Interpreting the packet capture of the Tracert command of the router Utility

Source: Internet
Author: User

TracertCommand asRoutingThe tracing and diagnosis utility has this command in DOS and Unix systems. It sends an Internet Control Message Protocol (ICMP) echo request and an echo response message, generate command line report output for each vro to track the path. This program is one of the necessary TCP/IP tools for network management. It is often used to test network connectivity and determine the fault location. Therefore, it is necessary for us to fully understand the running process of Tracert commands through precise parsing of Tracert route tracing data packets.

1. Network Environment

1.

Figure 1

2. capture tool Sniffer pro Filter setting steps

We know that the Tracert command is a specific application of the ICMP protocol implementation principle. to capture the data packets generated after the Tracert operation, you only need to set the filter to capture ICMP traffic, as shown in filter 2.

Figure 2

(1) Select "Capture" -- "Define Filter ".

(2) Select "Profiles" and select "New" in the Captuer Profiles window"

(3) Select ICMP as the file name. Because Sniffer pro already has a file that only filters ICMP, you can select "Copy Sample Profile", select IP/ICMP, and click OK.

(4) Of course, you also need to Define "address" in the Define Filter window to capture ICMP traffic between the local host and any host.

3. capture process

Run Sniffer Pro, click F10 to start the capture process, open a CMD window on the local machine, and send TRACERT-d 10.4.153.165 (when the tracert command with the-d option is used, TRACERT does not perform DNS lookup on each IP address. 3) after the command is run, press F9 to stop the capture and select "Decode" to display the captured packets, as shown in figure 4.

Figure 3

Figure 4

The packet capture module of the Tracert command of the router utility is described for you. I hope you can get some benefits through the above description. For more exciting content, see: explanation of router utility Tracert command packet Parsing

  1. Router POS access technology and Solutions
  2. Configuration method of router log information record
  3. For beginners, refer to the CISCO router tutorial.
  4. How to Set rootkit on a vro Intranet
  5. Describes vro settings to ensure security
  6. Soft route application skills: build cross-network access Bridges
  7. Configure a router to block the virus propagation path in the LAN

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.