Cisco Debug
Cisco Debug
July 2011
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco IOS Debug Command Reference 2011 Cisco Systems, Inc. All rights reserved.
Introduction
The Cisco IOS Debug Command Reference book consists of the following chapters:
Using Debug CommandsExplains how you use debug commands to diagnose and resolve internetworking problems. Conditionally Triggered DebuggingDescribes how to obtain debugging messages for packets entering or leaving a router on a specified interface. Debug CommandsProvides detailed descriptions of the debug commands and how to use them. X.25 Cause and Diagnostic CodesDescribes the X.25 causes and diagnostic codes that appear in certain debug command output. ISDN Switch Types, Codes, and ValuesContains a list of the supported switch types, the ISDN cause codes, cause values, bearer capability values, and progress description field values that are valid within the debug commands for ISDN.
Output formats vary with each debug command. Some commands generate a single line of output per packet, whereas others generate multiple lines of output per packet. Some generate large amounts of output; others generate only occasional output. Some generate lines of text, and others generate information in field format. Therefore, the way debug command output is documented also varies. For example, the output for debug commands that generate lines of text is usually described line by line, and the output for debug commands that generate information in field format is usually described in tables. By default, the network server sends the output from the debug commands to the console. Sending output to a terminal (virtual console) produces less overhead than sending it to the console. Use the terminal monitor privileged EXEC command to send output to a terminal. For more information about redirecting output, see the Using Debug Commands chapter.
DB-1
Introduction
DB-2
December 2010
Entering debug commands Using the debug ? command Using the debug all command Generating debug command output Redirecting debug and error message output
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
DB-3
Caution
Because debugging output takes priority over other network traffic, and because the debug all command generates more output than any other debug command, it can severely diminish the performance of the router or even render it unusable. In virtually all cases, it is best to use more specific debug commands.
The router continues to generate such output until you enter the corresponding no debug command (in this case, the no debug modem command).
DB-4
December 2010
If you enable a debug command and no output is displayed, consider the following possibilities:
The router may not be properly configured to generate the type of traffic you want to monitor. Use the more system:running-config EXEC command to check its configuration. Even if the router is properly configured, it may not generate the type of traffic you want to monitor during the particular period that debugging is turned on. Depending on the protocol you are debugging, you can use commands such as the TCP/IP ping EXEC command to generate network traffic.
Note
Be aware that the debugging destination you use affects system overhead. Logging to the console produces very high overhead, whereas logging to a virtual terminal produces less overhead. Logging to a syslog server produces even less, and logging to an internal buffer produces the least overhead of any method. To configure message logging, you need to be in configuration command mode. To enter this mode, use the configure terminal command at the EXEC prompt.
DB-5
Table 1 lists and briefly describes the logging levels and corresponding keywords you can use to set the logging levels for these types of messages. The highest level of message is level 0, emergencies. The lowest level is level 7, debugging, which also displays the greatest amount of messages. For information about limiting these messages, see sections later in this chapter.
Table 1 Message Logging Keywords and Levels
Level 0 1 2 3 4 5 6 7
Description System is unusable. Immediate action is needed. Critical conditions exist. Error conditions exist. Warning conditions exist. Normal, but significant, conditions exist. Informational messages. Debugging messages.
Syslog Definition LOG_EMERG LOG_ALERT LOG_CRIT LOG_ERR LOG_WARNING LOG_NOTICE LOG_INFO LOG_DEBUG
DB-6
December 2010
DB-7
Error messages at the emergencies level. Error messages at the alerts level. Error messages at the critical level. Error messages about software or hardware malfunctions, displayed at the errors level. Interface up/down transitions and system restart messages, displayed at the notification level. Reload requests and low-process stack messages, displayed at the informational level. Output from the debug commands, displayed at the debugging level.
The show logging privileged EXEC command displays the addresses and levels associated with the current logging setup. The command output also includes ancillary statistics.
The local7 keyword specifies the logging facility to be used. The debugging keyword specifies the syslog level. See Table 1 for other keywords that can be listed. The UNIX system sends messages at or above this level to the specified file, in this case /usr/adm/logs/tiplog. The file must already exist, and the syslog daemon must have permission to write to it. For the System V UNIX systems, the line should read as follows:
local7.debug /usr/admin/logs/cisco.log8
DB-8
December 2010
debug aaa {accounting | authorization | authentication} debug dialer packets debug isdn {q921 | q931} debug modem debug ppp {packet | negotiation | error | authentication | compression | cbcp}
Although this feature limits the output of the listed commands, it does not automatically enable the generation of debugging output from these commands. Debugging messages are generated only when the protocol-specific debug command is enabled. The debug command output is controlled through two processes:
The protocol-specific debug commands specify which protocols are being debugged. For example, the debug dialer events command generates debugging output related to dialer events. The debug condition commands limit these debugging messages to those related to a particular interface. For example, the debug condition username cisco command generates debugging output only for interfaces with packets that specify a username of cisco. Enabling Protocol-Specific Debug Commands Enabling Conditional Debugging Commands Specifying Multiple Conditions
To configure Conditionally Triggered Debugging, perform the tasks described in the following sections:
DB-9
If you want to have no output, disable all the protocol-specific debug commands.
Displaying Messages for One Interface Displaying Messages for Multiple Interfaces Limiting Messages Based on Conditions
If you enter the debug condition interface command, the debugging output will be turned off for all interfaces except the specified interface. To reenable debugging output for all interfaces, use the no debug condition interface command.
DB-10
December 2010
If you enter a condition, such as calling number, debug output will be stopped for all interfaces. The router will then monitor every interface to learn if a packet with the specified calling party number is sent or received on any interfaces. If the condition is met on an interface or subinterface, debug command output will be displayed for that interface. The debugging output for an interface is triggered when the condition has been met. The debugging output continues to be disabled for the other interfaces. If at some later time the condition is met for another interface, the debug output will become enabled for that interface as well. Once debugging output has been triggered on an interface, the output will continue until the interface goes down. However, the session for that interface might change, resulting in a new username, called party number, or calling party number. Use the no debug interface command to reset the debug trigger mechanism for a particular interface. The debugging output for that interface will be disabled until the interface meets one of the specified conditions. To limit debugging messages based on a specified condition, use the following command in privileged EXEC mode: Command debug condition {username username | called dial-string | caller dial-string} Purpose Enables conditional debugging. The router will display messages only for interfaces that meet this condition.
To reenable the debugging output for all interfaces, use the no debug condition all command.
DB-11
If you enter multiple debug condition commands, debugging output will be generated if an interface meets at least one of the conditions. If you use the no debug condition command to remove one of the conditions, using interfaces that meet only that condition will no longer produce debugging output. However, interfaces that meet a condition other than the removed condition will continue to generate output. Only if no active conditions are met for an interface will the output for that interface be disabled.
debug condition interface serial 0 debug condition interface serial 1 debug condition interface virtual-template 1 debug condition username cisco
The first three conditions have been met by one interface. The fourth condition has not yet been met.
Router# show debug condition Condition 1: interface Se0 (1 flags triggered) Flags: Se0 Condition 2: interface Se1 (1 flags triggered) Flags: Se1 Condition 3: interface Vt1 (1 flags triggered) Flags: Vt1 Condition 4: username cisco (0 flags triggered)
When any debug condition command is entered, debugging messages for conditional debugging are enabled. The following debugging messages show conditions being met on different interfaces as serial interface 0 and serial interface 1 come up. For example, the second line of output indicates that serial interface 0 meets the username cisco condition.
*Mar 1 00:04:41.647: %LINK-3-UPDOWN: Interface Serial0, changed state to up *Mar 1 00:04:41.715: Se0 Debug: Condition 4, username cisco triggered, count 2 *Mar 1 00:04:42.963: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to up *Mar 1 00:04:43.271: Vi1 Debug: Condition 3, interface Vt1 triggered, count 1 *Mar 1 00:04:43.271: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up *Mar 1 00:04:43.279: Vi1 Debug: Condition 4, username cisco triggered, count 2 *Mar 1 00:04:43.283: Vi1 Debug: Condition 1, interface Se0 triggered, count 3 *Mar 1 00:04:44.039: %IP-4-DUPADDR: Duplicate address 172.27.32.114 on Ethernet 0, sourced by 00e0.1e3e.2d41
DB-12
December 2010
*Mar 1 00:04:44.283: changed state to up *Mar 1 00:04:54.667: *Mar 1 00:04:54.731: *Mar 1 00:04:54.735: *Mar 1 00:04:55.735: state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, %LINK-3-UPDOWN: Interface Serial1, changed state to up Se1 Debug: Condition 4, username cisco triggered, count 2 Vi1 Debug: Condition 2, interface Se1 triggered, count 4 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed
After a period of time, the show debug condition command displays the revised list of conditions:
Router# show debug condition Condition 1: interface Se0 (2 flags triggered) Flags: Se0 Vi1 Condition 2: interface Se1 (2 flags triggered) Flags: Se1 Vi1 Condition 3: interface Vt1 (2 flags triggered) Flags: Vt1 Vi1 Condition 4: username cisco (3 flags triggered) Flags: Se0 Vi1 Se1
Next, serial interface 1 and serial interface 0 go down. When an interface goes down, conditions for that interface are cleared.
*Mar 1 00:05:51.443: *Mar 1 00:05:51.471: *Mar 1 00:05:51.479: *Mar 1 00:05:52.443: state to down *Mar 1 00:05:56.859: *Mar 1 00:05:56.887: *Mar 1 00:05:56.895: *Mar 1 00:05:56.899: *Mar 1 00:05:56.899: *Mar 1 00:05:56.903: *Mar 1 00:05:57.907: state to down *Mar 1 00:05:57.907: changed state to down %LINK-3-UPDOWN: Interface Serial1, changed state to down Se1 Debug: Condition 4, username cisco cleared, count 1 Vi1 Debug: Condition 2, interface Se1 cleared, count 3 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed %LINK-3-UPDOWN: Interface Serial0, changed state to down Se0 Debug: Condition 4, username cisco cleared, count 1 Vi1 Debug: Condition 1, interface Se0 cleared, count 2 Vi1 Debug: Condition 3, interface Vt1 cleared, count 1 Vi1 Debug: Condition 4, username cisco cleared, count 0 %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to down %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1,
The final show debug condition output is the same as the output before the interfaces came up:
Router# show debug condition Condition 1: interface Se0 (1 flags triggered) Flags: Se0 Condition 2: interface Se1 (1 flags triggered) Flags: Se1 Condition 3: interface Vt1 (1 flags triggered) Flags: Vt1 Condition 4: username cisco (0 flags triggered)
DB-13
DB-14
December 2010
Debug Commands
This chapter contains an alphabetical listing of the debug commands and their descriptions. Documentation for each command includes a brief description of its use, command syntax, usage guidelines, sample output, and a description of that output.
DB-15
Syntax Description
Command Modes
Usage Guidelines
The information displayed by the debug aaa accounting command is independent of the accounting protocol used to transfer the accounting information to a server. Use the debug tacacs and debug radius protocol-specific commands to get more detailed information about protocol-level issues. You can also use the show accounting command to step through all active sessions and to print all the accounting records for actively accounted functions. The show accounting command allows you to display the active accountable events on the system. It provides systems administrators a quick look at what is happening, and may also be useful for collecting information in the event of a data loss of some kind on the accounting server. The show accounting command displays additional data on the internal state of the authentication, authorization, and accounting (AAA) security system if debug aaa accounting is turned on as well.
Examples
The following is sample output from the debug aaa accounting command:
Router# debug aaa accounting 16:49:21: AAA/ACCT: EXEC acct start, line 10 16:49:32: AAA/ACCT: Connect start, line 10, glare 16:49:47: AAA/ACCT: Connection acct stop: task_id=70 service=exec port=10 protocol=telnet address=172.31.3.78 cmd=glare bytes_in=308 bytes_out=76 paks_in=45 paks_out=54 elapsed_time=14
Related Commands
Command debug aaa authentication debug aaa authorization debug radius debug tacacs
Description Displays information on accountable events as they occur. Displays information on AAA/TACACS+ authorization. Displays information associated with the RADIUS. Displays information associated with the TACACS.
DB-16
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced in a release earlier than Cisco IOS Release 15.0(1)M. This command was integrated into a release earlier than Cisco IOS Release 12.2(33)SRC. This command was integrated into a release earlier than Cisco IOS Release 12.2(33)SXI. This command was integrated into a release earlier than Cisco IOS XE Release 2.1.
Usage Guidelines
Use the debug aaa authentication command to learn the methods of authentication being used.
Examples
The following is sample output from the debug aaa authentication command. A single EXEC login that uses the default method list and the first method, TACACS+, is displayed.
Router# debug aaa authentication Nov 17 03:06:40.805 PST: AAA/BIND(0000000F): Bind i/f Nov 17 03:06:40.805 PST: AAA/AUTHEN/LOGIN (0000000F): Pick method list 'default'
DB-17
Syntax Description
Command Modes
Usage Guidelines
Use this command to learn the methods of authorization being used and the results of these methods.
Examples
The following is sample output from the debug aaa authorization command. In this display, an EXEC authorization for user carrel is performed. On the first line, the username is authorized. On the second and third lines, the attribute value (AV) pairs are authorized. The debug output displays a line for each AV pair that is authenticated. Next, the display indicates the authorization method used. The final line in the display indicates the status of the authorization process, which, in this case, has failed.
Router# debug aaa authorization 2:23:21: 2:23:21: 2:23:21: 2:23:21: 2:23:21: 2:23:21: 2:23:21: 2:23:21: AAA/AUTHOR (0): user='carrel' AAA/AUTHOR (0): send AV service=shell AAA/AUTHOR (0): send AV cmd* AAA/AUTHOR (342885561): Method=TACACS+ AAA/AUTHOR/TAC+ (342885561): user=carrel AAA/AUTHOR/TAC+ (342885561): send AV service=shell AAA/AUTHOR/TAC+ (342885561): send AV cmd* AAA/AUTHOR (342885561): Post authorization status = FAIL
The aaa authorization command causes a request packet containing a series of AV pairs to be sent to the TACACS+ daemon as part of the authorization process. The daemon responds in one of the following three ways:
Accepts the request as is Makes changes to the request Refuses the request, thereby refusing authorization
DB-18
December 2010
Table 2 describes AV pairs associated with the debug aaa authorization command that may appear in the debug output.
Table 2 Attribute Value Pairs for Authorization
Attribute Value service=arap service=shell service=ppp service=slip protocol=lcp protocol=ip protocol=ipx protocol=atalk protocol=vines protocol=unknown cmd=x
Description Authorization for the AppleTalk remote access (ARA) protocol is being requested. Authorization for EXEC startup and command authorization is being requested. Authorization for PPP is being requested. Authorization for SLIP is being requested. Authorization for LCP is being requested (lower layer of PPP). Used with service=slip to indicate which protocol layer is being authorized. Used with service=ppp to indicate which protocol layer is being authorized. Used with service=ppp or service=arap to indicate which protocol layer is being authorized. Used with service=ppp for VINES over PPP. Used for undefined or unsupported conditions. Used with service=shell, if cmd=NULL, this is an authorization request to start an EXEC. If cmd is not NULL, this is a command authorization request and will contain the name of the command being authorized. For example, cmd=telnet. Used with service=shell. When performing command authorization, the name of the command is given by a cmd=x pair for each argument listed. For example, cmd-arg=archie.sura.net. Used with service=shell and service=arap. For ARA, this pair contains an access list number. For service=shell, this pair contains an access class number. For example, acl=2. Used with service=ppp and protocol=ip. Contains an IP input access list for SLIP or PPP/IP. For example, inacl=2. Used with service=ppp and protocol=ip. Contains an IP output access list for SLIP or PPP/IP. For example, outacl=4. Used with service=slip, service=ppp, and protocol=ip. Contains the IP address that the remote host should use when connecting via SLIP or PPP/IP. For example, addr=172.30.23.11. Used with service=slip, service=ppp, and protocol=ip. Equivalent in function to the /routing flag in SLIP and PPP commands. Can either be true or false. For example, routing=true. Used with service=arap. The number of minutes before an ARA session disconnects. For example, timeout=60. Used with service=shell and cmd=NULL. Specifies an autocommand to be executed at EXEC startup. For example, autocmd=telnet yxz.com.
cmd-arg=x
acl=x
routing=x
timeout=x autocmd=x
DB-19
Table 2
Description Used with service=shell and cmd=NULL. Specifies a noescape option to the username configuration command. Can be either true or false. For example, noescape=true. Used with service=shell and cmd=NULL. Specifies a nohangup option to the username configuration command. Can be either true or false. For example, nohangup=false. Used with service=shell and cmd=NULL. Specifies the current privilege level for command authorization as a number from 0 to 15. For example, priv-lvl=15. Used with service=arap. Specifies an AppleTalk zonelist for ARA. For example, zonelist=5. Used with service=ppp and protocol=ip. Specifies the name of a local pool from which to get the address of the remote host.
nohangup=x
priv-lvl=x
zonelist=x addr-pool=x
DB-20
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SRC.
12.2(33)SRC
Examples
The following is sample output from the debug aaa cache filterserver command:
Router# debug aaa cache filterserver AAA/FLTSV: AAA/FLTSV: AAA/FLTSV: AAA/FLTSV: AAA/FLTSV: AAA/FLTSV: AAA/FLTSV: AAA/FLTSV: AAA/FLTSV: AAA/FLTSV: AAA/CACHE: AAA/CACHE: AAA/FLTSV: AAA/FLTSV: AAA/FLTSV: AAA/FLTSV: AAA/CACHE: AAA/CACHE: AAA/CACHE: AAA/CACHE: need "myfilter" (fetch), call 0x612DAC64 send req, call 0x612DAC50 method SERVER_GROUP myradius recv reply, call 0x612DAC50 (PASS) create cache add attr "call-inacl" add attr "call-inacl" add attr "call-inacl" skip attr "filter-cache-refresh" skip attr "filter-cache-time" set "AAA filtserv cache" entry "myfilter" refresh? no set "AAA filtserv cache" entry "myfilter" cachetime 15 add attr to list "call-inacl" call 0x612DAC64 add attr to list "call-inacl" call 0x612DAC64 add attr to list "call-inacl" call 0x612DAC64 PASS call 0x612DAC64 timer "AAA filtserv cache", next in 10 secs (0 entries) timer "AAA filtserv cache", next in 10 secs (1 entry) destroy "AAA filtserv cache" entry "myfilter" timer "AAA filtserv cache", next in 10 secs (0 entries)
DB-21
Related Commands
Description Enables AAA authorization caches and the downloading of ACL configurations from a RADIUS filter server.
DB-22
December 2010
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRC. This command was integrated into Cisco IOS Release 15.0(1)M.
Usage Guidelines
Examples
The following example displays the debug information about all cached entries:
Router# debug aaa cache group
Related Commands
Description Clears an individual entry or all entries in the cache. Displays cache entries stored by the AAA cache.
DB-23
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(7)T. The command output includes two new fields: Current Tries and Elapsed Time. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Dead-criteria transaction values may change with every AAA transaction. Some of the values that can be displayed are estimated outstanding transactions, retransmit tries, and dead-detect intervals. These values are explained in Table 3.
Examples
The following example shows dead-criteria transaction information for a particular server group:
Router# debug aaa dead-criteria transactions AAA Transaction debugs debugging is on *Nov 14 23:44:17.403: AAA/SG/TRANSAC: Computed Retransmit Tries: 10, Current Tries: 3, Current Max Tries: 10 *Nov 14 23:44:17.403: AAA/SG/TRANSAC: Computed Dead Detect Interval: 10s, Elapsed Time: 317s, Current Max Interval: 10s *Nov 14 23:44:17.403: AAA/SG/TRANSAC: Estimated Outstanding Transactions: 6, Current Max Transactions: 6
DB-24
December 2010
Field AAA/SG/TRANSAC Computed Retransmit Tries Current Tries Current Max Tries Computed Dead Detect Interval
Description AAA server-group transactions. Currently computed number of retransmissions before the server is marked as dead. Number of successive failures since the last valid response. Maximum number of tries since the last successful transaction. Period of inactivity (the number of seconds since the last successful transaction) that can elapse before the server is marked as dead. The period of inactivity starts when a transaction is sent to a server that is considered live. The dead-detect interval is the period that the router waits for responses from the server before the router marks the server as dead. Amount of time that has elapsed since the last valid response. Maximum period of inactivity since the last successful transaction. Estimated number of transactions that are associated with the server. Maximum transactions since the last successful transaction.
Elapsed Time Current Max Interval Estimated Outstanding Transactions Current Max Transactions
Related Commands
Description Forces one or both of the criteriaused to mark a RADIUS server as deadto be the indicated constant. Displays dead-criteria detection information for an AAA server.
DB-25
Syntax Description
Command Modes
Command History
Modification This command has existed since Cisco IOS Release 11.3 T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The per-user module is responsible for installing per-user attributes for PPP sessions.
Examples
The following example displays the configuration commands that were generated by the per-user process:
Router# debug aaa per-user AAA/PER-USER: line=[ip access-list standard Virtual-Access2#31] AAA/PER-USER: line=[deny 10.0.0.2 0.0.0.0] AAA/PER-USER: line=[permit any]
Related Commands
Command debug aaa authorization debug ppp debug radius debug tacacs
Description Displays information on AAA TACACS+ authorization. Displays information on traffic and exchanges in an internetwork implementing the PPP. Displays information associated with RADIUS. Displays information associated with TACACS.
DB-26
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Support for the voice applications as well as support for the Cisco AS5350, Cisco AS5400 and the Cisco 3600 series was added. Support for the Cisco AS5800 was added. Support for the Cisco AS5850 was added. This command was integrated into Cisco IOS Release 12.2(11)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows output from a successful POD request when using the show debug command:
Router# debug aaa pod AAA POD packet processing debugging is on Router# show debug General OS: AAA POD packet processing debugging is on Router# Apr 25 17:15:59.318:POD:172.19.139.206 request queued Apr 25 17:15:59.318:voice_pod_request: Apr 25 17:15:59.318:voip_populate_pod_attr_list: Apr 25 17:15:59.318:voip_pod_get_guid: Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val: Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=50 Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr=h323-conf-id Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=50 value_len=35
DB-27
Apr 25 17:15:59.318:voip_pod_get_guid:conf-id=FFA7785F F7F607BB 00000000 993FB1F4 n_bytes=35 Apr 25 17:15:59.318:voip_pod_get_guid:GUID = FFA7785F F7F607BB 00000000 993FB1F4 Apr 25 17:15:59.318:voip_populate_pod_attr_list: Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val: Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=23 Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr=h323-originate Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=23 value_len=6 Apr 25 17:15:59.318:voip_get_call_direction: Apr 25 17:15:59.318:voip_get_call_direction:returning answer Apr 25 17:15:59.318:voip_eval_pod_attr: Apr 25 17:15:59.318:cc_api_trigger_disconnect: Apr 25 17:15:59.322:POD:Sending ACK to 172.19.139.206/1700 Apr 25 17:15:59.322:voip_pod_clean:
Related Commands
DB-28
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SRC. This command was integrated into Cisco IOS Release 12.2(33)SRE.
12.2(33)SRC 12.2(33)SRE
Usage Guidelines
This command displays the AAA synchronization data for the session synchronization to the standby device. This information might be useful for diagnosing any AAA problems related to the session synchronization.
Examples
The following example shows sample output from the debug aaa redundancy command collected while a session is activated and synchronized to the standby device:
Router# debug aaa redundancy Logs on Active ============== 01:31:55: 01:31:55: 01:31:55: 01:31:55: 01:31:55: 01:31:55: 01:31:55: 01:31:55: 01:31:55: 01:31:55: 01:31:55: 01:31:55: CCM: New State[Not Ready] CCM: PPPoE Required CCM: PPP Required CCM: LTERM Required CCM: PPPoE is Initiator AAA/BIND(0000000B): Bind i/f Virtual-Template1 CCM: AAA Ready AAA/CCM/(0000000B): AAA sso init completed successfully SSS INFO: Element type is Access-Type = 3 (PPPoE) SSS INFO: Element type is Protocol-Type = 0 (PPP) SSS INFO: Element type is Media-Type = 1 (Ethernet) SSS INFO: Element type is Switch-Id = 4105 (00001009)
DB-29
01:31:55: SSS INFO: Element type is Segment-Hdl = 4114 (00001012) 01:31:55: SSS INFO: Element type is AAA-Id = 11 (0000000B) 01:31:55: SSS INFO: Element type is AccIe-Hdl = 33554441 (02000009) 01:31:55: SSS INFO: Element type is SHDB-Handle = 1476395017 (58000009) 01:31:55: SSS INFO: Element type is Input Interface = "GigabitEthernet6/0/0" 01:31:55: SSS MGR [uid:10]: Sending a Session Assert ID Mgr event 01:31:55: SSS MGR [uid:10]: Updating ID Mgr with the following keys: aaa-unique-id 11 (0xB) 01:31:55: SSS MGR [uid:10]: Handling Policy Service Authorize action (1 pending sessions) 01:31:55: SSS PM [uid:10][63D5D594]: RM/VPDN disabled: RM/VPDN author not needed 01:31:55: SSS PM [uid:10][63D5D594]: AAA author needed for registered user 01:31:55: SSS MGR [uid:10]: Got reply Need More Keys from PM 01:31:55: SSS MGR [uid:10]: Handling Need More Keys action 01:31:57: SSS INFO: Element type is Unauth-User = "user1" 01:31:57: SSS INFO: Element type is AccIe-Hdl = 33554441 (02000009) 01:31:57: SSS INFO: Element type is AAA-Id = 11 (0000000B) 01:31:57: SSS INFO: Element type is Access-Type = 0 (PPP) 01:31:57: SSS INFO: Element type is Protocol-Type = 0 (PPP) 01:31:57: SSS MGR [uid:10]: Sending a Session Update ID Mgr event 01:31:57: SSS MGR [uid:10]: Updating ID Mgr with the following keys: username "user1" aaa-unique-id 11 (0xB) 01:31:57: SSS MGR [uid:10]: Handling Policy Send More Keys action 01:31:57: SSS PM [uid:10][63D5D594]: AAA author needed for registered user 01:31:57: SSS PM [uid:10][63D5D594]: SGBP disabled: SGF author not needed 01:31:57: SSS MGR [uid:10]: Got reply Local Terminate from PM 01:31:57: SSS MGR [uid:10]: Handling Connect Local Service action 01:31:57: SSS MGR [uid:10]: Need the resource type determined key 01:31:57: SSS MGR [uid:10]: Handling Need More Keys action 01:31:57: SSS MGR [uid:10]: Not yet ready to start the Local service 01:31:57: AAA/AUTHEN/PPP (0000000B): Pick method list 'default' 01:31:57: RADIUS/ENCODE(0000000B):Orig. component type = PPoE 01:31:57: RADIUS: AAA Unsupported Attr: client-mac-address[42] 14 01:31:57: RADIUS: 30 30 30 61 2E 34 32 37 64 2E 65 63 [ 000a.427d.ec] 01:31:57: RADIUS: AAA Unsupported Attr: interface [171] 7 01:31:57: RADIUS: 36 2F 30 2F 30 [ 6/0/0] 01:31:57: RADIUS(0000000B): Config NAS IP: 0.0.0.0 01:31:57: RADIUS/ENCODE(0000000B): acct_session_id: 11 01:31:57: RADIUS(0000000B): sending 01:31:57: RADIUS/ENCODE: Best Local IP-Address 9.2.76.2 for Radius-Server 9.2.36.253 01:31:57: RADIUS(0000000B): Send Access-Request to 9.2.36.253:1645 id 1645/10, len 86 01:31:57: RADIUS: authenticator FD E8 32 9A 71 15 50 44 - BE FF 19 D0 09 D4 8D 15 01:31:57: RADIUS: Framed-Protocol [7] 6 PPP [1] 01:31:57: RADIUS: User-Name [1] 9 "user1" 01:31:57: RADIUS: User-Password [2] 18 * 01:31:57: RADIUS: NAS-Port-Type [61] 6 Virtual [5] 01:31:57: RADIUS: NAS-Port [5] 6 0 01:31:57: RADIUS: NAS-Port-Id [87] 9 "6/0/0/0" 01:31:57: RADIUS: Service-Type [6] 6 Framed [2] 01:31:57: RADIUS: NAS-IP-Address [4] 6 9.2.76.2 01:31:57: RADIUS: Received from id 1645/10 9.2.36.253:1645, Access-Accept, len 32 01:31:57: RADIUS: authenticator E4 68 43 2C 2F E7 B4 57 - 05 70 FF B1 22 13 E8 0F 01:31:57: RADIUS: Idle-Timeout [28] 6 200 01:31:57: RADIUS: Service-Type [6] 6 Framed [2] 01:31:57: RADIUS(0000000B): Received from id 1645/10 01:31:57: SSS INFO: Element type is Auth-User = "user1" 01:31:57: SSS INFO: Element type is AAA-Attr-List = C5000100 01:31:57: SSS INFO: Element type is idletime 200 (0xC8) 01:31:57: SSS INFO: Element type is service-type 2 [Framed] 01:31:57: SSS INFO: Element type is Resource-Determined = 1 (YES) 01:31:57: SSS INFO: Element type is Access-Type = 0 (PPP) 01:31:57: SSS INFO: Element type is Protocol-Type = 0 (PPP) 01:31:57: SSS INFO: Element type is Final = 1 (YES) 01:31:57: SSS MGR [uid:10]: Handling Connect Local Service action
DB-30
December 2010
01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 63D5D594 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57:
SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS
MGR MGR AAA AAA AAA AAA AAA AAA MGR AAA AAA AAA AAA AAA AAA AAA AAA
[uid:10]: Rcvd an AAA attr list from SIP, pushing it to the PM [uid:10]: Handling Send Policy Push Cng action AUTHOR [uid:10]: Root SIP PPPoE AUTHOR [uid:10]: Enable PPPoE parsing AUTHOR [uid:10]: Enable PPP parsing AUTHOR [uid:10]: Active key set to Unauth-User AUTHOR [uid:10]: Authorizing key user1 AUTHOR [uid:10]: Spoofed AAA reply sent for key user1 [uid:10]: Not yet ready to start the Local service AUTHOR [uid:10]: Received an AAA pass AUTHOR [uid:10]: SIP PPP[60A0504C] parsed as Success AUTHOR [uid:10]: SIP PPP[61571560] parsed as Ignore AUTHOR [uid:10]: SIP PPPoE[61599FB0] parsed as Success AUTHOR [uid:10]: SIP Root parser not installed AUTHOR [uid:10]: No service authorization info found AUTHOR [uid:10]: Active Handle present AUTHOR [uid:10]: Freeing Active Handle; SSS Policy Context Handle =
SSS AAA AUTHOR [uid:10]: Free request SSS MGR [uid:10]: Got reply Apply Config from PM SSS MGR [uid:10]: Successfully applied policy config SSS MGR [uid:10]: Handling Connect Local Service action CCM: LTERM Required SSS LTERM [uid:10]: Processing Local termination request SSS LTERM [uid:10]: Sent create-clone request to vtemplate manager SSS LTERM [uid:10]: Created vaccess interface Vi3 CCM: LTERM Ready SSS LTERM [uid:10]: Segment provision successful SSS MGR [uid:10]: Handling Local Service Connected action SSS MGR [uid:10]: Apply for Vi3: segment 4114, owner 3825205277 SSS MGR [uid:10]: Interface config 212C27B8 SSS MGR [uid:10]: Per-user config 2146BD48 SSS LTERM [uid:10]: Switching session provisioned SSS MGR [uid:10]: Handling Local Service Connected, Features Applied action %LINK-3-UPDOWN: Interface Virtual-Access3, changed state to up SSS LTERM [uid:10]: Installed Vi3 process path switching vector SSS LTERM [uid:10]: Installed Vi3 fastsend path switching vector AAA/BIND(0000000B): Bind i/f Virtual-Access3 CCM: PPPoE Ready CCM: PPP Ready CCM: PPP Old State[Not Ready] Event[All Ready] CCM: New State[Ready] AAA/CCM/(0000000B): No of sync avps = 4 Total sync data len = 94 CCM: PPP Adding Data Type[6] Subtype[0] Length[14] CCM: PPP Adding Data Type[5] Subtype[0] Length[10] CCM: PPP Adding Data Type[8] Subtype[0] Length[6] CCM: PPP Adding Data Type[7] Subtype[0] Length[0] CCM: PPP Adding Data Type[1] Subtype[0] Length[8] CCM: PPP Adding Data Type[41] Subtype[0] Length[4] CCM: PPPoE Adding Data Type[1] Subtype[0] Length[54] CCM: PPPoE Adding Data Type[2] Subtype[0] Length[2] CCM: PPPoE Adding Data Type[5] Subtype[0] Length[4] CCM: PPPoE Adding Data Type[6] Subtype[0] Length[4] CCM: PPPoE Adding Data Type[7] Subtype[0] Length[20] CCM: PPPoE Adding Data Type[8] Subtype[0] Length[16] CCM: AAA Adding Data Type[1] Subtype[0] Length[4] AAA/CCM/(0000000B): Adding sync avp [AAA Unique Id] Length = 4 CCM: AAA Adding Data Type[2] Subtype[0] Length[2] AAA/CCM/(0000000B): Adding sync avp [AAA Authen Method Index] Length = 2 CCM: AAA Adding Data Type[3] Subtype[0] Length[4] AAA/CCM/(0000000B): Adding sync avp [AAA Acct Sess id] Length = 4 CCM: AAA Adding Data Type[4] Subtype[0] Length[84] AAA/CCM/(0000000B): Adding sync avp [AAA Author Data] Length = 84 AAA/CCM: Adding author data entry 32
DB-31
01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:57: 01:31:58: to up
CCM: LTERM Adding Data Type[1] Subtype[0] Length[4] SSS LTERM [uid:10]: LTERM segment handle synced CCM: Send[Sync Session] Length[240] NumItems[17] Event[0x0] Client[PPP] Type[6] Subtype[0] Length[14] 01 04 05 D4 03 04 C0 23 05 06 03 F4 37 79 Client[PPP] Type[5] Subtype[0] Length[10] 01 04 05 D4 05 06 9A 6B 68 FE Client[PPP] Type[8] Subtype[0] Length[6] 03 06 07 01 01 01 Client[PPP] Type[7] Subtype[0] Length[0] Client[PPP] Type[1] Subtype[0] Length[8] 73 75 6D 61 6E 74 68 00 Client[PPP] Type[41] Subtype[0] Length[4] 00 00 00 02 Client[PPPoE] Type[1] Subtype[0] Length[54] 00 03 A0 10 22 90 00 0A 42 7D EC 38 88 63 11 00 00 00 22 01 02 00 06 61 61 61 5F 68 61 01 00 10 98 99 BB 6D 59 B8 35 33 0B FB 14 B9 07 83 B4 01 01 00 00 Client[PPPoE] Type[2] Subtype[0] Length[2] 00 0A Client[PPPoE] Type[5] Subtype[0] Length[4] 00 00 10 09 Client[PPPoE] Type[6] Subtype[0] Length[4] 00 00 10 12 Client[PPPoE] Type[7] Subtype[0] Length[20] 00 02 06 00 00 00 A6 B8 00 00 00 00 00 00 00 00 00 FF FF Client[PPPoE] Type[8] Subtype[0] Length[16] 00 00 00 03 00 00 00 00 00 00 00 19 00 00 00 Client[AAA] Type[1] Subtype[0] Length[4] 00 00 00 0B Client[AAA] Type[2] Subtype[0] Length[2] 00 00 Client[AAA] Type[3] Subtype[0] Length[4] 00 00 00 0B Client[AAA] Type[4] Subtype[0] Length[84] 00 00 00 00 00 00 00 00 63 E8 73 D0 00 00 64 02 FE 71 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 01 00 00 00 20 00 00 58 00 00 09 02 0A 00 20 E4 68 43 2C 2F E7 05 70 FF B1 22 13 E8 0F 1C 06 00 00 00 C8 00 00 00 02 Client[LTERM] Type[1] Subtype[0] Length[4] 00 00 20 13 CCM: New State[Dyn Sync] %LINEPROTO-5-UPDOWN: Line protocol on Interface
19 04 EB
2A
1D
00 00 00 B4 06
0B 00 00 57 06
Logs on Standby ================ 01:21:16: CCM ISSU: Received negotiation message type [ISSU_RC_USER_MESSAGE_COMP] 01:21:16: CCM: Receive[Sync Session] Length[240] NumItems[17] Flags[0x0] 01:21:16: CCM: New State[Not Ready] 01:21:16: Client[PPP] Type[6] Subtype[0] Length[14] 01:21:16: 01 04 05 D4 03 04 C0 23 05 06 03 F4 37 79 01:21:16: Client[PPP] Type[5] Subtype[0] Length[10] 01:21:16: 01 04 05 D4 05 06 9A 6B 68 FE 01:21:16: Client[PPP] Type[8] Subtype[0] Length[6] 01:21:16: 03 06 07 01 01 01 01:21:16: Client[PPP] Type[7] Subtype[0] Length[0]
DB-32
December 2010
01:21:16: 01:21:16: Client[PPP] Type[1] Subtype[0] Length[8] 01:21:16: 73 75 6D 61 6E 74 68 00 01:21:16: Client[PPP] Type[41] Subtype[0] Length[4] 01:21:16: 00 00 00 02 01:21:16: Client[PPPoE] Type[1] Subtype[0] Length[54] 01:21:16: 00 03 A0 10 22 90 00 0A 42 7D EC 38 88 63 11 19 01:21:16: 00 00 00 22 01 02 00 06 61 61 61 5F 68 61 01 04 01:21:16: 00 10 98 99 BB 6D 59 B8 35 33 0B FB 14 B9 07 EB 01:21:16: 83 B4 01 01 00 00 01:21:16: Client[PPPoE] Type[2] Subtype[0] Length[2] 01:21:16: 00 0A 01:21:16: Client[PPPoE] Type[5] Subtype[0] Length[4] 01:21:16: 00 00 10 09 01:21:16: Client[PPPoE] Type[6] Subtype[0] Length[4] 01:21:16: 00 00 10 12 01:21:16: Client[PPPoE] Type[7] Subtype[0] Length[20] 01:21:16: 00 02 06 00 00 00 A6 B8 00 00 00 00 00 00 00 2A 01:21:16: 00 00 FF FF 01:21:16: Client[PPPoE] Type[8] Subtype[0] Length[16] 01:21:16: 00 00 00 03 00 00 00 00 00 00 00 19 00 00 00 1D 01:21:16: 01:21:16: Client[AAA] Type[1] Subtype[0] Length[4] 01:21:16: 00 00 00 0B 01:21:16: Client[AAA] Type[2] Subtype[0] Length[2] 01:21:16: 00 00 01:21:16: Client[AAA] Type[3] Subtype[0] Length[4] 01:21:16: 00 00 00 0B 01:21:16: Client[AAA] Type[4] Subtype[0] Length[84] 01:21:16: 00 00 00 00 00 00 00 00 63 E8 73 D0 00 00 00 0B 01:21:16: 64 02 FE 71 00 00 00 00 00 00 00 00 00 00 00 00 01:21:16: 00 00 00 04 00 00 00 01 00 00 00 20 00 00 00 00 01:21:16: 58 00 00 09 02 0A 00 20 E4 68 43 2C 2F E7 B4 57 01:21:16: 05 70 FF B1 22 13 E8 0F 1C 06 00 00 00 C8 06 06 01:21:16: 00 00 00 02 01:21:16: Client[LTERM] Type[1] Subtype[0] Length[4] 01:21:16: 00 00 20 13 01:21:16: CCM:PPPoE Recreate Session Active[0x58000009] Standby[0x98000009] 01:21:16: CCM: PPPoE Required 01:21:16: CCM: PPP Required 01:21:16: CCM: LTERM Required 01:21:16: CCM: PPPoE is Initiator 01:21:16: AAA/CCM/: return checkpointed aaa id = 0000000B 01:21:16: Adding cache entry for id B 01:21:16: Author cache len 84 84 84 01:21:16: AAA/CCM/(0000000B):return acct_sess_id = 11 01:21:16: CCM: AAA Ready 01:21:16: AAA/CCM/(0000000B): AAA sso init completed successfully 01:21:16: SSS INFO: Element type is Access-Type = 3 (PPPoE) 01:21:16: SSS INFO: Element type is Protocol-Type = 0 (PPP) 01:21:16: SSS INFO: Element type is Media-Type = 1 (Ethernet) 01:21:16: SSS INFO: Element type is Switch-Id = 4105 (00001009) 01:21:16: SSS INFO: Element type is Segment-Hdl = 4114 (00001012) 01:21:16: SSS INFO: Element type is AAA-Id = 11 (0000000B) 01:21:16: SSS INFO: Element type is AccIe-Hdl = 4127195145 (F6000009) 01:21:16: SSS INFO: Element type is SHDB-Handle = 2550136841 (98000009) 01:21:16: SSS INFO: Element type is Input Interface = "GigabitEthernet6/0/0" 01:21:16: SSS MGR [uid:10]: Sending a Session Assert ID Mgr event 01:21:16: SSS MGR [uid:10]: Updating ID Mgr with the following keys: aaa-unique-id 11 (0xB) 01:21:16: SSS MGR [uid:10]: Handling Policy Service Authorize action (1 pending sessions) 01:21:16: SSS PM [uid:10][63D6963C]: RM/VPDN disabled: RM/VPDN author not needed 01:21:16: SSS MGR [uid:10]: Got reply Need More Keys from PM 01:21:16: SSS MGR [uid:10]: Handling Need More Keys action
DB-33
01:21:16: SSS INFO: Element type is Unauth-User = "user1" 01:21:16: SSS INFO: Element type is AccIe-Hdl = 4127195145 (F6000009) 01:21:16: SSS INFO: Element type is AAA-Id = 11 (0000000B) 01:21:16: SSS INFO: Element type is Access-Type = 0 (PPP) 01:21:16: SSS INFO: Element type is Protocol-Type = 0 (PPP) 01:21:16: SSS MGR [uid:10]: Sending a Session Update ID Mgr event 01:21:16: SSS MGR [uid:10]: Updating ID Mgr with the following keys: username "user1" aaa-unique-id 11 (0xB) 01:21:16: SSS MGR [uid:10]: Handling Policy Send More Keys action 01:21:16: SSS PM [uid:10][63D6963C]: SGBP disabled: SGF author not needed 01:21:16: SSS MGR [uid:10]: Got reply Local Terminate from PM 01:21:16: SSS MGR [uid:10]: Handling Connect Local Service action 01:21:16: SSS MGR [uid:10]: Need the resource type determined key 01:21:16: SSS MGR [uid:10]: Handling Need More Keys action 01:21:16: SSS MGR [uid:10]: Not yet ready to start the Local service 01:21:16: AAA/CCM/(0000000B):return authen_method_index = 0 01:21:16: RADIUS/ENCODE(0000000B):Orig. component type = PPoE 01:21:16: RADIUS: AAA Unsupported Attr: client-mac-address[42] 14 01:21:16: RADIUS: 30 30 30 61 2E 34 32 37 64 2E 65 63 [ 000a.427d.ec] 01:21:16: RADIUS: AAA Unsupported Attr: interface [171] 7 01:21:16: RADIUS: 36 2F 30 2F 30 [ 6/0/0] 01:21:16: RADIUS(0000000B): Config NAS IP: 0.0.0.0 01:21:16: RADIUS/ENCODE(0000000B): acct_session_id: 11 01:21:16: RADIUS(0000000B): sending 01:21:16: RADIUS/ENCODE: Best Local IP-Address 2.1.1.1 for Radius-Server 9.2.36.253 01:21:16: RADIUS(0000000B): Send Access-Request to 9.2.36.253:1645 id 1645/10, len 86 01:21:16: RADIUS: authenticator 14 48 25 90 A5 7B 53 02 - 11 05 01 13 6D 34 E2 04 01:21:16: RADIUS: Framed-Protocol [7] 6 PPP [1] 01:21:16: RADIUS: User-Name [1] 9 "user1" 01:21:16: RADIUS: User-Password [2] 18 * 01:21:16: RADIUS: NAS-Port-Type [61] 6 Virtual [5] 01:21:16: RADIUS: NAS-Port [5] 6 0 01:21:16: RADIUS: NAS-Port-Id [87] 9 "6/0/0/0" 01:21:16: RADIUS: Service-Type [6] 6 Framed [2] 01:21:16: RADIUS: NAS-IP-Address [4] 6 2.1.1.1 01:21:16: RADIUS: Cached response 01:21:16: RADIUS: authenticator E4 68 43 2C 2F E7 B4 57 - 05 70 FF B1 22 13 E8 0F 01:21:16: RADIUS: Idle-Timeout [28] 6 200 01:21:16: RADIUS: Service-Type [6] 6 Framed [2] 01:21:16: RADIUS(0000000B): Received from id 1645/10 01:21:16: SSS INFO: Element type is Auth-User = "user1" 01:21:16: SSS INFO: Element type is AAA-Attr-List = 20000100 01:21:16: SSS INFO: Element type is idletime 200 (0xC8) 01:21:16: SSS INFO: Element type is service-type 2 [Framed] 01:21:16: SSS INFO: Element type is Resource-Determined = 1 (YES) 01:21:16: SSS INFO: Element type is Access-Type = 0 (PPP) 01:21:16: SSS INFO: Element type is Protocol-Type = 0 (PPP) 01:21:16: SSS INFO: Element type is Final = 1 (YES) 01:21:16: SSS MGR [uid:10]: Handling Connect Local Service action 01:21:16: SSS MGR [uid:10]: Rcvd an AAA attr list from SIP, pushing it to the PM 01:21:16: SSS MGR [uid:10]: Handling Send Policy Push Cng action 01:21:16: SSS MGR [uid:10]: Not yet ready to start the Local service 01:21:16: SSS MGR [uid:10]: Got reply Apply Config from PM 01:21:16: SSS MGR [uid:10]: Successfully applied policy config 01:21:16: SSS MGR [uid:10]: Handling Connect Local Service action 01:21:16: CCM: LTERM Required 01:21:16: SSS LTERM [uid:10]: Processing Local termination request 01:21:16: SSS LTERM [uid:10]: Sent create-clone request to vtemplate manager 01:21:16: SSS LTERM [uid:10]: Created vaccess interface Vi3 01:21:16: CCM: LTERM Ready 01:21:16: SSS LTERM [uid:10]: Segment provision successful 01:21:16: SSS MGR [uid:10]: Handling Local Service Connected action 01:21:16: SSS MGR [uid:10]: Apply for Vi3: segment 4114, owner 2566914077
DB-34
December 2010
01:21:16: 01:21:16: 01:21:16: 01:21:16: 01:21:16: 01:21:16: 01:21:16: 01:21:16: 01:21:16: 01:21:16:
SSS MGR [uid:10]: Interface config 218170B8 SSS MGR [uid:10]: Per-user config 63E06550 SSS LTERM [uid:10]: Switching session provisioned SSS MGR [uid:10]: Handling Local Service Connected, Features Applied action SSS LTERM [uid:10]: Installed Vi3 process path switching vector SSS LTERM [uid:10]: Installed Vi3 fastsend path switching vector CCM: PPPoE Ready CCM: PPP Ready CCM: PPP Old State[Not Ready] Event[All Ready] CCM: New State[Ready]
Description AAA unique ID for the session. Adding synchronization attribute-value pair. The AAA synchronization data type.
Related Commands
DB-35
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was extended for RADIUS server load balancing to show which server is selected on the basis of a load balancing algorithm. This command was integrated into Cisco IOS Release 12.4(11)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SRC.
12.2(33)SRC
Examples
The following example shows that debugging has been set to display information about server selection:
Router# debug aaa sg-server selection
The following two debug outputs display the behavior of RADIUS transactions within a server group with the server-reorder-on-failure feature configured.
Debug 1
In the following sample output, the RADIUS server-reorder-on-failure feature is configured. The server retransmits are set to 0 (so each server is attempted only once before failover to the next configured server), and the transmissions per transaction are set to 4 (the transmissions will stop on the third failover). The third server in the server group (192.0.2.118) has accepted the transaction on the third transmission (second failover).
00:38:35: 00:38:53: 00:38:53: 00:38:58: 00:38:58: 00:38:59: 00:38:59: 00:38:59: 00:38:59: attribute %SYS-5-CONFIG-I: Configured from console by console RADIUS/ENCODE(OOOOOOOF) : ask "Username: " RADIUS/ENCODE (0000000F) : send packet; GET-USER RADIUS/ENCODE (0000000F) : ask "Password: " RADIUS/ENCODE(0000000F) : send packet; GET-PASSWORD RADIUS: AAA Unsupported [152] 4 RADIUS: 7474 [tt] RADIUS (0000000F) : Storing nasport 2 in rad-db RADIUS/ENCODE(0000000F) : dropping service type, "radius-server 6 on-for-login-auth" is off
DB-36
December 2010
00:38:59: RADIUS (0000000F) : Config NAS IP: 192.0.2.4 00:38:59: RADIUS/ENCODE (0000000F) : acct-session-id: 15 00:38:59: RADIUS (0000000F) : sending 00:38:59: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.1 00:38:59: RAPIUS(0000000F) : Send Access-Request to 192.0.2.1:1645 id 21645/11, len 78 00:38:59: RADIUS:: authenticator 4481 E6 65 2D 5F 6F OA -lE F5 81 8F 4E 1478 9C 00:38:59: RADIUS: User-Name [1] 7 "username" 00:38:59: RADIUS: User-Password [2] 18 * 00:38:59: RADIUS: NAS-Port fSl 6 2 00:~8:59: RADIUS: NAS-Port-Type [61] 6 Virtual [5] 00:38:59: RADIUS: Calling-Station-Id [31] 15 "192.0.2.23" 00:39:00: RADIUS: NAS-IP-Address [4] 6 192.0.2.130 00:39:02: RADIUS: Fail-over to (192.0.2.2:1645,1646) for id 21645/11 00:39:02: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.2 00:39:04: RADIUS: Fail-over to (192.0.2.118:1645,1646) for id 21645/11 00:39:04: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.118 00:39:05: RADIUS: Received from id 21645/11 192.0.2.118:1645, Access-Accept, len 26 00:39:05: RADIUS: authenticator 5609 56 F9 64 4E DF 19- F3 A2 DD 73 EE 3F 9826 00:39:05: RADIUS: Service-Type [6] 6 Login [1]
Debug 2
In the following sample output, the RADIUS server-reorder-on-failure feature is configured. The server retransmits are set to 0, and the transmissions per transaction are set to 8. In this transaction, the transmission to server 192.0.2.1 has failed on the eighth transmission.
00:42:30: RADIUS(00000011): Received from id 21645/13 00:43:34: RADIUS/ENCODE(00000012) : ask "Username: " 00:43:34: RADIUS/ENCODE(00000012) : send packet; GET-USER 00:43:39: RADIUS/ENCODE(00000012) : ask "Password: " 00:43:39: RADIUS/ENCODE(00000012) : send packet; GET-PASSWORD 00:43:40: RADIUS: AAA Unsupported [152] 4 00:43:40: RADIUS: 7474 [tt] 00:43:40: RADIUS(00000012) : Storing nasport 2 in rad-db 00:43:40: RADIUS/ENCODE(00000012): dropping service type, "radius-server attribute 6 on-for-login-auth" is off 00:43:40: RADIUS(00000012) : Co~fig NAS IP: 192.0.2.4 00:43:40: RADIUS/ENCODE(00000012) : acct-session-id: 18 00:43:40: RADIUS(00000012) : sending 00:43:40: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.118 00:43:40: RADIUS(00000012) : Send Access-Request to 192.0.2.118:1645 id 21645/14, len 78 00:43:40: RADIUS: authenticator B8 OA 51 3A AF A6 0018 -B3 2E 94 5E 07 OB 2A 00:43:40: RADIUS: User-Name [1] 7 "username" 00:43:40: RADIUS: User-Password [2] 18 * 00:43:40: RADIUS: NAS-Port [5] 6 2 00:43:40: RADIUS: NAS-Port-Type [61] 6 Virtual [5] 00:43:40: RADIUS: Calling-Station-]d [31] 15 "192.0.2.23" 00:43:40: RADIUS: NAS-IP-Address [4] 6 192.0.2.130 00:43:42: RADIUS: Fail-over to (192.0.2,1:1645,1646) for id 21645/14 00:43:42: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.1 00:43:44: RADius: Fail-over to (192.0.2.2:1645,1646) for id 21645/14 00:43:44: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.2 00:43:46: RADIUS: Fail-over to (192.0.2.118:1645,1646) for id 21645/14 00:43:46: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.118 00:43:48: RADIUS: Fail-over to (192.0.2.1:1645,1646) for id 21645/14 00:43:48: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.1 00:43:50: RADIUS: Fail-over to (192.0.2.2:1645,1646) for id 21645/14 00:43:50: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.2 00:43:52: RADIUS: Fail-over to (192.0.2.118:1645,1646) for id 21645/14 00:43:52: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.118 00:43:54: RADIUS: Fail-over to (192.0.2.1:1645,1646) for id 21645/14 00:43:54: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.1 00:43:56: RADIUS: No response from (192.0.2.1:1645,1646) for id 21645/14
DB-37
00:43:56:RADIUS/DECODE: parse response no app start; FAIL 00:43:56: RADIUS/DECODE: parse response;FAIL
In the following sample output, the RADIUS server load balancing feature is enabled with a batch size of 3. The server selection, based on the load balancing algorithm, is shown as five access-requests that are being sent to the server group.
Router# debug aaa sg-server selection Jul 16 03:15:05: Jul 16 03:15:05: server. Jul 16 03:15:05: Jul 16 03:15:05: server. Jul 16 03:15:05: Jul 16 03:15:05: server. Jul 16 03:15:05: Jul 16 03:15:05: server. Jul 16 03:15:05: Jul 16 03:15:05: Jul 16 03:15:05: Jul 16 03:15:05: Jul 16 03:15:05: Jul 16 03:15:05: Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded server. AAA/SG/SERVER_SELECT: [3] transactions remaining in batch. Reusing AAA/SG/SERVER_SELECT: Obtaining least loaded server. AAA/SG/SERVER_SELECT: [2] transactions remaining in batch. Reusing AAA/SG/SERVER_SELECT: Obtaining least loaded server. AAA/SG/SERVER_SELECT: [1] transactions remaining in batch. Reusing AAA/SG/SERVER_SELECT: Obtaining least loaded server. AAA/SG/SERVER_SELECT: No more transactions in batch. Obtaining a new AAA/SG/SERVER_SELECT: AAA/SG/SERVER_SELECT: AAA/SG/SERVER_SELECT: AAA/SG/SERVER_SELECT: AAA/SG/SERVER_SELECT: AAA/SG/SERVER_SELECT: AAA/SG/SERVER_SELECT: Obtaining a new least loaded server. Server[0] load: 3 Server[1] load: 0 Server[2] load: 0 Selected Server[1] with load 0 [3] transactions remaining in batch. Obtaining least loaded server.
Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [2] transactions remaining in batch. Reusing server. The field descriptions are self-explanatory.
Related Commands
Command load-balance radius-server load-balance radius-server retry method reorder radius-server transaction max-tries test aaa group
Description Enables RADIUS server load balancing for named RADIUS server groups. Enables RADIUS server load balancing for the global RADIUS server group. Specifies the reordering of RADIUS traffic retries among a server group. Specifies the maximum number of transmissions per transaction that may be retried on a RADIUS server. Tests RADIUS load balancing server response manually.
DB-38
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(11)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SRC.
12.2(33)SRC
Examples
In the following sample output, the RADIUS server load balancing feature is enabled. The idle timer has expired.
Router# debug aaa test Router# Jul 16 00:07:01: AAA/SG/TEST: Server (192.0.2.245:1700,1701) quarantined. Jul 16 00:07:01: AAA/SG/TEST: Sending test request(s) to server (192.0.2.245:1700,1701) Jul 16 00:07:01: AAA/SG/TEST: Sending 1 Access-Requests, 1 Accounting-Requests in current batch. Jul 16 00:07:01: AAA/SG/TEST(Req#: 1): Sending test AAA Access-Request. Jul 16 00:07:01: AAA/SG/TEST(Req#: 1): Sending test AAA Accounting-Request. Jul 16 00:07:01: AAA/SG/TEST: Obtained Test response from server (192.0.2.245:1700,1701) Jul 16 00:07:01: AAA/SG/TEST: Obtained Test response from server (192.0.2.245:1700,1701) Jul 16 00:07:01: AAA/SG/TEST: Necessary responses received from server (192.0.2.245:1700,1701) Jul 16 00:07:01: AAA/SG/TEST: Server (192.0.2.245:1700,1701) marked ALIVE. Idle timer set for 60 sec(s). Jul 16 00:07:01: AAA/SG/TEST: Server (192.0.2.245:1700,1701) removed from quarantine.
Related Commands
Description Enables RADIUS server load balancing for named RADIUS server groups. Enables RADIUS automated testing for load balancing.
DB-39
Description Enables RADIUS server load balancing for the global RADIUS server group. Tests RADIUS load balancing server response manually.
DB-40
December 2010
debug acircuit
To display errors and events that occur on the attachment circuits (the circuits between the provider edge (PE) and customer edge (CE) routers), use the debug acircuit command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug acircuit {error | event} no debug acircuit {error | event}
Syntax Description
error event
Displays errors that occur in attachment circuits. Displays events that occur in attachment circuits.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(25)S. Support for this command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug acircuit command to identify provisioning events, setup failures, circuit up and down events, and configuration failures on attachment circuits. An attachment circuit connects a PE router to a CE router. A router can have many attachment circuits. The attachment circuit manager controls all the attachment circuits from one central location. Therefore, when you enable the debug messages for the attachment circuit, you receive information about all the attachment circuits.
Examples
The following is sample output from the debug acircuit event command when you enable an interface:
Router# debug acircuit event *Jan 28 15:19:03.070: *Jan 28 15:19:03.070: acmgr_circuit_up *Jan 28 15:19:03.070: *Jan 28 15:19:03.070: *Jan 28 15:19:03.070: ACLIB: ac_cstate() Handling circuit UP for interface Se2/0 ACLIB [11.0.1.1, 200]: pthru_intf_handle_circuit_up() calling ACLIB [11.0.1.1, 200]: Setting new AC state to Ac-Connecting ACMGR: Receive <Circuit Up> msg Se2/0 ACMGR: circuit up event, SIP state chg down to connecting,
DB-41
action is service request *Jan 28 15:19:03.070: Se2/0 ACMGR: Sent a sip service request *Jan 28 15:19:03.070: ACLIB [11.0.1.1, 200]: AC updating switch context. *Jan 28 15:19:03.070: Se2/0 ACMGR: Rcv SIP msg: resp connect forwarded, hdl 9500001D, l2ss_hdl 700001E *Jan 28 15:19:03.070: Se2/0 ACMGR: service connected event, SIP state chg connecting to connected, action is respond forwarded *Jan 28 15:19:03.070: ACLIB: pthru_intf_response hdl is 9500001D, response is 1 *Jan 28 15:19:03.070: ACLIB [11.0.1.1, 200]: Setting new AC state to Ac-Connected
The following is sample output from the debug acircuit event command when you disable an interface:
Router# debug acircuit event *Jan 28 15:25:57.014: ACLIB: SW AC interface INTF-DOWN for interface Se2/0 *Jan 28 15:25:57.014: ACLIB [11.0.1.1, 200]: Setting new AC state to Ac-Idle *Jan 28 15:25:57.014: ACLIB: SW AC interface INTF-DOWN for interface Se2/0 *Jan 28 15:25:57.014: Se2/0 ACMGR: Receive <Circuit Down> msg *Jan 28 15:25:57.014: Se2/0 ACMGR: circuit down event, SIP state chg connected to end, action is service disconnect *Jan 28 15:25:57.014: Se2/0 ACMGR: Sent a sip service disconnect *Jan 28 15:25:57.014: ACLIB [11.0.1.1, 200]: AC deleting switch context. *Jan 28 15:25:59.014: %LINK-5-CHANGED: Interface Serial2/0, changed state to administratively down *Jan 28 15:25:59.014: ACLIB: ac_cstate() Handling circuit DOWN for interface Se2/0 *Jan 28 15:26:00.014:%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2/0, changed state to down
The following example shows output from the debug acircuit command for an xconnect session on an Ethernet interface:
Router# debug acircuit 23:28:35: ACLIB [10.0.3.201, 5]: SW AC interface UP for Ethernet interface Et2/1 23:28:35: ACLIB [10.0.3.201, 5]: pthru_intf_handle_circuit_up() calling acmgr_circuit_up 23:28:35: ACLIB [10.0.3.201, 5]: Setting new AC state to Ac-Connecting 23:28:35: ACLIB [10.0.3.201, 5]: SW AC interface UP for Ethernet interface Et2/1 23:28:35: ACLIB [10.0.3.201, 5]: pthru_intf_handle_circuit_up() ignoring up event. Already connected or connecting. 23:28:35: ACMGR: Receive <Circuit Up> msg 23:28:35: Et2/1 ACMGR: circuit up event, SIP state chg down to connecting, action is service request 23:28:35: Et2/1 ACMGR: Sent a sip service request 23:28:37: %LINK-3-UPDOWN: Interface Ethernet2/1, changed state to up 23:28:38: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet2/1, changed state to up 23:28:53: Et2/1 ACMGR: Rcv SIP msg: resp connect forwarded, hdl D6000002, sss_hdl 9E00000F 23:28:53: Et2/1 ACMGR: service connected event, SIP state chg connecting to connected, action is respond forwarded 23:28:53: ACLIB: pthru_intf_response hdl is D6000002, response is 1 23:28:53: ACLIB [10.0.3.201, 5]: Setting new AC state to Ac-Connected
Related Commands
Description Displays errors and events relating to L2TP configuration and the surrounding Layer 2 tunneling infrastructure. Displays errors and events related to an xconnect configuration.
DB-42
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use debug commands with care. They use a significant amount of CPU time and can affect system performance.
