- monitor traffic
- <brief | detail | extensive>
- <absolute-sequence>
- <count count>
- <interface interface-name>
- <layer2-headers>
- <matching matching>
- <no-domain-names>
- <no-promiscuous>
- <no-resolve>
- <no-timestamp>
- <print-ascii>
- <print-hex>
- <resolve-timeout>
- <size size>
Command introduced before JUNOS Release 7.4.
Display packet headers or packets received and sent from the Routing Engine.
![]() |
Note: Using the monitor traffic command can degrade router performance Delays from DNS resolution can be eliminated by using the no-resolve option. |
none — (Optional) Display packet headers transmitted through fxp0.
brief | detail | extensive — (Optional) Display the specified level of output.
absolute-sequence — (Optional) Display absolute TCP sequence numbers.
count count — (Optional) Specify the number of packet headers to display (0 through 1,000,000). The monitor traffic command quits automatically after displaying the number of packets specified.
interface interface-name — (Optional) Specify the interface on which the monitor traffic command displays packet data. If no interface is specified, the monitor traffic command displays packet data arriving on the lowest-numbered interface.
layer2-headers — (Optional) Display the link-level header on each line.
matching matching — (Optional) Display packet headers that match a regular expression. Use matching expressions to define the level of detail with which the monitor traffic command filters and displays packet data.
no-domain-names — (Optional) Suppress the display of the domain portion of hostnames. With the no-domain-names option enabled, the monitor traffic command displays only team for the hostname team.company.net.
no-promiscuous — (Optional) Do not put the interface into promiscuous mode.
no-resolve — (Optional) Suppress reverse lookup of the IP addresses..
no-timestamp — (Optional) Suppress timestamps on displayed packets.
print-ascii — (Optional) Display each packet in ASCII format.
print-hex — (Optional) Display each packet, except the link-level header, in hexadecimal format.
resolve-timeout timeout — (Optional) Amount of time the router waits for each reverse lookup before timing out. The timeout can be set between 1 to 4,294,967,295 seconds. The default is 4 seconds. To display each packet, use the print-ascii, print-hex, or extensive option.
size size — (Optional) Read, but not display up to the specified number of bytes for each packet. When set to brief output, the default packet size is 96 bytes and is adequate for capturing IP, ICMP, UDP, and TCP packet data. When set to detail and extensive output, the default packet size is 1514. The monitor traffic command truncates displayed packets if the matched data exceeds the configured size.
In the monitor traffic command, you can specify an expression to match by using the matching option and including the expression in quotation marks:
- monitor traffic matching "expression"
Replace expression with one or more of the match conditions listed in Table 26.
Table 26: Match Conditions for the monitor traffic Command
To combine expressions, use the logical operators listed in Table 27.
Table 27: Logical Operators for the monitor traffic Command
You can use relational operators to compare arithmetic expressions composed of integer constants, binary operators, a length operator, and special packet data accessors. The arithmetic expression matching condition uses the following syntax:
- monitor traffic matching "ether[0] & 1 != 0""arithmetic_expression relational_operator arithmetic_expression"
The packet data accessor uses the following syntax:
-
protocol [byte-offset <size>]
The optional size field represents the number of bytes examined in the packet header. The available values are 1, 2, or 4 bytes.The following sample command captures all multicast traffic:
- user@host> monitor traffic matching "ether[0]
& 1 != 0"
To specify match conditions that have a numeric value, use the arithmetic and relational operators listed in Table 28.
![]() |
Note: Because the Packet Forwarding Engine removes Layer 2 header information before sending packets to the Routing Engine, the monitor traffic command cannot apply match conditions to inbound traffic. |
Table 28: Arithmetic and Relational Operators for the monitor traffic Command
trace and maintenance
When you enter this command, you are provided feedback on the status of your request.
user@host> monitor traffic count 2
listening on fxp0 04:35:49.814125 In my-server.home.net.1295 > my-server.work.net.telnet: . ack 4122529478 win 16798 (DF) 04:35:49.814185 Out my-server.work.net.telnet > my-server.home.net.1295: P 1:38(37) ack 0 win 17680 (DF) [tos 0x10]
user@host> monitor traffic detail count 2
listening on fxp0 04:38:16.265864 In my-server.home.net.1295 > my-server.work.net.telnet: . ack 4122529971 win 17678 (DF) (ttl 121, id 6812) 04:38:16.265926 Out my-server.work.net.telnet.telnet > my-server.home.net.1295: P 1:38(37) ack 0 win 17680 (DF) [tos 0x10] (ttl 6)
user@host> monitor traffic extensive no-domain-names
no-resolve no-timestamp count 20 matching "tcp" absolute-sequence
listening on fxp0 In 207.17.136.193.179 > 192.168.4.227.1024: . 4042780859:4042780859(0) ack 1845421797 win 16384 <nop,nop,timestamp 4935628 965951> [tos 0xc0] (ttl ) In 207.17.136.193.179 > 192.168.4.227.1024: P 4042780859:4042780912(53) ack 1845421797 win 16384 <nop,nop,timestamp 4935628 965951>: BGP [|BGP UPDAT) In 192.168.4.227.1024 > 207.17.136.193.179: P 1845421797:1845421852(55) ack 4042780912 win 16384 <nop,nop,timestamp 965951 4935628>: BGP [|BGP UPDAT) ...
user@host> monitor traffic extensive no-domain-names
no-resolve no-timestamp count 20 matching "tcp"
listening on fxp0 In 172.24.248.221.1680 > 192.168.4.210.23: . 396159737:396159737(0) ack 1664980689 win 17574 (DF) (ttl 121, id 50003) Out 192.168.4.210.23 > 172.24.248.221.1680: P 1:40(39) ack 0 win 17680 (DF) [tos 0x10] (ttl 64, id 5394) In 207.17.136.193.179 > 192.168.4.227.1024: P 4042775817:4042775874(57) ack 1845416593 win 16384 <nop,nop,timestamp 4935379 965690>: BGP [|BGP UPDAT) ...
user@host> monitor traffic extensive count 5 no-domain-names no-resolve
listening on fxp013:18:17.406933 In 192.168.4.206.2723610880 > 172.17.28.8.2049: 40 null (ttl 64, id 38367)13:18:17.407577 In 172.17.28.8.2049 > 192.168.4.206.2723610880: reply ok 28 null (ttl 61, id 35495)13:18:17.541140 In 0:e0:1e:42:9c:e0 0:e0:1e:42:9c:e0 9000 60: 0000 0100 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 000013:18:17.591513 In 172.24.248.156.4139 > 192.168.4.210.23: . 3556964918:3556964918(0) ack 295526518 win 17601 (DF) (ttl 121, id 14)13:18:17.591568 Out 192.168.4.210.23 > 172.24.248.156.4139: P 1:40(39) ack 0 win 17680 (DF) [tos 0x10] (ttl 64, id 52376)
user@host> monitor traffic interface fxp0
listening on fxp0.0 18:17:28.800650 In server.home.net.723 > host1-0.lab.home.net.log 18:17:28.800733 Out host2-0.lab.home.net.login > server.home.net.7 18:17:28.817813 In host30.lab.home.net.syslog > host40.home0 18:17:28.817846 In host30.lab.home.net.syslog > host40.home0 ...