My notes
Toggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

ISR4k: IOS-XE Embedded Packet Capture

A few years ago I posted an http://www.brngnd.com/2013/03/03/ios-embedded-packet-capture-an-useful-troubleshooting-tool/ about the embedded packet capture tool (EPC) in Cisco devices running IOS. This quick article is an update of the previous one with the IOS-XE flavor.

I run this test on an ISR4351 with IOS XE 3.16.01a.S, IOSD 15.5(3)S1a.

First, you need to define the interface where the capture will occur and the traffic to be captured

ISR4351#monitor capture CAP interface tun 10 both
ISR4351#monitor capture CAP match ?
  any   all packets
  ipv4  IPv4 packets only
  ipv6  IPv6 packets only
  mac   MAC filter configuration
ISR4351#monitor capture CAP match ipv4 protocol tcp host 10.7.218.11 any

Then start the capture:

ISR4351#monitor capture CAP start

You can prior to that, alter the buffer size for the capture. It can be done with the “monitor capture CAP buffer size XXXX” command where the XXX is in megabytes.

Once done, capture need to be stopped before export

ISR4351#monitor capture CAP stop

Then the buffered data can be exported to local or remote location as a PCAP file.

ISR4351#monitor capture CAP export ?
  bootflash:  Location of the file
  flash:      Location of the file
  ftp:        Location of the file
  harddisk:   Location of the file
  http:       Location of the file
  https:      Location of the file
  pram:       Location of the file
  rcp:        Location of the file
  scp:        Location of the file
  tftp:       Location of the file

ISR4351#monitor capture CAP export flash:CAP1.pcap
Exported Successfully

Then delete the capture point:

ISR4351#no monitor capture CAP

Hope it helps,

Link to Cisco documentation: http://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-embedded-packet-capture/116045-productconfig-epc-00.html