cc/td/doc/product/software/ssr91
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Debug Command Reference

Debug Command Reference

This chapter covers the debug commands that you can use to diagnose and resolve internetworking problems. This chapter includes two sections:

Caution Because debugging output is assigned high priority, excessive debugging output can render the system unusable. For this reason, you should only use debug commands to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during off hours, when lower network traffic and fewer users reduce the risk of using them.

General Debugging Information

This section covers the following topics:

Using Debug Commands

You can use the privileged EXEC command debug to display several classes of network events on the console terminal.

Most debug commands do not take any required or optional arguments. For example, to enable the debug broadcast command, enter the following in privileged mode at the command line:

debug broadcast

To turn off the debug broadcast command, enter the following in privileged mode at the command line:

undebug broadcast

To display the state of each debugging option, enter the following at the command line:

show debugging
Note Throughout this chapter, it is assumed that a particular debug command takes no arguments unless otherwise noted.

Using the Debug ? Command

To list and briefly describe all of the debugging command options, enter the debug ? command in privileged mode at the command line.

debug ?

Using the Debug All Command

To enable all system diagnostics, enter the following in privileged mode at the command line:

debug all

Its converse, the undebug all command, turns off all diagnostic output. The undebug all command is a convenient way to ensure that you have not accidentally left any debug commands turned on.

Caution Because debugging output takes priority over other network traffic, and because the debug all command generates more output than any other debug command, it can severely diminish the router's performance or even render it unusable. In virtually all cases, it is best to use more specific debug commands.

Generating Debugging Command Output

Turning on a debugging command can result in output similar to the example for the debug broadcast command shown in Figure 10-1.




Figure 10-1: Example Debug Broadcast Output

The router continues to generate such output until you enter the converse undebug command (in this case, undebug broadcast).

If you enable a particular debug command and no output is displayed, consider the following possibilities:

Redirecting Debugging and Error Message Output

By default, the network server sends the output from debug commands and system error messages to the console terminal. If you accept this default, it is best to monitor debugging output using a VTY connection, rather than the console port.

To redirect debugging output, use the logging command options within configuration mode.

Possible destinations include the console terminal, virtual terminals, and UNIX hosts running a syslog server; the syslog format is compatible with 4.3 BSD UNIX and its derivatives.


Note Be aware that the debugging destination you use impacts system overhead. Logging to the console produces very high overhead, whereas logging to VTY produces less overhead. Logging to a syslog server produces even less, whereas logging to memory produces the least overhead of any method.

To configure message logging, you need to be in the configuration command collection mode. To enter this mode, use the EXEC command configure terminal at the EXEC prompt. The following sections describe how to implement these redirection options.

Enabling Message Logging

To enable message logging to all supported destinations other than the console, enter the following:

logging on

This behavior is the default.

To enable logging to the console terminal only, enter the following:

no logging on

Logging Messages to the Console

To limit the types of messages that are logged to the console, use the logging console global configuration command. The full syntax of this command follows.

logging console level
no logging console

The logging console command limits the logging messages displayed on the console terminal to messages with a level number at or below the specified severity level, which is specified by the level argument.

The argument level can be one of the keywords listed in Table 10-1. They are listed in order from the most severe to the least severe level.


Logging Message Keywords and Levels
Level Keyword Description Syslog Definition
0 emergencies System is unusable. LOG_EMERG
1 alerts Immediate action is needed. LOG_ALERT
2 critical Critical conditions exist. LOG_CRIT
3 errors Error conditions exist. LOG_ERR
4 warnings Warning conditions exist. LOG_WARNING
5 notification Normal, but significant, conditions exist. LOG_NOTICE
6 informational Informational messages. LOG_INFO
7 debugging Debugging messages. LOG_DEBUG

The no logging console command disables logging to the console terminal.

Example

This command sets console logging of messages at the debugging level:

!
logging console debugging
!

Logging Messages to an Internal Buffer

The default logging device is the console; all messages are displayed on the console unless otherwise specified.

To log messages to an internal buffer, use the logging buffered global configuration command. The full command syntax follows.

logging buffered
no logging buffered

The logging buffered command copies logging messages to an internal buffer instead of writing them to the console terminal. The buffer is circular in nature, so newer messages overwrite older messages. To display the messages that are logged in the buffer, use the EXEC command show logging. The first message displayed is the oldest message in the buffer.

The no logging buffered command cancels the use of the buffer and writes messages to the console terminal (the default).

Logging Messages to Another Monitor

To limit the level of messages logged to the terminal lines (monitors), use the logging monitor global configuration command. The full syntax of this command follows.

logging monitor level
no logging monitor

The logging monitor command limits the logging messages displayed on terminal lines other than the console line to messages with a level at or above the value of the level variable. The argument level is one of the keywords described for the logging console command in a previous section, "Logging Messages to the Console." To display logging messages on a terminal, use the privileged EXEC command terminal monitor.

The no logging monitor command disables logging to terminal lines other than the console line.

This command sets the level of messages displayed on monitors other than the console to notification:

!
logging monitor notification
!

Logging Messages to a UNIX Syslog Server

To log messages to the syslog server host, use the logging global configuration command. The full syntax is as follows:

logging internet-address
no logging
internet-address

The logging command identifies a syslog server host to receive logging messages. The argument internet-address is the Internet address of the host. By issuing this command more than once, you build a list of syslog servers that receive logging messages.

The no logging command deletes the syslog server with the specified address from the list of syslogs.

Limiting Messages to a Syslog Server

To limit how many messages are sent to the syslog servers, use the logging trap global configuration command. Its full syntax follows.

logging trap level
no logging trap

The logging trap command limits the logging messages sent to syslog servers to messages with a level at or above the value of the level variable. The argument level is one of the keywords described for the logging console command in Table 10-1.

To send logging messages to a syslog server, specify its host address with the logging command.

The default trap level is informational.

The no logging trap command disables logging to syslog servers.

The current software generates four categories of syslog messages:

The EXEC command show logging displays the addresses and levels associated with the current logging setup. The command output also includes ancillary statistics.

Example

To set up the syslog daemon on a 4.3 BSD UNIX system, include a line such as the following in the file /etc/syslog.conf:

local7.debug /usr/adm/logs/tiplog

The local7 keyword specifies the logging facility to be used.

The debug argument specifies the syslog level. See the previous level arguments list for other arguments that can be listed.

The UNIX system sends messages at or below this level to the file specified in the next field. The file must already exist, and the syslog daemon must have permission to write to it.

Debug Command Listing

This section includes an alphabetical listing of debug commands. Documentation for each command includes a description of its use, example output, and a description of that output.

Output formats of the various debug commands vary. Some generate a single line of output per packet, whereas others generate multiple lines of output per packet. Some generate a great deal of output, whereas others generate occasional output. Some generate lines of text; others generate information in field format. Thus, the way the debug commands are documented also varies. For example, for debug commands that generate lines of text, the output is described line-by-line. For debug commands that generate output in field format, tables are used to describe the fields.

Debug Apple-ARP

Use the debug apple-arp command to enable debugging of the AppleTalk address resolution protocol.

This command is helpful when you experience problems communicating with a node on the network you control (neighbor). If the debug apple-arp display indicates that the router is receiving AARP probes, you can assume that the problem does not reside at the physical layer.


Note A side effect of enabling this command is that gleaning MAC information from datagrams is disabled.

Figure 10-2 shows example debug apple-arp output.




Figure 10-2: Example Debug Apple-ARP Output

Explanations for representative lines of output in Figure 10-2 follow.

The following line of output indicates that the router has requested the hardware MAC address of the host at network address 4160.26.

Ether0: AARP: Sent resolve for 4160.26

The following line of output indicates that the host at network address 4160.26 has replied, giving its MAC address (0000.0c00.0453). For completeness, the message also shows the network address to which the reply was sent and its hardware MAC address (also in parentheses).

Ether0: AARP: Reply from 4160.26(0000.0c00.0453) for 4160.154(0000.0c00.8ea9)

The following line of output indicates that the MAC address request is complete.

Ether0: AARP: Resolved waiting request for 4160.26(0000.0c00.0453)

Debug Apple-Errors

Use the debug apple-errors command to display errors occurring in the AppleTalk network.

To solve encapsulation problems, enable debug apple-errors and debug apple-packet together.


Note In a stable AppleTalk network, debug apple-errors should produce little output.

Figure 10-3 shows example debug apple-errors output when a router is brought up with a zone that does not agree with the zone list of other routers on the network.




Figure 10-3: Example Debug Apple-Errors Output

As Figure 10-3 suggests, a single error message indicates zone list incompatibility; this message is sent out periodically until the condition is corrected or debug apple-errors is turned off.

Most of the other messages that debug apple-errors can generate are quite obscure or indicate a very serious problem with the AppleTalk network. Some of these other messages follow.

In the following message, RTMPRsp, RTMPReq, ATP, AEP, ZIP, ADSP, or SNMP could replace NBP, and llap dest not for us could replace wrong encapsulation.

Packet discarded, src 4160.12-254,dst 4160.19-254,NBP,wrong encapsulation

In the following message, besides invalid echo packet, other possible errors are: unsolicited AEP echo reply, unknown echo function, invalid ping packet, unknown ping function, and bad responder packet type.

Ethernet0: AppleTalk packet error; no source address available
AT: pak_reply: dubious reply creation, dst 4160.19
AT: Unable to get a buffer for reply to 4160.19
Processing error, src 4160.12-254,dst 4160.19-254,AEP, invalid echo packet

The debug apple-errors command can print out other messages when other debugging commands are also turned on. When both debug apple-errors and debug apple-events are turned on, the following message can be generated:

Proc err, src 4160.12-254,dst 4160.19-254,ZIP,NetInfo Reply format is invalid

In the previous message, besides NetInfo Reply format is invalid, other possible errors are: NetInfoReply not for me, NetInfoReply ignored, NetInfoReply for operational net ignored, NetInfoReply from invalid port, unexpected NetInfoReply ignored, cannot establish primary zone, no primary has been set up, primary zone invalid, net information mismatch, multicast mismatch, and zones disagree.

When both debug apple-errors and debug apple-nbp are turned on, the following message can be generated:

Processing error, ...,NBP,NBP name invalid

In the previous message, besides NBP name invalid, other possible errors are: NBP type invalid, NBP zone invalid, not operational, error handling brrq, error handling proxy, NBP fwdreq unexpected, No route to srcnet, Proxy to "*" zone, Zone "*" from extended net, No zone info for "*", and NBP zone unknown.

When both debug apple-errors and debug apple-routing are turned on, the following message can be generated:

Processing error, ...,RTMPReq, unknown RTMP request

In the previous message, besides unknown RTMP request, other possible errors are: RTMP packet header bad, RTMP cable mismatch, routed RTMP data, RTMP bad tuple, and Not Req or Rsp.

Debug Apple-Events

Use the debug apple-events command to display debugging information about AppleTalk special events, neighbors becoming reachable/unreachable, and interfaces going up/down. Only significant events (for example, neighbor and/or route changes) are logged.

The debug apple-events command is very useful for solving AppleTalk network problems, because it provides an overall picture of the stability of the network. In a stable network, the debug apple-events command does not return any information. If, however, the command generates numerous messages, these messages can indicate where the problem might lie.

When configuring or making changes to a router or interface for AppleTalk, enable debug apple-events. This will alert you to the progress of the changes or to any errors that might result. You should also use this command periodically when you suspect network problems.

The debug apple-events command is also useful to determine whether network flapping is occuring. If flapping (nodes toggling on- and off-line) is excessive, look for routers that only support 254 networks.

When you enable debug apple-events, you also will see any messages that the configuration command apple event-logging normally displays. Turning on debug apple-events, however, will not cause apple event-logging to be maintained in nonvolatile memory. Only turning on apple event-logging explicitly will store it in nonvolatile memory. Furthermore, if apple event-logging is already enabled, turning on or off debug apple-events will not affect apple event-logging.

Figure 10-4 shows example debug apple-events output that describes a nonseed router coming up in discovery mode.




Figure 10-4: Example Debug Apple-Events Output with Discovery Mode State Changes

As Figure 10-4 shows, the debug apple-events command can be very useful in tracking the discovery mode state changes through which an interface progresses. When no problems are encountered, the state changes progress as follows:


Line dow
Restarting
Probing (for its own address (node ID) using AARP)
Acquiring (sending out GetNetInfo requests)
Requesting zones (the list of zones for its cable)
Verifying (that the router's configuration is correct. If not, a port configuration mismatch is declared.)
Checking zones (to make sure its list of zones is correct)
Operational (participating in routing)

Explanations for individual lines of output in Figure 10-4 follow.

The following message indicates that a port is set. In this case, the zone multicast address is being reset.

Ether0: AT: Resetting interface address filters

The following messages indicate that the router is changing to restarting mode.

%AT-5-INTRESTART: Ether0: AppleTalk port restarting; protocol restarted
Ether0: AppleTalk state changed; unknown -> restarting

The following message indicates that the router is probing in the startup range of network numbers (65280-65534) to discover its network number.

Ether0: AppleTalk state changed; restarting -> probing

The following message indicates that the router is enabled as a nonrouting node using a provisional network number within its startup range of network numbers. This type of message only appears if the network address the router will use differs from its configured address. This is always the case for a nonseed router; it is rarely the case for a seed router.

%AT-6-ADDRUSED: Ether0: AppleTalk node up; using address 65401.148

The following messages indicate that the router is sending out GetNetInfo requests to discover the default zone name and the actual network number range in which its network number should be chosen.

Ether0: AppleTalk state changed; probing -> acquiring
%AT-6-ACQUIREMODE: Ether0: AT port initializing; acquiring net configuration

Now that the router has acquired the cable configuration information, the following message indicates that it restarts using that information.

Ether0: AppleTalk state changed; acquiring -> restarting

The following messages indicate that the router is probing for its actual network address.

Ether0: AppleTalk state changed; restarting -> line down
Ether0: AppleTalk state changed; line down -> restarting
Ether0: AppleTalk state changed; restarting -> probing

The following message indicates that the router has found an actual network address to use.

%AT-6-ADDRUSED: Ether0: AppleTalk node up; using address 4160.148

The following messages indicate that the router is sending out GetNetInfo requests to verify the default zone name and the actual network number range from which its network number should be chosen.

Ether0: AppleTalk state changed; probing -> acquiring
%AT-6-ACQUIREMODE: Ether0: AT port initializing; acquiring net configuration

The following message indicates that the router is requesting the list of zones for its cable.

Ether0: AppleTalk state changed; acquiring -> requesting zones

The following messages indicate that the router is sending out GetNetInfo requests to make sure its understanding of the configuration is correct.

Ether0: AppleTalk state changed; requesting zones -> verifying
AT: Sent GetNetInfo request broadcast on Ethernet0

The following message indicates that the router is rechecking its list of zones for its cable.

Ethernet0: AppleTalk state changed; verifying -> checking zones

The following message indicates that the router is now fully operational as a routing node and can begin routing.

Ethernet0: AppleTalk state changed; checking zones -> operational

Figure 10-5 shows example debug apple-events output that describes a seed router coming up when no other router is on the wire.




