TracertCommand asRoutingThe tracing and diagnosis utility has this command in DOS and Unix systems. It sends an Internet Control Message Protocol (ICMP) echo request and an echo response message, generate command line report output for each vro to track the path. This program is one of the necessary TCP/IP tools for network management. It is often used to test network connectivity and determine the fault location. Therefore, it is necessary for us to fully understand the running process of Tracert commands through precise parsing of Tracert route tracing data packets.
1. Network Environment
1.
Figure 1
2. capture tool Sniffer pro Filter setting steps
We know that the Tracert command is a specific application of the ICMP protocol implementation principle. to capture the data packets generated after the Tracert operation, you only need to set the filter to capture ICMP traffic, as shown in filter 2.
Figure 2
(1) Select "Capture" -- "Define Filter ".
(2) Select "Profiles" and select "New" in the Captuer Profiles window"
(3) Select ICMP as the file name. Because Sniffer pro already has a file that only filters ICMP, you can select "Copy Sample Profile", select IP/ICMP, and click OK.
(4) Of course, you also need to Define "address" in the Define Filter window to capture ICMP traffic between the local host and any host.
3. capture process
Run Sniffer Pro, click F10 to start the capture process, open a CMD window on the local machine, and send TRACERT-d 10.4.153.165 (when the tracert command with the-d option is used, TRACERT does not perform DNS lookup on each IP address. 3) after the command is run, press F9 to stop the capture and select "Decode" to display the captured packets, as shown in figure 4.
Figure 3
Figure 4
The packet capture module of the Tracert command of the router utility is described for you. I hope you can get some benefits through the above description. For more exciting content, see: explanation of router utility Tracert command packet Parsing
- Router POS access technology and Solutions
- Configuration method of router log information record
- For beginners, refer to the CISCO router tutorial.
- How to Set rootkit on a vro Intranet
- Describes vro settings to ensure security
- Soft route application skills: build cross-network access Bridges
- Configure a router to block the virus propagation path in the LAN