Solved

juniper srx240 packet capture jweb vs cli

Posted on 2015-01-15
4
309 Views
Last Modified: 2015-01-19
Anybody has experience with packet capture on the Juniper srx240? I see that there is two ways to do it, cli vs j-web. It looks like jweb is easier. Any performance issue while running packet capture on the srx? Thanks
0
Comment
Question by:leblanc
  • 2
  • 2
4 Comments
 
LVL 32

Accepted Solution

by:
dpk_wal earned 500 total points
ID: 40553193
http://kb.juniper.net/InfoCenter/index?page=content&id=KB11709

This is from KB above:
with the firewall filter, the amount of traffic to be capture can be restricted, and it is less CPU intensive, as compared without filters.

Depending what you define the filter it would be performance intensive.

Thank you.
0
 
LVL 1

Author Comment

by:leblanc
ID: 40553493
All I want is to see what traffic is going through 1 interface on my srx. Do I need to do the cli way with firewall filter?
0
 
LVL 1

Author Comment

by:leblanc
ID: 40556889
I use the packet capture feature with jweb. I downloaded the pcap file and I don't see the source and destination IP address. Any ideas? Thanks
0
 
LVL 32

Assisted Solution

by:dpk_wal
dpk_wal earned 500 total points
ID: 40557128
Better to use pcap feature with cli as you get to configure filters and have more granual control.

The steps are listed in the JTAC KB link posted above.

Thank you.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

822 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question