mirror of
https://github.com/rtbrick/bngblaster.git
synced 2024-05-06 15:54:57 +00:00
74 lines
2.1 KiB
ReStructuredText
74 lines
2.1 KiB
ReStructuredText
Troubleshooting
|
|
===============
|
|
|
|
Logging
|
|
-------
|
|
|
|
The BNG Blaster can log events to the standard output
|
|
or the logging window of the interactive courses interface.
|
|
Those events could be also logged to files using the argument
|
|
``-L <file>``.
|
|
|
|
Per default, only events classified as `info` or `error` are logged.
|
|
The following list shows all supported logging options.
|
|
|
|
* ``debug``: debug events
|
|
* ``error``: error events
|
|
* ``igmp``: igmp events with join and leave time
|
|
* ``io``: interface input/output events
|
|
* ``pppoe``: pppoe events
|
|
* ``info``: informational events (enabled per default)
|
|
* ``pcap``: PCAP related events
|
|
* ``ip``: log learned IP addresses
|
|
* ``loss``: log traffic loss with sequence number
|
|
* ``l2tp``: log L2TP (LNS) events
|
|
* ``dhcp``: log DHCP events
|
|
* ``isis``: log ISIS events
|
|
* ``bgp``: log BGP events
|
|
* ``tcp``: log TCP events
|
|
|
|
.. code-block:: none
|
|
|
|
$ sudo bngblaster -C test.json -L test.log -l ip -l isis -l bgp
|
|
|
|
|
|
PCAP
|
|
----
|
|
|
|
You can start the BNG Blaster with the argument ``-P <file>``
|
|
to capture all traffic sent and received by the BNG Blaster
|
|
into a single PCAP file. This file includes all traffic from all
|
|
interfaces in use with proper meta header to filter by interface
|
|
names.
|
|
|
|
This helps to verify if traffic is received or how it has been received.
|
|
Some network interfaces drop the most outer VLAN which can be easily
|
|
verified using the capture file.
|
|
|
|
The configuration option ``capture-include-streams`` allows to
|
|
include (default behavior) or exclude traffic streams from capture.
|
|
|
|
.. code-block:: json
|
|
|
|
{
|
|
"interfaces": {
|
|
"capture-include-streams": false
|
|
}
|
|
}
|
|
|
|
Wireshark Plugin
|
|
~~~~~~~~~~~~~~~~
|
|
|
|
Traffic streams generated with the BNG Blaster include the
|
|
:ref:`BNG Blaster Header <bbl_header>` which can be analyzed
|
|
with the Wireshark BNG Blaster Header Dissector.
|
|
|
|
Download the LUA dissector script
|
|
`bbl_header.lua <https://github.com/rtbrick/bngblaster/tree/main/wireshark>`_
|
|
and start Wireshark as shown below from the directory where the script is placed.
|
|
|
|
.. code-block:: none
|
|
|
|
$ wireshark -X lua_script:bbl_header.lua
|
|
|