Transcript for this video
For even more detailed information on the testing process, you can use our packet watch/debugging tool.
This tool outputs packet content to the console window for analysis and interpretation.
To enable packet watch, click on View > Packet Trace.
This will bring up the packet debugging preferences window.
From here you can choose the amount of packet information that will be output to the console window.
The Sent Packet options are for packets sent to the agent by SilverCreek. The received packets options are for the packets SilverCreek receives from the agent.
The most detail is in the packet debug option, which is an actual hex dump of the PDU.
To decipher this, you will need to understand the format of SNMP packets and be willing to look up the codes.
This can be useful for tracking down different things in your agent and will show you the exact sequence of information that was sent by SilverCreek and your agent.
The second most detailed format is packet watch, which is a pseudo-ASN.1 representation of the PDUs.
This is very useful, as it contains packet information and error status, and can be used for verifying values sent and received by and from your agent.
The least-detailed view is packet summary, a very high-level format which is essentially just the variable bindings sent and received.
To demonstrate this packet watch feature, I will run a test displaying the packet watch and debug tools.
Notice the packet information scrolling through the console window.
The amount of information will depend on which of the packet options just mentioned were selected in the preferences window.
In summary, it is a combination of all these tools that makes them more powerful.
Want to Know More?
|Find more videos||How to buy||Contact an Expert|