Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
howto:pcap [2010/10/22 18:49]
mcb30
howto:pcap [2010/10/22 19:45]
mcb30
Line 14: Line 14:
  
 {{ :​screenshots:​wireshark_capture.png?​633x624 |Wireshark capturing packets}} {{ :​screenshots:​wireshark_capture.png?​633x624 |Wireshark capturing packets}}
 +
 +Choose ''​Capture''​ -> ''​Stop''​ to stop capturing, and ''​File''​ -> ''​Save As''​ to save your capture file.
 +
 +===== Where to capture =====
 +
 +You should set up a machine to intercept all network traffic to and from iPXE:
 +
 +{{ :​diagrams:​interceptor.png?​534x156 |Packet interception}}
 +
 +The interceptor machine must be configured with two network interfaces. ​ One interface should be connected only to the iPXE machine. ​ The other interface should be connected to your network. ​ The two network interfaces must be bridged (see below) to enable iPXE to communicate via the interceptor machine.
 +
 +==== Interceptor machine running Linux ====
 +
 +Under Linux, you can bridge the two network interfaces using the ''​brctl''​ command-line utility. ​ (You may need to install a package such as ''​bridge-utils''​ in order to use this command.)
 +
 +Shut down the two interfaces that you wish to bridge together. ​ For this example, we shall bridge interfaces ''​eth0''​ and ''​eth1'':​
 +
 +    ifdown eth0
 +    ifdown eth1
 +
 +Create a new bridge interface. ​ For this example, we shall create the bridge interface ''​br0'':​
 +
 +    brctl addbr br0
 +    brctl setfd br0 0
 +
 +Add the two interfaces to your bridge:
 +
 +    ifconfig eth0 up
 +    brctl addif br0 eth0
 +    ifconfig eth1 up
 +    brctl addif br0 eth1
 +
 +You can check your bridge configuration using ''​brctl show''​. ​ You should see something like:
 +
 +    bridge name   ​bridge id           STP enabled ​  ​interfaces
 +    br0           ​8000.00270e0d5678 ​  ​no ​           eth0
 +                                                    eth1
 +
 +
 +
 +If you are unable to intercept network traffic, then you should run Wireshark on the machine that handles the functionality that you are trying to troubleshoot. ​ For example, if the problem is that iPXE is failing to acquire an address from your DHCP server, then you should install and run Wireshark on your DHCP server. ​ If the problem is that iPXE is successfully acquiring an address from DHCP but is then failing to boot from your iSCSI target, then you should install and run Wireshark on your iSCSI target. ​ It may not always be practical to install Wireshark on the relevant machine.
 +
 +===== Using your capture file =====
 +
 +You can [[:​contact|send]] your capture file to anyone who is helping to diagnose your problem.
 +
 +Please be aware that packet capture files can be quite large. ​ You should therefore generally avoid e-mailing your file to a whole mailing list.  You could make your capture file available on your own web site and e-mail the relevant URL to the mailing list, or you could e-mail the capture file only to people who individually ask to receive it.
 +
 +Please also be aware that a packet capture may contain sensitive information such as details of your network infrastructure,​ or (in rare cases) clearly visible passwords.
  
howto/pcap.txt ยท Last modified: 2010/10/22 20:11 by mcb30
Recent changes RSS feed CC Attribution-Share Alike 4.0 International Driven by DokuWiki
All uses of this content must include an attribution to the iPXE project and the URL https://ipxe.org
References to "iPXE" may not be altered or removed.