Figure 10-5: Example Debug Apple-Events Output Showing Seed Coming Up by Itself

As Figure 10-5 shows, a seed router can come up when no other router is on the wire; however, it must assume that its configuration (if accurate syntactically) is correct, because no other router can verify it. Notice that the last line in Figure 10-5 indicates this situation.

Figure 10-6 shows example debug apple-events output that describes a nonseed router coming up when there is no seed router on the wire.




Figure 10-6: Example Debug Apple-Events Output Showing NonSeed with No Seed

As Figure 10-6 shows, when you attempt to bring up a nonseed router without a seed router on the wire, it never becomes operational; instead, it hangs in the acquiring mode and continues to send out periodic GetNetInfo requests.

Figure 10-7 shows example debug apple-events output when a seed router is brought up on an AppleTalk internet that is in compatibility mode (set up to accommodate extended as well as nonextended AppleTalk) and the router has violated internet compatibility.




Figure 10-7: Example Debug Apple-Events Output Showing Compatibility Conflict

The three configuration command lines that follow indicate the part of the router's configuration that caused the configuration mismatch shown in Figure 10-7.

lestat(config)#int e 0
lestat(config-if)#apple cab 41-41
lestat(config-if)#apple zone Marketign

The router shown in Figure 10-7 had been configured with a cable range of 41-41 instead of 40-40, which would have been accurate. To make matters worse, the zone name was configured incorrectly; the zone name should have been Marketing, rather than being mispelled as Marketign.

Debug Apple-NBP

Use the debug apple-nbp command to enable debugging output from the Name Binding Protocol (NBP) routines. To determine whether the router is receiving NBP lookups from a node on the AppleTalk network, enable debug apple-nbp at each node between the router and this node in order to determine where the problem lies.


Note Because the debug apple-nbp command can generate a lot of messages, you should only use it when the router's CPU utilization is less than 50 percent.

Figure 10-8 shows example debug apple-nbp output.




Figure 10-8: Example Debug Apple-NBP Output

The first three lines in Figure 10-8 describe an NBP lookup request.

AT: NBP ctrl = LkUp, ntuples = 1, id = 77
AT: 4160.19, skt 2, enum 0, name: =:ciscoRouter@Low End SW Lab
AT: LkUp =:ciscoRouter@Low End SW Lab

Table 10-2 describes the fields in the first line of output in Figure 10-8.


Debug Apple-NBP Field Descriptions--Part 1
Field Description
AT: NBP Indicates that this message describes an AppleTalk NBP packet.
ctrl = LkUp Identifies the type of NBP packet. Possible values include:

LkUp--NBP lookup request.

LkUp-Reply--NBP lookup reply.

ntuples = 1 Indicates the number of name-address pairs in the lookup request packet. Range: 1-31 tuples.
id = 77 Value that identifies the NBP lookup request.

Table 10-3 describes the fields in the second line of output in Figure 10-8.


Debug Apple-NBP Field Descriptions--Part 2
Field Description
AT: Indicates that this message describes an AppleTalk packet.
4160.19 Network address of the requester.
skt 2 Internet socket address of the requester. The responder will send the NBP lookup reply to this socket address.
enum 0 Enumerator field. Used to identify multiple names registered on a single socket. Each tuple is assigned its own enumerator, incrementing from 0 for the first tuple.
name: =:ciscoRouter@Low End SW Lab Entity name for which a network address has been requested. The AppleTalk entity name includes three components:

  • Object (in this case, the object is a wildcard character (=), indicating that the requester is requesting name-address pairs for all objects of the specified type in the specified zone)

  • Type (in this case, the type is ciscoRouter)

  • Zone (in this case, the zone is Low End SW Lab)

The third line in Figure 10-8 essentially reiterates the information in the two lines above it, indicating that a Lookup request has been made regarding name-address pairs for all objects of the ciscoRouter type in the Low End SW Lab zone.

Since the router is defined as an object of type ciscoRouter in zone Low End SW Lab, the router sends an NBP lookup reply in response to this NBP lookup request. The following two lines of output from Figure 10-8 show the router's response.

AT: NBP ctrl = LkUp-Reply, ntuples = 1, id = 77
AT: 4160.154, skt 254, enum 1, name: lestat.Ether0:ciscoRouter@Low End SW Lab

In the first line, ctrl = LkUp-Reply identifies this NBP packet as an NBP lookup request. The same value in the id field (id = 77) associates this lookup reply with the previous lookup request. The second line indicates that the network address associated with the router's entity name (lestat.Ether0:ciscoRouter@Low End SW Lab) is 4160.154. The fact that no other entity name/network address is listed indicates that the responder only knows about itself as an object of type ciscoRouter in zone Low End SW Lab.

Debug Apple-Packet

Use the debug apple-packet command to enable per-packet debugging output. It reports information on line when a packet is received or a transmit is attempted. The command allows you to monitor the types of packets being slow switched. It is roughly equivalent to turning on all the other AppleTalk debugging information. There will be at least one line of debugging output per AppleTalk packet processed.

When invoked in conjunction with the commands debug apple-routing, debug apple-zip, and debug apple-nbp, the debug apple-packet command adds protocol processing information in addition to generic packet details. It reports protocol processing and successful completion or failure information.

When invoked in conjunction with the command debug apple-errors, the debug apple-packet command reports packet-level problems, such as those concerning encapsulation, for example.


Note Because the debug apple-packet command can generate a lot of messages, you should only use it when the router's CPU utilization is less than 50 percent.

Figure 10-9 shows example debug apple-packet output.




Figure 10-9: Example Debug Apple-Packet Output

Table 10-4 describes the fields in the first line of output shown in Figure 10-9.


Debug Apple-Packet Field Descriptions--Part 1
Field Description
Ether0: Name of the interface through which the router received the packet.
AppleTalk packet Indicates that this is an AppleTalk packet.
enctype SNAP Encapsulation type for the packet.
size 60 Size of the packet (in bytes).
encaps000000000000000000000000 Encapsulation.

Table 10-5 describes the fields in the second line of output shown in Figure 10-9.


Debug Apple-Packet Field Descriptions--Part 2
Field Description
AT: Indicates that this is an AppleTalk packet.
src = Ethernet0:4160.47 Name of the interface sending the packet, as well as its AppleTalk address.
dst = 4160-4160 Cable range of the packet's destination.
size = 10 Size of the packet (in bytes).
2 rtes Indicates that there are two routes in the routing table that link these two addresses.
RTMP pkt sent Indicates the type of packet sent.

The third line in Figure 10-9 indicates the type of packet received and its source AppleTalk address. This message is repeated in the fourth line because AppleTalk hosts can send multiple replies to a given GetNetInfo request.

Debug Apple-Routing

Use the debug apple-routing command to enable debugging output from the Routing Table Maintenance Protocol (RTMP) routines. This command can be used to monitor acquisition of routes, aging of routing table entries, and advertisement of known routes. It also reports conflicting network numbers on the same network if the network is misconfigured.


Note Because the debug apple-routing command can generate a lot of messages, you should only use it when the router's CPU utilization is less than 50 percent.

Figure 10-10 shows example debug apple-routing output.




Figure 10-10: Example Debug Apple-Routing Output

Explanations for representative lines of the debug apple-routing output in Figure 10-10 follow.

Table 10-6 describes the fields in the first line of example debug apple-routing output.


Debug Apple-Routing Field Descriptions--Part 1
Field Description
AT: Indicates that this is AppleTalk debugging output.
src = Ethernet0:4160.41 Indicates the source router interface and network address for the RTMP update packet.
dst = 4160-4160 Indicates the destination network address for the RTMP update packet.
size = 19 Size of this RTMP packet (in bytes).
2 rtes This RTMP update packet includes information on two routes.
RTMP pkt sent Indicates that this type of message describes an RTMP update packet that the router has sent (rather than one that it has received).

The following two messages indicate that the ager has started and finished the aging process for the routing table and that this table contains 97 entries.

AT: Route ager starting (97 routes)
AT: Route ager finished (97 routes)

Table 10-7 describes the fields in the following line of debug apple-routing output.

AT: RTMP from 4160.19 (new 0,old 94,bad 0,ign 0, dwn 0)

Debug Apple-Routing Field Descriptions--Part 2
Field Description
AT: Indicates that this is AppleTalk debugging output.
RTMP from 4160.19 Indicates the source address of the RTMP update the router received.
new 0 Indicates the number of routes in this RTMP update packet that the router did not already know about.
old 94 Indicates the number of routes in this RTMP update packet that the router already knew about.
bad 0 Number of routes the other router indicates have gone bad.
ign 0 Number of routes the other router indicates it does not care about.
dwn 0 Number of poisoned tuples included in this packet.

Debug Apple-ZIP

Use the debug apple-zip command to enable debugging output from the Zone Information Protocol (ZIP) routines. This command reports significant events such as discovery of new zones and zone list queries. It generates information similar to what debug apple-routing generates, but for ZIP packets instead of RTMP packets.

The debug apple-zip command can be used to determine whether a ZIP storm is taking place in the AppleTalk network. You can detect the existence of a ZIP storm when you see that no router on a cable has the zone name corresponding to a network number that all the routers have in their routing tables.

Figure 10-11 shows example debug apple-zip output.




Figure 10-11: Example Debug Apple-ZIP Output

Explanations of the lines of output shown in Figure 10-11 follow.

The first line indicates that the router has received an RTMP update that includes a new network number and is now requesting zone information.

AT: Sent GetNetInfo request broadcast on Ether0

The second line indicates that the neighbor at address 4160.19 replies to the zone request with a default zone.

AT: Recvd ZIP cmd 6 from 4160.19-6

In response, the third line shows that the router sends three queries to the neighbor at network address 4160.19 for other zones on the network.

AT: 3 query packets sent to neighbor 4160.19

The fourth line suggests that the neighbor at network address 4160.19 responds with a ZIP extended reply, indicating that one zone has been assigned to network 31902.

AT: 1 zones for 31902, ZIP XReply, src 4160.19

The fifth line indicates that the router responds that the zone name of network 31902 is US-Orlando, and the zone length of that zone name is 10.

AT: net 31902, zonelen 10, name US-Orlando

Debug ARP

Use the debug arp command to display information on ARP protocol transactions.

Use this command when some nodes on a TCP/IP network are responding, but others are not. It shows whether or not the router is sending or receiving ARPs.

Figure 10-12 shows example debug arp output.




Figure 10-12: Example Debug ARP Output

In Figure 10-12, each line of output represents an ARP packet that the router sent or received. Explanations for the individual lines of output follow.

The first line indicates that the router at IP address 131.108.22.7 and MAC address 0000.0c01.e117 sent an ARP request for the MAC address of the host at 131.108.22.96. The series of zeros (0000.0000.0000) following this address indicate that the router is currently unaware of the MAC address.

IP ARP: sent req src 131.108.22.7 0000.0c01.e117, dst 131.108.22.96 \
0000.0000.0000

The second line indicates that the router at IP address 131.108.22.7 receives a reply from the host at 131.108.22.96 indicating that its MAC address is 0800.2010.b908.

IP ARP: rcvd rep src 131.108.22.96 0800.2010.b908, dst 131.108.22.7

The third line indicates that the router receives an ARP request from the host at 131.108.6.10 requesting the MAC address for the host at 131.108.6.62.

IP ARP: rcvd req src 131.108.6.10 0000.0c00.6fa2, dst 131.108.6.62

The fourth line indicates that another host on the network attempted to send the router an ARP reply for the router's own address. The router ignores such bogus replies. This usually can happen if someone is running a bridge in parallel with the router and is allowing ARP to be bridged. It indicates a network misconfiguration.

IP ARP: rep filtered src 131.108.22.7 aa92.1b36.a456, dst 255.255.255.255 \
ffff.ffff.ffff 

The fifth line indicates that another host on the network attempted to inform the router that it is on network 131.108.9.0, but the router does not know that that network is attached to a different router interface. The remote host (probably a PC or an X terminal) is misconfigured. If the router were to install this entry, it would deny service to the real machine on the proper cable.

IP ARP: rep filtered src 131.108.9.7 0000.0c00.6b31, dst 131.108.22.7 \
0800.2010.b908

Debug Broadcast

Use the debug broadcast command to debug MAC broadcast packets.

Depending on the type of interface and the type of encapsulation used on that interface, the debug broadcast command can produce a wide range of messages.

Figure 10-13 shows example debug broadcast output. Notice how similar it is to the debug packet output shown in Figure 10-34.




Figure 10-13: Example Debug Broadcast Output

Table 10-8 describes significant fields shown in Figure 10-13.


Debug Broadcast Field Descriptions
Field Description
Ethernet0 Name of Ethernet interface that received the packet.
Broadcast States that this packet was a broadcast packet.
ARPA States that this packet uses ARPA-style encapsulation. Possible encapsulation styles vary depending on the media, as follows.

Media Type

Ethernet

Encapsulation Type

APOLLO

ARP

ETHERTALK

ISO1

ISO3

LLC2

NOVELL-ETHER

SNAP

Media Type

FDDI

Encapsulation Type

APOLLO

ISO1

ISO3

LLC2

SNAP

ARPA (continued) Media Type

Serial

Encapsulation Type

BFEX25

BRIDGE

DDN-X25

DDNX25-DCE

ETHERTALK

FRAME-RELAY

HDLC

HDH

LAPB

LAPBDCE

MULTI-LAPB

PPP

SDLC-PRIMARY

SDLC-SECONDARY

SLIP

SMDS

STUN

X25

X25-DCE

Media Type

Token Ring

Encapsulation Type

3COM-TR

ISO1

ISO3

MAC

LLC2

NOVELL-TR

SNAP

VINES-TR

Media Type

Ultranet

Encapsulation Type

ULTRANET

ULTRANET-HELLO

src 0000.0c00.6fa4 MAC address of the node generating the packet.
dst ffff.ffff.ffff.ffff MAC address of the destination node for the packet. This address is always the MAC broadcast address.
type 0x0800 Packet type (IP in this case).
data ... First 12 bytes of the datagram following the MAC header.
len 60 Length of the message that the interface received from the wire (in bytes).
size 128 Length of the message that the interface received from the wire (in bytes).
flags 0x8F00 HDLC or PPP flags field.
DLCI 7a The DLCI number on Frame Relay.

Debug DECnet-Connects

Use the debug decnet-connects command to enable logging of all connect packets that are filtered (permitted or denied) by DECnet access lists.

When using connect packet filtering, it may be helpful to use the decnet access-group configuration command to apply the following basic access list:

access-list 300 permit 0.0 63.1023
access-list 300 permit 0.0 63.1023 eq any

You can then log all connect packets transmitted on interfaces to which you applied this list, in order to determine those elements on which your connect packets must be filtered.

Figure 10-14 shows example debug decnet-connect output.




Figure 10-14: Example Debug DECnet-Connect Output

Table 10-9 describes significant fields shown in Figure 10-14.


