5 debug spanning-tree bpdu, 6 debug igmpsnooping packet transmit, At8402 utility commands – Kontron AT8402 CLI User Manual
Page 185

AT8402
Utility Commands
Page 4 - 45
AT8402 CLI Reference Manual
4.10.4.1
no debug spanning-tree bpdu receive
This command disables tracing of received spanning tree BPDUs.
Format
no debug spanning-tree bpdu receive
Mode
Privileged EXEC
4.10.5
debug spanning-tree bpdu
This command enables tracing of spanning tree bpdus received and transmitted by the
switch.
Default
disabled
Format
debug spanning-tree bpdu
Mode
Privileged EXEC
4.10.5.1
no debug spanning-tree bpdu
This command disables tracing of spanning tree BPDUs.
Format
no debug spanning-tree bpdu
Mode
Privileged EXEC
4.10.6
debug igmpsnooping packet transmit
This command enables tracing of IGMP Snooping packets transmitted by the switch.
Snooping should be enabled on the device and the interface in order to monitor packets
for a particular interface.
Default
disabled
Format
debug igmpsnooping packet transmit
Mode
Privileged EXEC
A sample output of the trace message is shown below.
<15> JAN 01 02:45:06 192.168.17.29-1 IGMPSNOOP[185429992]:
igmp_snooping_debug.c(116) 908 % Pkt TX - Intf: 1/0/20(20), Vlan_Id:1
Src_Mac: 00:03:0e:00:00:00 Dest_Mac: 01:00:5e:00:00:01 Src_IP: 9.1.1.1
Dest_IP: 225.0.0.1 Type: V2_Membership_Report Group: 225.0.0.1
The following parameters are displayed in the trace message:
TX
A packet transmitted by the device.
Intf
The interface that the packet went out on. Format used is slot/port
(internal interface number).
Src_Mac
Source MAC address of the packet.
Dest_Mac
Destination multicast MAC address of the packet.
Src_IP
The source IP address in the IP header in the packet.
Dest_IP
The destination multicast IP address in the packet.
Type
The type of IGMP packet. Type can be one of the following:
Membership Query – IGMP Membership Query
V1_Membership_Report – IGMP Version 1 Membership Report