Examples
DB-43
On the standby RP, the following messages indicate that it receives checkpointing data:
AC HA [10.55.55.2, 1002]: Add to WaitQ. Flags:1 AToM HA [10.55.55.2, 1002]: Received 32-byte provision version 1 CF message AC HA CF: ClientId:89, Entity:0 Length:40 AToM HA [10.55.55.2, 1002]: Process chkpt msg provision [1], ver 1 AToM HA [10.55.55.2, 1002]: Reserved SSM sw/seg 8192/8194 [0x2000/0x2002] PW id 9216 [0x24 00] AC HA: Process Msg:35586. Ptr:44CBFD90. Val:0 AC HA: Sync. Event:4 CktType:4 Sw:8192[2000] Se:16385[4001] AC HA [10.55.55.2, 1002]: Remove from WaitQ. Flags:1[OK][OK]
During a switchover from the active to the backupRoute Processor, the debug messages look similar to the following:
%HA-5-MODE: Operating mode is hsa, configured mode is sso. AC HA RF: CId:83, Seq:710, Sta:RF_STATUS_OPER_REDUNDANCY_MODE_CHANGE, Opr:5, St:STANDBY HO T, PSt:ACTIVE AToM HA: CID 84, Seq 715, Status RF_STATUS_OPER_REDUNDANCY_MODE_CHANGE, Op 5, State STANDB Y HOT, Peer ACTIVE AC HA RF: CId:83, Seq:710, Sta:RF_STATUS_PEER_PRESENCE, Opr:0, St:STANDBY HOT, PSt:ACTIVE AToM HA: CID 84, Seq 715, Status RF_STATUS_PEER_PRESENCE, Op 0, State STANDBY HOT, Peer AC TIVE AC HA RF: CId:83, Seq:710, Sta:RF_STATUS_PEER_COMM, Opr:0, St:STANDBY HOT, PSt:DISABLED AToM HA: CID 84, Seq 715, Status RF_STATUS_PEER_COMM, Op 0, State STANDBY HOT, Peer DISABL ED %HA-2-CUTOVER_NOTICE: Cutover initiated. Cease all console activity until system restarts. %HA-2-CUTOVER_NOTICE: Do not add/remove RSPs or line cards until switchover completes. %HA-2-CUTOVER_NOTICE: Deinitializing subsystems... %OIR-6-REMCARD: Card removed from slot 4, interfaces disabled %OIR-6-REMCARD: Card removed from slot 5, interfaces disabled %OIR-6-REMCARD: Card removed from slot 9, interfaces disabled %HA-2-CUTOVER_NOTICE: Reinitializing subsystems... %HA-2-CUTOVER_NOTICE: System preparing to restart... %HA-5-NOTICE: Resuming initialization... AC HA RF: CId:83, Seq:710, Sta:RF_STATUS_REDUNDANCY_MODE_CHANGE, Opr:7, St:STANDBY HOT, PS t:DISABLED . . . %LDP-5-GR: LDP restarting gracefully. Preserving forwarding state for 250 seconds. AC HA RF: CId:83, Seq:710, Sta:RF_PROG_ACTIVE, Opr:0, St:ACTIVE, PSt:DISABLED AToM HA: CID 84, Seq 715, Event RF_PROG_ACTIVE, Op 0, State ACTIVE, Peer DISABLED AC HA: Process Msg:35588. Ptr:0. Val:0 AC HA: Switchover: Standby->Active AC HA RF: Reconciling
Related Commands
Description Enables the display of AToM events when AToM is configured for NSF/SSO and Graceful Restart.
DB-44
December 2010
debug adjacency
To enable the display of information about the adjacency database, use the debug adjacency command in privileged EXEC mode. To disable the display of these events, use the no form of this command. debug adjacency [epoch | ipc | state | table] [prefix] [interface] [connectionid id] [link {ipv4 | ipv6 | mpls}] no debug adjacency [epoch | ipc | state | table] [prefix] [interface] [connectionid id] [link {ipv4 | ipv6 | mpls}]
Syntax Description
(Optional) Displays adjacency epoch events. (Optional) Displays interprocess communication (IPC) events for adjacencies. (Optional) Displays adjacency system state machine events. (Optional) Displays adjacency table operations. (Optional) Displays debugging events for the specified IP address or IPv6 address.
Note
On the Cisco 10000 series routers, IPv6 is supported in Cisco IOS Release 12.2(28)SB and later releases.
interface
(Optional) Displays debugging events for the specified interface. For line cards, you must specify the line card if_number (interface number). Use the show cef interface command to obtain line card if_numbers. (Optional) Displays debugging events for the specified client connection identification number.
connectionid id
link {ipv4 | ipv6 | mpls} (Optional) Displays debugging events for the specified link type (IP, IPv6, or Multiprotocol Label Switching [MPLS] traffic).
Note
On the Cisco 10000 series routers, IPv6 is supported in Cisco IOS Release 12.2(28)SB and later releases.
Command Default
Command Modes
Command History
Modification This command was introduced on the Cisco 7600 series routers. This command was implemented on the Cisco 7600 series routers. This command was implemented on the Supervisor Engine 720. This command was integrated into Cisco IOS Release 12.2(25)S, and the prefix, interface, connectionid id, and link {ipv4 | ipv6 | mpls} keywords and arguments were added.
DB-45
Modification This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
Because debugging output is assigned high priority in the CPU process, you should use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Also, you should use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. You can use any combination of the prefix, interface, connectionid id, and link {ipv4 | ipv6 | mpls} keywords and arguments (in any order) as a filter to enable debugging for a specified subset of adjacencies.
Note
On the Cisco 10000 series routers, IPv6 is supported in Cisco IOS Release 12.2(28)SB and later releases.
Examples
The following example shows how to display information on the adjacency database:
Router# debug adjacency *Jan 27 06:22:50.543: ADJ-ios_mgr: repopulate adjs on up event for Ethernet3/0 *Jan 27 06:22:50.543: ADJ: IPV6 adj out of Ethernet3/0, addr FE80::20C:CFFF:FEDF:6854 (incomplete) no src set: init/update from interface *Jan 27 06:22:50.543: ADJ: IPV6 adj out of Ethernet3/0, addr FE80::20C:CFFF:FEDF:6854 (incomplete) no src set: set bundle to IPv6 adjacency oce *Jan 27 06:22:50.543: ADJ: IPV6 adj out of Ethernet3/0, addr FE80::20C:CFFF:FEDF:6854 (incomplete) no src set: allocated, setup and inserted OK *Jan 27 06:22:50.543: ADJ: IPV6 adj out of Ethernet3/0, addr FE80::20C:CFFF:FEDF:6854 (incomplete) src IPv6 ND: source IPv6 ND added OK *Jan 27 06:22:50.543: ADJ: IPV6 adj out of Ethernet3/0, addr FE80::20C:CFFF:FEDF:6854 (incomplete) src IPv6 ND: computed macstring (len 14): OK *Jan 27 06:22:50.543: ADJ: IPV6 adj out of Ethernet3/0, addr FE80::20C:CFFF:FEDF:6854 src IPv6 ND: made complete (macstring len 0 to 14/0 octets) 00:04:40: %LINK-3-UPDOWN: Interface Ethernet3/0, changed state to up 00:04:41: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet3/0, changed
Related Commands
Command clear adjacency clear arp-cache show adjacency show mls cef adjacency
Description Clears the Cisco Express Forwarding adjacency table. Deletes all dynamic entries from the ARP cache. Displays Cisco Express Forwarding adjacency table information. Displays information about the hardware Layer 3 switching adjacency node.
DB-46
December 2010
Syntax Description
Displays information about the vasileft interface. Displays information about the vasiright interface. Identifier of the VASI interface. The range is from 1 to 256.
Command Modes
Command History
Examples
Related Commands
debug vasi debug interface (vasi) interface (vasi) show vasi pair
Displays debugging information for the VASI. Displays debugging information for the VASI interface descriptor block. Configures VASI virtual interface. Displays the status of a VASI pair.
DB-47
debug alarm-interface
To show real-time activities in the data channel or the management channel of the Alarm Interface Controller (AIC), use the debug alarm-interface command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug alarm-interface slot-number {data | management} no debug alarm-interface slot-number {data | management}
Syntax Description
Router chassis slot where the AIC network module is installed. Displays AIC serial data channel and asynchronous craft port communication activity. Displays IOS-to-AIC communication activity.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for the Cisco 2600 series and the Cisco 3600 series. This command was integrated into Cisco IOS Release 12.2(8)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command allows you to observe the management channel activity from the AIC in the specified slot. Such activity shows that the software running on the AIC CPU has reached a minimum level of working order.
Examples
The following is sample output from the debug alarm-interface 1 data command:
Router# debug alarm-interface 1 data AIC Slot 1:STATUS received aic_fastsend:particle count=1, len=1504 aic_pak_to_txring:scattered particle count=1, tx bytes=1504, leftover=0 aic_interrupt:# 30419 gstar=0x1000000
DB-48
December 2010
aic_safe_start:particle count=1, len=524 aic_pak_to_txring:scattered particle count=1, tx bytes=524, leftover=0 aic_process_TXivq:ivq - 0x42040000 at 15, slice 1 aic_interrupt:# 30420 gstar=0x1000000 aic_process_TXivq:ivq - 0x42040000 at 16, slice 1 aic_interrupt:# 30421 gstar=0x10000000 aic_scc_rx_intr:sts_dlen=0xC5E10000, len=1504, RSTA=0xA0 aic_serial_RX_interrupt:rxtype=1, len=1504, aic_scc_rx_intr:last_rxbd has aged, 2 aic_process_RXivq:ivq - 0x60000 at 13, slice 1 aic_interrupt:# 30422 gstar=0x10000000 aic_scc_rx_intr:sts_dlen=0xC20D0000, len=524, RSTA=0xA0 aic_serial_RX_interrupt:rxtype=1, len=524, aic_process_RXivq:ivq - 0x60000 at 14, slice 1 aic_interrupt:# 30423 gstar=0x20000000 aic_scc_rx_intr:sts_dlen=0xC00D0000, len=12, RSTA=0xA0 aic_mgmt_RX_interrupt:len=12 aic_mgmt_fastsend:particle count=1, len=20 / 20 aic_pak_to_txring:scattered particle count=1, tx bytes=20, leftover=0 aic_scc_rx_intr:last_rxbd has aged, 2 aic_process_RXivq:ivq - 0x10060000 at 37, slice 1 aic_interrupt:# 30424 gstar=0x2000000 aic_process_TXivq:ivq - 0x52040000 at 24, slice 1
Related Commands
Description Enters the alarm interface mode and configures the AIC. Resets the AIC CPU.
DB-49
Syntax Description
Displays ASCU events or protocol errors. Displays sent or received packets. Displays all ASCU protocol events. Enables event, packet, and detail debugging. Specifies how to display ASCU addresses and the hexadecimal data in the debug output:
iparsDisplays only the IPARS hexadecimal output. routerDisplays only the router hexadecimal output. bothDisplays both the IPARS and router hexadecimal output.
The only difference between the IPARS output and the router output is the format of the hexadecimal data. interface ascu id (Optional) Enables debugging on a specified interface. Applies only to the event, packet, detail, and all keywords. (Optional) Enables debugging for a specified ASCU.
Defaults
Debugging is off.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for limited availability. This command was available for general release. This command was modified. The format, ipars, router, and both keywords were added. The output for this command was modified to include IPARS and router formats.
DB-50
December 2010
Modification This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To enable debugging for a group of ASCUs, enter a separate command for each ASCU interface and IA combination. The interface option applies only to the event, packet, detail, and all keywords.
Note
To specify the particular debug tracing level (event, packet, detail or all) and the format (router, pairs or both), you must configure the debug alps ascu command two times: once to configure the debug tracing level and once to configure the format.
Examples
The following output is from the debug alps ascu event command, showing events or protocol errors in router format for ASCU 42 on interface Serial7:
Router# debug alps ascu format router Router# debug alps ascu event Serial7 42 ALPS ASCU: T1 expired for ascu 42 on i/f Serial7 ALPS ASCU: DOWN event while UP for ascu 42 on i/f Serial7 : C1 count = 1
Note
If you specify the ipars or both format for the event or detail tracing level, both the IPARS and router formats will be displayed. The following output is from the debug alps ascu event command, showing events or protocol errors in ipars format for ASCU 42 on interface Serial7:
Router# debug alps ascu format ipars Router# debug alps ascu event Serial7 42 ALPS ASCU: T1 expired for ascu 42/2F on i/f Serial7 ALPS ASCU: DOWN event while UP for ascu 42/2F on i/f Serial7 : C1 count = 1
The following output is from the debug alps ascu detail command, showing all protocol events in router format for ASCU 42 on interface Serial6:
Router# debug alps ascu format router Router# debug alps ascu detail Serial6 42 ALPS ASCU: ALPS ASCU: ALPS ASCU: ALPS ASCU: ALPS ASCU: ALPS ASCU: RTP_MATIP ALPS ASCU: Tx ALC ALC GO Tx ALC ALC GO Tx ALC Rx ALC POLL MSG (+ 0 pad bytes) to ascu 42 on i/f Serial6 AHD MSG rcvd from ascu 42 on i/f Serial6 POLL MSG (+ 0 pad bytes) to ascu 42 on i/f Serial6 AHD MSG rcvd from ascu 42 on i/f Serial6 POLL MSG (+ 0 pad bytes) to ascu 42 on i/f Serial6 DATA MSG (14 bytes + CCC) from ascu 42 on i/f Serial6, fwd to ckt
DB-51
ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6 ALPS ASCU: Tx ALC POLL MSG (3 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6
Note
If you specify the ipars or both format for the event or detail tracing level, both the IPARS and router formats will be displayed. The following output is from the debug alps ascu detail command, showing all protocol events in both format for ASCU 42 on interface Serial6:
Router# debug alps ascu format both Router# debug alps ascu detail Serial6 42 ALPS ASCU: ALPS ASCU: ALPS ASCU: ALPS ASCU: ALPS ASCU: ALPS ASCU: RTP_MATIP ALPS ASCU: ALPS ASCU: ALPS ASCU: Tx ALC ALC GO Tx ALC ALC GO Tx ALC Rx ALC POLL MSG (+ 0 pad bytes) to ascu 42/2F on i/f Serial6 AHD MSG rcvd from ascu 42/2F on i/f Serial6 POLL MSG (+ 0 pad bytes) to ascu 42/2F on i/f Serial6 AHD MSG rcvd from ascu 42/2F on i/f Serial6 POLL MSG (+ 0 pad bytes) to ascu 42/2F on i/f Serial6 DATA MSG (14 bytes + CCC) from ascu 42/2F on i/f Serial6, fwd to ckt
ALC GO AHD MSG rcvd from ascu 42/2F on i/f Serial6 Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6 Tx ALC POLL MSG (3 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6
The following output is from the debug alps ascu packet command, showing all packets sent or received in router format for ASCU 42 on interface Serial6:
Router# debug alps ascu packet format router Serial6 42 ALPS ASCU: Tx ALC 02321D26 0C261616 140C0D18 26163135 ALPS ASCU: Rx ALC RTP_MATIP 42607866 65717866 65717966 755124 ALPS ASCU: Tx ALC 022038 26253138 26253139 263511E4 SERVICE MSG (18 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6 0611C6 DATA MSG (14 bytes + CCC) from ascu 42 on i/f Serial6, fwd ckt
DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6
The following output is from the debug alps ascu packet command, showing all packets sent or received in ipars format for ASCU 42 on interface Serial6:
Router# debug alps ascu packet format ipars Serial6 42 ALPS ASCU: Tx ALC SERVICE MSG (18 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6 ALPS IPARS Format: 2F2C1126 33262525 35331339 26251C14 271DC6 ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42/2F on i/f Serial6, fwd ckt RTP_MATIP ALPS IPARS Format: 2F3E3826 161C3826 161C1826 141D24 ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6 ALPS IPARS Format: 2F3E38 26161C38 26161C18 26141DE4
DB-52
December 2010
The following output is from the debug alps ascu packet command, showing all packets sent or received in both formats for ASCU 42 on interface Serial6:
Router# debug alps ascu packet format both Serial6 42 ALPS ASCU: Tx ALC SERVICE MSG (18 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6 ALPS Router Format: 02321D26 0C261616 140C0D18 26163135 0611C6 ALPS IPARS Format: 2F2C1126 33262525 35331339 26251C14 271DC6 ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42/2F on i/f Serial6, fwd ckt RTP_MATIP ALPS Router Format: 42607866 65717866 65717966 755124 ALPS IPARS Format: 2F3E3826 161C3826 161C1826 141D24 ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6 ALPS Router Format: 022038 26253138 26253139 263511E4 ALPS IPARS Format: 2F3E38 26161C38 26161C18 26141DE4
DB-53
Syntax Description
name
(Optional) Name given to identify an ALPS circuit on the remote customer premises equipment (CPE).
Defaults
If no circuit name is specified, then debugging is enabled for every ALPS circuit.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To enable debugging for a single ALPS circuit, specify the name of the circuit. To enable debugging for a group of circuits, enter a separate command for each circuit name.
Examples
The following is sample output from the debug alps circuit event command for circuit RTP_AX25:
alps-rcpe# debug alps circuit event RTP_AX25 ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= OPEN, (CloseAndDisable)->DISC ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= DISC, (TmrStartNullRetry)->INOP ALPS P1024 CKT: Ckt= RTP_AX25, Open - peer set to ALPS P1024 CKT: Ckt= RTP_AX25, Open - peer open. ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= INOP, (Open)->OPNG ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= OPNG, (CacheAndFwdAscuData)->OPEN alps-ccpe# debug alps circuit event RTP_AX25 Event= DISABLE: Event= ENABLE: 200.100.40.2 Event= RETRY_TIMEOUT: Event= CKT_OPEN_CFM:
DB-54
December 2010
ALPS AX.25 FSM: Ckt= RTP_AX25, State= OPEN, (PvcKill,CktRemove,TmrStartClose)->INOP ALPS AX.25 FSM: Ckt= RTP_AX25, State= INOP, (-,-,-)->INOP ALPS AX.25 FSM: Ckt= RTP_AX25, State= INOP, (-,CktDestroy,TmrStop)->INOP ALPS AX.25 FSM: Ckt= RTP_AX25, State= INOP, (PvcMake,CktAdd,TmrStartOpen)->OPNG ALPS AX.25 FSM: Ckt= RTP_AX25, State= OPNG, (-,-,-)->OPNG ALPS AX.25 FSM: Ckt= RTP_AX25, State= OPNG, (-,OpnCfm,TmrStop)->OPEN
Event= CktClose, Rsn= 12: Event= X25PvcInact, Rsn= 0: Event= X25VcDeleted, Rsn= 0: Event= CktOpReq, Rsn= 4: Event= X25ResetTx, Rsn= 0: Event= X25VcUp, Rsn= 0:
DB-55
Syntax Description
Specifies debugging for an event. Specifies debugging for a packet. (Optional) Remote peer IP address.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for limited availability. This command was available for general release. The packet keyword was added. The format for the output was modified for consistency. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To enable debugging for a single remote ALPS peer, specify the peer IP address. To enable debugging for a set of remote peers, enter the command for each peer IP address.
Examples
The following is sample output from the debug alps peer packet command:
Router# debug alps peer packet ALPS PEER:Peer (10.227.50.106, MATIP_A_CKT-1) - TX Peer Data Msg (18 bytes) 040A5320: 01 00001241 040A5330:45546B5F 6F4F7757 67477B5B 51 ALPS PEER:Peer (10.227.50.106, MATIP_A_CKT-1) - RX Peer Data Msg (18 bytes) 04000550: 01000012 4145546B 5F6F4F77 04000560:5767477B 5B51 ALPS PEER:Peer (10.227.50.106, MATIP_A_CKT-1) - TX Peer Data Msg (18 bytes)
DB-56
December 2010
0409F6E0: 01 00001241 45546B5F 0409F6F0:6F4F7757 67477B5B 51 ALPS PEER:Peer (10.227.50.106, MATIP_A_CKT-1) - RX Peer Data Msg (18 bytes) 04000680: 01000012 4145546B 04000690:5F6F4F77 5767477B 5B51
DB-57
Syntax Description
ipaddr
Peer IP address.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To enable debugging for a single remote ALPS peer, specify the peer IP address. To enable debugging for a set of remote peers, enter the command for each peer IP address.
Examples
The following is sample output from the debug alps peer event command:
Router# debug alps peer event ALPS ALPS ALPS ALPS ALPS ALPS PEER: PEER: PEER: PEER: PEER: PEER: FSM - Peer 200.100.25.2, Event ALPS_CLOSED_IND, State OPENED peer 200.100.25.2 closed - closing peer circuits. Promiscuous peer created for 200.100.25.2 TCP Listen - passive open 200.100.25.2(11003) -> 10000 FSM - Peer 200.100.25.2, Event ALPS_OPEN_IND, State DISCONN peer 200.100.25.2 opened OK.
DB-58
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for limited availability. This command was available for general release. This command was added to the documentation. The output for this command was modified to reflect MIB and SNMP changes. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following output is from the debug alps snmp command. The first line shows a circuit event status change. The second line shows an ASCU status change. The third line shows a peer connection status change.
Router# debug alps snmp ALPS CktStatusChange Notification for circuit CKT-1 ALPS AscuStatusChange Notification for ascu (Serial3, 41) PeerConnStatusChange Notification for peer (10.227.50.106, MATIP_A_CKT-1)
The following output shows that an open failure has occurred on circuit 1:
ALPS CktOpenFailure Notification for circuit CKT1
The following output shows that a partial rejection to an ALPS circuit peer open request has occurred on circuit 1:
ALPS CktPartialReject Notification for ascu (Serial2, 41) on circuit CKT1
DB-59
debug ancp
To enable the display of debugging information related to the Access Node Control Protocol (ANCP), use the debug ancp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ancp {adjacency | details | errors | events | neighbor | packets [brief] | port-event {details | events} | port-management {details | events}} no debug ancp {adjacency | details | errors | events | neighbor | packets [brief] | port-event {details | events} | port-management {details | events}}
Syntax Description
Displays information about adjacency messages on an ANCP server. Displays detailed static configuration information relating to ANCP and dynamic line conditions. Displays information about ANCP protocol errors. Displays information about ANCP protocol events. Displays information about ANCP neighbors. Displays information about ANCP control packets. (Optional) Displays static configuration information for ANCP control packets. Displays ANCP event messages (port up and port down) related to data ports. Displays ANCP operations, administration, and maintenance (OAM) messages.
Command Modes
Command History
Release 12.2(28)ZV 12.2(31)ZV1 Cisco IOS XE Release 2.4 Cisco IOS XE Release 3.2S
Modification This command was introduced on the Cisco 10000 series router. This command was modified. L2CP was replaced with ANCP. This command was integrated into Cisco IOS XE Release 2.4. This command was modified. The port-event and port-management keywords were added.
Usage Guidelines
You can use the debug condition interface command to conditionalize all the debug commands where the ANCP TCP connections are terminated.
DB-60
December 2010
Examples
The following is sample output from the debug ancp adjacency command. The output fields are self-explanatory.
Router# debug ancp adjacency *Sep 20 08:23:53.833: Sending adj (SYN) msg nbr_info 0 nbr 10.1.1.1/46459 tcb 50C2050 *Sep 20 08:23:53.834: ANCP: Using Mac address aabb.cc00.7a00 *Sep 20 08:23:53.834: ANCP : Sending adj (SYN) msg to writeQ, msg len 48 interface Ethernet0/0.1 TCB 50C2050 *Sep 20 08:23:53.836: ANCP: Received adjacency (SYN) message, from 10.1.1.1 port 46459 tcb 50C2050 *Sep 20 08:23:53.836: ANCP: 2 capability tlv(s) received *Sep 20 08:23:53.837: Capability received (mask) : 9 *Sep 20 08:23:53.837: Sending adj (SYNACK) msg nbr_info 6368300 nbr 10.1.1.1/46459 tcb 50C2050 *Sep 20 08:23:53.837: ANCP: Using Mac address aabb.cc00.7a00 *Sep 20 08:23:53.837: ANCP : Sending adj (SYNACK) msg to writeQ, msg len 48 interface Ethernet0/0.1 TCB 50C2050 *Sep 20 08:23:53.837: ANCP ADJ: received SYN from nbr, state SYNSENT Sending SYNACK to nbr. State transitons to SYNRCVD *Sep 20 08:23:53.841: ANCP: Received adjacency (SYNACK) message, from 10.1.1.1 port 46459 tcb 50C2050 *Sep 20 08:23:53.842: ANCP: 2 capability tlv(s) received *Sep 20 08:23:53.842: Capability received (mask) : 9 *Sep 20 08:23:53.842: Sending adj (ACK) msg nbr_info 6368300 nbr 10.1.1.1/46459 tcb 50C2050 *Sep 20 08:23:53.842: ANCP: Using Mac address aabb.cc00.7a00
The following is sample output from the debug ancp events command:
Router# debug ancp events ANCP protocol events debugging is on ANCP: TCP accepted on address 10.1.1.2 for remote peer 10.1.1.1 Sending adj msg, code 1 nbr_info 0 nbr 10.1.1.1/40224 tcb 549D930 TCP read_notify called, calling ancp_io_read_request. ANCP IO should service the read request ANCP: Received adjacency message, code 1 Src 10.1.1.1 Src port 40224 tcb 549D930 ANCP: 2 capability tlv(s) received Sending adj msg, code 2 nbr_info 5FA92F0 nbr 10.1.1.1/40224 tcb 549D930 ANCP ADJ: received SYN from nbr, state SYNSENT Sending SYNACK to nbr. State transitons to SYNRCVD TCP read_notify called, calling ancp_io_read_request. ANCP IO should service the read request ANCP: Received adjacency message, code 2 Src 10.1.1.1 Src port 40224 tcb 549D930 ANCP: 2 capability tlv(s) received Sending adj msg, code 3 nbr_info 5FA92F0 nbr 10.1.1.1/40224 tcb 549D930 ANCP ADJ: received SYNACK from nbr, state SYNRCVD Sending ACK to nbr. State transtions to ESTAB TCP read_notify called, calling ancp_io_read_request. ANCP IO should service the read request ANCP: Received adjacency message, code 3 Src 10.1.1.1 Src port 40224 tcb 549D930 ANCP: 2 capability tlv(s) received ANCP ADJ: received ACK from nbr, state ESTAB Sending ACK to nbr thou timer. State stays ESTAB TCP read_notify called, calling ancp_io_read_request. ANCP IO should service the read request Sending adj msg, code 3 nbr_info 5FA92F0 nbr 10.1.1.1/40224 tcb 549D930 ANCP: Received adjacency message, code 3 Src 10.1.1.1 Src port 40224 tcb 549D930 ANCP: 2 capability tlv(s) received ANCP ADJ: received ACK from nbr, state ESTAB Sending ACK to nbr thou timer. State stays ESTAB
DB-61
Sending adj msg, code 3 nbr_info 5FA92F0 nbr 10.1.1.1/40224 tcb 549D930 TCP read_notify called, calling ancp_io_read_request. ANCP IO should service the read request ANCP: Received adjacency message, code 3 Src 10.1.1.1 Src port 40224 tcb 549D930 ANCP: 2 capability tlv(s) received ANCP ADJ: received ACK from nbr, state ESTAB Sending ACK to nbr thou timer. State stays ESTAB
Description Adjacency message received from the ANCP neighbor. Adjacency protocol messages synchronize the Network Access Server and access nodes. Supported capability type-length-values are included in the adjacency message.
The following is sample output from the debug ancp port-event details command. The output fields are self-explanatory.
Router# debug ancp port-event details *Sep 20 08:24:55.608: ANCP: Found db entry based on access-loop-circuit-id alcid1, received in Port UP message *Sep 20 08:24:55.608: Advance 12 bytes (aligned) to next TLV. *Sep 20 08:24:55.609: ANCP: Processing DSL_LINE_ATTRIBUTES sub-TLVs: PORT UP *Sep 20 08:24:55.609: ANCP: Port UP: received DSL Line Attrs, tlv length in msg 32 aligned len 32 *Sep 20 08:24:55.609: DSL_TYPE received. 4 *Sep 20 08:24:55.609: Advance 8 bytes (aligned) to next sub-TLV. *Sep 20 08:24:55.609: ACTUAL_DATA_RATE_UP received. 7878 *Sep 20 08:24:55.609: Advance 8 bytes (aligned) to next sub-TLV. *Sep 20 08:24:55.609: ACTUAL_DATA_RATE_DN received. 9090 *Sep 20 08:24:55.610: Advance 8 bytes (aligned) to next sub-TLV. *Sep 20 08:24:55.610: DSL_LINE_STATE received. 1 *Sep 20 08:24:55.610: Advance 8 bytes (aligned) to next sub-TLV. *Sep 20 08:24:55.610: Advance 36 bytes (aligned) to next TLV.
The following is sample output from the debug ancp port-management details command. The output fields are self-explanatory.
Router# debug ancp port-management details *Sep 20 08:29:22.263: 3120 3500 0000 0000 8001 0034 0000 0000 0000 0000 0000 0000 0000 0900 0000 0000 0020 0500 0001 0010 0001 0006 616C 6369 6431 0000
DB-62
December 2010
*Sep 20 08:29:22.266: ANCP_PORT_MGMT: Ethernet0/0.1 Port Mgmt message, Total TLVs : 1 *Sep 20 08:29:22.266: ANCP_PORT_MGMT: Received Access-Loop-Cir-ID alcid1 *Sep 20 08:29:22.266: ANCP_PORT_MGMT: Received Result: success(0x3) Code: Specified access line does not exist(0x500). *Sep 20 08:29:22.266: Advance 12 bytes (aligned) to next TLV.
Related Commands
Command debug condition interface show ancp neighbor show ancp status
Description Limits the output for some debug commands on the basis of interface, VC, or VLAN. Displays statistics of ANCP neighbor information and neighborship information with local ANCP ports. Displays ANCP-related information for the ANCP endpoints configured on a BRAS interface.
DB-63
debug appfw
To display debug messages about Cisco IOS Firewall events, use the debug appfw command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug appfw {application protocol | function-trace | object-creation | object-deletion | events | timers | detailed} no debug appfw {application protocol | function-trace | object-creation | object-deletion | events | timers | detailed}
Syntax Description
application protocol
Displays messages about protocol events of firewall-inspected applications, including details about the protocols packets. Currently, the only supported protocol is HTTP. (Issue the http keyword.) Displays messages about software functions called by Cisco IOS Firewall. Displays messages about software objects that are being created by Cisco IOS Firewall. Cisco IOS Firewall-inspected sessions begin when the object is created. Displays messages about software objects that are being deleted by Cisco IOS Firewall. Cisco IOS Firewall-inspected sessions close when the object is deleted. Displays messages about Cisco IOS software events, including Cisco IOS Firewall packet processing. Displays messages about Cisco IOS Firewall timer events, such as an idle timeout by the Cisco IOS Firewall. Detailed information for all other enabled Cisco IOS Firewall debugging is displayed.
Note
function-trace object-creation
object-deletion
This keyword should be used in conjunction with other Cisco IOS Firewall debugging commands.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample configuration shows how to configure an HTTP policy with application firewall debugging enabled:
Router(config)# appfw policy-name myPolicyAPPFW APPFW APPFW FUNC:appfw_policy_find
DB-64
December 2010
FUNC:appfw_policy_alloc -- policy_alloc 0x65727278 FUNC:appfw_policy_alloc -- Policy 0x65727278 is set to valid FUNC:appfw_policy_alloc -- Policy myPolicy has been created FUNC:appfw_policy_command -- memlock policy 0x65727278
! Debugging sample for application (HTTP) creation Router(cfg-appfw-policy)# application httpAPPFW APPFW APPFW APPFW APPFW APPFW FUNC:appfw_http_command
FUNC:appfw_http_appl_find FUNC:appfw_http_appl_find -- Application not found FUNC:appfw_http_appl_alloc FUNC:appfw_http_appl_alloc -- appl_http 0x64D7A25C FUNC:appfw_http_appl_alloc -- Application HTTP parser structure 64D7A25C created
! Debugging sample for HTTP-specific application inspection Router(cfg-appfw-policy-http)# Router(cfg-appfw-policy-http)# strict-http action reset alarm APPFW FUNC:appfw_http_subcommand APPFW FUNC:appfw_http_subcommand -- strict-http cmd turned on Router# debug appfw detailed APPFW Detailed Debug debugging is on fw7-7206a#debug appfw object-creation APPFW Object Creations debugging is on fw7-7206a#debug appfw object-deletion APPFW Object Deletions debugging is on
DB-65
Syntax Description
type number
Command Modes
Privileged EXEC
Usage Guidelines
This command is helpful when you experience problems communicating with a node on the network you control (a neighbor). If the debug apple arp display indicates that the router is receiving AARP probes, you can assume that the problem does not reside at the physical layer.
Examples
The following is sample output from the debug apple arp command:
Router# debug apple arp Ether0: Ether0: Ether0: Ether0: Ether0: Ether0: AARP: AARP: AARP: AARP: AARP: AARP: Sent resolve for 4160.26 Reply from 4160.26(0000.0c00.0453) for 4160.154(0000.0c00.8ea9) Resolved waiting request for 4160.26(0000.0c00.0453) Reply from 4160.19(0000.0c00.0082) for 4160.154(0000.0c00.8ea9) Resolved waiting request for 4160.19(0000.0c00.0082) Reply from 4160.19(0000.0c00.0082) for 4160.154(0000.0c00.8ea9)
Explanations for representative lines of output follow. The following line indicates that the router has requested the hardware MAC address of the host at network address 4160.26:
Ether0: AARP: Sent resolve for 4160.26
The following line indicates that the host at network address 4160.26 has replied, giving its MAC address (0000.0c00.0453). For completeness, the message also shows the network address to which the reply was sent and its hardware MAC address (also in parentheses).
Ether0: AARP: Reply from 4160.26(0000.0c00.0453) for 4160.154(0000.0c00.8ea9)
The following line indicates that the MAC address request is complete:
Ether0: AARP: Resolved waiting request for 4160.26(0000.0c00.0453)
DB-66
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug apple domain command to observe activity for domains and subdomains. Use this command in conjunction with the debug apple remap command to observe interaction between remapping and domain activity. Messages are displayed when the state of a domain changes, such as creating a new domain, deleting a domain, and updating a domain.
Examples
The following is sample output from the debug apple domain command intermixed with output from the debug apple remap command; the two commands show related events:
Router# debug apple domain Router# debug apple remap AT-REMAP: RemapProcess for net 30000 domain AURP Domain 1 AT-REMAP: ReshuffleRemapList for subdomain 1 AT-REMAP: Could not find a remap for cable 3000-3001 AT-DOMAIN: atdomain_DisablePort for Tunnel0 AT-DOMAIN: CleanUpDomain for domain 1 [AURP Domain 1] AT-DOMAIN: Disabling interface Ethernet1 AT-DOMAIN: atdomain_DisablePort for Ethernet1 AT-DOMAIN: CleanUpDomain for domain 1 [AURP Domain 1] AT-DOMAIN: CleanSubDomain for inbound subdomain 1 AT-REMAP: Remap for net 70 inbound subdomain 1 has been deleted AT-DOMAIN: DeleteAvRemapList for inbound subdomain 1 AT-DOMAIN: DeleteRemapTable for subdomain 1 AT-DOMAIN: DeleteAvRemapList for inbound subdomain 1 AT-DOMAIN: CleanSubDomain for outbound subdomain 1 AT-DOMAIN: DeleteRemapTable for subdomain 1 AT-REMAP: RemapProcess for net 30000 domain AURP Domain 1 Remapped Net 10000 AT-REMAP: Remap for net 50 outbound subdomain 1 has been deleted AT-DOMAIN: DeleteAvRemapList for outbound subdomain 1 AT-DOMAIN: DeleteAvRemapList for outbound subdomain 1 AT-DOMAIN: CleanUpDomain for domain 1 [AURP Domain 1] AT-DOMAIN: CleanSubDomain for inbound subdomain 1 AT-DOMAIN: DeleteRemapTable for subdomain 1 AT-DOMAIN: DeleteAvRemapList for inbound subdomain 1 AT-DOMAIN: CleanSubDomain for outbound subdomain 1 AT-DOMAIN: DeleteRemapTable for subdomain 1 AT-DOMAIN: DeleteAvRemapList for outbound subdomain 1
DB-67
Related Commands
DB-68
December 2010
Syntax Description
Command History
Modification This command was introduced. This command is no longer supported in Cisco IOS Mainline relesaes or in Technology-based(T-train) releases. It might continue to appear in 12.2S-family releases. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug apple eigrp-all command can be used to monitor acquisition of routes, aging route table entries, and advertisement of known routes through Enhanced IGRP.
Caution
Because the debug apple eigrp-all command can generate many messages, use it only when the CPU utilization of the router is less than 50 percent.
Examples
The following is sample output from the debug apple eigrp-all command:
Router# debug apple eigrp-all 3:54:34: 3:54:37: 3:54:37: 3:54:37: 3:54:37: 3:54:37: 3:54:39: 3:54:42: 3:54:42: 3:54:42: 3:54:42: 3:54:42: atigrp2_router: peer is 83.195 AT: atigrp2_write: about to send packet Ethernet2: output AT packet: enctype UNKNOWN, size 65 07FFFFFF0000FFFFFFFFFFFF00000C1485B00046|0041ACD100000053FF8F58585802059110 000000000000000000000000000000010001000C010001000000000F0204000C0053005300 AT: atigrp2, src=Ethernet2:83.143, dst=83-83, size=52, EIGRP pkt sent atigrp2_router: peer is 83.195 AT: atigrp2_write: about to send packet Ethernet2: output AT packet: enctype UNKNOWN, size 65 07FFFFFF0000FFFFFFFFFFFF00000C1485B00046|0041ACD100000053FF8F58585802059110 000000000000000000000000000000010001000C010001000000000F0204000C0053005300 AT: atigrp2, src=Ethernet2:83.143, dst=83-83, size=52, EIGRP pkt sent
DB-69
Description AppleTalk address of the neighbor. Indicates that this is an AppleTalk packet. Name of the interface through which the router received the packet. Name of the interface sending the Enhanced IGRP packet, as well at its AppleTalk address. Cable range of the destination of the packet. Size of the packet (in bytes).
DB-70
December 2010
Syntax Description
type number
Command Modes
Privileged EXEC
Usage Guidelines
In a stable AppleTalk network, the debug apple errors command produces little output. To solve encapsulation problems, enable debug apple errors and debug apple packet together.
Examples
The following is sample output from the debug apple errors command when a router is brought up with a zone that does not agree with the zone list of other routers on the network:
Router# debug apple errors %AT-3-ZONEDISAGREES: Ethernet0: AppleTalk port disabled; zone list incompatible with 4160.19 %AT-3-ZONEDISAGREES: Ethernet0: AppleTalk port disabled; zone list incompatible with 4160.19 %AT-3-ZONEDISAGREES: Ethernet0: AppleTalk port disabled; zone list incompatible with 4160.19
As the output suggests, a single error message indicates zone list incompatibility; this message is sent out periodically until the condition is corrected or the debug apple errors command is turned off. Most of the other messages that the debug apple errors command can generate are obscure or indicate a serious problem with the AppleTalk network. Some of these other messages follow. In the following message, RTMPRsp, RTMPReq, ATP, AEP, ZIP, ADSP, or SNMP could replace NBP, and llap dest not for us could replace wrong encapsulation:
Packet discarded, src 4160.12-254,dst 4160.19-254,NBP,wrong encapsulation
In the following message, in addition to an invalid echo packet error, other possible errors are unsolicited AEP echo reply, unknown echo function, invalid ping packet, unknown ping function, and bad responder packet type:
Ethernet0: AppleTalk packet error; no source address available AT: pak_reply: dubious reply creation, dst 4160.19 AT: Unable to get a buffer for reply to 4160.19 Processing error, src 4160.12-254,dst 4160.19-254,AEP, invalid echo packet
DB-71
The debug apple errors command can print out additional messages when other debugging commands are also turned on. When you turn on both the debug apple errors and debug apple events commands, the following message can be generated:
Proc err, src 4160.12-254,dst 4160.19-254,ZIP,NetInfo Reply format is invalid
In the preceding message, in addition to the NetInfo Reply format is invalid error, other possible errors are NetInfoReply not for me, NetInfoReply ignored, NetInfoReply for operational net ignored, NetInfoReply from invalid port, unexpected NetInfoReply ignored, cannot establish primary zone, no primary has been set up, primary zone invalid, net information mismatch, multicast mismatch, and zones disagree. When you turn on both the debug apple errors and debug apple nbp commands, the following message can be generated:
Processing error,...,NBP,NBP name invalid
In the preceding message, in addition to the NBP name invalid error, other possible errors are NBP type invalid, NBP zone invalid, not operational, error handling brrq, error handling proxy, NBP fwdreq unexpected, No route to srcnet, Proxy to * zone, Zone * from extended net, No zone info for *, and NBP zone unknown. When you turn on both the debug apple errors and debug apple routing commands, the following message can be generated:
Processing error,...,RTMPReq, unknown RTMP request
In the preceding message, in addition to an unknown RTMP request error, other possible errors are RTMP packet header bad, RTMP cable mismatch, routed RTMP data, RTMP bad tuple, and Not Req or Rsp.
DB-72
December 2010
Syntax Description
type number
Command Modes
Privileged EXEC
Usage Guidelines
Only significant events (for example, neighbor and route changes) are logged. The debug apple events command is useful for solving AppleTalk network problems because it provides an overall picture of the stability of the network. In a stable network, the debug apple events command does not return any information. If the command generates numerous messages, those messages can indicate possible sources of the problems. When configuring or making changes to a router or interface for AppleTalk, enable the debug apple events command to alert you to the progress of the changes or to any errors that might result. Also use this command periodically when you suspect network problems. The debug apple events command is also useful to determine whether network flapping (nodes toggling online and offline) is occurring. If flapping is excessive, look for routers that only support 254 networks. When you enable the debug apple events command, you will see any messages that the apple event-logging configuration command normally displays. Turning on the debug apple events command, however, does not cause the apple event-logging command to be maintained in nonvolatile memory. Only turning on the apple event-logging command explicitly stores it in nonvolatile memory. Furthermore, if the apple event-logging command is already enabled, turning on or off the debug apple events command does not affect the apple event-logging command.
DB-73
Examples
The following is sample output from the debug apple events command that describes a nonseed router coming up in discovery mode:
router# debug apple events
As the output shows, the debug apple events command is useful in tracking the discovery mode state changes through which an interface progresses. When no problems are encountered, the state changes progress as follows:
1. 2. 3. 4. 5. 6. 7. 8.
Line down. Restarting. Probing (for its own address [node ID] using AARP). Acquiring (sending out GetNetInfo requests). Requesting zones (the list of zones for its cable). Verifying (that the routers configuration is correct. If not, a port configuration mismatch is declared). Checking zones (to make sure its list of zones is correct). Operational (participating in routing).
Explanations for individual lines of output follow. The following message indicates that a port is set. In this case, the zone multicast address is being reset.
Ether0: AT: Resetting interface address filters
The following messages indicate that the router is changing to restarting mode:
%AT-5-INTRESTART: Ether0: AppleTalk port restarting; protocol restarted Ether0: AppleTalk state changed; unknown -> restarting
The following message indicates that the router is probing in the startup range of network numbers (65280 to 65534) to discover its network number:
Ether0: AppleTalk state changed; restarting -> probing
DB-74
S2542
Ether0: AT: Resetting interface address filters %AT-5-INTRESTART: Ether0: AppleTalk port restarting; protocol restarted Ether0: AppleTalk state changed; unknown -> restarting Ether0: AppleTalk state changed; restarting -> probing %AT-6-ADDRUSED: Ether0: AppleTalk node up; using address 65401.148 Ether0: AppleTalk state changed; probing -> acquiring %AT-6-ACQUIREMODE: Ether0: AT port initializing; acquiring net configuration Ether0: AppleTalk state changed; acquiring -> restarting Ether0: AppleTalk state changed; restarting -> line down Ether0: AppleTalk state changed; line down -> restarting Ether0: AppleTalk state changed; restarting -> probing %AT-6-ADDRUSED: Ether0: AppleTalk node up; using address 4160.148 Ether0: AppleTalk state changed; probing -> acquiring %AT-6-ACQUIREMODE: Ether0: AT port initializing; acquiring net configuration Ether0: AppleTalk state changed; acquiring -> requesting zones Ether0: AT: Resetting interface address filters %AT-5-INTRESTART: Ether0: AppleTalk port restarting; protocol restarted Ether0: AppleTalk state changed; requesting zones -> verifying AT: Sent GetNetInfo request broadcast on Ethernet0 Ether0: AppleTalk state changed; verifying -> checking zones Ether0: AppleTalk state changed; checking zones -> operational
December 2010
The following message indicates that the router is enabled as a nonrouting node using a provisional network number within its startup range of network numbers. This type of message only appears if the network address the router will use differs from its configured address. This is always the case for a discovery-enabled router; it is rarely the case for a nondiscovery-enabled router.
%AT-6-ADDRUSED: Ether0: AppleTalk node up; using address 65401.148
The following messages indicate that the router is sending out GetNetInfo requests to discover the default zone name and the actual network number range in which its network number can be chosen:
Ether0: AppleTalk state changed; probing -> acquiring %AT-6-ACQUIREMODE: Ether0: AT port initializing; acquiring net configuration
Now that the router has acquired the cable configuration information, the following message indicates that it restarts using that information:
Ether0: AppleTalk state changed; acquiring -> restarting
The following messages indicate that the router is probing for its actual network address:
Ether0: AppleTalk state changed; restarting -> line down Ether0: AppleTalk state changed; line down -> restarting Ether0: AppleTalk state changed; restarting -> probing
The following message indicates that the router has found an actual network address to use:
%AT-6-ADDRUSED: Ether0: AppleTalk node up; using address 4160.148
The following messages indicate that the router is sending out GetNetInfo requests to verify the default zone name and the actual network number range from which its network number can be chosen:
Ether0: AppleTalk state changed; probing -> acquiring %AT-6-ACQUIREMODE: Ether0: AT port initializing; acquiring net configuration
The following message indicates that the router is requesting the list of zones for its cable:
Ether0: AppleTalk state changed; acquiring -> requesting zones
The following messages indicate that the router is sending out GetNetInfo requests to make sure its understanding of the configuration is correct:
Ether0: AppleTalk state changed; requesting zones -> verifying AT: Sent GetNetInfo request broadcast on Ethernet0
The following message indicates that the router is rechecking its list of zones for its cable:
Ether0: AppleTalk state changed; verifying -> checking zones
The following message indicates that the router is now fully operational as a routing node and can begin routing:
Ether0: AppleTalk state changed; checking zones -> operational
DB-75
The following shows sample debug apple events output that describes a nondiscovery-enabled router coming up when no other router is on the wire.
router# debug apple events Ethernet1: AT: Resetting interface address filters %AT-5-INTRESTART: Ethernet1: AppleTalk port restarting; protocol restarted Ethernet1: AppleTalk state changed; unknown -> restarting Ethernet1: AppleTalk state changed; restarting -> probing %AT-6-ADDRUSED: Ethernet1: AppleTalk node up; using address 4165.204 Ethernet1: AppleTalk state changed; probing -> verifying AT: Sent GetNetInfo request broadcast on Ethernet1 Ethernet1: AppleTalk state changed; verifying -> operational %AT-6-ONLYROUTER: Ethernet1: AppleTalk port enabled; no neighbors found
As the output shows, a nondiscovery-enabled router can come up when no other router is on the wire; however, it must assume that its configuration (if accurate syntactically) is correct, because no other router can verify it. Notice that the last line indicates this situation. The following is sample output from the debug apple events command that describes a discovery-enabled router coming up when there is no seed router on the wire:
Router# debug apple events Ether0: AT: Resetting interface address filters %AT-5-INTRESTART: Ether0: AppleTalk port restarting; protocol restarted Ether0: AppleTalk state changed; unknown -> restarting Ether0: AppleTalk state changed; restarting -> probing %AT-6-ADDRUSED: Ether0: AppleTalk node up; using address 65401.148 Ether0: AppleTalk state changed; probing -> acquiring AT: Sent GetNetInfo request broadcast on Ether0 AT: Sent GetNetInfo request broadcast on Ether0 AT: Sent GetNetInfo request broadcast on Ether0 AT: Sent GetNetInfo request broadcast on Ether0 AT: Sent GetNetInfo request broadcast on Ether0
As the output shows, when you attempt to bring up a nonseed router without a seed router on the wire, it never becomes operational; instead, it hangs in the acquiring mode and continues to send out periodic GetNetInfo requests. The following is sample output from the debug apple events command when a nondiscovery-enabled router is brought up on an AppleTalk internetwork that is in compatibility mode (set up to accommodate extended as well as nonextended AppleTalk) and the router has violated internetwork compatibility:
router# debug apple events E0: AT: Resetting interface address filters %AT-5-INTRESTART: E0: AppleTalk port restarting; protocol restarted E0: AppleTalk state changed; restarting -> probing %AT-6-ADDRUSED: E0: AppleTalk node up; using address 41.19 E0: AppleTalk state changed; probing -> verifying AT: Sent GetNetInfo request broadcast on Ethernet0 %AT-3-ZONEDISAGREES: E0: AT port disabled; zone list incompatible with 41.19 AT: Config error for E0, primary zone invalid E0: AppleTalk state changed; verifying -> config mismatch
DB-76
December 2010
S2545
S2543
The following three configuration command lines indicate the part of the configuration of the router that caused the configuration mismatch:
lestat(config)# interface ethernet 0 lestat(config-if)# apple cab 41-41 lestat(config-if)# apple zone Marketing
The router shown had been configured with a cable range of 41-41 instead of 40-40, which would have been accurate. Additionally, the zone name was configured incorrectly; it should have been Marketing, rather than being misspelled as Markting.
DB-77
Syntax Description
type number
Command Modes
Privileged EXEC
Usage Guidelines
To determine whether the router is receiving NBP lookups from a node on the AppleTalk network, enable debug apple nbp at each node between the router and the node in question to determine where the problem lies.
Caution
Because the debug apple nbp command can generate many messages, use it only when the CPU utilization of the router is less than 50 percent.
Examples
The following is sample output from the debug apple nbp command:
Router# debug apple nbp AT: NBP ctrl = LkUp, ntuples = 1, id = 77 AT: 4160.19, skt 2, enum 0, name: =:ciscoRouter@Low End SW Lab AT: LkUp =:ciscoRouter@Low End SW Lab AT: NBP ctrl = LkUp-Reply, ntuples = 1, id = 77 AT: 4160.154, skt 254, enum 1, name: lestat.Ether0:ciscoRouter@Low End SW Lab AT: AT: AT: AT: AT: AT: AT: NBP ctrl = LkUp, ntuples = 1, 4160.19, skt 2, enum 0, name: NBP ctrl = LkUp, ntuples = 1, 4160.19, skt 2, enum 0, name: NBP ctrl = LkUp, ntuples = 1, 4160.19, skt 2, enum 0, name: LkUp =:ciscoRouter@Low End SW id = 78 =:IPADDRESS@Low End SW Lab id = 79 =:IPGATEWAY@Low End SW Lab id = 83 =:ciscoRouter@Low End SW Lab Lab
AT: NBP ctrl = LkUp, ntuples = 1, id = 84 AT: 4160.19, skt 2, enum 0, name: =:IPADDRESS@Low End SW Lab AT: AT: AT: AT: NBP ctrl 4160.19, NBP ctrl 4160.19, = LkUp, ntuples = 1, skt 2, enum 0, name: = LkUp, ntuples = 1, skt 2, enum 0, name: id = 85 =:IPGATEWAY@Low End SW Lab id = 85 =:IPGATEWAY@Low End SW Lab
DB-78
December 2010
Description Indicates that this message describes an AppleTalk NBP packet. Identifies the type of NBP packet. Possible values are as follows:
ntuples = 1 id = 77
Indicates the number of name-address pairs in the lookup request packet. Range: 1 to 31 tuples. Identifies an NBP lookup request value.
Description Indicates that this message describes an AppleTalk packet. Indicates the network address of the requester. Indicates the internet socket address of the requester. The responder will send the NBP lookup reply to this socket address. Indicates the enumerator field. Used to identify multiple names registered on a single socket. Each tuple is assigned its own enumerator, incrementing from 0 for the first tuple. Indicates the entity name for which a network address has been requested. The AppleTalk entity name includes three components:
Object (in this case, a wildcard character [=], indicating that the requester is requesting name-address pairs for all objects of the specified type in the specified zone). Type (in this case, ciscoRouter). Zone (in this case, Low End SW Lab).
The third line in the output essentially reiterates the information in the two lines above it, indicating that a lookup request has been made regarding name-address pairs for all objects of the ciscoRouter type in the Low End SW Lab zone.
DB-79
Because the router is defined as an object of type ciscoRouter in zone Low End SW Lab, the router sends an NBP lookup reply in response to this NBP lookup request. The following two lines of output show the response of the router:
AT: NBP ctrl = LkUp-Reply, ntuples = 1, id = 77 AT: 4160.154, skt 254, enum 1, name: lestat.Ether0:ciscoRouter@Low End SW Lab
In the first line, ctrl = LkUp-Reply identifies this NBP packet as an NBP lookup request. The same value in the id field (id = 77) associates this lookup reply with the previous lookup request. The second line indicates that the network address associated with the entity name of the router (lestat.Ether0:ciscoRouter@Low End SW Lab) is 4160.154. The fact that no other entity name/network address is listed indicates that the responder only knows about itself as an object of type ciscoRouter in zone Low End SW Lab.
DB-80
December 2010
Syntax Description
type number
Command Modes
Privileged EXEC
Usage Guidelines
With this command, you can monitor the types of packets being slow switched. It displays at least one line of debugging output per AppleTalk packet processed. The output reports information online when a packet is received or a transmission is attempted. When invoked in conjunction with the debug apple routing, debug apple zip, and debug apple nbp commands, the debug apple packet command adds protocol processing information in addition to generic packet details. It also reports successful completion or failure information. When invoked in conjunction with the debug apple errors command, the debug apple packet command reports packet-level problems, such as those concerning encapsulation.
Caution
Because the debug apple packet command can generate many messages, use it only when the CPU utilization of the router is less than 50 percent.
Examples
The following is sample output from the debug apple packet command:
Router# debug apple packet Ether0: AppleTalk packet: enctype SNAP, size 60, encaps000000000000000000000000 AT: src=Ethernet0:4160.47, dst=4160-4160, size=10, 2 rtes, RTMP pkt sent AT: ZIP Extended reply rcvd from 4160.19 AT: ZIP Extended reply rcvd from 4160.19 AT: src=Ethernet0:4160.47, dst=4160-4160, size=10, 2 rtes, RTMP pkt sent Ether0: AppleTalk packet: enctype SNAP, size 60, encaps000000000000000000000000 Ether0: AppleTalk packet: enctype SNAP, size 60, encaps000000000000000000000000
DB-81
Description Name of the interface through which the router received the packet. Indicates that this is an AppleTalk packet. Encapsulation type for the packet. Size of the packet (in bytes). Encapsulation.
Description Indicates that this is an AppleTalk packet. Name of the interface sending the packet and its AppleTalk address. Cable range of the destination of the packet. Size of the packet (in bytes.) Indicates that two routes in the routing table link these two addresses. Type of packet sent.
The third line indicates the type of packet received and its source AppleTalk address. This message is repeated in the fourth line because AppleTalk hosts can send multiple replies to a given GetNetInfo request.
DB-82
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug apple remap command with the debug apple domain command to observe activity between domains and subdomains. Messages from the debug apple remap command are displayed when a particular remapping function occurs, such as creating remaps or deleting remaps.
Examples
The following is sample output from the debug apple remap command intermixed with output from the debug apple domain command; the two commands show related events.
Router# debug apple remap Router# debug apple domain AT-REMAP: RemapProcess for net 30000 domain AURP Domain 1 AT-REMAP: ReshuffleRemapList for subdomain 1 AT-REMAP: Could not find a remap for cable 3000-3001 AT-DOMAIN: atdomain_DisablePort for Tunnel0 AT-DOMAIN: CleanUpDomain for domain 1 [AURP Domain 1] AT-DOMAIN: Disabling interface Ethernet1 AT-DOMAIN: atdomain_DisablePort for Ethernet1 AT-DOMAIN: CleanUpDomain for domain 1 [AURP Domain 1] AT-DOMAIN: CleanSubDomain for inbound subdomain 1 AT-REMAP: Remap for net 70 inbound subdomain 1 has been deleted AT-DOMAIN: DeleteAvRemapList for inbound subdomain 1 AT-DOMAIN: DeleteRemapTable for subdomain 1 AT-DOMAIN: DeleteAvRemapList for inbound subdomain 1 AT-DOMAIN: CleanSubDomain for outbound subdomain 1 AT-DOMAIN: DeleteRemapTable for subdomain 1 AT-REMAP: RemapProcess for net 30000 domain AURP Domain 1 Remaped Net 10000 AT-REMAP: Remap for net 50 outbound subdomain 1 has been deleted AT-DOMAIN: DeleteAvRemapList for outbound subdomain 1 AT-DOMAIN: DeleteAvRemapList for outbound subdomain 1 AT-DOMAIN: CleanUpDomain for domain 1 [AURP Domain 1] AT-DOMAIN: CleanSubDomain for inbound subdomain 1 AT-DOMAIN: DeleteRemapTable for subdomain 1 AT-DOMAIN: DeleteAvRemapList for inbound subdomain 1 AT-DOMAIN: CleanSubDomain for outbound subdomain 1 AT-DOMAIN: DeleteRemapTable for subdomain 1 AT-DOMAIN: DeleteAvRemapList for outbound subdomain 1
DB-83
Related Commands
DB-84
December 2010
Syntax Description
type number
Command Modes
Privileged EXEC
Usage Guidelines
This command can be used to monitor acquisition of routes, aging of routing table entries, and advertisement of known routes. It also reports conflicting network numbers on the same network if the network is misconfigured.
Caution
Because the debug apple routing command can generate many messages, use it only when router CPU utilization is less than 50 percent.
Examples
The following is sample output from the debug apple routing command:
Router# debug apple routing AT: AT: AT: AT: AT: AT: AT: AT: AT: src=Ethernet0:4160.41, dst=4160-4160, size=19, 2 rtes, RTMP pkt sent src=Ethernet1:41069.25, dst=41069, size=427, 96 rtes, RTMP pkt sent src=Ethernet2:4161.23, dst=4161-4161, size=427, 96 rtes, RTMP pkt sent Route ager starting (97 routes) Route ager finished (97 routes) RTMP from 4160.19 (new 0,old 94,bad 0,ign 0, dwn 0) RTMP from 4160.250 (new 0,old 0,bad 0,ign 2, dwn 0) RTMP from 4161.236 (new 0,old 94,bad 0,ign 1, dwn 0) src=Ethernet0:4160.41, dst=4160-4160, size=19, 2 rtes, RTMP pkt sent
Table 11 describes the fields in the first line of sample debug apple routing output.
Table 11 debug apple routing Field DescriptionsFirst Line of Output
Description Indicates that this is AppleTalk debugging output. Indicates the source router interface and network address for the RTMP update packet. Indicates the destination network address for the RTMP update packet.
DB-85
Table 11
Description Displays the size of this RTMP packet (in bytes). Indicates that this RTMP update packet includes information on two routes. Indicates that this type of message describes an RTMP update packet that the router has sent (rather than one that it has received).
The following two messages indicate that the ager has started and finished the aging process for the routing table and that this table contains 97 entries:
AT: Route ager starting (97 routes) AT: Route ager finished (97 routes)
Table 12 describes the fields in the following line of the debug apple routing command output:
AT: RTMP from 4160.19 (new 0,old 94,bad 0,ign 0, dwn 0)
Table 12
Field AT: RTMP from 4160.19 new 0 old 94 bad 0 ign 0 dwn 0
Description Indicates that this is AppleTalk debugging output. Indicates the source address of the RTMP update the router received. Displays the number of routes in this RTMP update packet that the router did not already know about. Displays the number of routes in this RTMP update packet that the router already knew about. Displays the number of routes the other router indicates have gone bad. Displays the number of routes the other router ignores. Displays the number of poisoned tuples included in this packet.
DB-86
December 2010
Syntax Description
type number
Command Modes
Privileged EXEC
Usage Guidelines
This command reports significant events such as the discovery of new zones and zone list queries. It generates information similar to that generated by the debug apple routing command, but generates it for ZIP packets instead of Routing Table Maintenance Protocol (RTMP) packets. You can use the debug apple zip command to determine whether a ZIP storm is taking place in the AppleTalk network. You can detect the existence of a ZIP storm when you see that no router on a cable has the zone name corresponding to a network number that all the routers have in their routing tables.
Examples
The following is sample output from the debug apple zip command:
Router# debug apple zip AT: AT: AT: AT: AT: Sent GetNetInfo request broadcast on Ether0 Recvd ZIP cmd 6 from 4160.19-6 3 query packets sent to neighbor 4160.19 1 zones for 31902, ZIP XReply, src 4160.19 net 31902, zonelen 10, name US-Florida
The first line indicates that the router has received an RTMP update that includes a new network number and is now requesting zone information:
AT: Sent GetNetInfo request broadcast on Ether0
The second line indicates that the neighbor at address 4160.19 replies to the zone request with a default zone:
AT: Recvd ZIP cmd 6 from 4160.19-6
The third line indicates that the router responds with three queries to the neighbor at network address 4160.19 for other zones on the network:
AT: 3 query packets sent to neighbor 4160.19
The fourth line indicates that the neighbor at network address 4160.19 responds with a ZIP extended reply, indicating that one zone has been assigned to network 31902:
AT: 1 zones for 31902, ZIP XReply, src 4160.19
DB-87
The fifth line indicates that the router responds that the zone name of network 31902 is US-Florida, and the zone length of that zone name is 10:
AT: net 31902, zonelen 10, name US-Florida
DB-88
December 2010
Note
Refer to the other forms of the debug appn command to enable specific debug output selectively.
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command shows all APPN events. Use other forms of the debug appn command to display specific types of events.
Caution
Because the debug appn all command can generate many messages and alter timing in the network node, use it only when instructed by authorized support personnel.
Caution
Debugging output takes priority over other network traffic. The debug appn all command generates more output than any other debug appn command and can alter timing in the network node. This command can severely diminish router performance or even render it unusable. In virtually all cases, it is best to use specific debug appn commands.
Examples
Refer to the documentation for specific debug appn commands for examples and explanations.
Related Commands
Command debug appn cs debug appn ds debug appn hpr debug appn ms debug appn nof debug appn pc debug appn ps debug appn scm
Description Displays the APPN CS component activity. Displays debugging information on APPN DS component activity. Displays information related to HPR code execution. Displays debugging information on APPN MS component activity. Displays information on APPN NOF component activity. Displays debugging information on APPN PC component activity. Displays debugging information on APPN PS component activity. Displays debugging information on APPN SCM component activity.
DB-89
Description Displays SS events. Displays debugging information on APPN TRS component activity.
DB-90
December 2010
debug appn cs
To display Advanced Peer-to-Peer Networking (APPN) Configuration Services (CS) component activity, use the debug appn cs command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug appn cs no debug appn cs
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The CS component is responsible for defining link stations, ports, and connection networks. It is responsible for the activation and deactivation of ports and link stations and handles status queries for these resources.
Examples
The following is sample output from the debug appn cs command. In this example a link station is being stopped.
Router# debug appn cs Turned on event 008000FF Router# appn stop link PATTY APPN: ----- CS ----APPN: ----- CS ----APPN: ----- CS ----APPN: ----- CS ----APPN: ----- CS ----APPN: ----- CS ----APPN: ----- CS ----APPN: ----- CS ----APPN: ----- CS ----APPN: ----- CS ----%APPN-6-APPNSENDMSG: Deq STOP_LS message FSM LS: 75 17 5 8 Sending DEACTIVATE_AS - station PATTY deactivate_as_p->ips_header.lpid = A80A60 deactivate_as_p->ips_header.lpid = A80A60 Sending DESTROY_TG to PC - station PATTY - lpid=A80A60 Deq DESTROY_TG - station PATTY FSM LS: 22 27 8 0 Sending TG update for LS PATTY to TRS ENTERING XID_PROCESSING: 4 Link Station PATTY stopped
Table 13 describes the significant fields and messages shown in the display.
Table 13 debug appn cs Field Descriptions
Description APPN debugging output. CS component output. CS received a message from another component.
DB-91
Table 13
Description Link station finite state machine is being referenced. CS is sending a message to another component.
Related Commands
DB-92
December 2010
debug appn ds
To display debugging information on Advanced Peer-to-Peer Networking (APPN) Directory Services (DS) component activity, use the debug appn ds command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug appn ds no debug appn ds
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The DS component manages searches for resources in the APPN network. DS is also responsible for registration of resources within the network.
Examples
The following is sample output from the debug appn ds command. In this example a search has been received.