Debug DECnet-Connects Field Descriptions
Field Description
DNET: Indicates that this is a DECnet packet.
list 300 item #2 matched Indicates that a packet matched the second item in access list 300.
src = 19.403 Indicates the source DECnet address for the packet.
dst = 19.309 Indicates the destination DECnet address for the packet.
on Ethernet0: Indicates the router interface on which the access list filtering the packet was applied.
permitted Indicates that the access list permitted the packet.
srcname = "RICK" Indicates the originator user of the packet.
srcuic = [0,017] Indicates the source UIC of the packet.
dstobj = 42 Indicates that DECnet object 42 is the destination.
ID = "USER" Indicates the access user.

Note Packet password and account information is not logged in the debug decnet-connects message, nor is it displayed by the show access EXEC command. If you specify password or account information in your access list, they will be viewable by anyone with access to your router's configuration.

Debug Frame-Relay

Use the debug frame-relay command to analyze the packets that have been received on a frame relay interface. (To analyze the packets that have been sent on a frame relay interface, use the debug frame-relay-packets command.)


Note Because the debug frame-relay command generates a lot of output, you should only use it when traffic on the frame relay network is less than 25 packets per second.

Figure 10-15 shows example debug frame-relay output.




Figure 10-15: Example Debug Frame-Relay-Packets Output

Table 10-10 describes significant fields shown in Figure 10-15.


Debug Frame-Relay Field Descriptions
Field Description
Serial0(i): Indicates that the Serial0 interface has received this frame relay datagram as input.
dlci 500(0x7C41) Value of the DLCI for this packet in decimal (and q922). In this case, 500 has been configured as the multicast DLCI.
pkt type 0x809B Indicates the packet type code.

Possible supported Ethernet type codes follow:

0x0200--PUP

0x0201--IP on 3MB net

0x0201--Xerox ARP on 10MB nets

0xCC--RFC 1294 (only for IP)

0x0600--XNS

0x0800--IP on 10MB net

0x0804--Chaos on 10MB net

0x0806--IP ARP

0x0808--Frame Relay ARP

0x0BAD--Vines IP

0x0BAE--Vines Loopback Protocol

0x0BAF--Vines Echo

0x6001--DEC MOP booting protocol

0x6002--DEC MOP console protocol

0x6003--DECnet Phase IV on Ethernet

0x6004--DEC LAT on Ethernet

0x8005--HP Probe

0x8035--RARP

0x8038--DEC spanning tree

0x809b--Apple EtherTalk

0x80f3--AppleTalk ARP

0x8019--Apollo domain

0x80C4--VINES IP

0x80C5-- VINES ECHO

0x8137--Novell IPX

0x9000--Ethernet loopback packet

Possible HDLC type codes follow:

0x1A58--Novell IPX, standard form

0xFEFE--CLNS

0xEFEF--ES-IS

0x1998--Uncompressed TCP

0x1999--Compressed TCP

0x6558--Serial line bridging

datagramsize 24 Size of this datagram (in bytes)

Debug Frame-Relay-Events

Use the debug frame-relay-events command to display information about frame relay ARP replies on networks that support a multicast channel and use dynamic addressing.

This command is most useful for identifying the cause of end-to-end connection problems during the installation of a frame relay network or node.


Note Because the debug frame-relay-events command does not generate a lot of output, you can use it even during production hours.

Figure 10-16 shows example debug frame-relay-events output.




Figure 10-16: Example Debug Frame-Relay-Events Output

As Figure 10-16 suggests, frame-relay-events returns one specific message type. The first line, for example, indicates that IP address 131.108.170.26 sent a frame relay ARP reply; this packet was received as input on the Serial2 interface. The last field (126) is the DLCI to use when communicating with the responding router.

Debug Frame-Relay-LMI

Use the debug frame-relay-lmi command to display information on the local management interface (LMI) packets exchanged by the router and the frame relay service provider.

You can use this command to determine whether the router and the frame relay switch are sending and receiving LMI packets properly.


Note Because the debug frame-relay-lmi command does not generate much output, you can use it even during periods of heavy traffic.

Figure 10-17 shows example debug frame-relay-lmi output.




Figure 10-17: Example Debug Frame-Relay-LMI Output

In Figure 10-17, the first three lines describe an LMI exchange. The first line describes the LMI request the router has sent to the switch. The second and third lines describe the response to this request from the switch. This LMI exchange is followed by two similar LMI exchanges. The last five lines in Figure 10-17 comprise a full LMI status message that includes a description of the router's two PVCs.

Table 10-11 describes significant fields in the first line of the debug frame-relay-lmi output shown in Figure 10-17.


Debug Frame-Relay-LMI Field Descriptions--Part 1
Field Description
Serial1(out) Indicates that the LMI request was sent out on the Serial1 interface.
clock 20212760 System clock (in milliseconds). Useful for determining whether an appropriate amount of time has transpired between events.
myseq 206 The myseq counter maps to the router's CURRENT SEQ counter, as described in the Frame Relay Specification with Extensions.
mineseen 205 The mineseen counter maps to the router's LAST RCVD SEQ counter, as described in the Frame Relay Specification with Extensions.
yourseen 136 The yourseen counter maps to the LAST RCVD SEQ counter of the switch, as described in the Frame Relay Specification with Extensions.
line up Indicates the line protocol up/down state.

Table 10-12 describes significant fields in the second and third lines of debug frame-relay-lmi output shown in Figure 10-17.


Debug Frame-Relay-LMI Field Descriptions--Part 2
Field Description
RT IE 1 Value of the report type information element.
length 1 Length of the Report Type Information Element (in bytes).
type 1 Report type in RT IE.
KA IE 3 Value of the keepalive information element.
length 2 Length of the Keep Alive Information Element (in bytes).
yourseq 138 The yourseq counter maps to the CURRENT SEQ counter of the switch, as described in the Frame Relay Specification with Extensions.
myseq 206 The myseq counter maps to the router's CURRENT SEQ counter, as described in the Frame Relay Specification with Extensions.

Table 10-13 describes significant fields in the last line of debug frame-relay-lmi output shown in Figure 10-17.


Debug Frame-Relay-LMI Field Descriptions--Part 3
Field Description
PVC IE 0x7 Value of the permanent virtual circuit information element type.
length 0x6 Length of the PVC IE (in bytes).
dlci 401 DLCI decimal value for this PVC.
status 0 Status value. Possible values include the following:

0x00--Added/inactive

0x02--Added/active

0x04--Deleted

0x08--New/inactive

0x0a--New/active

bw 0x0 DAC0 CIR (committed information rate), in hex, for the DLCI.

Debug Frame-Relay-Packets

Use the debug frame-relay-packets command to analyze the packets that have been sent on a frame relay interface. (To analyze the packets that have been received on a frame relay interface, use the debug frame-relay command.)


Note Because the debug frame-relay-packets command generates a lot of output, you should only use it when traffic on the frame relay network is less than 25 packets per second.

Figure 10-18 shows example debug frame-relay-packets output.




Figure 10-18: Example Debug Frame-Relay-Packets Output

As Figure 10-18 shows, debug frame-relay-packets output is made up of groups of output lines; each group describes a frame relay packet that has been sent. The number of lines in the group can vary, depending on the number of DLCIs on which the packet was sent. For example, the first two pairs of output lines describe two different packets, both of which were sent out on a single DLCI. The last three lines in Figure 10-18 describe a single frame relay packet that was sent out on two DLCIs.

Table 10-14 describes significant fields shown in the first pair of output lines in Figure 10-18.


Debug Frame-Relay-Packets Field Descriptions
Field Description
Serial0: Indicates the interface that has sent the frame relay packet.
broadcast = 1 Indicates the destination of the packet. Possible values include the following:

  • broadcast = 1--Broadcast address

  • broadcast = 0--Particular destination

  • broadcast search--Searches all frame-relay map entries for this particular protocol that include the keyword broadcast.

link 809B

Indicates the packet type, as documented under Debug Frame-Relay.
addr 65535.255 Indicates the destination protocol address for this packet. In this case, it is an AppleTalk address.
Serial0(o): (o) indicates that this is an output event.
DLCI 500 Decimal value of the DLCI.
type 809B Indicates the packet type, as documented under Debug Frame-Relay.
size 24 Size of this packet (in bytes).

The discussion that follows describes the other lines of debug frame-relay-packet output shown in Figure 10-18.

The following group of output lines describes a frame relay packet sent to a particular address; in this case AppleTalk address 10.2.

Serial0: broadcast - 0, link 809B, addr 10.2
Serial0(o):DLCI 100 type 809B size 104

The following group of output lines describes a frame relay packet sent to a true broadcast address.

Serial1: broadcast search
Serial1(o):DLCI 400 type 800 size 288

The following group of output lines describes a frame relay packet that went out on two different DLCIs, because two frame relay map entries were found.

Serial0: broadcast search
Serial0(o):DLCI 300 type 809B size 24
Serial0(o):DLCI 400 type 809B size 24

Debug IP-ICMP

Use the debug ip-icmp command to enable logging of ICMP transactions.

This command is useful for determining whether the router is sending and/or receiving ICMP messages, when troubleshooting an end-to-end connection problem, for example.

Figure 10-19 shows example debug ip-icmp output.




Figure 10-19: Example Debug IP-ICMP Output

Table 10-15 describes significant fields shown in the first line of debug ip-icmp output shown in Figure 10-19.


Debug IP-ICMP Field Descriptions--Part 1
Field Description
ICMP: Indicates that this message describes an ICMP packet.
rcvd type 3 The type field can be one of the following:

0--Echo Reply

3--Destination Unreachable

4--Source Quench

5--Redirect

8--Echo

9--Router Discovery Protocol Advertisement

10--Router Discovery Protocol Solicitations

11--Time Exceeded

12--Parameter Problem

13-- Timestamp

14--Timestamp Reply

15--Information Request

16--Information Reply

17--Mask Request

18--Mask Reply

code 1 The next field is a code. The meaning of the code depends upon the type field value:

Echo and Echo Reply--The code field is always zero.

Destination Unreachable--The code field can have the following values:

0--Network unreachable

1--Host unreachable

2--Protocol unreachable

3--Port unreachable

4--Fragmentation needed and DF bit set

5--Source route failed

Source Quench--The code field is always 0.

Redirect--The code field can have the following values:

0--Redirect datagrams for the Network

1--Redirect datagrams for the Host

2--Redirect datagrams for the Type of Service and Network

3--Redirect datagrams for the Type of Service and Host

code 1 (continued) Router Discovery Protocol Advertisements and Solicitations--The code field is always zero.

Time Exceeded--The code field can have the following values:

0--Time to live exceeded in transit

1--Fragment reassembly time exceeded

Parameter Problem--The code field can have the following values:

0--General problem

1--Option is missing

2--Option missing, no room to add

Timestamp and Timestamp Reply--The code field is always zero.

Information Request and Information Reply--The code field is always zero.

Mask Request and Mask Reply--The code field is always zero.

from 128.95.192.4 Indicates the source address of the ICMP packet.

Table 10-16 describes significant fields shown in the second line of debug ip-icmp output in Figure 10-19.


Debug IP-ICMP Field Descriptions--Part 2
Field Description
ICMP: Indicates that this messages describes an ICMP packet.
src 36.56.0.202 The address of the sender of the echo.
dst 131.108.16.1 The address of the receiving router.
echo reply Indicates the router received an echo reply.

Other messages that the debug ip-icmp command can generate follow.

When an IP router or host sends out an ICMP mask request, the following message is generated when the router sends a mask reply.

ICMP: sending mask reply (255.255.255.0) to 160.89.80.23 via Ethernet0

The following two lines are examples of the two forms of this message. The first form is generated when a mask reply comes in after the router sends out a mask request. The second form occurs when the router receives a mask reply with a nonmatching sequence and ID. See Appendix I of RFC 950 for details.

ICMP: mask reply 255.255.255.0 from 160.89.80.31
ICMP: unexpected mask reply 255.255.255.0 from 160.89.80.32

The following output indicates that the router sent a redirect packet to the host at address 160.89.80.31, instructing that host to use the gateway at address 160.89.80.23 in order to reach the host at destination address 131.108.1.111.

ICMP: redirect sent to 160.89.80.31 for dest 131.108.1.111 use gw 160.89.80.23

The following message indicates that the router received a redirect packet from the host at address 160.89.80.23, instructing the router to use the gateway at address 160.89.80.28 in order to reach the host at destination address 160.89.81.34.

ICMP: redirect rcvd from 160.89.80.23 -- for 160.89.81.34 use gw 160.89.80.28

The following message is displayed when the router sends an ICMP packet to the source address (160.89.94.31 in this case) indicating that the destination address (131.108.13.33 in this case) is unreachable.

ICMP: dst (131.108.13.33) host unreachable sent to 160.89.94.31

The following message is displayed when the router receives an ICMP packet from an intermediate address (160.89.98.32 in this case) indicating that the destination address (131.108.13.33 in this case) is unreachable.

ICMP: dst (131.108.13.33) host unreachable rcv from 160.89.98.32

Depending on the code received (as Table 10-15 describes), any of the unreachable messages can have any of the following instead of the "host" string in the message:

net
protocol
port
frag. needed and DF set
source route failed
prohibited

The following message is displayed when the TTL in the IP header reaches zero and a time exceed ICMP message is sent. The fields are self-explanatory.

ICMP: time exceeded (time to live) send to 128.95.1.4 (dest was 131.108.1.111)

The following message is generated when parameters in the IP header are corrupted in some way and the parameter problem icmp message is sent. Fields are self-explanatory.

ICMP: parameter problem sent to 128.121.1.50 (dest was 131.108.1.111)

Based on the preceding information, the remaining output should be easily understood.

ICMP: parameter problem rcvd 160.89.80.32
ICMP: source quench rcvd 160.89.80.32
ICMP: source quench sent to 128.121.1.50 (dest was 131.108.1.111)
ICMP: sending time stamp reply to 160.89.80.45
ICMP: sending info reply to 160.89.80.12
ICMP: rdp advert rcvd type 9, code 0, from 160.89.80.23
ICMP: rdp solicit rcvd type 10, code 0, from 160.89.80.43

Note For more information about the fields in debug ip-icmp output, see RFC-792, "Internet Control Message Protocol;" Appendix I of RFC-950, "Internet Standard Subnetting Procedure;" and RFC-1256, "ICMP Router Discovery Messages."

Debug IP-IGRP

Use the debug ip-igrp command to display IGRP routing transactions.

Syntax for the debug ip-igrp command follows.

debug ip-igrp [ip-address]

If the IP address of an IGRP neighbor is specified, the resulting debug ip-igrp output will include messages describing updates from that neighbor and updates that the router broadcasts toward that neighbor.

When there are many networks in your routing table, debug ip-igrp can flood the console and make the router unusable. In this case, use debug ip-igrp-events instead to display summary routing information.

Figure 10-20 shows example debug ip-igrp output.




Figure 10-20: Example Debug IP-IGRP Output

Figure 10-20 shows that the router being debugged has received updates from two other routers on the network. The router at source address 160.89.80.240 sent information about 10 destinations in the update; the router at source address 160.89.80.28 sent information about three destinations in its update. The router being debugged also sent updates--in both cases to the broadcast address 255.255.255.255 as the destination address.

