ADJ events. The event ID is indicated in parenthesis (110).
- Enable the packet drops for the event ID 110. You can either enable all events or enable packet drops for a specific event.
cisco@sonic1#sudo su
root@sonic:/home/cisco# config platform cisco packet-debug drops enable -e 110
Trap event L3_DROP_ADJ configured successfully.Packet capture enabled. Event list updated.
- Capture packets in a
.pcap
file and display packet on the screen using theshow platform npu packet-debug capture -d
command.
cisco@sonic1# show platform npu packet-debug capture -d
Wrote 8 packets to pcap file. dump captured in /var/dump/capture_0.pcap
====================== Packet: 1 ======================
###[ Ethernet ]###
dst = 0a:0b:0c:0d:0e:0f
src = 00:00:00:00:00:00
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 100
type = 0x7106
###[ Punt ]###
next_header= 1
fwd_header_type= 2
reserved1 = 0
next_header_offset= 49
source = Ingress Trap
punt_code = L3_DROP_ADJ(110)
lpts_flow_type= 0
source_sp = Ethernet8
destination_sp= 65535
source_lp = 1028
destination_lp= 110
reserved2 = 0
relay_id = 0
time_stamp= 0x63ca2ba79e08
receive_time= 0x2ba79817
version = 1
reserved3 = 0
encap_qos_tag= 0
qos_group = 0
fwd_qos_tag= 0
expansion = 0
###[ Ethernet ]###
dst = 12:34:56:78:9a:bd
src = 00:ca:fe:de:ad:00
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 0
type = 0x7103
###[ Raw ]###
- Disable packet capture for the event 110.
cisco@sonic1# config platform cisco packet-debug drops disable -e 110
Trap event L3_DROP_ADJ configured successfully.Packet capture disabled.
- Once the drop counters are configured, use the
show dropcounters count
command to find out the drop.
cisco@sonic1# show dropcounters count
IFACE STATE RX_ERR RX_DROPS TX_ERR TX_DROPS
----------- ------- -------- ---------- -------- ----------
Ethernet0 U 0 2918431854 0 0
Ethernet8 U 0 0 0 0
Ethernet16 D 0 0 0 0
View all packet drop events
- Execute the command
show interface counter
orshow dropcounters counts
to verify the packet drops.
cisco@sonic1:~$ show interface counters
IFACE STATE RX_OK RX_BPS RX_UTIL RX_ERR RX_DRP RX_OVR TX_OK TX_BPS TX_UTIL TX_ERR TX_DRP TX_OVR
----------- ------- ------------- ------------ --------- -------- -------- -------- ------- --------- --------- -------- -------- --------
Ethernet0 U 20 10.48 B/s 0.00% 0 0 0 21 0.20 B/s 0.00% 0 0 N/A
Ethernet4 U 19 0.16 B/s 0.00% 0 0 0 16 0.20 B/s 0.00% 0 0 N/A
Ethernet8 U 1,902,757,911 1717.56 MB/s 13.74% 0 26 0 57 52.39 B/s 0.00% 0 0 N/A
cisco@sonic1:~$ show interface counters
IFACE STATE RX_OK RX_BPS RX_UTIL RX_ERR RX_DRP RX_OVR TX_OK TX_BPS TX_UTIL TX_ERR TX_DRP TX_OVR
----------- ------- ------------- ------------ --------- -------- -------- -------- ------- --------- --------- -------- -------- --------
Ethernet0 U 20 0.16 B/s 0.00% 0 0 0 22 1.18 B/s 0.00% 0 0 N/A
Ethernet4 U 0.97 B/s 0.00% 0 0 0 17 1.18 B/s 0.00% 0 0 N/A
Ethernet8 U 2,441,487,781 1764.41 MB/s 14.12% 0 43 0 74 56.79 B/s 0.00% 0 0 N/A
cisco@sonic1:~$ show drop count
IFACE STATE RX_ERR RX_DROPS TX_ERR TX_DROPS
----------- ------- -------- ---------- -------- ----------
Ethernet0 U 0 0 0 0
Ethernet4 U 0 0 0 0
Ethernet8 U 0 49 0 0
cisco@sonic1:~$ show drop count | grep Ethernet8
IFACE STATE RX_ERR RX_DROPS TX_ERR TX_DROPS
----------- ------- -------- ---------- -------- ----------
Ethernet8 U 0 54 0 0
- Enable packet capture for all drop events.
