Tuesday 9 April 2019

packet capture on F5

netstat -nr | grep x.x.x.x can be useful too

tcpdump -i eth0 -s0 host 192.168.1.50 and host 192.168.1.100 -w /var/tmp/packet-capture.pcap

tcpdump -s0 -nni 0.0:nnnp -w /var/tmp/MYCAP.pcap host 192.168.10.100 and 192.168.20.200 -v

Copy your .pcap file off with win scp and open in wireshark

or read on CLI (on F5 is seems to take a long time to load  the cap)
tcpdump -r /var/tmp/packet-capture.pcap

No comments:

Post a Comment