This command enables tracing of IGMP Snooping packets received by the switch. Snooping should be enabled on the device and the interface in order to monitor packets for a particular interface.
A sample output of the trace message is shown below.
<15> JAN 01 02:45:06 192.168.17.29-1 IGMPSNOOP[185429992]: igmp_snooping_debug.c(116) 908 % Pkt RX - Intf: 1/0/20(20), Vlan_Id:1 Src_Mac: 00:03:0e:00:00:10 Dest_Mac: 01:00:5e:00:00:05 Src_IP: 11.1.1.1 Dest_IP: 225.0.0.5 Type: Membership_Query Group: 225.0.0.5
| Default | Disabled |
| Format | debug igmpsnooping packet receive |
| Mode | Privileged EXEC |
The following parameters are displayed in the trace message:
| Parameter | Definition |
|---|---|
| RX | A packet received by the device. |
| Intf | The interface that the packet went out on. Format used is unit/slot/port (internal interface number). Unit is always shown as 1 for interfaces on a non-stacking device. |
| Src_Mac | Source MAC address of the packet. |
| Dest_Mac | Destination multicast MAC address of the packet. |
| Src_IP | The source IP address in the ip header in the packet. |
| Dest_IP | The destination multicast ip address in the packet. |
| Type | The type of IGMP packet. Type can be one of the following:
|
| Group | Multicast group address in the IGMP header. |