Router# debug appn ds Turned on event 080000FF APPN: NEWDS: LS: search from: NETA.PATTY APPN: NEWDS: pcid: DD3321E8B5667111 APPN: NEWDS: Invoking FSM NNSolu APPN: NEWDS: LSfsm_NNSolu: 00A67AA0 pcid: DD3321E8B5667111 row: APPN: NEWDS: LSfsm_parent: 00A89940 row: 0 col: 0 inp: 80000000 APPN: NEWDS: Rcvd a LMRQ APPN: NEWDS: LSfsm_NNSolu: 00A67AA0 pcid: DD3321E8B5667111 row: APPN: NEWDS: LSfsm_parent: 00A89940 row: 8 col: 1 inp: 40000000 APPN: NEWDS: LSfsm_child: 00A89BE8 row: 0 col: 0 inp: 80000080 APPN: NEWDS: PQenq REQUEST_ROUTE(RQ) to TRS APPN: NEWDS: LSfsm_child: 00A8A1C0 row: 1 col: 0 inp: 80000008 APPN: NEWDS: LSfsm_NNSolu: 00A67AA0 pcid: DD3321E8B5667111 row: APPN: NEWDS: LSfsm_child: 00A8A1C0 row: 7 col: 1 inp: 80844008 APPN: NEWDS: Rcvd a LMRY APPN: NEWDS: LSfsm_NNSolu: 00A67AA0 pcid: DD3321E8B5667111 row: APPN: NEWDS: LSfsm_child: 00A8A1C0 row: 14 col: 5 inp: 40800000 APPN: NEWDS: LSfsm_parent: 00A89940 row: 3 col: 1 inp: 80840000 APPN: NEWDS: send locate to node: NETA.PATTY
Description APPN debugging output. DS component output. Locate was received from NETA.PATTY.
DB-93
Table 14
Description Locate Search finite state machine is being referenced. Message was sent to another component. Message was received from another component. Locate will be sent to NETA.PATTY.
Related Commands
DB-94
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug appn hpr command:
Router# debug appn hpr APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: -- ncl.ncl_map_dlc_type() -- mapping TOKEN_RING(4) to NCL_TR(3) -- ncl.ncl_port() -- called with port_type:3, cisco_idb:893A14, hpr_ssap:C8 -- ncl.process_port_change() -- port coming up -- ncl.process_port_change() -- PORT_UP -- ncl.ncl_port_fsm -- FSM Invoked: Input:0, State:0->1, Action:0 -- ncl.ncl_port_fsm -- FSM Invoked: Input:1, State:1->2, Action:1 -- ncl.ncl_unmap_dlc_type() -- mapping NCL(3) to CLS(3) ----- ANR ----- Sending ACTIVATE_SAP.req -- cswncsnd.main() -- received LSA_IPS ips. -- ncl.ncl_port_fsm -- FSM Invoked: Input:3, State:2->3, Action:4 -- ncl.ncl_assign_anr() -- Assigned ANR,anr:8002 -- ncl.ncl_map_dlc_type() -- mapping TOKEN_RING(4) to NCL_TR(3) -- ncl.ncl_populate_anr() -- anr:8002, dlc_type:3, idb 893A14 -- ncl.ncl_populate_anr() -- send anr_tbl_update to owning cswncsnd -- ncl.ncl_ls_fsm -- FSM Invoked: Input:0, State:0->1, Action:0 ncl.ncl_send_reqopn_stn_req -- ncl.ncl_unmap_dlc_type() -- mapping NCL(3) to CLS(3) -- ncl.ncl_ls_fsm() -- send anr_tbl_update to owning cswncsnd -- cswncsnd.main() -- received ANR_TBL_UPDATE ips. -- cswncsnd.apply_anr_table_update() -- ANR:8002 -- cswncsnd.main() -- received ANR_TBL_UPDATE ips. -- cswncsnd.apply_anr_table_update() -- ANR:8002 -- cswncsnd.main() -- received LSA_IPS ips. -- ncl.ncl_ls_fsm -- FSM Invoked: Input:1, State:1->2, Action:1 -- ncl.ncl_ls_fsm -- P_CEP_ID:AAF638 -- ncl.ncl_ls_fsm() -- send anr_tbl_update to owning cswncsnd -- cswncsnd.main() -- received ANR_TBL_UPDATE ips. -- cswncsnd.apply_anr_table_update() -- ANR:8002 rtpm: rtp_send() sent data over connection B9D5E8 hpr timer: rtt start time clocked at 135952 ms -- cswncsnd.main() -- received NCL_SND_MSG ips. -- cswncsnd.process_nlp_from_rtp() -- label: 8002, send to p_cep 00AAF638. hpr timer: rtt end time clocked at 135972 ms hpr timer: round trip time measured at 20 ms
DB-95
Table 15
Field APPN NCL ncl_port_fsm ncl_assign_anr ncl_populate_anr ncl_ls_fsm rtp_send hpr timer rtt start time NCL_SND_MSG process_nlp_from_rtp rtt end time round trip time
Description APPN debugging output. Network control layer debugging output. Network control layer is the component that handles ANR packets. Network control layer port finite state machine has been invoked. ANR label has been assigned to an activating link station. System is updating the ANR record with information specific to the link station. Network control layer link finite state machine has been invoked. RTP is about to send a packet. Debugging output related to an HPR timer. RTP is measuring the round-trip time for an HPR status request packet. This is the start time. Network control layer has been requested to send a packet. Network control layer has been requested by RTP to send a packet. RTP is measuring the round-trip time for an HPR status request packet. This is the time. Round-trip time for this HPR status exchange has been computed.
Related Commands
DB-96
December 2010
debug appn ms
To display debugging information on Advanced Peer-to-Peer Networking (APPN) Management Services (MS) component activity, use the debug appn ms command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug appn ms no debug appn ms
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The MS component is responsible for generating, sending, and forwarding network management information in the form of traps and alerts to a network management focal point, such as Netview, in the APPN network.
Examples
The following is sample output from the debug appn ms command. In this example an error occurred that caused an alert to be generated.
Router# debug appn ms APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: APPN: ----- MSS00 ---- Deq ALERT_MSU msg --- MSP70 --- ALERT MV FROM APPN WITH VALID LGTH --- MSCPL --- Find Active FP --- MSP30 --- Entering Build MS Transport --- MSP31 --- Entering Building Routing Info. --- MSP34 --- Entering Build GDS --- MSP32 --- Entering Building UOW correlator --- MSP34 --- Entering Build GDS --- MSP30 --- Building GDS 0x1310 --- MSP30 --- Building MS Transport --- MSP72 --- ACTIVE FP NOT FOUND, SAVE ONLY --- MSUTL --- UOW <= 60, ALL COPIED in extract_uow --- MSCAT --- by enq_cached_ms QUEUE SIZE OF QUEUE after enq 4
Description Indicates that this is APPN debugging output. Indicates that this is MS component output.
Related Commands
DB-97
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The NOF component is responsible for processing commands entered by the user such as start, stop, show, and configuration commands. NOF forwards these commands to the proper component and waits for the response.
Examples
The following is sample output from the debug appn nof command. In this example, an APPN connection network is being defined.
Router# debug appn nof Turned on event 010000FF Router# config term Enter configuration commands, one per line. End with CNTL/Z. Router(config)# appn connection-network NETA.CISCO Router(config-appn-cn)# port TR0 Router(config-appn-cn)# complete router(config)# APPN: ----- NOF ----- Define Connection Network Verb Received APPN: ----- NOF ----- send define_cn_t ips to cs APPN: ----- NOF ----- waiting for define_cn rsp from cs router(config)#
Description APPN debugging output. NOF component output. Configuration command was entered. Message was sent to CS. Response was expected from CS.
DB-98
December 2010
Related Commands
DB-99
debug appn pc
To display debugging information on Advanced Peer-to-Peer Networking (APPN) Path Control (PC) component activity, use the debug appn pc command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug appn pc no debug appn pc
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The PC component is responsible for passing Message Units (MUs) between the Data Link Control (DLC) layer and other APPN components. PC implements transmission priority by passing higher priority MUs to the DLC before lower priority MUs.
Examples
The following is sample output from the debug appn pc command. In this example an MU is received from the network.
Router# debug appn pc Turned on event 040000FF APPN: ----- PC-----PC Deq REMOTE msg variant_name 2251 APPN: --PC-- mu received to PC lpid: A80AEC APPN: --PC-- mu received from p_cep_id: 67C6F8 APPN: ----- PC-----PC Deq LSA_IPS from DLC APPN: --PCX dequeued a DATA.IND APPN: --- PC processing DL_DATA.ind APPN: --PC-- mu_error_checker with no error, calling frr APPN: --PC-- calling frr for packet received on LFSID: 1 2 3 APPN: ----- PC-----PC is sending MU to SC A90396 APPN: ----- SC-----send mu: A90396, rpc: 0, nws: 7, rh.b1: 90 APPN: SC: Send mu.snf: 8, th.b0: 2E, rh.b1: 90, dcf: 8
Description APPN debugging output. PC component output. Message was received from the network. Message is an MU.
DB-100
December 2010
Table 18
Description MU contains data. MU is session traffic for an ISR session. The MU is forwarded to the Session Connector component for routing.
Related Commands
DB-101
debug appn ps
To display debugging information on Advanced Peer-to-Peer Networking (APPN) Presentation Services (PS) component activity, use the debug appn ps command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug appn ps no debug appn ps
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The PS component is responsible for managing the Transaction Programs (TPs) used by APPN. TPs are used for sending and receiving searches, receiving resource registration, and sending and receiving topology updates.
Examples
The following is sample output from the debug appn ps command. In this example a CP capabilities exchange is in progress.
Router# debug appn ps Turned on event 200000FF APPN: ---- CCA --- CP_CAPABILITIES_TP has started APPN: ---- CCA --- About to wait for Partner to send CP_CAP APPN: ---- CCA --- Partner LU name: NETA.PATTY APPN: ---- CCA --- Mode Name: CPSVCMG APPN: ---- CCA --- CGID: 78 APPN: ---- CCA --- About to send cp_cp_session_act to SS APPN: ---- CCA --- Waiting for cp_cp_session_act_rsp from SS APPN: ---- CCA --- Received cp_cp_session_act_rsp from SS APPN: ---- CCA --- About to send CP_CAP to partner APPN: ---- CCA --- Send to partner completed with rc=0, 0 APPN: ---- RCA --- Allocating conversation APPN: ---- RCA --- Sending CP_CAPABILITIES APPN: ---- RCA --- Getting conversation attributes APPN: ---- RCA --- Waiting for partner to send CP_CAPABILITIES APPN: ---- RCA --- Normal processing complete with cgid = 82 APPN: ---- RCA --- Deallocating CP_Capabilities conversation
DB-102
December 2010
Related Commands
DB-103
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The SCM component is responsible for the activation and deactivation of the local resources that route an intermediate session through the router.
Examples
The following is sample output from the debug appn scm command. In this example an intermediate session traffic is being routed.
Router# debug appn scm Turned on event 020000FF Router# APPN: ----- SCM-----SCM Deq a MU APPN: ----- SCM-----SCM send ISR_INIT to SSI APPN: ----- SCM-----(i05) Enter compare_fqpcid() APPN: ----- SCM-----Adding new session_info table entry. addr=A93160 APPN: ----- SCM-----SCM Deq ISR_CINIT message APPN: ----- SCM-----(i05) Enter compare_fqpcid() APPN: ----- SCM-----SCM sends ASSIGN_LFSID to ASM APPN: ----- SCM-----SCM Rcvd sync ASSIGN_LFSID from ASM APPN: ----- SCM-----SCM PQenq a MU to ASM APPN: ----- SCM-----SCM Deq a MU APPN: ----- SCM-----(i05) Enter compare_fqpcid() APPN: ----- SCM-----SCM PQenq BIND rsp to ASM
Related Commands
DB-104
December 2010
debug appn ss
To display session services (SS) events, use the debug appn ss command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug appn ss no debug appn ss
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The SS component generates unique session identifiers, activates and deactivates control point-to-control point (CP-CP) sessions, and assists logical units (LUs) in initiating and activating LU-LU sessions.
Examples
The following is sample output from the debug appn ss command. In this example CP-CP sessions between the router and another node are being activated.
Router# debug appn ss Turned on event 100000FF APPN: ----- SS ----- Deq ADJACENT_CP_CONTACTED message APPN: ----- SS ----- Deq SESSST_SIGNAL message APPN: ----- SS ----- Deq CP_CP_SESSION_ACT message APPN: Sending ADJACENT_NN_1015 to SCM, adj_node_p=A6B980,cp_name=NETA.PATTY APPN: ----- SS ----- Sending REQUEST_LAST_FRSN message to TRS APPN: ----- SS ----- Receiving REQUEST_LAST_FRSN_RSP from TRS APPN: ----- SS ----- Sending ACTIVE CP_STATUS CONLOSER message to DS APPN: ----- SS ----- Sending ACTIVE CP_STATUS CONLOSER message to MS APPN: ----- SS ----- Sending ACTIVE CP_STATUS CONLOSER message to TRS APPN: ----- SS ----- Sending CP_CP_SESSION_ACT_RSP message to CCA TP APPN: ----- SS ----- Sending PENDING_ACTIVE CP_STATUS CONWINNER message to DS APPN: ----- SS ----- Sending REQUEST_LAST_FRSN message to TRS APPN: ----- SS ----- Receiving REQUEST_LAST_FRSN_RSP from TRS APPN: ----- SS ----- Sending ACT_CP_CP_SESSION message to RCA TP APPN: ----- SS ----- Deq ASSIGN_PCID message APPN: ----- SS ----- Sending ASSIGN_PCID_RSP message to someone APPN: ----- SS ----- Deq INIT_SIGNAL message APPN: ----- SS ----- Sending REQUEST_COS_TPF_VECTOR message to TRS APPN: ----- SS ----- Receiving an REQUEST_COS_TPF_VECTOR_RSP from TRS APPN: ----- SS ----- Sending REQUEST_SINGLE_HOP_ROUTE message to TRS APPN: ----- SS ----- Receiving an REQUEST_SINGLE_HOP_ROUTE_RSP from TRS APPN: ----- SS ----- Sending ACTIVATE_ROUTE message to CS APPN: ----- SS ----- Deq ACTIVATE_ROUTE_RSP message APPN: ----- SS ----- Sending CINIT_SIGNAL message to SM APPN: ----- SS ----- Deq ACT_CP_CP_SESSION_RSP message APPN: -- SS----SS ssp00, act_cp_cp_session_rsp received, sense_code=0, cgid=5C, ips@=A93790 APPN: Sending ADJACENT_NN_1015 to SCM, adj_node_p=A6B980,cp_name=18s
DB-105
APPN: ----- SS ----- Sending ACTIVE CP_STATUS CONWINNER message to DS APPN: ----- SS ----- Sending ACTIVE CP_STATUS CONWINNER message to MS APPN: ----- SS ----- Sending ACTIVE CP_STATUS CONWINNER message to TRS
Field APPN SS
Related Commands
DB-106
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The TRS component is responsible for creating and maintaining the topology database, creating and maintaining the class of service database, and computing and caching optimal routes through the network.
Examples
The following is sample output from the debug appn trs command:
Router# debug appn trs Turned on event APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS APPN: ----- TRS 400000FF ----- Received a QUERY_CPNAME ----- Received a REQUEST_ROUTE ----- check_node node_name=NETA.LISA ----- check_node node_index=0 ----- check_node node_weight=60 ----- add index 484 to origin description list ----- add index 0 to dest description list ----- origin tg_vector is NULL ----- weight_to_origin = 0 ----- weight_to_dest = 0 ----- u_b_s_f weight = 30 ----- u_b_s_f prev_weight = 2147483647 ----- u_b_s_f origin_index = 484 ----- u_b_s_f dest_index = 0 ----- b_r_s_f weight = 30 ----- b_r_s_f origin_index = 484 ----- b_r_s_f dest_index = 0 ----- Received a REQUEST_ROUTE ----- check_node node_name=NETA.LISA ----- check_node node_index=0 ----- check_node node_weight=60 ----- check_node node_name=NETA.BART ----- check_node node_index=484 ----- check_node node_weight=60 ----- add index 484 to origin description list ----- add index 0 to dest description list ----- origin_tg_weight to non-VN=30 ----- origin_node_weight to non-VN=60 ----- weight_to_origin = 90 ----- weight_to_dest = 0
DB-107
-----------------------------
-----------------------------
weight = 120 prev_weight = 2147483647 origin_index = 484 dest_index = 0 weight = 120 origin_index = 484 dest_index = 0
DB-108
December 2010
debug arap
To display AppleTalk Remote Access Protocol (ARAP) events, use the debug arap command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug arap {internal | memory | mnp4 | v42bis} [linenum [aux | console | tty | vty]] no debug arap {internal | memory | mnp4 | v42bis} [linenum [aux | console | tty | vty]]
Syntax Description
Debugs internal ARA packets. Debugs memory allocation for ARA. Debugs low-level asynchronous serial protocol. Debugs V.42bis compression. (Optional) Line number. The number ranges from 0 to 999, depending on what type of line is selected. (Optional) Auxiliary line. (Optional) Primary terminal line. (Optional) Physical terminal asynchronous line. (Optional) Virtual terminal line.
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug arap command with the debug callback command on access servers to debug dialin and callback events. Use the debug modem command to help catch problems related to ARAP autodetection (that is, autoselect arap). These problems are very common and are most often caused by modems, which are the most common cause of failure in ARAP connection and configuration sessions.
Examples
The following is sample output from the debug arap internal command:
Router# debug arap internal ARAP: ---------- SRVRVERSION ---------ARAP: ---------- ACKing 0 ---------ARAP: ---------- AUTH_CHALLENGE ---------arapsec_local_account setting up callback ARAP: ---------- ACKing 1 ---------ARAP: ---------- AUTH_RESPONSE ---------arap_startup initiating callback ARAP 2.0 ARAP: ---------- CALLBACK ---------TTY7 Callback process initiated, user: dialback dialstring 40 TTY7 Callback forced wait = 4 seconds TTY7 ARAP Callback Successful - await exec/autoselect pickup TTY7: Callback in effect ARAP: ---------- STARTINFOFROMSERVER ---------ARAP: ---------- ACKing 0 ---------ARAP: ---------- ZONELISTINFO ----------
DB-109
-------------------------------------
-------------------------------------
Related Commands
Description Displays callback events when the router is using a modem and a chat script to call back on a terminal line. Observes modem line activity on an access server.
DB-110
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was implemented on the Cisco 10000 series. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB and implemented on the Cisco 10000 series.
12.2(33)SB
Examples
The following is sample output from the debug archive config timestamp command:
Router# debug archive config timestamp Router# configure replace disk0:myconfig force Timing Debug Statistics for IOS Config Replace operation: Time to read file slot0:sample_2.cfg = 0 msec (0 sec) Number of lines read:55 Size of file :1054 Starting Pass 1 Time to read file system:running-config = 0 msec (0 sec) Number of lines read:93 Size of file :2539 Time taken for positive rollback pass = 320 msec (0 sec) Time taken for negative rollback pass = 0 msec (0 sec) Time taken for negative incremental diffs pass = 59 msec (0 sec) Time taken by PI to apply changes = 0 msec (0 sec) Time taken for Pass 1 = 380 msec (0 sec) Starting Pass 2 Time to read file system:running-config = 0 msec (0 sec)
DB-111
Number of lines read:55 Size of file :1054 Time taken for positive rollback pass = 0 msec (0 sec) Time taken for negative rollback pass = 0 msec (0 sec) Time taken for Pass 2 = 0 msec (0 sec) Total number of passes:1 Rollback Done
Related Commands
DB-112
December 2010
Syntax Description
Command Default
If this command is not entered, there is no debugging or display of the configuration logging persistent events in the archive.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(11)T. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SB
Usage Guidelines
The configuration logger feature must be enabled in order for the debug capability to work.
Examples
The following example turns on the debugging feature and displays the configuration logging persistent events:
Router# debug archive config log persistent Router# archive log config persistent save Configuration logging persistent save triggered. Saving the config log to disk0:IOS-Config-Logger-database. Command interface eth0 saved Command ip address 10.1.1.1 255.255.255.0 saved Command no shut saved Router#
DB-113
Related Commands
Description Saves the persisted commands in the configuration log to the Cisco IOS secure file system.
DB-114
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was implemented on the Cisco 10000 series. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB and implemented on the Cisco 10000 series.
12.2(33)SB
Examples
The following is sample output from the debug archive versioning command:
Router# debug archive versioning Jan Jan Jan Jan 9 9 9 9 06:46:28.419:backup_running_config 06:46:28.419:Current = 7 06:46:28.443:Writing backup file disk0:myconfig-7 06:46:29.547: backup worked
Related Commands
Description Enables debugging of the processing time for each integral step of a configuration replace operation and the size of the configuration files being handled.
DB-115
debug arp
To enable debugging output for Address Resolution Protocol (ARP) transactions, use the debug arp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug arp [arp-entry-event | arp-table-event | ha | interface-interaction] no debug arp [arp-entry-event | arp-table-event | ha | interface-interaction]
Syntax Description
arp-entry-event
(Optional) Enables debug trace for ARP entry events by specifying one of the following keywords:
dynamicEnables debugging output for dynamic ARP entry events. interfaceEnables debugging output for interface ARP entry events. staticEnables debugging output for static ARP entry events. subblockingEnables debugging output for ARP subblocking events.
arp-table-event
(Optional) Enables debug trace for ARP table events by specifying one of the following keywords:
databaseEnables debugging output for ARP database operations. tableEnables debugging output for ARP table operations. timerEnables debugging output for ARP timer operations. This keyword is available only on HA-capable platforms (that is, Cisco networking devices that support dual Route Processors [RPs]).
ha
(Optional) Enables debug trace for ARP high availability (HA) events.
Note
interface-interaction
(Optional) Enables debug trace for ARP interface interaction by specifying one of the following keywords:
adjacencyEnables debugging output for ARP interface events and Cisco Express Forwarding (CEF) adjacency interface events. applicationEnables debugging output for ARP application interface events.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The following keywords were added: adjacency, application, dynamic, ha, interface, static, subblocking, table, and timer.
DB-116
December 2010
Release 12.2SX
Modification This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was modified. The database keyword was added. It was integrated into Cisco IOS Release 12.2(33)SRE.
12.2(33)SRE
Usage Guidelines
To enable ARP packet debugging, use this command without a keyword. The debugging information shows whether the router is sending ARP packets and whether it is receiving ARP packets. Use this command when some nodes on a TCP/IP network are responding, but others are not. The amount of debug information displayed is filtered based on an interface, an access list, or both, as specified by the debug list command. To list the debugging options enabled on this router, use the show debugging command.
Examples
The following example shows how to enable ARP packet debugging filtered on ARP table entries for the host at 192.0.2.10:
Router(config)# access-list 10 permit host 192.0.2.10 Router(config)# exit Router# debug list 10 Router# debug arp ARP packet debugging is on for access list: 10
In the output, each line of output represents an ARP packet that the router sent or received. Explanations for the individual lines of output follow. The first line indicates that the router at IP address 192.0.2.7 and MAC address 0000.0c01.e117 sent an ARP request for the MAC address of the host at 192.0.2.96. The series of zeros (0000.0000.0000) following this address indicate that the router is currently unaware of the MAC address.
IP ARP: sent req src 192.0.2.7 0000.0c01.e117, dst 192.0.2.96 0000.0000.0000
The second line indicates that the router at IP address 192.0.2.7 receives a reply from the host at 192.0.2.96 indicating that its MAC address is 0800.2010.b908:
IP ARP: rcvd rep src 192.0.2.96 0800.2010.b908, dst 192.0.2.7
The third line indicates that the router receives an ARP request from the host at 172.16.6.10 requesting the MAC address for the host at 192.0.2.62:
IP ARP: rcvd req src 172.16.6.10 0000.0c00.6fa2, dst 192.0.2.62
DB-117
The fourth line indicates that another host on the network attempted to send the router an ARP reply for its own address. The router ignores meaningless replies. Usually, meaningless replies happen if a bridge is being run in parallel with the router and is allowing ARP to be bridged. This condition indicates a network misconfiguration.
IP ARP: rep filtered src 192.0.2.7 aa92.1b36.a456, dst 255.255.255.255 ffff.ffff.ffff
The fifth line indicates that another host on the network attempted to inform the router that it is on network 192.0.2.240, but the router does not know that the network is attached to a different router interface. The remote host (probably a PC or an X terminal) is misconfigured. If the router were to install this entry, it would deny service to the real machine on the proper cable.
IP ARP: rep filtered src 192.0.2.240 0000.0c00.6b31, dst 192.0.2.7 0800.2010.b908
Related Commands
Description Configures the extended access list mechanism for filtering frames by both source and destination addresses and arbitrary bytes in the packet. Enables filtering of debug trace on a per-interface or per-access list basis. Lists the debugging options enabled on this router.
DB-118
December 2010
debug ase
Note
Effective with Cisco IOS Release 12.4(24), the debug ase command is not available in Cisco IOS software. To gather Automatic Signature Extraction (ASE) error, log, messaging, reporting, status, and timer information, use the debug ase command in privileged EXEC mode. To disable error, log, messaging, reporting, status, and timer information, use the no form of this command. debug ase {errors | log | messages | reports | status | timing} no debug ase {errors | log | messages | reports | status | timing}
Syntax Description
Displays ASE error information. Displays ASE logging information. Displays ASE messaging information. Displays ASE reports. Displays ASE status information. Displays ASE timer information.
Command Default
Disabled
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was removed.
12.4(24)
Usage Guidelines
This command is used on the Cisco 1800, 2800, and 7200 series routers, Cisco 7301 router, and Integrated Services Routers (ISRs) as ASE sensors.
Related Commands
Description Enters the ASE collector server IP address so that the ASE sensor has IP connectivity to the ASE collector. Enables the ASE feature on a specified interface.
DB-119
Command ase group ase signature extraction clear ase signature show ase
Description Identifies the TIDP group number for the ASE feature. Enables the ASE feature globally on the router. Clears ASE signatures that were detected on the router. Displays the ASE run-time status, which includes the TIDP group number.
DB-120
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command traces the event logs in the ASNL, which serves as the interface layer between the application and protocol stacks. Event logs are generated during normal subscription processing, when the application responds to the notification request and when the session history table is updated.
Examples
The following example shows the ASNL subscription table being generated and the associated subscription timers as the application responds to the subscription request. The response timer is started to determine if the application responds to the notification request. If the application that made the subscription does not respond to the notification request within 5 seconds, the system automatically removes the subscription. The session-history-record deletion timer is also started. When the timer expires, the history record is removed from the active subscription table.
Router# debug asnl events Application Subscribe Notify Layer Events debugging is on *May 4 06:26:19.091://-1//ASNL:SUB-1:/asnl_process_is_up:Creating subscription table *May 4 06:26:19.091://5//ASNL:SUB1:/asnl_subscribe:resp = ASNL_SUBCRIBE_PENDING[2] *May 4 06:26:19.615://5//ASNL:SUB1:/asnl_start_timer:timer (0x63146C44)starts - delay (5000) *May 4 06:26:19.619://-1//ASNL:SUB1:/asnl_stop_timer:timer(0x63146C44) stops *May 4 06:26:19.619://-1//ASNL:SUB1:/asnl_notify_ack:ret=0x0 c5300-5# *May 4 06:26:24.631://5//ASNL:SUB1:/asnl_start_timer:timer (0x63146C44)starts - delay (5000) *May 4 06:26:24.631://-1//ASNL:SUB1:/asnl_stop_timer:timer(0x63146C44) stops *May 4 06:26:24.635://-1//ASNL:SUB1:/asnl_notify_ack:ret=0x0
DB-121
c5300-5# *May 4 06:26:29.647://5//ASNL:SUB1:/asnl_start_timer:timer (0x63146C44)starts - delay (5000) *May 4 06:26:29.647://-1//ASNL:SUB1:/asnl_stop_timer:timer(0x63146C44) stops *May 4 06:26:29.651://-1//ASNL:SUB1:/asnl_notify_ack:ret=0x0 *May 4 06:26:34.663://5//ASNL:SUB1:/asnl_start_timer:timer (0x63146C44)starts - delay (5000) *May 4 06:26:34.663://-1//ASNL:SUB1:/asnl_stop_timer:timer(0x63146C44) stops *May 4 06:26:34.667://-1//ASNL:SUB-1:/asnl_create_session_history:Creating Session History *May 4 06:26:34.667://-1//ASNL:SUB-1:/asnl_insert_session_history_record:starting history record deletion_timer of 15 minutes *May 4 06:26:34.667://-1//ASNL:SUB1:/asnl_notify_ack:ret=0x0
Related Commands
Description Clears all active subscriptions or a specific subscription. Displays information about ASNL-based and non-ASNL-based SIP subscriptions. Specifies how long to keep ASNL subscription history records and how many history records to keep in memory.
DB-122
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The router uses asynchronous security protocols from companies including ADT Security Systems, Inc., Adplex, and Diebold to transport alarm blocks between two devices (such as a security alarm system console and an alarm panel). The alarm blocks are transported in pass-through mode using BSTUN encapsulation.
Examples
The following is partial sample output from the debug asp packet command for asynchronous security protocols when packet debugging is enabled on an asynchronous line carrying Diebold alarm traffic. In this example, two polls are sent from the Diebold alarm console to two alarm panels that are multidropped from a single EIA/TIA-232 interface. The alarm panels have device addresses F0 and F1. The example trace indicates that F1 is responding and F0 is not responding. At this point, you need to examine the physical link and possibly use a datascope to determine why the device is not responding.
Router# debug asp packet 12:19:48: 12:19:49: 12:19:49: 12:20:47: 12:20:48: 12:20:48: 12:21:46: 12:21:46: 12:21:46: ASP: ASP: ASP: ASP: ASP: ASP: ASP: ASP: ASP: Serial5: Serial5: Serial5: Serial5: Serial5: Serial5: Serial5: Serial5: Serial5: ADI-Rx: ADI-Tx: ADI-Rx: ADI-Rx: ADI-Tx: ADI-Rx: ADI-Rx: ADI-Tx: ADI-Rx: Data Data Data Data Data Data Data Data Data (4 (1 (4 (4 (1 (4 (4 (1 (4 bytes): bytes): bytes): bytes): bytes): bytes): bytes): bytes): bytes): F1FF4C42 88 F0FF9B94 F1FF757B F3 F0FFB1BE F1FFE6E8 6F F0FFC1CE
Description Asyncronous security protocol packet. Interface receiving and sending the packet. Packet is being received. Packet is being sent.
DB-123
Table 23
Description Type and size of the packet. Alarm panel device address.
DB-124
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug aspp event command should be used with the debug aspp packet command to display all available details of the APOS call flow.
Examples
The following is sample output from the debug aspp event command for a simple transaction:
Router# debug aspp event ASPP event Router# ASPP APOS: ASPP APOS: ASPP APIP: ASPP APIP: ASPP APOS: ASPP APOS: ASPP APOS: ASPP APOS: ASPP APIP: ASPP APIP: ASPP APOS: ASPP APOS: ASPP APIP: ASPP APIP: debugging is on Serial0/1: Serial0/1: Serial0/1: Serial0/1: Serial0/1: Serial0/1: Serial0/1: Serial0/1: Serial0/1: Serial0/1: Serial0/1: Serial0/1: Serial0/1: Serial0/1: Serial HayesAT: state = DISCONNECTED Received HayesAT DIAL: state = DISCONNECTED Serial ENABLE: state = CONNECTING Network ENABLE: state = CONNECTING Send HayesAT CONNECT 9600: state = CONNECTED Response timer expired: state = CONNECTED Response timer expired: state = CONNECTED Serial DATA: state = CONNECTED Serial DATA: state = CONNECTED Network DATA: state = CONNECTED Serial ACK: state = CONNECTED Disconnect timer expired: state = DISCONNECT WAIT Serial DISABLE: state = DISCONNECTING Network DISABLE: state = DISCONNECTING
DB-125
Table 24
Field Serial ENABLE: Network ENABLE: Send HayesAT CONNECT Response timer expired Serial DATA: Network DATA: Disconnect timer expired Serial ACK: Serial DISABLE: Network DISABLE:
Description Enable event received from the serial interface. Enable event received from the network. Interpreted version of the Hayes AT command that is sent to the serial interface. The response timer has expired. Data received from the serial interface. Data received from the network. Hayes AT event is received by the serial interface. Acknowledgment received from the serial interface. Disable event received from the serial interface. Disable event received from the network.
Related Commands
DB-126
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug aspp packet command should be used with the debug aspp event command to display all available details of the APOS call flow.
Examples
The following is sample output from the debug aspp packet command for a simple transaction:
Router# debug aspp packet ASPP event debugging is on Router# ASPP:Serial1/7:ADI-rx:Data ASPP:Serial1/7:ADI-tx:Data ASPP:Serial1/7:ADI-rx:Data ASPP:Serial1/7:ADI-tx:Data ASPP:Serial1/7:ADI-tx:Data ASPP:Serial1/7:ADI-rx:Data ASPP:Serial1/7:ADI-tx:Data ASPP:Serial1/7:ADI-rx:Data ASPP:Serial1/7:ADI-tx:Data
(14 bytes): 415456302644325331313D35300D (2 bytes): 300D (27 bytes): 4154583453393D3153373D323444543138303039 (3 bytes): 31320D (1 bytes): 05 (5 bytes): 0212340325 (5 bytes): 025678032D (1 bytes): 06 (1 bytes): 04
DB-127
Description Indicates that this is an ASPP debug message. The interface that received or transmitted the packet. Indicates a received packet. Indicates a transmitted packet.
Related Commands
DB-128
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example starts the asynchronous rotary line queueing debugging display:
Router# debug async async-queue *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar 2 2 2 2 2 2 2 2 2 2 2 03:50:28.377: 03:50:28.377: 03:50:28.377: 03:50:28.381: 03:50:30.164: 03:50:30.168: 03:50:30.168: 03:50:34.920: 03:50:36.783: 03:50:36.787: 03:50:36.787: AsyncQ: First connection to be queued - starting the AsyncQ manager AsyncQ: Enabling the AsyncQ manager AsyncQ: Started the AsyncQ manager process with pid 98 AsyncQ: Created a Waiting TTY on TTY66 with pid 99 WaitingTTY66: Did Authentication on waiting TTY (VTY) AsyncQ: Received ASYNCQ_MSG_ADD AsyncQ: New queue, adding this connection as the first element AsyncQ: Created a Waiting TTY on TTY67 with pid 100 WaitingTTY67: Did Authentication on waiting TTY (VTY) AsyncQ: Received ASYNCQ_MSG_ADD AsyncQ: Queue exists, adding this connection to the end of the queue
Related Commands
Description Enables the IP TCP transactions debugging display to observe significant transactions such as state changes, retransmissions, and duplicate packets. Enables the modem debugging display to observe modem line activity on an access server.
debug modem
DB-129
Syntax Description
Displays all autoprovisioned PVC events. Displays all autoprovisioned PVC errors. Displays all autoprovisioned PVC events and errors.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRE.
12.2(28)SB 12.2(33)SRE
Examples
The following example shows output for the debug atm autovc command for all autoprovisioned PVC events and errors:
Router# debug atm autovc all AutoVC all debugging is on 00:09:03:AutoVC(ATM1/0):1/101 enqueued
This message indicates that there is incoming traffic on PVC 1/101 and the PVC is enqueued to be processed.
00:09:03:AutoVC(ATM1/0):process VC 1/101
This message indicates that PVC 1/101 is in the process of being autoprovisioned.
00:09:03:AutoVC(ATM1/0.1):bring up vc 1/101
DB-130
December 2010
Related Commands
Description Configures ATM PVC autoprovisioning, which enables a PVC or range of PVCs to be created automatically on demand.
DB-131
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example provides output for the debug atm bundle error command:
Router# debug atm bundle error
Related Commands
DB-132
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example provides output for the debug atm bundle events command:
Router# debug atm bundle events 01:14:35:BUNDLE 01:14:35:BUNDLE 01:14:35:BUNDLE 01:14:35:BUNDLE 01:14:35:BUNDLE 01:14:35:BUNDLE 01:14:35:BUNDLE 01:14:35:BUNDLE 01:14:35:BUNDLE 01:14:35:BUNDLE EVENT(test):b_update_vc for four with bstate 1, vc_state4 EVENT(test):bmupdate active precedence 0x01 0 EVENT(test):bmupdate active precedence 0x02 0 EVENT(test):bmupdate active precedence 0x04 0 EVENT(test):bmupdate active precedence 0x08 0 EVENT(test):bmupdate active precedence 0x10 0 EVENT(test):bmupdate active precedence 0x20 0 EVENT(test):bmupdate active precedence 0x40 0 EVENT(test):bmupdate active precedence 0x80 0 EVENT(test):bundle precedence updated
Table 26
Field 01:14:35 BUNDLE EVENT(test) b_update_vc for four with bstate 1, vc_state 1
Description Local time on the router in hours:minutes:seconds. Bundle event for bundle by that name. Test describing the bundle event.
DB-133
Related Commands
DB-134
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example enables debugging for ATM virtual circuits (VCs) that have been configured with cell packing:
Router# debug atm cell-packing ATM Cell Packing debugging is on 00:09:04: ATM Cell Packing: vc 1/100 remote mncp 22 validated
The following example enables debugging for permanent virtual paths (PVPs) that have been configured with cell packing:
Router# debug atm cell-packing ATM Cell Packing debugging is on 00:12:33: ATM Cell Packing: vp 1 remote mncp 22 validated
The output indicates that the router received the MNCP information from the remote PE router.
Related Commands
Description Creates cell-packing timers that specify how long the PE router can wait for cells to be packed into an MPLS or L2TPv3 packet. Enables the packing of multiple ATM cells into a single MPLS or L2TPv3 packet.
show atm cell-packing Displays information about the VCs and VPs that have ATM cell relay over MPLS or L2TPv3 cell packing enabled.
DB-135
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 1700 series routers. This command was implemented on the Cisco IAD2420 Series. This command was integrated into Cisco IOS Release 12.2(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command displays ATM events that occur on the ATM interface processor and is useful for diagnosing problems in an ATM network. It provides an overall picture of the stability of the network. In a stable network, the debug atm events command does not return any information. If the command generates numerous messages, the messages can indicate the possible source of problems. When configuring or making changes to a router or interface for ATM, enable the debug atm events command. Doing so alerts you to the progress of the changes or to any errors that might result. Also use this command periodically when you suspect network problems.
Examples
The following is sample output from the debug atm events command:
Router# debug atm events RESET(ATM4/0): PLIM type is 1, Rate is 100Mbps aip_disable(ATM4/0): state=1 config(ATM4/0) aip_love_note(ATM4/0): asr=0x201 aip_enable(ATM4/0) aip_love_note(ATM4/0): asr=0x4000 aip_enable(ATM4/0): restarting VCs: 7 aip_setup_vc(ATM4/0): vc:1 vpi:1 vci:1 aip_love_note(ATM4/0): asr=0x200 aip_setup_vc(ATM4/0): vc:2 vpi:2 vci:2
DB-136
December 2010
aip_love_note(ATM4/0): asr=0x200 aip_setup_vc(ATM4/0): vc:3 vpi:3 vci:3 aip_love_note(ATM4/0): asr=0x200 aip_setup_vc(ATM4/0): vc:4 vpi:4 vci:4 aip_love_note(ATM4/0): asr=0x200 aip_setup_vc(ATM4/0): vc:6 vpi:6 vci:6 aip_love_note(ATM4/0): asr=0x200 aip_setup_vc(ATM4/0): vc:7 vpi:7 vci:7 aip_love_note(ATM4/0): asr=0x200 aip_setup_vc(ATM4/0): vc:11 vpi:11 vci:11 aip_love_note(ATM4/0): asr=0x200
Description Indicates the interface rate in megabits per second (Mbps). Possible values are:
state
Indicates current state of the ATM Interface Processor (AIP). Possible values are:
1 = An ENABLE will be issued soon. 0 = The AIP will remain shut down.
asr
Defines a bitmask, which indicates actions or completions to commands. Valid bitmask values are:
0x0800 = AIP crashed, reload may be required. 0x0400 = AIP detected a carrier state change. 0x0n00 = Command completion status. Command completion status codes are:
n = 8 Invalid Physical Layer Interface Module (PLIM)
detected
n = 4 Command failed n = 2 Command completed successfully n = 1 CONFIG request failed n = 0 Invalid value
The following line indicates that the AIP was reset. The PLIM TYPE detected was 1, so the maximum rate is set to 100 Mbps.
RESET(ATM4/0): PLIM type is 1, Rate is 100Mbps
The following line indicates that the AIP was given a shutdown command, but the current configuration indicates that the AIP should be up:
aip_disable(ATM4/0): state=1
DB-137
The following line indicates that a configuration command has been completed by the AIP:
aip_love_note(ATM4/0): asr=0x201
The following line indicates that the AIP was given a no shutdown command to take it out of shutdown:
aip_enable(ATM4/0)
The following line indicates that the AIP detected a carrier state change. It does not indicate that the carrier is down or up, only that it has changed.
aip_love_note(ATM4/0): asr=0x4000
The following line of output indicates that the AIP enable function is restarting all permanent virtual circuits (PVCs) automatically:
aip_enable(ATM4/0): restarting VCs: 7
The following lines of output indicate that PVC 1 was set up and a successful completion code was returned:
aip_setup_vc(ATM4/0): vc:1 vpi:1 vci:1 aip_love_note(ATM4/0): asr=0x200
DB-138
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on Cisco 7500, 10000, and 12000 series Internet routers. This command was integrated into Cisco IOS Release 12.2(18)S on Cisco 7500 series routers. Support was added for the Cisco 7304 router. The Cisco 7500 series router is not supported in Cisco IOS Release 12.2(20)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example displays debug messages regarding ATM HA errors on the networking device:
Router# debug atm ha-error
Related Commands
Description Debugs ATM HA events on the networking device. Debugs ATM HA state information on the networking device.
DB-139
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on Cisco 7500, 10000, and 12000 series Internet routers. This command was integrated into Cisco IOS Release 12.2(18)S on Cisco 7500 series routers. Support was added for the Cisco 7304 router. The Cisco 7500 series router is not supported in Cisco IOS Release 12.2(20)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example displays debug messages regarding ATM HA events on the networking device:
Router# debug atm ha-events
Related Commands
Description Debugs ATM HA errors on the networking device. Debugs ATM HA state information on the networking device.
DB-140
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on Cisco 7500, 10000, and 12000 series Internet routers. This command was integrated into Cisco IOS Release 12.2(18)S on Cisco 7500 series routers. Support was added for the Cisco 7304 router. The Cisco 7500 series router is not supported in Cisco IOS Release 12.2(20)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example displays debug messages regarding the ATM HA state on the networking device:
Router# debug atm ha-state
Related Commands
Description Debugs ATM HA errors on the networking device. Debugs ATM HA events on the networking device.
DB-141
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows the events and messages when configuring ATM Cell Relay over MPLS in VP mode.
Router# debug atm l2transport ATM L2transport Events and Errors debugging is on Router# show debug ATM L2transport: ATM L2transport Events and Errors debugging is on Router(config-if)# atm pvp 24 l2transport Router(cfg-if-atm-l2trans-pvp)# xconnect 11.11.11.11 700 pw-class vp Router(cfg-if-atm-l2trans-pvp)# end 00:14:51: ATM L2trans(ATM1/0): VP 24 is created 00:14:51: ATM L2trans(ATM1/0): ckt_type 10, ckt_id 1000024 UP 00:14:51: ATM L2trans(ATM1/0): VP 24, response is connect forwarded
The following example shows the events and messages when deleting a PVP.
Router(config-if)# no atm pvp 24 l2transport 00:14:37: ATM L2trans(ATM1/0): ckt_type 10, ckt_id 1000024 DOWN
DB-142
December 2010
00:14:37: ATM L2trans(ATM1/0): ckt_type 10, ckt_id 1000024 DOWN 00:14:37: ATM L2trans(ATM1/0): remove xconnect circuit_type=10, circuit_id=1000024 00:14:37: ATM L2trans(ATM1/0): ckt_type 10, ckt_id 1000024 DOWN
Related Commands
Command
Description
show mpls l2transport Displays information about AToM circuits that have been enabled to route vc Layer 2 packets on a router.
DB-143
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following examples show output from the debug atm lfi command. Each example is preceded by an explanation of the output.
The following output indicates that the packet has dequeued from the per-VC queue that is associated with the virtual circuit (VC):
00:17:27: MLP-ATM(Virtual-Access3) pak dequeued from per VC Q 15/200,qcount:0
The following output indicates that the packet is enqueued on the per-VC queue associated with the VC:
00:17:27: MLP-ATM(Virtual-Access3) pak enqueued to per VC Q 15/200, qcount:0
The following output indicates that the packet has dequeued from the MLP bundle queue:
00:17:27: MLP-ATM(Virtual-Access3) pak dequeued from MP Bundle 15/200, qcount:0
The following output indicates that PPP over ATM (PPPoA) encapsulation cannot be added to the packet for some reason:
00:17:27: MLP-ATM(Virtual-Access3) encapsulation failure - dropping packet
The following output indicates that the VC could not be found on the virtual access interface associated with the PPPoA session:
00:17:27: MLP-ATM(Virtual-Access3) No VC to transmit- dropping packet
When a permanent virtual circuit (PVC) has been deleted, the following output indicates that MLP has been deconfigured successfully:
00:17:27: MLP-ATM(Virtual-Access3) mlp de-configured for PVC 15/200
DB-144
December 2010
If the changing of any PVC parameters requires re-creation of the PVC, the following output is generated during the re-creation of the PVC:
00:17:27: MLP-ATM(Virtual-Access3) MLPoATM re-configured for PVC 15/200
The following output indicates that the MLP over ATM structure associated with a VC has failed to allocate memory:
00:17:27: MLP-ATM(Virtual-Access3) Memory allocation error
The following output is generated when MLP over ATM is first configured on a PVC:
00:17:27: MLP-ATM(Virtual-Access3) MLPoATM configured for PVC 15/200
Related Commands
DB-145
Syntax Description
api
(Optional) Native ATM application programming interface (API). Displays events that occur as a result of the exchange between the native ATM API and the signaling API. (Optional) Native ATM connection manager. Displays internal connection manager events for the native ATM API. (Optional) Native ATM error. Displays errors that occur during the setup of an ATM SVC. (Optional) Native ATM filter. Displays the internal network service access point (NSAP) filter events of the native ATM API.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Native ATM API is the layer above the signaling API. Static map and Resource Reservation Protocol (RSVP) clients use the native ATM API to interact with the signaling API to create ATM SVCs. Use the debug atm native command to diagnose problems in the creation of static map and RSVP ATM SVCs.
DB-146
December 2010
Examples
The following is sample output for the debug atm native command with the api keyword:
Router# debug atm native api 0:24:59:NATIVE ATM :associate endpoint 00:24:59:NATIVE ATM :ID (3) prep outgoing call, conn_type 0 00:24:59:NATIVE ATM :ID (3) set connection attribute for 5 00:24:59:NATIVE ATM :ID (3) query connection attribute 8 00:24:59:NATIVE ATM :ID (3) set connection attribute for 8 00:24:59:NATIVE ATM :ID (3) set connection attribute for 9 00:24:59:NATIVE ATM :ID (3) set connection attribute for 10 00:24:59:NATIVE ATM :ID (3) set connection attribute for 7 00:24:59:NATIVE ATM :ID (3) set connection attribute for 6 00:24:59:NATIVE ATM :ID (3) set connection attribute for 2 00:24:59:NATIVE ATM :ID (3) set connection attribute for 0 00:24:59:NATIVE ATM :ID (3) query connection attribute 12 00:24:59:NATIVE ATM :ID (3) set connection attribute for 12 00:24:59:NATIVE ATM :ID (3) query connection attribute 13 00:24:59:NATIVE ATM :ID (3) set connection attribute for 13 00:24:59:NATIVE ATM :ID (3) connect outgoing call 00:24:59:NATIVE ATM :ID (3) callback, CONNECT received
DB-147
Syntax Description
api
(Optional) Nonbroadcast multiaccess (NBMA) ATM application programming interface (API). Displays events that occur as a result of the exchange between RSVP and the NBMA API.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug atm nbma command to diagnose problems in the creation of RSVP SVCs. The RSVP application creates SVCs by using the NBMA API. The debug atm nbma command with the api keyword displays events that occur as a result of the exchange between RSVP and the NBMA API.
Examples
The following is sample output for the debug atm nbma command:
Router# debug atm nbma api 00:52:50:NBMA-ATM-API 00:52:50:NBMA_ATM-API 00:52:50:NBMA_ATM-API 00:52:50:NBMA_ATM-API 00:52:50:NBMA_ATM-API 00:52:50:NBMA_ATM-API atm_setup_req nbma_atm_fill_blli nbma_atm_fill_bhli nbma_atm_callbackMsg - NATIVE_ATM_OUTGOING_CALL_ACTIVE rcv_outgoing_call_active nbma_svc_lookup
DB-148
December 2010
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output for the debug atm oam cc command records activity beginning with the entry of the oam-pvc manage cc command and ending with the entry of the no oam-pvc manage cc command. The ATM 0 interface is specified, and the both segment direction is specified. The output shows an activation request sent and confirmed, a series of CC cells sent by the routers on each end of the segment, and a deactivation request and confirmation.
Router# debug atm oam cc interface atm0 Generic ATM: ATM OAM CC cells debugging is on Router# 00:15:05: CC ACTIVATE MSG (ATM0) I:VCD#1 Type:8 OAM Func:1 Direction:3 CTag:5 00:15:05: CC ACTIVATE CONFIRM MSG (ATM0) Type:4 OAM Type:8 OAM Func:1 Direction:3 00:15:06: CC CELL (ATM0) O:VCD#1 VC 1/40 00:15:07: CC CELL (ATM0) I:VCD#1 VC 1/40 00:15:08: CC CELL (ATM0) O:VCD#1 VC 1/40 00:15:09: CC CELL (ATM0) I:VCD#1 VC 1/40 00:15:10: CC CELL (ATM0) O:VCD#1 VC 1/40 00:15:11: CC CELL (ATM0) I:VCD#1 VC 1/40 00:15:12: CC CELL (ATM0) O:VCD#1 VC 1/40 00:15:13: CC CELL (ATM0) I:VCD#1 VC 1/40
VC 1/40 OAM Cell Type:4 OAM O:VCD#1 VC 1/40 CTag:5 OAM Cell Type:4 OAM Cell Type:4 OAM Cell Type:4 OAM Cell Type:4 OAM Cell Type:4 OAM Cell Type:4 OAM Cell Type:4 OAM Cell Type:4 OAM Cell OAM OAM OAM OAM OAM OAM OAM OAM Type:1 Type:1 Type:1 Type:1 Type:1 Type:1 Type:1 Type:1
DB-149
00:15:14: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM 00:15:15: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM 00:15:16: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM 00:15:17: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM 00:15:18: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM 00:15:19: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM 00:15:19: CC DEACTIVATE MSG (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:8 OAM Func:1 Direction:3 CTag:6 00:15:19: CC DEACTIVATE CONFIRM MSG (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:8 OAM Func:1 Direction:3 CTag:6
Description Time stamp. Message type and interface. Source. Sink. Virtual circuit identifier. Direction in which the cells are traveling. May be one of the following values: 1 local router is the sink. 2 local router is the source. 3 both routers operate as the source and sink.
Related Commands
Description Configures ATM OAM F5 CC management. Displays all ATM PVCs and traffic information.
DB-150
December 2010
Syntax Description
Displays debug messages for incoming packet indications. Displays debug messages for flow control indications. Displays debug messages for online insertion or removal (OIR) of the ATM-OC3 POM network module. Displays debug messages for blocking commands sent to the segmentation and reassembly (SAR) and their acknowledgments. Displays debug messages for OIR of modules in the SFP port of the network module. Displays debug messages that give the hexadecimal representation of commands sent to the SAR and their acknowledgments.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug atm oc3 pom data command to display the incoming packet indications. Each incoming packet transferred by direct memory access (DMA) to the host memory by the SAR will cause a packet indication.
debug atm oc3 pom flow command
Use the debug atm oc3 pom flow command to display flow control indications. When traffic sent to the SAR exceeds the peak cell rate for a particular virtual circuit (VC), the SAR indicates this to the host by sending flow control indications. These indications inform the host that either the high watermark or the low watermark has been reached for that VC queue. When a high watermark is received from the SAR, indicating that the VC queue is full, the host will stop sending packets to the SAR until a low watermark indication is received. A low watermark indicates that the VC queue has been drained sufficiently to receive additional packets.
DB-151
Use the debug atm oc3 pom pa command on those platforms supporting OIR to display the indications generated when the port adapter (the ATM-OC3 POM network module) is subjected to OIR. This command is used principally during the port adapter initialization phase.
debug atm oc3 pom sar command
Use the debug atm oc3 pom sar command to display blocking commands or indications sent to or received from the SAR. This includes commands or indications of the creation or deletion of virtual circuits or virtual paths.
debug atm oc3 pom sfp command
Use the debug atm oc3 pom sfp command to display the indications generated when a module in the SFP port is subjected to OIR.
debug atm oc3 pom trace command
Use the debug atm oc3 pom trace command to display the hexadecimal representation of commands sent to or received from the SAR. To facilitate debugging, use this command in conjunction with the debug atm oc3 pom sar command.
Examples
The following is sample output from the debug atm oc3 pom data command:
Router# debug atm oc3 pom data DATA debugging is on Router# *Jun 27 22:03:17.996: Packet Indication: *Jun 27 22:03:17.996: word 0: 0x00007D24 *Jun 27 22:03:17.996: word 1: 0x00002F02 *Jun 27 22:03:17.996: word 2: 0xEE323464 *Jun 27 22:03:17.996: word 3: 0x006C006D
Description Date or time stamp of packet DMA transfer. Hexadecimal representation of four-word acknowledgment from the SAR when a packet is transferred by DMA to the host memory by the SAR.
The following example illustrates the output from the debug atm oc3 pom flow command:
Router# debug atm oc3 pom flow FLOW CNTL INDICATION debugging is on Router# *Jun 27 15:14:13.123: Flow Indication: *Jun 27 15:14:13.123: word 0: 0x00000001 *Jun 27 15:14:13.123: word 1: 0x300012C0 *Jun 27 15:14:13.123: word 2: 0x18001060
DB-152
December 2010
word 3: 0x00080021
15:14:13.456: Flow Indication: 15:14:13.456: word 0: 0x00000001 15:14:13.456: word 1: 0x300012C0 15:14:13.456: word 2: 0x18001060 15:14:13.456: word 3: 0x00090022
Description Date or time stamp of flow indication Hexadecimal representation of four-word indication sent by the SAR to the host that a high watermark or low watermark event has occurred. When XX is 08, a high watermark has been received by the host. The host will stop queueing packets for the VC. When XX is 09, a low watermark has been received by the host. The host will resume sending packets to the VC. YYYY is the running count of flow indication events sent to the host.
word 3: 0x00XXYYYY
The following examples illustrate the output from the debug atm oc3 pom pa command. The first example gives the output when the network module is removed:
Router# debug atm oc3 pom pa PA debugging is on *Jun 27 22:40:56.110: %OIR-6-REMCARD: Card removed from slot 2, interfaces disabled *Jun 27 22:40:56.122: *** Freed 6146 buffers
The second example gives the output when the network module is inserted, and gives the values of internal registers of the module:
*Jun shut *Jun *Jun *Jun *Jun *Jun *Jun 27 22:41:08.654: down 27 22:41:11.402: 27 22:41:11.402: 27 22:41:11.402: 27 22:41:11.402: 27 22:41:11.402: 27 22:41:11.402: %OIR-6-INSCARD: Card inserted in slot 2, interfaces administratively sar_base_addr 0x5C800000 PCI_MEMBAR2_REG after configuring:0x5E000008 PCI_MEMBAR3_REG after configuring:0x5F000000 PCI_COMMAND_REG: Offset= 0x4; value= 0x2A00006 FPGA Base address is 0x5C900000 FPGA PCI config Reg is 0x02200002
The following examples illustrate the output from the debug atm oc3 pom sar command. The first example displays command indications for setting up a VC and opening the reassembly channel and the segmentation channel in the SAR:
Router# debug atm oc3 pom sar
DB-153
SAR debugging is on Router# configure terminal Router(config)# interface atm 2/0 Router(config-if)# pvc 2/2 Router(config-if-atm-vc)# exit Router(config-if)# *Jun 27 22:12:28.816: ATM2/0: Setup_VC: vc:3 vpi:2 vci:2 *Jun 27 22:12:28.816: ATM2/0: Open_Channel(RSY): CH (1), VPI (2), VCI (2) *Jun 27 22:12:28.816: ATM2/0: HI/LO watermarks: 526/263; PeakRate: 149760 *Jun 27 22:12:28.816: ATM2/0: Open_Channel(SEG): CH (1), VPI (2), VCI (2) *Jun 27 22:12:28.820: ATM2/0: Setup_Cos: vc:3 wred_name:- max_q:0
The second example displays the commands sent to the SAR and the acknowledgements returned when the VC is deleted and the segmentation and reassembly channels are closed:
Router(config-if)# no Router(config-if)# *Jun 27 22:12:59.016: *Jun 27 22:12:59.016: *Jun 27 22:12:59.016: *Jun 27 22:12:59.016: *Jun 27 22:12:59.016: *Jun 27 22:12:59.016: pvc 2/2 ATM2/0: ATM2/0: ATM2/0: ATM2/0: ATM2/0: ATM2/0: Sent pending EOP successfully Close_Channel(RSY): Chan_ID (0x104) Close_Channel(RSY): Chan_ID (0x104) CLOSE Close_Channel: CLOSE_PENDING Close_Channel(SEG): Chan_ID (0x105) Close_Channel: CLOSE
The following examples illustrate the output from the debug atm oc3 pom sfp command. The first example gives the output when the module is removed from the SFP port:
Router# debug atm oc3 pom sfp SFP debugging is on *Jun 27 22:27:40.792: *Jun 27 22:27:40.808: *Jun 27 22:27:40.812: *Jun 27 22:27:41.464: *Jun 27 22:27:43.464: *Jun 27 22:27:44.464: state to down SFP TX FAULT detected SFP LOS detected SFP removal detected NM-1A-OC3-POM: SFP 2/0 - Removed unique %LINK-3-UPDOWN: Interface ATM2/0, changed state to down %LINEPROTO-5-UPDOWN: Line protocol on Interface ATM2/0, changed
The second example gives the output when the module is inserted in the SFP port.
*Jun 27 22:27:47.776: *Jun 27 22:27:47.776: *Jun 27 22:27:48.276: *Jun 27 22:27:48.276: *Jun 27 22:27:48.496: *Jun 27 22:27:50.496: *Jun 27 22:27:51.496: state to up SFP LOS cleared SFP TX FAULT detected SFP present detected SFP TX FAULT cleared Set the Container_id to 17 %LINK-3-UPDOWN: Interface ATM2/0, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface ATM2/0, changed
The first example illustrates the output from the debug atm oc3 pom trace command when it is run without the debug atm oc3 sar command being activated:
Router# debug atm oc3 pom trace SAR CMD/ACK debugging is on Router# configure terminal Router(config)# interface atm 2/0 router(config-if)# pvc 2/2 Router(config-if-atm-vc)# exit
DB-154
December 2010
Router(config-if)# *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284: *Jun 27 22:15:09.284:
Command Sent: word 0: 0x00000480 word 1: 0x00012010 word 2: 0x00000000 word 3: 0x00000000 word 4: 0x00200020 word 5: 0x00000000 word 6: 0x00000000 word 7: 0x00000000 word 8: 0x00000000 Command Indication: word 0: 0x00000000 word 1: 0x01042110 word 2: 0x01050000 word 3: 0x0000003B ACK received = 200 usecs Command Sent: word 0: 0x01050480 word 1: 0x00011010 word 2: 0x02000000 word 3: 0x00010003 word 4: 0x00200020 word 5: 0x64B30000 word 6: 0x10C00000 word 7: 0x86850000 word 8: 0x00010040 word 9: 0x00000000 Command Indication: word 0: 0x00010000 word 1: 0x00011110 word 2: 0x02000000 word 3: 0x0001003D ACK received = 200 usecs
Description Date or time stamp for the command dialog. Hexadecimal representation of the n-word command sent to the SAR (under Command Sent:) and the four-word acknowledgment returned by the SAR (under Command Indication:). Time (in microseconds) between sending the command to the SAR and receiving the acknowledgment.
ACK received
The second example illustrates the output from the debug atm oc3 pom trace command run in conjunction with the debug atm oc3 pom sar command. In this example, each command sent to the SAR is displayed by the debug atm oc3 pom sar command. Then the hexadecimal representation of the command and its acknowledgement are displayed by the debug atm oc3 pom trace command.
Router# debug atm oc3 pom trace SAR CMD/ACK debugging is on
DB-155
Router# debug atm oc3 pom sar SAR debugging is on Router# configure terminal Router(config)# interface atm 2/0 router(config-if)# pvc 2/2 Router(config-if-atm-vc)# exit Router(config-if)# *Jun 27 22:15:09.284: ATM2/0: Setup_VC: vc:4 vpi:2 vci:2 *Jun 27 22:15:09.284: ATM2/0: Open_Channel(RSY): CH (1), VPI (2), VCI (2) *Jun 27 22:15:09.284: Command Sent: *Jun 27 22:15:09.284: word 0: 0x00000480 *Jun 27 22:15:09.284: word 1: 0x00012010 *Jun 27 22:15:09.284: word 2: 0x00000000 *Jun 27 22:15:09.284: word 3: 0x00000000 *Jun 27 22:15:09.284: word 4: 0x00200020 *Jun 27 22:15:09.284: word 5: 0x00000000 *Jun 27 22:15:09.284: word 6: 0x00000000 *Jun 27 22:15:09.284: word 7: 0x00000000 *Jun 27 22:15:09.284: word 8: 0x00000000 *Jun 27 22:15:09.284: Command Indication: *Jun 27 22:15:09.284: word 0: 0x00000000 *Jun 27 22:15:09.284: word 1: 0x01042110 *Jun 27 22:15:09.284: word 2: 0x01050000 *Jun 27 22:15:09.284: word 3: 0x0000003B *Jun 27 22:15:09.284: ACK received = 200 usecs *Jun 27 22:15:09.284: ATM2/0: HI/LO watermarks: 526/263; PeakRate: 149760 *Jun 27 22:15:09.284: ATM2/0: Open_Channel(SEG): CH (1), VPI (2), VCI (2) *Jun 27 22:15:09.284: Command Sent: *Jun 27 22:15:09.284: word 0: 0x01050480 *Jun 27 22:15:09.284: word 1: 0x00011010 *Jun 27 22:15:09.284: word 2: 0x02000000 *Jun 27 22:15:09.284: word 3: 0x00010003 *Jun 27 22:15:09.284: word 4: 0x00200020 *Jun 27 22:15:09.284: word 5: 0x64B30000 *Jun 27 22:15:09.284: word 6: 0x10C00000 *Jun 27 22:15:09.284: word 7: 0x86850000 *Jun 27 22:15:09.284: word 8: 0x00010040 *Jun 27 22:15:09.284: word 9: 0x00000000 *Jun 27 22:15:09.284: Command Indication: *Jun 27 22:15:09.284: word 0: 0x00010000 *Jun 27 22:15:09.284: word 1: 0x00011110 *Jun 27 22:15:09.284: word 2: 0x02000000 *Jun 27 22:15:09.284: word 3: 0x0001003D *Jun 27 22:15:09.284: ACK received = 200 usecs *Jun 27 22:15:09.284: ATM2/0: Setup_Cos: vc:4 wred_name:- max_q:0
DB-156
December 2010
Syntax Description
Displays debug messages for incoming packet indications. Displays debug messages for flow control indications. Displays debug messages for online insertion or removal (OIR) of the ATM T3/E3 network module. Displays debug messages for blocking commands sent to the segmentation and reassembly (SAR) and their acknowledgments. Displays debug messages that give the hexadecimal representation of commands sent to the SAR and their acknowledgments.
