Professional Documents
Culture Documents
Contents
Contents .......................................................................................................................................... 1
Overview.......................................................................................................................................... 1
PCAP feature .............................................................................................................................. 2
Configuration and capture ............................................................................................................... 4
Enabling the capture globally ...................................................................................................... 5
Adding a new capture object....................................................................................................... 6
Configuring capture object .......................................................................................................... 7
Setting the Direction................................................................................................................ 7
Setting the Filter...................................................................................................................... 7
Setting the Length................................................................................................................... 8
Setting the Persistence (tunnels only) .................................................................................... 8
Setting the Promiscuous Mode (FastEthernet only) ............................................................... 9
Setting the Remote IP (tunnels only) ...................................................................................... 9
Setting the Trigger .................................................................................................................. 9
Setting the Type (tunnels only) ............................................................................................. 10
Setting the User ID (tunnels only)......................................................................................... 11
Setting the Wrapping parameter........................................................................................... 11
Exiting the capture configuration mode ................................................................................ 11
Starting, Stopping and Clearing the capture ............................................................................. 11
Checking the Status and Saving the capture............................................................................ 12
Deleting the capture object ....................................................................................................... 14
Disabling capture globally ......................................................................................................... 14
Transferring, opening and viewing the capture......................................................................... 15
Sample capture configurations ...................................................................................................... 17
Setup ......................................................................................................................................... 17
General capture configuration................................................................................................... 18
PCAP using defaults on physical interfaces ............................................................................. 20
PCAP using triggers on physical interfaces .............................................................................. 24
PCAP on the physical interfaces using Filters and Direction .................................................... 28
PCAP on Global/Raw IP in mixed environment of tunnels and private physical interfaces...... 32
PCAP on tunnel using user ID .................................................................................................. 36
PCAP on tunnel using Remote IP ............................................................................................. 40
Overview
One of the ways to troubleshoot network problems is to use a device such as sniffer to
capture traffic traversing the network. In conjunction with logs, statistics and debugging
information captured traces could help an engineer to find the source of the problem and
its resolution.
Many devices such as routers, servers, workstations have the packet capture implemented
in software that eliminates the need for the external sniffer. The use of an external device
might disrupt live network or the device might not be capable of decoding encrypted
traffic which is important for troubleshooting VPN networks. Software based capture can
be easily turned on or off at any time during the device operation without interfering with
the network the device is connected to.
PCAP feature
PCAP feature on Contivity allows engineer to perform the following tasks:
• Simultaneous capture of network traffic on different sources:
o Traffic passing via physical interface (Ethernet, serial, ISDN, V.90, Async
PPP, ADSL, T1, T3, etc.);
o Traffic on Ethernet not directed to Contivity (promiscuous mode)
o Traffic being passed on Branch Office tunnel
o Traffic being passed on user tunnels
• Limiting the traffic to be captured by using traffic filters;
• Setting triggers for automatic start and stop of the capture;
• Encrypting the captured traffic with DES56 or AES128 when saving the capture
to the disk to prevent unauthorized monitoring of the secure IP traffic.
• Password protected mode for capturing traffic;
With Contivity being a security device capturing capabilities are enabled only via console
port, this way only the onsite qualified personal will have the access to the feature, no
intruder from the outside will be able to log in to Contivity gateway and enable the
capture.
For security reasons in order to enable a capture administrator’s password for Contivity
gateway must be changed from its default value (setup).
Moreover the capture itself is protected by the password selected by administrator when
the capture is enabled. When capture is written to the file on a disk it will be encrypted
with the selected capture password. The selected password is not stored on the Contivity
and cannot be retrieved in any way. This ensures that only the administrator who enabled
the capture will be able to decrypt the capture later on.
To further secure the capture DES56 or AES128 are used to encrypt capture files.
Encryption depends on the Contivity model, if Contivity has a key less then 128 DES56
is used for the encryption, otherwise the AES128 is used.
