F5 Device Network Troubleshooting CLI Commands 1664594843
F5 Device Network Troubleshooting CLI Commands 1664594843
F5 Device Network Troubleshooting CLI Commands 1664594843
Network
Commands Explanation
#tmsh list sys management-ip Shows system management IP
address
Root# netstat –nr/-r Route table of F5 with default
gateway
# tmsh list net self-allow Port lockdown - the default
supported protocols and services
#nslookup www.stonegreyband.com check system is able to resolve
# dig www.stonegreyband.com names
(tmos.net)#show interface <interface_key> Display the current status of a
# tmsh show net interface specific interface
(tmos.net)#show interface Display the current status of all
interfaces.
config # tmsh list net interface media-active vendor SFP device serial number
serial
config # tmsh list net interface all-properties All interface details
(tmos)# list net interface media-capabilities Display the valid media types for a
specific interface. 100TX-
HD,1000T-FD
Config# ifconfig eth0 Interface eth0 details
Config# ping --help Ping command options
(tmos)# ping -I 192.168.1.245 192.168.1.246 PING 192.168.1.246
(192.168.1.246) from
192.168.1.245 : 56(84) bytes of
data
Config# telnet 10.2.0.11 80 Command to server for port 80
Get / http/1.1 service confirmation
Config# curl http://10.2.0.11 Html content from server
TCPDUMP
tcpdump -ni /<partition_name>/<vlan_name> when you run tcpdump on a
VLAN that resides in a non-
default partition, you must specify
the path to the VLAN object in
the tcpdump syntax
tmsh show /sys hardware |grep–ipva To determine whether your
platform contains a PVA chip
mergecap -a file1 file2 file3 file4 -w combined_file After all tcpdump processes are
completed, combine them into a
single file
tcpdump -ni<interface_number> tcpdump on a hardware switch
interface, it is rate-limited to 200
packets per second
tcpdump -ni 0.0 captures traffic from all VLANs in
all route domains when you invoke
it from the default route domain
tcpdump –i /common/internal –c 30 30 packets capture on internal
VLAN
tcpdump –i internal / 1.2 / eth0 by default it captures starting/firs
t96 bytes of a packet
tcpdump –i internal –s0 not restricting packet size for
capture, will capture full packet
tcpdump –i internal –nn -nn means no name resolution in
capture output
tcpdump –i 0.0 –w /var/tmp/New-TCPDMP.pcap capture all interface traffic and
write it to a file a given location
tcpdump –i 0.0 –s0 arp –nn will capture ARP protocol packets
only
tcpdump –i 0.0:p host 192.168.1.101 –nn :p peer side when SNAT is used
we want to see server side
communication of the same host
with NAT address as well
tcpdump –i 0.0:p host 192.168.1.101 –nn and not tcp exclude tcp port 443 packet
port 443 communication, and net
172.16.1.0/24 IP in the network
172.16.1.0/24