The first line in Figure 10-20 is self explanatory.

On the second line in Figure 10-20, the first field refers to the type of destination information: "subnet" (interior), "network" (system) or "exterior" (exterior). The second field is the Internet address of the destination network. The third field is the metric stored in the routing table and the metric advertised by the neighbor sending the information. "Metric ... inaccessible" usually means that the neighbor router has put the destination in holddown.

The entries in Figure 10-20 showing that the router is sending updates are similar, except that the numbers in parentheses are the source addresses used in the IP header. A metric of 16777215 is inaccessible.

Other examples of output that the debug ip-igrp command can produce follow.

The following entry indicates that the routing table was updated and shows the new edition number (97 in this case) to be used in the next IGRP update.

IGRP: edition is now 97

Entries such as the following occur on startup or when some event occurs such as an interface transitioning or a user manually clearing the routing table.

IGRP: broadcasting request on Ethernet0
IGRP: broadcasting request on Ethernet1

The following type of entry can result when routing updates become corrupted between sending and receiving routers.

IGRP: bad checksum from 160.89.64.43

An entry such as the following should never appear. If it does, the receiving router has a bug in the software or a problem with the hardware. In either case, contact your technical support representative.

IGRP: system 45 from 160.89.64.234, should be system 109

Debug IP-IGRP-Events

Use the debug ip-igrp-events command to display summary IGRP routing messages that indicate the source and destination of each update, as well as the number of routes in each update. Messages are not generated for each route.

Syntax for the debug ip-igrp-events command follows.

debug ip-igrp-events [ip-address]

If the IP address of an IGRP neighbor is specified, the resulting debug ip-igrp-events output will include messages describing updates from that neighbor and updates that the router broadcasts toward that neighbor.

This command is particularly useful when there are many networks in your routing table. In this case, using debug ip-igrp could flood the console and make the router unusable. Use debug ip-igrp-events instead to display summary routing information.

Figure 10-21 shows example debug ip-igrp-events output.




Figure 10-21: Example Debug IP-IGRP Events Output

Figure 10-21 shows that the router has sent two updates to the broadcast address 255.255.255.255. The router also received two updates. Three lines of output describe each of these updates. Explanations for representative lines of output from Figure 10-20 follow.

The first line of output, as follows, indicates whether the router sent or received the update packet, the source or destination address, and the interface through which the update was sent or received. If the update was sent, the IP address assigned to this interface is shown (in parentheses).

IGRP: sending update to 255.255.255.255 via Ethernet1 (160.89.33.8)

The second line of output summarizes the number and types of routes described in the update.

IGRP: Update contains 26 interior, 40 system, and 3 exterior routes.

The third line of output indicates the total number of routes described in the update.

IGRP: Total routes in update: 69

Debug IP-OSPF-Events

Use the debug ip-ospf-events command to generate information concerning OSPF- related events, such as adjacencies, flooding information, designated router selection, and SPF calculation.

Figure 10-22 shows example debug ip-ospf-events output.




Figure 10-22: Example Debug IP-OSPF-Events Output

The debug ip-ospf-events output shown in Figure 10-22 might appear if any of the following occurs:

If a router configured for OSPF routing is not seeing an OSPF neighbor on an attached network, do the following:

In the following example line, the neighbor and this router are not part of a stub area (that is, one is a part of transit area and the other is a part of stub area, as explained on page 92 of RFC 1247).

OSPF: hello packet with mismatched E bit

Debug IP-Packet

Use the debug ip-packet command to display general IP debugging information and IPSO security transactions.


Note Because the debug ip-packets command generates a fair amount of output, you should only use it when traffic on the IP network is low.

If a communication session is closing when it should not be, an end-to-end connection problem can be the cause. The debug ip-packet command is useful for analyzing the messages traveling between the local and remote hosts.

IP debugging information includes packets received, generated, and forwarded. Fast-switched packets do not generate messages.

IPSO security transactions include messages that describe the cause of failure each time a datagram fails a security test in the system. This information also is sent to the sending host when the router configuration allows it.

The syntax for the debug ip-packet command follows:

debug ip-packet [list]

In this syntax statement, list is an optional IP access list that you can specify. If the datagram is not permitted by that access list, the related debugging output is suppressed.

Figure 10-23 shows example debug ip-packet output.




Figure 10-23: Example Debug IP-Packet Output

Figure 10-23 shows two types of messages that debug ip-packet can produce; the first line of output describes an IP packet that the router forwards, and the third line of output describes a packet that is destined for the router. In the third line of output, "rcvd 2" indicates that the router decided to receive the packet.

Table 10-17 describes the fields shown in the first line of Figure 10-23.


Debug IP-Packet Field Descriptions
Field Description
IP: Indicates that this is an IP packet
s = 131.108.13.44 (Fddi0) Indicates the source address of the packet and the name of the interface that received the packet
d = 157.125.254.1 (Serial2) Indicates the destination address of the packet and the name of the interface (in this case, S2)through which the packet is being sent out on the network
g = 131.108.16.2 Indicates the address of the next hop gateway
forward Indicates that the router is forwarding the packet. If a filter denies a packet, "access denied" replaces "forward," as shown in the last line of output in Figure 10-23.

The calculation on whether to send an security error message can be somewhat confusing. It depends upon both the security label in the datagram and the label of the incoming interface. First, the label contained in the datagram is examined for anything obviously wrong. If nothing is wrong, it should be assumed to be correct. If there is something wrong, the datagram should be treated as unclassified genser. Then this label is compared with the interface range, and the appropriate action is taken, as Table 10-18 describes.


Security Actions
Classification Authorities Action Taken
Too low Too low

Good

Too high

No Response

No Response

No Response

In range Too low

Good

Too high

No Response

Accept

Send Error

Too high Too Low

In range

Too high

No Response

Send Error

Send Error

The range of ICMP error messages that can be generated by the security code is very small. The only possible error messages and their meanings follow:


Note The message "ICMP Parameter problem, code 2" identifies a very specific error that occurs in the processing of a datagram. This message indicates that the router received a datagram containing a maximum length IP header, but no security option. After being processed and routed to another interface, it is discovered that the outgoing interface is marked with "add a security label." Since the IP header is already full, the system cannot add a label and must drop the datagram and return an error message.

Debug IP-RIP

Use the debug ip-rip command to enable logging of RIP routing transactions.

Figure 10-24 shows example debug ip-rip output.




Figure 10-24: Example Debug IP-RIP Output

Figure 10-24 shows that the router being debugged has received updates from one router at source address 160.89.80.28. That router sent information about five destinations in the routing table update. Notice that the fourth destination address in the update--131.108.0.0--is inaccessible because it is more than 15 hops away from the router sending the update. The router being debugged also sent updates--in both cases to the broadcast address 255.255.255.255 as the destination address.

The first line in Figure 10-24 is self-explanatory.

The second line in Figure 10-24 is an example of a routing table update. It shows how many hops a given Internet address is from the router.

The entries in Figure 10-24 showing that the router is sending updates are similar, except that the number in parentheses is the source address encapsulated into the IP header.

Examples of additional output that the debug ip-rip command can generate follow.

Entries such as the following appear at startup or when some event occurs such as an interface transitioning or the user manually clearing the routing table.

RIP: broadcasting general request on Ethernet0
RIP: broadcasting general request on Ethernet1

The following line is self-explanatory.

RIP: received request from 160.89.80.207 on Ethernet0

An entry such as the following is most likely caused by a malformed packet from the transmitter.

RIP: bad version 128 from 160.89.80.43

Debug IP-TCP

Use the debug ip-tcp command to display significant TCP transactions such as state changes, retransmissions, and duplicate packets.

This command is particularly useful for debugging a performance problem on a TCP/IP network that you have isolated above the data link layer.

The debug ip-tcp command displays output for packets the router sends and receives, but does not display output for packets it forwards.

Figure 10-25 shows example debug ip-tcp output.




Figure 10-25: Example Debug IP-TCP Output

Table 10-19 describes significant fields shown in Figure 10-25.


Debug IP-TCP Field Descriptions
Field Description
TCP: Indicates that this is a TCP transaction.
sending SYN Indicates that a synchronize packet is being sent.
seq 168108 Indicates the sequence number of the data being sent.
ack 88655553 Indicates the sequence number of the data being acknowledged.
TCP0: Indicates the TTY number (0, in this case) with which this TCP connection is associated.
Connection to 26.9.0.13:22530 Indicates the remote address with which a connection has been established.
advertising MSS 966 Indicates the maximum segment size the TCP connection will allow.
state was LISTEN -> SYNSENT Indicates that the TCP state machine changed state from LISTEN to SYNSENT. Possible TCP states follow.

ESTAB--Connection established.

LISTEN--Listening for a connection request.

SYNRCVD--Received a SYN packet.

SYNSENT--Sent a SYN packet.

[23 -> 26.9.0.13(22530)] Within these brackets:

The first field (23) indicates local TCP port.

The second field (26.9.0.13) indicates the destination IP address.

The third field (22530) indicates the destination TCP port.

restart retransmission in 5996 Indicates the number of milliseconds until the next retransmission takes place.

Debug LAPB

Use the debug lapb command to display all traffic for interfaces using LAPB encapsulation. This command displays information on the X.25 layer 2 protocol. It is useful to users who are familiar with the LAPB protocol.

You can use debug lapb to determine why X.25 virtual circuits or LAPB connections are going up and down. It is also useful for identifying link problems, as evidenced when show interface displays a high number of rejects or frame errors over the X.25 link.

**before**Because the debug lapb command generates a lot of output, you should only use it when the aggregate of all LAPB traffic on X.25 and LAPB interfaces is less than five frames per second.@@before@@Caution **after**Because the debug lapb command generates a lot of output, you should only use it when the aggregate of all LAPB traffic on X.25 and LAPB interfaces is less than five frames per second.@@after@@

Figure 10-26 shows example debug lapb output.




Figure 10-26: Example Debug LAPB Output--Part 1

In Figure 10-26, each line of output describes a LAPB event. There are two types of LAPB events: frame events (when a frame enters or exits the router) and timer events. In Figure 10-26, the last line describes a timer event; all of the other lines describe frame events. Table 10-20 describes the first six fields shown in Figure 10-26.


Debug LAPB Field Descriptions--Part 1
Field Description
First field Interface type and unit number reporting the frame event.
Second field Protocol providing the information.
Third field Type of frame event. Possible values follow:

I--Frame input

O--Frame output

T--T1 timer expired

Fourth field State of the protocol when the frame event occurred. Possible values follow:

BUSY

CONNECT

DISCONNECT

DISCSENT (disconnect sent)

ERROR (FRMR frame sent)

REJSENT (reject frame sent)

SABMSENT (SABM frame sent)

Fifth field In a frame event, this value is the size of the frame (in bytes). In a timer event, this value is the current timer value (in milliseconds).
Sixth field In a frame event, this value is the frame type name. Possible values for frame type names follow:

DISC--Disconnect

DM--Disconnect mode

FRMR--Frame reject

IFRAME--Information frame

ILLEGAL--Illegal LAPB frame

REJ--Reject

RNR--Receiver not ready

RR--Receiver ready

SABM--Set asynchronous balanced mode

UA--Unnumbered acknowledgment

In a timer event, this value is the number of retransmissions already attempted.

Subsequent fields As Figure 10-26 shows, a timer event only displays the first six fields of debug lapb output. For frame events, however, the fields that follow the sixth field document the LAPB control information present in the frame. Depending on the value of the frame type name shown in the sixth field, these fields may or may not appear. Descriptions of the fields following the first six fields shown in Figure 10-26 follow.

If the frame's Poll/Final bit is set, an indicator will be printed after the frame type name. Possible values follow:

After the Poll/Final indicator, depending on the frame type, three different types of LAPB control information can be printed.

For information frames, the value of the N(S) field and the N(R) field will be printed. The N(S) field of an information frame is the sequence number of that frame, so this field will rotate between 0 and 7 for successive outgoing information frames and (under normal circumstances) also will rotate for incoming information frame streams. The N(R) field is a "piggybacked" acknowledgement for the incoming information frame stream; it informs the other end of the link what sequence number is expected next.

RR, RNR and REJ frames have an N(R) field, so the value of that field is printed. This field has exactly the same significance that it does in an information frame.

For the FRMR frame, the frame's three bytes of error information is printed (in hexadecimal).

The remaining frames do not have these data, so nothing will be printed.

Finally, for incoming frames, the last field will indicate if the received frame was a command (C) or a response (R).

Debug LNM-Events

Use the debug lnm-events command to display any unusual events that occur on a Token Ring network. This includes such things as stations reporting errors, error thresholds being exceeded, and so on.

Figure 10-27 shows sample debug lmn-events output.




Figure 10-27: Example Debug LMN-Events Output

Explanations for the messages shown in Figure 10-27 follow.

The following message indicates that station 0000.0300.1234 reported errors and has been added to the list of stations reporting errors. This station is located on Ring 3.

IBMNM3: Adding 0000.0300.1234 to error list

The following message indicates that the station has passed the "early warning" threshold for error counts.

IBMNM3: Station 0000.0300.1234 going into preweight condition

The following message indicates that station 0000.0300.1234 is experiencing a severe number of errors.

IBMNM3: Station 0000.0300.1234 going into weight condition

The following message indicates that the station's error counts have all decayed to zero, so this station is being removed from the list of stations that have reported errors.

IBMNM3: Removing 0000.0300.1234 from error list

The following message indicates that Ring 0 has entered failure mode. This ring number is assigned internally.

LANMGR0: Beaconing is present on the ring.

The following message indicates that Ring 0 is no longer in failure mode. This ring number is assigned internally.

LANMGR0: Ring is no longer beaconing

The following message indicates that the router is beginning its attempt to determine whether or not any stations left the ring during the automatic recovery process for the last beaconing failure. The router attempts to contact stations that were part of the fault domain to see if they are still operating on the ring.

IBMNM3: Beaconing, Postmortem Started

The following message indicates that the router is attempting to determine whether or not any stations left the ring during the automatic recovery process for the last beaconing failure. It heard back from station 0000.0300.1234, one of the two stations in the fault domain.

IBMNM3: Beaconing, heard from 0000.0300.1234

The following message indicates that the router is attempting to determine whether or not any stations left the ring during the automatic recovery process for the last beaconing failure. It is initiating another attempt to contact the two stations in the fault domain.

IBMNM3: Beaconing, Postmortem Next Stage

The following output indicates that the router has attempted to determine whether or not any stations left the ring during the automatic recovery process for the last beaconing failure. It has successfully heard back from both stations that were part of the fault domain.

IBMNM3: Beaconing, Postmortem Finished

Explanations for other messages that the debug lnm-events command can generate follow.

The following message indicates that the router is out of memory.

LANMGR: memory request failed, find_or_build_station()

The following message indicates that Ring number 3 is experiencing a large number of errors that cannot be attributed to any individual station.

IBMNM3: Non-isolating error threshold exceeded

The following message indicates that a station (or stations) on Ring 3 are receiving frames faster than they can be processed.

IBMNM3: Adapters experiencing congestion

The following message indicates that the beaconing has lasted for over one minute and is considered to be a "permanent" error.