A tool called openpcap is developed to open encrypted capture files. Openpcap prompts
for a password for the capture and decrypts it, so the capture could be later analyzed
using Ethereal, Sniffer Pro or similar software.
For performance reasons once capturing is started, packets are saved into the PCAP
buffer in memory and not written to the disk until the capture is stopped and saved to
disk.
NOTE: In previous release (V04_85), once PCAP feature was enabled, it remained
enabled until either administrator disables it or until a system reboot, whichever comes
first.
As mentioned earlier the capture could be started on any of the interfaces (or sources) –
Ethernet, WAN link, Branch Office tunnel, user tunnel, etc. Only one capture on a
particular interface can be running at a time, but multiple captures on different interfaces
could be running at the same time. This limitation saves Contivity performance. Capture
could be enabled for the incoming traffic, outgoing traffic or both. This way the
administrator can control the direction of the traffic to be captured.
To reduce the overhead only the interesting traffic could be captured using existing
Contivity filters. Note: Only IP filters could be used.
Existing filters could be used as triggers to start or stop the capture. Once the condition of
the filter is met the capture is started or stopped. Triggers only work in the direction in
which the capture is enabled. For example, if the capture is globally enabled for the
outgoing traffic only and the packet satisfying the filter condition is received with the
incoming traffic this will not trigger the capture. Stop trigger will be executed only if the
start trigger has been previously executed, in order words the stop trigger can only be
issued if capturing has been started.
Note: Enabling PCAP feature will have the impact on Contivity performance. Therefore
it must be used with care and for troubleshooting purposes only.
The impact can be reduced by capturing less data (only first n bytes of the packet), or
capturing only interesting traffic using triggers and filters.
To start configuration connect to the Contivity through the console port. Log in to the Contivity
using HyperTerminal (or similar) software (Auto detect 9600/8-N-1):
Once logged in, the menu appears. Select option L (upper or lowercase) to enter the CLI:
CES>enable
Password:
CES#
If the administrator’s default password (setup) has been used, change the password via GUI or
CLI. To change the password via CLI, enter the configuration mode:
CES#configure terminal
Enter configuration commands, one per line. End with Ctrl/z.
CES(config)#exit
CES#
Example:
CES#capture enable
Please specify password for encrypting capture files.
Password: ********
Reenter password: ********
CES#
If the password for the capture is too simple the following error message appears and the
password should be reentered:
Example:
CES#capture enable
Please specify password for encrypting capture files.
Password: **
Reenter password: **
% Weak password! Please try again.
Once PCAP has been enabled globally via console, the feature could be managed through
console or telnet session.
Example:
For example, to set the capture for the FastEthernet interface on slot 0 port 1 with the capture
size of 32768:
Note: Global and Tunnel choice do not have the slot/port reference.
Example:
CES#capture nameOfTheCapture
CES(capture-ethernet)#
Note: The capture must not be running in order to set a new direction, in order words the capture
cannot change direction on the fly.
Example:
CES(capture-ethernet)#direction inbound
CES(capture-ethernet)#
CES(capture-ethernet)#direction outbound
CES(capture-ethernet)#
CES(capture-ethernet)#no direction
CES(capture-ethernet)#
Note: The filter should exist on Contivity in order to apply it to the capture. For information on how
to configure filters on Contivity consult Configuration Guide - Contivity Interface and Tunnel
Filters.
Note: The capture cannot be applied to the currently running capture. To apply the filter, stop the
capture first.
The no form of the command negates the command, therefore setting the default capture all
behavior.
