Troubleshooting Flow-Tap

This section includes the following topics:

General Troubleshooting Steps

If your flow-tap application does not seem to be operating as expected, use the following steps to troubleshoot.

  1. Check the configuration:

    • Ensure the configuration matches the configuration in the “Flow-Tap Configuration on Juniper Networks Router” section within Configuring Flow-Tap Services for Lawful Intercept of this document; all components must be present.
    • Ensure that Layer 3 services have been enabled for the services PIC (MS-400 PIC).
    • Ensure that the sp-x/y/z interface is present.
    • Ensure that policer is present. Verify this by using the show policer CLI command.
  2. Log in to the services PIC and issue the show flow-tap services summary statement. Verify that flow-tap actions have occurred by observing the packet count for packets processed to date.
  3. Review information for the analyzer device and ensure that packets have been received by that device.
  4. Issue the monitor inter sp-0/2/0.100 command. From the output, determine if packets have been received and processed by the services PIC interface.
  5. Issue the show log dfcd command to see details from the parameter file that is being accepted by the router. If any of the information reported is inaccurate, this indicates a possible source of the problem. Example output follows:

    show log dfcd
    Aug 25 11:16:49 dfc_proto_pkt_handler: packet handling begins
    Aug 25 11:16:49 Msg:
    ADD DTCP/0.6
    Csource-ID: verint
    Cdest-ID: cd1
    Source-Address: *
    Dest-Address: *
    Source-Port: *
    Dest-Port: *        
    Protocol: 17        
    Flags: STATIC       
    X-JTap-Cdest-Dest-Address: 192.168.3.2
    X-JTap-Cdest-Dest-Port: 1814
    X-JTap-Cdest-Source-Address: 10.209.74.183
    X-JTap-Cdest-Source-Port: 65534
    X-JTap-Cdest-TTL: 255
    Seq: 1              
    Authentication-Info: 3db78d10deb83f8934f021e40dc2b49f45bc6dc7
    

Troubleshooting No Packets Received by the Analyzer Software

Use the following troubleshooting steps if you determine that no packets are being received by the analyzer software:

  1. Ensure that the target flow is occurring in the Juniper Networks router by installing a firewall filter counter on the interface toward the intended destination. If the counter increments, this indicates that packets are being sent, and the problem is with the flow-tap.
  2. Next, log in to each of the Flexible PIC Concentrators (FPCs) and look for the installation of the firewall filters. You will see information similar to this example:

    user@FFPC1# show filter
    Program Filters:
    ---------------
    Index     Dir     Cnt    Text     Bss  Name
    -----  ------  ------  ------  ------  --------
        3      96       0      20       0  __default_bpdu_filter__
    17000      48       0       4      20  __default_arp_policer__
    57023     240     576      40      96  __flowtap_inet__
    65280      48       0       4       0  __auto_policer_template__
    65281      96       0      16       0  __auto_policer_template_1__
    

    user@FFPC1# show filter index 57023 counter
    Filter Counters/Policers:
    Index               Packets           Bytes  Name
    -----  --------------------  --------------  --------
    57023                0                  0    Flowtap-Internal_IFL-ID-77
    57023                0                  0    Flowtap-Internal_IFL-ID-76
    57023                0                  0    Flowtap-Internal_IFL-ID-75
    57023                0                  0    Csource-verint___Cdest-cd2___ID-2
    
  3. If you don’t see information for the filters, try restarting the dynamic-flow-capture process, then reapply the parameter file from the mediation device. Configure the syslog logging level to any any and observe the messages file for the login activity. The following is a sample output:
    Oct  2 13:48:44  FFPC1 sshd[27410]: Accepted password for verint from 172.24.18.168 port 2902 ssh2
    Oct  2 13:48:45  FFPC1 ssh-relay[27414]: user 'verint' requesting 'flow-tap-dtcp' service
    Oct  2 13:48:45  FFPC1 ssh-relay[27414]: connected as user 'verint' to 'flow-tap-dtcp' server
    Oct  2 13:48:45  FFPC1 dfcd[27182]: New 'flow-tap-dtcp' relay connection from user: verint host: 172.24.18.168 auth: 1
    

Related Topics