Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Please try below tcpdump command capture resume process packets, you have to run this
command before issue resume directive,
# tcpdump -s 0 -vvv -XX -w /tmp/output.pcap host <EMS IP_address>
Collect tcpdump at q3user node when problematic BSC(BKSTK02 BSC) transfer file to NetAct. (tcp
102 portunu dinliyor)
# tcpdump tcp port 102 -s 0 -w <target_file.pcap> -- for utstcp (tp0)
Collect tcpdump:
tcpdump 'host 10.236.221.68' -s 0 -w /home/omc/xxxxx.pcap
------------------
aveanmsb:~ # tcpdump -v port 6803
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
16:54:10.188563 IP (tos 0x0, ttl 64, id 48911, offset 0, flags [DF], proto TCP (6), length 67)
aveanmsb.site.pfm-export > 10.19.42.13.59640: P, cksum 0x6d9d (incorrect (-> 0x6fa7),
380776769:380776796(27) ack 2074641058 win 115
16:54:10.261569 IP (tos 0x0, ttl 62, id 21570, offset 0, flags [DF], proto TCP (6), length 40)
10.19.42.13.59640 > aveanmsb.site.pfm-export: ., cksum 0x7887 (correct), ack 27 win 32768
16:55:01.002523 IP (tos 0x0, ttl 64, id 48912, offset 0, flags [DF], proto TCP (6), length 334)
aveanmsb.site.pfm-export > 10.19.42.13.59640: P 27:321(294) ack 1 win 115
16:55:01.072613 IP (tos 0x0, ttl 62, id 21571, offset 0, flags [DF], proto TCP (6), length 40)
10.19.42.13.59640 > aveanmsb.site.pfm-export: ., cksum 0x7761 (correct), ack 321 win 32768
16:55:01.072652 IP (tos 0x0, ttl 64, id 48913, offset 0, flags [DF], proto TCP (6), length 1216)
aveanmsb.site.pfm-export > 10.19.42.13.59640: P 321:1497(1176) ack 1 win 115
Can you please trigger the RNC-316 integration data upload again and capture the below logs from
OMS.
1. Wires shark traces using command “/usr/sbin/tcpdump -i bond0 -s 65535 -w
goms_tcp.pcap”
2. Trigger the integration data upload from OSS.
------------------------------------------------------------------------------------
mkdir /packages/NA05064957/
tcpdump -i bond0 -n -s0 -w /packages/NA05064957/adu1.pcap host 10.228.5.12 or udp port 162 or udp port 161
or icmp
run alarm DB Upload for CMS network element. After it finishes - please close above tcpdump instance.
B. Execute the snmpTrial.sh with increased time out period and debug enabled , the command
is as below.
snmpbulkget -v2c -c public -t90 -d -Cn0 -Cr${i} $SOM
C. Once the snmp is executed, kill the tcp collection process as below.
ps -ef | grep tcp
This will list the processes with tcp. Kill the process associsated with "tcpdump -s 8096 -v
-w" . And provide me with the collected tcpdump file.