Examples:
CES(capture-ethernet)#no filter
CES(capture-ethernet)#
Example:
CES(capture-ethernet)#length 1024
CES(capture-ethernet)#
CES(capture-ethernet)#no length
CES(capture-ethernet)#
Examples:
CES(capture-tunnel)#persistent enable
CES(capture-tunnel)#
CES(capture-tunnel)#no persistent enable
CES(capture-tunnel)#
CES(capture-ethernet)#promiscuous enable
CES(capture-ethernet)#
Examples:
CES(capture-tunnel)#remoteip 192.168.100.1
CES(capture-tunnel)#
CES(capture-tunnel)#no remoteip
CES(capture-tunnel)#
Examples:
The no form of the command sets the default behavior of capture any tunnel.
Examples:
CES(capture-tunnel)#no type
CES(capture-tunnel)#
Examples:
CES(capture-tunnel)#userid user1
CES(capture-tunnel)#
CES(capture-tunnel)#no userid
CES(capture-tunnel)#
Examples:
CES(capture-tunnel)#wrapping enable
CES(capture-tunnel)#
CES(capture-ethernet)#exit
CES#
Example:
To stop the capture use the capture <name of the capture> stop command, where <capture
name> is the name of the capture object running.
Example:
To clear the contents of a particular capture use the clear capture <capture name> command,
where <capture name> is the name of the capture object to be cleared.
Example:
Examples:
To view the list of all configured capture objects use the show capture command:
CES#show capture
Name Type Size Buffer use Count State
global GLOBAL 1048576 0% 0 EMPTY
nameOfTheCapture ETHERNET 32768 100% 33 BUFFER FULL
tunnel TUNNEL 1048576 0% 0 STOPPED
CES#
Note: None of these capture objects are saved to the disk yet, they all are stored in memory until
they are specifically saved.
To save a capture to a disk, use the capture <name of the capture object> save <file name to
save the capture to>.
Example:
To delete the capture object and free memory use the no capture <capture object name>
command.
Example:
Note: When capture is globally disabled by issuing the no capture enable command, all of the
capture objects are removed from memory.
If there was an attempt to disable capture via telnet a warning is displayed, stating that packet
capture could be disabled from the console only:
Example:
D:\tmp\pcap>ftp 192.168.50.90
Connected to 192.168.50.90.
220 FTP server ready
User (192.168.50.90:(none)): admin
331 Password required
Password:
230 User logged in
ftp> bin
200 Type set to I, binary mode
ftp> get FILE.CAP
200 Port set okay
150 Opening BINARY mode data connection
226 Transfer complete
ftp: 2532 bytes received in 0.15Seconds 16.88Kbytes/sec.
ftp> quit
221 Bye...see you later
Once the capture is transferred to the machine it’s going to be analyzed on, use the openpcap
tool to decrypt the captured trace.
Use the openpcap <encrypted capture file> <decrypted capture file> command.
Example:
NOTE: If software used to analyze the trace does not understand the format of the trace (Sniffer
Pro, for example) a conversion might be needed.
Use editcap utility in DOS to convert a saved capture to a network general format, for example:
If the capture was on a tunnel or global IP, then need to set FORCE protocol option on Sniffer
PRO to correctly read IP frames.
IPSec Peer-to-
CES1 Peer BO CES2
PC
WS
Note: This configuration assumes that CES1 and CES2 are successfully configured for the Peer-
to-Peer IPSec branch office, CES2 is configured to accept user tunnel from the WS and WS is
configured to initiate the user tunnel to CES2. In all sample configurations CES2 will have the
capture enabled.
Note: The sample configurations in this document are given for the capture object configuration
only. For information on how to configure branch office tunnel or user tunnel, consult the
appropriate documentation.
CES>enable
Password:
CES#conf t
Enter configuration commands, one per line. End with Ctrl/z.
To change the administrator’s password from default “setup” to “test” via GUI:
Navigate AdminÆAdministrator. Type in new password in the Password text box, Confirm
Password and click OK at the bottom of the screen:
Once password for the administrator has been changed, log in CES2 via console port using
terminal software like HyperTerminal and enter the privilege mode as described above.
CES#capture enable
Please specify password for encrypting capture files.