cisco@sonic1#sudo su
cisco@sonic1# config platform cisco packet-debug drops enable
Trap event ETHERNET_L2_DLP_NOT_FOUND configured successfully.Trap event MPLS_ROUTER_ALERT_LABEL configured successfully.Trap event L3_ASBR_TABLE_MISS configured successfully.Trap event ETHERNET_SAME_INTERFACE configured successfully.Trap event OAMP_ETH_MULTICAST_DA_NO_MATCH configured successfully.Trap event L3_INGRESS_MONITOR configured successfully.Trap event ETHERNET_UNKNOWN_L3 configured successfully.Trap event OAMP_PFC_DROP_INVALID_RX configured successfully.Trap event IPV4_NON_COMP_MC configured successfully.Trap event APP_IP_INACTIVITY configured successfully.Trap event L3_L3_SAME_TUNNEL_INTF configured successfully.Trap event ETHERNET_L2CP1 configured successfully.Trap event MPLS_IPV4_OVER_IPV6_EXPLICIT_NULL configured successfully.Trap event L3_TX_DROP configured successfully.Trap event MPLS_TTL_IS_ZERO configured successfully.Trap event ETHERNET_PADDING_RESIDUE_IN_SECOND_LINE configured successfully.Trap event OAMP_BFD_INVALID_UDP_PORT configured successfully.Trap event L3_DROP_ADJ configured successfully.Trap event ETHERNET_SMAC_MISS configured successfully.Trap event ETHERNET_ACCEPTABLE_FORMAT configured successfully.Trap event L3_INVALID_SPI configured successfully.Trap event ETHERNET_UNKNOWN_UC configured successfully.Trap event APP_SGACL_DROP configured successfully.Trap event IPV6_ZERO_PAYLOAD configured successfully.Trap event L3_NO_VPN_LABEL_FOUND configured successfully.Trap event L3_TX_MTU_FAILURE configured successfully.Trap event MPLS_UNKNOWN_PROTOCOL_AFTER_BOS configured successfully.Trap event ETHERNET_PFC_SAMPLE configured successfully.Trap event OAMP_CFM_SESSION_RECEIVED configured successfully.Trap event ETHERNET_SVI_EGRESS_DHCP configured successfully.Trap event OAMP_ETH_REMOTE_SA_NO_MATCH configured successfully.Trap event L3_IP_MC_EGRESS_PUNT configured successfully.Trap event ETHERNET_DOT1X_DROP configured successfully.Trap event MPLS_FORWARDING_DISABLED configured successfully.Trap event ETHERNET_NO_PWE_L3_DEST configured successfully.Trap event L3_USER_TRAP2 configured successfully.Trap event MPLS_PWHE_FWD_UNCONFIGURED_SLICE configured successfully.Trap event ETHERNET_RX_CFM_NON_OFFLOAD configured successfully.Trap event OAMP_ETH_CCM_TLV_NO_MATCH configured successfully.Trap event OAMP_PFC_LOOKUP_FAILED configured successfully.Trap event IPV4_OPTIONS_EXIST_RX configured successfully.Trap event IPV6_ILLEGAL_DIP configured successfully.Trap event ETHERNET_ISIS_OVER_L2 configured successfully.Trap event L3_NO_HBM_ACCESS_SIP configured successfully.Trap event MPLS_ILM_VRF_LABEL_MISS configured successfully.Trap event L3_TTL_OR_HOP_LIMIT_IS_ONE configured successfully.Trap event ETHERNET_PFC_DIRECT_SAMPLE configured successfully.Trap event ETHERNET_SPLIT_HORIZON configured successfully.Trap event OAMP_ETH_REMOTE_FLAG_CHANGE configured successfully.Trap event L3_IP_MC_DROP configured successfully.Trap event OAMP_SESSION_RECEIVED configured successfully.Packet capture enabled. Event list updated.