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug atm t3e3 data command to display the incoming packet indications. Each incoming packet transferred by direct memory access (DMA) to the host memory by the SAR will cause a packet indication.
debug atm t3e3 flow command
Use the debug atm t3e3 flow command to display flow control indications. When traffic sent to the SAR exceeds the peak cell rate for a particular virtual circuit (VC), the SAR indicates this to the host by sending flow control indications. These indications inform the host that either the high watermark or the low watermark has been reached for that VC queue. When a high watermark is received from the SAR, indicating that the VC queue is full, the host will stop sending packets to the SAR until a low watermark indication is received. A low watermark indicates that the VC queue has been drained sufficiently to receive additional packets.
DB-157
Use the debug atm t3e3 pa command on those platforms supporting OIR to display the indications generated when the port adapter (the ATM T3/E3 network module) is subjected to OIR. This command is used principally during the port adapter initialization phase.
debug atm t3e3 sar command
Use the debug atm t3e3 sar command to display blocking commands or indications sent to or received from the SAR. This includes commands or indications of the creation or deletion of virtual circuits or virtual paths.
debug atm t3e3 trace command
Use the debug atm t3e3 trace command to display the hexadecimal representation of commands sent to or received from the SAR. To facilitate debugging, use this command in conjunction with the debug atm t3e3 sar command.
Examples
The following is sample output from the debug atm t3e3 data command:
Router# debug atm t3e3 data DATA debugging is on Router# *Jun 27 22:03:17.996: Packet Indication: *Jun 27 22:03:17.996: word 0: 0x00007D24 *Jun 27 22:03:17.996: word 1: 0x00002F02 *Jun 27 22:03:17.996: word 2: 0xEE323464 *Jun 27 22:03:17.996: word 3: 0x006C006D
Description Date or time stamp of packet DMA transfer. Hexadecimal representation of four-word acknowledgment from the SAR when a packet is transferred by DMA to the host memory by the SAR.
The following example illustrates the output from the debug atm t3e3 flow command:
Router# debug atm t3e3 flow FLOW CNTL INDICATION debugging is on Router# *Jun 27 15:14:13.123: Flow Indication: *Jun 27 15:14:13.123: word 0: 0x00000001 *Jun 27 15:14:13.123: word 1: 0x300012C0 *Jun 27 15:14:13.123: word 2: 0x18001060 *Jun 27 15:14:13.123: word 3: 0x00080021 *Jun 27 15:14:13.456: Flow Indication: *Jun 27 15:14:13.456: word 0: 0x00000001 *Jun 27 15:14:13.456: word 1: 0x300012C0
DB-158
December 2010
Description Date or time stamp of flow indication Hexadecimal representation of four-word indication sent by the SAR to the host that a high watermark or low watermark event has occurred. When XX is 08, a high watermark has been received by the host. The host will stop queueing packets for the VC. When XX is 09, a low watermark has been received by the host. The host will resume sending packets to the VC. YYYY is the running count of flow indication events sent to the host.
word 3: 0x00XXYYYY
The following examples illustrate the output from the debug atm t3e3 pa command. The first example gives the output when the network module is removed:
Router# debug atm t3e3 pa PA debugging is on *Jun 27 22:40:56.110: %OIR-6-REMCARD: Card removed from slot 2, interfaces disabled *Jun 27 22:40:56.122: *** Freed 6146 buffers
The second example gives the output when the network module is inserted, and gives the values of internal registers of the module:
*Jun shut *Jun *Jun *Jun *Jun *Jun *Jun 27 22:41:08.654: down 27 22:41:11.402: 27 22:41:11.402: 27 22:41:11.402: 27 22:41:11.402: 27 22:41:11.402: 27 22:41:11.402: %OIR-6-INSCARD: Card inserted in slot 2, interfaces administratively sar_base_addr 0x5C800000 PCI_MEMBAR2_REG after configuring:0x5E000008 PCI_MEMBAR3_REG after configuring:0x5F000000 PCI_COMMAND_REG: Offset= 0x4; value= 0x2A00006 FPGA Base address is 0x5C900000 FPGA PCI config Reg is 0x02200002
The following examples illustrate the output from the debug atm t3e3 sar command. The first example displays command indications for setting up a VC and opening the reassembly channel and the segmentation channel in the SAR:
Router# debug atm t3e3 sar SAR debugging is on Router# configure terminal Router(config)# interface atm 2/0 Router(config-if)# pvc 2/2 Router(config-if-atm-vc)# exit
DB-159
Router(config-if)# *Jun 27 22:12:28.816: *Jun 27 22:12:28.816: *Jun 27 22:12:28.816: *Jun 27 22:12:28.816: *Jun 27 22:12:28.820:
Setup_VC: vc:3 vpi:2 vci:2 Open_Channel(RSY): CH (1), VPI (2), VCI (2) HI/LO watermarks: 526/263; PeakRate: 149760 Open_Channel(SEG): CH (1), VPI (2), VCI (2) Setup_Cos: vc:3 wred_name:- max_q:0
The second example displays the commands sent to the SAR and the acknowledgements returned when the VC is deleted and the segmentation and reassembly channels are closed:
Router(config-if)# no Router(config-if)# *Jun 27 22:12:59.016: *Jun 27 22:12:59.016: *Jun 27 22:12:59.016: *Jun 27 22:12:59.016: *Jun 27 22:12:59.016: *Jun 27 22:12:59.016: pvc 2/2 ATM2/0: ATM2/0: ATM2/0: ATM2/0: ATM2/0: ATM2/0: Sent pending EOP successfully Close_Channel(RSY): Chan_ID (0x104) Close_Channel(RSY): Chan_ID (0x104) CLOSE Close_Channel: CLOSE_PENDING Close_Channel(SEG): Chan_ID (0x105) Close_Channel: CLOSE
The first example illustrates the output from the debug atm t3e3 trace command when it is run without the debug atm t3e3 sar command being activated:
Router# debug atm t3e3 trace SAR CMD/ACK debugging is on Router# configure terminal Router(config)# interface atm 2/0 router(config-if)# pvc 2/2 Router(config-if-atm-vc)# exit Router(config-if)# *Jun 27 22:15:09.284: Command Sent: *Jun 27 22:15:09.284: word 0: 0x00000480 *Jun 27 22:15:09.284: word 1: 0x00012010 *Jun 27 22:15:09.284: word 2: 0x00000000 *Jun 27 22:15:09.284: word 3: 0x00000000 *Jun 27 22:15:09.284: word 4: 0x00200020 *Jun 27 22:15:09.284: word 5: 0x00000000 *Jun 27 22:15:09.284: word 6: 0x00000000 *Jun 27 22:15:09.284: word 7: 0x00000000 *Jun 27 22:15:09.284: word 8: 0x00000000 *Jun 27 22:15:09.284: Command Indication: *Jun 27 22:15:09.284: word 0: 0x00000000 *Jun 27 22:15:09.284: word 1: 0x01042110 *Jun 27 22:15:09.284: word 2: 0x01050000 *Jun 27 22:15:09.284: word 3: 0x0000003B *Jun 27 22:15:09.284: ACK received = 200 usecs *Jun 27 22:15:09.284: Command Sent: *Jun 27 22:15:09.284: word 0: 0x01050480 *Jun 27 22:15:09.284: word 1: 0x00011010 *Jun 27 22:15:09.284: word 2: 0x02000000 *Jun 27 22:15:09.284: word 3: 0x00010003 *Jun 27 22:15:09.284: word 4: 0x00200020 *Jun 27 22:15:09.284: word 5: 0x64B30000 *Jun 27 22:15:09.284: word 6: 0x10C00000 *Jun 27 22:15:09.284: word 7: 0x86850000 *Jun 27 22:15:09.284: word 8: 0x00010040 *Jun 27 22:15:09.284: word 9: 0x00000000 *Jun 27 22:15:09.284: Command Indication: *Jun 27 22:15:09.284: word 0: 0x00010000 *Jun 27 22:15:09.284: word 1: 0x00011110 *Jun 27 22:15:09.284: word 2: 0x02000000 *Jun 27 22:15:09.284: word 3: 0x0001003D *Jun 27 22:15:09.284: ACK received = 200 usecs
DB-160
December 2010
Description Date or time stamp for the command dialog. Hexadecimal representation of the n-word command sent to the SAR (under Command Sent:) and the four-word acknowledgment returned by the SAR (under Command Indication:). Time (in microseconds) between sending the command to the SAR and receiving the acknowledgment.
ACK received
The second example illustrates the output from the debug atm t3e3 trace command run in conjunction with the debug atm t3e3 sar command. In this example, each command sent to the SAR is displayed by the debug atm t3e3 sar command. Then the hexadecimal representation of the command and its acknowledgement are displayed by the debug atm t3e3 trace command.
Router# debug atm t3e3 trace SAR CMD/ACK debugging is on Router# debug atm t3e3 sar SAR debugging is on Router# configure terminal Router(config)# interface atm 2/0 router(config-if)# pvc 2/2 Router(config-if-atm-vc)# exit Router(config-if)# *Jun 27 22:15:09.284: ATM2/0: Setup_VC: vc:4 vpi:2 vci:2 *Jun 27 22:15:09.284: ATM2/0: Open_Channel(RSY): CH (1), VPI (2), VCI (2) *Jun 27 22:15:09.284: Command Sent: *Jun 27 22:15:09.284: word 0: 0x00000480 *Jun 27 22:15:09.284: word 1: 0x00012010 *Jun 27 22:15:09.284: word 2: 0x00000000 *Jun 27 22:15:09.284: word 3: 0x00000000 *Jun 27 22:15:09.284: word 4: 0x00200020 *Jun 27 22:15:09.284: word 5: 0x00000000 *Jun 27 22:15:09.284: word 6: 0x00000000 *Jun 27 22:15:09.284: word 7: 0x00000000 *Jun 27 22:15:09.284: word 8: 0x00000000 *Jun 27 22:15:09.284: Command Indication: *Jun 27 22:15:09.284: word 0: 0x00000000 *Jun 27 22:15:09.284: word 1: 0x01042110 *Jun 27 22:15:09.284: word 2: 0x01050000 *Jun 27 22:15:09.284: word 3: 0x0000003B *Jun 27 22:15:09.284: ACK received = 200 usecs *Jun 27 22:15:09.284: ATM2/0: HI/LO watermarks: 526/263; PeakRate: 149760 *Jun 27 22:15:09.284: ATM2/0: Open_Channel(SEG): CH (1), VPI (2), VCI (2) *Jun 27 22:15:09.284: Command Sent: *Jun 27 22:15:09.284: word 0: 0x01050480 *Jun 27 22:15:09.284: word 1: 0x00011010 *Jun 27 22:15:09.284: word 2: 0x02000000 *Jun 27 22:15:09.284: word 3: 0x00010003 *Jun 27 22:15:09.284: word 4: 0x00200020 *Jun 27 22:15:09.284: word 5: 0x64B30000 *Jun 27 22:15:09.284: word 6: 0x10C00000 *Jun 27 22:15:09.284: word 7: 0x86850000
DB-161
27 27 27 27 27 27 27 27 27
22:15:09.284: word 8: 0x00010040 22:15:09.284: word 9: 0x00000000 22:15:09.284: Command Indication: 22:15:09.284: word 0: 0x00010000 22:15:09.284: word 1: 0x00011110 22:15:09.284: word 2: 0x02000000 22:15:09.284: word 3: 0x0001003D 22:15:09.284: ACK received = 200 usecs 22:15:09.284: ATM2/0: Setup_Cos: vc:4 wred_name:- max_q:0
DB-162
December 2010
debug audit
To display debug messages for the audit subsystem, use the debug audit command in privileged EXEC mode. To disable debugging for the audit subsystem, use the no form of this command. debug audit no debug audit
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This feature was integrated into Cisco IOS Release 12.0(27)S. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Audit files allow you to track changes that have been made to your router. Each change is logged as a syslog message, and all syslog messages are kept in the audit file, which is kept in the audit subsystem.
Examples
The following example is sample output from the debug audit command:
Router# debug audit *Sep 14 18:37:31.535:disk0:/forensics.log -> File not found *Sep 14 18:37:31.535:%AUDIT-1-RUN_VERSION:Hash: 24D98B13B87D106E7E6A7E5D1B3CE0AD User: *Sep 14 18:37:31.583:%AUDIT-1-RUN_CONFIG:Hash: 4AC2D776AA6FCA8FD7653CEB8969B695 User: *Sep 14 18:37:31.587:Audit:Trying to hash nvram:startup-config *Sep 14 18:37:31.587:Audit:nvram:startup-config Done. *Sep 14 18:37:31.587:Audit:Trying to hash nvram:private-config *Sep 14 18:37:31.591:Audit:nvram:private-config Done. *Sep 14 18:37:31.591:Audit:Trying to hash nvram:underlying-config *Sep 14 18:37:31.591:Audit:nvram:underlying-config Done. *Sep 14 18:37:31.591:Audit:Trying to hash nvram:persistent-data *Sep 14 18:37:31.591:Audit:nvram:persistent-data Done. *Sep 14 18:37:31.595:Audit:Trying to hash nvram:ifIndex-table *Sep 14 18:37:31.595:Audit:Skipping nvram:ifIndex-table *Sep 14 18:37:31.595:%AUDIT-1-STARTUP_CONFIG:Hash: 95DD497B1BB61AB33A629124CBFEC0FC User: *Sep 14 18:37:31.595:Audit:Trying to hash filesystem disk0:
DB-163
*Sep 14 18:37:31.775:Audit:Trying to hash attributes of disk0:c7200-p-mz.120-23.S *Sep 14 18:37:32.103:Audit:disk0:c7200-p-mz.120-23.S DONE *Sep 14 18:37:32.103:Audit:disk0:DONE *Sep 14 18:37:32.103:Audit:Trying to hash filesystem bootflash: *Sep 14 18:37:32.103:Audit:Trying to hash attributes of bootflash:c7200-kboot-mz.121-8a.E *Sep 14 18:37:32.107:Audit:bootflash:c7200-kboot-mz.121-8a.E DONE *Sep 14 18:37:32.107:Audit:Trying to hash attributes of bootflash:crashinfo_20030115-182547 *Sep 14 18:37:32.107:Audit:bootflash:crashinfo_20030115-182547 DONE *Sep 14 18:37:32.107:Audit:Trying to hash attributes of bootflash:crashinfo_20030115-212157 *Sep 14 18:37:32.107:Audit:bootflash:crashinfo_20030115-212157 DONE *Sep 14 18:37:32.107:Audit:Trying to hash attributes of bootflash:crashinfo_20030603-155534 *Sep 14 18:37:32.107:Audit:bootflash:crashinfo_20030603-155534 DONE *Sep 14 18:37:32.107:Audit:bootflash:DONE *Sep 14 18:37:32.107:%AUDIT-1-FILESYSTEM:Hash: 330E7111F2B526F0B850C24ED5774EDE User: *Sep 14 18:37:32.107:Audit:Hashing entitymib entry for 7206VXR chassis, Hw Serial#:28710795, Hw Revision:A *Sep 14 18:37:32.107:Audit:Hashing entitymib entry for NPE 400 Card, Hw Serial#:28710795, Hw Revision:A *Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot *Sep 14 18:37:32.107:Audit:Hashing entitymib entry for I/O Dual FastEthernet Controller *Sep 14 18:37:32.107:Audit:Hashing entitymib entry for i82543 (Livengood) *Sep 14 18:37:32.107:Audit:Hashing entitymib entry for i82543 (Livengood) *Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot *Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot *Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot *Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot *Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot *Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot *Sep 14 18:37:32.107:%AUDIT-1-HARDWARE_CONFIG:Hash: 32F66463DDA802CC9171AF6386663D20 User:
Related Commands
Description Changes the size of the audit file. Changes the time interval that is used for calculating hashes.
DB-164
December 2010
debug authentication
To display debugging information about the Authentication Manager, use the debug authentication command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug authentication {all | errors | events | sync | feature {all | feature-name {all | errors | events}}} no debug authentication {all | errors | events | sync | feature {all | feature-name {all | errors | events}}}
Syntax Description
Displays all debugging information about the Authentication Manager and all features. Displays debugging information about Authentication Manager errors. Displays debugging information about Authentication Manager events. Displays debugging information about Authentication Manager stateful switchovers (SSOs) or In Service Software Upgrades (ISSUs). Displays debugging information about specific features. Valid options are: acct, auth_fail_vlan, auth_policy, critical, dhcp, guest_vlan, mda, switch_sync, vlan_assign, voice, and webauth.
Command Modes
Command History
Release 12.2(33)SXI
Usage Guidelines
Examples
The following example shows sample output from the debug authentication command when the feature and events keywords are configured:
Router# debug authentication feature mda events Auth Manager mda events debugging is on
Related Commands
DB-165
debug auto-config
To enable debugging for autoconfiguration applications, use the debug auto-config command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug auto-config {all | errors | events | parser} no debug auto-config {all | errors | events | parser}
Syntax Description
Displays all autoconfiguration debug trace. Displays autoconfiguration errors. Displays autoconfiguration events. Displays autoconfiguration parser.
Command Default
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Communication Media Module. This command was integrated into Cisco IOS Release 12.3(14)T. This command was integrated into Cisco IOS Release 12.4(3). This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows the debug auto-config command used to enable debugging for autoconfiguration applications and to display autoconfiguration events:
Router# debug auto-config events . . . Feb 8 02:17:31.119: dnld_app_check_state(0x628C8164)... Feb 8 02:17:31.123: dnld_chk_app_handle(0x628C8164) Feb 8 02:17:31.123: dnld_app_check_state: appl = 0x628C8164, state = 0x11 . . .
DB-166
December 2010
Description Identifies the application handle, an auto-generated number for debugging. Displays the state of the application. State values are as follows: 0x11Registered and enabled. 0x1Download application enabled. 0x10Download application registered.
Related Commands
Description Enables autoconfiguration or enters auto-config application configuration mode for the SCCP application. Enables SCCP event debugging. Displays the current status of autoconfiguration applications.
DB-167
debug autoupgrade
To display the debug output of the Cisco IOS Auto-Upgrade Manager (AUM), use the debug autoupgrade command in privileged EXEC mode. To disable debug output, use the no form of this command. debug autoupgrade no debug autoupgrade
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug autoupgrade command when you encounter a problem with AUM and provide the output to TAC. Run the debug autoupgrade command and then run AUM to view the debug messages.
Examples
The following example shows how to enable the debugging of Cisco IOS Auto-Upgrade Manager:
Router# debug autoupgrade Auto Upgrade Manager debugging ON Router# Router# upgrade automatic getversion tftp://10.1.0.1/username/aaa Image not found. Router# Jun 14 14:23:08.251 IST: AUM: Currently running software: flash:c3825-adventerprisek9-mz.CALVIN_AUM_EFT1 Jun 14 14:23:08.251 IST: AUM: Reload type:2 hour:0 min:0 Jun 14 14:23:08.251 IST: AUM: Disk management: 1 Jun 14 14:23:08.251 IST: AUM: Get image tftp://10.1.0.1/username/aaa from local server and upgrade: Jun 14 14:23:08.251 IST: AUM: Extracted image name: aaa Jun 14 14:23:08.339 IST: AUM: get image info: failed to open url Jun 14 14:23:08.339 IST: AUM: get image info: image size unknown
DB-168
December 2010
Related Commands
Description Downloads a Cisco IOS software image directly from www.cisco.com or from a non-Cisco server.
DB-169
Caution
Use caution when enabling this debug command in a live system. It produces significant amounts of output, which could lead to a disruption of service.
Syntax Description
state
Shows information about state transitions. Possible states are as follows: SESS_SET_IDLE: A session-set has been created. SESS_SET_OOS: A session(s) has been added to session-group(s). No ACTIVE notification has been received from Virtual Switch Controller (VSC). SESS_SET_ACTIVE_IS: An ACTIVE notification has been received over one in-service session-group. STANDBY notification has not been received on any available session-group(s). SESS_SET_STNDBY_IS: A STANDBY notification is received, but there is no in-service active session-group available. SESS_SET_FULL_IS: A session-group in-service that has ACTIVE notification and at least one session-group in-service that has STANDBY notification. SESS_SET_SWITCH_OVER: An ACTIVE notification is received on session-group in-service, which had received STANDBY notification.
Provides traces for all packets (protocol data units (PDUs)), application PDUs, and also session-manager messages. All available sessions. A specified session.
Defaults
Command Modes
Privileged EXEC
DB-170
December 2010
Command History
Modification This command was introduced. Support for this command was introduced on the Cisco 7200 series routers. This command was implemented on the Cisco 2600 series, Cisco 3600 series, and Cisco MC3810. This command was implemented on the Cisco AS5350 and Cisco AS5400. This command was implemented on the Cisco AS5850 platform. This command was implemented on Cisco IAD2420 series integrated access devices (IADs). This command is not supported on the access servers in this release. This command was implemented on Cisco AS5350, Cisco AS5400, and Cisco AS5850 platforms. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is output for the debug backhaul-session-manager session all command:
Router# debug backhaul-session-manager session all Router# debug_bsm_command:DEBUG_BSM_SESSION_ALL 23:49:14:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET) 23:49:14:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE 23:49:14:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS 23:49:14:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT 23:49:14:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS 23:49:19:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET) 23:49:19:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE 23:49:19:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS 23:49:19:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT 23:49:19:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS 23:49:24:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET) 23:49:24:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE 23:49:24:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS 23:49:24:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT 23:49:24:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS 23:49:29:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET) 23:49:29:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE 23:49:29:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS 23:49:29:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT
DB-171
23:49:29:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS 23:49:34:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET) 23:49:34:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE 23:49:34:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS 23:49:34:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT 23:49:34:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS 23:49:34:SESSION:XPORT:sig rcvd. session = 33, connid = 0x80BA14EC, sig = 1 (CONN-FAILED) 23:49:34:SESSION:STATE:(33) old-state:OPEN, new-state:CLOSE_WAIT
The following example displays output for the debug backhaul-session-manager session state all command:
Router# debug backhaul-session-manager session state all Router# debug_bsm_command:DEBUG_BSM_SESSION_STATE_ALL 23:50:54:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE 23:50:54:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS 23:50:54:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT 23:50:54:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS
The following example displays output for the debug backhaul-session-manager session xport all command:
Router# debug backhaul-session-manager session xport all Router# debug_bsm_command:DEBUG_BSM_SESSION_XPORT 23:51:39:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET) 23:51:42:SESSION:XPORT:sig rcvd. session = 33, connid = 0x80BA14EC, sig = 5 (CONN-RESET) 23:51:44:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET)
Related Commands
Description Traces state changes and receives messages and events for all available session-sets or a specified session-set.
DB-172
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Support for this command was introduced on the Cisco 7200 series routers. This command was implemented on the Cisco 2600 series, Cisco 3600 series, and Cisco MC3810. This command was implemented on the Cisco AS5350 and Cisco AS5400. This command was implemented on the Cisco AS5850 platform. This command was implemented on Cisco IAD2420 series integrated access devices (IADs). This command is not supported on the access servers in this release. This command was implemented on Cisco AS5350, Cisco AS5400, and Cisco AS5850 platforms. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-173
Examples
The following is output for the debug backhaul-session-manager set command for all available session sets:
Router# debug backhaul-session-manager set all Router# debug_bsm_command:DEBUG_BSM_SET_ALL Function set_proc_event() is called Session-Set :test-set Old State :BSM_SET_OOS New State :BSM_SET_OOS Active-Grp :NONE Session-Grp :g-11 Old State :Group-None New State :Group-None Event rcvd :EVT_GRP_INS BSM:Event BSM_SET_UP is sent to user Session-Set :test-set Old State :BSM_SET_OOS New State :BSM_SET_ACTIVE_IS Active-Grp :g-11 Session-Grp :g-11 Old State :Group-None New State :Group-Active Event rcvd :BSM_ACTIVE_TYPE
The following is output for the debug backhaul-session-manager set name set1 command:
Router# debug backhaul-session-manager set name set1 Router# debug_bsm_command:DEBUG_BSM_SET_NAME Router# Function set_proc_event() is called Session-Set :test-set Old State :BSM_SET_OOS New State :BSM_SET_OOS Active-Grp :NONE Session-Grp :g-11 Old State :Group-None New State :Group-None Event rcvd :EVT_GRP_INS Router#BSM:Event BSM_SET_UP is sent to user Session-Set :test-set Old State :BSM_SET_OOS New State :BSM_SET_ACTIVE_IS Active-Grp :g-11 Session-Grp :g-11 Old State :Group-None New State :Group-Active Event rcvd :BSM_ACTIVE_TYPE
Related Commands
DB-174
December 2010
debug backup
To monitor the transitions of an interface going down then back up, use the debug backup command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug backup no debug backup
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug backup command is useful for monitoring dual X.25 interfaces configured as primary and backup in a Telco data communication network (DCN).
Examples
The following example shows how to start the debug backup command:
Router# debug backup
Related Commands
Description Activates primary and backup lines on specific X.25 interfaces. Displays interface backup status.
DB-175
debug bert
To display information on the bit error rate testing (BERT) feature, use the debug bert command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug bert no debug bert
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug bert command output is used primarily by Cisco technical support representatives. The debug bert command displays debugging messages for specific areas of executed code.
Examples
Related Commands
Description Aborts a bit error rate testing session. Starts a bit error rate test for a particular port on a Cisco AS5300 router. Sets up various bit error rate testing profiles.
DB-176
December 2010
debug bfd
To display debugging messages about Bidirectional Forwarding Detection (BFD), use the debug bfd command in privileged EXEC mode. To disable debugging output, use the no form of this command.
Cisco IOS Release 12.2(18)SXE, 12.4(4)T, and 12.2(33)SRA
debug bfd {event | packet [ip-address]} no debug bfd {event | packet [ip-address]}
Cisco IOS Release 12.0(31)S
debug bfd {event | packet [ip-address] | ipc-error | ipc-event | oir-error | oir-event} no debug bfd {event | packet [ip-address] | ipc-error | ipc-event | oir-error | oir-event}
Syntax Description
(Optional) Displays debugging information about BFD state transitions. (Optional) Displays debugging information about BFD control packets. (Optional) Displays debugging information about BFD only for the specified IP address. (Optional) Displays debugging information with interprocess communication (IPC) errors on the Route Processor (RP) and line card (LC). (Optional) Displays debugging information with IPC events on the RP and LC. (Optional) Displays debugging information with online insertion and removal (OIR) errors on the RP and LC. (Optional) Displays debugging information with OIR events on the RP and LC.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(31)S. This command was integrated into Cisco IOS Release 12.4(4)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-177
Usage Guidelines
The debug bfd command can be used to troubleshoot the BFD feature.
Note
Because BFD is designed to send and receive packets at a very high rate, consider the potential effect on system resources before enabling this command, especially if there are a large number of BFD peers. The debug bfd packet command should be enabled only on a live network at the direction of Cisco Technical Assistance Center personnel.
Examples
The following example shows output from the debug bfd packet command. The IP address has been specified in order to limit the packet information to one interface:
Router# debug bfd packet 172.16.10.5 BFD packet debugging is on *Jan 26 14:47:37.645: Tx*IP: dst 172.16.10.1, plen 24. BFD: diag 2, St/D/P/F (1/0/0/0), mult 5, len 24, loc/rem discr 1 1, tx 1000000, rx 1000000 100000, timer 1000 ms, #103 *Jan 26 14:47:37.645: %OSPF-5-ADJCHG: Process 10, Nbr 172.16.10.12 on Ethernet1/4 from FULL to DOWN, Neighbor Down: BFD node down *Jan 26 14:47:50.685: %OSPF-5-ADJCHG: Process 10, Nbr 172.16.10.12 on Ethernet1/4 from LOADING to FULL, Loading Done *Jan 26 14:48:00.905: Rx IP: src 172.16.10.1, plen 24. BFD: diag 0, St/D/P/F (1/0/0/0), mult 4, len 24, loc/rem discr 2 1, tx 1000000, rx 1000000 100000, timer 4000 ms, #50 *Jan 26 14:48:00.905: Tx IP: dst 172.16.10.1, plen 24. BFD: diag 2, St/D/P/F (2/0/0/0), mult 5, len 24, loc/rem discr 1 2, tx 1000000, rx 1000000 100000, timer 1000 ms, #131 *Jan 26 14:48:00.905: Rx IP: src 172.16.10.1, plen 24. BFD: diag 0, St/D/P/F (3/0/0/0), mult 4, len 24, loc/rem discr 2 1, tx 1000000, rx 1000000 100000, timer 4000 ms, #51 *Jan 26 14:48:00.905: Tx IP: dst 172.16.10.1, plen 24. BFD: diag 0, St/D/P/F (3/0/0/0), mult 5, len 24, loc/rem discr 1 2, tx 1000000, rx 1000000 100000, timer 1000 ms, #132
The following example shows output from the debug bfd event command when an interface between two BFD neighbor routers fails and then comes back online:
Router# debug bfd event 22:53:48: BFD: bfd_neighbor - action:DESTROY, proc:1024, idb:FastEthernet0/1, neighbor:172.16.10.2 22:53:48: BFD: bfd_neighbor - action:DESTROY, proc:512, idb:FastEthernet0/1, neighbor:172.16.10.2 22:53:49: Session [172.16.10.1,172.16.10.2,Fa0/1,1], event DETECT TIMER EXPIRED, state UP -> FAILING . . . 22:56:35: BFD: bfd_neighbor - action:CREATE, proc:1024, idb:FastEthernet0/1, neighbor:172.16.10.2 22:56:37: Session [172.16.10.1,172.16.10.2,Fa0/1,1], event RX IHY 0, state FAILING -> DOWN 22:56:37: Session [172.16.10.1,172.16.10.2,Fa0/1,1], event RX IHY 0, state DOWN -> INIT 22:56:37: Session [172.16.10.1,172.16.10.2,Fa0/1,1], event RX IHY 1, state INIT -> UP
DB-178
December 2010
Field bfd_neighbor action:DESTROY Session [172.16.10.1, 172.16.10.2, Fa0/1,1] event DETECT TIMER EXPIRED state UP -> FAILING Session [172.16.10.1, 172.16.10.2, Fa0/1,1], event RX IHY 0
Description The BFD neighbor will tear down the BFD session. IP addresses of the BFD neighbors holding this session that is carried over FastEthernet interface 0/1. The BFD neighbor has not received BFD control packets within the negotiated interval and the detect timer has expired. The BFD event state is changing from Up to Failing. The BFD session between the neighbors indicated by the IP addresses that is carried over FastEthernet interface 0/1 is changing state from Failing to Down. The I Hear You (IHY) bit value is shown as 0 to indicate that the remote system is tearing down the BFD session. The BFD session is still considered down, and the IHY bit value still is shown as 0, and the session state changes from DOWN to INIT to indicate that the BFD session is again initializing, as the interface comes back up. The BFD session has been reestablished, and the IHY bit value changes to 1 to indicate that the session is live. The BFD session state changes from INIT to UP.
The following example shows output from the debug bfd packet command when an interface between two BFD neighbor routers fails and then comes back online. The diagnostic code changes from 0 (No Diagnostic) to 1 (Control Detection Time Expired) because no BFD control packets could be sent (and therefore detected by the BFD peer) after the interface fails. When the interface comes back online, the diagnostic code changes back to 0 to signify that BFD packets can be sent and received by the BFD peers.
Router# debug bfd packet 23:03:25: Rx IP: src 172.16.10.2, plen 24. BFD: diag 0, H/D/P/F (0/0/0/0), mult 3, len 24, loc/rem discr 5 1, tx 1000000, rx 100007 23:03:25: Tx IP: dst 172.16.10.2, plen 24. BFD: diag 1, H/D/P/F (0/0/0/0), mult 5, len 24, loc/rem discr 1 5, tx 1000000, rx 1000008 23:03:25: Tx IP: dst 172.16.10.2, plen 24. BFD: diag 1, H/D/P/F (1/0/0/0), mult 5, len 24, loc/rem discr 1 5, tx 1000000, rx 1000009
Description The router has received this BFD packet from the BFD router with source address 172.16.10.2. Length of the BFD control packet, in bytes.
DB-179
Table 37
Field diag 0
Description A diagnostic code specifying the local systems reason for the last transition of the session from Up to some other state. State values are as follows:
0No Diagnostic 1Control Detection Time Expired 2Echo Function Failed 3Neighbor Signaled Session Down 4Forwarding Plane Reset 5Path Down 6Concentrated Path Down 7Administratively Down
H/D/P/F (0/0/0/0)
H bitHear You bit. This bit is set to 0 if the transmitting system either is not receiving BFD packets from the remote system or is tearing down the BFD session. During normal operation the I Hear You bit is set to 1. D bitDemand Mode bit. If the Demand Mode bit set, the transmitting system wants to operate in demand mode. BFS has two modesasynchronous and demand. The Cisco implementation of BFD supports only asynchronous mode. P bitPoll bit. If the Poll bit is set, the transmitting system is requesting verification of connectivity or of a parameter change. F bitFinal bit. If the Final bit is set, the transmitting system is responding to a received BFC control packet that had a Poll (P) bit set.
mult 3
Detect time multiplier. The negotiated transmit interval, multiplied by the detect time multiplier, determines the detection time for the transmitting system in BFD asynchronous mode. The detect time multiplier is similar to the hello multiplier in IS-IS, which is used to determine the holdtimer: (hellointerval) * (hellomultiplier) = holdtimer. If a hello packet is not received within the hold-timer interval, a failure has occurred. Similarly, for BFD: (transmit interval) * (detect multiplier) = detect timer. If a BFD control packet is not received from the remote system within the detect-timer interval, a failure has occurred.
len 24
DB-180
December 2010
Table 37
Description The values for My Discriminator (local) and Your Discriminator (remote) BFD neighbors.
My DiscriminatorUnique, nonzero discriminator value generated by the transmitting system, used to demultiplex multiple BFD sessions between the same pair of systems. Your DiscriminatorThe discriminator received from the corresponding remote system. This field reflects the received value of My Discriminator, or is zero if that value is unknown.
tx 1000000 rx 100007
DB-181
Syntax Description
Specifies IPv6 unicast address prefixes. Specifies IPv6 multicast address prefixes. (Optional) Name of an IPv6 prefix list.
Command Default
Command Modes
Privileged EXEC
Command History
Release 12.2(2)T 12.0(21)ST 12.0(22)S 12.2(13)T 12.0(24)S 12.2(14)S 12.2(28)SB 12.2(25)SG 12.2(33)SRA 12.2(33)SXH 12.2SX
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. The prefix-list keyword was added. The prefix-list keyword was added. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug bgp ipv6 dampening command is similar to the debug ip bgp dampening command, except that it is IPv6-specific. Use the prefix-list keyword and an argument to filter BGP IPv6 dampening debug information through an IPv6 prefix list.
DB-182
December 2010
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debugging output, use the logging command options within global configuration mode. Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server.
Examples
The following is sample output from the debug bgp ipv6 dampening command:
Router# debug bgp ipv6 dampening 00:13:28:BGP(1):charge penalty for 2000:0:0:1::/64 path 2 1 reuse/suppress 750/2000 00:13:28:BGP(1):flapped 1 times since 00:00:00. New penalty 00:13:28:BGP(1):charge penalty for 2000:0:0:1:1::/80 path 2 reuse/suppress 750/2000 00:13:28:BGP(1):flapped 1 times since 00:00:00. New penalty 00:13:28:BGP(1):charge penalty for 2000:0:0:5::/64 path 2 1 reuse/suppress 750/2000 00:13:28:BGP(1):flapped 1 times since 00:00:00. New penalty 00:16:03:BGP(1):charge penalty for 2000:0:0:1::/64 path 2 1 reuse/suppress 750/2000 00:16:03:BGP(1):flapped 2 times since 00:02:35. New penalty with halflife-time 15 is 1000 1 with halflife-time 15 is 1000 with halflife-time 15 is 1000 with halflife-time 15 is 1892
00:18:28:BGP(1):suppress 2000:0:0:1:1::/80 path 2 1 for 00:27:30 (penalty 2671) 00:18:28:halflife-time 15, reuse/suppress 750/2000 00:18:28:BGP(1):suppress 2000:0:0:1::/64 path 2 1 for 00:27:20 (penalty 2664) 00:18:28:halflife-time 15, reuse/suppress 750/2000
The following example shows output for the debug bgp ipv6 dampening command filtered through the prefix list named marketing:
Router# debug bgp ipv6 dampening prefix-list marketing 00:16:08:BGP(1):charge penalty for 2001:0DB8::/64 path 30 with halflife-time 15 reuse/suppress 750/2000 00:16:08:BGP(1):flapped 1 times since 00:00:00. New penalty is 10
Field penalty
Description Numerical value of 1000 assigned to a route by a router configured for route dampening in another autonomous system each time a route flaps. Penalties are cumulative. The penalty for the route is stored in the BGP routing table until the penalty exceeds the suppress limit. If the penalty exceeds the suppress limit, the route state changes from history to damp. Number of times a route is available, then unavailable, or vice versa. Amount of time (in minutes) by which the penalty is decreased after the route is assigned a penalty. The halflife-time value is half of the half-life period (which is 15 minutes by default). Penalty reduction happens every 5 seconds.
flapped halflife-time
DB-183
Table 38
Field reuse
Description The limit by which a route is unsuppressed. If the penalty for a flapping route decreases and falls below this reuse limit, the route is unsuppressed. That is, the route is added back to the BGP table and once again used for forwarding. The default reuse limit is 750. Routes are unsuppressed at 10-second increments. Every 10 seconds, the router determines which routes are now unsuppressed and advertises them to the world. Limit by which a route is suppressed. If the penalty exceeds this limit, the route is suppressed. The default value is 2000.
suppress
maximum suppress limit Maximum amount of time (in minutes) a route is suppressed. The (not shown in sample output) default value is four times the half-life period. damp state State in which the route has flapped so often that the router will not (not shown in sample output) advertise this route to BGP neighbors.
Related Commands
DB-184
December 2010
Syntax Description
Specifies IPv6 unicast address prefixes. Specifies IPv6 multicast address prefixes. (Optional) The IPv6 address of a BGP neighbor. This argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons.
(Optional) Name of an IPv6 prefix list. (Optional) Indicates inbound updates. (Optional) Indicates outbound updates.
Command Default
Command Modes
Privileged EXEC
Command History
Release 12.2(2)T 12.0(21)ST 12.0(22)S 12.2(13)T 12.0(24)S 12.2(14)S 12.2(28)SB 12.2(25)SG 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. The prefix-list keyword was added. The prefix-list keyword was added. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-185
Usage Guidelines
The debug bgp ipv6 updates command is similar to the debug ip bgp updates command, except that it is IPv6-specific. Use the prefix-list keyword to filter BGP IPv6 updates debugging information through an IPv6 prefix list.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debugging output, use the logging command options within global configuration mode. Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. For complete information on debug commands and redirecting debugging output, refer to the Release 12.2 Cisco IOS Debug Command Reference.
Examples
The following is sample output from the debug bgp ipv6 updates command:
Router# debug bgp ipv6 updates 14:04:17:BGP(1):2000:0:0:2::2 computing updates, afi 1, neighbor version 0, table version 1, starting at :: 14:04:17:BGP(1):2000:0:0:2::2 update run completed, afi 1, ran for 0ms, neighbor version 0, start version 1, throttled to 1 14:04:19:BGP(1):sourced route for 2000:0:0:2::1/64 path #0 changed (weight 32768) 14:04:19:BGP(1):2000:0:0:2::1/64 route sourced locally 14:04:19:BGP(1):2000:0:0:2:1::/80 route sourced locally 14:04:19:BGP(1):2000:0:0:3::2/64 route sourced locally 14:04:19:BGP(1):2000:0:0:4::2/64 route sourced locally 14:04:22:BGP(1):2000:0:0:2::2 computing updates, afi 1, neighbor version 1, table version 6, starting at :: 14:04:22:BGP(1):2000:0:0:2::2 send UPDATE (format) 2000:0:0:2::1/64, next 2000:0:0:2::1, metric 0, path 14:04:22:BGP(1):2000:0:0:2::2 send UPDATE (format) 2000:0:0:2:1::/80, next 2000:0:0:2::1, metric 0, path 14:04:22:BGP(1):2000:0:0:2::2 send UPDATE (prepend, chgflags:0x208) 2000:0:0:3::2/64, next 2000:0:0:2::1, metric 0, path 14:04:22:BGP(1):2000:0:0:2::2 send UPDATE (prepend, chgflags:0x208) 2000:0:0:4::2/64, next 2000:0:0:2::1, metric 0, path
The following is sample output from the debug bgp ipv6 updates command filtered through the prefix list named sales:
Router# debug bgp ipv6 updates prefix-list sales 00:18:26:BGP(1):2000:8493:1::2 send UPDATE (prepend, chgflags:0x208) 7878:7878::/64, next 2001:0DB8::36C, metric 0, path
Description BGP debugging for address family index (afi) 1. Address family index. Version of the BGP table on the neighbor from which the update was received.
DB-186
December 2010
Table 39
Description Version of the BGP table on the router from which you entered the debug bgp ipv6 updates command. Starting at the network layer reachability information (NLRI). BGP sends routing update messages containing NLRI to describe a route and how to get there. In this context, an NLRI is a prefix. A BGP update message carries one or more NLRI prefixes and the attributes of a route for the NLRI prefixes; the route attributes include a BGP next hop gateway address, community values, and other information. Indicates that a route is sourced locally and that updates are not sent for the route. Indicates that an update message for a reachable network should be formatted. Addresses include prefix and next hop. Indicates that an update message about a path to a BGP peer should be written.
route sourced locally send UPDATE (format) send UPDATE (prepend, chgflags:0x208)
Related Commands
DB-187
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug bgp nsap command is similar to the debug ip bgp command, except that it is specific to the NSAP address family.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debug output, use the logging command options within global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server.
Examples
The following example shows output for the debug bgp nsap command. The BGP(4) identifies that BGP version 4 is operational.
Router# debug bgp nsap 00:46:46: BGP(4): 00:46:46: BGP(4): 00:46:46: BGP(4): 00:46:46: BGP(4): eBGP-neighbor 00:46:46: BGP(4): eBGP-neighbor 00:46:59: BGP(4): removing removing removing 10.1.2.1 CLNS route to CLNS route to CLNS route to removing CLNS 49.0101 49.0303 49.0404 route 49.0101.1111.1111.1111.1111.00 to
10.2.4.4 removing CLNS route 49.0303.4444.4444.4444.4444.00 to Applying map to find origin for prefix 49.0202.2222
DB-188
December 2010
Related Commands
Description Displays debug messages for BGP NSAP prefix dampening events. Displays debug messages for BGP NSAP prefix update packets.
DB-189
Syntax Description
filter-list access-list-number
(Optional) Displays debug messages for BGP NSAP dampening events that match the access list. The acceptable access list number range is from 1 to 199.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug bgp nsap dampening command is similar to the debug ip bgp dampening command, except that it is specific to the NSAP address family.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debug output, use the logging command options within global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server.
Examples
The following example shows output for the debug bgp nsap dampening command:
Router# debug bgp nsap dampening 16:21:34: BGP(4): Dampening route-map modified.
Only one line of output is displayed unless the bgp dampening command is configured with a route map in NSAP address family configuration mode. The following example shows output for the debug bgp nsap dampening command when a route map is configured:
DB-190
December 2010
20:07:19: BGP(4): charge penalty for 49.0404 path 65202 65404 with halflife-time 15 reuse/suppress 750/2000 20:07:19: BGP(4): flapped 1 times since 00:00:00. New penalty is 1000 20:08:59: BGP(4): charge penalty for 49.0404 path 65202 65404 with halflife-time 15 reuse/suppress 750/2000 20:08:59: BGP(4): flapped 2 times since 00:01:39. New penalty is 1928 20:10:04: BGP(4): charge penalty for 49.0404 path 65202 65404 with halflife-time 15 reuse/suppress 750/2000 20:10:04: BGP(4): flapped 3 times since 00:02:44. New penalty is 2839 20:10:48: BGP(4): suppress 49.0404 path 65202 65404 for 00:28:10 (penalty 2752) 20:10:48: halflife-time 15, reuse/suppress 750/2000
Field penalty
Description Numerical value of 1000 assigned to a route by a router configured for route dampening in another autonomous system each time a route flaps. Penalties are cumulative. The penalty for the route is stored in the BGP routing table until the penalty exceeds the suppress limit. If the penalty exceeds the suppress limit, the route state changes from history to damp. Amount by which the penalty is decreased after the route is assigned a penalty. The half-life-time value is half of the half-life period (which is 15 minutes by default). Penalty reduction occurs every 5 seconds. Number of times a route is available, then unavailable, or vice versa. The limit by which a route is unsuppressed. If the penalty for a flapping route decreases and falls below this reuse limit, the route is unsuppressed. That is, the route is added back to the BGP table and once again used for forwarding. The default reuse limit is 750. Unsuppressing of routes occurs at 10-second increments. Every 10 seconds, the router learns which routes are now unsuppressed and advertises them throughout the network. Limit by which a route is suppressed. If the penalty exceeds this limit, the route is suppressed. The default value is 2000.
halflife-time
flapped reuse
suppress
maximum suppress limit Maximum amount of time a route is suppressed. The default value is (not shown in sample output) four times the half-life period. damp state State in which the route has flapped so often that the router will not (not shown in sample output) advertise this route to BGP neighbors.
Related Commands
Description Displays debug messages for BGP NSAP packets. Displays debug messages for BGP NSAP update events.
DB-191
Syntax Description
(Optional) The IP address of a BGP neighbor. (Optional) Indicates inbound updates. (Optional) Indicates outbound updates. (Optional) Name of a Connectionless Network Service (CLNS) filter set.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug bgp nsap updates command is similar to the debug ip bgp updates command, except that it is specific to the NSAP address family. Use the ip-address argument to display the BGP update debug messages for a specific BGP neighbor. Use the clns-filter-set-name argument to display the BGP update debug messages for a specific NSAP prefix.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debug output, use the logging command options within global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server.
Examples
The following example shows output for the debug bgp nsap updates command:
Router# debug bgp nsap updates
DB-192
December 2010
02:13:45: BGP(4): 10.0.3.4 send 49.0303.3333.3333.3333.3333.00, 02:13:45: BGP(4): 10.0.3.4 send 49.0303.3333.3333.3333.3333.00, 02:13:45: BGP(4): 10.0.3.4 send 49.0303.3333.3333.3333.3333.00, 02:13:45: BGP(4): 10.0.2.2 send 49.0303.3333.3333.3333.3333.00,
(format) 49.0101, next 0, path 65202 65101 (format) 49.0202, next 0, path 65202 (format) 49.0303, next 0, path (format) 49.0404, next 0, path 65404
Field BGP(4): route sourced locally (not shown in display) send UPDATE (format) rcv UPDATE (not shown in display)
Description BGP debug for address family index (afi) 4. Indicates that a route is sourced locally and that updates are not sent for the route. Indicates that an update message for a reachable network should be formatted. Addresses include NSAP prefix and next hop. Indicates that an update message about a path to a BGP peer has been received. Addresses include NSAP prefix.
Related Commands
Description Displays debug messages for BGP NSAP packets. Displays debug messages for BGP NSAP prefix dampening events.
DB-193
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug bgp vpnv6 unicast command to help troubleshoot the BGP VPN.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debugging output, use the logging command options within global configuration mode. Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. For complete information on debug commands and redirecting debugging output, refer to the Cisco IOS Debug Command Reference, Release 12.4.
Examples
The following example enables BGP debugging output for IPv6 VPN instances:
Router# debug bgp vpnv6 unicast
DB-194
December 2010
debug bri-interface
To display debugging information on ISDN BRI routing activity, use the debug bri-interface command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug bri-interface no debug bri-interface
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug bri-interface command indicates whether the ISDN code is enabling and disabling the B channels when attempting an outgoing call. This command is available for the low-end router products that have a multi-BRI network interface module installed.
Caution
Because the debug bri-interface command generates a substantial amount of output, use it only when traffic on the IP network is low, so other activity on the system is not adversely affected.
Examples
%LINK-3-UPDOWN: Interface BRI0: B-Channel 1, changed state to up %LINK-5-CHANGED: Interface BRI0: B-Channel 1, changed state to up.!!! BRI: disable channel B1 BRI: write_sid: wrote 15 for subunit 0, slot 1.
DB-195
%LINK-3-UPDOWN: Interface BRI0: B-Channel 1, changed state to down %LINK-5-CHANGED: Interface BRI0: B-Channel 1, changed state to down %LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0: B-Channel 1, changed state to down
The following line indicates that an internal command was written to the interface controller. The subunit identifies the first interface in the slot.
BRI: write_sid: wrote 1B for subunit 0, slot 1.
The following line indicates that the power-up timer was started for the named unit:
BRI: Starting Power Up timer for unit = 0.
The following lines indicate that the channel or the protocol on the interface changed state:
%LINK-3-UPDOWN: Interface BRI0: B-Channel 1, changed state to up %LINK-5-CHANGED: Interface BRI0: B-Channel 1, changed state to up.!!! %LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0: B-Channel 1, changed state to down
Lines of output not described are for use by support staff only.
Related Commands
Command debug isdn event debug isdn q921 debug isdn q931
Description Displays ISDN events occurring on the user side (on the router) of the ISDN interface. Displays data link-layer (Layer 2) access procedures that are taking place at the router on the D channel (LSPD). Displays information about call setup and teardown of ISDN network connections (Layer 3) between the local router (user side) and the network.
DB-196
December 2010
Syntax Description
number
Command Modes
Privileged EXEC
Usage Guidelines
This command traces all interfaces configured with a bsc protocol-group number command.
Examples
The following is sample output from the debug bsc event command:
Router# debug bsc event BSC: Serial2 POLLEE-FSM inp:E_LineFail old_st:CU_Down new_st:TCU_EOFile BSC: Serial2 POLLEE-FSM inp:E_LineFail old_st:CU_Down new_st:TCU_EOFile BSC: Serial2 POLLEE-FSM inp:E_LineFail old_st:CU_Down new_st:TCU_EOFile 0:04:32: BSC: Serial2 :SDI-rx: 9 bytes BSC: Serial2 POLLEE-FSM inp:E_RxEtx old_st:CU_Down new_st:TCU_EOFile 0:04:32: BSC: Serial2 :SDI-rx: 5 bytes BSC: Serial2 POLLEE-FSM inp:E_RxEnq old_st:CU_Down new_st:TCU_EOFile BSC: Serial2 POLLEE-FSM inp:E_Timeout old_st:CU_Down new_st:TCU_InFile BSC: Serial2 POLLEE-FSM inp:E_Timeout old_st:CU_Idle new_st:TCU_InFile %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2, changed state to up %LINK-3-UPDOWN: Interface Serial2, changed state to up BSC: Serial2 POLLEE-FSM inp:E_Timeout old_st:CU_Idle new_st:TCU_InFile 0:04:35: BSC: Serial2 :SDI-rx: 9 bytes BSC: Serial2 POLLEE-FSM inp:E_RxEtx old_st:CU_Idle new_st:TCU_InFile 0:04:35: BSC: Serial2 :SDI-rx: 5 bytes BSC: Serial2 POLLEE-FSM inp:E_RxEnq old_st:CU_Idle new_st:TCU_InFile 0:04:35: BSC: Serial2 :NDI-rx: 3 bytes
Related Commands
Description Displays all frames traveling through the Bisync feature. Displays BSTUN connection events and status.
DB-197
Syntax Description
(Optional) Group number. (Optional) Number of bytes displayed per packet (defaults to 20).
Defaults
Command Modes
Privileged EXEC
Usage Guidelines
This command traces all interfaces configured with a bsc protocol-group number command.
Examples
The following is sample output from the debug bsc packet command:
Router# debug bsc packet 0:23:33: 0:23:33: 0:23:33: 0:23:33: 0:23:33: 0:23:33: BSC: BSC: BSC: BSC: BSC: BSC: Serial2 Serial2 Serial2 Serial2 Serial2 Serial2 :NDI-rx :SDI-tx :SDI-rx :SDI-tx :SDI-rx :SDI-tx : : : : : : 27 bytes 401A400227F5C31140C11D60C8C5D3D3D51D4013 12 bytes 00323237FF3232606040402D 2 bytes 1070 27 bytes 401A400227F5C31140C11D60C8C5D3D3D51D4013 2 bytes 1061 5 bytes 00323237FF
Related Commands
Description Displays all events occurring in the Bisync feature. Displays BSTUN connection events and status.
DB-198
December 2010
Syntax Description
number
Command Modes
Privileged EXEC
Usage Guidelines
When you enable the debug bstun events command, messages showing connection establishment and other overall status messages are displayed. You can use the debug bstun events command to assist you in determining whether the BSTUN peers are configured correctly and are communicating. For example, if you enable the debug bstun packet command and you do not see any packets, you may want to enable event debugging.
Note
Also refer to the debug bsc packet and debug bsc event commands. Currently, these two commands support the only protocol working through the BSTUN tunnel. Sometimes frames do not go through the tunnel because they have been discarded at the Bisync protocol level.
Examples
The following is sample output from the debug bstun events command of keepalive messages working correctly. If the routers are configured correctly, at least one router will show reply messages.
Router# debug bstun events BSTUN: Received Version Reply opcode from (all[2])_172.16.12.2/1976 at 1360 BSTUN: Received Version Request opcode from (all[2])_172.16.12.2/1976 at 1379 BSTUN: Received Version Reply opcode from (all[2])_172.16.12.2/1976 at 1390
Note
In a scenario where there is constantly loaded bidirectional traffic, you might not see keepalive messages because they are sent only when the remote end has been silent for the keepalive period. The following is sample output from the debug bstun events output of an event trace in which the wrong TCP address has been specified for the remote peer. These are non-keepalive related messages.
Router# debug bstun events BSTUN: Change state for peer (C1[1])172.16.12.22/1976 (closed->opening) BSTUN: Change state for peer (C1[1])172.16.12.22/1976 (opening->open wait) %BSTUN-6-OPENING: CONN: opening peer (C1[1])172.16.12.22/1976, 3 BSTUN: tcpd sender in wrong state, dropping packet BSTUN: tcpd sender in wrong state, dropping packet BSTUN: tcpd sender in wrong state, dropping packet
DB-199
Related Commands
Command debug bsc event debug bsc packet debug bstun packet
Description Displays all events occurring in the Bisync feature. Displays all frames traveling through the Bisync feature. Displays packet information on packets traveling through the BSTUN links.
DB-200
December 2010
Syntax Description
(Optional) BSTUN group number. (Optional) Number of bytes displayed per packet (defaults to 20).
Defaults
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug bstun packet command:
Router# debug bstun packet BSTUN bsc-local-ack: 0:00:00 Serial2 BSTUN bsc-local-ack: 0:00:00 Serial2 BSTUN bsc-local-ack: 0:00:06 Serial2 SDI: Addr: 40 Data: 02C1C1C1C1C1C1C1C1C1 SDI: Addr: 40 Data: 02C1C1C1C1C1C1C1C1C1 NDI: Addr: 40 Data: 0227F5C31140C11D60C8
Related Commands
DB-201
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to enable the display of error information for a bundle, such as reports of inconsistent mapping in the bundle.
Related Commands
Description Configures the bumping rules for a VC class that can be assigned to a VC bundle. Creates a bundle or modifies an existing bundle to enter bundle configuration mode. Enables display of bundle events when use occurs.
DB-202
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to enable the display of bundle events, such as occurrences of VC bumping, when bundles were brought up, when they were taken down, and so forth.
Related Commands
DB-203
debug callback
To display callback events when the router is using a modem and a chat script to call back on a terminal line, use the debug callback command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug callback no debug callback
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command is useful for debugging chat scripts on PPP and AppleTalk Remote Access Protocol (ARAP) lines that use callback mechanisms. The output provided by the debug callback command shows you how the call is progressing when used with the debug ppp or debug arap commands.
Examples
Related Commands
Description Displays ARAP events. Displays information on traffic and exchanges in an internetwork implementing the PPP.
DB-204
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco AS5850 platform. This command was implemented on the Cisco 7200 series routers. This command was implemented on the Cisco 7500 series routers routers. This command was integrated into Cisco IOS Release 12.2(11)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Every time a call request is received, the debug call fallback detail command displays in the command-line interface (CLI) cache lookup and call acceptance/rejection information. Use this command to monitor call requests as they enter the call fallback subsystem. If you have a large amount of calls in your router, enabling this command can cause delays in your routing functions as the debug statistics are constantly compiled and sent to your terminal. Also, debug messages on your terminal may make for difficult CLI configuring.
Examples
The following example depicts a call coming in to 10.1.1.4 with codec g729r8. Because there is no cache entry for this destination, a probe is sent and values are inserted into the cache. A lookup is performed again, entry is found, and a fallback decision is made to admit the call.
Router# debug call fallback detail When cache is empty: debug call fallback detail: 2d19h:fb_lookup_cache:10.1.1.4, codec:g729r8 2d19h:fb_lookup_cache:No entry found.
DB-205
2d19h:fb_check:no entry exists, enqueueing probe info... 10.1.1.4, codec:g729r8 2d19h:fb_main:Got FB_APP_INQ event 2d19h:fb_main:Dequeued prob info: 10.1.1.4, codec:g729r8 2d19h:fb_lookup_cache:10.1.1.4, codec:g729r8 2d19h:fb_lookup_cache:No entry found. 2d19h:fb_cache_insert:insert:10.1.1.4, codec:g729r8 2d19h:fb_cache_insert:returning entry:10.1.1.4, codec:g729r8 2d19h:fb_initiate_probe:Creating probe... 10.1.1.4, codec:g729r8 2d19h:fb_initiate_probe:Created and started on probe #13, 10.1.1.4, codec:g729r8 2d19h:fb_lookup_cache:10.1.1.4, codec:g729r8 2d19h:fb_lookup_cache:Found entry. 2d19h:fb_check:returned FB_CHECK_TRUE, 10.1.1.4, codec:g729r8 2d19h:fb_main:calling callback function with:TRUE
The following example depicts a call coming in to 10.1.1.4 with codec g729r8. A lookup is performed, entry is found, and a fallback decision is made to admit the call.
Router# debug call fallback detail When cache is full: 2d19h:fb_lookup_cache:10.1.1.4, codec:g729r8 2d19h:fb_lookup_cache:Found entry. 2d19h:fb_check:returned FB_CHECK_TRUE, 10.1.1.4, codec:g729r8 2d19h:fb_main:calling callback function with:TRUE
DB-206
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The call fallback and call fallback reject-cause-code commands were introduced. This command was implemented on the Cisco AS5850 platform. This command was implemented on the Cisco 7200 series routers. This command was implemented on the Cisco 7500 series routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Every time a probe is received, the debug call fallback probe command displays in the command-line interface (CLI) network traffic information collected by the probe. Use this command to monitor the network traffic information the probes carry as they enter the call fallback subsystem and log cache entries. If you have frequent return of probes to your router, enabling this command can cause delays in your routing functions as the debug statistics are constantly compiled and sent to your terminal. Also, debug messages on your terminal may make for difficult CLI configuring.
Examples
The following example depicts a call coming in to 10.1.1.4 and codec type g729r8. Because there is no cache entry for this IP address, a g729r8 probe is initiated. The probe consists of 20 packet returns with an average delay of 43 milliseconds. The jitter out is jitter from source to destination router and jitter in is jitter from destination to source router. The delay, loss, and Calculated Planning Impairment Factor (ICPIF) values following g113_calc_icpif are the instantaneous values, whereas those values following New smoothed values are the values after applying the smoothing with weight 65.
Router# debug call fallback probe 2d19h:fb_initiate_probe:Probe payload is 32
DB-207
2d19h:fb_main:NumOfRTT=20, RTTSum=120, loss=0, delay=43, jitter in=0, jitter out=0-> 10.1.1.4, codec:g729r8 2d19h:g113_calc_icpif(delay (w/codec delay)=43, loss=0, expect_factor=10) Icpif=0 2d19h:fb_main:Probe timer expired, 10.1.1.4, codec:g729r8 2d19h:fb_main:NumOfRTT=20, RTTSum=120, loss=0, delay=43, jitter in=0, jitter out=0-> 10.1.1.4, codec:g729r8 2d19h:g113_calc_icpif(delay (w/codec delay)=43, loss=0, expect_factor=10) Icpif=0 2d19h:fb_main:New smoothed values:inst_weight=65, ICPIF=0, Delay=43, Loss=0 -> 10.1.1.4, codec:g729r8
DB-208
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output from the debug call filter detail command shows the detailed activity of the GCFM, which is the internal module that controls the debug filtering.
Router# debug call filter detail 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: vs the 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: gcfm_call_get_hash_address: hashtable index = 345 gcfm_call_search_hash:no found gcfm_init_call_record: gcfm_init_percall_matchlist: === list 1: service_state=2, callp's: 0 gcfm_call_get_hash_address: hashtable index = 345 gcfm_call_enlist: count before this enlist 0 on 624D6000 gcfm_call_enlist: tail is empty guid=C2E4C789-214A-11D4-804C-000A8A389BA8 gcfm_call_get_hash_address: hashtable index = 345 gcfm_call_search_hash: search requested guid=C2E4C789-214A-11D4-804C-000A8A389BA8 entry guid=C2E4C789-214A-11D4-804C-000A8A389BA8 gcfm_call_search_hash: found gcfm_update_percall_condlist_context: gcfm_update_percall_condlist_context: check cond = 2 gcfm_copy_match_cond: gcfm_update_cond_through_matchlist: gcfm_check_percond_with_matchlist: check match-list 1 gcfm_matchlist_percond_check: gcfm_matchlist_percond_check: check cond=2 gcfm_matchlist_percond_check: compare 42300 to configured 42300 gcfm_check_cond_tel_number: gcfm_check_cond_tel_number: matched
DB-209
5d18h: gcfm_matchlist_percond_check: checked result is 1 5d18h: gcfm_is_bitfield_identical: 5d18h: gcfm_update_cond_through_matchlist: service=1, percallmatchlist tag=1,current_status = 1, service_filter=0 5d18h: gcfm_percall_notify_condition: not linked call record
5d18h: gcfm_call_enlist: tail is empty Shows the global unique identifier (GUID) for the call. guid=C2E4C789-214A-11D4-804C-00 0A8A389BA8 5d18h: Shows which match list is being checked. gcfm_check_percond_with_matchlis t: check match-list 1 5d18h: gcfm_matchlist_percond_check: checked result is 1 Shows that the call matched conditions in match list 1.
Related Commands
Command debug call filter inout debug condition match-list show call filter components
Description Displays the debug trace inside the GCFM. Runs a filtered debug on a voice call. Displays the components used for filtering calls.
DB-210
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output from the debug call filter inout command shows the incoming and outgoing activity of the GCFM, which is the internal module that controls the debug filtering.