IBMNM3: Beaconing, permanent

The following message indicates that the beaconing lasted for less than one minute. The router is attempting to determine whether either of the stations in the fault domain left the ring.

IBMNM: Beaconing, Destination Started

In the preceding line of output, the following can replace Started: Next State; Finished; Timed out; and cannot find station 0000.0301.4876.



Debug LNM-LLC

Use the debug lnm-llc command to display all communication between the router/bridge and the LNMs that have connections to it. One line is displayed for each message sent or received.

Figure 10-28 shows sample debug lnm-llc output.




Figure 10-28: Example Debug LMN-LLC Output

As Figure 10-28 indicates, debug lmn-llc output can vary somewhat in format. Table 10-21 describes significant fields shown in the first line of output in Figure 10-28.


Debug LNM-LLC Field Descriptions
Field Description
IBMNM: Indicates that this line of output displays LLC-level debugging information.
Received Indicates that the router received a frame. The other possible value is Sending, to indicate that the router is sending a frame.
RS Indicates which function of the LLC-level software is communicating:

CRS--Configuration Report Server

LBS--LAN Bridge Server

LRM--LAN Reporting Manager

REM--Ring Error Monitor

RPS--Ring Parameter Server

RS--Ring Station

Set Reporting Point Name of the specific frame that the router sent or received. Possible values include the following:

Bridge Counter Report

Bridge Parameters Set

Bridge Parameters Changed Notification

CRS Remove Ring Station

CRS Request Station Information

CRS Report Station Information

CRS Report NAUN Change

CRS Ring Station Removed

LRM LAN Manager Accepted

New Reporting Link Established

REM Forward MAC Frame

REM Parameters Changed Notification

REM Parameters Set

Report Bridge Status

Report LAN Manager Control Shift

Report REM Status

Request Bridge Status

Set Reporting Point (continued) Request REM Status

Set Bridge Parameters

Set REM Parameters

LRM Set Reporting Point

from 4000.3040.a670 If the router has received the frame, this address is the source address of the frame. If the router is sending the frame, this address is the destination address of the frame.

Explanations for other types of messages shown in Figure 10-28 follow.

The following message indicates that the lookup for the bridge with which the LAN Manager was requesting to communicate was successful.

IBMNM: found bridge: 001-2-00A, addresses: 0000.3040.a630 4000.3040.a630

The following message is self-explanatory.

IBMNM: Opening connection to 1000.5ade.0d8a on TokenRing0

The following message indicates that a LAN Manager has connected or disconnected from an internal bridge, and that the router computes which LAN Manager is allowed to change parameters.

IBMNM: Determining new controlling LNM

The following line of output indicates which bridge in the router is the destination for the frame.

IBMNM: Bridge 001-2-00A received Request Bridge Status from 1000.5ade.0d8a.

Debug LNM-MAC

Use the debug lnm-mac command to display all management communication between the router/bridge and all stations on the local Token Rings. One line is displayed for each message sent or received.

Figure 10-29 shows sample debug lnm-mac output.




Figure 10-29: Example Debug LNM-MAC Output

Table 10-22 describes significant fields shown in the first line of output in Figure 10-29.


Debug LNM-MAC Field Descriptions
Field Description
LANMGR0: LANMGR indicates that this line of output displays MAC-level debugging information. 0 indicates the number of the Token Ring interface associated with this line of debugging output.
RS Indicates which function of the MAC level software is communicating:

CRS--Configuration Report Server

REM--Ring Error Monitor

RPS--Ring Parameter Server

RS--Ring Station

received Indicates that the router received a frame. The other possible value is sending, to indicate that the router is sending a frame.
request address Name of the specific frame that the router sent or received. Possible values include the following:

AMP

Initialize station

Report address

Report attachments

Report NAUN change

Report soft error

Report state

Request address

Request attachments

Request initialization

Request state

Ring purge

SMP

from 4000.3040.a670 If the router has received the frame, this address is the source address of the frame. If the router is sending the frame, this address is the destination address of the frame.

As Figure 10-29 indicates, all debug lnm-mac messages follow the format described in Table 10-22 except the following:

LANMGR2: RS start watching ring poll
LANMGR2: RS stop watching ring poll

This message indicates that the router stops receiving AMP and SMP frames. These frames are used to build a current picture of which stations are on the ring.

Debug Local-ACK-State

Use the debug local-ack-state command to print out the new and the old state conditions whenever there is a state change in the Local Acknowledgment state machine.

Figure 10-30 shows example debug local-ack-state output.




Figure 10-30: Example Debug Local-ACK-State Output

Table 10-23 describes significant fields shown in Figure 10-30.


Debug Local-ACK-State Field Descriptions
Field Description
LACK_STATE: Indicates that this packet describes a state change in the Local Acknowledgment state machine.
2370300 System clock
hashp 2AE628 Internal control block pointer used by technical support staff for debugging purposes.
old state = disconnected Indicates the old state condition in the Local Acknowledgment state machine. Possible values include:

Disconnected

Awaiting LLC2 open to finish

Connected

Awaiting linkdown response

Disconnected

new state = awaiting LLC2 open to finish Indicates the new state condition in the Local Acknowledgment state machine. Possible values include:

Disconnected

Awaiting LLC2 open to finish

Connected

Awaiting linkdown response

Disconnected

Debug Novell-Packet

Use the debug novell-packet command to output information about packets received, transmitted, and forwarded.

This command is useful for learning whether Novell packets are traveling over a router.


Note In order to generate debug novell-packet information on all Novell traffic traveling over the router, you must first configure the router so that fast switching is disabled. Use the no novell route-cache command on all interfaces on which you want to observe traffic. If the router is configured for Novell fast-switching, only Novell broadcast packets (SAP, RIP, and Novell NetBIOS) will be displayed.

Figure 10-31 shows example debug novell-packet output.




Figure 10-31: Example Debug Novell-Packet Output

In Figure 10-31, the first line indicates that the router receives a packet from a Novell station (address 160.0260.8c4c.4f22); this trace does not indicate the address of the immediate router sending the packet to this router. In the second line, the router forwards the packet toward the Novell server (address 1.0000.0000.0001) through an immediate router (183.0000.0c01.5d85).

Table 10-24 describes significant fields shown in Figure 10-31.


Debug Novell-Packet Field Descriptions
Field Description
Novell Shows that this is a Novell IPX packet.
src = 160.0260.8c4c.4f22 Source address of the Novell packet. The Novell network number is 160. Its MAC address is 0260.8c4c.4f22.
dst = 1.0000.0000.0001 Destination address for the Novell packet. The address 0000.0000.0001 is an internal MAC address, and the network number 1 is the internal network number of a Novell 3.11 server.
packet received The router received this packet from a Novell station, possibly through an intermediate router.
gw = 183.0000.0c01.5d85 The router is sending the packet over to the next hop router; its address of 183.0000.0c01.5d85 was learned from the Novell routing table.
sending packet The router is attempting to send this packet.

Debug Novell-Routing

Use the debug novell-routing command to print out information on Novell routing packets that the router sends and receives.

Figure 10-32 shows example debug novell-routing output.




Figure 10-32: Example Debug Novell-Routing Output

Table 10-25 describes significant fields shown in Figure 10-32.


Debug Novell-Routing Field Descriptions
Field Description
NovellRIP Shows that this is a Novell RIP packet.
update from 9999.0260.8c6a.1733 Indicates that this packet is a routing update from a Novell server at address 9999.0260.8c6a.1733.
110801 in 1 hops Indicates that network 110801 is one hop away from the router at address 9999.0260.8c6a.1733.
delay 2 A time measurement (1/18th second) that the NetWare shell uses to estimate how long to wait for a response from a file server. Also known as ticks.
sending update to 12FF02:ffff.ffff.ffff via Ethernet 1 The router is sending this Novell routing update packet to address 12FF02:ffff.ffff.ffff through its Ethernet 1 interface.
network 555 Indicates that the packet includes routing update information for network 555.
metric 2 Indicates that network 555 is two metrics (or hops) away from the router.
delay 3 Indicates that network 555 is a delay of 3 away from the router. Delay is a measurement that the NetWare shell uses to estimate how long to wait for a response from a file server. Also known as ticks.

Debug Novell-SAP

Use the debug novell-sap command to display additional information about Novell Service Advertisement (SAP) packets.

Normally, a router or server sends out one SAP update per minute. Each SAP packet can include up to seven entries. If many servers are advertising on the network, the router sends out multiple packets per update. For example, if a router has 20 entries in the SAP table, it would send three SAP packets per update. The first SAP would include the first seven entries, the second SAP would include the next seven entries, and the last update would include the last six entries.

Figure 10-33 shows example debug novell-sap output.




Figure 10-33: Example Debug Novell-SAP Output

As Figure 10-33 shows, the debug novell-sap command generates multiple lines of output for each SAP packet--a packet summary message and a service detail message.

Explanations for representative lines of output from Figure 10-33 follow.

The first line of output displays the internal router memory address of the packet. Cisco support staff use this information in problem debugging.

NovellSAP: at 0023F778:

Table 10-26 describes the fields shown in the second line of output in Figure 10-33.


Debug Novell-SAP Field Descriptions--Part 1
Field Description
I Indicates whether the router received the SAP packet as input (I) or is sending an update (O).
SAP Response type 0x2 Indicates the packet type. Format is 0xn; possible values for n include:

1--General query

2--General response

3--Get nearest server request

4--Get nearest server response

len 160 Length of this packet (in bytes).
src: 160.000.0c00.070d Indicates the source address of the packet.
dest:160.ffff.ffff.ffff Indicates the Novell network number and broadcast address of the destination Novell network for which the message is intended.
(452) Novell socket number of the process sending the packet at the source address. This number is always 452, which is the socket number for the SAP process.

Table 10-27 describes the fields shown in the third line of output in Figure 10-33.


Debug Novell-SAP Field Descriptions--Part 2
Field Description
type 0x4 Indicates the type of service the server sending the packet provides. Format is 0xn. Some of the values for n are proprietary to Novell. Those values for n that have been published include:

0--Unknown

1--User

2--User group

3--Print queue

4--File server

5--Job server

6--Gateway

7--Print server

8--Archive queue

9--Archive server

A--Job queue

B--Administration

24--Remote bridge server

47--Advertising print server

Contact Novell for more information.

"HELLO2" Name of the server being advertised.
199.0002.0004.0006 (451) Indicates the network number and address (and socket) of the server generating the SAP packet.
2 hops Number of hops to the server from the router.

The fifth line of output, which follows, indicates that the router sent a SAP update to network 160.

NovellSAP: sending update to 160

As Figure 10-33 shows, the format for debug novell-sap output describing a SAP update the router sends is similar to that describing a SAP update the router receives, except that the ssoc: field replaces the src: field, as the following line of output from Figure 10-33 indicates.

O SAP Update type 0x2 len 96 ssoc:0x452 dest:160.ffff.ffff.ffff(452)

Table 10-28 describes possible values for the ssoc: field.


Debug Novell-SAP Field Descriptions--Part 3
Field Description
ssoc:0x452 Indicates the Novell socket number of the process sending the packet at the source address. Possible values include:

451--Network Core Protocol

452--Service Advertising Protocol

453--Routing Information Protocol

455--NetBIOS

456--Diagnostics

4000 to 6000--Ephemeral sockets used for interaction with file servers and other network communications

Debug Packet

Use the debug packet command to log packets that the network is unable to classify.

Figure 10-34 shows example debug packet output. Notice how similar it is to debug broadcast output.




Figure 10-34: Example Debug Packet Output

Table 10-29 describes significant fields shown in Figure 10-34.


Debug Packet Field Descriptions
Field Description
Ethernet0 Name of the Ethernet interface that received the packet.
Unknown States that the network was unable to classify this packet. Examples include packets with unknown link types.
ARPA States that this packet uses ARPA-style encapsulation. Possible encapsulation styles vary depending on the media, as follows.

Media Type

Ethernet

Encapsulation Type

APOLLO

ARP

ETHERTALK

ISO1

ISO3

LLC2

NOVELL-ETHER

SNAP

Media Type

FDDI

Encapsulation Type

APOLLO

ISO1

ISO3

LLC2

SNAP

ARPA (continued) Media Type

Serial

Encapsulation Type

BFEX25

BRIDGE

DDN-X25

DDNX25-DCE

ETHERTALK

FRAME-RELAY

HDLC

HDH

LAPB

LAPBDCE

MULTI-LAPB

PPP

SDLC-PRIMARY

SDLC-SECONDARY

SLIP

SMDS

STUN

X25

X25-DCE

Media Type

Token Ring

Encapsulation Type

3COM-TR

ISO1

ISO3

MAC

LLC2

NOVELL-TR

SNAP

VINES-TR

Media Type

Ultranet

Encapsulation Type

ULTRANET

ULTRANET-HELLO

src 0000.0c00.6fa4 MAC address of the node generating the packet.
dst.ffff.ffff.ffff MAC address of the destination node for the packet.
type 0x0a0 Packet type.
data ... First 12 bytes of the datagram following the MAC header.
len 60 Length of the message in bytes that the interface received from the wire.
size 64 Length of the message in bytes that the interface received from the wire. Equivalent to the len field.
flags 0x0F00 HDLC or PP flags field.
DLCI 7a The DLCI number on Frame Relay.
compressed TCP/IP packet dropped This message can occur when TCP header compression (THC) is enabled on an interface and the packet does not turn out to be HDLC or X25 after classification.

Debug RIF

Use the debug rif command to provide informational displays for entries entering and leaving the RIF cache.


Note In order to use the debug rif command to display traffic source-routed through an interface, fast switching of SRB frames must first be disabled with the no source-bridge route-cache interface subcommand.

Figure 10-35 shows example debug rif output.




Figure 10-35: Example Debug RIF Output

Explanations for representative lines of debug rif output in Figure 10-35 follow.

The first line of output in Figure 10-35 is an example of a RIF entry for an interface configured for SDLLC or Local-ACK.

Table 10-30 describes significant fields shown in this line of debug rif output.


Debug RIF Field Descriptions--Part 1
Field Description
RIF: Indicates that this message describes RIF debugging output.
U chk Update checking. The entry is being updated; the timer is set to zero (0).
da = 9000.5a59.04f9 Destination MAC address.
sa = 0110.2222.33c1 Source MAC address. This field contains values of zero (0000.0000.0000) in a non-SDLLC or non-Local-ACK entry.
[4880.3201.00A1.0050] RIF string. This field is blank (null RIF) in a non-SDLLC or non-Local-ACK entry.
type 8 Possible values follow:

0--Null entry

1--This entry was learned from a particular Token Ring port (interface)

2--Statically configured

4--Statically configured for a remote interface

8--This entry is to be aged

16--This entry (which has been learned from a remote interface) is to be aged

32--This entry is not to be aged

64 --This interface is to be used by LAN Network Manager (and is not to be aged)

on static/remote/0 Indicates that this route was learned from a real Token Ring port, in contrast to a virtual ring.

The second line of output in Figure 10-35 is an example of a RIF entry for an interface that is not configured for SDLLC or Local-ACK.

