Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Configuring IGMP Snooping Trace Operations

    Tracing operations record detailed messages about the operation of routing protocols, such as the various types of routing protocol packets sent and received, and routing policy actions. You can specify which trace operations are logged by including specific tracing flags. The following table describes the flags that you can include.

    Flag

    Description

    all

    Trace all operations.

    client-notification

    Trace notifications.

    general

    Trace general flow.

    group

    Trace group operations.

    host-notification

    Trace host notifications.

    leave

    Trace leave group messages (IGMPv2 only).

    normal

    Trace normal events.

    packets

    Trace all IGMP packets.

    policy

    Trace policy processing.

    query

    Trace IGMP membership query messages.

    report

    Trace membership report messages.

    route

    Trace routing information.

    state

    Trace state transitions.

    task

    Trace routing protocol task processing.

    timer

    Trace timer processing.

    You can configure tracing operations for IGMP snooping globally or in a routing instance. The following example shows the global configuration.

    To configure tracing operations for IGMP snooping:

    1. Configure the filename for the trace file.
      [edit bridge-domains domain1 protocols igmp-snooping traceoptions]user@host# set file igmp-snoop-trace
    2. (Optional) Configure the maximum number of trace files.
      [edit bridge-domains domain1 protocols igmp-snooping traceoptions]user@host# set file files 5
    3. (Optional) Configure the maximum size of each trace file.
      [edit bridge-domains domain1 protocols igmp-snooping traceoptions]user@host# set file size 1m
    4. (Optional) Enable unrestricted file access.
      [edit bridge-domains domain1 protocols igmp-snooping traceoptions]user@host# set file world-readable
    5. Configure tracing flags. Suppose you are troubleshooting issues with a policy related to received packets on a particular logical interface with an IP address of 192.168.0.1. The following example shows how to flag all policy events for received packets associated with the IP address.
      [edit bridge-domains domain1 protocols igmp-snooping traceoptions]user@host# set flag policy receive | match 192.168.0.1
    6. View the trace file.
      user@host> file list /var/loguser@host> file show /var/log/igmp-snoop-trace

    Modified: 2015-04-12