Password: ********
Reenter password: ********
CES#
CES#ping 192.168.20.7
PING 192.168.20.7: 36 data bytes
64 bytes from 192.168.20.7: icmp_seq=0. time=<16 ms
64 bytes from 192.168.20.7: icmp_seq=1. time=<16 ms
64 bytes from 192.168.20.7: icmp_seq=2. time=<16 ms
64 bytes from 192.168.20.7: icmp_seq=3. time=<16 ms
----192.168.20.7 PING Statistics----
4 packets transmitted, 4 packets received, 0% packet loss
round-trip (ms) min/avg/max = <16/<16/<16
CES#
The file is saved to the disk. Note the presence of saved file:
CES#dir
Directory of /ide0/
<DIR> /ide0/
<DIR> TUE OCT 28 14:24:55 2003 .
<DIR> TUE OCT 28 14:24:55 2003 ..
379020 MON OCT 27 10:01:16 2003 BOOTROM.SYS
<DIR> MON OCT 27 10:01:44 2003 SYSTEM
948 TUE OCT 28 14:31:12 2003 TEST1.CAP
<DIR> WED OCT 01 16:22:38 2003 V03_50.44
<DIR> FRI SEP 19 14:24:20 2003 V04_00.881
<DIR> WED SEP 03 09:28:00 2003 V04_05.070
<DIR> WED SEP 24 10:22:20 2003 V04_70.120
<DIR> WED SEP 24 10:00:22 2003 V04_75.124
<DIR> MON AUG 18 15:34:54 2003 V04_80.058
<DIR> FRI OCT 24 10:03:10 2003 V04_80.124
CES#
CES#conf t
Enter configuration commands, one per line. End with Ctrl/z.
CES(config)#
CES(config)#ftp-server enable
CES(config)#exit
CES#
From the PC on the CES2 private side download the capture from the CES2:
D:\tmp\openpcap\128>ftp 192.168.20.2
Connected to 192.168.20.2.
220 FTP server ready
User (192.168.20.2:(none)): admin
331 Password required
Password:
230 User logged in
ftp> bin
200 Type set to I, binary mode
ftp> get test1.cap
200 Port set okay
150 Opening BINARY mode data connection
226 Transfer complete
ftp: 948 bytes received in 0.00Seconds 948000.00Kbytes/sec.
ftp> quit
221 Bye...see you later
Run the openpcap tool to decrypt the capture. When asked enter the password selected for the
capture protection (1qazxsw2 in this example):
D:\tmp\openpcap\128>dir
Volume in drive D has no label.
Volume Serial Number is 9B29-6769
Directory of D:\tmp\openpcap\128
10/28/2003 01:49p <DIR> .
10/28/2003 01:49p <DIR> ..
06/19/2003 06:33p 35,840 openpcap.exe
10/28/2003 01:59p 910 outTest1.cap
10/28/2003 01:57p 948 test1.cap
3 File(s) 37,698 bytes
2 Dir(s) 1,204,814,389 bytes free
Open the decrypted capture outTest1.cap with Ethereal or similar program. Note the captured
ping:
Prior to capture configuration we need to enable Telnet on CES2. FTP has been enabled in the
previous example.
CES#configure terminal
Enter configuration commands, one per line. End with Ctrl/z.
CES(config)#
CES(config)#telnet enable
CES(config)#exit
CES#
Enter the capture configuration mode for the created capture (test-trigger):
CES#capture test-trigger
CES(capture-ethernet)#
CES(capture-ethernet)#exit
CES#
C:\>ping 192.168.20.2 -t
Pinging 192.168.20.2 with 32 bytes of data:
Reply from 192.168.20.2: bytes=32 time<10ms TTL=64
…
Check the status of the capture. Note that number of captured frames is zero and the Start trigger
discards received packets as the start has not been triggered by the ICMP traffic. Also note the
applied start and stop triggers:
D:\tmp\openpcap\128>ftp 192.168.20.2
Connected to 192.168.20.2.