- View all configured event traps.
cisco@sonic1# sudo show platform npu event-trap
+-------------------------------------------------------------------------------------------------------------------------------------------------------+
| event trap counter |
+-------------------------------------------------+----------------------+------------------+--------------------------+-----------------+--------------+
| event.meter | counter_or_meter/oid | meter_type | Green Pkt/Byte | Yellow Pkt/Byte | Red Pkt/Byte |
+-------------------------------------------------+----------------------+------------------+--------------------------+-----------------+--------------+
| ETHERNET_ACCEPTABLE_FORMAT(0).0 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_ACCEPTABLE_FORMAT(0).1 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_ACCEPTABLE_FORMAT(0).2 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_ACCEPTABLE_FORMAT(0).25 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_ACL_DROP(1).0 | la_meter_set/565 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_ACL_DROP(1).1 | la_meter_set/565 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_ACL_DROP(1).2 | la_meter_set/565 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_ACL_FORCE_PUNT(2).0 | la_meter_set/441 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_NO_TERMINATION_ON_L3_PORT(4).0 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_NO_TERMINATION_ON_L3_PORT(4).1 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_NO_TERMINATION_ON_L3_PORT(4).2 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_NO_TERMINATION_ON_L3_PORT(4).3 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_CISCO_PROTOCOLS(5).0 | la_meter_set/567 | PER_IFG_EXACT(2) | 805207/233873528 | 0/0 | 0/0 |
| ETHERNET_DA_ERROR(6).0 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DA_ERROR(6).1 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DA_ERROR(6).2 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DA_ERROR(6).3 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DHCPV4_CLIENT(7).0 | la_meter_set/441 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DHCPV4_SERVER(8).0 | la_meter_set/441 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DHCPV6_CLIENT(9).0 | la_meter_set/441 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DHCPV6_SERVER(10).0 | la_meter_set/441 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DISABLED(11).0 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DISABLED(11).1 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DISABLED(11).2 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DOT1X_DROP(14).0 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DOT1X_DROP(14).1 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DOT1X_DROP(14).2 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DOT1X_DROP(14).3 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
| ETHERNET_DOT1X_DROP(14).4 | la_meter_set/2505 | PER_IFG_EXACT(2) | 0/0 | 0/0 | 0/0 |
|
- Capture packets in a .pcap file and display them on the screen using the
show platform npu packet-debug capture -d
command.
cisco@sonic1# show platform npu packet-debug capture -d
Wrote 10 packets to pcap file. dump captured in /var/dump/capture_0.pcap
/usr/local/lib/python3.11/dist-packages/scapy/layers/ipsec.py:471: CryptographyDeprecationWarning: Blowfish has been deprecated
cipher=algorithms.Blowfish,
/usr/local/lib/python3.11/dist-packages/scapy/layers/ipsec.py:485: CryptographyDeprecationWarning: CAST5 has been deprecated
cipher=algorithms.CAST5,
====================== Packet: 1 ======================
###[ Ethernet ]###
dst = 0a:0b:0c:0d:0e:0f
src = 00:00:00:00:00:00
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 100
type = 0x7106
###[ Punt ]###
next_header= 1
fwd_header_type= 0
reserved1 = 0
next_header_offset= 35
source = Ingress Trap
punt_code = ETHERNET_NO_TERMINATION_ON_L3_PORT(4)
lpts_flow_type= 0
source_sp = Ethernet8
destination_sp= 65535
source_lp = 1028
destination_lp= 4
reserved2 = 0
relay_id = 0
time_stamp= 0x62443587d6c0
receive_time= 0x3587d1ec
version = 1
reserved3 = 0
encap_qos_tag= 0
qos_group = 0
fwd_qos_tag= 0
expansion = 0
###[ Ethernet ]###
dst = 12:34:56:78:9a:bd
src = 00:ca:fe:de:ad:00
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 0
type = 0x7103
###[ Raw ]###
====================== Packet: 2 ======================
###[ Ethernet ]###
dst = 0a:0b:0c:0d:0e:0f
src = 00:00:00:00:00:00
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 100
type = 0x7106
###[ Punt ]###
next_header= 1
fwd_header_type= 0
reserved1 = 0
next_header_offset= 35
source = Ingress Trap
punt_code = ETHERNET_NO_TERMINATION_ON_L3_PORT(4)
lpts_flow_type= 0
source_sp = Ethernet8
destination_sp= 65535
source_lp = 1028
destination_lp= 4
reserved2 = 0
relay_id = 0
time_stamp= 0x62453587db76
receive_time= 0x3587d6b5
version = 1
reserved3 = 0
encap_qos_tag= 0
qos_group = 0
fwd_qos_tag= 0
expansion = 0
###[ Ethernet ]###
dst = 12:34:56:78:9a:bd
src = 00:ca:fe:de:ad:00
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 0
type = 0x7103
- Clear all captured packets.
cisco@sonic1# show platform npu packet-debug capture -c
Wrote 0 packets to pcap file. dump captured in /var/dump/capture_0.pcap
Capture buffer is cleared.