Router# debug call filter inout 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: 5d18h: gcfm_generate_guid: component ISDN gets guid gcfm_percall_register: component ISDN gcfm_percall_register: component ISDN return selected=0 gcfm_percall_notify_condition: component ISDN for sync=1 gcfm_percall_notify_condition: component ISDN successfully selected = 0 gcfm_check_percall_status: component TGRM gcfm_check_percall_status: component TGRM return selected=0 gcfm_check_percall_status: component TGRM gcfm_check_percall_status: component TGRM return selected=0 gcfm_percall_register: component VTSP gcfm_percall_register: component VTSP for return selected value 0 gcfm_percall_notify_condition: component VTSP for sync=1 gcfm_percall_notify_condition: component VTSP successfully selected = 0 gcfm_percall_register: component CCAPI gcfm_percall_register: component CCAPI for return selected value 0 gcfm_check_percall_status: component NUMBER-TRANSLATION gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=0 gcfm_percall_register: component VOICE-IVR-V2 gcfm_percall_register: component VOICE-IVR-V2 for return selected value 0 gcfm_check_percall_status: component NUMBER-TRANSLATION gcfm_check_percall_status: component NUMBER-TRANSLATION gcfm_check_percall_status: component DIAL-PEER gcfm_check_percall_status: component DIAL-PEER return selected=0
DB-211
5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION 5d18h: gcfm_check_percall_status: component DIAL-PEER 5d18h: gcfm_check_percall_status: component DIAL-PEER return selected=0 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION 5d18h: gcfm_check_percall_status: component DIAL-PEER 5d18h: gcfm_check_percall_status: component DIAL-PEER return selected=0 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION 5d18h: gcfm_check_percall_status: component DIAL-PEER 5d18h: gcfm_check_percall_status: component DIAL-PEER return selected=0 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION 5d18h: gcfm_check_percall_status: component DIAL-PEER 5d18h: gcfm_check_percall_status: component DIAL-PEER return selected=0 5d18h: gcfm_check_percall_status: component DIAL-PEER 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION 5d18h: gcfm_percall_register: component CCAPI 5d18h: gcfm_percall_register: component CCAPI for return selected value 0 5d18h: gcfm_percall_register: component VOICE-IVR-V2 5d18h: gcfm_percall_register: component VOICE-IVR-V2 for return selected value 0 5d18h: gcfm_percall_notify_condition: component VOICE-IVR-V2 for sync=1 5d18h: gcfm_percall_notify_condition: component VOICERouter#IVR-V2 successfully selected = 1 5d18h: gcfm_percall_register: component H323 5d18h: gcfm_percall_register: component H323 for return selected value 1 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=1 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=1 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=1 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=1 5d18h: gcfm_clear_condition: component VOICE-IVR-V2 5d18h: gcfm_clear_condition: component VOICE-IVR-V2 successfully 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=0 5d18h: gcfm_percall_deregister: component CCAPI 5d18h: gcfm_percall_deregister: component CCAPI successfully 5d18h: gcfm_percall_deregister: component H323 5d18h: gcfm_percall_deregister: component H323 successfully 5d18h: gcfm_percall_deregister: component ISDN 5d18h: gcfm_percall_deregister: component ISDN successfully 5d18h: gcfm_percall_deregister: component VOICE-IVR-V2 5d18h: gcfm_percall_deregister: component VOICE-IVR-V2 successfully 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION 5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=0 5d18h: gcfm_percall_deregister: component CCAPI 5d18h: gcfm_percall_deregister: component CCAPI successfully 5d18h: gcfm_percall_deregister: component VTSP 5d18h: gcfm_percall_deregister: component VTSP successfully 5d18h: gcfm_percall_deregister: component VOICE-IVR-V2 5d18h: gcfm_terminate_track_guid: component VOICE-IVR-V2 terminate, success 5d18h: gcfm_percall_deregister: component VOICE-IVR-V2 successfully
Description Shows that a GUID has been generated. Shows components that have been registered for the call. Shows that a component has been notified of the call.
DB-212
December 2010
Table 43
Description Shows the status of a component of the call. Shows that a component has been registered. Shows that a condition is cleared for a component. Shows that a component has been deregistered. Shows that the router is no longer tracking the GUID.
Related Commands
Command debug call filter detail debug condition match-list show call filter components
Description Displays the details of the debug trace inside the GCFM. Runs a filtered debug on a voice call. Displays the components used for filtering calls.
DB-213
debug call-mgmt
To display debugging information for call accounting, including modem and time slot usage, for active and recent calls, use the debug call-mgmt command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug call-mgmt no debug call-mgmt
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output after the debug call-mgmt command has been enabled:
Router# debug call-mgmt Call Management debugging is on Router# Dec 26 13:57:27.710: msg_to_calls_mgmt: msg type CPM_NEW_CALL_CSM_CONNECT received Dec 26 13:57:27.714: In actv_c_proc_message, access type CPM_INSERT_NEW_CALL, call type CPM_ISDN_ANALOG: CSM completed connecting a new modem call . . . Dec 26 13:57:45.906: msg_to_calls_mgmt: msg type CPM_NEW_CALL_ISDN_CONNECT received Dec 26 13:57:45.906: In actv_c_proc_message, access type CPM_INSERT_NEW_CALL, call type CPM_ISDN_ANALOG: Added a new ISDN analog call to the active-calls list CC-Slot#7, DSX1-Ctrlr#17, DS0-Timeslot#1 Mdm-Slot#1, Mdm-Port#3, TTY#219 . . . Dec 26 13:58:25.682: Call mgmt per minute statistics: active list length: 1
DB-214
December 2010
Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec
history list length: 26 13:58:25.682: 26 13:58:25.682: 26 13:58:25.682: 26 13:58:25.682: 26 13:58:25.682: 26 13:58:25.682: 26 13:58:25.682: 26 13:58:25.682: 26 13:58:25.682: 26 13:58:25.682: 26 13:58:25.682: 26 13:58:25.682: 26 13:58:25.682: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686: 26 13:58:25.686:
3 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0
timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots timeslots
active active active active active active active active active active active active active active active active active active active active active active active active active active active active
at at at at at at at at at at at at at at at at at at at at at at at at at at at at
slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot slot
7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7,
ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr ctrlr
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
Router# clear int as1/03 Dec 26 13:58:26.538: msg_to_calls_mgmt: msg type CPM_VOICE_CALL_REJ_NO_MOD_AVAIL received Dec 26 13:58:26.538: In actv_c_proc_message, access type CPM_REMOVE_DISC_CALL, call type CPM_ISDN_ANALOG: Removed a disconnected ISDN analog call CC-Slot#7, DSX1-Ctrlr#17, DS0-Timeslot#1 Dec 26 13:58:26.538: Mdm-Slot#1, Mdm-Port#3, TTY#219
Field CPM_NEW_CALL_CSM_CONNECT access type CPM_INSERT_NEW_CALL, call type CPM_ISDN_ANALOG: CC-Slot#7, DSX1-Ctrlr#17, DS0-Timeslot#1 Mdm-Slot#1, Mdm-Port#3, TTY#219
Description Indicates the arrival of a new call. Indicates that the new call is an analog ISDN B channel call (either a voice call or a call over an analog modem), rather than a digital (V.110) call. Indicates that the call is connected via the B channel on Serial7/17:1 to the asynchronous modem resource 1/03 (interface async1/03, also known as line tty219).
Dec 26 13:58:25.682: Call mgmt per minute Displays periodic statistics that give the allocation state of each DSX1 interface present in the system, as well as statistics: the number of current (active) and recent (history) calls. active list length: 1 history list length: 3
DB-215
Table 44
Field
Description
Dec 26 13:58:26.538: msg_to_calls_mgmt: Indicates that the analog ISDN B channel call has been disassociated from a modem. msg type CPM_VOICE_CALL_REJ_NO_MOD_ AVAIL received access type CPM_REMOVE_DISC_CALL, call type CPM_ISDN_ANALOG: Removed a disconnected ISDN analog call CC-Slot#7, DSX1-Ctrlr#17, DS0-Timeslot#1 Dec 26 13:58:26.538: Mdm-Slot#1, Mdm-Port#3, TTY#219 Indicates that the call has been disconnected via the B channel on Serial7/17:1 to the asynchronous modem resource 1/03 (interface async1/03, also known as line tty219). Indicates that the analog ISDN B channel call has been disconnected.
DB-216
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(5)T. This command was implemented on the Cisco AS5850. Support for the command was implemented in Cisco AS5850 images. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
It is highly recommended that you log the output from the debug call rsvp-sync events command to a buffer, rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Examples
The following example shows a portion of sample output for a call initiating RSVP when using the debug call rsvp-sync events command:
00:03:25: 00:03:25: Parameters: localip: 10.19.101.117 :localport: 16660 Parameters: remoteip: 10.19.101.116 :remoteport: 17568
00:03:25: QoS Primitive Event for Call id 0x1 : QoS Listen 00:03:25: Lookup to be done on hashkey 0x1 in hash table 0x61FC2498 00:03:25: Hashed entry 0x1 in call table 0x61FC2498 00:03:25: Entry Not found
DB-217
00:03:25: Response Status : 0 Starting timer for call with CallId 0x1 for 10000 secs 00:03:25: 00:03:25: 00:03:25: 00:03:25: Handling QoS Primitive QoS Listen Establishing RSVP RESV state : rsvp_request_reservation() For streams from 10.19.101.116:17568 to 10.19.101.117:16660 RSVP Confirmation required
00:03:25: QoS Primitive Event for Call id 0x1 : QoS Resv 00:03:25: Lookup to be done on hashkey 0x1 in hash table 0x61FC2498 00:03:25: Hashed entry 0x1 in call table 0x61FC2498 00:03:25: 00:03:25: 00:03:25: Initiating RVSP PATH messages to be Sent : reg_invoke_rsvp_advertise_sender() Advertizing for streams to 10.19.101.116:17568 from 10.19.101.117:16660 RESV notification event received is : 2
00:03:25: Received RESVCONFIRM 00:03:25: RESV CONFIRM message received from 10.19.101.116 for RESV setup from 10.19.101.117 00:03:25: RESV event received is : 0
00:03:25: RESV message received from 10.19.101.116:17568 for streams from 10.19.101.117:16660 00:03:25: RESERVATIONS ESTABLISHED : CallId: 1Stop timer and notify Session Protocol of Success (ie. if notification requested) 00:03:25: Invoking spQoSresvCallback with Success
Related Commands
Command call rsvp-sync call rsvp-sync resv-timer debug call rsvp-sync func-trace show call rsvp-sync conf show call rsvp-sync stats
Description Enables synchronization between RSVP and the H.323 voice signaling protocol. Sets the timer for RSVP reservation setup. Displays messages about the software functions called by RSVP synchronization. Displays the RSVP synchronization configuration. Displays statistics for calls that attempted RSVP reservation.
DB-218
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(5)T. This command was implemented on the Cisco AS5850. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
It is highly recommended that you log the output from the debug call rsvp-sync func-trace command to a buffer, rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Examples
The following example shows a portion of sample output for a call initiating RSVP when using the debug call rsvp-sync func-trace command in conjunction with the debug call rsvp-sync events command:
00:03:41: Entering Function QoS_Listen 00:03:41: Parameters:localip:10.10.101.116 :localport:17568 00:03:41:remoteip:10.10.101.117 :remoteport:0 00:03:41: Entering Function qos_dequeue_event 00:03:41: Entering Function process_queue_event 00:03:41: QoS Primitive Event for Call id 0x2 :QoS Listen 00:03:41: Entering Function get_pcb
DB-219
00:03:41: Entering Function hash_tbl_lookup 00:03:41:Lookup to be done on hashkey 0x2 in hash table 0x61FAECD8 00:03:41: Entering Function hash_func 00:03:41:Hashed entry 0x2 in call table 0x61FAECD8 00:03:41:Entry Not found 00:03:41: Entering Function qos_dequeue_pcb 00:03:41: Entering Function qos_initialize_pcb 00:03:41: Parameters:localip:10.10.101.116 00:03:41: remoteip:10.10.101.117
00:03:41: QoSpcb :0x61FAFD18 00:03:41: Response Status :0 00:03:41: Entering Function hash_tbl_insert_entry 00:03:41: Entering Function hash_func 00:03:41: Handling QoS Primitive QoS Listen 00:03:41: Entering Function qos_dequeue_hash_port_entry 00:03:41: Entering Function qos_port_tbl_insert_entry 00:03:41: Entering Function hash_func 00:03:41: Doing RSVP Listen :rsvp_add_ip_listen_api()
Related Commands
Command call rsvp-sync call rsvp-sync resv-timer debug call rsvp-sync events show call rsvp-sync conf show call rsvp-sync stats
Description Enables synchronization between RSVP and the H.323 voice signaling protocol. Sets the timer for RSVP reservation setup. Displays the events that occur during RSVP synchronization. Displays the RSVP synchronization configuration. Displays statistics for calls that attempted RSVP reservation.
DB-220
December 2010
Syntax Description
module
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The command was integrated into Cisco IOS Release 12.2(4)T. Support for the Cisco AS5300, Cisco AS5350, and Cisco AS5400 is not included in this release. This command was implemented on the Cisco AS5850 platform. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on Cisco 7200 series routers. Support for this command was implemented on Cisco AS5850, Cisco AS5800, Cisco AS5300, Cisco AS5350, and Cisco AS5400 series images. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Examples
The following is sample output from the debug call threshold core command: Router# debug call threshold core RSCCAC Core info debugging is on
The following is sample output from the debug call threshold detail command:
Router# debug call threshold detail All RSCCAC info debugging is on
DB-221
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The command was integrated into Cisco IOS Release 12.2(4)T. This command was implemented on the Cisco AS5850 platform. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on Cisco 7200 series routers. Support for this command was implemented on Cisco AS5850, Cisco AS5800, Cisco AS5300, Cisco AS5350, and Cisco AS5400 series images. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Examples
Debug actions are performed on calls by call treatment. The following sample output shows that call treatment is turned on:
Router# debug call treatment action Call treatment action debugging is on
DB-222
December 2010
debug capf-server
To collect debug information about the CAPF server, use the debug capf-server command in privileged EXEC mode. To disable collection of debug information, use the no form of this command. debug capf-server {all | error | events | messages} no debug capf-server
Syntax Description
Collect all CAPF information available. Collect only information about CAPF errors. Collect only information about CAPF status events. Collect only CAPF system messages.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(9)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is used with Cisco Unified CallManager Express phone authentication.
Examples
The following example shows debug messages for the CAPF server.
Router# debug capf-server all 001891: .Jul 21 18:17:07.014: %IPPHONE-6-UNREGISTER_NORMAL: ephone-1:SEP000E325C9A43 IP:10.10.10.194 So cket:3 DeviceType:Phone has unregistered normally. 001892: .Jul 21 18:17:20.495: New Connection from phone, socket 1 001893: .Jul 21 18:17:20.495: Created New Handshake Process 001894: .Jul 21 18:17:20.499: SSL Handshake Error -6983 001895: .Jul 21 18:17:21.499: SSL Handshake Error -6983 001896: .Jul 21 18:17:22.555: SSL Handshake Successful 001897: .Jul 21 18:17:22.555: ephone_capf_send_auth_req: 001898: .Jul 21 18:17:22.555: ephone_capf_ssl_write: 12 bytes 001899: .Jul 21 18:17:22.711: ephone_capf_ssl_read: Read 35 bytes 001900: .Jul 21 18:17:22.711: ephone_capf_handle_phone_msg: msgtype 2 001901: .Jul 21 18:17:22.711: ephone_capf_process_auth_res_msg: SEP000E325C9A43 AuthMode 2 001902: .Jul 21 18:17:22.711: ephone_capf_send_delete_cert_req_msg: SEP000E325C9A43
DB-223
001903: .Jul 21 18:17:22.711: ephone_capf_ssl_write: 8 bytes 001904: .Jul 21 18:17:23.891: ephone_capf_ssl_read: Read 12 bytes 001905: .Jul 21 18:17:23.891: ephone_capf_handle_phone_msg: msgtype 14 001906: .Jul 21 18:17:23.891: certificate delete successful for SEP000E325C9A43 001907: .Jul 21 18:17:24.695: ephone_capf_release_session: SEP000E325C9A43 001908: .Jul 21 18:17:24.695: ephone_capf_send_end_session_msg: SEP000E325C9A43 001909: .Jul 21 18:17:24.695: ephone_capf_ssl_write: 12 bytes 001910: .Jul 21 18:17:25.095: %IPPHONE-6-REG_ALARM: 22: Name=SEP000E325C9A43 Load=7.2(2.0) Last=Rese t-Reset 001911: .Jul 21 18:17:25.099: %IPPHONE-6-REGISTER: ephone-1:SEP000E325C9A43 IP:10.10.10.194 Socket:2 De viceType:Phone has registered. 001912: .Jul 21 18:18:05.171: %IPPHONE-6-UNREGISTER_NORMAL: ephone-1:SEP000E325C9A43 IP:1.1.1.127 So cket:2 DeviceType:Phone has unregistered normally. 001913: .Jul 21 18:18:18.288: New Connection from phone, socket 1 001914: .Jul 21 18:18:18.288: Created New Handshake Process 001915: .Jul 21 18:18:18.292: SSL Handshake Error -6983 001916: .Jul 21 18:18:19.292: SSL Handshake Error -6983 001917: .Jul 21 18:18:20.348: SSL Handshake Successful 001918: .Jul 21 18:18:20.348: ephone_capf_send_auth_req: 001919: .Jul 21 18:18:20.348: ephone_capf_ssl_write: 12 bytes^Z 001920: 001921: 001922: 001923: 1024 001924: 001925: 001926: 001927: 0sh 001928: .Jul .Jul .Jul .Jul .Jul .Jul .Jul .Jul 21 21 21 21 21 21 21 21 18:18:20.492: 18:18:20.492: 18:18:20.492: 18:18:20.492: 18:18:20.492: 18:18:20.540: 18:18:20.540: 18:18:20.540: ephone_capf_ssl_read: Read 35 bytes ephone_capf_handle_phone_msg: msgtype 2 ephone_capf_process_auth_res_msg: SEP000E325C9A43 AuthMode 2 ephone_capf_send_PhKeyGenReq_msg: SEP000E325C9A43 KeySize ephone_capf_ssl_write: 13 bytes ephone_capf_ssl_read: Read 8 bytes ephone_capf_handle_phone_msg: msgtype 17 ephone_capf_process_req_in_progress: SEP000E325C9A43 delay
DB-224
December 2010
debug cas
To debug channel-associated signaling (CAS) messages and to debug the establishment of a time-division multiplexing (TDM) connection between a DS0 and a digital modem, use the debug cas command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug cas slot slot number port port number no debug cas slot slot number port port number
Syntax Description
Slot and slot number. Valid values are 0 and 1. Port and port number. Valid values are 0 and 1.
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for the Cisco AS5200 and AS5300 platforms. This command was integrated into Cisco IOS Release 12.2(2)T and support was added for the Cisco 2600 series and Cisco 3600 series platforms. This command was integrated into Cisco IOS Release 12.3(1) and support was added for the Cisco 2600 XM series, Cisco 2691, and Cisco 3700 series platforms. This command was integrated into Cisco IOS Release 12.3(4)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
When the NM-xCE1T1PRI network module is used with an NM-xDM and a DS0-group is configured under the controller, you can use the debug cas command to debug CAS signaling messages and the establishment of a TDM connection between a DS0 and a digital modem. Use the debug cas command to identify and troubleshoot call connection problems on a T1/E1 interface. With this command, you can trace the complete sequence of incoming and outgoing calls.
Examples
The following shows an example session to enable debugging CAS and generate troubleshooting output:
Router# show debug Router# debug cas slot 1 port 0 CAS debugging is on Router#
DB-225
The following example shows output for the first outgoing call:
Router# p 1.1.1.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 1.1.1.2, timeout is 2 seconds: *Mar 2 00:17:45: dsx1_alloc_cas_channel: channel 0 dsx1_timeslot 1(0/0): TX SEIZURE (ABCD=0001)(0/0): RX SEIZURE_ACK (ABCD=1101)(0/1): RX_IDLE (ABCD=1001)(0/2): RX_IDLE (ABCD=1001)(0/3): RX_IDLE (ABCD=1001)(0/4): RX_IDLE (ABCD=1001)(0/5): RX_IDLE (ABCD=1001)(0/6): RX_IDLE (ABCD=1001)(0/7): RX_IDLE (ABCD=1001)(0/8): RX_IDLE (ABCD=1001)(0/9): RX_IDLE (ABCD=1001)(0/10): RX_IDLE (ABCD=1001)(0/11): RX_IDLE (ABCD=1001)(0/12): RX_IDLE (ABCD=1001)(0/13): RX_IDLE (ABCD=1001)(0/14): RX_IDLE (ABCD=1001)(0/16): RX_IDLE (ABCD=1001)(0/17): RX_IDLE (ABCD=1001)(0/18): RX_IDLE (ABCD=1001)(0/19): RX_IDLE (ABCD=1001)(0/20): RX_IDLE (ABCD=1001)(0/21): RX_IDLE (ABCD=1001).(0/22): RX_IDLE (ABCD=1001)(0/23): RX_IDLE (ABCD=1001)(0/24): RX_IDLE (ABCD=1001)(0/25): RX_IDLE (ABCD=1001)(0/26): RX_IDLE (ABCD=1001)(0/27): RX_IDLE (ABCD=1001)(0/28): RX_IDLE (ABCD=1001)(0/29): RX_IDLE (ABCD=1001)(0/30): RX_IDLE (ABCD=1001)...(0/0): RX ANSWERED (ABCD=0101). Success rate is 0 percent (0/5) Router# *Mar 2 00:18:13.333: %LINK-3-UPDOWN: Interface Async94, changed state to up *Mar 2 00:18:13.333: %DIALER-6-BIND: Interface As94 bound to profile Di1 *Mar 2 00:18:14.577: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async94, changed state to up Router# p 1.1.1.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 1.1.1.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 160/180/236 ms
The following example shows that the call is cleared on the router:
Router# clear int dialer 1 Router# (0/0): TX IDLE (ABCD=1001)(0/0): RX IDLE (ABCD=1001) *Mar 2 00:18:28.617: %LINK-5-CHANGED: Interface Async94, changed state to reset *Mar 2 00:18:28.617: %DIALER-6-UNBIND: Interface As94 unbound from profile Di1 *Mar 2 00:18:29.617: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async94, changed state to down et2-c3745-1# *Mar 2 00:18:33.617: %LINK-3-UPDOWN: Interface Async94, changed state to down
DB-226
December 2010
Router# *Mar 2 00:19:08.841: %LINK-3-UPDOWN: Interface Async93, changed state to up *Mar 2 00:19:08.841: %DIALER-6-BIND: Interface As93 bound to profile Di1 *Mar 2 00:19:10.033: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async93, changed state to up Router# p 1.1.1.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 1.1.1.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 160/167/176 ms
Related Commands
Description Displays information about the types of debugging that are enabled for your router.
DB-227
Syntax Description
Defaults
Debugging for ATM Adaptation Layer type 2 (AAL2) sessions is not enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for the Cisco MC3810 series. This command was integrated in Cisco IOS Release 12.1(2)T. Support for this command was implemented on the Cisco 7200 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command when troubleshooting an AAL2 trunk setup or teardown problem.
Examples
The following example shows sample output from the debug ccaal2 session command for a forced shutdown of a voice port:
Router# debug ccaal2 session CCAAL2 Session debugging is on Router# configure terminal Enter configuration commands, one per line. Router(config)# voice-port 2/0:0 Router(config-voiceport)# shutdown
00:32:45:ccaal2_call_disconnect:peer tag 0 00:32:45:ccaal2_evhandle_call_disconnect:Entered 00:32:45:ccaal2_call_cleanup:freeccb 1, call_disconnected 1 00:32:45:starting incoming timer:Setting accept_incoming to FALSE and 00:32:45:timer 2:(0x622F6270)starts - delay (70000) 00:32:45:ccaal2_call_cleanup:Generating Call record 00:32:45:cause=81 tcause=81 cause_text=unspecified
DB-228
December 2010
00:32:45:ccaal2_call_cleanup:ccb 0x63FF1700, vdbPtr 0x62DFF2E0 freeccb_flag=1, call_disconnected_flag=1 00:32:45:%LINK-3-UPDOWN:Interface recEive and transMit2/0:0(1), changed state to Administrative Shutdown
The following example shows sample output from the debug ccaal2 session command for a trunk setup on a voice port:
Router# debug ccaal2 session Router(config-voiceport)# no shutdown Router(config-voiceport)# 00:35:28:%LINK-3-UPDOWN:Interface recEive and transMit2/0:0(1), changed state to up 00:35:35:ccaal2_call_setup_request:Entered 00:35:35:ccaal2_evhandle_call_setup_request:Entered 00:35:35:ccaal2_initialize_ccb:preferred_codec set(-1)(0) 00:35:35:ccaal2_evhandle_call_setup_request:preferred_codec set(5)(40). VAD is 1 00:35:35:ccaal2_call_setup_trunk:subchannel linking successfulccaal2_receive:xmitFunc is NULL 00:35:35:ccaal2_caps_ind:PeerTag = 49 00:35:35: codec(preferred) = 1, fax_rate = 2, vad = 2 00:35:35: cid = 56, config_bitmask = 258, codec_bytes = 40, signal_type=8 00:35:36:%HTSP-5-UPDOWN:Trunk port(channel) [2/0:0(1)] is up Router(config-voiceport)#
Related Commands
DB-229
Syntax Description
Command Default
No debugging information is generated for the the CCE DP URL Filtering Classification module.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(20)T.
Examples
The following is sample output from the debug cce dp named-db urlfilter command at the time that a URL request to the untrusted domain www.example.com was made:
Router# debug cce dp named-db urlfilter CCE DP Named DB URLF functionality debugging is on Router# *Apr 4 10:38:08.043: CCE* FUNC: cce_dp_named_db_urlf_pkt_classify -- Didn't get token *Apr 4 10:38:08.043: CCE* FUNC: cce_dp_urlf_truncate_url -- Truncating URL upto script before sending to the trend for classification *Apr 4 10:38:08.043: CCE* FUNC: urlf_trend_find_cache_entry -- The host tree in bucket 1248 is empty *Apr 4 10:38:08.043: CCE* FUNC: cce_dp_named_db_urlf_pkt_classify -- Didn't find in cache *Apr 4 10:38:08.051: CCE FUNC: urlf_trend_store_response -- Host node with given domain name not found. *Apr 4 10:38:08.051: CCE FUNC: urlf_trend_store_response -- Create domain type cache entry. *Apr 4 10:38:08.051: CCE FUNC: cache_size_limit_check -- New cache size=73, existing cache size=0, cache size limit=131072000 *Apr 4 10:38:08.051: CCE FUNC: create_domain_cache_entry -- Domain cache entry 0x65EE0ED0 created. *Apr 4 10:38:08.051: CCE FUNC: create_and_insert_domain_cache_entry -*Apr 4 10:38:08.051: Domain cache entry 0x65EE0ED0 created and inserted into host tree with root=0x65EE0ED0, root left=0x0, root right=0x0; new node left=0x0, new node right=0x0 *Apr 4 10:38:08.051: CCE FUNC: cce_dp_named_db_urlf_gen_match_token -- pushing match-info token - class 0xC000000E; filter 45; category 21 *Apr 4 10:38:08.051: CCE FUNC: cce_dp_named_db_urlf_non_pkt_classify -- Class 0x65C5D484 matched *Apr 4 17:38:08.051: %URLF-4-URL_BLOCKED: Access denied URL 'http://www.example.com/', client 1.0.0.118:3056 server 192.168.0.30:8080
DB-230
December 2010
*Apr *Apr
4 10:38:08.055: CCE* FUNC: cce_dp_named_db_urlf_pkt_classify -- Didn't get token 4 10:38:08.055: CCE FUNC: cce_dp_named_db_urlf_pkt_classify -- Didn't get token
DB-231
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for the Cisco 2600 and Cisco 3600 series routers. This command was integrated into Cisco IOS Release 12.0(4)T. This command was first supported on the Cisco MC3810 series. Support for this command was implemented in Cisco MC3810 images. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to display debug information about the various FRF.11 VoFR service provider interface (SPI) functions. Note that this debug command does not display any information regarding the proprietary Cisco switched-VoFR SPI. This debug is useful only when the session protocol is frf11-trunk.
Examples
The following is sample output from the debug ccfrf11 session command:
Router# debug ccfrf11 session INCOMING CALL SETUP (port setup for answer-mode): *Mar 6 18:04:07.693:ccfrf11_process_timers:scb (0x60EB6040) timer (0x60EB6098) expired *Mar 6 18:04:07.693:Setting accept_incoming to TRUE *Mar 6 18:04:11.213:ccfrf11_incoming_request:peer tag 800:callingNumber=+2602100, calledNumber=+3622110 *Mar 6 18:04:11.213:ccfrf11_initialize_ccb:preffered_codec set(-1)(0) *Mar 6 18:04:11.213:ccfrf11_evhandle_incoming_call_setup_request:calling +2602100, called +3622110 Incoming Tag 800 *Mar 6 18:04:11.217:ccfrf11_caps_ind:PeerTag = 800 *Mar 6 18:04:11.217: codec(preferred) = 4, fax_rate = 2, vad = 2 *Mar 6 18:04:11.217: cid = 30, config_bitmask = 0, codec_bytes = 20, signal_type=2 *Mar 6 18:04:11.217: required_bandwidth 8192 *Mar 6 18:04:11.217:ccfrf11_caps_ind:Bandwidth reservation of 8192 bytes succeeded.
DB-232
December 2010
*Mar
6 18:04:11.221:ccfrf11_evhandle_call_connect:Entered
CALL SETUP (MASTER): 5d22h:ccfrf11_call_setup_request:Entered 5d22h:ccfrf11_evhandle_call_setup_request:Entered 5d22h:ccfrf11_initialize_ccb:preffered_codec set(-1)(0) 5d22h:ccfrf11_evhandle_call_setup_request:preffered_codec set(9)(24) 5d22h:ccfrf11_call_setup_trunk:subchannel linking successful 5d22h:ccfrf11_caps_ind:PeerTag = 810 5d22h: codec(preferred) = 512, fax_rate = 2, vad = 2 5d22h: cid = 30, config_bitmask = 1, codec_bytes = 24, signal_type=2 5d22h: required_bandwidth 6500 5d22h:ccfrf11_caps_ind:Bandwidth reservation of 6500 bytes succeeded. CALL TEARDOWN: *Mar 6 18:09:14.805:ccfrf11_call_disconnect:peer tag 0 *Mar 6 18:09:14.805:ccfrf11_evhandle_call_disconnect:Entered *Mar 6 18:09:14.805:ccfrf11_call_cleanup:freeccb 1, call_disconnected 1 *Mar 6 18:09:14.805:ccfrf11_call_cleanup:Setting accept_incoming to FALSE and starting incoming timer *Mar 6 18:09:14.809:timer 2:(0x60EB6098)starts - delay (70000) *Mar 6 18:09:14.809:ccfrf11_call_cleanup:Alive timer stopped *Mar 6 18:09:14.809:timer 1:(0x60F64104) stops *Mar 6 18:09:14.809:ccfrf11_call_cleanup:Generating Call record *Mar 6 18:09:14.809:cause=10 tcause=10 cause_text="normal call clearing." *Mar 6 18:09:14.809:ccfrf11_call_cleanup:Releasing 8192 bytes of reserved bandwidth *Mar 6 18:09:14.809:ccfrf11_call_cleanup:ccb 0x60F6404C, vdbPtr 0x610DB7A4 freeccb_flag=1, call_disconnected_flag=1
Related Commands
Command debug call rsvp-sync events debug ccswvoice vofr-session debug vtsp session
Description Displays the ccswvoice function calls during call setup and teardown. Displays the ccswvoice function calls during call setup and teardown. Displays the first 10 bytes (including header) of selected VoFR subframes for the interface.
DB-233
debug cch323
To provide debugging output for various components within the H.323 subsystem, use the debug cch323 command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug cch323 {all | error | h225 | h245 | nxe | ras | rawmsg | session} no debug cch323
Syntax Description
Enables all debug cch323 commands. Traces errors encountered in the H.323 subsystem and can be used to help troubleshoot problems with H.323 calls. Traces the state transition of the H.225 state machine on the basis of the processed event. Traces the state transition of the H.245 state machine on the basis of the processed events. Displays Annex E events that have been transmitted and received. Traces the state transition of the Registration, Admission, and Status (RAS) state machine on the basis of the processed events. Troubleshoots raw message buffer problems. Traces general H.323 events and can be used to troubleshoot H.323 problems.
Command Modes
Privileged EXEC
Command History
Modification The debug cch323 command and the following keywords were introduced: h225, h245, and ras. The nxe keyword was added. The following keywords were introduced: all, error, rawmsg, and session. The nxe keyword was integrated into Cisco IOS Release 12.2(4)T on all Cisco H.323 platforms. This command does not support the Cisco access server platforms in this release. This command was implemented on the Cisco AS5850. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2(2)XB1 12.2SX
DB-234
December 2010
Usage Guidelines
When used with the debug cch323 command, the all keyword provides debug output for various components within the H.323 subsystem. The debug cch323 command used with the all keyword enables the following debug cch323 commands: error h225 h245 nxe ras rawmsg session Enables a CCH323 Service Provider Interface (SPI) trace. Enables an H225 state machine debugging trace. Enables an H245 state machine debugging trace. Enables an Annex E debugging trace. Enables a RAS state machine debugging trace. Enables a CCH323 RAWMSG debugging trace. Enables a Session debugging trace.
Caution
Using the debug cch323 all command could slow your system and flood the TTY if there is significant call traffic.
The debug cch323 Command with the error Keyword
When used with the debug cch323 command, the error keyword allows you to trace errors encountered in the H.323 subsystem.
Note
There is little or no output from this command when there is a stable H.323 network.
The debug cch323 Command with the h225 Keyword
When used with the debug cch323 command, the h225 keyword allows you to trace the state transition of the H.225 state machine on the basis of the processed event. The definitions of the different states of the H.225 state machine follow:
H225_IDLEThis is the initial state of the H.225 state machine. The H.225 state machine is in this state before issuing a call setup request (for the outbound IP call case) or when ready to receive an incoming IP call. H225_SETUPThis is the call setup state. The state machine changes to this state after sending out a call setup request or after receiving an incoming call indication. H225_ALERTThis is the call alerting state. The state machine changes to this state after sending the alerting message or after receiving an alerting message from the peer. H225_CALLPROCThis is the call proceeding state. H225_ACTIVEThis is the call connected state. In this state, the call is active. The state machine changes to this state after sending the connect message to the peer or after receiving the connect message from the peer. H225_WAIT_FOR_ARQThis is the state in which the H.225 state machine is waiting for the completion of the Admission Request (ARQ) process from the RAS state machine.
DB-235
H225_WAIT_FOR_DRQThis is the state in which the H.225 state machine is waiting for the completion of the Disengage Request (DRQ) process from the RAS state machine. H225_WAIT_FOR_H245This is the state in which the H.225 state machine is waiting for the success or failure from the H.245 state machine. H225_EVENT_NONEThere is no event. H225_EVENT_ALERTThis event instructs the H.225 state machine to send an alert message to the peer. H225_EVENT_ALERT_INDThis event indicates to the H.225 state machine that an alert message arrived from the peer. H225_EVENT_CALLPROCThis event instructs the H.225 state machine to send a call proceeding message to the peer. H225_EVENT_CALLPROC_INDThis event indicates to the H.225 state machine that a call proceeding message has been received from the peer. H225_EVENT_REJECTThis event instructs the H.225 state machine to reject the call setup request from the peer. H225_EVENT_REJECT_INDThis event indicates to the H.225 state machine that a call setup request to the peer has been rejected. H225_EVENT_RELEASEThis event instructs the H.225 state machine to send a release complete message to the peer. H225_EVENT_RELEASE_INDThis event indicates to the H.225 state machine that a release complete message has been received from the peer. H225_EVENT_SETUPThis event instructs the H.225 state machine to send a setup message to the peer. H225_EVENT_SETUP_INDThis event indicates to the H.225 state machine that a setup message has been received from the peer. H225_EVENT_SETUP_CFMThis event instructs the H.225 state machine to send a connect message to the peer. H225_EVENT_SETUP_CFM_INDThis event indicates to the H.225 state machine that a connect message arrived from the peer. H225_EVENT_RAS_SUCCESSThis event indicates to the H.225 state machine that the pending RAS operation succeeded. H225_EVENT_RAS_FAILEDThis event indicates to the H.225 state machine that the pending RAS operation failed. H225_EVENT_H245_SUCCESSThis event indicates to the H.225 state machine that the pending H.245 operation succeeded. H225_EVENT_H245_FAILEDThis event indicates to the H.225 state machine that the pending H.245 operation failed.
The definitions of the different events of the H.225 state machine follow:
DB-236
December 2010
When used with the debug cch323 command, the h245 keyword allows you to trace the state transition of the H.245 state machine on the basis of the processed event. The H.245 state machines include the following three state machines:
Master slave determination (MSD) state machine Capability exchange (CAP) state machine Open logical channel (OLC) state machine H245_MS_NONEThis is the initial state of the MSD state machine. H245_MS_WAITIn this state, an MSD message is sent, and the device is waiting for the reply. H245_MS_DONE The result is in. H245_CAP_NONEThis is the initial state of the CAP state machine. H245_CAP_WAITIn this state, a CAP message is sent, and the device is waiting for the reply. H245_CAP_DONEThe result is in. H245_OLC_NONEThis is the initial state of the OLC state machine. H245_OLC_WAITIn this state, an OLC message is sent, and the device is waiting for the reply. H245_OLC_DONEThe result is in. H245_EVENT_MSDSend MSD message. H245_EVENT_MS_CFMSend MSD acknowledge message. H245_EVENT_MS_REJSend MSD reject message. H245_EVENT_MS_INDReceived MSD message. H245_EVENT_CAPSend CAP message. H245_EVENT_CAP_CFMSend CAP acknowledge message. H245_EVENT_CAP_REJSend CAP reject message. H245_EVENT_CAP_INDReceived CAP message. H245_EVENT_OLCSend OLC message. H245_EVENT_OLC_CFMSend OLC acknowledge message. H245_EVENT_OLC_REJSend OLC reject message. H245_EVENT_OLC_INDReceived OLC message.
When used with the debug cch323 command, the nxe keyword allows you to display the Annex E events that have been transmitted and received.
The debug cch323 Command with the ras Keyword
When used with the debug cch323 command, the ras keyword allows you to trace the state transition of the RAS state machine based on the processed events. RAS operates in two state machines. One global state machine controls the overall RAS operation of the gateway. The other state machine is a per-call state machine that controls the active calls.
DB-237
The definitions of the different states of the RAS state machine follow:
CCH323_RAS_STATE_NONEThis is the initial state of the RAS state machine. CCH323_RAS_STATE_GRQThe state machine is in the Gatekeeper Request (GRQ) state. In this state, the gateway is discovering a gatekeeper. CCH323_RAS_STATE_RRQThe state machine is in the Registration Request (RRQ) state. In this state, the gateway is registering with a gatekeeper. CCH323_RAS_STATE_IDLEThe global state machine is in the idle state. CCH323_RAS_STATE_URQThe state machine is in the Unregistration Request (URQ) state. In this state, the gateway is in the process of unregistering with a gatekeeper. CCH323_RAS_STATE_ARQThe per-call state machine is in the process of admitting a new call. CCH323_RAS_STATE_ACTIVEThe per-call state machine is in the call active state. CCH323_RAS_STATE_DRQThe per-call state machine is in the process of disengaging an active call. CCH323_RAS_EVENT_NONENothing. CCH323_RAS_EVENT_GWUPGateway is coming up. CCH323_RAS_EVENT_GWDWNGateway is going down. CCH323_RAS_EVENT_NEWCALLNew call. CCH323_RAS_EVENT_CALLDISCCall disconnect. CCH323_RAS_EVENT_GCFReceived Gatekeeper Confirmation (GCF). CCH323_RAS_EVENT_GRJReceived Gatekeeper Rejection (GRJ). CCH323_RAS_EVENT_ACFReceived Admission Confirmation (ACF). CCH323_RAS_EVENT_ARJReceived Admission Reject (ARJ). CCH323_RAS_EVENT_SEND_RRQSend Registration Request (RRQ). CCH323_RAS_EVENT_RCFReceived Registration Confirmation (RCF). CCH323_RAS_EVENT_RRJReceived Registration Rejection (RRJ). CCH323_RAS_EVENT_SEND_URQSend Unregistration Request (URQ). CCH323_RAS_EVENT_URQReceived URQ. CCH323_RAS_EVENT_UCFReceived Unregister Confirmation (UCF). CCH323_RAS_EVENT_SEND_UCFSend UCF. CCH323_RAS_EVENT_URJReceived Unregister Reject (URJ). CCH323_RAS_EVENT_BCFReceived Bandwidth Confirm (BCF). CCH323_RAS_EVENT_BRJReceived Bandwidth Rejection (BRJ). CCH323_RAS_EVENT_DRQReceived Disengage Request (DRQ). CCH323_RAS_EVENT_DCFReceived Disengage Confirm (DCF). CCH323_RAS_EVENT_SEND_DCFSend DCF. CCH323_RAS_EVENT_DRJReceived Disengage Reject (DRJ). CCH323_RAS_EVENT_IRQReceived Interrupt Request (IRQ). CCH323_RAS_EVENT_IRRSend Information Request (IRR).
The definitions of the different events of the RAS state machine follow:
DB-238
December 2010
CCH323_RAS_EVENT_TIMEOUTMessage timeout.
When used with the debug cch323 command, the rawmsg keyword allows you to troubleshoot raw message buffer problems.
Caution
Using the debug cch323 command with the rawmsg keyword could slow your system and flood the TTY if there is significant call traffic.
The debug cch323 Command with the session Keyword
Used with the debug cch323 command, the session keyword allows you to trace general H.323 events.
Caution
Using the debug cch323 session command could slow your system and flood the TTY if there is significant call traffic.
Examples
The debug cch323 all command and keyword combination provides output for the following keywords: error, h225, h245, nxe, ras, rawmsg, and session. Examples of output for each keyword follow.
The debug cch323 Command with the error Keyword Example
The following is sample output from a typical debug cch323 error request on a Cisco 3640 router:
Router# debug cch323 error cch323_h225_receiver:received msg of unknown type 5
The following is sample output from a typical debug cch323 h225 request on a Cisco 3640 router:
Router# debug cch323 h225 20:59:17:Set new event H225_EVENT_SETUP 20:59:17:H225 FSM:received event H225_EVENT_SETUP while at state H225_IDLE 20:59:17:Changing from H225_IDLE state to H225_SETUP state 20:59:17:cch323_h225_receiver:received msg of type SETUPCFM_CHOSEN 20:59:17:H225 FSM:received event H225_EVENT_SETUP_CFM_IND while at state H225_SETUP 20:59:17:Changing from H225_SETUP state to H225_ACTIVE state 20:59:17:Set new event H225_EVENT_H245_SUCCESS 20:59:17:H225 FSM:received event H225_EVENT_H245_SUCCESS while at state H225_ACTIVE 20:59:20:Set new event H225_EVENT_RELEASE 20:59:20:H225 FSM:received event H225_EVENT_RELEASE while at state H225_ACTIVE 20:59:20:Changing from H225_ACTIVE state to H225_WAIT_FOR_DRQ state 20:59:20:Set new event H225_EVENT_RAS_SUCCESS 20:59:20:H225 FSM:received event H225_EVENT_RAS_SUCCESS while at state H225_WAIT_FOR_DRQ 20:59:20:Changing from H225_WAIT_FOR_DRQ state to H225_IDLE state
DB-239
Description This event instructs the H.225 state machine to send a setup message to the peer. The initial state of the H.225 state machine. The H.225 state machine is in this state before issuing a call setup request (for the outbound IP call case) or when ready to receive an incoming IP call. The call setup state. The state machine changes to this state after sending out a call setup request or after receiving an incoming call indication. The H225 connect message that has been received from a remote H323 endpoint. This event indicates to the H.225 state machine that a connect message arrived from the peer. The call connected state. In this state, the call is active. The state machine changes to this state after sending the connect message to the peer or after receiving the connect message from the peer. This event indicates to the H.225 state machine that the pending H.245 operation succeeded. This event instructs the H.225 state machine to send a release complete message to the peer. The state in which the H.225 state machine is waiting for the completion of the DRQ process from the RAS state machine. This event indicates to the H.225 state machine that the pending RAS operation succeeded. The finite state machine.
H225_SETUP
The following is sample output from a typical debug cch323 h245 request on a Cisco 3640 router:
Router# debug cch323 h245 20:58:23:Changing to new event H245_EVENT_MSD 20:58:23:H245 MS FSM:received event H245_EVENT_MSD while at state H245_MS_NONE 20:58:23:changing from H245_MS_NONE state to H245_MS_WAIT state 20:58:23:Changing to new event H245_EVENT_CAP 20:58:23:H245 CAP FSM:received event H245_EVENT_CAP while at state H245_CAP_NONE 20:58:23:changing from H245_CAP_NONE state to H245_CAP_WAIT state 20:58:23:cch323_h245_receiver:received msg of type M_H245_MS_DETERMINE_INDICATION 20:58:23:Changing to new event H245_EVENT_MS_IND 20:58:23:H245 MS FSM:received event H245_EVENT_MS_IND while at state H245_MS_WAIT
DB-240
December 2010
20:58:23:cch323_h245_receiver:received msg of type M_H245_CAP_TRANSFER_INDICATION 20:58:23:Changing to new event H245_EVENT_CAP_IND 20:58:23:H245 CAP FSM:received event H245_EVENT_CAP_IND while at state H245_CAP_WAIT 20:58:23:cch323_h245_receiver:received msg of type M_H245_MS_DETERMINE_CONFIRM 20:58:23:Changing to new event H245_EVENT_MS_CFM 20:58:23:H245 MS FSM:received event H245_EVENT_MS_CFM while at state H245_MS_WAIT 20:58:23:changing from H245_MS_WAIT state to H245_MS_DONE state 0:58:23:cch323_h245_receiver:received msg of type M_H245_CAP_TRANSFER_CONFIRM 20:58:23:Changing to new event H245_EVENT_CAP_CFM 20:58:23:H245 CAP FSM:received event H245_EVENT_CAP_CFM while at state H245_CAP_WAIT 20:58:23:changing from H245_CAP_WAIT state to H245_CAP_DONE state 20:58:23:Changing to new event H245_EVENT_OLC 20:58:23:H245 OLC FSM:received event H245_EVENT_OLC while at state H245_OLC_NONE 20:58:23:changing from H245_OLC_NONE state to H245_OLC_WAIT state 20:58:23:cch323_h245_receiver:received msg of type M_H245_UCHAN_ESTABLISH_INDICATION 20:58:23:Changing to new event H245_EVENT_OLC_IND 20:58:23:H245 OLC FSM:received event H245_EVENT_OLC_IND while at state H245_OLC_WAIT 20:58:23:cch323_h245_receiver:received msg of type M_H245_UCHAN_ESTAB_ACK 20:58:23:Changing to new event H245_EVENT_OLC_CFM 20:58:23:H245 OLC FSM:received event H245_EVENT_OLC_CFM while at state H245_OLC_WAIT 20:58:23:changing from H245_OLC_WAIT state to H245_OLC_DONE state
Field H245_EVENT_MSD H245 MS FSM H245_MS_NONE H245_MS_WAIT H245_EVENT_CAP H245 CAP FSM H245_CAP_NONE H245_CAP_WAIT M_H245_MS_DETERMINE _INDICATION H245_EVENT_MS_IND M_H245_CAP_TRANSFER_INDICATION
Description Send MSD event message to the state machine. An H225 master slave determination finite state machine. The initial state of the MSD state machine. In this state, a MSD message is sent, and the device is waiting for the reply. Send CAP event message. This is the H245 terminal CAP finite state machine. The initial state of the CAP state machine. In this state, a CAP message is sent, and the device is waiting for the reply. The MSD message that has been received by an H245 terminal from a remote H323 endpoint. Received MSD event message. A CAP message that has been received by the H245 terminal from an H323 remote endpoint.
DB-241
Table 46
Field H245_EVENT_CAP_IND M_H245_MS_DETERMINE_CONFIRM H245_EVENT_MS_CFM H245_MS_DONE M_H245_CAP_TRANSFER_CONFIRM H245_EVENT_CAP_CFM H245_CAP_DONE H245_EVENT_OLC H245_OLC_NONE H245_OLC_WAIT M_H245_UCHAN_ESTABLISH_INDICATION H245_EVENT_OLC_IND M_H245_UCHAN_ESTAB_ACK H245_EVENT_OLC_CFM H245 OLC FSM H245_EVENT_OLC_CFM H245_OLC_DONE
Description Received CAP event message. A confirmation message that the H245 master slave termination message was sent. Send MSD acknowledge event message. The result is in. An indication to the H245 terminal that the CAP message was sent. Send CAP acknowledge event message. The result is in. Send OLC event message. The initial state of the OLC state machine. In this state, an OLC message is sent, and the device is waiting for the reply. The OLC message received by an H245 terminal from a remote H323 endpoint. Received OLC event message. The OLC message acknowledgment received by an H245 terminal from a remote H323 endpoint. Send OLC acknowledge event message. The OLC finite state machine of the H245 terminal. Send OLC acknowledge event message. The result is in.
DB-242
December 2010
[0xA4D4A02], Port [2517] 00:15:54:nxe_parse_msg_from_remote:Ack sent for Destination IPaddr [0xA4D4A02], Port [2517] 00:15:54:nxe_parse_msg_from_remote:Msg received from IP [0xA4D4A02], Port [2517] 00:15:54:nxe_parse_msg_from_remote:Value of PDU flags = 0x3 00:15:54:nxe_parse_payload:Static msg type, Payload flag = 0xA0 00:15:54:nxe_parse_x_static:Rx H225 msg from IPaddr [0xA4D4A02], Port [2517], CRV [3, direction flag 0]
The following is sample output from a typical debug cch323 ras request on a Cisco 3640 router:
Router# debug cch323 ras 20:58:49:Changing to new event CCH323_RAS_EVENT_SEND_RRQ cch323_run_ras_sm:received event CCH323_RAS_EVENT_SEND_RRQ while at CCH323_RAS_STATE_IDLE state cch323_run_ras_sm:changing to CCH323_RAS_STATE_RRQ state cch323_ras_receiver:received msg of type RCF_CHOSEN cch323_run_ras_sm:received event CCH323_RAS_EVENT_RCF while at CCH323_RAS_STATE_RRQ state cch323_run_ras_sm:changing to CCH323_RAS_STATE_IDLE state 20:58:59:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_NEWCALL while at CCH323_RAS_STATE_IDLE state 20:58:59:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_ARQ cch323_ras_receiver:received msg of type ACF_CHOSEN 20:58:59:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_ACF while at CCH323_RAS_STATE_ARQ state 20:58:59:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_ACTIVE 20:59:02:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_CALLDISC while at CCH323_RAS_STATE_ACTIVE state 20:59:02:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_DRQ cch323_ras_receiver:received msg of type DCF_CHOSEN 20:59:02:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_DCF while at CCH323_RAS_STATE_DRQ state 20:59:02:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_IDLE 20:59:04:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_IRR while at CCH323_RAS_STATE_ACTIVE state 20:59:04:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_ACTIVE
Description Send RRQ event message. The global state machine is in the idle state. The state machine is in the RRQ state. In this state, the gateway is registering with a gatekeeper. A registration confirm message that has been received from a gatekeeper. Received RCF event message. New call event. The per-call state machine is in the process of admitting a new call.
DB-243
Table 47
Description ACF message that has been received from a gatekeeper. Received ACF event message. The per-call state machine is in the call active state. Call disconnect event message. The per-call state machine is in the process of disengaging an active call. The disengage confirm message that has been received from a gatekeeper. Received DCF event message. Send IRR event message.
The following is sample output from a typical debug cch323 rawmsg request on a Cisco 3640 router:
Router# debug cch323 rawmsg 00:32:04:cch323_h225_progress_ind:raw message is 4 bytes:1E 02 81 88 00:32:22:cch323_h225_release_ind:raw message is 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00:32:22:cch323_h225_release_notify:raw message 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 bytes:00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 is 80 bytes:00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Following are two examples of output using the debug cch323 session command and keyword combination. The first example is for a call setup on an originating gateway. The second example is for a call setup on a terminating gateway. The following is sample output from a typical debug cch323 session request for a call setup on an originating gateway:
Router# debug cch323 session 00:33:49:cch323_call_setup:gw_id=1, callID=16 00:33:49:cch323_get_new_ccb:ccb (0x81D12D2C) is in use 00:33:49:cch323_call_setup:inserted ccb cch323_get_peer_info:faxrate[21]proto[2]bitmask[10002]t38_inhibit[0]global_fax[0] 00:33:49:Not using Voice Class Codec 00:33:49:cch323_get_peer_info:preffered_codec set to G729IETF with Bytes = 20 00:33:49:cch323_get_peer_info:peer:81FC0D14, peer->voice_peer_tag:12D, ccb:81D12D2C 00:33:49:Call_setup Playout Mode:0,Init 60, Min 40, Max 200 00:33:49:No account/pin number available 00:33:49:cch323_call_setup_normal:for callID 10
DB-244
December 2010
00:33:49:timer (0x81D130D4)starts - delay (15000) 00:33:49:cch323_ct_main:SOCK 1 Event 0x1 00:33:49:timer(0x81D130D4) stops 00:33:49:Near-end Pref Codecs = G.729 IETF 00:33:49: generic_open_logical_channel:codec is g729 00:33:49:cch323_generic_open_logical_channel:Filling in qosCapability field to 0 00:33:49:timer (0x81D130D4)starts - delay (15000) 00:33:49:cch323_ct_main:SOCK 1 Event 0x1 00:33:49:cch323_ct_main:SOCK 1 Event 0x1 00:33:49: [1]towner_data=0x81D13C88, len=105, msgPtr=0x81D07608 00:33:49:cch323_gw_process_read_socket:received msg for H.225 00:33:49:timer(0x81D130D4) stops 00:33:49:timer (0x81D130D4)starts - delay (180000) 00:33:49:Codec:loc(16), rem(16), Bytes:loc(20), Fwd(20), Rev(20) 00:33:49:cch323_rtp_open_notify: 00:33:50:cch323_ct_main:SOCK 1 Event 0x1 00:33:50: [1]towner_data=0x81D13C88, len=71, msgPtr=0x81F1F2E0 00:33:50:cch323_gw_process_read_socket:received msg for H.225 00:33:50:cch323_caps_ind:cap_modem_proto:0, cap_modem_codec:0, cap_modem_redundancy:0 payload 100 00:33:50:cch323_caps_ind:Load DSP with Negotiated codec(16) g729r8, Bytes=20 00:33:50:cch323_caps_ind:set DSP for dtmf-relay = CC_CAP_DTMF_RELAY_INBAND_VOICE
The following is sample output from a typical debug cch323 session request for a call setup on a terminating gateway:
Router# debug cch323 session 00:23:27:cch323_ct_main:SOCK 0 Event 0x1 00:23:27:cch323_ct_main:SOCK 1 Event 0x1 00:23:27: [1]towner_data=0x81F9CA9C, len=179, msgPtr=0x81D15C6C 00:23:27:cch323_gw_process_read_socket:received msg for H.225 00:23:27:cch323_h225_receiver CCB not existing already 00:23:27:cch323_get_new_ccb:ccb (0x81F90184) is in use 00:23:27:cch323_h225_receiver Got a new CCB for call id -2115467564 00:23:27:cch323_h225_setup_ind 00:23:27:Not using Voice Class Codec 00:23:27:cch323_set_peer:peer:81FB3228, peer->voice_peer_tag:12C, ccb:81F90184 00:23:27:Near-end Pref Codecs = G.729 IETF 00:23:27:Codec:loc(16), rem(16), Bytes:loc(20), Fwd(20), Rev(20) 00:23:27:cch323_build_fastStart_cap_response:Retrieved qosCapability of 0 00:23:27:cch323_build_fastStart_cap_response:In Response Filling in qosCapability field to 0 00:23:27:Not using Voice Class Codec
DB-245
Related Commands
Command clear h323 gateway debug h323-annexg debug voip rawmsg show h323 gateway
Description Clears the H.323 gateway counters. Displays all pertinent AnnexG messages that have been transmitted and received. Displays the raw message owner, length, and pointer. Displays statistics for H.323 gateway messages that have been sent and received and displays the reasons for which H.323 calls have been disconnected.
DB-246
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug cch323 capacity command to track the maximum and current call capacity values in the Registration, Admission, and Status (RAS) Protocol messages and to debug capacity-related problems while sending RAS messages. This command is entered on the gateway to monitor the call capacity of the gatekeeper. The command lists the values for current and maximum call capacity provided by the trunk group capacity resource manager if and when the H.323 Service Provider Interface (SPI) requests the information for all or specific groups of circuits.
Examples
The following is sample output from the debug cch323 capacity command:
Router# debug cch323 capacity Call Capacity Information tracing is enabled 5d00h: 5d00h: 5d00h: 5d00h: cch323_process_carrier_update: Registered = 1,Event = 1,Reason = 1 cch323_process_carrier_update: CarrierId = CARRIERA_NEWENGLAND cch323_fill_crm_CallCapacities: Reason = 1, GroupID = CARRIERA_NEWENGLAND Capacity Details: Maximum Channels in Group: 23 Max. Voice Calls(In) : 23, Max. Voice Calls(Out): 23 Active Voice Calls(In): 5, Active Voice Calls(Out): 7 Max. Voice Calls(to GK): 23, Avail. Voice Calls(to GK): 11
The gatekeeper displays this output when trunk groups are added, deleted, or modified or when circuits in a trunk group are deactivated or activated (similar to ISDN layer 2 down/up).
DB-247
Field Registered
0=Gateway is not registered to the gatekeeper 1=Gateway is registered to the gatekeeper at the time of the change 0=All carriers updated 1=Single carrier updated 0=CURRENT_CAPACITY_UPDATE 1=MAX_CAPACITY_UPDATE 2=BOTH_CAPACITY_UPDATE
Event
Carriers updated:
Reason
CarrierID
The gatekeeper displays this output whenever call capacity information is sent to the gatekeeper.
5d00h: cch323_fill_crm_CallCapacities: Reason = 1, GroupID = CARRIERA_NEWENGLAND 5d00h: Capacity Details: Maximum Channels in Group: 23 Max. Voice Calls(In) : 23, Max. Voice Calls(Out): 23 Active Voice Calls(In): 5, Active Voice Calls(Out): 7 Max. Voice Calls(to GK): 23, Avail. Voice Calls(to GK): 11
Field GroupID Maximum Channels in Group Max. Voice Calls(In) Max. Voice Calls(Out) Active Voice Calls(In) Active Voice Calls(Out)
Description The circuits carrier identification (ID) or trunk group label. Maximum number of physical (or configured) circuits. Maximum number of allowed incoming voice and data calls. Maximum number of allowed outgoing voice and data calls. Current number of active incoming voice and data calls. Current number of active outgoing voice and data calls.
DB-248
December 2010
Table 49
Description Maximum call capacity value to be sent to the gatekeeper in the RAS message. Available call capacity value to be sent to the gatekeeper in the RAS message.
Related Commands
DB-249
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco AS5850. This command was integrated into Cisco IOS Release 12.2(11)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
State Descriptions
The state definitions of the different states of the H.225 state machine are as follows:
H225_IDLEThis is the initial state of the H.225 state machine. The H.225 state machine is in this state before issuing a call setup request (for the outbound IP call case) or ready to receive an incoming IP call. H225_SETUPThis is the call setup state. The state machine transitions to this state after sending out a call setup request, or after the reception of an incoming call indication. H225_ALERTThis is the call alerting state. The state machine transitions to this state after sending the alerting message or after the reception of an alerting message from the peer. H225_CALLPROCThis is the call proceeding state. H225_ACTIVEThis is the Call connected state. In this state, the call is active. The state machine transitions to this state after sending the connect message to the peer or after the reception of the connect message from the peer. H225_WAIT_FOR_ARQThis is the state where the H.225 state machine is waiting for the completion of the ARQ process from the Registration, Admission, and Status Protocol (RAS) state machine.
DB-250
December 2010
H225_WAIT_FOR_DRQThis is the state where the H.225 state machine is waiting for the completion of the DRQ process from the RAS state machine. H225_WAIT_FOR_H245This is the state where the H.225 state machine is waiting for the success or failure from the H.245 state machine.
Events Description
The event definitions of the different events of the H.225 state machine are as follows:
H225_EVENT_NONE No event. H225_EVENT_ALERTThis event indicates the H.225 state machine to send an alerting message to the peer. H225_EVENT_ALERT_INDThis event indicates the H.225 state machine that an alerting message is received from the peer. H225_EVENT_CALLPROCThis event indicates the H.225 state machine to send a call proceeding message to the peer. H225_EVENT_CALLPROC_INDThis event indicates the H.225 state machine that a call proceeding message is received from the peer. H225_EVENT_REJECTThis event indicates the H.225 state machine to reject the call setup request from the peer. H225_EVENT_REJECT_INDThis event indicates the H.225 state machine that a call setup request to the peer is rejected. H225_EVENT_RELEASEThis event indicates the H.225 state machine to send a release complete message to the peer. H225_EVENT_RELEASE_INDThis event indicates the H.225 state machine that a release complete message is received from the peer. H225_EVENT_SETUPThis event indicates the H.225 state machine to send a setup message to the peer. H225_EVENT_SETUP_INDThis event indicates the H.225 state machine that a setup message is received from the peer. H225_EVENT_SETUP_CFMThis event indicates the H.225 state machine to send a connect message to the peer. H225_EVENT_SETUP_CFM_INDThis event indicates the H.225 state machine that a connect message from the peer. H225_EVENT_RAS_SUCCESSThis event indicates the H.225 state machine that the pending RAS operation is successful. H225_EVENT_RAS_FAILEDThis event indicates the H.225 state machine that the pending RAS operation failed. H225_EVENT_H245_SUCCESSThis event indicates the H.225 state machine that the pending H.245 operation is successful. H225_EVENT_H245_FAILEDThis event indicates the H.225 state machine that the pending H.245 operation failed.
DB-251
Examples
The following is sample output from the debug cch323 h225 command:
Router# debug cch323 h225 20:59:17:Set new event H225_EVENT_SETUP 20:59:17:H225 FSM:received event H225_EVENT_SETUP while at state H225_IDLE 20:59:17:Changing from H225_IDLE state to H225_SETUP state 20:59:17:cch323_h225_receiver:received msg of type SETUPCFM_CHOSEN 20:59:17:H225 FSM:received event H225_EVENT_SETUP_CFM_IND while at state H225_SETUP 20:59:17:Changing from H225_SETUP state to H225_ACTIVE state 20:59:17:Set new event H225_EVENT_H245_SUCCESS 20:59:17:H225 FSM:received event H225_EVENT_H245_SUCCESS while at state H225_ACTIVE 20:59:20:Set new event H225_EVENT_RELEASE 20:59:20:H225 FSM:received event H225_EVENT_RELEASE while at state H225_ACTIVE 20:59:20:Changing from H225_ACTIVE state to H225_WAIT_FOR_DRQ state 20:59:20:Set new event H225_EVENT_RAS_SUCCESS 20:59:20:H225 FSM:received event H225_EVENT_RAS_SUCCESS while at state H225_WAIT_FOR_DRQ 20:59:20:Changing from H225_WAIT_FOR_DRQ state to H225_IDLE state
DB-252
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco AS5850. This command was integrated into Cisco IOS Release 12.2(11)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The H.245 state machines include the following three state machines:
Master SlaveDetermination (MSD) state machine Capability Exchange (CAP) state machine Open Logical Channel (OLC) state machine
State Definitions
H245_MS_NONE This is the initial state of the master slave determination state machine. H245_MS_WAITIn this state, a Master Slave Determination message is sent, waiting for the reply. H245_MS_DONE The result is in. H245_CAP_NONEThis is the initial state of the capabilities exchange state machine. H245_CAP_WAITIn this state, a cap exchange message is sent, waiting for reply. H245_CAP_DONEThe result is in. H245_OLC_NONEThis is the initial state of the open logical channel state machine.