220 FTP server ready
User (192.168.20.2:(none)): admin
331 Password required
Password:
230 User logged in
ftp> quit
221 Bye...see you later
C:\>telnet 192.168.20.2
Login: admin
Password:
CES>exit
Check the capture status again. Note the state of the capture has changed to Stopped by stop
trigger. Telnet traffic has triggered the stop capture:
D:\tmp\openpcap\128>ftp 192.168.20.2
Connected to 192.168.20.2.
220 FTP server ready
User (192.168.20.2:(none)): admin
331 Password required
Password:
230 User logged in
ftp> bin
200 Type set to I, binary mode
ftp> get test2.cap
200 Port set okay
150 Opening BINARY mode data connection
226 Transfer complete
ftp: 16788 bytes received in 0.21Seconds 79.94Kbytes/sec.
ftp> quit
221 Bye...see you later
Decrypt the capture in to the new file (outTest2.cap). When asked enter the password that was
selected to protect the capture (1qazxsw2 in this example):
CES#capture test-filter-in
CES(capture-ethernet)#
CES(capture-ethernet)#direction inbound
CES(capture-ethernet)#
CES(capture-ethernet)#exit
CES#
C:\>ping 192.168.20.2 -t
Pinging 192.168.20.2 with 32 bytes of data:
Start an FTP session to CES2 and issue a dir command while FTP:
D:\tmp\openpcap\128>ftp 192.168.20.2
Connected to 192.168.20.2.
220 FTP server ready
User (192.168.20.2:(none)): admin
331 Password required
Password:
230 User logged in
ftp> dir
200 Port set okay
150 Opening ASCII mode data connection
-rwxrwxrwx 1 owner group 379020 Oct 27 10:01 BOOTROM.SYS
drwxrwxrwx 1 owner group 512 Aug 18 15:34 V04_80.058
drwxrwxrwx 1 owner group 512 Sep 24 10:00 V04_75.124
drwxrwxrwx 1 owner group 512 Sep 3 09:28 V04_05.070
drwxrwxrwx 1 owner group 512 Oct 1 16:22 V03_50.44
drwxrwxrwx 1 owner group 512 Sep 24 10:22 V04_70.120
drwxrwxrwx 1 owner group 512 Sep 19 14:24 V04_00.881
drwxrwxrwx 1 owner group 512 Oct 27 10:01 SYSTEM
drwxrwxrwx 1 owner group 512 Oct 24 10:03 V04_80.124
-rwxrwxrwx 1 owner group 16788 Oct 28 15:50 TEST2.CAP
-rwxrwxrwx 1 owner group 948 Oct 28 15:00 TEST1.CAP
226 Transfer complete
ftp: 975 bytes received in 0.31Seconds 3.15Kbytes/sec.
ftp> quit
221 Bye...see you later
D:\tmp\openpcap\128>ftp 192.168.20.2
Connected to 192.168.20.2.
220 FTP server ready
User (192.168.20.2:(none)): admin
331 Password required
Password:
230 User logged in
ftp> bin
200 Type set to I, binary mode
ftp> get test3.cap
200 Port set okay
150 Opening BINARY mode data connection
226 Transfer complete
ftp: 1652 bytes received in 0.11Seconds 15.02Kbytes/sec.
ftp> quit
221 Bye...see you later
Open a capture using Ethereal or similar software. Note only the inbound FTP traffic has been
captured:
CES#ping 192.168.10.1
PING 192.168.10.1: 36 data bytes
64 bytes from 192.168.10.1: icmp_seq=2. time=<16 ms
64 bytes from 192.168.10.1: icmp_seq=3. time=<16 ms
64 bytes from 192.168.10.1: icmp_seq=4. time=<16 ms
64 bytes from 192.168.10.1: icmp_seq=5. time=<16 ms
CES#
C:\>ping 192.168.20.2
Pinging 192.168.20.2 with 32 bytes of data:
Request timed out.
