Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation

Understanding Data Path Debugging for SRX Series Devices

With the data path debugging feature, you can trace and debug (capture packets) at different data points along the processing path. The events available in the packet-processing path are: NP ingress, load-balancing thread (LBT), jexec, packet-ordering thread (POT), and NP egress. You can also enable flow module trace if the security flow trace flag for a certain module is set.

At each event, you can specify any of the four actions (count, packet dump, packet summary, and trace). Data path debugging provides filters to define what packets to capture, and only the matched packets are traced. The packet filter can filter out packets based on logical interface, protocol, source IP address prefix, source port, destination IP address prefix, and destination port.

To enable end-to-end debugging, you must perform the following steps:

  1. Define the capture file and specify the maximum capture size.
  2. Define the packet filter to trace only a certain type of traffic based on the requirement.
  3. Define the action profile specifying the location on the processing path from where to capture the packets (for example, LBT or NP ingress).
  4. Enable the data path debugging.
  5. Capture traffic.
  6. Disable data path debugging.
  7. View or analyze the report.

Note:

The packet-filtering behavior for the port and interface options is as follows:

  • The packet filter traces both IPv4 and IPv6 traffic if only port is specified.
  • The packet filter traces IPv4, IPV6, and non-IP traffic if only interface is specified.

Modified: 2015-12-28