Use this diagnostic tool to intercept and log a time-stamped sequence of packets passing over the network or part of the network. You would typically run the “packet trace” to log traffic for a limited period of time, such as during a phone call.
The packet trace files are captured in PCAP format and can be viewed in a network protocol analyzer such as Wireshark.
The global tcpdump captures traffic on all network interfaces in trace files named global_<system name>.pcapX.
The global tcpdump rotates the trace file automatically every 200 MB and cycles through 7 files (pcap0, pcap1, …pcap6, pcap0, pcap1 ...) until it is manually stopped.
Use Filter Options to limit the capture to packets matching specific parameters.
When entering filter options, you can use letters, numbers, and spaces, as well as boolean operators such as OR and AND. You cannot use dashes, hyphens, underscores or special characters such as &, |, or !.
Examples:
The signalling capture only includes decrypted SIP and WebRTC signalling traffic in files named signalling_<system name>_<date and time>.pcap.
The signalling capture rotates the trace files every 200 MB. The 7 most recent files are kept with older one being automatically deleted until manually stopped.
To run a packet trace:
To stop a packet trace:
The packet trace files are captured in PCAP format and listed at the bottom of the screen. To download a specific global or signalling PCAP file, click on the file from the list.
To download all available PCAP files and associated MBG logs, click Fetch all.
To delete a specific
global or signalling PCAP file, click the icon beside
the file.
To delete all PCAP files, click Delete all.