Reply from 192.168.20.2: bytes=32 time<10ms TTL=64
Reply from 192.168.20.2: bytes=32 time<10ms TTL=64
Reply from 192.168.20.2: bytes=32 time<10ms TTL=64
D:\tmp\openpcap\128>ftp 192.168.20.2
Connected to 192.168.20.2.
220 FTP server ready
User (192.168.20.2:(none)): admin
331 Password required
Password:
230 User logged in
ftp> bin
200 Type set to I, binary mode
ftp> get test4.cap
200 Port set okay
150 Opening BINARY mode data connection
226 Transfer complete
ftp: 4548 bytes received in 0.19Seconds 23.94Kbytes/sec.
ftp> quit
221 Bye...see you later
Decrypt the capture in a new file (outTest4.cap) using openpcap tool and the selected for the
capture password (1qazxsw2 in this example):
CES#capture test-user
CES(capture-tunnel)#
Set the user ID (useripsec) for the tunnel to be captured and exit the capture configuration mode:
CES(capture-tunnel)#userid useripsec
CES(capture-tunnel)#exit
CES#
Bring the BO connection up by pinging from the CES1 private side to the CES2 private side:
CES#ping 192.168.10.1
PING 192.168.10.1: 36 data bytes
64 bytes from 192.168.10.1: icmp_seq=2. time=<16 ms
64 bytes from 192.168.10.1: icmp_seq=3. time=<16 ms
64 bytes from 192.168.10.1: icmp_seq=4. time=<16 ms
64 bytes from 192.168.10.1: icmp_seq=5. time=<16 ms
CES#
Once VPN connection has been established ping CES2 private IP (192.168.20.20) from WS:
C:\>ping 192.168.20.20
Pinging 192.168.20.20 with 32 bytes of data:
Reply from 192.168.20.20: bytes=32 time=10ms TTL=64
Reply from 192.168.20.20: bytes=32 time<10ms TTL=64
Reply from 192.168.20.20: bytes=32 time<10ms TTL=64
Reply from 192.168.20.20: bytes=32 time<10ms TTL=64
Ping statistics for 192.168.20.20:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 10ms, Average = 2ms
D:\tmp\openpcap\128>ftp 192.168.20.2
Connected to 192.168.20.2.
220 FTP server ready
User (192.168.20.2:(none)): admin
331 Password required
Password:
230 User logged in
ftp> bin
200 Type set to I, binary mode
ftp> get test5.cap
200 Port set okay
150 Opening BINARY mode data connection
226 Transfer complete
ftp: 3204 bytes received in 0.12Seconds 26.70Kbytes/sec.
ftp> quit
221 Bye...see you later
Decrypt the trace in to a new file (outTest5.cap) using openpcap and the password (1qazxsw2 in
this example):
CES#capture test-remote-ip
CES(capture-tunnel)#
Set the remote IP to the CES1 public interface (192.168.100.1) and exit the capture configuration
mode:
CES(capture-tunnel)#remoteip 192.168.100.1
CES(capture-tunnel)#exit
CES#
C:\>ping 192.168.20.20
Pinging 192.168.20.20 with 32 bytes of data:
Reply from 192.168.20.20: bytes=32 time<10ms TTL=64
Reply from 192.168.20.20: bytes=32 time<10ms TTL=64
Reply from 192.168.20.20: bytes=32 time<10ms TTL=64
Reply from 192.168.20.20: bytes=32 time<10ms TTL=64
Ping statistics for 192.168.20.20:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
CES#ping 192.168.10.1
PING 192.168.10.1: 36 data bytes
64 bytes from 192.168.10.1: icmp_seq=2. time=<16 ms
64 bytes from 192.168.10.1: icmp_seq=3. time=<16 ms
64 bytes from 192.168.10.1: icmp_seq=4. time=<16 ms
64 bytes from 192.168.10.1: icmp_seq=5. time=<16 ms
CES#
D:\tmp\openpcap\128>ftp 192.168.20.2
Connected to 192.168.20.2.