DB-253
H245_OLC_WAIT: OLC message sent, waiting for reply. H245_OLC_DONE: OLC done.
Event definitions
H245_EVENT_MSDSend MSD message H245_EVENT_MS_CFMSend MSD acknowledge message H245_EVENT_MS_REJSend MSD reject message H245_EVENT_MS_IND Received MSD message H245_EVENT_CAPSend CAP message H245_EVENT_CAP_CFMSend CAP acknowledge message H245_EVENT_CAP_REJSend CAP reject H245_EVENT_CAP_INDReceived CAP message H245_EVENT_OLCSend OLC message H245_EVENT_OLC_CFMSend OLC acknowledge message H245_EVENT_OLC_REJSend OLC reject message H245_EVENT_OLC_INDReceived OLC message
Examples
The following is sample output from the debug cch323 h245 command:
Router# debug cch323 h245 20:58:23:Changing to new event H245_EVENT_MSD 20:58:23:H245 MS FSM:received event H245_EVENT_MSD while at state H245_MS_NONE 20:58:23:changing from H245_MS_NONE state to H245_MS_WAIT state 20:58:23:Changing to new event H245_EVENT_CAP 20:58:23:H245 CAP FSM:received event H245_EVENT_CAP while at state H245_CAP_NONE 20:58:23:changing from H245_CAP_NONE state to H245_CAP_WAIT state 20:58:23:cch323_h245_receiver:received msg of type M_H245_MS_DETERMINE_INDICATION 20:58:23:Changing to new event H245_EVENT_MS_IND 20:58:23:H245 MS FSM:received event H245_EVENT_MS_IND while at state H245_MS_WAIT 20:58:23:cch323_h245_receiver:received msg of type M_H245_CAP_TRANSFER_INDICATION 20:58:23:Changing to new event H245_EVENT_CAP_IND 20:58:23:H245 CAP FSM:received event H245_EVENT_CAP_IND while at state H245_CAP_WAIT 20:58:23:cch323_h245_receiver:received msg of type M_H245_MS_DETERMINE_CONFIRM 20:58:23:Changing to new event H245_EVENT_MS_CFM 20:58:23:H245 MS FSM:received event H245_EVENT_MS_CFM while at state H245_MS_WAIT 20:58:23:changing from H245_MS_WAIT state to H245_MS_DONE state 0:58:23:cch323_h245_receiver:received msg of type M_H245_CAP_TRANSFER_CONFIRM 20:58:23:Changing to new event H245_EVENT_CAP_CFM 20:58:23:H245 CAP FSM:received event H245_EVENT_CAP_CFM while at state H245_CAP_WAIT 20:58:23:changing from H245_CAP_WAIT state to H245_CAP_DONE state 20:58:23:Changing to new event H245_EVENT_OLC 20:58:23:H245 OLC FSM:received event H245_EVENT_OLC while at state
DB-254
December 2010
H245_OLC_NONE 20:58:23:changing from H245_OLC_NONE state to H245_OLC_WAIT state 20:58:23:cch323_h245_receiver:received msg of type M_H245_UCHAN_ESTABLISH_INDICATION 20:58:23:Changing to new event H245_EVENT_OLC_IND 20:58:23:H245 OLC FSM:received event H245_EVENT_OLC_IND while at state H245_OLC_WAIT 20:58:23:cch323_h245_receiver:received msg of type M_H245_UCHAN_ESTAB_ACK 20:58:23:Changing to new event H245_EVENT_OLC_CFM 20:58:23:H245 OLC FSM:received event H245_EVENT_OLC_CFM while at state H245_OLC_WAIT 20:58:23:changing from H245_OLC_WAIT state to H245_OLC_DONE state
DB-255
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-256
December 2010
Jan 23 18:39:56.397:cch323_rpms_proc_callback_func:PREAUTH_SUCCESS for preauth id 86514 aaa_uid 466725 auth_serv 1688218168 Jan 23 18:39:56.397:rpms_proc_preauth_response:Deleting Tree node for preauth id 86514 uid 466725 Jan 23 18:39:56.397:cch323_get_ccb_and_delete_from_preauth_tree:Preauth_id=86514 cch323_get_ccb_and_delete_from_preauth_tree:651F87FC node and 6852D5BC ccb
Field Request Preauth id EndPt Type EndPt Resource Service Call_origin Call_type Calling_num Called_num Protocol function reports
Description Request Type0 for preauthentication, 1 for disconnect. Identifier for the preauthentication request. Call Origin End Point Type1 for IP address, 2 for IZCT value. Call Origin End Point ValueAn IP address or IZCT value. Resource Service Type1 for Reservation, 2 for Query. Answer. Voice over IP (VoIP). Calling Party Number (CLID). Called Party Number (DNIS). 0 for H.323, 1 for SIP. Various identifiers and status reports for executed functions.
DB-257
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco AS5850. This command was integrated into Cisco IOS Release 12.2(11)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
RAS operates in two state machines. One global state machine controls the overall RAS operation of the Gateway. The other state machine is a per call state machine that controls the active calls.
State definitions
The state definitions of the different states of the RAS state machine follow:
CCH323_RAS_STATE_NONEThis is the initial state of the RAS state machine. CCH323_RAS_STATE_GRQThe state machine is in the Gatekeeper Request (GRQ) state. In this state, the gateway is in the process of discovering a gatekeeper. CCH323_RAS_STATE_RRQThe state machine is in the Registration Request (RRQ) state. In this state, the gateway is in the process of registering with a gatekeeper. CCH323_RAS_STATE_IDLEThe global state machine is in the idle state. CCH323_RAS_STATE_URQThe state machine is in the Unregistration Request (URQ) state. In this state, the gateway is in the process of unregistering with a gatekeeper. CCH323_RAS_STATE_ARQThe per call state machine is in the process of admitting a new call. CCH323_RAS_STATE_ACTIVEThe per call state machine is in the call active state.
DB-258
December 2010
CCH323_RAS_STATE_DRQThe per call state machine is in the process of disengaging an active call.
Event Definitions
These are the event definitions of the different states of the RAS state machine:
CCH323_RAS_EVENT_NONENothing. CCH323_RAS_EVENT_GWUPGateway is coming up. CCH323_RAS_EVENT_GWDWNGateway is going down. CCH323_RAS_EVENT_NEWCALLNew call. CCH323_RAS_EVENT_CALLDISCCall disconnect. CCH323_RAS_EVENT_GCFReceived Gatekeeper Confirmation (GCF). CCH323_RAS_EVENT_GRJReceived Gatekeeper Rejection (GRJ). CCH323_RAS_EVENT_ACFReceived Admission Confirmation (ACF). CCH323_RAS_EVENT_ARJReceived Admission Rejection (ARJ). CCH323_RAS_EVENT_SEND_RRQSend Registration Request (RRQ). CCH323_RAS_EVENT_RCFReceived Registration Confirmation (RCF). CCH323_RAS_EVENT_RRJReceived Registration Rejection (RRJ). CCH323_RAS_EVENT_SEND_URQSend URQ. CCH323_RAS_EVENT_URQReceived URQ. CCH323_RAS_EVENT_UCFReceived Unregister Confirmation (UCF). CCH323_RAS_EVENT_SEND_UCFSend Unregister Confirmation (UCF). CCH323_RAS_EVENT_URJReceived Unregister Reject (URJ). CCH323_RAS_EVENT_BCFReceived Bandwidth Confirm (BCF). CCH323_RAS_EVENT_BRJReceived Bandwidth Rejection (BRJ). CCH323_RAS_EVENT_DRQReceived Disengage Request (DRQ). CCH323_RAS_EVENT_DCFReceived Disengage Confirm (DCF). CCH323_RAS_EVENT_SEND_DCFSend Disengage Confirm (DCF). CCH323_RAS_EVENT_DRJReceived Disengage Reject (DRJ). CCH323_RAS_EVENT_IRQReceived Interrupt Request (IRQ). CCH323_RAS_EVENT_IRRSend Information Request (IRR). CCH323_RAS_EVENT_TIMEOUTMessage timeout.
Examples
The following is sample output from the debug cch323 preauth command:
Router# debug cch323 preauth 20:58:49:Changing to new event CCH323_RAS_EVENT_SEND_RRQ cch323_run_ras_sm:received event CCH323_RAS_EVENT_SEND_RRQ while at CCH323_RAS_STATE_IDLE state cch323_run_ras_sm:changing to CCH323_RAS_STATE_RRQ state cch323_ras_receiver:received msg of type RCF_CHOSEN cch323_run_ras_sm:received event CCH323_RAS_EVENT_RCF while at CCH323_RAS_STATE_RRQ state
DB-259
cch323_run_ras_sm:changing to CCH323_RAS_STATE_IDLE state 20:58:59:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_NEWCALL while at CCH323_RAS_STATE_IDLE state 20:58:59:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_ARQ cch323_ras_receiver:received msg of type ACF_CHOSEN 20:58:59:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_ACF while at CCH323_RAS_STATE_ARQ state 20:58:59:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_ACTIVE 20:59:02:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_CALLDISC while at CCH323_RAS_STATE_ACTIVE state 20:59:02:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_DRQ cch323_ras_receiver:received msg of type DCF_CHOSEN 20:59:02:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_DCF while at CCH323_RAS_STATE_DRQ state 20:59:02:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_IDLE 20:59:04:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_IRR while at CCH323_RAS_STATE_ACTIVE state 20:59:04:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_ACTIVE
DB-260
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(9)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to enable a debugging trace for the video component in an H.323 network.
Examples
The following is sample output of the debugging log for an originating Cisco Unified CallManager Express (Cisco Unified CME) gateway after the debug cch323 video command was enabled:
Router# show log Syslog logging: enabled (11 messages dropped, 487 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) Console logging: disabled Monitor logging: level debugging, 0 messages logged, xml disabled, filtering disabled Buffer logging: level debugging, 1144 messages logged, xml disabled, filtering disabled Logging Exception size (4096 bytes) Count and timestamp logging messages: disabled Trap logging: level informational, 1084 message lines logged Log Buffer (6000000 bytes): Jun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_get_peer_info: Entry Jun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_get_peer_info: Have peer Jun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_set_pref_codec_list: First preferred codec(bytes)=16(20) Jun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_get_peer_info: Flow Mode set to FLOW_THROUGH
DB-261
Jun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_get_caps_chn_info: No peer leg setup params Jun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_get_caps_chn_info: Setting CCH323_SS_NTFY_VIDEO_INFO Jun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_set_h323_control_options_outgoing: h245 sm mode = 8463 Jun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_set_h323_control_options_outgoing: h323_ctl=0x20 Jun 13 09:19:42.010: //103030/C7838B198002/H323/cch323_rotary_validate: No peer_ccb available
The following is sample output of the debugging log for a terminating Cisco Unified Survivable Remote Site Telephony (Cisco Unified SRST) gateway after the debug cch323 video command was enabled:
Router# show log Syslog logging: enabled (11 messages dropped, 466 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) Console logging: disabled Monitor logging: level debugging, 0 messages logged, xml disabled, filtering disabled Buffer logging: level debugging, 829 messages logged, xml disabled, filtering disabled Logging Exception size (4096 bytes) Count and timestamp logging messages: disabled Trap logging: level informational, 771 message lines logged Log Buffer (200000 bytes): Jun 13 09:19:42.011: //103034/C7838B198002/H323/setup_ind: Receive bearer cap infoXRate 24, rateMult 12 Jun 13 09:19:42.011: //103034/C7838B198002/H323/cch323_set_h245_state_mc_mode_incoming: h245 state m/c mode=0x10F, h323_ctl=0x2F Jun 13 09:19:42.015: //-1/xxxxxxxxxxxx/H323/cch245_event_handler: callID=103034 Jun 13 09:19:42.019: //-1/xxxxxxxxxxxx/H323/cch245_event_handler: Event CC_EV_H245_SET_MODE: data ptr=0x465D5760 Jun 13 09:19:42.019: //-1/xxxxxxxxxxxx/H323/cch323_set_mode: callID=103034, flow Mode=1 spi_mode=0x6 Jun 13 09:19:42.019: //103034/C7838B198002/H323/cch323_do_call_proceeding: set_mode NOT called yet...saved deferred CALL_PROC Jun 13 09:19:42.019: //103034/C7838B198002/H323/cch323_h245_connection_sm: state=0, event=0, ccb=4461B518, listen state=0 Jun 13 09:19:42.019: //103034/C7838B198002/H323/cch323_process_set_mode: Setting inbound leg mode flags to 0x10F, flow-mode to FLOW_THROUGH Jun 13 09:19:42.019: //103034/C7838B198002/H323/cch323_process_set_mode: Sending deferred CALL_PROC Jun 13 09:19:42.019: //103034/C7838B198002/H323/cch323_do_call_proceeding: set_mode called so we can proceed with CALLPROC Jun 13 09:19:42.027: //103034/C7838B198002/H323/cch323_h245_connection_sm: state=1, event=2, ccb=4461B518, listen state=1 Jun 13 09:19:42.027: //103034/C7838B198002/H323/cch323_send_cap_request: Setting mode to VIDEO MODE Jun 13 09:19:42.031: //103034/C7838B198002/H323/cch323_h245_cap_ind: Masks au=0xC data=0x2 uinp=0x32
DB-262
December 2010
Related Commands
Command debug ephone video show call active video show debugging
Description Sets video debugging for the Cisco Unified IP phone. Displays call information for SCCP video calls in progress. Displays information about the types of debugging that are enabled for your router.
show call history video Displays call history information for SCCP video calls.
DB-263
debug ccm-manager
To display debugging information about Cisco CallManager, use the debug ccm-manager command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ccm-manager {backhaul {errors | events | packets} | config-download {all | errors | events | packets | tone | xml} | errors | events | music-on-hold {errors | events | packets} | packets} no debug ccm-manager
Syntax Description
backhaul
Enables debugging of the Cisco CallManager backhaul. The keywords are as follows:
errorsDisplays Cisco CallManager backhaul errors. eventsDisplays Cisco CallManager backhaul events. packetsDisplays Cisco CallManager packets.
config-download
Enables debugging of the Cisco CallManager configuration download. The keywords are as follows:
allDisplays all Cisco CallManager configuration parameters. errorsDisplays Cisco CallManager configuration errors. eventsDisplays Cisco CallManager configuration events. packetsDisplays Cisco CallManager configuration packets. toneDisplays Cisco CallManager downloaded custom tones. xmlDisplays the Cisco CallManager configuration XML parser.
errors events
Displays errors related to Cisco CallManager. Displays Cisco CallManager events, such as when the primary Cisco CallManager server fails and control is switched to the backup Cisco CallManager server. Displays music on hold (MOH). The keywords are as follows:
music-on-hold
packets
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for Cisco CallManager Version 3.0 and the Cisco VG200. This command was implemented on Cisco 2600 series and Cisco 3600 series routers.
DB-264
December 2010
Release 12.2(2)XN
Modification Support for enhanced MGCP voice gateway interoperability was added to Cisco CallManager Version 3.1 for the Cisco 2600 series, Cisco 3600 series, and Cisco VG200. This command was integrated into Cisco IOS Release 12.2(11)T and implemented on the Cisco IAD2420 series. The tone keyword was added for the following platforms: Cisco 2610XM, Cisco 611XM, Cisco 2620XM, Cisco 2621XM, Cisco 2650XM, Cisco 2651XM, Cisco 2691, Cisco 3640A, Cisco 3660, Cisco 3725, and Cisco 3745. The tone keyword was added. New output was added relating to the SCCP protocol. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2(11)T 12.2(15)XJ
Examples
The following is sample output from the debug ccm-manager events command:
Router# debug ccm-manager events *Feb 28 22:56:05.873: cmapp_mgcpapp_go_down: Setting mgc status to NO_RESPONSE *Feb 28 22:56:05.873: cmapp_host_fsm: New state DOWN for host 0 (172.20.71.38) *Feb 28 22:56:05.873: cmapp_mgr_process_ev_active_host_failed: Active host 0 (172.20.71.38) failed *Feb 28 22:56:05.873: cmapp_mgr_check_hostlist: Active host is 0 (172.20.71.38) *Feb 28 22:56:05.877: cmapp_mgr_switchover: New actv host will be 1 (172.20.71.44) *Feb 28 22:56:05.877: cmapp_host_fsm: Processing event GO_STANDBY for host 0 (172.20.71.38) in state DOWN *Feb 28 22:56:05.877: cmapp_open_new_link: Open link for [0]:172.20.71.38 *Feb 28 22:56:05.877: cmbh_open_tcp_link: Opening TCP link with Rem IP 172.20.71.38, Local IP 172.20.71.19, port 2428 *Feb 28 22:56:05.881: cmapp_open_new_link: Open initiated OK: Host 0 (172.20.71.38), session_id=8186DEE4 *Feb 28 22:56:05.881: cmapp_start_open_link_tmr: Host 0 (172.20.71.38), tmr 0 *Feb 28 22:56:05.881: cmapp_host_fsm: New state STANDBY_OPENING for host 0 (172.20.71.38) *Feb 28 22:56:05.881: cmapp_host_fsm: Processing event GO_ACTIVE for host 1 (172.20.71.44) in state STANDBY_READY *Feb 28 22:56:05.885: cmapp_mgr_send_rehome: new addr=172.20.71.44,port=2427 *Feb 28 22:56:05.885: cmapp_host_fsm: New state REGISTERING for host 1 (172.20.71.44)
You can use the debug ccm-manager config-download tone command to verify the parameters assigned to each locale. The following sample output shows the locale name United Kingdom and lists all the dual-tone parameters for that region:
Router# debug ccm-manager config-download tone 00:09:07: cmapp_prefix_process_tag_tones: 00:09:07: cmapp_process_tag_trkLocaleName: region = United Kingdom 00:09:07: cmapp_process_tag_pulse_ratio: pulse ratio = 40 00:09:07: cmapp_process_tag_dtmf_llevel: low frequency level = 65438 00:09:07: cmapp_process_tag_dtmf_hlevel: high frequency level = 65463 00:09:07: cmapp_process_tag_special_oper: operation = uLaw 00:09:07: cmapp_prefix_process_tag_lpig: 00:09:07: cmapp_process_tag_fxs: ignore LPIG for fxs 00:09:07: cmapp_process_tag_fxo: ignore LPIG for fxo
DB-265
00:09:07: cmapp_process_tag_digital: ignore LPIG for digital 00:09:07: cmapp_prefix_process_tag_lpog: 00:09:07: cmapp_process_tag_fxs: ignore LPOG for fxsBoth ports are in service 00:09:07: cmapp_process_tag_fxo: ignore LPOG for fxo 00:09:07: cmapp_process_tag_digital: ignore LPOG for digital 00:09:07: cmapp_prefix_process_tag_tonetable_info: 00:09:07: cmapp_prefix_process_tag_dualtone: TID=[0:CPTONE_BUSY] 00:09:07: cmapp_process_tag_nf: number of frequencies = 1 00:09:07: cmapp_process_tag_dr: direction = 0 00:09:07: cmapp_process_tag_fof: frequency 1 = 400 00:09:07: cmapp_process_tag_fos: frequency 2 = 0 00:09:07: cmapp_process_tag_fot: frequency 3 = 0 00:09:07: cmapp_process_tag_fo4: frequency 4 = 0 00:09:07: cmapp_prefix_process_tag_aof_level: 00:09:07: cmapp_process_tag_fxs: amplitude of 1st = -200 00:09:07: cmapp_process_tag_fxo: amplitude of 1st = -200 00:09:07: cmapp_process_tag_digital: amplitude of 1st = -240 00:09:07: cmapp_prefix_process_tag_aos_level: 00:09:07: cmapp_process_tag_fxs: amplitude of 2nd = 0 00:09:07: cmapp_process_tag_fxo: amplitude of 2nd = 0 00:09:07: cmapp_process_tag_digital: amplitude of 2nd = 0 00:09:07: cmapp_prefix_process_tag_aot_level: 00:09:07: cmapp_process_tag_fxs: amplitude of 3rd = 0 00:09:07: cmapp_process_tag_fxo: amplitude of 3rd = 0 00:09:07: cmapp_process_tag_digital: amplitude of 3rd = 0 00:09:07: cmapp_prefix_process_tag_ao4_level: 00:09:07: cmapp_process_tag_fxs: amplitude of 4th = 0 00:09:07: cmapp_process_tag_fxo: amplitude of 4th = 0 00:09:07: cmapp_process_tag_digital: amplitude of 4th = 0 00:09:07: cmapp_process_tag_ontf: frequency 1 on time = 375 00:09:07: cmapp_process_tag_oftf: frequency 1 off time = 375 00:09:07: cmapp_process_tag_onts: frequency 2 on time = 0 00:09:07: cmapp_process_tag_ofts: frequency 2 off time = 0 00:09:07: cmapp_process_tag_ontt: frequency 3 on time = 0 00:09:07: cmapp_process_tag_oftt: frequency 3 off time = 0 00:09:07: cmapp_process_tag_ont4: frequency 4 on time = 0 00:09:07: cmapp_process_tag_oft4: frequency 4 off time = 0 00:09:07: cmapp_process_tag_fof2: frequency 1 cadence 2 = 0 00:09:07: cmapp_process_tag_fos2: frequency 2 cadence 2 = 0 00:09:07: cmapp_process_tag_fof3: frequency 1 cadence 3 = 0 00:09:07: cmapp_process_tag_fos3: frequency 2 cadence 3 = 0 00:09:07: cmapp_process_tag_fof4: frequency 1 cadence 4 = 0 00:09:07: cmapp_process_tag_fos4: frequency 2 cadence 4 = 0 00:09:07: cmapp_process_tag_rct1: cadence 1 repeat count = 0 00:09:07: cmapp_process_tag_rct2: cadence 2 repeat count = 0 00:09:07: cmapp_process_tag_rct3: cadence 3 repeat count = 0 00:09:07: cmapp_process_tag_rct4: cadence 4 repeat count = 0 00:09:07: cmapp_prefix_process_tag_dualtone: TID=[1:CPTONE_RING_BACK] 00:09:07: cmapp_process_tag_nf: number of frequencies = 2 00:09:07: cmapp_process_tag_dr: direction = 0 00:09:07: cmapp_process_tag_fof: frequency 1 = 400 00:09:07: cmapp_process_tag_fos: frequency 2 = 450 00:09:07: cmapp_process_tag_fot: frequency 3 = 0 00:09:07: cmapp_process_tag_fo4: frequency 4 = 0 00:09:07: cmapp_prefix_process_tag_aof_level: 00:09:07: cmapp_process_tag_fxs: amplitude of 1st = -190 00:09:07: cmapp_process_tag_fxo: amplitude of 1st = -190 00:09:07: cmapp_process_tag_digital: amplitude of 1st = -190 00:09:07: cmapp_prefix_process_tag_aos_level: 00:09:07: cmapp_process_tag_fxs: amplitude of 2nd = -190 00:09:07: cmapp_process_tag_fxo: amplitude of 2nd = -190 00:09:07: cmapp_process_tag_digital: amplitude of 2nd = -190
DB-266
December 2010
00:09:07: cmapp_prefix_process_tag_aot_level: 00:09:07: cmapp_process_tag_fxs: amplitude of 3rd = 0 00:09:07: cmapp_process_tag_fxo: amplitude of 3rd = 0 00:09:07: cmapp_process_tag_digital: amplitude of 3rd = 0 00:09:07: cmapp_prefix_process_tag_ao4_level: 00:09:07: cmapp_process_tag_fxs: amplitude of 4th = 0 00:09:07: cmapp_process_tag_fxo: amplitude of 4th = 0 00:09:07: cmapp_process_tag_digital: amplitude of 4th = 0 00:09:07: cmapp_process_tag_ontf: frequency 1 on time = 400 00:09:07: cmapp_process_tag_oftf: frequency 1 off time = 200 00:09:07: cmapp_process_tag_onts: frequency 2 on time = 400 00:09:07: cmapp_process_tag_ofts: frequency 2 off time = 2000 00:09:07: cmapp_process_tag_ontt: frequency 3 on time = 0 00:09:07: cmapp_process_tag_oftt: frequency 3 off time = 0 00:09:07: cmapp_process_tag_ont4: frequency 4 on time = 0 00:09:07: cmapp_process_tag_oft4: frequency 4 off time = 0 00:09:07: cmapp_process_tag_fof2: frequency 1 cadence 2 = 0 00:09:07: cmapp_process_tag_fos2: frequency 2 cadence 2 = 0 00:09:07: cmapp_process_tag_fof3: frequency 1 cadence 3 = 0 00:09:07: cmapp_process_tag_fos3: frequency 2 cadence 3 = 0 00:09:07: cmapp_process_tag_fof4: frequency 1 cadence 4 = 0 00:09:07: cmapp_process_tag_fos4: frequency 2 cadence 4 = 0 00:09:07: cmapp_process_tag_rct1: cadence 1 repeat count = 0 00:09:07: cmapp_process_tag_rct2: cadence 2 repeat count = 0 00:09:07: cmapp_process_tag_rct3: cadence 3 repeat count = 0 00:09:07: cmapp_process_tag_rct4: cadence 4 repeat count = 0 00:09:07: cmapp_prefix_process_tag_dualtone: TID=[2:CPTONE_CONGESTION] 00:09:07: cmapp_process_tag_nf: number of frequencies = 1 00:09:07: cmapp_process_tag_dr: direction = 0 00:09:07: cmapp_process_tag_fof: frequency 1 = 400 00:09:07: cmapp_process_tag_fos: frequency 2 = 0 00:09:07: cmapp_process_tag_fot: frequency 3 = 0 00:09:07: cmapp_process_tag_fo4: frequency 4 = 0 00:09:07: cmapp_prefix_process_tag_aof_level: 00:09:07: cmapp_process_tag_fxs: amplitude of 1st = -200 00:09:07: cmapp_process_tag_fxo: amplitude of 1st = -200 00:09:07: cmapp_process_tag_digital: amplitude of 1st = -200 00:09:07: cmapp_prefix_process_tag_aos_level: 00:09:07: cmapp_process_tag_fxs: amplitude of 2nd = 0 00:09:07: cmapp_process_tag_fxo: amplitude of 2nd = 0 00:09:07: cmapp_process_tag_digital: amplitude of 2nd = 0 00:09:07: cmapp_prefix_process_tag_aot_level: 00:09:07: cmapp_process_tag_fxs: amplitude of 3rd = 0 00:09:07: cmapp_process_tag_fxo: amplitude of 3rd = 0 00:09:07: cmapp_process_tag_digital: amplitude of 3rd = 0 00:09:07: cmapp_prefix_process_tag_ao4_level: 00:09:07: cmapp_process_tag_fxs: amplitude of 4th = 0 00:09:07: cmapp_process_tag_fxo: amplitude of 4th = 0 00:09:07: cmapp_process_tag_digital: amplitude of 4th = 0 00:09:07: cmapp_process_tag_ontf: frequency 1 on time = 400 00:09:07: cmapp_process_tag_oftf: frequency 1 off time = 350 00:09:07: cmapp_process_tag_onts: frequency 2 on time = 225 00:09:07: cmapp_process_tag_ofts: frequency 2 off time = 525 00:09:07: cmapp_process_tag_ontt: frequency 3 on time = 0 00:09:07: cmapp_process_tag_oftt: frequency 3 off time = 0 00:09:07: cmapp_process_tag_ont4: frequency 4 on time = 0 00:09:07: cmapp_process_tag_oft4: frequency 4 off time = 0 00:09:07: cmapp_process_tag_fof2: frequency 1 cadence 2 = 0 00:09:07: cmapp_process_tag_fos2: frequency 2 cadence 2 = 0 00:09:07: cmapp_process_tag_fof3: frequency 1 cadence 3 = 0 00:09:07: cmapp_process_tag_fos3: frequency 2 cadence 3 = 0 00:09:07: cmapp_process_tag_fof4: frequency 1 cadence 4 = 0 00:09:07: cmapp_process_tag_fos4: frequency 2 cadence 4 = 0
DB-267
1 2 3 4
= = = =
0 0 0 0
The following is sample output from the debug ccm-manager config-download all command for an error case in which the configuration file cannot be accessed for a Skinny Client Control Protocol (SCCP) download:
*Jan 9 07:28:33.499: cmapp_xml_process_timer: *Jan 9 07:28:33.499: cmapp_xml_find_ep_by_name: Checking for ep_name [*] *Jan 9 07:28:33.499: cmapp_xml_exec_fsm: Endpoint is [*] *Jan 9 07:28:33.499: cmapp_xml_exec_fsm: endpoint = * state = CMAPP_XML_FILE_DNLD, event = CMAPP_XML_EVT_FILE_DNLD_TIMER *Jan 9 07:28:33.499: cmapp_xml_file_retry_timer_expired: state = CMAPP_XML_FILE_DNLD, event = CMAPP_XML_EVT_FILE_DNLD_TIMER *Jan 9 07:29:14.499: cmapp_xml_tftp_download_file: Unable to read file tftp://10.6.6.31/Router.cisco.com.cnf.xml, rc=-2 *Jan 9 07:29:14.499: cmapp_xml_get_xml_file: Could not read file tftp://10.6.6.31/Router.cisco.com.cnf.xml, len = 0 *Jan 9 07:29:14.499: cmapp_xml_tftp_download_file: Unable to read file tftp:///Router.cisco.com.cnf.xml, rc=-2 *Jan 9 07:29:14.499: cmapp_xml_get_xml_file: Could not read file tftp:///Router.cisco.com.cnf.xml, len = 0 *Jan 9 07:29:14.499: cmapp_xml_tftp_download_file: Unable to read file tftp:///Router.cisco.com.cnf.xml, rc=-2 *Jan 9 07:29:14.499: cmapp_xml_get_xml_file: Could not read file tftp:///Router.cisco.com.cnf.xml, len = 0 *Jan 9 07:29:14.499: cmapp_xml_exec_fsm: New state = CMAPP_XML_FILE_DNLD, ep = 6544CFA8
The following is sample output from the debug ccm-manager config-download all command for a successful SCCP download:
*Jan 9 09:44:45.543: cmapp_sccp_config: *Jan 9 09:44:45.543: cmapp_sccp_reset_curcfg: *Jan 9 09:44:45.543: cmapp_sccp_init_curcfg: *Jan 9 09:44:45.543: cmapp_sccp_download_gw_config_file: *Jan 9 09:44:45.543: cmapp_sccp_get_gw_name: *Jan 9 09:44:45.543: cmapp_sccp_get_gw_name: XML file name generated->SKIGW0C85226910.cnf.xml *Jan 9 09:44:45.543: cmapp_sccp_get_xml_file_via_tftp: *Jan 9 09:44:45.543: cmapp_sccp_tftp_download_file: *Jan 9 09:44:45.543: cmapp_sccp_tftp_get_file_size: *Jan 9 09:44:45.563: cmapp_sccp_get_buffer: *Jan 9 09:44:45.575: cmapp_sccp_tftp_download_file: File (tftp://10.2.6.101/SKIGW0C85226910.cnf.xml) read 8162 bytes *Jan 9 09:44:45.575: cmapp_sccp_get_xml_file_via_tftp: Read file tftp://10.2.6.101/SKIGW0C85226910.cnf.xml, len = 8162 *Jan 9 09:44:45.575: cmapp_parse_gw_xml_file: *Jan 9 09:44:45.579: cmapp_sccp_gw_chardata_handler: ccm found, priority=0
DB-268
December 2010
The following lines show the conversion of XML data into router configuration information for the endpoint:
*Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan 9 9 9 9 9 9 9 9 9 9 09:44:45.579: 09:44:45.579: 09:44:45.579: 09:44:45.579: 09:44:45.579: 09:44:45.579: 09:44:45.579: 09:44:45.579: 09:44:45.579: 09:44:45.579: cmapp_sccp_gw_start_element_handler: cmapp_sccp_gw_start_element_handler: cmapp_sccp_gw_start_element_handler: cmapp_sccp_gw_start_element_handler: cmapp_sccp_gw_start_element_handler: cmapp_sccp_gw_start_element_handler: cmapp_sccp_gw_start_element_handler: cmapp_sccp_gw_start_element_handler: cmapp_sccp_gw_start_element_handler: cmapp_sccp_gw_start_element_handler: Unit has been set to 1 Subunit has been set to 0 Endpoint has been set to 0 Endpoint has been set to 1 Endpoint has been set to 2 Endpoint has been set to 3 Subunit has been set to 1 Endpoint has been set to 0 Endpoint has been set to 1 Unit has been set to 2
Field nn:nn:nn:
Description Timestamp time in hours (military format), minutes, and seconds that indicates when the Cisco CallManager event occurred. The Cisco CallManager routine in which the error event occurred. Region name, such as United Kingdom. DTMF low frequency. DTMF high frequency. Special operations, such as uLaw.
cmapp_ error message: LocaleName low frequency level high frequency level operation
Related Commands
Description Displays a list of Cisco CallManager servers, their current status, and their availability.
DB-269
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
This command was introduced. The output of this command was changed. Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways. This command was implemented on the Cisco AS5850 universal gateway. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on Cisco 7200 series routers. This command was integrated into Cisco IOS Release 12.2(11)T. Support for the Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, and Cisco AS5850 universal gateway is not included in this release. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug ccsip all command enables the following SIP debug commands:
debug ccsip events debug ccsip error debug ccsip states debug ccsip messages debug ccsip calls
DB-270
December 2010
Examples
The following example displays debug output from one side of the call:
Router# debug ccsip all All SIP call tracing enabled Router1# *Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_NONE, SUBSTATE_NONE) (STATE_IDLE, SUBSTATE_NONE) *Mar 6 14:10:42: Queued event from SIP SPI : SIPSPI_EV_CC_CALL_SETUP *Mar 6 14:10:42: CCSIP-SPI-CONTROL: act_idle_call_setup *Mar 6 14:10:42: act_idle_call_setup:Not using Voice Class Codec
to
*Mar 6 14:10:42: act_idle_call_setup: preferred_codec set[0] type :g711ulaw bytes: 160 *Mar 6 14:10:42: Queued event from SIP SPI : SIPSPI_EV_CREATE_CONNECTION *Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_IDLE, SUBSTATE_NONE) to (STATE_IDLE, SUBSTATE_CONNECTING) *Mar 6 14:10:42: REQUEST CONNECTION TO IP:166.34.245.231 PORT:5060 *Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_IDLE, SUBSTATE_CONNECTING) to (STATE_IDLE, SUBSTATE_CONNECTING) *Mar 6 14:10:42: CCSIP-SPI-CONTROL: act_idle_connection_created *Mar 6 14:10:42: CCSIP-SPI-CONTROL: act_idle_connection_created: Connid(1) created to 166.34.245.231:5060, local_port 54113 *Mar 6 14:10:42: sipSPIAddLocalContact *Mar 6 14:10:42: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE *Mar 6 14:10:42: CCSIP-SPI-CONTROL: sip_stats_method *Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_IDLE, SUBSTATE_CONNECTING) to (STATE_SENT_INVITE, SUBSTATE_NONE) *Mar 6 14:10:42: Sent: INVITE sip:[email protected];user=phone;phone-context=unknown SIP/2.0 Via: SIP/2.0/UDP 166.34.245.230:54113 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown> Date: Sat, 06 Mar 1993 19:10:42 GMT Call-ID: [email protected] Cisco-Guid: 2881152943-2184249548-0-483039712 User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled CSeq: 101 INVITE Max-Forwards: 6 Timestamp: 731427042 Contact: <sip:[email protected]:5060;user=phone> Expires: 180 Content-Type: application/sdp Content-Length: 137 v=0 o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230 s=SIP Call t=0 0 c=IN IP4 166.34.245.230 m=audio 20208 RTP/AVP 0 *Mar 6 14:10:42: Received: SIP/2.0 100 Trying Via: SIP/2.0/UDP 166.34.245.230:54113 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown> Date: Mon, 08 Mar 1993 22:36:40 GMT Call-ID: [email protected] Timestamp: 731427042 Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled CSeq: 101 INVITE Content-Length: 0
DB-271
*Mar 6 14:10:42: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060 *Mar 6 14:10:42: CCSIP-SPI-CONTROL: act_sentinvite_new_message *Mar 6 14:10:42: CCSIP-SPI-CONTROL: sipSPICheckResponse *Mar 6 14:10:42: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 6 14:10:42: Roundtrip delay 4 milliseconds for method INVITE *Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_SENT_INVITE, SUBSTATE_NONE) (STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_PROCEEDING) *Mar 6 14:10:42: Received: SIP/2.0 180 Ringing Via: SIP/2.0/UDP 166.34.245.230:54113 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown> Date: Mon, 08 Mar 1993 22:36:40 GMT Call-ID: [email protected] Timestamp: 731427042 Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled CSeq: 101 INVITE Content-Type: application/sdp Content-Length: 137 v=0 o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231 s=SIP Call t=0 0 c=IN IP4 166.34.245.231 m=audio 20038 RTP/AVP 0 *Mar 6 14:10:42: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060 *Mar 6 14:10:42: CCSIP-SPI-CONTROL: act_recdproc_new_message *Mar 6 14:10:42: CCSIP-SPI-CONTROL: sipSPICheckResponse *Mar 6 14:10:42: CCSIP-SPI-CONTROL: sipSPICheckResponse : Updating session description *Mar 6 14:10:42: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 6 14:10:42: Roundtrip delay 8 milliseconds for method INVITE *Mar 6 14:10:42: HandleSIP1xxRinging: SDP MediaTypes negotiation successful! Negotiated Codec : g711ulaw , bytes :160 Inband Alerting : 0 *Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_PROCEEDING) to (STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_ALERTING) *Mar 6 14:10:46: Received: SIP/2.0 200 OK Via: SIP/2.0/UDP 166.34.245.230:54113 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7F Date: Mon, 08 Mar 1993 22:36:40 GMT Call-ID: [email protected] Timestamp: 731427042 Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled Contact: <sip:[email protected]:5060;user=phone> CSeq: 101 INVITE Content-Type: application/sdp Content-Length: 137 v=0 o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231 s=SIP Call t=0 0 c=IN IP4 166.34.245.231 m=audio 20038 RTP/AVP 0 to
DB-272
December 2010
*Mar 6 14:10:46: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060 *Mar 6 14:10:46: CCSIP-SPI-CONTROL: act_recdproc_new_message *Mar 6 14:10:46: CCSIP-SPI-CONTROL: sipSPICheckResponse *Mar 6 14:10:46: CCSIP-SPI-CONTROL: sipSPICheckResponse : Updating session description *Mar 6 14:10:46: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 6 14:10:46: Roundtrip delay 3536 milliseconds for method INVITE *Mar 6 14:10:46: CCSIP-SPI-CONTROL: act_recdproc_new_message: SDP MediaTypes negotiation successful! Negotiated Codec : g711ulaw , bytes :160 *Mar 6 14:10:46: CCSIP-SPI-CONTROL: sipSPIReconnectConnection *Mar 6 14:10:46: Queued event from SIP SPI : SIPSPI_EV_RECONNECT_CONNECTION *Mar 6 14:10:46: CCSIP-SPI-CONTROL: recv_200_OK_for_invite *Mar 6 14:10:46: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE *Mar 6 14:10:46: CCSIP-SPI-CONTROL: sip_stats_method *Mar 6 14:10:46: 0x624CFEF8 : State change from (STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_ALERTING) to (STATE_ACTIVE, SUBSTATE_NONE) *Mar 6 14:10:46: The Call Setup Information is : Call Control Block (CCB) : 0x624CFEF8 State of The Call : STATE_ACTIVE TCP Sockets Used : NO Calling Number : 3660110 Called Number : 3660210 Negotiated Codec : g711ulaw Source IP Address (Media): 166.34.245.230 Source IP Port (Media): 20208 Destn IP Address (Media): 166.34.245.231 Destn IP Port (Media): 20038 Destn SIP Addr (Control) : 166.34.245.231 Destn SIP Port (Control) : 5060 Destination Name : 166.34.245.231 *Mar 6 14:10:46: HandleUdpReconnection: Udp socket connected for fd: 1 with 166.34.245.231:5060 *Mar 6 14:10:46: Sent: ACK sip:[email protected]:5060;user=phone SIP/2.0 Via: SIP/2.0/UDP 166.34.245.230:54113 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7F Date: Sat, 06 Mar 1993 19:10:42 GMT Call-ID: [email protected] Max-Forwards: 6 Content-Type: application/sdp Content-Length: 137 CSeq: 101 ACK v=0 o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230 s=SIP Call t=0 0 c=IN IP4 166.34.245.230 m=audio 20208 RTP/AVP 0 *Mar 6 14:10:46: CCSIP-SPI-CONTROL: ccsip_caps_ind *Mar 6 14:10:46: ccsip_caps_ind: Load DSP with codec (5) g711ulaw, Bytes=160 *Mar 6 14:10:46: ccsip_caps_ind: set DSP for dtmf-relay = CC_CAP_DTMF_RELAY_INBAND_VOICE *Mar 6 14:10:46: CCSIP-SPI-CONTROL: ccsip_caps_ack *Mar 6 14:10:50: Received: BYE sip:[email protected]:5060;user=phone SIP/2.0 Via: SIP/2.0/UDP 166.34.245.231:54835 From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7F
DB-273
To: "3660110" <sip:[email protected]> Date: Mon, 08 Mar 1993 22:36:44 GMT Call-ID: [email protected] User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled Max-Forwards: 6 Timestamp: 731612207 CSeq: 101 BYE Content-Length: 0 *Mar 6 14:10:50: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:54835 *Mar 6 14:10:50: CCSIP-SPI-CONTROL: act_active_new_message *Mar 6 14:10:50: CCSIP-SPI-CONTROL: sact_active_new_message_request *Mar 6 14:10:50: CCSIP-SPI-CONTROL: sip_stats_method *Mar 6 14:10:50: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE *Mar 6 14:10:50: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 6 14:10:50: CCSIP-SPI-CONTROL: sipSPIInitiateCallDisconnect : Initiate call disconnect(16) for outgoing call *Mar 6 14:10:50: 0x624CFEF8 : State change from (STATE_ACTIVE, SUBSTATE_NONE) to (STATE_DISCONNECTING, SUBSTATE_NONE) *Mar 6 14:10:50: Sent: SIP/2.0 200 OK Via: SIP/2.0/UDP 166.34.245.231:54835 From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7F To: "3660110" <sip:[email protected]> Date: Sat, 06 Mar 1993 19:10:50 GMT Call-ID: [email protected] Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled Timestamp: 731612207 Content-Length: 0 CSeq: 101 BYE *Mar *Mar *Mar *Mar *Mar 6 6 6 6 6 14:10:50: Queued event From SIP SPI to CCAPI/DNS : SIPSPI_EV_CC_CALL_DISCONNECT 14:10:50: CCSIP-SPI-CONTROL: act_disconnecting_disconnect 14:10:50: CCSIP-SPI-CONTROL: sipSPICallCleanup 14:10:50: Queued event from SIP SPI : SIPSPI_EV_CLOSE_CONNECTION 14:10:50: CLOSE CONNECTION TO CONNID:1
*Mar 6 14:10:50: sipSPIIcpifUpdate :CallState: 4 Playout: 1755 DiscTime:48305031 ConnTime 48304651 *Mar 6 14:10:50: 0x624CFEF8 : State change from (STATE_DISCONNECTING, SUBSTATE_NONE) (STATE_DEAD, SUBSTATE_NONE) *Mar 6 14:10:50: The Call Setup Information is : Call Control Block (CCB) : 0x624CFEF8 State of The Call : STATE_DEAD TCP Sockets Used : NO Calling Number : 3660110 Called Number : 3660210 Negotiated Codec : g711ulaw Source IP Address (Media): 166.34.245.230 Source IP Port (Media): 20208 Destn IP Address (Media): 166.34.245.231 Destn IP Port (Media): 20038 Destn SIP Addr (Control) : 166.34.245.231 Destn SIP Port (Control) : 5060 Destination Name : 166.34.245.231 *Mar 6 14:10:50: Disconnect Cause (CC) Disconnect Cause (SIP) : 16 : 200 to
DB-274
December 2010
*Mar 6 14:10:50: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote port: 5060
The following example displays debut output from the other side of the call:
Router# debug ccsip all All SIP call tracing enabled 3660-2# *Mar 8 17:36:40: Received: INVITE sip:[email protected];user=phone;phone-context=unknown SIP/2.0 Via: SIP/2.0/UDP 166.34.245.230:54113 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown> Date: Sat, 06 Mar 1993 19:10:42 GMT Call-ID: [email protected] Cisco-Guid: 2881152943-2184249548-0-483039712 User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled CSeq: 101 INVITE Max-Forwards: 6 Timestamp: 731427042 Contact: <sip:[email protected]:5060;user=phone> Expires: 180 Content-Type: application/sdp Content-Length: 137 v=0 o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230 s=SIP Call t=0 0 c=IN IP4 166.34.245.230 m=audio 20208 RTP/AVP 0 *Mar 8 17:36:40: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.230:54113 *Mar 8 17:36:40: CCSIP-SPI-CONTROL: sipSPISipIncomingCall *Mar 8 17:36:40: 0x624D8CCC : State change from (STATE_NONE, SUBSTATE_NONE) (STATE_IDLE, SUBSTATE_NONE) *Mar 8 17:36:40: CCSIP-SPI-CONTROL: act_idle_new_message *Mar 8 17:36:40: CCSIP-SPI-CONTROL: sact_idle_new_message_invite *Mar 8 17:36:40: CCSIP-SPI-CONTROL: sip_stats_method *Mar 8 17:36:40: sact_idle_new_message_invite:Not Using Voice Class Codec
to
*Mar 8 17:36:40: sact_idle_new_message_invite: Preferred codec[0] type: g711ulaw Bytes :160 *Mar 8 17:36:40: sact_idle_new_message_invite: Media Negotiation successful for an incoming call *Mar 8 17:36:40: sact_idle_new_message_invite: Negotiated Codec :160 Preferred Codec : g711ulaw, bytes :160 *Mar *Mar *Mar : g711ulaw, bytes
8 17:36:40: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE 8 17:36:40: CCSIP-SPI-CONTROL: sip_stats_status_code 8 17:36:40: Num of Contact Locations 1 3660110 166.34.245.230 5060 to
*Mar 8 17:36:40: 0x624D8CCC : State change from (STATE_IDLE, SUBSTATE_NONE) (STATE_RECD_INVITE, SUBSTATE_RECD_INVITE_CALL_SETUP) *Mar 8 17:36:40: Sent: SIP/2.0 100 Trying Via: SIP/2.0/UDP 166.34.245.230:54113 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown> Date: Mon, 08 Mar 1993 22:36:40 GMT
DB-275
Call-ID: [email protected] Timestamp: 731427042 Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled CSeq: 101 INVITE Content-Length: 0 *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar 8 8 8 8 8 8 8 8 8 8 17:36:40: 17:36:40: 17:36:40: 17:36:40: 17:36:40: 17:36:40: 17:36:40: 17:36:40: 17:36:40: 17:36:40: Queued event From SIP SPI to CCAPI/DNS : SIPSPI_EV_CC_CALL_PROCEEDING CCSIP-SPI-CONTROL: act_recdinvite_proceeding Queued event From SIP SPI to CCAPI/DNS : SIPSPI_EV_CC_CALL_ALERTING CCSIP-SPI-CONTROL: ccsip_caps_ind ccsip_caps_ind: codec(negotiated) = 5(Bytes 160) ccsip_caps_ind: Load DSP with codec (5) g711ulaw, Bytes=160 ccsip_caps_ind: set DSP for dtmf-relay = CC_CAP_DTMF_RELAY_INBAND_VOICE CCSIP-SPI-CONTROL: ccsip_caps_ack CCSIP-SPI-CONTROL: act_recdinvite_alerting 180 Ringing with SDP - not likely
*Mar 8 17:36:40: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE *Mar 8 17:36:40: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 8 17:36:40: 0x624D8CCC : State change from (STATE_RECD_INVITE, SUBSTATE_RECD_INVITE_CALL_SETUP) to (STATE_SENT_ALERTING, SUBSTATE_NONE) *Mar 8 17:36:40: Sent: SIP/2.0 180 Ringing Via: SIP/2.0/UDP 166.34.245.230:54113 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown> Date: Mon, 08 Mar 1993 22:36:40 GMT Call-ID: [email protected] Timestamp: 731427042 Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled CSeq: 101 INVITE Content-Type: application/sdp Content-Length: 137 v=0 o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231 s=SIP Call t=0 0 c=IN IP4 166.34.245.231 m=audio 20038 RTP/AVP 0 *Mar 8 17:36:44: Queued event From SIP SPI to CCAPI/DNS : SIPSPI_EV_CC_CALL_CONNECT *Mar 8 17:36:44: CCSIP-SPI-CONTROL: act_sentalert_connect *Mar 8 17:36:44: sipSPIAddLocalContact *Mar 8 17:36:44: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE *Mar 8 17:36:44: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 8 17:36:44: 0x624D8CCC : State change from (STATE_SENT_ALERTING, SUBSTATE_NONE) (STATE_SENT_SUCCESS, SUBSTATE_NONE) *Mar 8 17:36:44: Sent: SIP/2.0 200 OK Via: SIP/2.0/UDP 166.34.245.230:54113 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7F Date: Mon, 08 Mar 1993 22:36:40 GMT Call-ID: [email protected] Timestamp: 731427042 Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled Contact: <sip:[email protected]:5060;user=phone> CSeq: 101 INVITE Content-Type: application/sdp Content-Length: 137 v=0 o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231
to
DB-276
December 2010
s=SIP Call t=0 0 c=IN IP4 166.34.245.231 m=audio 20038 RTP/AVP 0 *Mar 8 17:36:44: Received: ACK sip:[email protected]:5060;user=phone SIP/2.0 Via: SIP/2.0/UDP 166.34.245.230:54113 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7F Date: Sat, 06 Mar 1993 19:10:42 GMT Call-ID: [email protected] Max-Forwards: 6 Content-Type: application/sdp Content-Length: 137 CSeq: 101 ACK v=0 o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230 s=SIP Call t=0 0 c=IN IP4 166.34.245.230 m=audio 20208 RTP/AVP 0 *Mar 8 17:36:44: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.230:54113 *Mar 8 17:36:44: CCSIP-SPI-CONTROL: act_sentsucc_new_message *Mar 8 17:36:44: CCSIP-SPI-CONTROL: sip_stats_method *Mar 8 17:36:44: 0x624D8CCC : State change from (STATE_SENT_SUCCESS, SUBSTATE_NONE) (STATE_ACTIVE, SUBSTATE_NONE) *Mar 8 17:36:44: The Call Setup Information is : Call Control Block (CCB) : 0x624D8CCC State of The Call : STATE_ACTIVE TCP Sockets Used : NO Calling Number : 3660110 Called Number : 3660210 Negotiated Codec : g711ulaw Source IP Address (Media): 166.34.245.231 Source IP Port (Media): 20038 Destn IP Address (Media): 166.34.245.230 Destn IP Port (Media): 20208 Destn SIP Addr (Control) : 166.34.245.230 Destn SIP Port (Control) : 5060 Destination Name : 166.34.245.230 *Mar 8 17:36:47: Queued event From *Mar 8 17:36:47: CCSIP-SPI-CONTROL: *Mar 8 17:36:47: Queued event from *Mar 8 17:36:47: 0x624D8CCC : State (STATE_ACTIVE, SUBSTATE_CONNECTING) *Mar 8 17:36:47: REQUEST CONNECTION SIP SPI to CCAPI/DNS : SIPSPI_EV_CC_CALL_DISCONNECT act_active_disconnect SIP SPI : SIPSPI_EV_CREATE_CONNECTION change from (STATE_ACTIVE, SUBSTATE_NONE) to TO IP:166.34.245.230 PORT:5060
to
*Mar 8 17:36:47: 0x624D8CCC : State change from (STATE_ACTIVE, SUBSTATE_CONNECTING) to (STATE_ACTIVE, SUBSTATE_CONNECTING) *Mar 8 17:36:47: CCSIP-SPI-CONTROL: act_active_connection_created *Mar 8 17:36:47: CCSIP-SPI-CONTROL: sipSPICheckSocketConnection *Mar 8 17:36:47: CCSIP-SPI-CONTROL: sipSPICheckSocketConnection: Connid(1) created to 166.34.245.230:5060, local_port 54835 *Mar 8 17:36:47: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE *Mar 8 17:36:47: CCSIP-SPI-CONTROL: sip_stats_method *Mar 8 17:36:47: 0x624D8CCC : State change from (STATE_ACTIVE, SUBSTATE_CONNECTING) to (STATE_DISCONNECTING, SUBSTATE_NONE) *Mar 8 17:36:47: Sent:
DB-277
BYE sip:[email protected]:5060;user=phone SIP/2.0 Via: SIP/2.0/UDP 166.34.245.231:54835 From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7F To: "3660110" <sip:[email protected]> Date: Mon, 08 Mar 1993 22:36:44 GMT Call-ID: [email protected] User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled Max-Forwards: 6 Timestamp: 731612207 CSeq: 101 BYE Content-Length: 0
*Mar 8 17:36:47: Received: SIP/2.0 200 OK Via: SIP/2.0/UDP 166.34.245.231:54835 From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7F To: "3660110" <sip:[email protected]> Date: Sat, 06 Mar 1993 19:10:50 GMT Call-ID: [email protected] Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled Timestamp: 731612207 Content-Length: 0 CSeq: 101 BYE
*Mar 8 17:36:47: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.230:54113 *Mar 8 17:36:47: CCSIP-SPI-CONTROL: act_disconnecting_new_message *Mar 8 17:36:47: CCSIP-SPI-CONTROL: sact_disconnecting_new_message_response *Mar 8 17:36:47: CCSIP-SPI-CONTROL: sipSPICheckResponse *Mar 8 17:36:47: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 8 17:36:47: Roundtrip delay 4 milliseconds for method BYE *Mar *Mar *Mar 8 17:36:47: CCSIP-SPI-CONTROL: sipSPICallCleanup 8 17:36:47: Queued event from SIP SPI : SIPSPI_EV_CLOSE_CONNECTION 8 17:36:47: CLOSE CONNECTION TO CONNID:1
*Mar 8 17:36:47: sipSPIIcpifUpdate :CallState: 4 Playout: 1265 DiscTime:66820800 ConnTime 66820420 *Mar 8 17:36:47: 0x624D8CCC : State change from (STATE_DISCONNECTING, SUBSTATE_NONE) (STATE_DEAD, SUBSTATE_NONE) *Mar 8 17:36:47: The Call Setup Information is : Call Control Block (CCB) : 0x624D8CCC State of The Call : STATE_DEAD TCP Sockets Used : NO Calling Number : 3660110 Called Number : 3660210 Negotiated Codec : g711ulaw Source IP Address (Media): 166.34.245.231 Source IP Port (Media): 20038 Destn IP Address (Media): 166.34.245.230 Destn IP Port (Media): 20208 Destn SIP Addr (Control) : 166.34.245.230 Destn SIP Port (Control) : 5060 Destination Name : 166.34.245.230 *Mar 8 17:36:47: Disconnect Cause (CC) Disconnect Cause (SIP) : 16 : 200 to
DB-278
December 2010
*Mar 8 17:36:47: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote port: 5060
Related Commands
Command debug ccsip calls debug ccsip error debug ccsip events debug ccsip info debug ccsip states
Description Shows all SIP SPI call tracing. Shows SIP SPI errors. Shows all SIP SPI events tracing. Shows all SIP SPI message tracing. Shows all SIP SPI state tracing.
DB-279
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
This command was introduced. The output of this command was changed. Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways. This command was introduced on the Cisco AS5850 universal gateway. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on Cisco 7200 series routers. This command was integrated into Cisco IOS Release 12.2(11)T. Support for the Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, and Cisco AS5850 universal gateway is not included in this release. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
This command traces the SIP call details as they are updated in the SIP call control block.
Examples
The following example displays debug output from one side of the call:
Router1# debug ccsip calls SIP Call statistics tracing is enabled Router1# *Mar 6 14:12:33: The Call Setup Information is : Call Control Block (CCB) : 0x624D078C State of The Call : STATE_ACTIVE
DB-280
December 2010
TCP Sockets Used : Calling Number : Called Number : Negotiated Codec : Source IP Address (Media): Source IP Port (Media): Destn IP Address (Media): Destn IP Port (Media): Destn SIP Addr (Control) : Destn SIP Port (Control) : Destination Name : *Mar
NO 3660110 3660210 g711ulaw 166.34.245.230 20644 166.34.245.231 20500 166.34.245.231 5060 166.34.245.231
6 14:12:40: The Call Setup Information is : Call Control Block (CCB) : 0x624D078C State of The Call : STATE_DEAD TCP Sockets Used : NO Calling Number : 3660110 Called Number : 3660210 Negotiated Codec : g711ulaw Source IP Address (Media): 166.34.245.230 Source IP Port (Media): 20644 Destn IP Address (Media): 166.34.245.231 Destn IP Port (Media): 20500 Destn SIP Addr (Control) : 166.34.245.231 Destn SIP Port (Control) : 5060 Destination Name : 166.34.245.231
*Mar
The following example displays debug output from the other side of the call:
Router2# debug ccsip calls SIP Call statistics tracing is enabled Router2# *Mar 8 17:38:31: The Call Setup Information is : Call Control Block (CCB) : 0x624D9560 State of The Call : STATE_ACTIVE TCP Sockets Used : NO Calling Number : 3660110 Called Number : 3660210 Negotiated Codec : g711ulaw Source IP Address (Media): 166.34.245.231 Source IP Port (Media): 20500 Destn IP Address (Media): 166.34.245.230 Destn IP Port (Media): 20644 Destn SIP Addr (Control) : 166.34.245.230 Destn SIP Port (Control) : 5060 Destination Name : 166.34.245.230 *Mar 8 17:38:38: The Call Setup Information is: Call Control Block (CCB) : 0x624D9560 State of The Call : STATE_DEAD TCP Sockets Used : NO Calling Number : 3660110 Called Number : 3660210 Negotiated Codec : g711ulaw Source IP Address (Media): 166.34.245.231
DB-281
Source IP Port (Media): Destn IP Address (Media): Destn IP Port (Media): Destn SIP Addr (Control) : Destn SIP Port (Control) : Destination Name : *Mar 8 17:38:38: Disconnect Cause (CC) Disconnect Cause (SIP)
: 16 : 200
Related Commands
Command debug ccsip all debug ccsip error debug ccsip events debug ccsip info debug ccsip states
Description Enables all SIP-related debugging. Shows SIP SPI errors. Shows all SIP SPI events tracing. Shows all SIP SPI message tracing. Shows all SIP SPI state tracing.
DB-282
December 2010
Syntax Description
Command Modes
Command History
12.4(22)YB 15.0(1)M
This command was introduced. This command was integrated in Cisco IOS Release 15.0(1)M.
Usage Guidelines
The debug ccsip dhcp command can be enabled by executing the command itself or by issuing the debug ccsip all command.
