VMware Arena

How To Capture Network Traffic/Packet on ESXi Hosts

Capturing Networking Traffic is very important task when you run into Connectivity or network issues. We all are good at capturing network traffic in Guest OS level. What if you do when troubleshooting connectivity issues on your Virtulization enviornment. This post will help you to capture Network traffic on ESXi host using pktcap-uw tool.

The pktcap-uw tool is an enhanced packet capture and analysis tool that can be used in place of the legacy tcpdump-uw tool. The pktcap-uw tool is included by default in ESXi 5.5. This article provides information on using the pktcap-uw tool for packet capture and analysis.The tcpdump-uw tool can only capture packets/frames at the vmkernel interface level and cannot capture frames at the uplinks, or vSwitch, or virtual port levels. The new pktcap-uw tool allows traffic to be captured at all points within the hypervisor for greater flexibility and improved troubleshooting. It provides more options to capture the packets. Lets take a look how to use pktcap-uw tool to capture the network traffic.

Get help and Syntax information:

pktcap-uw -h |more

To View the live Capture of VMKernel Interface Traffic

pktcap-uw –vmk vmk0

Save the Capture to a output file:

To capture the output to a file, use -o option:

pktcap-uw –vmk vmk0 -o /tmp/vmk0capture.pcap

To limit the data being captured

you can limit the data being captured using the ‘-c’ option, which allows you to specify the number of packets you wish to capture

pktcap-uw –vmk vmk0 -c 1

Capture Traffic of a specific physical network card(vmnic) on ESXi Host:

pktcap-uw –uplink vmnic0

Capture traffic from a virtual switchport on a dvSwitch:

pktcap-uw –switchport switchportnumber

Ex, pktcap-uw –switchport 33554433

To get the Switch port ID

esxtop -> Press n -> PORT-ID

To Capture packets for multiple points simultaneously

Capture Packets of  both Switch port and physical adapter at same time using the below command

pktcap-uw –switchport 33554433 -o /tmp/33554433.pcap & pktcap-uw –uplink vmnic0 -o /tmp/vmnic0.pcap &

Stop pktcap-uw tracing with the kill command:

kill $(lsof |grep pktcap-uw |awk ‘{print $1}’| sort -u)

 To check that all pktcap-uw traces are stopped:

lsof |grep pktcap-uw |awk ‘{print $1}’| sort -u

Captured packets can be viewed in Sniffer tools such as Wireshark.

I hope this post is informative for you. Thanks For Reading!!!. Be Social and share it in social media, if you feel worth sharing it.

 

Exit mobile version