show packet tracer
To display information about the pcap trace output, use the show packet tracer command.
show packet-tracer pcap trace [ packet-number number | summary | detailed | status ]
Syntax Description
packet-number |
(Optional) Displays trace output for a single packet in pcap. |
summary |
(Optional) Displays pcap summary. |
detailed |
(Optional) Displays trace output for all packets in pcap. |
status |
(Optional) Displays the current execution state of pcap trace. |
Command Default
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode |
Firewall Mode |
Security Context |
|||
---|---|---|---|---|---|
Routed |
Transparent |
Single |
Multiple |
||
Context |
System |
||||
User EXEC or Privileged EXEC |
|
|
|
|
|
Command History
Release |
Modification |
---|---|
9.17.1 |
The command was enhanced to include output of pcap trace. |
Usage Guidelines
The show packet-tracer command shows the packet tracer output. The pcap trace command allows you to display the trace buffer output of the most recently run packet-tracer on a PCAP file.
Examples
The following is sample output for the show packet-tracer pcap trace summary command:
ciscoasa# show packet-tracer pcap trace summary
1: 02:38:01.265123 6.1.1.100.51944 > 9.1.1.100.80: S 542888804:542888804(0) win 29200 <mss 1460,sackOK,timestamp 2526545680 0,nop,wscale 7>
2: 02:38:01.271317 9.1.1.100.80 > 6.1.1.100.51944: S 2281169942:2281169942(0) ack 542888805 win 28960 <mss 1380,sackOK,timestamp 2526520070 2526545680,nop,wscale 7>
3: 02:38:01.271638 6.1.1.100.51944 > 9.1.1.100.80: . ack 2281169943 win 229 <nop,nop,timestamp 2526545682 2526520070>
Total packets: 3
Packets replayed: 3
Result: Allow
Start time: Mar 28 04:51:54
Total time taken: 10247935ns
show packet-tracer pcap trace packet-number 1 detailed
1: 02:38:01.265123 0050.56a9.81e5 0050.56a9.60e1 0x0800 Length: 74
6.1.1.100.51944 > 9.1.1.100.80: S [tcp sum ok] 542888804:542888804(0) win 29200 <mss 1460,sackOK,timestamp 2526545680 0,nop,wscale 7> (DF) (ttl 64, id 54388)
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Time Spent: 12345 ns
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0x154523db3ce0, priority=1, domain=permit, deny=false
hits=92, user_data=0x0, cs_id=0x0, l3_type=0x8
src mac=0000.0000.0000, mask=0000.0000.0000
dst mac=0000.0000.0000, mask=0100.0000.0000
input_ifc=inside, output_ifc=any
…
…