Examples
The following example displays debug output from the debug ccsip dhcp command:
Router# debug ccsip dhcp Nov 18 17:20:48.881: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_register_configured_dest_patterns: No destination patterns to Register Nov 18 17:20:48.881: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_spi_register_free_rcb: Freeing rcb Nov 18 17:20:48.881: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_register_reset_dns_cache: CCSIP_REGISTER:: Primary registrar DNS resolved addr reset Nov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/config_credential_trigger_reg: Query DHCP for provisioned info upon credential dhcp config Nov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/sipua_query_dhcp_reg_info: DHCP provisioned option 125 available Nov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: parsing data in option 125 of length 73 Nov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: enterprise ID 210 Nov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: total option data length 80 Nov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-option type 201 of length 6 Nov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_macaddr: MAC addr 1234567890AB Nov 18 17:21:00.969: Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-option type 202 of length 6 Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_contract_num: pilot # 777777
DB-283
Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-option type 203 of length 6 Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_addn_num: secondary # 222222 (index 0) Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-option type 203 of length 6 Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_addn_num: secondary # 333333 (index 1) Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-option type 203 of length 6 Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_addn_num: secondary # 444444 (index 2) Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-option type 203 of length 6 Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_addn_num: secondary # 555555 (index 3) Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-option type 203 of length 6 Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_addn_num: secondary # 666666 (index 4) Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-option type 204 of length 14 Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_domain: domain sublen 5 Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_domain: domain sublen 3 Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_domain: domain dns:cisco.com Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: parsing of DHCP option 125 succeeded Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/sipua_query_dhcp_reg_info: DHCP provisioned SIP server addr: 9.13.2.36 Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_register_cred_user: Sending msg type 2 to register process from parser for user 777777 Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_spi_register_process_e164_registration: CCSIP_REGISTER:: e164 number (777777) Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_register_search_e164_table: ****No entry found in E164 Table Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/sipSPIAddContextToTable: Added context(0x476FD758) with key=[1061] to table Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/sipSPIGetOutboundHostAndDestHostPrivate: CCSIP: target_host : cisco.com target_port : 5060 Nov 18 17:21:00.969: //-1/000000000000/SIP/Info/sipSPIValidateAndCopyOutboundHost: CCSIP: copy target_host to outbound_host Nov 18 17:21:00.969: //-1/000000000000/SIP/State/sipSPIChangeState: 0x476FD758 : State change from (STATE_NONE, SUBSTATE_NONE) to (STATE_IDLE, SUBSTATE_NONE) Nov 18 17:21:00.969: //-1/000000000000/SIP/Info/ccsip_spi_registrar_add_expires_header: Inside ccsip_spi_registrar_add_expires_header for Expires Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Event/sipSPIEventInfo: Queued event from SIP SPI : SIPSPI_EV_OUTBOUND_REGISTER Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_register_add_to_e164_table: ****Added to E164 Table Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_process_sipspi_queue_event: ccsip_spi_get_msg_type returned: 3 for event 40 Nov 18 17:21:00.969: //-1/000000000000/SIP/Info/act_idle_outgoing_register: In act_idle_outgoing_register Nov 18 17:21:00.969: //1034/000000000000/SIP/Info/act_idle_outgoing_register: REGISTER to cisco.com:5060 Send
DB-284
December 2010
Nov 18 17:21:00.969: //1034/000000000000/SIP/Info/sipSPIUaddCcbToTable: Added to table. ccb=0x476FD758 key=1AF6E28A-B4CC11DD-81078B9C-6E99E02B Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Event/sipSPIEventInfo: Queued event from SIP SPI : SIPSPI_EV_DNS_RESOLVE Nov 18 17:21:00.969: //1034/000000000000/SIP/State/sipSPIChangeState: 0x476FD758 : State change from (STATE_IDLE, SUBSTATE_NONE) to (STATE_IDLE, SUBSTATE_SENT_DNS) Nov 18 17:21:00.969: //1034/000000000000/SIP/State/sipSPIChangeState: 0x476FD758 : State change from (STATE_IDLE, SUBSTATE_SENT_DNS) to (SIP_STATE_OUTGOING_REGISTER, SUBSTATE_SENT_DNS) Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/sip_dns_type_srv_query: TYPE SRV query for _sip._udp.cisco.com and type:1 Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/sip_dns_type_a_aaaa_query: DNS query for cisco.com and type:1 Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/sip_dns_type_a_query: TYPE A query successful for cisco.com Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/sip_dns_type_a_aaaa_query: IP Address of cisco.com is: Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/sip_dns_type_a_aaaa_query: 9.13.2.36 Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_process_sipspi_queue_event: ccsip_spi_get_msg_type returned: 2 for event 43 Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_register_set_dns_resolved_address: CCSIP_REGISTER:: Primary registrar DNS resolved addr set to 0.0.0.1:151847460 Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/ccsipRegisterStartExpiresTimer: Starting timer for pattern for 3600 seconds Nov 18 17:21:00.977: //1034/000000000000/SIP/State/sipSPIChangeState: 0x476FD758 : State change from (SIP_STATE_OUTGOING_REGISTER, SUBSTATE_SENT_DNS) to (SIP_STATE_OUTGOING_REGISTER, SUBSTATE_NONE) Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/sipSPISetDateHeader: Clock Time Zone is UTC, same as GMT: Using GMT Nov 18 17:21:00.981: //1034/000000000000/SIP/Info/sipSPISendRegister: Associated container=0x46794ACC to Register Nov 18 17:21:00.981: //1034/000000000000/SIP/Transport/sipSPISendRegister: Sending REGISTER to the transport layer Nov 18 17:21:00.981: //1034/000000000000/SIP/Transport/sipSPIGetSwitchTransportFlag: Return the Dial peer configuration, Switch Transport is FALSE Nov 18 17:21:00.981: //1034/000000000000/SIP/Transport/sipSPITransportSendMessage: msg=0x4707F998, addr=9.13.2.36, port=5060, sentBy_port=0, is_req=1, transport=1, switch=0, callBack=0x415A53B0 Nov 18 17:21:00.981: //1034/000000000000/SIP/Transport/sipSPITransportSendMessage: Proceedable for sending msg immediately Nov 18 17:21:00.981: //1034/000000000000/SIP/Transport/sipTransportLogicSendMsg: switch transport is 0 Nov 18 17:21:00.981: //1034/000000000000/SIP/Transport/sipTransportLogicSendMsg: Set to send the msg=0x4707F998 Nov 18 17:21:00.981: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportPostSendMessage: Posting send for msg=0x4707F998, addr=9.13.2.36, port=5060, connId=2 for UDP Nov 18 17:21:00.981: //1034/000000000000/SIP/State/sipSPIChangeState: 0x476FD758 : State change from (SIP_STATE_OUTGOING_REGISTER, SUBSTATE_NONE) to (SIP_STATE_OUTGOING_REGISTER, SUBSTATE_NONE) Nov 18 17:21:00.981: //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg: Sent: REGISTER sip:cisco.com:5060 SIP/2.0 Date: Tue, 18 Nov 2008 17:21:00 GMT From: <sip:[email protected]>;tag=34FBAED8-131 Supported: path Timestamp: 1227028860 Content-Length: 0 User-Agent: Cisco-SIPGateway/IOS-12.x To: <sip:[email protected]> Contact: <sip:[email protected]:5060> Expires: 3600 Call-ID: 1AF6E28A-B4CC11DD-81078B9C-6E99E02B
DB-285
Nov 18 17:21:00.981: //-1/xxxxxxxxxxxx/SIP/Info/HandleUdpIPv4SocketReads: Msg enqueued for SPI with IP addr: [9.13.2.36]:56305 Nov 18 17:21:00.981: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_process_sipspi_queue_event: ccsip_spi_get_msg_type returned: 2 for event 1 Nov 18 17:21:00.981: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportProcessNWNewConnMsg: context=0x00000000 Nov 18 17:21:00.985: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_new_msg_preprocessor: Checking Invite Dialog Nov 18 17:21:00.985: //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg: Received: SIP/2.0 100 Trying Via: SIP/2.0/UDP 9.13.8.183:5060;received=9.13.8.183;branch=z9hG4bK3F522D9 Call-ID: 1AF6E28A-B4CC11DD-81078B9C-6E99E02B From: <sip:[email protected]>;tag=34FBAED8-131 To: <sip:[email protected]> CSeq: 2 REGISTER Content-Length: 0
Nov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Info/HandleUdpIPv4SocketReads: Msg enqueued for SPI with IP addr: [9.13.2.36]:56306 Nov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_process_sipspi_queue_event: ccsip_spi_get_msg_type returned: 2 for event 1 Nov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportProcessNWNewConnMsg: context=0x00000000 Nov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_new_msg_preprocessor: Checking Invite Dialog Nov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg: Received: SIP/2.0 200 OK Via: SIP/2.0/UDP 9.13.8.183:5060;received=9.13.8.183;branch=z9hG4bK3F522D9 Call-ID: 1AF6E28A-B4CC11DD-81078B9C-6E99E02B From: <sip:[email protected]>;tag=34FBAED8-131 To: <sip:[email protected]> CSeq: 2 REGISTER Contact: <sip:[email protected]:5060>;expires=3600 Content-Length: 0
Nov 18 17:21:01.077: //1034/000000000000/SIP/Info/ccsip_gw_register_process_response: No P-Assoicated-URI present in Register Response Nov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Info/ccsipRegisterStartExpiresTimer: Starting timer for pattern 777777 for 2880 seconds Nov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Info/sipSPIDeleteContextFromTable: Context for key=[1061] removed. Nov 18 17:21:01.077: //1034/000000000000/SIP/Info/sipSPIUdeleteCcbFromUACTable: ****Deleting from UAC table. Nov 18 17:21:01.077: //1034/000000000000/SIP/Info/sipSPIUdeleteCcbFromTable: Deleting from table. ccb=0x476FD758 key=1AF6E28A-B4CC11DD-81078B9C-6E99E02B Nov 18 17:21:01.077: //1034/000000000000/SIP/Info/sipSPIFlushEventBufferQueue: There are 0 events on the internal queue that are going to be free'd Nov 18 17:21:01.077: //1034/000000000000/SIP/Info/ccsip_qos_cleanup: Entry Nov 18 17:21:01.077: //1034/000000000000/SIP/Info/sipSPI_ipip_free_codec_profile: Codec Profiles Freed Nov 18 17:21:01.077: //1034/000000000000/SIP/Info/sipSPIUfreeOneCCB: Freeing ccb 476FD758 Nov 18 17:21:01.081: //-1/xxxxxxxxxxxx/SIP/Info/sipSPIGetContextFromTable: NO context for key[1061] Nov 18 17:21:02.761: %SYS-5-CONFIG_I: Configured from console by console CUBE-DHCP-CLIENT1#
DB-286
December 2010
Related Commands
Command debug ccsip all debug ccsip calls debug ccsip error debug ccsip events debug ccsip in debug ccsip states
Description Enables all SIP-related debugging Displays all SIP SPI call tracing. Displays SIP SPI errors. Displays all SIP SPI events tracing. Displays all SIP SPI message tracing. Displays all SIP SPI state tracing.
DB-287
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
This command was introduced. Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways. This command was implemented on the Cisco AS5850 universal gateway. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on Cisco 7200 series routers. This command was integrated into Cisco IOS Release 12.2(11)T. Support for the Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, and Cisco AS5850 universal gateway is not included in this release. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
This command traces all error messages generated from errors encountered by the SIP subsystem.
Examples
The following example displays debug output from one side of the call:
Router1# debug ccsip error SIP Call error tracing is enabled Router1# *Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_idle_call_setup *Mar 6 14:16:41: act_idle_call_setup:Not using Voice Class Codec *Mar *Mar 6 14:16:41: act_idle_call_setup: preferred_codec set[0] type :g711ulaw bytes: 160 6 14:16:41: REQUEST CONNECTION TO IP:166.34.245.231 PORT:5060
DB-288
December 2010
*Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_idle_connection_created *Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_idle_connection_created: Connid(1) created to 166.34.245.231:5060, local_port 55674 *Mar 6 14:16:41: sipSPIAddLocalContact *Mar 6 14:16:41: CCSIP-SPI-CONTROL: sip_stats_method *Mar 6 14:16:41: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060 *Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_sentinvite_new_message *Mar 6 14:16:41: CCSIP-SPI-CONTROL: sipSPICheckResponse *Mar 6 14:16:41: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 6 14:16:41: Roundtrip delay 4 milliseconds for method INVITE *Mar 6 14:16:41: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060 *Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_recdproc_new_message *Mar 6 14:16:41: CCSIP-SPI-CONTROL: sipSPICheckResponse *Mar 6 14:16:41: CCSIP-SPI-CONTROL: sipSPICheckResponse : Updating session description *Mar 6 14:16:41: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 6 14:16:41: Roundtrip delay 8 milliseconds for method INVITE *Mar 6 14:16:41: HandleSIP1xxRinging: SDP MediaTypes negotiation successful! Negotiated Codec : g711ulaw , bytes :160 Inband Alerting : 0 *Mar 6 14:16:45: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060 *Mar 6 14:16:45: CCSIP-SPI-CONTROL: act_recdproc_new_message *Mar 6 14:16:45: CCSIP-SPI-CONTROL: sipSPICheckResponse *Mar 6 14:16:45: CCSIP-SPI-CONTROL: sipSPICheckResponse : Updating session description *Mar 6 14:16:45: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 6 14:16:45: Roundtrip delay 3844 milliseconds for method INVITE *Mar 6 14:16:45: CCSIP-SPI-CONTROL: act_recdproc_new_message: SDP MediaTypes negotiation successful! Negotiated Codec : g711ulaw , bytes :160 *Mar 6 14:16:45: CCSIP-SPI-CONTROL: sipSPIReconnectConnection *Mar 6 14:16:45: CCSIP-SPI-CONTROL: recv_200_OK_for_invite *Mar 6 14:16:45: CCSIP-SPI-CONTROL: sip_stats_method *Mar 6 14:16:45: HandleUdpReconnection: Udp socket connected for fd: 1 with 166.34.245.231:5060 *Mar 6 14:16:45: CCSIP-SPI-CONTROL: ccsip_caps_ind *Mar 6 14:16:45: ccsip_caps_ind: Load DSP with codec (5) g711ulaw, Bytes=160 *Mar 6 14:16:45: ccsip_caps_ind: set DSP for dtmf-relay = CC_CAP_DTMF_RELAY_INBAND_VOICE *Mar 6 14:16:45: CCSIP-SPI-CONTROL: ccsip_caps_ack *Mar 6 14:16:49: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:56101 *Mar 6 14:16:49: CCSIP-SPI-CONTROL: act_active_new_message *Mar 6 14:16:49: CCSIP-SPI-CONTROL: sact_active_new_message_request *Mar 6 14:16:49: CCSIP-SPI-CONTROL: sip_stats_method *Mar 6 14:16:49: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 6 14:16:49: CCSIP-SPI-CONTROL: sipSPIInitiateCallDisconnect : Initiate call disconnect(16) for outgoing call *Mar 6 14:16:49: CCSIP-SPI-CONTROL: act_disconnecting_disconnect *Mar 6 14:16:49: CCSIP-SPI-CONTROL: sipSPICallCleanup *Mar 6 14:16:49: CLOSE CONNECTION TO CONNID:1 *Mar 6 14:16:49: sipSPIIcpifUpdate :CallState: 4 Playout: 2945 DiscTime:48340988 ConnTime 48340525 *Mar 6 14:16:49: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote port: 5060
DB-289
The following example displays debug output from the other side of the call:
Router2# debug ccsip error SIP Call error tracing is enabled Router2# *Mar 8 17:42:39: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.230:55674 *Mar 8 17:42:39: CCSIP-SPI-CONTROL: sipSPISipIncomingCall *Mar 8 17:42:39: CCSIP-SPI-CONTROL: act_idle_new_message *Mar 8 17:42:39: CCSIP-SPI-CONTROL: sact_idle_new_message_invite *Mar 8 17:42:39: CCSIP-SPI-CONTROL: sip_stats_method *Mar 8 17:42:39: sact_idle_new_message_invite:Not Using Voice Class Codec *Mar 8 17:42:39: sact_idle_new_message_invite: Preferred codec[0] type: g711ulaw Bytes :160 *Mar 8 17:42:39: sact_idle_new_message_invite: Media Negotiation successful for an incoming call *Mar 8 17:42:39: sact_idle_new_message_invite: Negotiated Codec :160 Preferred Codec : g711ulaw, bytes :160 *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar : g711ulaw, bytes
8 17:42:39: CCSIP-SPI-CONTROL: sip_stats_status_code 8 17:42:39: Num of Contact Locations 1 3660110 166.34.245.230 5060 8 8 8 8 8 8 8 8 17:42:39: 17:42:39: 17:42:39: 17:42:39: 17:42:39: 17:42:39: 17:42:39: 17:42:39: CCSIP-SPI-CONTROL: act_recdinvite_proceeding CCSIP-SPI-CONTROL: ccsip_caps_ind ccsip_caps_ind: codec(negotiated) = 5(Bytes 160) ccsip_caps_ind: Load DSP with codec (5) g711ulaw, Bytes=160 ccsip_caps_ind: set DSP for dtmf-relay = CC_CAP_DTMF_RELAY_INBAND_VOICE CCSIP-SPI-CONTROL: ccsip_caps_ack CCSIP-SPI-CONTROL: act_recdinvite_alerting 180 Ringing with SDP - not likely
*Mar 8 17:42:39: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 8 17:42:42: CCSIP-SPI-CONTROL: act_sentalert_connect *Mar 8 17:42:42: sipSPIAddLocalContact *Mar 8 17:42:42: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 8 17:42:42: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.230:55674 *Mar 8 17:42:42: CCSIP-SPI-CONTROL: act_sentsucc_new_message *Mar 8 17:42:42: CCSIP-SPI-CONTROL: sip_stats_method *Mar 8 17:42:47: CCSIP-SPI-CONTROL: act_active_disconnect *Mar 8 17:42:47: REQUEST CONNECTION TO IP:166.34.245.230 PORT:5060 *Mar 8 17:42:47: CCSIP-SPI-CONTROL: act_active_connection_created *Mar 8 17:42:47: CCSIP-SPI-CONTROL: sipSPICheckSocketConnection *Mar 8 17:42:47: CCSIP-SPI-CONTROL: sipSPICheckSocketConnection: Connid(1) created to 166.34.245.230:5060, local_port 56101 *Mar 8 17:42:47: CCSIP-SPI-CONTROL: sip_stats_method *Mar 8 17:42:47: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.230:55674 *Mar 8 17:42:47: CCSIP-SPI-CONTROL: act_disconnecting_new_message *Mar 8 17:42:47: CCSIP-SPI-CONTROL: sact_disconnecting_new_message_response *Mar 8 17:42:47: CCSIP-SPI-CONTROL: sipSPICheckResponse *Mar 8 17:42:47: CCSIP-SPI-CONTROL: sip_stats_status_code *Mar 8 17:42:47: Roundtrip delay 0 milliseconds for method BYE *Mar *Mar 8 17:42:47: CCSIP-SPI-CONTROL: sipSPICallCleanup 8 17:42:47: CLOSE CONNECTION TO CONNID:1
DB-290
December 2010
*Mar 8 17:42:47: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote port: 5060
Related Commands
Command debug ccsip all debug ccsip calls debug ccsip events debug ccsip info debug ccsip states
Description Enables all SIP-related debugging. Shows all SIP SPI call tracing. Shows all SIP SPI events tracing. Shows all SIP SPI message tracing. Shows all SIP SPI state tracing.
DB-291
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
This command was introduced. Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways. This command was introduced on the Cisco AS5850 universal gateway. This command was integrated into Cisco IOS Release 12.2(11)T. Much of the information formerly found in the output of the debug ccsip events command is now reported in the output of the debug ccsip info and debug ccsip media commands. The debug ccsip events command now displays only the debugging information specifically related to SIP events. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
This command previously traced all events posted to Session Initiation Protocol (SIP) SPI from all interfaces and also provided general SIP SPI information. Beginning with Cisco IOS Release 12.2(15)T, the debug ccsip events command displays only debugging information specifically related to SIP SPI events. Media stream and SIP SPI information is now reported in the debug ccsip media and debug ccsip info command output.
Note
DB-292
December 2010
Examples
The following is sample output from the debug ccsip events command for a Cisco 3660:
Router# debug ccsip events SIP Call events tracing is enabled Router# Nov 15 18:20:25.779: Queued event from Nov 15 18:20:25.779: Queued event from Nov 15 18:20:25.783: Queued event from Nov 15 18:20:25.815: Queued event from Nov 15 18:20:25.819: Queued event from Nov 15 18:20:28.339: Queued event from Nov 15 18:20:28.339: Queued event from Nov 15 18:20:50.844: Queued event from Nov 15 18:20:50.844: Queued event from Nov 15 18:20:50.848: Queued event from
SIP SIP SIP SIP SIP SIP SIP SIP SIP SIP
SPI SPI SPI SPI SPI SPI SPI SPI SPI SPI
: : : : : : : : : :
SIPSPI_EV_CC_CALL_SETUP SIPSPI_EV_CREATE_CONNECTION SIPSPI_EV_SEND_MESSAGE SIPSPI_EV_CREATE_CONNECTION SIPSPI_EV_SEND_MESSAGE SIPSPI_EV_CLOSE_CONNECTION SIPSPI_EV_SEND_MESSAGE SIPSPI_EV_CLOSE_CONNECTION SIPSPI_EV_SEND_MESSAGE SIPSPI_EV_CC_CALL_DISCONNECT
Related Commands
Command debug ccsip all debug ccsip info debug ccsip media
Description Enables all SIP-related debugging. Enables tracing of general SIP SPI information. Enables tracing of SIP call media streams.
DB-293
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Beginning in Cisco IOS Release 12.2(15)T, the debug ccsip info command is a separate option that displays general SIP SPI information for debug purposes. In past releases, this output was part of the debug ccsip events command.
Note
Examples
The following is sample output from the debug ccsip info command for a Cisco 3660:
Router# debug ccsip info SIP Call info tracing is enabled Router# Nov 15 18:19:22.670: ****Adding to UAC table Nov 15 18:19:22.670: adding call id E to table Nov 15 18:19:22.670: CCSIP-SPI-CONTROL: act_idle_call_setup Nov 15 18:19:22.670: act_idle_call_setup:Not using Voice Class Codec Nov 15 18:19:22.670: act_idle_call_setup: preferred_codec set[0] type :g729r8 bytes: 20 Nov 15 18:19:22.670: sipSPICopyPeerDataToCCB: From CLI: Modem NSE payload = 100, Passthrough = 0,Modem relay = 0, Gw-Xid = 1 SPRT latency 200, SPRT Retries = 12, Dict Size = 1024 String Len = 32, Compress dir = 3 Nov 15 18:19:22.670: ****Deleting from UAC table Nov 15 18:19:22.670: ****Adding to UAC table Nov 15 18:19:22.670: sipSPIUsetBillingProfile: sipCallId for billing records = [email protected] Nov 15 18:19:22.674: CCSIP-SPI-CONTROL: act_idle_connection_created Nov 15 18:19:22.674: CCSIP-SPI-CONTROL: act_idle_connection_created: Connid(1) created to 172.18.193.190:5060, local_port 56981
DB-294
December 2010
Nov 15 18:19:22.674: CCSIP-SPI-CONTROL: sipSPIOutgoingCallSDP Nov 15 18:19:22.674: convert_codec_bytes_to_ptime: Values :Codec: g729r8 codecbytes :20, ptime: 10 Nov 15 18:19:22.674: sip_generate_sdp_xcaps_list: Modem Relay disabled. X-cap not needed Nov 15 18:19:22.674: sipSPIAddLocalContact Nov 15 18:19:22.674: sip_stats_method Nov 15 18:19:22.690: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 172.18.193.190:5060 Nov 15 18:19:22.690: CCSIP-SPI-CONTROL: act_sentinvite_new_message Nov 15 18:19:22.690: CCSIP-SPI-CONTROL: sipSPICheckResponse Nov 15 18:19:22.690: sip_stats_status_code Nov 15 18:19:22.690: Roundtrip delay 16 milliseconds for method INVITE Nov 15 18:19:22.706: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 172.18.193.190:5060 Nov 15 18:19:22.706: CCSIP-SPI-CONTROL: act_recdproc_new_message Nov 15 18:19:22.706: CCSIP-SPI-CONTROL: sipSPICheckResponse Nov 15 18:19:22.706: sip_stats_status_code Nov 15 18:19:22.706: Roundtrip delay 32 milliseconds for method INVITE Nov 15 18:19:22.706: sipSPIGetSdpBody : Parse incoming session description Nov 15 18:19:22.706: HandleSIP1xxSessionProgress: Content-Disposition received in 18x response:session;handling=required Nov 15 18:19:22.706: sipSPIDoMediaNegotiation: number of m lines is 1 Nov 15 18:19:22.706: sipSPIDoAudioNegotiation: Codec (g729r8) Negotiation Successful on Static Payload Nov 15 18:19:22.706: sipSPIDoPtimeNegotiation: One ptime attribute found - value:10 Nov 15 18:19:22.706: convert_ptime_to_codec_bytes: Values :Codec: g729r8 ptime :10, codecbytes: 20 Nov 15 18:19:22.710: convert_codec_bytes_to_ptime: Values :Codec: g729r8 codecbytes :20, ptime: 10 Nov 15 18:19:22.710: sipSPIDoDTMFRelayNegotiation: m-line index 1 Nov 15 18:19:22.710: sipSPIDoDTMFRelayNegotiation: Requested DTMF-RELAY option(s) not found in Preferred DTMF-RELAY option list! Nov 15 18:19:22.710: sip_sdp_get_modem_relay_cap_params: Nov 15 18:19:22.710: sip_sdp_get_modem_relay_cap_params: NSE payload from X-cap = 0 Nov 15 18:19:22.710: sip_do_nse_negotiation: NSE Payload 100 found in SDP Nov 15 18:19:22.710: sip_do_nse_negotiation: Remote NSE payload = local one = 100, Use it Nov 15 18:19:22.710: sip_select_modem_relay_params: X-tmr not present in SDP. Disable modem relay Nov 15 18:19:22.710: sipSPIDoQoSNegotiation - SDP body with media description Nov 15 18:19:22.710: ccsip_process_response_contact_record_route Nov 15 18:19:22.710: CCSIP-SPI-CONTROL: ccsip_bridge: confID = 4, srcCallID = 14, dstCallID = 13 Nov 15 18:19:22.710: sipSPIUupdateCcCallIds: old src/dest ccCallids: -1/-1, new src/dest ccCallids: 14/13 Nov 15 18:19:22.710: sipSPIUupdateCcCallIds: old streamcallid=-1, new streamcallid=14 Nov 15 18:19:22.710: CCSIP-SPI-CONTROL: ccsip_caps_ind Nov 15 18:19:22.710: ccsip_get_rtcp_session_parameters: CURRENT VALUES: stream_callid=14, current_seq_num=0x1B1B Nov 15 18:19:22.710: ccsip_get_rtcp_session_parameters: NEW VALUES: stream_callid=14, current_seq_num=0x180C Nov 15 18:19:22.710: ccsip_caps_ind: Load DSP with negotiated codec : g729r8, Bytes=20 Nov 15 18:19:22.710: ccsip_caps_ind: set forking flag to 0x0 Nov 15 18:19:22.710: sipSPISetDTMFRelayMode: set DSP for dtmf-relay = CC_CAP_DTMF_RELAY_INBAND_VOICE_AND_OOB Nov 15 18:19:22.710: sip_set_modem_caps: Negotiation already Done. Set negotiated Modem caps Nov 15 18:19:22.710: sip_set_modem_caps: Modem Relay & Passthru both disabled Nov 15 18:19:22.710: sip_set_modem_caps: nse payload = 100, ptru mode = 0, ptru-codec=0, redundancy=0, xid=0, relay=0, sprt-retry=12, latecncy=200, compres-dir=3, dict=1024, strnlen=32 Nov 15 18:19:22.710: ccsip_caps_ind: Load DSP with codec : g729r8, Bytes=20 Nov 15 18:19:22.710: CCSIP-SPI-CONTROL: ccsip_caps_ack Nov 15 18:19:22.710: ccsip_caps_ack: set forking flag to 0x60FD1EAC Nov 15 18:19:22.710: CCSIP-SPI-CONTROL: act_recdproc_connection_created
DB-295
Nov 15 18:19:22.710: CCSIP-SPI-CONTROL: sipSPICheckSocketConnection: Connid(2) created to 172.18.193.190:5060, local_port 51663 Nov 15 18:19:22.714: sip_stats_method Nov 15 18:19:22.722: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 172.18.193.190:5060 Nov 15 18:19:22.722: CCSIP-SPI-CONTROL: act_recdproc_new_message Nov 15 18:19:22.722: CCSIP-SPI-CONTROL: sipSPICheckResponse Nov 15 18:19:22.722: sip_stats_status_code Nov 15 18:19:22.722: Roundtrip delay 48 milliseconds for method PRACK Nov 15 18:19:24.706: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 172.18.193.190:5060 Nov 15 18:19:24.706: CCSIP-SPI-CONTROL: act_recdproc_new_message Nov 15 18:19:24.706: CCSIP-SPI-CONTROL: sipSPICheckResponse Nov 15 18:19:24.706: sip_stats_status_code Nov 15 18:19:24.706: Roundtrip delay 2032 milliseconds for method PRACK Nov 15 18:19:24.706: sipSPIGetSdpBody : Parse incoming session description Nov 15 18:19:24.710: CCSIP-SPI-CONTROL: sipSPIUACSessionTimer Nov 15 18:19:24.710: CCSIP-SPI-CONTROL: act_recdproc_continue_200_processing Nov 15 18:19:24.710: CCSIP-SPI-CONTROL: act_recdproc_continue_200_processing: *** This ccb is the parent Nov 15 18:19:24.710: sipSPICompareRespMediaInfo Nov 15 18:19:24.710: sipSPIDoMediaNegotiation: number of m lines is 1 Nov 15 18:19:24.710: sipSPIDoAudioNegotiation: Codec (g729r8) Negotiation Successful on Static Payload Nov 15 18:19:24.710: sipSPIDoPtimeNegotiation: One ptime attribute found - value:10 Nov 15 18:19:24.710: convert_ptime_to_codec_bytes: Values :Codec: g729r8 ptime :10, codecbytes: 20 Nov 15 18:19:24.710: convert_codec_bytes_to_ptime: Values :Codec: g729r8 codecbytes :20, ptime: 10 Nov 15 18:19:24.710: sipSPIDoDTMFRelayNegotiation: m-line index 1 Nov 15 18:19:24.710: sipSPIDoDTMFRelayNegotiation: Requested DTMF-RELAY option(s) not found in Preferred DTMF-RELAY option list! Nov 15 18:19:24.710: sip_sdp_get_modem_relay_cap_params: Nov 15 18:19:24.710: sip_sdp_get_modem_relay_cap_params: NSE payload from X-cap = 0 Nov 15 18:19:24.710: sip_do_nse_negotiation: NSE Payload 100 found in SDP Nov 15 18:19:24.710: sip_do_nse_negotiation: Remote NSE payload = local one = 100, Use it Nov 15 18:19:24.710: sip_select_modem_relay_params: X-tmr not present in SDP. Disable modem relay Nov 15 18:19:24.710: sipSPIProcessMediaChanges Nov 15 18:19:24.710: ccsip_process_response_contact_record_route Nov 15 18:19:24.710: CCSIP-SPI-CONTROL: sipSPIProcess200OKforinvite Nov 15 18:19:24.710: sip_stats_method Nov 15 18:19:24.710: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote port: 5060 Nov 15 18:19:37.479: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 172.18.193.190:52180 Nov 15 18:19:37.483: ****Found CCB in UAC table Nov 15 18:19:37.483: CCSIP-SPI-CONTROL: act_active_new_message Nov 15 18:19:37.483: CCSIP-SPI-CONTROL: sact_active_new_message_request Nov 15 18:19:37.483: sip_stats_method Nov 15 18:19:37.483: sip_stats_status_code Nov 15 18:19:37.483: CCSIP-SPI-CONTROL: sipSPIInitiateCallDisconnect : Initiate call disconnect(16) for outgoing call Nov 15 18:19:37.483: udpsock_close_connect: Socket fd: 2 closed for connid 2 with remote port: 5060 Nov 15 18:19:37.483: CCSIP-SPI-CONTROL: act_disconnecting_disconnect Nov 15 18:19:37.483: CCSIP-SPI-CONTROL: sipSPICallCleanup Nov 15 18:19:37.483: sipSPIIcpifUpdate :CallState: 4 Playout: 10230 DiscTime:1745148 ConnTime 1743871 Nov 15 18:19:37.483: ****Deleting from UAC table Nov 15 18:19:37.483: Removing call id E Nov 15 18:19:37.483: freeing ccb 63330954
DB-296
December 2010
Related Commands
Command debug ccsip all debug ccsip events debug ccsip media
Description Enables all SIP-related debugging. Enables tracing of events that are specific to SIP SPI. Enables tracing of SIP call media streams.
DB-297
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Beginning in Cisco IOS Release 12.2(15)T, the debug ccsip media command is a separate option that displays debugging information specific to SIP media stream processing. In past releases, this output was part of the debug ccsip events command.
Note
Examples
The following is sample output from the debug ccsip media command for a Cisco 3660:
Router# debug ccsip media SIP Call media tracing is enabled Router# Nov 15 18:19:53.835: sipSPISetMediaSrcAddr: media src addr for stream 1 = 172.18.195.49 Nov 15 18:19:53.835: sipSPIReserveRtpPort: reserved port 16500 for stream 1 Nov 15 18:19:53.867: sipSPIReplaceSDP Nov 15 18:19:53.871: sipSPICopySdpInfo Nov 15 18:19:53.871: sipSPIUpdCallWithSdpInfo: Preferred Codec : g729r8, bytes :20 Preferred DTMF relay : inband-voice Preferred NTE payload : 101 Early Media : No Delayed Media : No Bridge Done : No New Media : No DSP DNLD Reqd : No Nov 15 18:19:53.871: sipSPISetMediaSrcAddr: media src addr for stream 1 = 172.18.195.49 Nov 15 18:19:53.871: sipSPIUpdCallWithSdpInfo: M-line Index : 1
DB-298
December 2010
State : STREAM_ADDING (3) Callid : -1 Negotiated Codec : g729r8, bytes :20 Negotiated DTMF relay : inband-voice Negotiated NTE payload : 0 Media Srce Addr/Port : 172.18.195.49:16500 Media Dest Addr/Port : 172.18.193.190:19148 Nov 15 18:19:53.871: sipSPIProcessRtpSessions Nov 15 18:19:53.871: sipSPIAddStream: Adding stream 1 (callid 16) to the VOIP RTP library Nov 15 18:19:53.871: sipSPISetMediaSrcAddr: media src addr for stream 1 = 172.18.195.49 Nov 15 18:19:53.871: sipSPIUpdateRtcpSession: for m-line 1 Nov 15 18:19:53.871: sipSPIUpdateRtcpSession: rtcp_session info laddr = 172.18.195.49, lport = 16500, raddr = 172.18.193.190, rport=19148 Nov 15 18:19:53.871: sipSPIUpdateRtcpSession: No rtp session, creating a new one Nov 15 18:19:53.871: sipSPISetStreamInfo: num_streams = 1 Nov 15 18:19:53.871: sipSPISetStreamInfo: adding stream type 0 from mline 1 Nov 15 18:19:53.871: sipSPISetStreamInfo: caps.stream_count=1, caps.stream[0].stream_type=0x1, caps.stream_list.xmitFunc=voip_rtp_xmit, caps.stream_list.context=0x634F1F2C (gccb) Nov 15 18:19:55.555: sipSPICompareSDP Nov 15 18:19:55.555: sipSPICompareStreams: stream 1 dest_port: old=19148 new=19148 Nov 15 18:19:55.555: sipSPICompareStreams: Flags set for stream 1: RTP_CHANGE=No CAPS_CHANGE=No Nov 15 18:19:55.555: sipSPICompareSDP: Flags set for call: NEW_MEDIA=No DSPDNLD_REQD=No Nov 15 18:19:55.555: sipSPIReplaceSDP Nov 15 18:19:55.555: sipSPICopySdpInfo Nov 15 18:19:55.555: sipSPIUpdCallWithSdpInfo: Preferred Codec : g729r8, bytes :20 Preferred DTMF relay : inband-voice Preferred NTE payload : 101 Early Media : No Delayed Media : No Bridge Done : Yes New Media : No DSP DNLD Reqd : No Nov 15 18:19:55.555: sipSPISetMediaSrcAddr: media src addr for stream 1 = 172.18.195.49 Nov 15 18:19:55.555: sipSPIUpdCallWithSdpInfo: M-line Index : 1 State : STREAM_ACTIVE (3) Callid : 16 Negotiated Codec : g729r8, bytes :20 Negotiated DTMF relay : inband-voice Negotiated NTE payload : 0 Media Srce Addr/Port : 172.18.195.49:16500 Media Dest Addr/Port : 172.18.193.190:19148
Related Commands
Command debug ccsip all debug ccsip events debug ccsip info
Description Enables all SIP-related debugging. Enables tracing of events that are specific to SIP SPI. Enables tracing of general SIP SPI events.
DB-299
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. The output of this command was changed. Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways. This command was implemented on the Cisco AS5850 universal gateway. This command was implemented on Cisco 7200 series routers. This command was integrated into Cisco IOS Release 12.2(11)T. Support for the Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, and Cisco AS5850 universal gateway is not included in this release. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
This command traces the Session Initiation Protocol (SIP) messages exchanged between the SIP UA client (UAC) and the access server.
Examples
The following example shows debug output from one side of the call:
Router1# debug ccsip messages SIP Call messages tracing is enabled Router1# *Mar 6 14:19:14: Sent: INVITE sip:[email protected];user=phone;phone-context=unknown SIP/2.0
DB-300
December 2010
Via: SIP/2.0/UDP 166.34.245.230:55820 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown> Date: Sat, 06 Mar 1993 19:19:14 GMT Call-ID: [email protected] Cisco-Guid: 2881152943-2184249568-0-483551624 User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled CSeq: 101 INVITE Max-Forwards: 6 Timestamp: 731427554 Contact: <sip:[email protected]:5060;user=phone> Expires: 180 Content-Type: application/sdp Content-Length: 138 v=0 o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230 s=SIP Call t=0 0 c=IN IP4 166.34.245.230 m=audio 20762 RTP/AVP 0 *Mar 6 14:19:14: Received: SIP/2.0 100 Trying Via: SIP/2.0/UDP 166.34.245.230:55820 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown> Date: Mon, 08 Mar 1993 22:45:12 GMT Call-ID: [email protected] Timestamp: 731427554 Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled CSeq: 101 INVITE Content-Length: 0 *Mar 6 14:19:14: Received: SIP/2.0 180 Ringing Via: SIP/2.0/UDP 166.34.245.230:55820 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown> Date: Mon, 08 Mar 1993 22:45:12 GMT Call-ID: [email protected] Timestamp: 731427554 Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled CSeq: 101 INVITE Content-Type: application/sdp Content-Length: 138 v=0 o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231 s=SIP Call t=0 0 c=IN IP4 166.34.245.231 m=audio 20224 RTP/AVP 0 *Mar 6 14:19:16: Received: SIP/2.0 200 OK Via: SIP/2.0/UDP 166.34.245.230:55820 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357 Date: Mon, 08 Mar 1993 22:45:12 GMT Call-ID: [email protected] Timestamp: 731427554 Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled Contact: <sip:[email protected]:5060;user=phone>
DB-301
CSeq: 101 INVITE Content-Type: application/sdp Content-Length: 138 v=0 o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231 s=SIP Call t=0 0 c=IN IP4 166.34.245.231 m=audio 20224 RTP/AVP 0 *Mar 6 14:19:16: Sent: ACK sip:[email protected]:5060;user=phone SIP/2.0 Via: SIP/2.0/UDP 166.34.245.230:55820 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357 Date: Sat, 06 Mar 1993 19:19:14 GMT Call-ID: [email protected] Max-Forwards: 6 Content-Type: application/sdp Content-Length: 138 CSeq: 101 ACK v=0 o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230 s=SIP Call t=0 0 c=IN IP4 166.34.245.230 m=audio 20762 RTP/AVP 0 *Mar 6 14:19:19: Received: BYE sip:[email protected]:5060;user=phone SIP/2.0 Via: SIP/2.0/UDP 166.34.245.231:53600 From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357 To: "3660110" <sip:[email protected]> Date: Mon, 08 Mar 1993 22:45:14 GMT Call-ID: [email protected] User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled Max-Forwards: 6 Timestamp: 731612717 CSeq: 101 BYE Content-Length: 0 *Mar 6 14:19:19: Sent: SIP/2.0 200 OK Via: SIP/2.0/UDP 166.34.245.231:53600 From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357 To: "3660110" <sip:[email protected]> Date: Sat, 06 Mar 1993 19:19:19 GMT Call-ID: [email protected] Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled Timestamp: 731612717 Content-Length: 0 CSeq: 101 BYE
The following example show debug output from the other side of the call:
Router2# debug ccsip messages SIP Call messages tracing is enabled Router2# *Mar 8 17:45:12: Received: INVITE sip:[email protected];user=phone;phone-context=unknown SIP/2.0 Via: SIP/2.0/UDP 166.34.245.230:55820
DB-302
December 2010
From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown> Date: Sat, 06 Mar 1993 19:19:14 GMT Call-ID: [email protected] Cisco-Guid: 2881152943-2184249568-0-483551624 User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled CSeq: 101 INVITE Max-Forwards: 6 Timestamp: 731427554 Contact: <sip:[email protected]:5060;user=phone> Expires: 180 Content-Type: application/sdp Content-Length: 138 v=0 o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230 s=SIP Call t=0 0 c=IN IP4 166.34.245.230 m=audio 20762 RTP/AVP 0 *Mar 8 17:45:12: Sent: SIP/2.0 100 Trying Via: SIP/2.0/UDP 166.34.245.230:55820 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown> Date: Mon, 08 Mar 1993 22:45:12 GMT Call-ID: [email protected] Timestamp: 731427554 Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled CSeq: 101 INVITE Content-Length: 0 *Mar 8 17:45:12: Sent: SIP/2.0 180 Ringing Via: SIP/2.0/UDP 166.34.245.230:55820 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown> Date: Mon, 08 Mar 1993 22:45:12 GMT Call-ID: [email protected] Timestamp: 731427554 Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled CSeq: 101 INVITE Content-Type: application/sdp Content-Length: 138 v=0 o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231 s=SIP Call t=0 0 c=IN IP4 166.34.245.231 m=audio 20224 RTP/AVP 0 *Mar 8 17:45:14: Sent: SIP/2.0 200 OK Via: SIP/2.0/UDP 166.34.245.230:55820 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357 Date: Mon, 08 Mar 1993 22:45:12 GMT Call-ID: [email protected] Timestamp: 731427554 Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled Contact: <sip:[email protected]:5060;user=phone> CSeq: 101 INVITE
DB-303
Content-Type: application/sdp Content-Length: 138 v=0 o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231 s=SIP Call t=0 0 c=IN IP4 166.34.245.231 m=audio 20224 RTP/AVP 0 *Mar 8 17:45:14: Received: ACK sip:[email protected]:5060;user=phone SIP/2.0 Via: SIP/2.0/UDP 166.34.245.230:55820 From: "3660110" <sip:[email protected]> To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357 Date: Sat, 06 Mar 1993 19:19:14 GMT Call-ID: [email protected] Max-Forwards: 6 Content-Type: application/sdp Content-Length: 138 CSeq: 101 ACK v=0 o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230 s=SIP Call t=0 0 c=IN IP4 166.34.245.230 m=audio 20762 RTP/AVP 0 *Mar 8 17:45:17: Sent: BYE sip:[email protected]:5060;user=phone SIP/2.0 Via: SIP/2.0/UDP 166.34.245.231:53600 From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357 To: "3660110" <sip:[email protected]> Date: Mon, 08 Mar 1993 22:45:14 GMT Call-ID: [email protected] User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled Max-Forwards: 6 Timestamp: 731612717 CSeq: 101 BYE Content-Length: 0 *Mar 8 17:45:17: Received: SIP/2.0 200 OK Via: SIP/2.0/UDP 166.34.245.231:53600 From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357 To: "3660110" <sip:[email protected]> Date: Sat, 06 Mar 1993 19:19:19 GMT Call-ID: [email protected] Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled Timestamp: 731612717 Content-Length: 0 CSeq: 101 BYE
Related Commands
Command debug ccsip all debug ccsip calls debug ccsip error
Description Enables all SIP-related debugging. Shows all SIP SPI call tracing. Shows SIP SPI errors.
DB-304
December 2010
Shows all SIP SPI events tracing. Shows all SIP SPI state tracing.
DB-305
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows debug output for a single SIP call:
Router# debug ccsip preauth SIP Jan Jan Jan Call preauth tracing is enabled 23 18:43:17.898::Preauth Required 23 18:43:17.898: In sipSPISendPreauthReq for preauth_id = 86515, ccb = 67AF4E10 23 18:43:17.898: Entering rpms_proc_print_preauth_req
Jan 23 18:43:17.898: Request = 0 Jan 23 18:43:17.898: Preauth id = 86515 Jan 23 18:43:17.898: EndPt Type = 1 Jan 23 18:43:17.898: EndPt = 192.168.80.70 Jan 23 18:43:17.898: Resource Service = 1 Jan 23 18:43:17.898: Call_origin = answer Jan 23 18:43:17.898: Call_type = voip Jan 23 18:43:17.898: Calling_num = 2270001 Jan 23 18:43:17.898: Called_num = 1170001 Jan 23 18:43:17.898: Protocol = 1 Jan 23 18:43:17.898:sipSPISendPreauthReq:Created node with preauth_id = 86515, ccb 67AF4E10 , node 6709C280 Jan 23 18:43:17.898:rpms_proc_create_node:Created node with preauth_id = 86515 Jan 23 18:43:17.898:rpms_proc_send_aaa_req:uid got is 466728 Jan 23 18:43:17.902:rpms_proc_preauth_response:Context is for preauth_id 86515, aaa_uid 466728 Jan 23 18:43:17.902:rpms_proc_preauth_response:Deleting Tree node for preauth id 86515 uid 466728
DB-306
December 2010
Jan 23 18:43:17.902:sipSPIGetNodeForPreauth:Preauth_id=86515 Jan 23 18:43:17.902: ccsip_spi_process_preauth_event:67AF4E10 ccb & 6709C280 node Jan 23 18:43:17.902: In act_preauth_response:67AF4E10 ccb Jan 23 18:43:17.902: act_preauth_response:Deleting node 6709C280 from tree
Field Request Preauth id EndPt Type EndPt Resource Service Call_origin Call_type Calling_num Called_num Protocol function reports
Description Request Type0 for preauthentication, 1 for disconnect. Identifier for the preauthentication request. Call Origin End Point Type1 for IP address, 2 for Interzone ClearToken (IZCT) value. Call Origin End Point ValueAn IP address or IZCT value. Resource Service Type1 for Reservation, 2 for Query. Answer. Voice over IP (VoIP). Calling Party Number (CLID). Called Party Number (DNIS). 0 for H.323, 1 for SIP. Various identifiers and status reports for executed functions.
DB-307
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways. This command was implemented on the Cisco AS5850 universal gateway. This command was implemented on Cisco 7200 series routers. This command was integrated into Cisco IOS Release 12.2(11)T. Support for the Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, and Cisco AS5850 universal gateway is not included in this release. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
This command traces the state machine changes of SIP SPI and displays the state transitions.
Examples
DB-308
December 2010
*Jan 2 18:34:37.797:0x6220C634 :State change from (STATE_IDLE, SUBSTATE_CONNECTING) to (STATE_IDLE, SUBSTATE_CONNECTING) *Jan 2 18:34:37.801:0x6220C634 :State change from (STATE_IDLE, SUBSTATE_CONNECTING) to (STATE_SENT_INVITE, SUBSTATE_NONE) *Jan 2 18:34:37.809:0x6220C634 :State change from (STATE_SENT_INVITE, SUBSTATE_NONE) to (STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_PROCEEDING) *Jan 2 18:34:37.853:0x6220C634 :State change from (STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_PROCEEDING) to (STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_ALERTING) *Jan 2 18:34:38.261:0x6220C634 :State change from (STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_ALERTING) to (STATE_ACTIVE, SUBSTATE_NONE) *Jan 2 18:35:09.860:0x6220C634 :State change from (STATE_ACTIVE, SUBSTATE_NONE) to (STATE_DISCONNECTING, SUBSTATE_NONE) *Jan 2 18:35:09.868:0x6220C634 :State change from (STATE_DISCONNECTING, SUBSTATE_NONE) to (STATE_DEAD, SUBSTATE_NONE) *Jan 2 18:28:38.404: Queued event from SIP SPI :SIPSPI_EV_CLOSE_CONNECTION
Related Commands
Command debug ccsip all debug ccsip calls debug ccsip error debug ccsip events debug ccsip info
Description Enables all SIP-related debugging. Shows all SIP SPI call tracing. Shows SIP SPI errors. Shows all SIP SPI events tracing. Shows all SIP SPI message tracing.
DB-309
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ccsip transport command to debug issues related to connection and transport usage and to see the flow of the messages being sent or received.
Examples
The following is sample output from the debug ccsip transport command for a Cisco 3660:
Router# debug ccsip transport . . . 1w1d: //18/8E16980D800A/SIP/Transport/sipSPISendInvite: Sending Invite to the transport layer 1w1d: //18/8E16980D800A/SIP/Transport/sipSPIGetSwitchTransportFlag: Return the Global configuration, Switch Transport is TRUE 1w1d: //18/8E16980D800A/SIP/Transport/sipSPITransportSendMessage: msg=0x64082D50, addr=172.18.194.183, port=5060, sentBy_port=0, is_req=1, transport=1, switch=1, callBack=0x614FAB58 1w1d: //18/8E16980D800A/SIP/Transport/sipSPITransportSendMessage: Proceedable for sending msg immediately 1w1d: //18/8E16980D800A/SIP/Transport/sipTransportLogicSendMsg: switch transport is 1 1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportGetInterfaceMtuSize: MTU size for remote address 172.18.194.183 is 500 1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportVerifyMsgForMTUThreshold: Interface MTU Size 500, Msg Size 1096 1w1d: //18/8E16980D800A/SIP/Transport/sipTransportLogicSendMsg: Switching msg=0x64082D50 transport UDP->TCP 1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportSetAgeingTimer: Aging timer initiated for holder=0x64084058,addr=172.18.194.183 1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipCreateConnHolder: Created new holder=0x64084058, addr=172.18.194.183
DB-310
December 2010
1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportPostRequestConnection: Posting TCP conn create request for addr=172.18.194.183, port=5060, context=0x64128D5C 1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportSetConnWaitTimer: Wait timer set for connection=0x64129BF4,addr=172.18.194.183, port=5060 1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipCreateConnInstance: Created new initiated conn=0x64129BF4, connid=-1, addr=172.18.194.183, port=5060, transport=tcp 1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipConnectionManagerProcessConnCreated: gConnTab=0x64128D5C, addr=172.18.194.183, port=5060, connid=1, transport=tcp 1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipInstanceHandleConnectionCreated: Moving connection=0x64129BF4, connid=1state to pending 1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportProcessNWConnectionCreated: context=0x64128D5C 1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipConnectionManagerProcessConnCreated: gConnTab=0x64128D5C, addr=172.18.194.183, port=5060, connid=1, transport=tcp 1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportPostSendMessage: Posting send for msg=0x64082D50, addr=172.18.194.183, port=5060, connId=1 for TCP . . .
Field Sending Invite to the transport layer switch transport is 1 MTU size for remote address Interface MTU Size 500, Msg Size 1096 Switching msg=... transport UDP->TCP
Description Indicates that the SIP signaling state machine has invoked transport layer operations such as transport arbitration logic and the connection management interface. Indicates that the gateway has been provisioned to enable the transport switching functionality based on the message size. 1 is true and 0 is false. Indicates that the bound outgoing Ethernet interface that sends the message to the given remote address is configured for an MTU size of the indicated value. Indicates that the size of the message is larger than the size of the MTU; thus transport switching (from UDP to TCP) should be enabled. Indicates that transport switching from UDP to TCP is occurring for the handled message because of the large size of the message.
Aging timer initiated for Indicates that the connection algorithm is started; that is, the counter begins holder to age out the TCP or UDP connection if inactivity occurs. Posting TCP conn create request Indicates a request for a TCP connection from a lower TCP process.
sipSPITransportSendM Indicates all the transport related attributes that the SIP signaling state essage:msg=0x64082D machine originally gives to the transport layer to send out the message. The 50, addr=...transport=1, attributes are: switch=1, transport: 1 for UDP; 2 for TCP. callBack=0x614FAB58 switch (switching transport enabled or disabled for large messages): 1 for enabled; 0 for disabled. Posting send for msg=0x64082D50, addr=...for TCP Indicates that all transport and connection related operations are complete. The message is sent out on the network targeted to the given address, port, and transport.
DB-311
Related Commands
Command debug ccsip all debug ccsip info transport switch voice-class sip transport switch
Description Enables all SIP-related debugging. Enables tracing of general SIP SPI information. Enables switching between UDP and TCP transport mechanisms globally for large SIP messages. Enables switching between UDP and TCP transport mechanisms for large SIP messages for a specific dial peer.
DB-312
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco MC3810 networking device. This command was implemented on the Cisco 3600 series router. This command was integrated into Cisco IOS Release 12.1(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command when attempting to troubleshoot a Vo call that uses the cisco-switched session protocol. This command provides the same information as the debug ccswvoice vo-session command, but includes additional debugging information relating to the calls.
Examples
The following shows sample output from the debug ccswvoice vo-debug command:
Router# debug ccswvoice vo-debug 2w2d: ccswvoice: callID 529927 pvcid -1 cid -1 state NULL event O/G SETUP 2w2d: ccswvoice_out_callinit_setup: callID 529927 using pvcid 1 cid 15 2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state O/G INIT event I/C PROC 2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state O/G PROC event I/C ALERTccfrf11_caps_ind: codec(preferred) = 1 2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state O/G ALERT event I/C CONN 2w2d: ccswvoice_bridge_drop: dropping bridge calls src 529927 dst 529926 pvcid 1 cid 15 state ACTIVE 2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state ACTIVE event O/G REL 2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state RELEASE event I/C RELCOMP 2w2d: ccswvo_store_call_history_entry: cause=10 tcause=10 cause_text=normal call clearing.
DB-313
Related Commands
Description Displays the first 10 bytes (including header) of selected VoFR subframes for the interface.
DB-314
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 2600 and Cisco 3600 series routers. This command was integrated into Cisco IOS Release 12.0(4)T. This command was implemented on the Cisco MC3810 networking device. This command was integrated into Cisco IOS Release 12.1(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command when troubleshooting a VoFR call that uses the cisco-switched session protocol. This command provides the same information as the debug ccswvoice vofr-session command, but includes additional debugging information relating to the calls.
Examples
The following shows sample output from the debug ccswvoice vofr-debug command:
Router# debug ccswvoice vofr-debug CALL TEARDOWN: 3640_vofr(config-voiceport)# *Mar 1 03:02:08.719:ccswvofr_bridge_drop:dropping bridge calls src 17 dst 16 dlci 100 cid 9 state ACTIVE *Mar 1 03:02:08.727:ccswvofr:callID 17 dlci 100 cid 9 state ACTIVE event O/G REL *Mar 1 03:02:08.735:ccswvofr:callID 17 dlci 100 cid 9 state RELEASE event I/C RELCOMP *Mar 1 03:02:08.735:ccswvofr_store_call_history_entry:cause=22 tcause=22 cause_text=no circuit. 3640_vofr(config-voiceport)# CALL SETUP (outgoing): *Mar 1 03:03:22.651:ccswvofr:callID 23 dlci -1 cid -1 state NULL event O/G SETUP *Mar 1 03:03:22.651:ccswvofr_out_callinit_setup:callID 23 using dlci 100 cid 10 *Mar 1 03:03:22.659:ccswvofr:callID 23 dlci 100 cid 10 state O/G INIT event I/C PROC
DB-315
*Mar 1 03:03:22.667:ccswvofr:callID 23 dlci 100 cid 10 state O/G PROC event I/C CONN ccfrf11_caps_ind:codec(preferred) = 0
Related Commands
Command debug cch323 debug ccsw voice vo-debug debug vtsp session
Description Displays the ccfrf11 function calls during call setup and teardown. Displays the ccswvoice function calls during call setup and teardown. Displays the first 10 bytes (including header) of selected VoFR subframes for the interface.
DB-316
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 2600 and Cisco 3600 series routers. This command was integrated into Cisco IOS Release 12.0(4)T. This command was implemented on the Cisco MC3810 networking device. This command was integrated into Cisco IOS Release 12.1(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to show the state transitions of the cisco-switched-vofr state machine as a call is processed, and when attempting to troubleshoot a VoFR call that uses the cisco-switched session protocol.
Examples
The following shows sample output from the debug ccswvoice vofr-session command:
Router# debug ccswvoice vofr-session CALL TEARDOWN: 3640_vofr(config-voiceport)# *Mar 1 02:58:13.203:ccswvofr:callID 14 dlci 100 cid 8 state ACTIVE event O/G REL *Mar 1 02:58:13.215:ccswvofr:callID 14 dlci 100 cid 8 state RELEASE event I/C RELCOMP 3640_vofr(config-voiceport)# CALL SETUP (outgoing): *Mar 1 02:59:46.551:ccswvofr:callID 17 dlci -1 cid -1 state NULL event O/G SETUP *Mar 1 02:59:46.559:ccswvofr:callID 17 dlci 100 cid 9 state O/G INIT event I/C PROC *Mar 1 02:59:46.567:ccswvofr:callID 17 dlci 100 cid 9 state O/G PROC event I/C CONN 3640_vofr(config-voiceport)#
DB-317
Related Commands
Command debug cch323 debug call rsvp-sync events debug vtsp session
Description Displays the ccfrf11 function calls during call setup and teardown. Displays events that occur during RSVP setup. Displays the first 10 bytes (including header) of selected VoFR subframes for the interface.
DB-318
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco MC3810 networking device. This command was implemented on the Cisco 3600 series router. This command was integrated into Cisco IOS Release 12.1(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to show the state transitions of the cisco-switched-vo state machine as a call is processed. This command should be used when attempting to troubleshoot a Vo call that uses the cisco-switched session protocol.
Examples
The following shows sample output from the debug ccswvoice vo-session command:
Router# debug ccswvoice vo-session 2w2d: 2w2d: 2w2d: 2w2d: 2w2d: 2w2d: ccswvoice: ccswvoice: ccswvoice: ccswvoice: ccswvoice: ccswvoice: callID callID callID callID callID callID 529919 529919 529919 529919 529919 529919 pvcid pvcid pvcid pvcid pvcid pvcid -1 cid -1 state NULL event O/G SETUP 1 cid 11 state O/G INIT event I/C PROC 1 cid 11 state O/G PROC event I/C ALERT 1 cid 11 state O/G ALERT event I/C CONN 1 cid 11 state ACTIVE event O/G REL 1 cid 11 state RELEASE event I/C RELCOMP
Related Commands
Description Displays detailed debugging information related to ccswvoice function calls during call setup and teardown.
DB-319
debug cdapi
To display information about the Call Distributor Application Programming Interface (CDAPI), use the debug cdapi command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug cdapi {detail | events} no debug cdapi {detail | events}
Syntax Description
detail
Displays when applications register or become unregistered with CDAPI, when calls are added or deleted from the CDAPI routing table, and when CDAPI messages are created and freed. Displays the events passing between CDAPI and an application or signalling stack.
events
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco AS5350 and Cisco AS5400. This command was integrated into Cisco IOS Release 12.3(2)T. This command was enhanced to show V.110 call types. This command was enhanced to show V.120 call types. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The detail keyword is useful for determining if messages are being lost (or not freed). It is also useful for determining the size of the raw messages passed between CDAPI and other applications to ensure that the correct number of bytes is being passed. The events keyword is useful for determining if certain ISDN messages are not being received by an application and if calls are not being directed to an application. The following bandwidths are supported:
56 kbps 64 kbps
DB-320
December 2010
Examples
The following Media Gateway Control Protocol (MGCP) packet received example shows V.110 call debugging output for the debug cdapi detail command. In this example, the modem is not yet in STEADY_STATE.
Router# debug cdapi detail Sep 26 19:12:25.327:MGCP Packet received from 10.0.44.109:2427CRCX 6318 s7/ds1-0/24 MGCP 1.0 C:111 M:nas/data L:b:64, nas/bt:v.110, nas/cdn:234567 R:nas/au, nas/ax,nas/of, nas/crq X:101 Sep 26 19:12:25.327:CDAPI:cdapi_create_msg():CDAPI Pool Count:959, Raw Length = 0 Sep 26 19:12:25.327:CDAPI Se7/1:23:cdapi_add_entry_callRoutingTbl() Sep 26 19:12:25.327: Added entry for call 0x7017 for application CSM Sep 26 19:12:25.331:CDAPI:cdapi_create_msg():CDAPI Pool Count:958, router# Raw Length = 0 Sep 26 19:12:25.331:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0 Sep 26 19:12:25.331:CDAPI:cdapi_free_msg():CDAPI Pool Count:959 Sep 26 19:12:25.331:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0 Sep 26 19:12:25.331:CDAPI:cdapi_free_msg():CDAPI Pool Count:960 Sep 26 19:12:25.331:send_mgcp_msg, MGCP Packet sent to 10.0.44.109:2427 ---> Sep 26 19:12:25.331:200 6318 I:64524608 Alert
Sep 26 19:12:25.339:CDAPI:cdapi_crea router#te_msg():CDAPI Pool Count:959, Raw Length = 0 Sep 26 19:12:25.339:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0 Sep 26 19:12:25.339:CDAPI:cdapi_free_msg():CDAPI Pool Count:960 router# Sep 26 19:12:33.223:MGCP Packet received from 10.0.44.109:2427DLCX 6319 s7/ds1-0/24 MGCP 1.0 Sep 26 19:12:33.223:CDAPI:cdapi_create_msg():CDAPI Pool Count:959, Raw Length = Sep 26 19:12:33.223:CDAPI:cdapi_create_msg():CDAPI Pool Count:958, Raw Length = Sep 26 19:12:33.223:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg Sep 26 19:12:33.223:CDAPI:cdapi_free_msg():CDAPI Pool Count:959 Sep 26 19:12:33.227:CDAPI:cdapi_create_msg():CDAPI Pool Count:958, Raw router# Length = 0 Sep 26 19:12:33.227:CDAPI Se7/1:23:cdapi_del_entry_callRoutingTbl() Sep 26 19:12:33.227: Deleted entry for call 0x7017 Sep 26 19:12:33.227:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg Sep 26 19:12:33.227:CDAPI:cdapi_free_msg():CDAPI Pool Count:959 Sep 26 19:12:33.227:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg Sep 26 19:12:33.227:CDAPI:cdapi_free_msg():CDAPI Pool Count:960 Sep 26 19:12:33.227:send_mgcp_msg, MGCP Packet sent router#to 10.0.44.109:2427 ---> Sep 26 19:12:33.227:200 6319 OK 0 0 = 0x0
= 0x0 = 0x0
The following partial example shows V.120 call debugging output for the debug cdapi detail command:
Router# debug cdapi detail May 14 19:12:25.327:MGCP Packet received from 10.0.44.109:2427CRCX 6318 s7/ds1-0/24 MGCP 1.0 C:111 M:nas/data L:b:64, nas/bt:v.120, nas/cdn:234567 R:nas/au, nas/ax,nas/of, nas/crq
DB-321
X:101 May 14 19:12:25.327:CDAPI:cdapi_create_msg():CDAPI Pool Count:959, Raw Length = 0 May 14 19:12:25.327:CDAPI Se7/1:23:cdapi_add_entry_callRoutingTbl() May 14 19:12:25.327: Added entry for call 0x7017 for application CSM May 14 19:12:25.331:CDAPI:cdapi_create_msg():CDAPI Pool Count:958, router# Raw Length = 0 May 14 19:12:25.331:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0 May 14 19:12:25.331:CDAPI:cdapi_free_msg():CDAPI Pool Count:959 May 14 19:12:25.331:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0 May 14 19:12:25.331:CDAPI:cdapi_free_msg():CDAPI Pool Count:960 May 14 19:12:25.331:send_mgcp_msg, MGCP Packet sent to 10.0.44.109:2427 ---> . . .
The following MGCP packet received example shows V.120 call debugging output for the debug cdapi events command:
Router# debug cdapi events Sep 26 19:14:39.027:MGCP Packet received from 10.0.44.109:2427CRCX 6322 s7/ds1-0/24 MGCP 1.0 C:111 M:nas/data L:b:64, nas/bt:v.120, nas/cdn:234567 R:nas/au, nas/ax,nas/of, nas/crq X:101 Sep 26 19:14:39.027:Se7/0:23 CDAPI:TX -> CDAPI_MSG_CONNECT_IND to CSM call = 0x7017 Sep 26 19:14:39.027: From Appl/Stack = XCSP Sep 26 19:14:39.027: Call Type = V.120 Sep 26 19:14:39.027: B Channel = 23 Sep 26 19:14:39.027: dslId = 0 Sep 26 19:14:39.027: Idb = 0 Sep router#26 19:14:39.027: BChanIdb = 64519A14 Sep 26 19:14:39.027: Handle = 63CB8DF4 Sep 26 19:14:39.027: RPA = 6388506C Sep 26 19:14:39.027: Cause = 0 Sep 26 19:14:39.027: ApplCause = 0 Sep 26 19:14:39.027: ApplSpecData = 0 Sep 26 19:14:39.027: Calling Party Number = Sep 26 19:14:39.027: Called Party Number = 234567 Sep 26 19:14:39.027: Overlap = 0 Sep 26 19:14:39.027:Se7/0:23 CDAPI:TX -> CDAPI_MSG_CONNECT_RESP to XCSP call = 0x7017 Sep 26 19:14:39.027: From Appl router#/Stack = CSM Sep 26 19:14:39.027: Call Type = MODEM Sep 26 19:14:39.027: B Channel = 23 Sep 26 19:14:39.027: dslId = 0 Sep 26 19:14:39.027: Idb = 0 Sep 26 19:14:39.027: BChanIdb = 64519A14 Sep 26 19:14:39.027: Handle = 63CB8DF4 Sep 26 19:14:39.027: RPA = 0 Sep 26 19:14:39.027: Cause = 0 Sep 26 19:14:39.027: ApplCause = 0 Sep 26 19:14:39.027: ApplSpecData = 0 Sep 26 19:14:39.027: Overlap = 0 Sep 26 19:14:39.031:send_mgcp_msg, MGCP Pa router#cket sent to 10.0.44.109:2427 ---> Sep 26 19:14:39.031:200 6322 I:64524608 Alert
DB-322
December 2010
Sep 26 19:14:39.039:Se7/0:23 CDAPI:TX -> CDAPI_MSG_CONN_ACT_REQ to XCSP call = 0x7017 Sep 26 19:14:39.039: From Appl/Stack = CSM Sep 26 19:14:39.039: Call Type = MODEM Sep 26 19:14:39.039: B Channel = 23 Sep 26 19:14:39.039: dslId = 0 Sep 26 19:14:39.039: Idb = 0 Sep 26 19:14:39.039: BChanIdb = 64519A14 Sep 26 19:14:39.039: Handle = 63CB8DF4 Sep 26 19:14:39.039: R router#PA = 0 Sep 26 19:14:39.039: Cause = 0 Sep 26 19:14:39.039: ApplCause = 0 Sep 26 19:14:39.039: ApplSpecData = 0 Sep 26 19:14:39.039: Overlap = 0 router# Sep 26 19:14:48.959:MGCP Packet received from 10.0.44.109:2427DLCX 6323 s7/ds1-0/24 MGCP 1.0 Sep 26 19:14:48.963:Se7/0:23 CDAPI:TX -> CDAPI_MSG_DISCONNECT_IND to CSM call = 0x7017 Sep 26 19:14:48.963: From Appl/Stack = XCSP Sep 26 19:14:48.963: Call Type = V.120 Sep 26 19:14:48.963: B Channel = 23 Sep 26 19:14:48.963: dslId = 0 Sep 26 19:14:48.963: Idb = 0 Sep 26 19:14:48.963: BChanIdb = 64519A14 Sep 26 19:14:48.963: Handle = 63CB8DF4 Sep 26 19:14 router#:48.963: RPA = 6388506C Sep 26 19:14:48.963: Cause = 0 Sep 26 19:14:48.963: ApplCause = 0 Sep 26 19:14:48.963: ApplSpecData = 0 Sep 26 19:14:48.963: Overlap = 0 Sep 26 19:14:48.963:Se7/0:23 CDAPI:TX -> CDAPI_MSG_SUBTYPE_RELEASE_REQ to XCSP call = 0x7017 Sep 26 19:14:48.963: From Appl/Stack = CSM Sep 26 19:14:48.963: Call Type = MODEM Sep 26 19:14:48.963: B Channel = 23 Sep 26 19:14:48.963: dslId = 0 Sep 26 19:14:48.963: Idb = 0 Sep 26 19:14:48 router#.963: BChanIdb = 64519A14 Sep 26 19:14:48.963: Handle = 63CB8DF4 Sep 26 19:14:48.963: RPA = 0 Sep 26 19:14:48.963: Cause = 0 Sep 26 19:14:48.963: ApplCause = 1 Sep 26 19:14:48.963: ApplSpecData = 0 Sep 26 19:14:48.963: Overlap = 0 Sep 26 19:14:48.963:Se7/0:23 CDAPI:TX -> CDAPI_MSG_SUBTYPE_REL_COMP_IND to CSM call = 0x7017 Sep 26 19:14:48.963: From Appl/Stack = XCSP Sep 26 19:14:48.963: Call Type = V.120 Sep 26 19:14:48.963: B Channel = 23 Sep 26 19: router#14:48.963: dslId = 0 Sep 26 19:14:48.963: Idb = 0 Sep 26 19:14:48.963: BChanIdb = 64519A14 Sep 26 19:14:48.963: Handle = 63CB8DF4 Sep 26 19:14:48.963: RPA = 6388506C Sep 26 19:14:48.963: Cause = 0 Sep 26 19:14:48.963: ApplCause = 0 Sep 26 19:14:48.963: ApplSpecData = 0 Sep 26 19:14:48.963: Overlap = 0
DB-323
Sep 26 19:14:48.963:send_mgcp_msg, MGCP Packet sent to 10.0.44.109:2427 ---> Sep 26 19:14:48.963:200 6323 OK
Description The bearer type parameter includes v.110 and v.120 for V.110 and V.120 calls. Call types are V.110, V.120, and modem.