220 FTP server ready
User (192.168.20.2:(none)): admin
331 Password required
Password:
230 User logged in
ftp> bin
200 Type set to I, binary mode
ftp> get test6.cap
200 Port set okay
150 Opening BINARY mode data connection
226 Transfer complete
ftp: 788 bytes received in 0.00Seconds 788000.00Kbytes/sec.
ftp> quit
221 Bye...see you later
Decrypt the trace with the openpcap tool and a password selected to protect the capture
(1qazxsw2 in this example):
Open a trace with Ethereal or similar software. Note only traffic inside the tunnel with the
configured remote IP has been captured, in our case only traffic inside the BO has been
captured:
CES#show capture
Name Type Size Buffer use Count State
test-fast ETHERNET 1048576 0% 10 STOPPED
test-filter-in ETHERNET 1048576 0% 20 STOPPED
test-raw-ip GLOBAL 1048576 0% 33 STOPPED
test-remote-ip TUNNEL 1048576 0% 9 STOPPED
test-trigger ETHERNET 1048576 1% 188 STOPPED by stop
trigger
test-user TUNNEL 1048576 0% 56 STOPPED
CES#
Once all the tests are done, disable the capture on CES2 globally (Note: This will remove all the
configured capture objects and free the memory used to store them):
The saved captures will be stored on the disk until they are specifically deleted:
CES#dir
Directory of /ide0/
<DIR> /ide0/
<DIR> TUE OCT 28 18:32:12 2003 .
<DIR> TUE OCT 28 18:32:12 2003 ..
379020 MON OCT 27 10:01:16 2003 BOOTROM.SYS
<DIR> MON OCT 27 10:01:44 2003 SYSTEM
948 TUE OCT 28 15:00:30 2003 TEST1.CAP
16788 TUE OCT 28 15:50:40 2003 TEST2.CAP
1652 TUE OCT 28 16:17:44 2003 TEST3.CAP
4548 TUE OCT 28 16:58:48 2003 TEST4.CAP
4436 TUE OCT 28 18:12:50 2003 TEST5.CAP
788 TUE OCT 28 18:33:18 2003 TEST6.CAP
<DIR> WED OCT 01 16:22:38 2003 V03_50.44
<DIR> FRI SEP 19 14:24:20 2003 V04_00.881
<DIR> WED SEP 03 09:28:00 2003 V04_05.070
<DIR> WED SEP 24 10:22:20 2003 V04_70.120
<DIR> WED SEP 24 10:00:22 2003 V04_75.124
<DIR> MON AUG 18 15:34:54 2003 V04_80.058
<DIR> FRI OCT 24 10:03:10 2003 V04_80.124
CES#
Copyright © 2005 Nortel Networks Limited - All Rights Reserved. Nortel, Nortel Networks, the Nortel logo, Globemark, and
Contivity are trademarks of Nortel Networks Limited.
The information in this document is subject to change without notice. The statements, configurations, technical data, and
recommendations in this document are believed to be accurate and reliable, but are presented without express or implied
warranty. Users must take full responsibility for their applications of any products specified in this document. The
information in this document is proprietary to Nortel Networks Limited.
To access more technical documentation, search our knowledge base, or open a service request online, please visit
Nortel Networks Technical Support on the web at: http://www.nortel.com/support
If after following this guide you are still having problems, please ensure you have carried out the steps exactly as in this
document. If problems still persist, please contact Nortel Networks Technical Support (contact information is available
online at: http://www.nortel.com/cgi-bin/comments/comments.cgi?key=techsupport_cu).
We welcome you comments and suggestions on the quality and usefulness of this document. If you would like to leave a
feedback please send your comments to: CRCONT@nortel.com
Author: Kristina Senkova