RIF: U chk da=0000.3080.4aed,sa=0000.0000.0000 [] type 8 on TokenRing0/0

Notice that the source address contains only zero values (0000.0000.0000), and that the RIF string is null ([ ]). The last element in the entry indicates that this route was learned from a virtual ring, rather than a real Token Ring port.

The third line of output in Figure 10-35 shows that a new entry has been added to the RIF cache.

RIF: U add 1000.5a59.04f9 [4880.3201.00A1.0050] type 8

The fourth line of output in Figure 10-35 shows that a RIF cache lookup operation has taken place.

RIF: L checking da=0000.3080.4aed, sa=0000.0000.0000

The fifth line of output in Figure 10-35 shows that a TEST response from address 9000.5a59.04f9 was inserted into the RIF cache.

RIF: rcvd TEST response from 9000.5a59.04f9

The sixth line of output in Figure 10-35 shows that the RIF entry for this route has been found and updated.

RIF: U upd da=1000.5a59.04f9,sa=0110.2222.33c1 [4880.3201.00A1.0050]

The seventh line of output in Figure 10-35 shows that an XID response from this address was inserted into the RIF cache.

RIF: rcvd XID response from 9000.5a59.04f9

The eighth line of output in Figure 10-35 shows that the router sent an XID response to this address.

SR1: sent XID response to 9000.5a59.04f9

Table 10-31 explains the other possible lines of debug rif output.


Debug RIF Field Descriptions--Part 2
Field Description
RIF: L Sending XID for address The router/bridge wanted to send a packet to address but did not find it in the RIF cache. It sent an XID explorer packet to determine which RIF it should use. The attempted packet is dropped.
RIF: L No buffer for XID to address Similar to the previous display; however, a buffer in which to build the XID packet could not be obtained.
RIF: U remote rif too small [rif] A packet's RIF was too short to be valid.
RIF: U rej address too big [rif] A packet's RIF exceeded the maximum size allowed and was rejected. The maximum size is 18 bytes.
RIF: U upd interface address The RIF entry for this router/bridge's interface has been updated.
RIF: U ign address interface update A RIF entry that would have updated an interface corresponding to one of this routers interfaces.
RIF: U add address[rif] The RIF entry for address has been added to the RIF cache.
RIF: U no memory to add rif for address No memory to add a RIF entry for address.
RIF: removing rif entry for address, type code The RIF entry for address has been forcibly removed.
RIF: flushed address The RIF entry for address has been removed because of a RIF cache flush.
RIF: expired address The RIF entry for address has been aged out of the RIF cache.

Debug Serial-Interface

Use the debug serial-interface command to debug a serial connection failure.

If the show interface command shows that the line and protocol are down, you can use the debug serial-interface command to isolate a timing problem as the cause of a connection failure. If the keepalive values in the mineseq, yourseen, and myseen fields are not incrementing in each subsequent line of output, there is a timing or line problem at one of the ends of the connection.


Note While the debug serial-interface command typically does not generate a lot of output, you nevertheless should use it cautiously during production hours. When SMDS is enabled, for example, it can generate considerable output.

The output of debug serial-interface command can vary, depending on the type of WAN configured for an interface: DDR, Frame Relay, HDLC, HSSI, SMDS, or X.25. The output also can vary depending on the type of encapsulation configured for that interface. The hardware platform also can impact debug serial-interface output.

The following sections show example debug serial-interface displays for various configurations and describe the possible output the command can generate for these configurations.

Debug Serial-Interface for DDR

Table 10-32 describes the error messages the debug serial-interface command can generate for a serial interface being used as a V.25bis dialer for dial-on-demand routing.


Debug Serial-Interface Field Descriptions for DDR
Field Description
Serial 0: Dialer result = xxxxxxxxxx This message displays the result returned from the V.25bis dialer. It is useful in debugging if calls are failing. On some hardware platforms, this message cannot be displayed due to hardware limitations. Possible values for the xxxxxxxx variable depend on the V.25bis device with which the router is communicating.
Serial 0: No dialer string defined. Dialing cannot occur. This message is displayed when a packet is received that should cause a call to be placed. However, there is no dialer string configured, so dialing cannot occur. This message usually indicates a configuration problem.
Serial 0: Attempting to dial xxxxxxxxxx This message indicates that a packet has been received that passes the dial-on-demand access lists. That packet causes dialing of a phone number. The xxxxxxxx variable is the number being called.
Serial 0: Unable to dial xxxxxxxxxx This message is displayed if for some reason, the phone call could not be placed. This might be due to a lack of memory, full output queues, or other problems.
Serial 0: disconnecting call This message is displayed when the router attempts to hang up a call.
Serial 0: idle timeout

Serial 0: re-enable timeout

Serial 0: wait for carrier timeout

One of these three messages is displayed when their corresponding dialer timer expires. They are mostly informational, but are useful when debugging a disconnected call or call failure.

Debug Serial-Interface for Frame Relay Encapsulation

The following message is displayed if the encapsulation for the interface is frame relay (or HDLC) and the router attempts to send a packet containing an unknown packet type.

Illegal serial link type code xxx

Debug Serial-Interface for HDLC

Figure 10-36 shows example debug serial-interface output for an HDLC connection when keepalives have been enabled.




Figure 10-36: Example Debug Serial-Interface Output for HDLC

In Figure 10-36, the debug serial-interface display shows that the remote router is not receiving all of the keepalives the router is sending. When the difference in the values in the myseq and mineseen fields exceeds three, the line goes down and the interface is reset.

Table 10-33 describes significant fields shown in Figure 10-36.


Debug Serial-Interface Field Descriptions for HDLC
Field Description
Serial1 Interface through which the serial connection is taking place.
HDLC Indicates that the serial connection is an HDLC connection.
myseq 636119 The myseq counter increases by 1 each time the router sends a keepalive packet to the remote router.
mineseen 636118 The value of the mineseen counter reflects the last myseq sequence number the remote router has acknowledged receiving from the router. The remote router stores this value in its yourseen counter and sends that value in a keepalive packet to the router.
yourseen 515032 The yourseen counter reflects the value of the myseq sequence number the router has received in a keepalive packet from the remote router.
line up Indicates that the connection between the routers is maintained. Value changes to line down if the values of the myseq and myseen fields in a keepalive packet differ by more than 3. Value returns to line up when the interface is reset. If the line is in loopback mode, (looped) appears after this field.

Table 10-34 describes additional error messages that the debug serial-interface command can generate for HDLC.


Debug Serial-Interface Error Messages for HDLC
Field Description
Illegal serial link type code xxx, PC = 0xnnnnnn This message is displayed if the router attempts to send a packet containing an unknown packet type.
Illegal HDLC serial type code xxx, PC = 0xnnnnn This message is displayed if an unknown packet type is received.
Serial 0: attempting to restart This message is displayed periodically if the interface is down. The hardware is then reset to hopefully correct the problem.
Serial 0: Received bridge packet sent to nnnnnnnnn This message is displayed if a bridge packet is received over a serial interface configured for HDLC, and bridging is not configured on that interface.

Debug Serial-Interface for HSSI

On an HSSI interface, the debug serial-interface command can generate the following additional error message:

HSSI0: Reset from 0xnnnnnnn

This message indicates that the HSSI hardware has been reset. The 0xnnnnnnn variable is the address of the routine requesting that the hardware be reset; this value is useful only to development engineers.

Debug Serial-Interface for ISDN Basic Rate

Table 10-35 describes error messages that the debug serial-interface command can generate for ISDN Basic Rate.


Debug Serial-Interface Field Descriptions for ISDN Basic Rate
Field Description
BRI: D-chan collision Indicates that a collision on the ISDN D channel has occured; the software will reattempt transmission.
Received SID Loss of Frame Alignment int. Indicates that the ISDN hardware has lost frame alignment. This usually indicates a problem with the ISDN network.
Unexpected IMP int: ipr = 0xnn Indicates that the ISDN hardware received an unexpected interrupt. The 0xnn variable indicates the value returned by the interrupt register.
BRI(d): RX Frame Length Violation; Length = n

BRI(d): RX Nonoctet Aligned Frame

BRI(d): RX Abort Sequence

BRI(d): RX CRC Error

BRI(d): RX Overrun Error

BRI(d): RX Carrier Detect Lost

This message or any of the five messages that follow may be displayed when a receive error occurs on one of the ISDN channels. The (d) indicates which channel. These may indicate a problem with the ISDN network connection.
BRI0: Reset from 0xnnnnnnn Indicates that the BRI hardware has been reset. The 0xnnnnnnn variable is the address of the routine that requested that the hardware be reset; it is useful only to development engineers.
BRI(d): Bad state in SCMs scm1 = x scm2 = x scm3 = x

BRI(d): Bad state in SCONs scon1 = x scon2 = x scon3 = x

BRI(d): Bad state ub SCR; SCR = x

This message or any of the two messages that follow are displayed if the ISDN hardware is not in the proper state. The hardware is then reset. If this message is displayed constantly, it usually indicates a hardware problem.
BRI(d): Illegal packet encapsulation = n This message is displayed if a packet is received, but the encapsulation used for the packet is not recognized. It can indicate that the interface is misconfigured.

Debug Serial-Interface for an MK5025 Device

Table 10-36 describes the additional error messages that the debug serial-interface command can generate for an MK5025 device.


Debug Serial-Interface Field Descriptions for an MK5025 Device
Field Description
MK5(d): Reset from 0xnnnnnnnn This message indicates that the hardware has been reset. The 0xnnnnnnn variable is the address of the routine that requested that the hardware be reset; it is useful only to development engineers.
MK5(d): Illegal packet encapsulation = n This message is displayed if a packet is received, but the encapsulation used for the packet is not recognized. Possibly an indication that the interface is misconfigured.
MK5(d): no packet available for packet realignment This message is displayed in cases where the serial driver attempted to get a buffer (memory) and was unable to do so.
MK5(d): Bad state in CSR0 = (x) This message is displayed if the hardware is not in the proper state. The hardware is then reset. If this message is displayed constantly, it usually indicates a hardware problem.
MK5(d): New serial state = n This message is displayed to indicate that the hardware has interrupted the software. It displays the state that the hardware is reporting.
MK5(d): DCD is down.

MK5(d): DCD is up.

If the interrupt indicates that the state of carrier has changed, one of these messages is displayed to indicate the current state of DCD.

Debug Serial-Interface for PPP Encapsulation

Figure 10-37 lists all of the messages that the debug serial-interface command can generate when the encapsulation is set to PPP and PPP is negotiating configuration options.




Figure 10-37: Example Debug Serial-Interface Output for PPP

A knowledge of the PPP protocol is necessary to understand the significance of the messages listed in Figure 10-37.

Figure 10-38 lists the debug serial-interface messages that can be displayed when CHAP is enabled on a PPP interface.




Figure 10-38: Example Debug Serial-Interface Output When CHAP Is Enabled on a PPP Interface

The messages listed in Figure 10-38 indicate the current state of CHAP negotiation.

Debug Serial-Interface for SMDS Encapsulation

When encapsulation is set to SMDS, debug serial-interface displays SMDS packets that have been sent and received, as well as any error messages resulting from SMDS packet transmission.

The error messages that the debug serial-interface command can generate for SMDS follow.

The following message indicates that a new protocol requested SMDS to encapsulate the data for transmission. SMDS does not know yet how to encapsulate the protocol.

SMDS: Error on Serial 0, encapsulation bad protocol = x

The following indicates that SMDS was asked to encapsulate a packet, but no corresponding destination E.164 SMDS address was found in any of the static SMDS tables or in the ARP tables.

SMDS send: Error in encapsulation, no hardware address, type = x

The following indicates that a protocol such as CLNS or IP has been enabled on an SMDS interface, but the corresponding multicast addresses have not been configured. The n variable displays the link type for which encapsulation was requested. This value is only significant to Cisco as an internal protocol type value.

SMDS: Send, Error in encapulation, type=n

The following messages can occur when a packet that was somehow corrupted is received on an SMDS interface. The router expected x, but received y.

SMDS: Invalid packet, Reserved NOT ZERO, x y
SMDS: Invalid packet, TAG mismatch x y
SMDS: Invalid packet, Bad TRAILER length x y

The following messages can indicate an invalid length for an SMDS packet.

SMDS: Invalid packet, Bad BA length x
SMDS: Invalid packet, Bad header extension length x
SMDS: Invalid packet, Bad header extensiontype x
SMDS: Invalid packet, Bad header extension value x

The following messages are displayed when debug serial-interface is enabled.

Interface Serial 0 Sending SMDS L3 packet:
SMDS: dgsize:x type:0xn src:y dst:z

If debug serial-interface is enabled, the following message can be displayed when a packet is received on an SMDS interface, but the destination SMDS address does not match any on that interface.

SMDS: Packet n, not addressed to us

Debug Serial-Packet

Use the debug serial-packet command to provide more detailed serial interface debugging information than you can obtain using debug serial-interface.

The debug serial-packet command generates output that is dependent on the type of serial interface and the encapsulation that is running on that interface. The hardware platform also can impact debug serial-packet output.

Currently, the debug serial-packet command displays output for only DDR, PPP, and SMDS encapsulations.

Debug Serial-Packet for DDR

When you enable debug serial-packet and DDR is enabled on the interface, information concerning the cause of any calls (called Dialing cause) may be displayed.

The following line of output for an IP packet lists the name of the DDR interface and the source and destination addresses of the packet.

Dialing cause: Serial0: ip (s=131.108.1.111 d=131.108.2.22)

The following line of output for a bridged packet lists the DDR interface and the type of packet (in hexadecimal). For information on these packet types, see Appendix C, "Ethernet Type Codes," of the Router Products Configuration and Reference publication.

Dialing cause: Serial1: Bridge (0x6005)

Debug Serial-Packet for PPP

Figure 10-39 shows example debug serial-packet output when PPP is enabled on the interface.




Figure 10-39: Example Debug Serial-Packet Output for PPP

The preceding five messages may appear when PPP is attempting to negotiate a link. They indicate that PPP received an ACK for option type nnn, and if the option has a value, the value that was acked also is displayed. This is possibly useful in debugging PPP link establishment, but is mostly useful with some knowledge of the PPP protocol.

Table 10-37 describes significant fields shown in Figure 10-39.


Debug Serial-Packet Field Descriptions for PPP
Field Description
ppp: config ACK received The router has received an acknowledgment packet in response to the configuration negotiation request packet it sent.
type = nnn Number indicating the LCP configuration option to be negotiated. Possible values include:

1--Maximum-Received-Unit (MRU)

2--Async-Control-Character-Map

3--Authentication-Protocol

4--Quality-Protocol

5--Magic-Number

6--Undefined

7--Protocol-Field-Compression

8--Address-and-Control-Field-Compression

9--32-Bit-FCS

value = yyy Value of the LCP configuration option that has been negotiated.

Additional messages that the debug serial-packet command can generate when PPP is enabled follow.

