Tranzeo Wireless Technologies Inc GNVPZ1NT3 Manuale Utente
Chapter 19: Diagnostics Tools
TR0153 Rev. E1
144
19.2 Traceroute
The “Traceroute” tab on the “Diagnostics” page allows the user to determine the individual
intermediary devices used to route traffic from the EnRoute500 to a remote device (see Figure
65).
Enter the IP address, e.g. 10.1.2.3, or hostname, e.g. www.yahoo.com, of the device you wish
to find the route path to. Check the “Resolve Names” box if traceroute should show device
names, when available, instead of just IP addresses. Click on the “Trace Route” button to
begin tracing the route. The intermediary nodes will be displayed on the bottom half of the
page. Click on “Stop Trace” to stop the tracing process.
intermediary devices used to route traffic from the EnRoute500 to a remote device (see Figure
65).
Enter the IP address, e.g. 10.1.2.3, or hostname, e.g. www.yahoo.com, of the device you wish
to find the route path to. Check the “Resolve Names” box if traceroute should show device
names, when available, instead of just IP addresses. Click on the “Trace Route” button to
begin tracing the route. The intermediary nodes will be displayed on the bottom half of the
page. Click on “Stop Trace” to stop the tracing process.
Figure 65. Determining the route from the EnRoute500 to a remote device using traceroute
19.3 Packet Capture
The “Packet Capture” tab on the “Diagnostics” page allows the user to capture traffic on the
EnRoute500’s network interfaces (see Figure 66). The captured data can either be displayed
in the web interface or saved to a file that can be downloaded and analyzed using 3
EnRoute500’s network interfaces (see Figure 66). The captured data can either be displayed
in the web interface or saved to a file that can be downloaded and analyzed using 3
rd
-party
tools, such as Wireshark (
http://www.wireshark.org/
). At most, 10 captured files can be saved
on the EnRoute500 at any given time.
The full array of options available for packet capture is described in Table 16. A number of
examples of common packet capture scenarios are also presented below.
The full array of options available for packet capture is described in Table 16. A number of
examples of common packet capture scenarios are also presented below.