Packet Trace Remote
Packet trace remote enables the Oracle® Enterprise Session Border Controller (ESBC) to mirror traffic between two endpoints, or between itself and a specific endpoint to a user-specified target. To accomplish this, the ESBC replicates the packets sent and received, encapsulates them according to RFC 2003, and sends them to a user-configured target. At the target, you capture and analyze the packets. The syntax for remote packet-trace is the same across platforms.
Currently, the ESBC supports:
- One configurable trace server (on which you capture and analyze the traffic)
- Fifteen concurrent endpoint traces
To use this feature, the user configures a capture-receiver on the ESBC so that it knows where to send the mirrored packets. Once the capture-receiver is configured, the user issues the packet-trace command to start, stop and specify filters for traces.
You establish a packet trace filter with the following information:
- Network interface—The name of the network interface on the ESBC from which you want to trace packets. The user can enter this value as a name or as a name and subport identifier value (name:subportid)
- IP address—IP address of the endpoint to or from which the target traffic goes.
- Local port number—Optional parameter; Layer 4 port number on which the ESBC receives and from which it sends; if no port is specified or if it is set to 0, then all ports will be traced
- Remote port number—Optional parameter; Layer 4 port number to which the ESBC sends and from which it receives; if no port is specified or if it is set to 0, then all ports will be traced.
The ESBC then encapsulates the original packets in accordance with RFC 2003 (IP Encapsulation within IP); it adds the requisite headers, and the payload contains the original packet trace with the Layer 2 header removed. Since software protocol analyzers understand RFC 2003, they can easily parse the original traced packets.

For large frames that are close to Maximum Transmission Unit (MTU) size, it is possible that when the ESBC performs the steps to comply with RFC 2003 by adding the requisite header that the resulting packet might exceed Ethernet MTU size. If required, the ESBC will create multiple fragments as needed before sending the packet output. If the ESBC either receives or transmits IP fragments during a packet trace, the ESBC performs reassembly and then performs the steps to comply with RFC 2003 by adding the requisite header, and then creates multiple fragments as needed before sending the packet output.
- Packet capture mode begins only after all fragments are received and assembled.
- When the complete packet is available the system adds the Outer IP header and applies more IP fragment logic with the payload as a complete packet including the Inner header.
- The first packet contains the Inner and Outer header. Subsequent packets contain only the Outer IP header.
The ESBC continues to conduct the packet trace and send the replicated information to the trace server until you instruct it to stop. You stop a packet trace with the ACLI packet-trace remote stop command. With this command, you can stop either an individual packet trace or all packet traces that the ESBC is conducting.