The packets to be recorded are received on the en0 interface, from remote host airmail. Although Wireshark can read AIX iptrace files, the documentation on AIXs iptrace packet-trace command is sparse. To record packets coming in and going out from a specific remote host, enter the command in the following format: The trace information is placed into the /tmp/ace file.ħ. The packets to be recorded are received on the en0 interface, from remote host airmail, over the telnet port. Iptrace -i en0 -p telnet -s airmail /tmp/ace To record packets received on an interface from a specific remote host, enter the command in the following format: The trace information is placed into the /tmp/nettrace file.Ħ. All packet flow between the local host and all other hosts on any interface is recorded. The recorded packets are received on and sent from the local host. To record packets coming in and going out to any host on every interface, enter the command in the following format: To stop the iptrace daemon with SRC enter the following:ĥ. To start the iptrace daemon with the System Resource Controller (SRC), enter:
The ipreport command can be used to transform the trace file generated by iptrace to human readable format:Ĥ. This trace will capture both directions of the port 80 traffic on interface en1 between the clientip and serverip and sends this to the raw file of trace.out.ģ. # iptrace -a -i en1 -s clientip -b -d serverip -p 80 trace.out Run iptrace on AIX interface en1 to capture port 80 traffic to file trace.out from a single client IP to a server IP: i Only trace for network traffic on a specific interface.ġ. b Capture bidirectional network traffic (send and receive packets). d Limit trace to destination IP, if known. s Limit trace to source/client IP address, if known. You can use any combination of these options, but you do not need to use them all: The iptrace command can be very useful to find out what network traffic flows to and from an AIX system. After the tracing feature is enabled, the AIX trace daemon is run to record the selected system. However, the most appropriate tool varies, depending on operating system. Enables filtered system tracing for the recorded packets. Creating, formatting, and reading packet traces is sometimes required to resolve problems.