debug capture rpcap-server
This command starts the device's embedded rpcap server for capturing packets on the network, so that Wireshark clients can start/stop packet capturing, collect the captured packets, and filter them for analysis.
This command also configures the first and second port of the rpcap server. The first port is an always-open listening port for initial connections (by default, 2002). The second port (by default, dynamically allocated) is sent to the client during the initial connection to open a new TCP connection for the captured packets
Syntax
# debug capture rpcap-server {start [<First Port>]}
# debug capture rpcap-server {start [<Second Port>]}
# debug capture rpcap-server stop
Command |
Description |
---|---|
start <First Port> |
Starts the rpcap server. Optionally, you can also configure the first port for the remote packet capture sessions with Wireshark. By default, the device uses port 2002. |
start <First Port Already Configured> <Second Port> |
(Optional) Configures the second port of the device's rpcap server. By default, the device dynamically allocates the port number. Note: Configure the first port before the second port. |
stop |
Stops packet capturing by the rpcap server. |
Command Mode
Privileged User
Example
This example starts the rpcap server and configures the first port to 2000 and the second port to 2004:
# debug capture rpcap-server start 2000 rpcap server started successfully on port 2000 # debug capture rpcap-server start 2000 2004
or
# debug capture rpcap-server start 2000 2004