Related Documentation
Configuring IGMP Snooping Trace Operations
Tracing operations record detailed messages about the operation of routing protocols, such as the various types of routing protocol packets sent and received, and routing policy actions. You can specify which trace operations are logged by including specific tracing flags. The following table describes the flags that you can include.
Flag | Description |
|---|---|
all | Trace all operations. |
client-notification | Trace notifications. |
general | Trace general flow. |
group | Trace group operations. |
host-notification | Trace host notifications. |
leave | Trace leave group messages (IGMPv2 only). |
normal | Trace normal events. |
packets | Trace all IGMP packets. |
policy | Trace policy processing. |
query | Trace IGMP membership query messages. |
report | Trace membership report messages. |
route | Trace routing information. |
state | Trace state transitions. |
task | Trace routing protocol task processing. |
timer | Trace timer processing. |
You can configure tracing operations for IGMP snooping globally or in a routing instance. The following example shows the global configuration.
To configure tracing operations for IGMP snooping:
- Configure the filename for the trace file.[edit bridge-domains domain1 protocols igmp-snooping traceoptions]user@host# set file igmp-snoop-trace
- (Optional) Configure the maximum number of trace files.[edit bridge-domains domain1 protocols igmp-snooping traceoptions]user@host# set file files 5
- (Optional) Configure the maximum size of each trace file.[edit bridge-domains domain1 protocols igmp-snooping traceoptions]user@host# set file size 1m
- (Optional) Enable unrestricted file access.[edit bridge-domains domain1 protocols igmp-snooping traceoptions]user@host# set file world-readable
- Configure tracing flags. Suppose you are troubleshooting
issues with a policy related to received packets on a particular logical
interface with an IP address of 192.168.0.1. The following example
shows how to flag all policy events for received packets associated
with the IP address.[edit bridge-domains domain1 protocols igmp-snooping traceoptions]user@host# set flag policy receive | match 192.168.0.1
- View the trace file.user@host> file list /var/loguser@host> file show /var/log/igmp-snoop-trace

