Collecting PCAP Logs with Wireshark and PCAP Remote
Collecting PCAP Logs with Wireshark and PCAP Remote
Network tracing logs are useful to troubleshoot issues related to network connectivity. These logs can be obtained and viewed by Wireshark software. PCAP remote can be used to collect logs on an Android device.
Collecting network tracing logs in Windows/Linux/macOS
Download the free Wireshark utility from http://www.wireshark.org/download.html. If you are not planning on keeping Wireshark installed on your system, then it is recommended to download and run the portable version.
Then do the following:
Note the IP of the source and target device.
Run Wireshark.
Click Capture -> Options... ,select corresponding network adapter you are using for your network connection and click the Start button:
If you want to monitor connection through a particular port only, you can set it up too: in Capture Filter type the port you want to monitor, e.g. tcp port 443 or tcp port 44445: In case you know that backup will not fail immediately, it means WireShark should be executed during some extended time (20 minutes +) it is a good idea to write the information to a file right after start. You can choose a file in the Output tab and set traffic and time limits for logs collection:
Reproduce the issue without closing the Wireshark application:
Click Capture -> Stop after the issue is reproduced:
Contact Acronis Customer Central and attach the saved log to your request. Also please let us know the IP address of the source and target device.
Collecting network tracing logs on Android devices
Install PCAP Remote on your android device. PCAP Remote is a non-root network sniffer app that allows you to capture Android traffic and save it to a .pcap log for future analysis or to remotely capture from Wireshark installed on a computer connected from the app's built-in SSH server.
To capture the traffic and save it to a .pcap file on your device:
Launch the application.
Disable the Remote mode capturing option:
Click the Play button in the upper-right corner to start capturing.
You see a list of application to capture. Select the application you want to capture from the list
As soon as you stop capturing, you will be asked if captured packets need to be saved as .pcap file on device storage.
Download the free Wireshark utility from http://www.wireshark.org/download.html and install Wireshark on the device. Note the installation folder with the executable, e.g. C:\Program Files\Wireshark Create a pre-backup and post-backup commands as ...
You can collect system report manually: HideIn Linux If Agent is not installed yet please refer to https://kb.acronis.com/linuxreport#notinstalled Collecting System Report in a client version 11.8.177 or later: Run with root privileges: # ...
Acronis Agent is installed and machine is online Collect system report in this way: From Devices: Open Cyber Protection console. Select the machine you need the report for. Click Activities: Click Collect system information: Collecting system report ...
Purpose Process Monitor logs may be required to troubleshoot a backup issue. The issue may reproduce under various conditions and is sometimes random, preventing successful manual log collection. This article provides a set of simple Windows batch ...
In general, performance is constantly being optimized, so updating to the latest build is always recommended for the best performance of backup and other operations. First of all, please check out the general system requirements, described in your ...