The following message is displayed when PPP sends a packet onto the line. The "Serial0" shows the interface the packet is sent on. The state corresponds to a PPP state machine state, and is only useful to Cisco technical support staff. The link can be either ppp-lcp or ppp-ipcp, indicating that it is either a PPP LCP packet or a PPP IPCP packet. The code is the PPP packet type being transmitted, the ID is a sequence number for this packet, and LEN is the length of packet. This message is only displayed for PPP-generated packets, not for all packets using PPP encapsulation.

PPP send: on Serial0 STATE= 4 LINK= ppp-lcp, CODE= 5, ID= 345, LEN = 9

The following message is displayed if the PPP timer expires. It indicates that the remote side did not respond to the packet in the time allowed.

ppp: TIMEout: Time= 3245532 State= 4

The following three messages may be displayed if PPP receives a packet that is incorrectly formatted.

ppp: rcvd short header for ppp-lcp
ppp: rcvd illegal length for ppp-lcp
ppp: rcvd short packet. len x > y for ppp-lcp

The following message is displayed when a PPP-specific packet is received. It either will be for ppp-lcp or ppp-ipcp, depending on which PPP layer the packet is for. It will give a state, which is a state in the PPP state machine; a code, which is the type of PPP packet received; the ID, which is a sequence number; and the length of the packet.

PPP input(ppp-lcp): state = 4 code = 5 id = 345 len = 9

The following message is displayed if PPP has received an ACK for a configuration request it transmitted. The ID can be matched with an ID displayed in the PPP send debug message to verify which packet was acked.

ppp: state = 4 fsm_rconfack(ppp-lcp): rcvd id 345

One of the following messages is displayed when PPP receives a configuration packet from the other side. It displays the configuration type and whether there is a value for that type, the value, and whether it is going to ack, nack, or reject this configuration option.

ppp: received config for type = x  value = y acked
ppp: received config for type = x  value = y rejected
ppp: received config for type = x  value = y nacked

Debug Serial-Packet for SMDS Encapsulation

Figure 10-40 shows example output when SMDS is enabled on the interface.




Figure 10-40: Example Debug Serial-Packet Output for SMDS

As Figure 10-40 suggests, when encapsulation is set to SMDS, debug serial-packet displays the entire SMDS header (in hex), as well as some payload data on transmit or receive. This information is useful only when you have an understanding of the SMDS protocol. The first line of the output indicates either Sending or Receiving.

Debug Source-Event

Use the debug source-event command to provide informational displays of source bridging activity. (Output of the debug source-bridge command is identical to the output of this command.)


Note In order to use the debug source-event command to display traffic source-routed through an interface, you first must disable fast switching of SRB frames with the no source-bridge route-cache interface subcommand.

Figure 10-41 shows example debug source-event output.




Figure 10-41: Example Debug Source-Event Output

Table 10-38 describes significant fields shown in Figure 10-41.


Debug Source-Event Field Descriptions
Field Description
RSRB0: Indicates that this RIF cache entry is for the Token Ring 0 interface, which has been configured for remote source route bridging. (SRB1, in contrast, would indicate that this RIF cache entry is for Token Ring 1, configured for source route bridging.)
forward Indicates that this is a forward (normal data) packet, in contrast to a control packet containing proprietary Cisco bridging information.
srn 5 Indicates the ring number of the packet's source ring.
bn 1 Indicates the bridge number of the bridge this packet traverses.
trn 10 Indicates the ring number of the packet's target ring.
src: 8110.2222.33c1 Source address of the route in this RIF cache entry.
dst: 1000.5a59.04f9 Destination address of the route in this RIF cache entry.
[0800.3201.00A1.0050] RIF string in this RIF cache entry.

Examples of other debug source-event messages that can be displayed follow.

In the following example messages, SRBn or RSRBn denotes a message associated with interface Token Ring n. An n of 99 denotes the remote side of the network.

SRBn: no path, s: <src MAC addr>d: <dst MAC addr>rif: <rif>

In the preceding example, a bridgeable packet came in on interface Token Ring n but there was nowhere to send it. This is most likely a configuration error. For example, an interface has source bridging turned on, but it is not connected to another source bridging interface or a ring group.

In the following example, a bridgeable packet has been forwarded from Token Ring n to the target ring. The two interfaces are directly linked.

SRBn: direct forward (srn <ring>bn <bridge>trn <ring>)

In the following examples, a proxy explorer reply was not generated because there was no way to get to the address from this interface. The packet came from the node with the first <address>.

SRBn: br dropped proxy XID,  <address>for <address>, wrong vring (rem)
SRBn: br dropped proxy TEST, <address>for <address>, wrong vring (rem)
SRBn: br dropped proxy XID,  <address>for <address>, wrong vring (local)
SRBn: br dropped proxy TEST, <address>for <address>, wrong vring (local)
SRBn: br dropped proxy XID,  <address>for <address>, no path
SRBn: br dropped proxy TEST, <address>for <address>, no path

In the following example, an appropriate proxy explorer reply was generated on behalf of the second <address>. It is sent to the first <address>.

SRBn: br sent proxy XID,  <address>for <address>[<rif>]
SRBn: br sent proxy TEST, <address>for <address>[<rif>]

The following example indicates that the broadcast bits were not set, or that the routing information indicator on the packet was not set.

SRB<unit#>: illegal explorer, s: <srcMACaddr> d: <destMACaddr> rif:
<RIFstring>

The following example indicates that the direction bit in the RIF field was set, or that an odd packet length was encountered. Such packets are dropped.

SRB<unit #>: bad explorer control, D set or odd

The following example indicates that a spanning explorer was dropped because the spanning option was not configured on the interface.

SRB<unit #>: span dropped, input off, s: <src mac addr> d: <dest mac addr>
rif: <rif string>

The following example indicates that a spanning explorer was dropped because it had traversed the ring previously.

SRB<unit #>: span violation, s: <src mac addr> d: <dest mac addr> rif:
<rif string>

The following example indicates that an explorer was dropped because the maximum hop count limit was reached on that interface.

SRB<unit #>: max hops reached - <hop cnt>, s: <src mac addr> d: <dest mac addr>
rif: <rif string>

The following example indicates that the ring exchange request was sent to the indicated peer. This request tells the remote side which rings this node has and asks for a reply indicating which rings that side has.

RSRB: sent RingXreq to <ring group>/<ip addr>

The following example indicates that a message has been sent to the remote peer. The <label> variable can be AHDR (active header), PHDR (passive header), HDR (normal header), or DATA (data exchange), and <op> can be Forward, Explorer, Ring Xchg, Req, Ring Xchg, Rep, Unknown Ring Group, Unknown Peer, or Unknown Target Ring.

RSRB: <label>: sent <op>to <ring group>/<ip addr>

The following example indicates that the remote bridge and ring pair have been removed from or added to the local ring group table because the remote peer has changed.

RSRB: removing bn <bridge>rn <ring>from <ring group>/<ip addr>
RSRB: added bridge <bridge>, ring <ring>for <ring group>/<ip addr>

The following example shows miscellaneous remote peer connection establishment messages.

RSRB: peer <ring group>/<ip addr>closed [last state n
RSRB: passive open <ip addr>(remote port) -><local port>
RSRB: CONN: opening peer <ring group>/<ip addr>, attempt n
RSRB: CONN: Remote closed <ring group>/<ip addr>on open
RSRB: CONN: peer <ring group>/<ip addr>open failed, <reason>[code]

The following example shows that an explorer packet was propagated onto the local ring from the remote ring group.

RSRBn: sent local explorer, bridge <bridge>trn <ring>, [rif]

The following messages indicate that the remote source-route bridging code found the packet to be in error.

RSRBn: ring group <ring group>not found
RSRBn: explorer rif [rif] not long enough

The following example indicates that a buffer could not be obtained for a Ring Exchange Packet; this is an internal error.

RSRB: couldn't get pak for ringXchg

The following example indicates that a ring exchange packet was received that had an incorrect length; this is an internal error.

RSRB: XCHG: req/reply badly formed, length <pak length>, peer <peer id>

The following example indicates that a ring entry was removed for the peer; the ring was possibly disconnected from the network, causing the remote router to send an update to all its peers.

RSRB: removing bridge <br #> ring <ring #> from <peer name> <ring type>

The following example indicates that a ring entry was added for the specified peer; the ring was possibly added to the network, causing the other router to send an update to all its peers.

RSRB: added bridge <br #>, ring <ring #> for <peer id>

The following example indicates that no memory was available to add a ring number to the ring group specified; this is an internal error.

RSRB: no memory for ring element <ring group #>

The following example indicates that memory was corrupted for a connection block; this is an internal error.

RSRB: CONN: corrupt connection block

The following example indicates that a connector process started, but that there was no packet to process; this is an internal error.

RSRB: CONN: warning, no initial packet, peer: <ip addr> <peer pointer>

The following example indicates that a packet was received with a version number different from the one present on the router.

RSRB: IF New version. local=<local version #>, remote=<remote version>,
<pak op code> <peer id>

The following example indicates that a packet with a bad op code was received for a direct encapsulation peer; this is an internal error.

RSRB: IFin: bad op <op code> (op code string) from <peer id>

The following example indicates that the virtual ring header will not fit on the packet to be sent to the peer; this is an internal error.

RSRB: vrif_sender, hdr won't fit

The following example indicates that the specified peer is being opened. The retry count specifies the number of times the opening operation is attempted.

RSRB: CONN: opening peer <peer id> <retry count>

The following example indicates that the router, configured for FST encapsulation, received a version reply to the version request packet it had sent previously.

RSRB: FST Rcvd version reply from <peer id> (version #)

The following example indicates that the router, configured for FST encapsulation, sent a version request packet to the specified peer.

RSRB: FST Version Request. op = <opcode>, <peer id>

The following example indicates that the router received a packet with a bad op code from the specified peer; this is an internal error.

RSRB: FSTin: bad op <opcode> (op code string) from <peer id>

The following example indicates that the TCP connection between the router and the specified peer is being aborted.

RSRB: aborting <ring group #>/<peer id> (vrtcpd_abort called)

The following example indicates that an attempt to establish a TCP connection to a remote peer timed out.

RSRB: CONN: attempt timed out

The following example indicates that a packet was dropped because the ring group number in the packet did not correlate with the ring groups configured on the router.

RSRB<unit #>: ring group <ring group #> not found

Debug Span

Use the debug span command to track changes in the spanning-tree topology when debugging a transparent bridge.

This command is useful for verifying that the spanning-tree protocol is operating correctly.

IEEE Spanning Tree Example

Example debug span output for an IEEE BPDU packet follows:

ST: Ether4 0000000000000A080002A02D6700000000000A080002A02D6780010000140002000F00

Broken up by fields and labeled to aid documentation, the preceding debug span output appears as shown in Figure 10-42.




Figure 10-42: Example Debug Span Output

Table 10-39 describes significant fields shown in this debug span output.


Debug Span Field Descriptions for an IEEE BPDU Packet
Field Description
ST: Indicates that this is a spanning tree packet
Ethernet4 Interface receiving the packet
(A) 0000 Indicates that this is an IEEE BPDU packet
(B) 00 Version
(C) 00 Type

00 indicates config BPDU

80 indicates TCN BPDU

(D) 00 Topology change acknowledgement

00 indicates no change

80 indicates a change notification

(E) 000A Root priority
(F) 080002A02D67 Root ID
(G) 00000000 Root path cost (0 means the sender of this BPDU packet is the root bridge)
(H) 000A Bridge priority
(I) 080002A02D67 Bridge ID
(J) 80 Port priority
(K) 01 Port #1
(L) 0000 Message age (in 256ths of a second)
(M) 1400 Maximum age (in 256ths of a second)
(N) 0200 Hello time (in 256ths of a second)
(O) 0F00 Forward delay (in 256ths of a second)

DEC Spanning Tree Example

Example debug span output for a DEC BPDU packet follows:

ST: Ethernet4 E1190100000200000C01A2C90064008000000C0106CE0A01050F1E6A

Broken up by fields and labeled to aid documentation, this debug span output appears as shown in Figure 10-43.




Figure 10-43: Example Debug Span Output

Table 10-40 describes significant fields shown in this debug span output.


Debug Span Field Descriptions for a DEC BPDU Packet
Field Description
ST: Indicates that this is a spanning tree packet
Ethernet4 Interface receiving the packet
(A) E1 Indicates that this is a DEC BPDU packet
(B) 19 Indicates that this is a DEC Hello packet

0x19--DEC Hello

0x02--Topology change notification (TCN)

(C) 01 DEC version
(D) 00 Flag which is a bit field with the following mapping:

1--TCN

2--TCN acknowledgment

8--Use short timers

(E) 0002 Root priority
(F) 00000C01A2C9 Root ID (MAC address)
(G) 0064 Root path cost (translated as 100 in decimal notation)
(H) 0080 Bridge priority
(I) 00000C0106CE Bridge ID
(J) 0A Port ID (in contrast to interface number)
(K) 01 Message age (in seconds)
(L) 05 Hello time (in seconds)
(M) 0F Maximum age (in seconds)
(N) 1E Forward delay (in seconds)
(O) 6A Not applicable

Debug TFTP

Use the debug tftp command to display TFTP debugging information when encountering problems netbooting or using the configure network or write network commands.

Figure 10-44 shows example debug tftp output from the EXEC command write network.




Figure 10-44: Example Debug TFTP Output

Table 10-41 describes significant fields shown in the first line of output from Figure 10-44.


Debug TFTP Field Descriptions
Message Description
TFTP: Indicates that this entry describes a TFTP packet.
msclock 0x292B4; Internal timekeeping clock (in milliseconds).
Sending write request (retry 0) Indicates the TFTP operation.
socket_id 0x301DA8 Unique memory address for the socket for the TFTP connection.

Debug Token-Ring

Use the debug token-ring command to display messages about Token Ring interface activity. This command reports several lines of information for each packet sent or received and is intended for low traffic, detailed debugging.

The Token Ring interface records provide information regarding the current state of the ring. These messages are only displayed when debug token-events is enabled.

The debug token-ring command invokes verbose Token Ring hardware debugging. This includes detailed displays as traffic arrives and departs the unit.


Note It is best to use this command only on router/bridges with light loads.

Figure 10-45 shows example debug token-ring output.




Figure 10-45: Example Debug Token-Ring Output

Descriptions of example lines of output in Figure 10-45 follow.

Table 10-42 describes significant fields shown in the second line of output from Figure 10-45.

TR0:  in: MAC: acfc: 0x1105 Dst: c000.ffff.ffff Src: 5000.1234.5678  bf: 0x45

Debug Token Ring Field Descriptions--Part 1
Message Description
TR0: Name of the interface associated with the Token Ring event.
in: Indicates whether the packet was input to the interface (in) or output from the interface (out).
MAC: Indicates the type of packet, as follows:

MAC--Media Access Control

LLC--Link Level Control

acfc: 0x1105 Access Control, Frame Control bytes, as defined by the IEEE 802.5 standard.
Dst: c000.ffff.ffff Destination address of the frame.
Src: 5000.1234.5678 Source address of the frame.
bf: 0x45 Bridge flags for internal use by technical support staff.

Table 10-43 describes significant fields shown in the third line of output from Figure 10-45.

