Packet capture applications such as tcpdump can be useful to:
- Identify if any PTP messages are actually being received on the PTP interface.
- Identify if messages reported missing by
sfptpdare actually being received at the PTP interface. - To inspect individual fields in PTP messages.
The following example shows how to use tcpdump to capture only
PTP traffic.
# tcpdump -i <interface> dst port 319 or dst port 320 [-w <filename.pcap>]
where the <interface> is the network adapter interface being
used by sfptpd.
Keep pcap files as small as possible, but large enough to capture an instance of the
issue sfptpd is experiencing.
Note:
tcpdump captures packets sent/received on an interface, but these packets
might be not be delivered to the sfptpd daemon when
they are prevented by other factors such as iptables rules, firewalls, or reverse-path
filters.