1
0
mirror of https://github.com/rtbrick/bngblaster.git synced 2024-05-06 15:54:57 +00:00
rtbrick-bngblaster/docsrc/sources/troubleshooting.rst

76 lines
2.1 KiB
ReStructuredText
Raw Normal View History

2022-03-30 23:47:00 +02:00
Troubleshooting
===============
Logging
-------
The BNG Blaster is able to log events to the standard output
or logging window of the interactive courses interface. Those
events could be also logged to files using the argument
``-L <file>``.
Per default only events classified as `info` or `error` are logged.
The following list shows all supported logging options.
* ``debug``: debug events
* ``error``: error events
* ``igmp``: igmp events with join and leave time
* ``io``: interface input/output events
* ``pppoe``: pppoe events
* ``info``: informational events (enabled per default)
* ``pcap``: PCAP related events
* ``timer``: timer events
* ``timer-detail``: detailed timer events
* ``ip``: log learned IP addresses
* ``loss``: log traffic loss with sequence number
* ``l2tp``: log L2TP (LNS) events
* ``dhcp``: log DHCP events
* ``isis``: log ISIS events
* ``bgp``: log BGP events
* ``tcp``: log TCP events
.. code-block:: none
$ sudo bngblaster -C test.json -L test.log -l ip -l isis -l bgp
PCAP
----
You can start the BNG Blaster with the argument ``-P <file>``
to capture all traffic send and received by the BNG Blaster
into a single PCAP file. This file includes all traffic from all
interfaces in use with proper meta header to filter by interface
names.
This helps to verify if traffic is received or how it has received.
Some network interfaces drop the most outer VLAN which can be easily
2022-04-06 23:02:38 +02:00
verified using the capture file.
The configuration option ``capture-include-streams`` allows to
include (default behavior) or exclude traffic streams from capture.
.. code-block:: json
{
"interfaces": {
"capture-include-streams": false
}
}
Wireshark Plugin
~~~~~~~~~~~~~~~~
Traffic streams generated with the BNG Blaster include the
:ref:`BNG Blaster Header <bbl_header>` which can analyzed
with the Wireshark BNG Blaster Header Dissector.
Download the LUA dissector script
`bbl_header.lua <https://github.com/rtbrick/bngblaster/tree/main/wireshark>`_
and start wireshark as shown below from the directory where the script is placed.
.. code-block:: none
$ wireshark -X lua_script:bbl_header.lua