TR0:  in:      riflen 0, rd_offset 0, llc_offset 40

Debug Token Ring Field Descriptions--Part 2
Message Description
TR0: Name of the interface associated with the Token Ring event.
in: Indicates whether the packet was input to the interface (in) or output from the interface (out).
riflen 0 Length of the RIF field (in bytes)
rd_offset 0 Offset (in bytes) of the frame pointing to the start of the RIF field.
llc_offset 40 Offset in the frame pointing to the start of the llc field

Table 10-43 describes significant fields shown in the fifth line of output from Figure 10-45.

TR0: out: LLC: AAAA0300 00009000 00000100 AAC00000 00000802 50001234 ln: 28

Debug Token Ring Field Descriptions--Part 3
Message Description
TR0: Name of the interface associated with the Token Ring event.
out: Indicates whether the packet was input to the interface (in) or output from the interface (out).
LLC: Indicates the type of frame, as follows:

MAC--Media Access Control

LLC--Link Level Control

AAAA0300.... This and the octets that follow it indicate the contents (hex) of the frame.
ln: 28 Indicates the length of the information field (in bytes).

Debug VINES-ARP

Use the debug vines-arp command to enable logging of all ARP packets that the router sends or receives.

Figure 10-46 shows example debug vines-arp output.




Figure 10-46: Example Debug VINES-ARP Output

In Figure 10-46, the first line shows that the router received an ARP request (type 0) from station address 0260.8c43.a7e4. The second line shows that the router is sending back the ARP service response indicating that it is willing to assign VINES internet addresses. The third line shows that the router received a Vines internet address assignment request (type 2) from address 0260.8c43.a7e4. The fourth line shows that the router is responding (type 3) to the address assignment request from the client and assigning it the address 3001153C:8004.

Table 10-45 describes significant fields shown in Figure 10-46.


Debug VINES-ARP Field Descriptions
Field Description
VINES: Indicates that this is one of the Banyan VINES debugging messages.
received ARP type 0 Indicates that an ARP request of type 0 was received. Possible type values follow:

0--Query request. The ARP client broadcasts a type 0 message to request an ARP service to respond.

1--Service response. The ARP service responds with a type 1 message to an ARP client's Query request.

2--Assignment request. The ARP client responds to a service response with a type 2 message to request a Banyan VINES Internet address.

3--Assignment response. The ARP service responds to an assignment request with a type 3 message that includes the assigned Banyan VINES Internet address.

from 0260.8c43.a7e4 Indicates the source address of the packet.

Debug VINES-Echo

Use the debug vines-echo command to enable logging of all MAC-level echo packets that the router sends or receives. Banyan interface testing programs make use of these echo packets.


Note These echo packets do not include network layer addresses.

Figure 10-47 shows example debug vines-echo output.




Figure 10-47: Example Debug VINES-Echo Output

Table 10-46 describes the fields shown in Figure 10-47.


Debug VINES-Echo Field Descriptions
Field Description
VINESECHO Indicates that this is a debug vines-echo message.
100 byte packet Packet size in bytes.
from 0260.8c43.a7e4 Source address of the echo packet.

Debug VINES-Packet

Use the debug vines-packet command to enable logging of general VINES debugging information. This information includes packets received, generated, and forwarded, as well as failed access checks and other items.

Figure 10-48 shows example debug vines-packet output.




Figure 10-48: Example Debug VINES-Packet Output

The following describes selected lines of output from Figure 10-48.

Table 10-47 describes the fields shown in the first line of output.


Debug VINES-Packet Field Descriptions
Field Description
VINES: Indicates that this is a Banyan VINES packet.
s = 30028CF9:1 Source address of the packet.
(Ether2) Interface associated with this address.
d = FFFFFFFF:FFFF Indicates that the destination is a broadcast address.
rcvd w/ hops 0 Indicates that the packet was received because it was a broadcast packet. The remaining hop count in the packet was zero (0).

In the second line of output that follows, the destination is the address 3002ABEA:1 associated with interface Ether2. Source address 3000CBD4:1 sent a packet to this destination through the gateway at address 3000ABEA:1.

VINES: s=3000CBD4:1 (Ether1), d=3002ABEA:1 (Ethernet2), g=3002ABEA:1, sent

In the third line of output that follows, the router being debugged is the destination address (3000B959:1).

VINES: s=3000CBD4:1 (Ether1), d=3000B959:1, rcvd by gw

The following fourth line of output indicates that the packet described in the preceding line was a VINES IPC Disconnect packet.

VINES: received vines IPC Disc from 3000CBD4:1

In the following fifth line of output, (local) indicates that the router being debugged is the source address for the packet.

VINES: s=3000B959:1 (local), d=3000CBD4:1 (Ether1), g=3000CBD4:1, sent

Debug VINES-Routing

Use the debug vines-routing command to enable logging of all RTP update messages sent or received and all routing table activities that occur in the router.

Figure 10-49 shows example debug vines-routing output.




Figure 10-49: Example Debug VINES-Routing Output

Figure 10-49 describes two VINES routing updates; the first includes two entries and the second includes three entries. The following describes selected lines of output from Figure 10-49.

The following first line shows that the router sent a periodic routing update to the broadcast address FFFFFFFF:FFFF through the Ethernet3 interface.

VINESRTP: sending update to FFFFFFFF:FFFF on Ethernet3

The following second line indicates that the router knows how to reach network 3000073B, which is metric 2 away from the router. The value that follows the metric (0.4 seconds) interprets the metric in seconds.

network 3000073B, metric 2 (.4 seconds)

The following fourth line of output indicates that the router received a routing update from the VINES server at VINES address 27AF9A:1 through the Ethernet2 interface.

VINESRTP: received update from 27AF9A:1 on Ethernet2

The following fifth line of output implies that the server sending this update is directly accessible to the router (even though VINES servers do not explicitly list themselves in routing updates). Because this is an implicit entry in the table, there is no metric associated with this line of output.

network 27AF9A from the server

As the first actual entry in the routing update from the VINES server at 27AF9A:1, the following line indicates that network 30019AC7 can be reached by sending to this server. This network is a metric of 2 away from the sending server. The value that follows the metric (0.4 seconds) interprets the metric in seconds.

network 30019AC7, metric 2 (0.4 seconds)

Debug VINES-Table

Use the debug vines-table command to enable logging of all modifications to the VINES routing table. This command provides a subset of the information provided by the debug vines-routing command, as well as some more detailed information on table additions and deletions.

Figure 10-50 shows example debug vines-table output.




Figure 10-50: Example Debug VINES-Table Output

Table 10-48 describes significant fields shown in Figure 10-50.


Debug VINES-Table Field Descriptions
Field Description
VINESRTP: Indicates that this is a debug vines-routing or debug vines-table message.
create neighbor 3001153C:8004 Indicates that the client at address 3001153C:8004 has been added to the Banyan VINES neighbor table.
interface Ethernet 0 Indicates that this particular neighbor can be reached through the router interface named Ethernet0.

Debug XNS-Packet

Use the debug xns-packet command to enable logging of XNS packet traffic, including the addresses for source, destination, and next hop router of each packet.


Note To gain the fullest understanding of XNS routing activity, you should enable debug xns-routing and debug xns-packet together.

Figure 10-51 shows example debug xns-packet output.




Figure 10-51: Example Debug XNS-Packet Output.

Table 10-49 describes significant fields shown in Figure 10-51.


Debug XNS-Packet Field Descriptions
Field Description
XNS: Indicates that this is an XNS packet.
src = 5.0000.0c02.6d04 Indicates that the source address for this message is 0000.0c02.6d04 on network 5.
dst = 5.ffff.ffff.ffff Indicates that the destination address for this message is the broadcast address ffff.ffff.ffff on network 5.
packet sent Indicates that the packet to destination address 5.ffff.ffff.ffff in Figure 10-51, as displayed using the debug xns-packet command, was queued on the output interface.
rcvd. on Ethernet0 Indicates that the router just received this packet through the Ethernet0 interface.
local processing Indicates that the router has examined the packet and determined that it must process it, rather than forwarding it.

Debug XNS-Routing

Use the debug xns-routing command to display XNS routing transactions.

Figure 10-52 shows example debug xns-routing output.




Figure 10-52: Example Debug XNS-Routing Output

Table 10-50 describes significant fields shown in Figure 10-52.


Debug XNS-Routing Field Descriptions
Field Description
XNSRIP: Indicates that this is an XNS routing packet.
sending standard periodic update The router indicates that this is a periodic XNS routing information update.
to 5.ffff.ffff.ffff Indicates that the destination address is ffff.ffff.ffff on network 5.
via Ethernet2 Name of the output interface.
network 1, hop count 1 Indicates that network 1 is one hop away from this router.
got standard update from 1.0000.0c00.440f The router indicates that it has received an XNS routing information update from address 0000.0c00.440f on network 1.
socket 1 The socket number is a well-known port for XNS. Possible values include:

1--routing information

2--echo

3--router error

Debug X25

Use the debug x25 command to display all X.25 traffic.

This command is particularly useful for diagnosing problems encountered when placing CALLs.

While debug x25 output includes both data and control messages for all of the router's virtual circuits, debug x25-events output (discussed later in this chapter) includes only control messages for all of the router's VCs. In contrast, debug x25-vc output (also discussed later) includes only control messages for a particular VC. Thus, debug x25-events output is a subset of debug x25 output, and debug x25-vc output is a subset of debug x25-events output.

Caution Because debug x25 displays all X.25 traffic, it is very processor intensive and can render the router useless. You should only use debug x25 when the aggregate of all X.25 traffic is less than five packets per second.

Figure 10-53 shows example debug x25 output.




Figure 10-53: Example Debug X25 Output

Figure 10-53 shows a typical exchange of packets between two X.25 devices on a network. The first line of output in Figure 10-53, reproduced below, describes a RESTART packet.

Serial2 (236414440): X25 O R3 RESTART (5) 8 lci 0 cause 7 diag 0

Table 10-51 describes the fields shown in this line of output.


Debug X25 Field Descriptions
Field Description
Serial2 Indicates the interface associated with this X.25 event.
(236426440) System clock (in milliseconds). Useful for determining the amount of time between events.
X25 Indicates that this message describes an X.25 event.
O Indicates whether the X.25 message was input (I) or output (O) through the interface.
R3 State of the virtual circuit. Possible values follow.

D1--Flow control ready

D2--DTE reset request

D3--DCE reset indication

P1--Idle

P2--DTE waiting for DCE to connect CALL

P3--DCE waiting for DTE to accept CALL

P4--Data transfer

P5--Call collision

P6--DTE clear request

P7--DCE clear indication

R1--Packet level ready

R2--DTE restart request

R3--DCE restart indication

X1--Nonstandard state for a virtual circuit in hold-down

See Annex B of the 1988 CCITT X.25 Recommendation for more information on these states.

RESTART Describes the type of X.25 packet. Possible values follow.

CALL CONNECTED

CALL REQUEST

CLEAR CONFIRMATION

CLEAR REQUEST

DATA

DIAGNOSTIC

ILLEGAL

INTR CONFIRMATION

INTR (interrupt)

REGISTRATION

REGISTRATION CONFIRMATION

RESET CONFIRMATION

RESET REQUEST

RESTART

RESTART CONFIRMATION

RNR (Receiver Not Ready)

RR (Receiver Ready)

(5) Number of bytes in the packet.
8 Modulo of the virtual circuit. Possible values are 8 or 128.
lci 0 Virtual circuit number. See Annex A of the 1988 CCITT X.25 Recommendation for information on VC assignment.
cause 7 Code indicating the event that triggered the packet. The cause field can only appear in entries for CLEAR REQUEST, DIAGNOSTIC, RESET REQUEST, and RESTART packets. Possible values for the cause field can vary, depending on the type of packet. Refer to Appendix A of this manual, "X.25 Cause and Diagnostics Codes," for explanations of these codes.
diag 0 Code providing an additional hint as to what, if anything, went wrong. The diag field can only appear in entries for CLEAR REQUEST, RESET REQUEST and RESTART packets. Because of the large number of possible values, they are listed in Appendix A of this manual, "X.25 Cause and Diagnostics Codes."

Notice that the first DATA packet in Figure 10-53 contains two fields not yet documented.

Serial2 (236426444): X25 I P4 DATA (103) 8 lci 1024 PS 0 PR 0

Table 10-52 describes the PS and PR fields that can appear in a debug x25 display.


Debug X25 PS and PR Field Descriptions
Field Description
PS 7 Packet send sequence number; used for flow control of the sending packet. Present only in DATA packets.
PR 5 Packet receive sequence number; used for flow control of the receiving packet. Present only in DATA, RR and RNR packets.

In Figure 10-53, notice also that the CALL REQUEST packet precedes two other lines of output that are unique in format.

Serial2 (236424436): X25 I P1 CALL REQUEST (11) 8 lci 1024
From(2): 49 To(2): 46
Facilities: (0)

These lines indicate that the CALL REQUEST packet has a two-digit source address, 49, and a two-digit destination address, 46. These are X.121 addresses that can be from 0 to 15 digits in length. The Facilities field is (0) bytes in length, indicating that no X.25 facilities are being requested.

Debug X25-Events

Use the debug x25-events command to display all X.25 traffic except X.25 data or acknowledgment packets.

The debug x25-events command is very useful for debugging X.25 problems, because it shows changes that occur in the virtual circuits handled by the router. Because most X.25 connectivity problems stem from errors that CLEAR or RESET virtual circuits, you can use debug x25-events to identify these errors.

While debug x25 output includes both data and control messages for all of the router's virtual circuits, debug x25-events output includes only control messages for all of the router's VCs. In contrast, debug x25-vc output includes only control messages for a particular VC. Thus, debug x25-events output is a subset of debug x25 output, and debug x25-vc output is a subset of debug x25-events output.


Note Because debug x25-events displays a subset of all X.25 traffic, it is safer to use during production hours.

Figure 10-54 shows example debug x25-events output.




Figure 10-54: Example Debug X25-Events Output

See the Debug X.25 command description for information on the fields in debug x25-events output.

Debug X25-VC

Use the debug x25-vc command to display traffic for a particular virtual circuit in order to solve any connectivity or performance problems it is exhibiting.

Syntax for the debug x25-vc command follows.

debug x25-vc number

In this syntax statement, number is the LCI number associated with the virtual circuit(s) you want to monitor. Because no interface is specified, traffic on any VC that has the specified number is reported.

While debug x25 output includes both data and control messages for all of the router's virtual circuits, debug x25-events output includes only control messages for all of the router's VCs. In contrast, debug x25-vc output includes only control messages for a particular VC. Thus, debug x25-events output is a subset of debug x25 output, and debug x25-vc output is a subset of debug x25-events output.


Note Because debug x25-vc only displays traffic for a small subset of virtual circuits, it is safe to use even under heavy traffic conditions, as long as events for that virtual circuit are fewer than 25 packets per second.

Figure 10-55 shows example debug x25-vc output.




Figure 10-55: Example Debug X25-VC Output

See the Debug X.25 command description for information on the fields in debug x25-events output.

hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1997 © Cisco Systems Inc.