Related Commands
Description Displays the MGCP signaling message received and sent to the called agent. Displays the raw message owner, length, and pointer.
DB-324
December 2010
Syntax Description
errors events
(Optional) Displays details of AHDLC packets in error. (Optional) Displays AHDLC events.
Defaults
If the command is entered without any optional keywords, all of the types of debug information are enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Keywords were made optional. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cdma pdsn a10 ahdlc command:
Router# debug cdma pdsn a10 ahdlc errors ahdlc error packet display debugging is on Router# debug cdma pdsn a10 ahdlc events ahdlc events display debugging is on Router# *Jan 1 00:18:30:%LINK-3-UPDOWN:Interface Virtual-Access1, changed state to up *Jan 1 00:18:30:*****OPEN AHDLC***** *Jan 1 00:18:30: ahdlc_mgr_channel_create *Jan 1 00:18:30: ahdlc_mgr_allocate_available_channel: *Jan 1 00:18:30:ahdlc:tell h/w open channel 9 from engine 0
DB-325
Syntax Description
(Optional) Displays A10 GRE errors. (Optional) Displays A10 GRE events. (Optional) Displays transmitted or received A10 GRE packets. (Optional) Specifies the GRE key.
Defaults
If the command is entered without any optional keywords, all of the types of debug information are enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The tunnel-key keyword was added and the existing keywords were made optional. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cdma pdsn a10 gre events tunnel-key command:
Router# debug cdma pdsn a10 gre events tunnel-key 1 Router# show debug CDMA: CDMA PDSN A10 GRE events debugging is on for tunnel key 1 PDSN# *Mar *Mar *Mar *Mar *Mar *Mar
1 1 1 1 1 1
04:00:57.847:CDMA-GRE:CDMA-Ix1 (GRE/CDMA) created with src 5.0.0.2 dst 0.0.0.0 04:00:57.847:CDMA-GRE:(in) found session 5.0.0.2-4.0.0.1-1 04:00:59.863:CDMA-GRE:(in) found session 5.0.0.2-4.0.0.1-1 04:00:59.863:CDMA-GRE:(in) found session 5.0.0.2-4.0.0.1-1 04:01:01.879:CDMA-GRE:(in) found session 5.0.0.2-4.0.0.1-1 04:01:01.879:CDMA-GRE:(in) found session 5.0.0.2-4.0.0.1-1
DB-326
December 2010
*Mar *Mar
DB-327
Syntax Description
(Optional) Displays A10 PPP errors. (Optional) Displays A10 PPP events. (Optional) Displays transmitted or received A10 PPP packets.
Defaults
If the command is entered without any optional keywords, all of the types of debug information are enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Keywords were made optional. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cdma pdsn a10 ppp command:
Router# debug cdma pdsn a10 ppp errors CDMA PDSN A10 errors debugging is on Router# debug cdma pdsn a10 ppp events CDMA PDSN A10 events debugging is on Router# debug cdma pdsn a10 ppp packets CDMA PDSN A10 packet debugging is on Router# show debug *Jan 1 00:13:09:CDMA-PPP:create_va tunnel=CDMA-Ix1 virtual-template template=Virtual-Template2 ip_enabled=1 *Jan 1 00:13:09:CDMA-PPP:create_va va=Virtual-Access1 *Jan 1 00:13:09:CDMA-PPP:clone va=Virtual-Access1 subif_state=1 hwidb->state=0 *Jan 1 00:13:09: linestate=1 ppp_lineup=0 *Jan 1 00:13:09:%LINK-3-UPDOWN:Interface Virtual-Access1, changed state to up *Jan 1 00:13:09:CDMA-PPP:clone va=Virtual-Access1 subif_state=1 hwidb->state=4
DB-328
December 2010
*Jan *Jan
DB-329
Syntax Description
(Optional) Displays A11 protocol errors. (Optional) Displays A11 events. (Optional) Displays transmitted or received packets. (Optional) Specifies the ID of the mobile station.
Defaults
If the command is entered without any optional keywords, all of the types of debug information are enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The mnid argument was added and the existing keywords were made optional. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cdma pdsn a11 commands:
Router# debug cdma pdsn a11 errors CDMA PDSN A11 errors debugging is on Router# show debug 1d21h:CDMA-RP:(in) rp_msgs, code=1, status=0 1d21h:CDMA-RP:(enqueue req) type=1 homeagent=5.0.0.2 coaddr=4.0.0.1 1d21h: id=0xBEF750F0-0xBA53E0F lifetime=65535 1d21h:CDMA-RP:len=8, 00-00-00-00-00-00-00-F1 convert to 00000000000001 (14 digits), type=IMSI 1d21h:CDMA-RP:(req) process_rp_req, homeagent=5.0.0.2 coaddr=4.0.0.1 1d21h: lifetime=65535 id=BEF750F0-BA53E0F imsi=00000000000001 1d21h:CDMA-RP:(req) rp_req_create, 5.0.0.2-4.0.0.1-1 imsi=00000000000001 1d21h:CDMA-RP:(out) rp_reply session=5.0.0.2-4.0.0.1-1, lifetime=65535
DB-330
December 2010
1d21h:CDMA-RP:(out) setup_rp_out_msg, ha=5.0.0.2 coa=4.0.0.1 key=1 1d21h:%LINK-3-UPDOWN:Interface Virtual-Access2000, changed state to up 1d21h:CDMA-RP:ipmobile_visitor add/delete=1, mn=8.0.2.132, ha=7.0.0.2 1d21h:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access2000, changed state to up Router# debug cdma pdsn a11 packets events Router# show debug CDMA: CDMA PDSN A11 packet debugging is on for mnid 000000000000001 CDMA PDSN A11 events debugging is on for mnid 000000000000001 Router# *Mar 1 03:15:32.507:CDMA-RP:len=8, 01-00-00-00-00-00-00-10 convert to 000000000000001 (15 digits), type=IMSI *Mar 1 03:15:32.511:CDMA-RP:extension type=38, len=0 *Mar 1 03:15:32.511:CDMA-RP:extension type=38, len=0 *Mar 1 03:15:32.511:CDMA-RP:extension type=38, len=0 *Mar 1 03:15:32.511:CDMA-RP:extension type=32, len=20 *Mar 1 03:15:32.511: 00 00 01 00 EE 1F FC 43 0A 7D F9 36 29 C2 BA 28 *Mar 1 03:15:32.511: 5A 64 D5 9C *Mar 1 03:15:32.511:CDMA-RP:(req) process_rp_req, homeagent=5.0.0.2 coaddr=4.0.0.1 *Mar 1 03:15:32.511: lifetime=1800 id=AF3BFE55-69A109D IMSI=000000000000001 *Mar 1 03:15:32.511:CDMA-RP:(req) rp_req_create, ha=5.0.0.2, coa=4.0.0.1, key=1 IMSI=000000000000001 *Mar 1 03:15:32.511:CDMA-RP:(out) rp_reply session=5.0.0.2-4.0.0.1-1, lifetime=1800 *Mar 1 03:15:32.511:CDMA-RP:(out) Setup RP out message, ha=5.0.0.2 coa=4.0.0.1 key=1 *Mar 1 03:15:38.555:CDMA-RP:simple ip visitor added, mn=9.2.0.1, ha=0.0.0.0 Router# *Mar 1 03:15:54.755:CDMA-RP:len=8, 01-00-00-00-00-00-00-10 convert to 000000000000001 (15 digits), type=IMSI *Mar 1 03:15:54.755:CDMA-RP:extension type=38, len=0 *Mar 1 03:15:54.755:CDMA-RP:extension type=32, len=20 *Mar 1 03:15:54.755: 00 00 01 00 EA 9C C6 4C BA B9 F9 B6 DD C4 19 76 *Mar 1 03:15:54.755: 51 5A 56 45 *Mar 1 03:15:54.755:CDMA-RP:(req) process_rp_req, homeagent=5.0.0.2 coaddr=4.0.0.1 *Mar 1 03:15:54.755: lifetime=0 id=AF3BFE6B-4616E475 IMSI=000000000000001 *Mar 1 03:15:54.755:CDMA-RP:(req) rp_req_lifetime_zero 5.0.0.2-4.0.0.1-1 *Mar 1 03:15:54.755: IMSI=000000000000001 *Mar 1 03:15:54.755:CDMA-RP:(out) rp_reply session=5.0.0.2-4.0.0.1-1, lifetime=0 *Mar 1 03:15:54.755:CDMA-RP:(out) Setup RP out message, ha=5.0.0.2 coa=4.0.0.1 key=1 Router# debug cdma pdsn a11 event mnid 000000000000001 Router# show debug CDMA: CDMA PDSN A11 events debugging is on for mnid 000000000000001 Router# *Mar 1 03:09:34.339:CDMA-RP:len=8, 01-00-00-00-00-00-00-10 convert to 000000000000001 (15 digits), type=IMSI *Mar 1 03:09:34.339:CDMA-RP:(req) process_rp_req, homeagent=5.0.0.2 coaddr=4.0.0.1 *Mar 1 03:09:34.339: lifetime=1800 id=AF3BFCEE-DC9FC751 IMSI=000000000000001 *Mar 1 03:09:34.339:CDMA-RP:(req) rp_req_create, ha=5.0.0.2, coa=4.0.0.1, key=1 IMSI=000000000000001 *Mar 1 03:09:34.339:CDMA-RP:(out) rp_reply session=5.0.0.2-4.0.0.1-1, lifetime=1800 *Mar 1 03:09:34.339:CDMA-RP:(out) Setup RP out message, ha=5.0.0.2 coa=4.0.0.1 key=1 *Mar 1 03:09:40.379:CDMA-RP:simple ip visitor added, mn=9.2.0.1, ha=0.0.0.0
DB-331
Router# close the session Router# *Mar 1 03:10:00.575:CDMA-RP:len=8, 01-00-00-00-00-00-00-10 convert to 000000000000001 (15 digits), type=IMSI *Mar 1 03:10:00.575:CDMA-RP:(req) process_rp_req, homeagent=5.0.0.2 coaddr=4.0.0.1 *Mar 1 03:10:00.575: lifetime=0 id=AF3BFD09-18040319 IMSI=000000000000001 *Mar 1 03:10:00.575:CDMA-RP:(req) rp_req_lifetime_zero 5.0.0.2-4.0.0.1-1 *Mar 1 03:10:00.575: IMSI=000000000000001 *Mar 1 03:10:00.575:CDMA-RP:(out) rp_reply session=5.0.0.2-4.0.0.1-1, lifetime=0 *Mar 1 03:10:00.575:CDMA-RP:(out) Setup RP out message, ha=5.0.0.2 coa=4.0.0.1 key=1 Router# debug cdma pdsn a11 packet mnid 000000000000001 Router# show debug CDMA: CDMA PDSN A11 packet debugging is on for mnid 000000000000001 Router# *Mar 1 *Mar 1 *Mar 1 *Mar 1 *Mar 1 *Mar 1 *Mar *Mar *Mar *Mar 1 1 1 1
03:13:37.803:CDMA-RP:extension 03:13:37.803:CDMA-RP:extension 03:13:37.803:CDMA-RP:extension 03:13:37.803:CDMA-RP:extension 03:13:37.803: 00 00 01 03:13:37.803: 15 BF 5B 03:13:51.575:CDMA-RP:extension 03:13:51.575:CDMA-RP:extension 03:13:51.575: 00 00 01 03:13:51.579: DC 0A B0
DB-332
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cdma pdsn accounting command:
Router# debug cdma pdsn accounting CDMA PDSN accounting debugging is on Router# *Jan 1 00:15:32:CDMA/ACCT:null vaccess in session_start *Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[9] *Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[44] len:[3] 01 Processing Y1 *Jan 1 00:15:32:CDMA/ACCT: Setup airlink record received *Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[12] *Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[41] len:[6] 00 00 00 02 CDMA/ACCT: Processing Y2 *Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[9] *Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[42] len:[3] 12 CDMA/ACCT: Processing Y3 *Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1F] len:[17] 30 30 30 30 30 30 30 30 30 30 30 30 30 30 32 Processing A1 *Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[12] *Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[9] len:[6] 04 04 04 05 Processing D3 *Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[14] *Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[10] len:[8] 00 00 04 04 04 05 Processing D4 *Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[9] *Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[44] len:[3] 02 Processing Y1 *Jan 1 00:15:32:CDMA/ACCT: Start airlink record received *Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[12]
DB-333
*Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[41] len:[6] 00 00 00 02 CDMA/ACCT: Processing Y2 *Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[9] *Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[42] len:[3] 13 CDMA/ACCT: Processing Y3 *Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[10] *Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[11] len:[4] 00 02 Processing E1 *Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[10] *Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[12] len:[4] 00 F1 Processing F1
DB-334
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cdma pdsn accounting flow command:
Router# debug cdma pdsn accounting flow CDMA PDSN flow based accounting debugging is on pdsn-6500# 01:59:40:CDMA-SM:cdma_pdsn_flow_acct_upstream sess id 1 flow type 0 bytes 100 addr 20.20.20.1 01:59:40:CDMA-SM:cdma_pdsn_flow_acct_downstream sess id 1 flow type 0 bytes 100 addr 20.20.20.1
DB-335
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cdma pdsn accounting time-of-day command:
Router# debug cdma pdsn accounting time-of-day CDMA PDSN accounting time-of-day debugging is on Feb 15 19:13:23.634:CDMA-TOD:Current timer expiring in 22 seconds Feb 15 19:13:24.194:%SYS-5-CONFIG_I:Configured from console by console Router# Feb 15 19:13:45.635:CDMA-TOD:Timer expired...Rearming timer Feb 15 19:13:45.635:CDMA-TOD:Gathering session info Feb 15 19:13:45.635:CDMA-TOD:Found 0 sessions
DB-336
December 2010
Syntax Description
Displays cluster messages for errors, events and packets received. Displays redundancy information for errors, events, and sent or received packets. Displays either cluster or redundancy error messages. Displays either all cluster or all redundancy events. Displays all transmitted or received cluster or redundancy packets.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This debug is only allowed on PDSN c6-mz images, and helps to monitor prepaid information.
Examples
The following is sample output from the debug cdma pdsn cluster command:
Router# debug cdma pdsn cluster ? message redundancy Debug PDSN cluster controller messages Debug PDSN cluster controller redundancy
DB-337
Syntax Description
Defaults
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(11)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The following example illustrates the debug cdma pdsn ipv6 command:
Router# debug cdma pdsn ipv6
DB-338
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This debug is only allowed on PDSN c6-mz images, and helps to monitor prepaid information.
Examples
The following is sample output from the debug cdma pdsn prepaid command:
Router# debug cdma pdsn prepaid *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 00:09:38.391: 00:09:38.391: 00:09:38.391: 00:09:38.391: 00:09:38.391: 00:09:38.391: 00:09:38.391: 00:09:38.391: 00:09:38.391: 00:09:38.391: 00:09:38.391: 00:09:38.395: 00:09:38.395: 00:09:38.395: 00:09:38.395: 00:09:38.395: 00:09:38.395: 00:09:38.395: 00:09:38.395: CDMA-PREPAID: Initialized the authorization request CDMA-PREPAID: Added username into A-V list CDMA-PREPAID: Added CLID into A-V list CDMA-PREPAID: Added session id for prepaid CDMA-PREPAID: Added correlation id into A-V list CDMA-PREPAID: Added auth reason for prepaid into A-V list CDMA-PREPAID: Added USER_ID for prepaid CDMA-PREPAID: Added service id for prepaid CDMA-PREPAID: Built prepaid VSAs CDMA-PREPAID: Sent the request to AAA CDMA-PREPAID: Auth_reason: CRB_RSP_PEND_INITIAL_QUOTA CDMA-PREPAID: Received prepaid response: status 2 CDMA-PREPAID: AAA authorised parms being processed CDMA-PREPAID: Attr in Grp Prof: crb-entity-type (0x4B000000) CDMA/PREPAID: AAA_AT_CRB_ENTITY_TYPE (0x4B000000) CDMA/PREPAID: entity type returns 1 CDMA-PREPAID: Attr in Grp Prof: crb-duration (0x4B000000) CDMA/PREPAID: AAA_AT_CRB_DURATION (0x4B000000) CDMA/PREPAID: duration returns 120
DB-339
1 00:09:38.395: CDMA-PREPAID: Retrieved attributes successfully 1 00:09:38.395: CDMA-PREPAID: Reset duration to 120, mn 9.3.0.1 1 00:09:38.395: CDMA-PREPAID: : Started duration timer for 120 sec
DB-340
December 2010
Syntax Description
Defaults
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(11)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-341
Syntax Description
errors events
Displays Packet Data Service node (PDSN) resource manager errors. Displays PDSN resource manager events.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cdma pds resource-manager command:
Router# debug cdma pdsn resource-manager errors events CDMA PDSN resource manager errors CDMA PDSN resource manager events
DB-342
December 2010
Syntax Description
Displays PDSN selection errors. Displays PDSN selection events. Displays transmitted or received packets.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cdma pdsn selection command with the keyword events specified:
Router# debug cdma pdsn selection events CDMA PDSN Router# 00:27:46: 00:27:46: 00:27:46: 00:27:46: 00:27:46: 00:27:46: 00:27:46: 00:27:46: 00:27:47: 00:27:47: 00:27:47: 00:27:47: 00:27:47: 00:27:47: selection events debugging is on CDMA-PSL: Message(IN) pdsn 51.4.2.40 interface 70.4.2.40 Keepalive 10 Count 0 Capacity 16000 Weight 0 Hostname 11 7206-PDSN-2 CDMA-PSL: Reset keepalive, pdsn 51.4.2.40 current 10 new 10 CDMA-PSL: Message processed, pdsn 51.4.2.40 tsize 0 pendings 0 CDMA-PSL: Send KEEPALIVE, len 32 CDMA-PSL: Message(OUT) dest 224.0.0.11 Keepalive 10 Count 1 Capacity 16000 Weight 0
DB-343
00:27:47: Hostname 11 7206-PDSN-1 00:27:47: CDMA-PSL: RRQ sent, s=70.4.1.40 (FastEthernet0/1), d=224.0.0.11
DB-344
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cdma pdsn service-selection command:
Router# debug cdma pdsn service-selection CDMA PDSN service provisioning debugging is on Router# 1d02h:%LINK-3-UPDOWN:Interface Virtual-Access3, changed state to up 1d02h:Vi3 CDMA-SP:user_class=1, ms_ipaddr_req=1, apply_acl=0 1d02h:Vi3 CDMA-SP:Adding simple ip flow, user=bsip, mn=6.0.0.2, 1d02h:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access3, changed state to up
DB-345
Syntax Description
errors events
Defaults
If the command is entered without any optional keywords, all of the types of debug information are enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Keywords were made optional. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cdma pdsn session command:
Router# debug cdma pdsn session events CDMA PDSN session events debugging is on Router# debug cdma pdsn session errors CDMA PDSN session errors debugging is on Router# show debug CDMA: CDMA PDSN session events debugging is on CDMA PDSN session errors debugging is on Router# *Jan 1 00:22:27:CDMA-SM:create_session 5.5.5.5-4.4.4.5-2 *Jan 1 00:22:27:CDMA-SM:create_tunnel 5.5.5.5-4.4.4.5 *Jan 1 00:22:27:%LINK-3-UPDOWN:Interface Virtual-Access1, changed state to up *Jan 1 00:22:29:CDMA-SM:create_flow mn=0.0.0.0, ha=8.8.8.8 [email protected] *Jan 1 00:22:30:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access1, changed state to up
DB-346
December 2010
debug cdp
To enable debugging of the Cisco Discovery Protocol (CDP), use the debug cdp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug cdp {packets | adjacency | events} no debug cdp {packets | adjacency | events}
Syntax Description
Enables packet-related debugging output. Enables adjacency-related debugging output. Enables output related to error messages, such as detecting a bad checksum.
Command Modes
Command History
Modification This command was introduced in a release earlier than Cisco IOS Release 12.4(2)T. This command was modified. The debug output was enhanced to display location Type-Length-Values (TLVs), location-server TLVs, and application TLV-related debugs.
Usage Guidelines
Use debug cdp commands to display information about CDP packet activity, activity between CDP neighbors, and various CDP events.
Examples
The following is sample output from the debug cdp packets, debug cdp adjacency, and debug cdp events commands:
Router# debug cdp packets CDP packet info debugging is on Router# debug cdp adjacency CDP neighbor info debugging is on Router# debug cdp events CDP events debugging is on CDP-PA: Packet sent out on Ethernet0 CDP-PA: Packet received from gray.cisco.com on interface Ethernet0 CDP-AD: Deleted table entry for violet.cisco.com, interface Ethernet0 CDP-AD: Interface Ethernet2 coming up CDP-EV: Encapsulation on interface Serial2 failed
DB-347
Related Commands
Description Configures location support in CDP. Displays information about CDP TLVs.
DB-348
December 2010
debug cdp ip
To enable debug output for the IP routing information that is carried and processed by the Cisco Discovery Protocol (CDP), use the debug cdp ip command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug cdp ip no debug cdp ip
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
CDP is a media- and protocol-independent device-discovery protocol that runs on all Cisco routers. You can use the debug cdp ip command to determine the IP network prefixes CDP is advertising and whether CDP is correctly receiving this information from neighboring routers. Use the debug cdp ip command with the debug ip routing command to debug problems that occur when on-demand routing (ODR) routes are not installed in the routing table at a hub router. You can also use the debug cdp ip command with the debug cdp packet and debug cdp adjacency commands along with encapsulation-specific debug commands to debug problems that occur in the receipt of CDP IP information.
Examples
The following is sample output from the debug cdp ip command. This example shows the transmission of IP-specific information in a CDP update. In this case, three network prefixes are being sent, each with a different network mask.
Router# debug cdp ip CDP-IP: Writing prefix 172.1.69.232.112/28 CDP-IP: Writing prefix 172.19.89.0/24 CDP-IP: Writing prefix 11.0.0.0/8
This message indicates that CDP is attempting to install the prefix 172.16.1.0/24 into the IP routing table:
CDP-IP: Updating prefix 172.16.1.0/24 in routing table
This message indicates a protocol error occurred during an attempt to decode an incoming CDP packet:
CDP-IP: IP TLV length (3) invalid
This message indicates the receipt of the IP prefix 172.16.1.0/24 from a CDP neighbor connected via Ethernet interface 0/0. The neighbor IP address is 10.0.01.
CDP-IP: Reading prefix 172.16.1.0/24 source 10.0.0.1 via Ethernet0/0
DB-349
Related Commands
Description Displays information on RIP routing table updates and route cache updates.
DB-350
December 2010
debug cef
To enable the display of information about Cisco Express Forwarding events, use the debug cef command in privileged EXEC mode. To disable the display of Cisco Express Forwarding events, use the no form of this command. debug cef {all | assert | background | broker | consistency-check | elog | epoch | fib [attached export | subblock] | hardware {notification | queries} | hash | high-availability | interest | interface | iprm | issu | loadinfo | memory | non-ip | path [extension | list | scope ]] | subtree context | switching background | table | xdr} no debug cef {all | assert | background | broker | consistency-check | elog | epoch | fib [attached export | subblock] | hardware {notification | queries} | hash | high-availability | interest | interface | iprm | issu | loadinfo | memory | non-ip | path [extension | list | scope ]] | subtree context | switching background | table | xdr}
Syntax Description
all assert background broker consistency-check elog epoch fib [attached export | subblock] hardware {notification | queries} hash high-availability interest interface iprm
Displays debug messages for all Cisco Express Forwarding events. Displays debug messages for Cisco Express Forwarding assert events. Displays debug messages for Cisco Express Forwarding background events. Displays debug messages for Cisco Express Forwarding broker events. Displays debug messages for Cisco Express Forwarding consistency checker events. Displays debug messages for Cisco Express Forwarding elog events. Displays debug messages for Cisco Express Forwarding epoch events. Displays debug messages for Cisco Express Forwarding Forwarding Information Base entry events. Displays debug messages for Cisco Express Forwarding hardware API notifications or hardware API queries. Displays debug messages for Cisco Express Forwarding load-balancing hash algorithms. Displays debug messages for Cisco Express Forwarding high availability events. Displays debug messages for Cisco Express Forwarding interest list events. Displays debug messages for Cisco Express Forwarding interface events. Displays debug messages for Cisco Express Forwarding IP rewrite manager events. (This keyword is not available in Cisco IOS Release 12.2(33)SRA.) Displays debug messages for Cisco Express Forwarding In Service Software Upgrade (ISSU) events.
issu
DB-351
loadinfo memory non-ip path [extension | list | scope] subtree context switching background table xdr
Displays debug messages for Cisco Express Forwarding loadinfo events. Displays debug messages for Cisco Express Forwarding memory events. Displays debug messages for Cisco Express Forwarding non-IP entry events. Displays debug messages for Cisco Express Forwarding path events. Displays debug messages for Cisco Express Forwarding subtree context events. Displays debug messages for Cisco Express Forwarding switching background events. Displays debug messages for Cisco Express Forwarding table events. Displays debug messages for Cisco Express Forwarding External Data Representation (XDR) events.
Defaults
Command Modes
Command History
Release 12.2(25)S
Modification This command was introduced. The debug cef fib attached export command rerplaces the debug ip cef adjfib command.
This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
Because debugging output is assigned high priority in the CPU process, you should use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, you should use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Examples
The following is sample output from the debug cef all command:
Router# debug cef all 06:23:38: HW-API: Counter poll: Label[label=implicit-null]
DB-352
December 2010
06:23:38: HW-API: Counter poll: Label[label=implicit-null] 06:23:38: HW-API: Counter poll: Label[label=implicit-null] 06:23:43: FIBbg: Timer 'FIB checkers: IPv4 scan-rib-ios scanner' expired, callin g 0x40FA03FC, context 0x00010003) 06:23:43: FIBbg: Restarting timer 'FIB checkers: IPv4 scan-rib-ios scanner' with delay 60000 06:23:43: FIBbg: Timer 'FIB checkers: IPv4 scan-ios-rib scanner' expired, callin g 0x40FA03FC, context 0x00010004) 06:23:43: FIBbg: Restarting timer 'FIB checkers: IPv4 scan-ios-rib scanner' with delay 60000 06:23:43: FIBbg: Timer 'FIB checkers: IPv6 scan-ios-rib scanner' expired, callin g 0x40FA03FC, context 0x00020004) 06:23:43: FIBbg: Restarting timer 'FIB checkers: IPv6 scan-ios-rib scanner' with delay 60000 06:23:43: FIBbg: Timer 'FIB checkers: IPv4 scan-rp-lc scanner' expired, calling 0x40FA03FC, context 0x00010002) 06:23:43: FIBbg: Restarting timer 'FIB checkers: IPv4 scan-rp-lc scanner' with d elay 60000 06:23:43: FIBbg: Timer 'FIB checkers: IPv6 scan-rp-lc scanner' expired, calling 0x40FA03FC, context 0x00020002) 06:23:43: FIBbg: Restarting timer 'FIB checkers: IPv6 scan-rp-lc scanner' with d elay 60000 06:23:48: HW-API: Counter poll: Label[label=implicit-null] 06:23:48: HW-API: Counter poll: Label[label=implicit-null] 06:23:48: HW-API: Counter poll: Label[label=implicit-null] 06:23:58: HW-API: Counter poll: Label[label=implicit-null] 06:24:06: FIBtable: IPv4: Event modified, 0.0.0.0/0, vrf Default, 1 path, flags 00420005 06:24:06: FIBpath: Configuring IPv4 path 444B2AB0 from rib (idb=NULL, gw=9.1.41. 1, gw_table=0, rr=1) and host prefix 0.0.0.0 06:24:06: FIBpath: Configured recursive-nexthop 9.1.41.1[0] 444B2AB0 path 06:24:06: FIBfib: [v4-0.0.0.0/0 (44AAC750)] Mod type - null 06:24:06: FIBtable: IPv4: Event up, default, 0.0.0.0/0, vrf Default, 1 path, fla gs 00420005 06:24:06: FIBtable: IPv4: Adding route for 0.0.0.0/0 but route already exists. T rying modify. 06:24:06: FIBpath: Configuring IPv4 path 444B2AA0 from rib (idb=NULL, gw=9.1.41. 1, gw_table=0, rr=1) and host prefix 0.0.0.0sh ip 06:24:06: FIBpath: Configured recursive-nexthop 9.1.41.1[0] 444B2AA0 path 06:24:06: FIBfib: [v4-0.0.0.0/0 (44AAC750)] Mod type - null vrf 06:24:07: FIBbg: Timer 'FIB checkers: IPv4 scan-hw-sw scanner' expired, calling 0x40FA03FC, context 0x00010005) 06:24:07: FIBbg: Restarting timer 'FIB checkers: IPv4 scan-hw-sw scanner' with d elay 60000 06:24:07: FIBbg: Timer 'FIB checkers: IPv4 scan-sw-hw scanner' expired, calling 0x40FA03FC, context 0x00010006) 06:24:07: FIBbg: Restarting timer 'FIB checkers: IPv4 scan-sw-hw scanner' with d elay 60000 Name Default RD Interfaces red 1:1 Ethernet4/0/5
DB-353
Related Commands
Command cef table consistency-check clear cef table clear ip cef inconsistency
Description Enables Cisco Express Forwarding consistency checker table values by type and parameter. Clears the Cisco Express Forwarding tables. Clears Cisco Express Forwarding inconsistency statistics and records found by the Cisco Express Forwarding consistency checkers. Enables the collection of events that affect entries in the Cisco Express Forwarding tables.
show cef table consistency-check Displays Cisco Express Forwarding consistency checker table values. show ip cef inconsistency Displays Cisco Express Forwarding IP prefix inconsistencies.
DB-354
December 2010
Syntax Description
Numeric values that indicate the router slot, WAN interface card (WIC) slot, and port. CRC error details. Other error details. Errors debugging.
Command Default
None
Command Modes
EXEC (#)
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Related Commands
Command debug cellular messages async debug cellular messages data debug cellular firmware debug cellular messages management debug cellular messages dm debug cellular messages virt-con
Description Debugs cellular async. Prints Cisco IOS data path debug messages. Displays Cisco IOS firmware information. Prints management path messages, such as CnS. Prints diagnostics monitor (DM) messages from the Qualcomm CDMA chipset. Redirects the Nios II console driver messages to display them in the Cisco IOS router console environment.
DB-355
Syntax Description
slot/wic_slot/port
Numeric values that indicate the router slot, WAN interface card (WIC) slot, and port.
Command Default
None
Command Modes
EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Related Commands
Command debug cellular messages async debug cellular messages data debug cellular driver debug cellular messages management debug cellular messages dm debug cellular messages virt-con
Description Debugs cellular async. Prints Cisco IOS data path debug messages. Debugs the Cisco IOS driver. Prints management path messages, such as CnS. Prints diagnostics monitor (DM) messages from the Qualcomm CDMA chipset. Redirects the Nios II console driver messages to display them in the Cisco IOS router console environment.
DB-356
December 2010
Syntax Description
slot/wic_slot/port
Numeric values that indicate the router slot, WAN interface card (WIC) slot, and port.
Command Default
None
Command Modes
EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Related Commands
Command debug cellular messages async debug cellular messages data debug cellular driver debug cellular firmware debug cellular messages management debug cellular messages dm debug cellular messages virt-con
Description Debugs cellular async. Prints Cisco IOS data path debug messages. Debugs the Cisco IOS driver. Displays Cisco IOS firmware information. Prints management path messages, such as CnS. Prints diagnostics monitor (DM) messages from the Qualcomm CDMA chipset. Redirects the Nios II console driver messages to display them in the Cisco IOS router console environment.
DB-357
Syntax Description
slot/wic_slot/port
Numeric values that indicate the router slot, WAN interface card (WIC) slot, and port.
Command Default
None
Command Modes
EXEC (#)
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Related Commands
Command debug cellular messages all debug cellular messages data debug cellular driver debug cellular firmware debug cellular messages management debug cellular messages dm debug cellular messages virt-con
Description Prints all Cisco IOS driver debug messages. Prints Cisco IOS data path debug messages. Debugs the Cisco IOS driver. Displays Cisco IOS firmware information. Prints management path messages, such as CnS. Prints diagnostics monitor (DM) messages from the Qualcomm CDMA chipset. Redirects the Nios II console driver messages to display them in the Cisco IOS router console environment.
DB-358
December 2010
Syntax Description
slot/wic_slot/port
Numeric values that indicate the router slot, WAN interface card (WIC) slot, and port.
Command Default
None
Command Modes
EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Related Commands
Command debug cellular messages all debug cellular messages async debug cellular driver debug cellular firmware debug cellular messages management debug cellular messages dm debug cellular messages virt-con
Description Prints all Cisco IOS driver debug messages. Debugs cellular async. Debugs the Cisco IOS driver. Displays Cisco IOS firmware information. Prints management path messages, such as CnS. Prints diagnostics monitor (DM) messages from the Qualcomm CDMA chipset. Redirects the Nios II console driver messages to display them in the Cisco IOS router console environment.
DB-359
Syntax Description
slot/wic_slot/port
Numeric values that indicate the router slot, WAN interface card (WIC) slot, and port.
Command Default
Command Modes
EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Related Commands
Command debug cellular messages all debug cellular messages async debug cellular messages data debug cellular driver debug cellular firmware debug cellular messages management debug cellular messages virt-con
Description Prints all Cisco IOS driver debug messages. Debugs cellular async. Prints Cisco IOS data path debug messages. Debugs the Cisco IOS driver. Displays Cisco IOS firmware information. Prints management path messages, such as CnS. Redirects the Nios II console driver messages to display them in the Cisco IOS router console environment.
DB-360
December 2010
Syntax Description
slot/wic_slot/port
Numeric values that indicate the router slot, WAN interface card (WIC) slot, and port.
Command Default
None
Command Modes
EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Related Commands
Command debug cellular messages all debug cellular messages async debug cellular messages data debug cellular driver debug cellular firmware debug cellular messages virt-con
Description Prints all Cisco IOS driver debug messages. Debugs cellular async. Prints Cisco IOS data path debug messages. Debugs the Cisco IOS driver. Displays Cisco IOS firmware information. Redirects the Nios II console driver messages to display them in the Cisco IOS router console environment.
DB-361
Syntax Description
Numeric values that indicate the router slot, WAN interface card (WIC) slot, and port. (Optional) Clears all virtual console debug log messages. (Optional) Disables virtual console real-time debug monitoring. (Optional) Dumps virtual console data structures. (Optional) Displays virtual console messages from the debug log. (Optional) Enables monitoring of real-time virtual console debug messages. (Optional) Disables wraparound for virtual console log messages. (Optional) Enables wraparound for virtual console log messages.
Command Default
Command Modes
EXEC (#)
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Related Commands
Command debug cellular messages all debug cellular messages async debug cellular messages data debug cellular driver debug cellular firmware
Description Prints all Cisco IOS driver debug messages. Debugs cellular async. Prints Cisco IOS data path debug messages. Debugs the Cisco IOS driver. Displays Cisco IOS firmware information.
DB-362
December 2010
Description Prints management path messages, such as CnS. Prints diagnostics monitor (DM) messages from the Qualcomm CDMA chipset.
DB-363
Syntax Description
Command Modes
Command History
Release 12.2(33)SRC
Modification This command was introduced on the Cisco 7600 series routers.
Usage Guidelines
Examples
Related Commands
DB-364
December 2010
Syntax Description
Command Modes
Command History
Release 12.2(33)SRC
Modification This command was introduced on the Cisco 7600 series routers.
Usage Guidelines
Examples
The following command turns on debugging for CEM local switching events.
Router# debug cem ls events
Related Commands
DB-365
debug ces-conn
To display information from circuit emulation service (CES) clients, use the debug ces-conn command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ces-conn [all | errors | events] no debug ces-conn
Syntax Description
(Optional) Displays all error and event information. (Optional) Displays only error information. (Optional) Displays only event information.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command is supported on Cisco 3600 series routers. This command was integrated into Cisco IOS Release 12.2(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
Router(config)# connect conn1 t1 3/0 1 atm1/0 1/100 Router(config-ces-conn)# exit Router(config)# *Mar 6 18:32:27:CES_CLIENT:vc QoS parameters are PCR = 590, CDV = 5000, CAS_ENABLED = 1,partial fill = 0, multiplier = 8,cbr rate = 64, clock recovery = 0,service_type = 3, error method = 0,sdt_size = 196, billing count = 0 *Mar 6 18:32:27:CES_CLIENT:attempt 1 to activate segment>
DB-366
December 2010
debug cfm
'To enable debugging of the data path of Ethernet connectivity fault management (CFM) on Cisco Catalyst 6500 series switches, use the debug cfm command in privileged EXEC mode. To disable the debugging function, use the no form of this command. debug cfm {all | api | cfmpal | common |db | isr} no debug cfm {all | api | cfmpal | common |db | isr}
Syntax Description
Specifies all Catalyst 6500 switch-specific route processor and switch processor (RP/SP) events. Specifies Catalyst 6500 switch-specific application program interface (API) events. Specifies general Catalyst 6500 switch debugging. Specifies common Catalyst 6500 switch RP/SP components. Specifies Catalyst 6500 switch CFM database debugging. Specifies Catalyst 6500 switch-specific ingress CFM packet debugging.
Command Default
Debugging is disabled.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Usage Guidelines
The output from this command is a log of activity. Use this command to troubleshoot Ethernet CFM on Cisco Catalyst 6500 series switches.
Examples
The following example shows output of the debug cfm all command:
Router# debug cfm all CFM DB events debugging is on CFM Ingress ISR events debugging is on CFMPAL events debugging is on CFM API events debugging is on CFM RP/SP COMMON events debugging is on CFM packets debugging is on
DB-367
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command displays CMCC adapter events that occur on the Channel Interface Processor (CIP) or Channel Port Adapter (CPA) and is useful for diagnosing problems in an IBM channel attach network. It provides an overall picture of the stability of the network. In a stable network, the debug channel events command does not return any information. If the command generates numerous messages, the messages can indicate the possible source of the problems. To observe the statistic message (cip_love_letter) sent every 10 seconds, use the debug channel love command. When configuring or making changes to a router or interface that supports IBM channel attach, enable the debug channel events command. Doing so alerts you to the progress of the changes or to any errors that might result. Also use this command periodically when you suspect network problems.
Examples
The following sample output is from the debug channel events command:
Router# debug channel events Channel3/0: Channel3/0: Channel3/0: Channel3/0: cip_reset(), state administratively down cip_reset(), state up sending nodeid sending command for vc 0, CLAW path C700, device C0
The following line indicates that the CIP is being reset to an administrative down state:
Channel3/0: cip_reset(), state administratively down
The following line indicates that the CIP is being reset to an administrative up state:
Channel3/0: cip_reset(), state up
DB-368
December 2010
The following line indicates that the node ID is being sent to the CIP. This information is the same as the Local Node information under the show extended channel slot/port subchannels command. The CIP needs to send this information to the host mainframe.
Channel3/0: sending nodeid
The following line indicates that a Common Link Access for Workstations (CLAW) subchannel command is being sent from the Route Processor (RP) to the CIP. The value vc 0 indicates that the CIP will use virtual circuit number 0 with this device. The virtual circuit number also shows up when you use the debug channel packets command.
Channel3/0: sending command for vc 0, CLAW path C700, device C0
The following is a sample output that is generated by the debug channel events command when a CMPC+ IP TG connection is activated with the host:
1d05h:Channel4/2:Received route UP for tg (768) 1d05h:Adding STATIC ROUTE for vc:768
The following is a sample output from the debug channel events command when a CMPC+ IP TG connection is deactivated:
1d05h:Channel4/2:Received route DOWN for tg (768) 1d05h:Deleting STATIC ROUTE for vc:768
Related Commands
Description Displays CIP love letter events. Displays per-packet debugging output.
DB-369
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug channel ilan command displays events related to CMCC internal LANs. This command is useful for debugging problems associated with CMCC internal LAN configuration. It is also useful for debugging problems related to SRB packet flows through internal LANs.
Examples
The following is sample output from the debug channel ilan command:
Router# debug channel ilan Channel internal LANs debugging is on
The following line indicates that a packet destined for the CMCC via a configured internal MAC adapter configured on an internal LAN was dropped because the Logical Link Control (LLC) end station in Cisco IOS software did not exist:
CIP ILAN(Channel3/2-Token): Packet dropped - NULL LLC
The following line indicates that a packet destined for the CMCC via a configured internal MAC adapter configured on an internal LAN was dropped because the CMCC had not yet acknowledged the internal MAC adapter configuration command:
Channel3/2: ILAN Token-Ring 3 - CIP internal MAC adapter not acknowledged DMAC(4000.7000.0001) SMAC(0c00.8123.0023)
DB-370
December 2010
Related Commands
Description Displays processing that occurs on the channel adapter interfaces of all installed adapters. Displays information about packets and frames transferred across a source-route bridge.
DB-371
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command displays CIP love letter events (an operating status or configuration message) that occur on the CIP interface processor and is useful for diagnosing problems in an IBM channel attach network. It provides an overall picture of the stability of the network. In a stable network, the debug channel love command returns a statistic message (cip_love_letter) that is sent every 10 seconds. This command is valid for the Cisco 7000 series routers only.
Examples
The following is sample output from the debug channel love command:
Router# debug channel love Channel3/1: love letter received, bytes 3308 Channel3/0: love letter received, bytes 3336 cip_love_letter: received ll, but no cip_info
The following line indicates that data was received on the CIP:
Channel3/1: love letter received, bytes 3308
The following line indicates that the interface is enabled, but there is no configuration for it. It does not normally indicate a problem, just that the Route Processor (RP) got statistics from the CIP but has no place to store them.
cip_love_letter: received ll, but no cip_info
Related Commands
Description Displays processing that occurs on the channel adapter interfaces of all installed adapters. Displays per-packet debugging output.
DB-372
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug channel packets command displays all process-level Channel Interface Processor (CIP) packets for both outbound and inbound packets. The output reports information when a packet is received or a transmission is attempted. You will need to disable fast switching and autonomous switching to obtain debugging output. This command is useful for determining whether packets are received or sent correctly. This command is valid for the Cisco 7000 series routers only.
Examples
The following is sample output from the debug channel packets command:
Router# debug channel packets (Channel3/0)-out size = 104, vc = 0000, type = 0800, src 172.24.0.11, dst 172.24.1.58 (Channel3/0)-in size = 48, vc = 0000, type = 0800, src 172.24.1.58, dst 172.24.15.197 (Channel3/0)-in size = 48, vc = 0000, type = 0800, src 172.24.1.58, dst 172.24.15.197 (Channel3/0)-out size = 71, vc = 0000, type = 0800, src 172.24.15.197, dst 172.24.1.58 (Channel3/0)-in size = 44, vc = 0000, type = 0800, src 172.24.1.58, dst 172.24.15.197
Description Interface slot and port. In is a packet from the mainframe to the router. Out is a packet from the router to the mainframe. Number of bytes in the packet, including internal overhead. Value from 0 to 511 that maps to the claw interface configuration command. This information is from the MAC layer. Encapsulation type in the MAC layer. The value 0800 indicates an IP datagram. Origin, or source, of the packet, as opposed to the previous hop address. Destination of the packet, as opposed to the next-hop address.
DB-373
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug clns esis events command:
Router# debug clns esis events ES-IS: ISH from aa00.0400.2c05 (Ethernet1), HT 30 ES-IS: ESH from aa00.0400.9105 (Ethernet1), HT 150 ES-IS: ISH sent to All ESs (Ethernet1): NET 49.0001.AA00.0400.6904.00, HT 299, HLEN 20
The following line indicates that the router received a hello packet (ISH) from the IS at MAC address aa00.0400.2c05 on Ethernet interface 1. The hold time (or number of seconds to consider this packet valid before deleting it) for this packet is 30 seconds.
ES-IS: ISH from aa00.0400.2c05 (Ethernet1), HT 30
The following line indicates that the router received a hello packet (ESH) from the ES at MAC address aa00.0400.9105 on the Ethernet interface 1. The hold time is 150 seconds.
ES-IS: ESH from aa00.0400.9105 (Ethernet1), HT 150
The following line indicates that the router sent an IS hello packet on the Ethernet interface 0 to all ESs on the network. The network entity title (NET) address of the router is 49.0001.0400.AA00.6904.00; the hold time for this packet is 299 seconds; and the header length of this packet is 20 bytes.
ES-IS: ISH sent to All ESs (Ethernet1): NET 49.0001.AA00.0400.6904.00, HT 299, HLEN 20
DB-374
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug clns esis packets command:
Router# debug clns esis packets ES-IS: ISH sent to All ESs (Ethernet0): NET 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00, HT 299, HLEN 33 ES-IS: ISH sent to All ESs (Ethernet1): NET 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00, HT 299, HLEN 34 ES-IS: ISH from aa00.0400.6408 (Ethernet0), HT 299 ES-IS: ISH sent to All ESs (Tunnel0): NET 47.0005.80ff.ef00.0000.0001.5940.1600.O906.4023.00, HT 299, HLEN 34 IS-IS: ESH from 0000.0c00.bda8 (Ethernet0), HT 300
The following line indicates that the router has sent an IS hello packet on Ethernet interface 0 to all ESs on the network. This hello packet indicates that the NET of the router is 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00. The hold time for this packet is 299 seconds. The packet header is 33 bytes in length.
ES-IS: ISH sent to All ESs (Ethernet0): NET 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00, HT 299, HLEN 33
The following line indicates that the router has sent an IS hello packet on Ethernet interface 1 to all ESs on the network. This hello packet indicates that the NET of the router is 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00. The hold time for this packet is 299 seconds. The packet header is 33 bytes in length.
ES-IS: ISH sent to All ESs (Ethernet1): NET 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00, HT 299, HLEN 34
The following line indicates that the router received a hello packet on Ethernet interface 0 from an intermediate system, aa00.0400.6408. The hold time for this packet is 299 seconds.
ES-IS: ISH from aa00.0400.6408 (Ethernet0), HT 299
The following line indicates that the router has sent an IS hello packet on Tunnel interface 0 to all ESs on the network. This hello packet indicates that the NET of the router is 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00. The hold time for this packet is 299 seconds. The packet header is 33 bytes in length.
ES-IS: ISH sent to All ESs (Tunnel0): NET 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00, HT 299, HLEN 34
DB-375
The following line indicates that on Ethernet interface 0, the router received a hello packet from an end system with an SNPA of 0000.0c00.bda8. The hold time for this packet is 300 seconds.
IS-IS: ESH from 0000.0c00.bda8 (Ethernet0), HT 300
DB-376
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug clns events command:
Router# debug clns events CLNS: Echo PDU received on Ethernet3 from 39.0001.2222.2222.2222.00! CLNS: Sending from 39.0001.3333.3333.3333.00 to 39.0001.2222.2222.2222.00 via 2222.2222.2222 (Ethernet3 0000.0c00.3a18) CLNS: Forwarding packet size 117 from 39.0001.2222.2222.2222.00 to 49.0002.0001.AAAA.AAAA.AAAA.00 via 49.0002 (Ethernet3 0000.0c00.b5a3) CLNS: RD Sent on Ethernet3 to 39.0001.2222.2222.2222.00 @ 0000.0c00.3a18, redirecting 49.0002.0001.AAAA.AAAA.AAAA.00 to 0000.0c00.b5a3
The following line indicates that the router received an echo protocol data unit (PDU) on Ethernet interface 3 from source network service access point (NSAP) 39.0001.2222.2222.2222.00. The exclamation point at the end of the line has no significance.
CLNS: Echo PDU received on Ethernet3 from 39.0001.2222.2222.2222.00!
The following lines indicate that the router at source NSAP 39.0001.3333.3333.3333.00 is sending a CLNS echo packet to destination NSAP 39.0001.2222.2222.2222.00 via an IS with system ID 2222.2222.2222. The packet is being sent on Ethernet interface 3, with a MAC address of 0000.0c00.3a18.
CLNS: Sending from 39.0001.3333.3333.3333.00 to 39.0001.2222.2222.2222.00 via 2222.2222.2222 (Ethernet3 0000.0c00.3a18)
The following lines indicate that a CLNS echo packet 117 bytes in size is being sent from source NSAP 39.0001.2222.2222.2222.00 to destination NSAP 49.0002.0001.AAAA.AAAA.AAAA.00 via the router at NSAP 49.0002. The packet is being forwarded on the Ethernet interface 3, with a MAC address of 0000.0c00.b5a3.
CLNS: Forwarding packet size 117 from 39.0001.2222.2222.2222.00 to 49.0002.0001.AAAA.AAAA.AAAA.00 via 49.0002 (Ethernet3 0000.0c00.b5a3)
DB-377
The following lines indicate that the router sent a redirect packet on the Ethernet interface 3 to the NSAP 39.0001.2222.2222.2222.00 at MAC address 0000.0c00.3a18 to indicate that NSAP 49.0002.0001.AAAA.AAAA.AAAA.00 can be reached at MAC address 0000.0c00.b5a3.
CLNS: RD Sent on Ethernet3 to 39.0001.2222.2222.2222.00 @ 0000.0c00.3a18, redirecting 49.0002.0001.AAAA.AAAA.AAAA.00 to 0000.0c00.b5a3
DB-378
December 2010
Syntax Description
Examples
The following is sample output from the debug clns igrp packets command:
Router# debug clns igrp packets ISO-IGRP: ISO-IGRP: ISO-IGRP: ISO-IGRP: ISO-IGRP: ISO-IGRP: ISO-IGRP: ISO-IGRP: ISO-IGRP: ISO-IGRP: ISO-IGRP: ISO-IGRP: ISO-IGRP: Hello sent on Ethernet3 for DOMAIN_green1 Received hello from 39.0001.3333.3333.3333.00, (Ethernet3), ht 51 Originating level 1 periodic update Advertise dest: 2222.2222.2222 Sending update on interface: Ethernet3 Originating level 2 periodic update Advertise dest: 0001 Sending update on interface: Ethernet3 Received update from 3333.3333.3333 (Ethernet3) Opcode: area Received level 2 adv for 0001 metric 1100 Opcode: station Received level 1 adv for 3333.3333.3333 metric 1100
The following line indicates that the router is sending a hello packet to advertise its existence in the DOMAIN_green1 domain:
ISO-IGRP: Hello sent on Ethernet3 for DOMAIN_green1
The following line indicates that the router received a hello packet from a certain network service access point (NSAP) on Ethernet interface 3. The hold time for this information is 51 seconds.
ISO-IGRP: Received hello from 39.0001.3333.3333.3333.00, (Ethernet3), ht 51
The following lines indicate that the router is generating a Level 1 update to advertise reachability to destination NSAP 2222.2222.2222 and that it is sending that update to all systems that can be reached through Ethernet interface 3:
ISO-IGRP: Originating level 1 periodic update ISO-IGRP: Advertise dest: 2222.2222.2222 ISO-IGRP: Sending update on interface: Ethernet3
The following lines indicate that the router is generating a Level 2 update to advertise reachability to destination area 1 and that it is sending that update to all systems that can be reached through Ethernet interface 3:
ISO-IGRP: Originating level 2 periodic update ISO-IGRP: Advertise dest: 0001 ISO-IGRP: Sending update on interface: Ethernet3
The following lines indicate that the router received an update from NSAP 3333.3333.3333 on Ethernet interface 3. This update indicated the area that the router at this NSAP could reach.
DB-379
The following lines indicate that the router received an update advertising that the source of that update can reach area 1 with a metric of 1100. A station opcode indicates that the update included system addresses.
ISO-IGRP: Received level 2 adv for 0001 metric 1100 ISO-IGRP: Opcode: station
DB-380
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug clns packet command:
Router# debug clns packet CLNS: Forwarding packet size 157 from 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.00 STUPI-RBS to 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00 via 1600.8906.4017 (Ethernet0 0000.0c00.bda8) CLNS: Echo PDU received on Ethernet0 from 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00! CLNS: Sending from 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00 to 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00 via 1600.8906.4017 (Ethernet0 0000.0c00.bda8)
In the following lines, the first line indicates that a Connectionless Network Service (CLNS) packet of size 157 bytes is being forwarded. The second line indicates the network service access point (NSAP) and system name of the source of the packet. The third line indicates the destination NSAP for this packet. The fourth line indicates the next hop system ID, interface, and subnetwork point of attachment (SNPA) of the router interface used to forward this packet.
CLNS: Forwarding packet size 157 from 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.00 STUPI-RBS to 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00 via 1600.8906.4017 (Ethernet0 0000.0c00.bda8)
In the following lines, the first line indicates that the router received an echo protocol data unit (PDU) on the specified interface from the source NSAP. The second line indicates which source NSAP is used to send a CLNS packet to the destination NSAP, as shown on the third line. The fourth line indicates the next hop system ID, interface, and SNPA of the router interface used to forward this packet.
CLNS: Echo PDU received on Ethernet0 from 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00! CLNS: Sending from 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00 to 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00 via 1600.8906.4017 (Ethernet0 0000.0c00.bda8)
DB-381
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug clns routing command:
Router# debug clns routing CLNS-RT: CLNS-RT: CLNS-RT: CLNS-RT: cache increment:17 Add 47.0023.0001.0000.0000.0003.0001 to prefix table, next hop 1920.3614.3002 Aging cache entry for: 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.06 Deleting cache entry for: 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.06
The following line indicates that a change to the routing table has resulted in an addition to the fast-switching cache:
CLNS-RT: cache increment:17
The following line indicates that a specific prefix route was added to the routing table, and indicates the next hop system ID to that prefix route. In other words, when the router receives a packet with the prefix 47.0023.0001.0000.0000.0003.0001 in the destination address of that packet, it forwards that packet to the router with the MAC address 1920.3614.3002.
CLNS-RT: Add 47.0023.0001.0000.0000.0003.0001 to prefix table, next hop 1920.3614.3002
The following lines indicate that the fast-switching cache entry for a certain network service access point (NSAP) has been invalidated and then deleted:
CLNS-RT: Aging cache entry for: 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.06 CLNS-RT: Deleting cache entry for: 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.06
DB-382
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug cls message command displays the primitives (state), selector, header length, and data size.
Examples
The following is sample output from the debug cls message command. For example, CLS-->DLU indicates the direction of the flow that is described by the status. From CLS to dependent logical unit (DLU), a request was established to the connection endpoint. The header length is 48 bytes, and the data size is 104 bytes.
Router# debug cls message (FRAS Daemon:CLS-->DLU): ID_STN.Ind to uSAP: 0x607044C4 sel: LLC hlen: 40, (FRAS Daemon:CLS-->DLU): ID_STN.Ind to uSAP: 0x6071B054 sel: LLC hlen: 40, (FRAS Daemon:DLU-->SAP): REQ_OPNSTN.Req to pSAP: 0x608021F4 sel: LLC hlen: (FRAS Daemon:CLS-->DLU): REQ_OPNSTN.Cfm(NO_REMOTE_STN) to uCEP: 0x607FFE84
dlen: 54 dlen: 46 48, dlen: 104 sel: LLC hlen: 48, dlen: 104
The status possibilities include the following: enabled, disabled, request open station, open station, close station, activate SA, deactivate service access point (SAP), XID, exchange identification (XID) station, connect station, signal station, connect, disconnect, connected, data, flow, unnumbered data, modify SAP, test, activate ring, deactivate ring, test station, and unnumbered data station.
Related Commands
Command debug fras error debug fras message debug fras state
Description Displays information about FRAS protocol errors. Displays general information about FRAS messages. Displays information about FRAS data-link control state changes.
DB-383
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug cls message command displays primitive state transitions, selector, and source and destination MAC and service access points (SAPs). Also use the show cls command to display additional information on CLS VDLC.
Caution
Use the debug cls vdlc command with caution because it can generate a substantial amount of output.
Examples
The following messages are sample output from the debug cls vdlc command. In the following scenario, the systems network architecture (SNA) service pointalso called native service point (NSP)is setting up two connections through VDLC and data-link switching (DLSw): one from NSP to VDLC and one from DLSw to VDLC. VDLC joins the two. The NSP initiates a connection from 4000.05d2.0001 as follows:
VDLC: Req Open Stn Req PSap 0x7ACE00, port 0x79DF98 4000.05d2.0001(0C)->4000.1060.1000(04)
In the next message, VDLC sends a test station request to DLSw for destination address 4000.1060.1000.
VDLC: Send UFrame E3: 4000.05d2.0001(0C)->4000.1060.1000(00)
In the next two messages, DLSw replies with test station response, and NSP goes to a half-open state. NSP is waiting for the DLSw connection to VDLC.
VDLC: Sap to Sap TEST_STN_RSP VSap 0x7B68C0 4000.1060.1000(00)->4000.05d2.0001(0C) VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPENING->VDLC_HALF_OPEN
The NSP sends an exchange identification (XID) and changes state as follows:
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_HALF_OPEN->VDLC_XID_RSP_PENDING VDLC: CEP to SAP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04) via bridging SAP (DLSw)
DB-384
December 2010
In the next several messages, DLSw initiates its connection, which matches the half-open connection with NSP:
VDLC: Req Open Stn Req PSap 0x7B68C0, port 0x7992A0 4000.1060.1000(04)->4000.05d2.0001(0C) VDLC: two-way connection established VDLC: 4000.1060.1000(04)->4000.05d2.0001(0C): VDLC_IDLE->VDLC_OPEN
In the following messages, DLSw sends an XID response, and the NSP connection goes from the state XID Response Pending to Open. The XID exchange follows:
VDLC: VDLC: VDLC: VDLC: VDLC: VDLC: VDLC: VDLC: VDLC: VDLC: VDLC: VDLC: VDLC: VDLC: VDLC: VDLC: CEP to CEP ID_RSP 4000.1060.1000(04)->4000.05d2.0001(0C) 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPEN 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPEN->VDLC_XID_RSP_PENDING CEP to CEP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04) CEP to CEP ID_RSP 4000.1060.1000(04)->4000.05d2.0001(0C) 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPEN 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPEN->VDLC_XID_RSP_PENDING CEP to CEP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04) CEP to CEP ID_RSP 4000.1060.1000(04)->4000.05d2.0001(0C) 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPEN 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPEN->VDLC_XID_RSP_PENDING CEP to CEP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04) CEP to CEP ID_RSP 4000.1060.1000(04)->4000.05d2.0001(0C) 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPEN 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPEN->VDLC_XID_RSP_PENDING CEP to CEP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04)
When DLSw is ready to connect, the front-end processor (FEP) sends a set asynchronous balanced mode extended (SABME) command as follows:
VDLC: CEP to CEP CONNECT_REQ 4000.1060.1000(04)->4000.05d2.0001(0C) VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPEN
In the following messages, NSP accepts the connection and sends an unnumbered acknowledgment (UA) to the FEP:
VDLC: CEP to CEP CONNECT_RSP 4000.05d2.0001(0C)->4000.1060.1000(04) VDLC: FlowReq QUENCH OFF 4000.1060.1000(04)->4000.05d2.0001(0C)
Related Commands
DB-385
debug cme-xml
To generate debug messages for the Cisco Unified CallManager Express XML application, use the debug cme-xml command in privileged EXEC mode. To disable debugging, use the no form of the command. debug cme-xml no debug cme-xml
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(9)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The show fb-its-log command displays the contents of the XML event table.
Examples
The following example shows the progress of an XML request that has been sent to Cisco Unified CallManager Express:
Router# debug cme-xml *Aug *Aug *Aug *Aug *Aug *Aug *Aug *Aug *Aug *Aug *Aug *Aug 5 5 5 5 5 5 5 5 5 5 5 5 06:27:25.727: 06:27:25.727: 06:27:25.727: 06:27:25.727: 06:27:25.727: 06:27:25.727: 06:27:25.727: 06:27:25.727: 06:27:25.731: 06:27:25.731: 06:27:25.731: 06:27:25.731: CME got a raw XML message. doc 0x63DB85E8, doc->doc_type 3, req 0x655FDCD0 CME extracted a XML document Response buffer 0x63DCFD58, len = 4096 First Tag ID SOAP_HEADER_TAG_ID 58720257 First Attribute ID SOAP_ENV_ATTR 50331649 cme_xml_process_soap_header cme_xml_process_soap_body cme_xml_process_axl cme_xml_process_request cme_xml_process_ISgetGlobal CME XML sent 811 bytes response.
Related Commands
DB-386
December 2010
Syntax Description
Displays debugging messages related to the CNS configuration agent. Displays all debugging messages. Displays debugging messages related to configuration connections. Displays debugging messages related to CNS configurations.
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(18)ST. This command was implemented on the Cisco 2600 and Cisco 3600 series. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SB. This command was integrated into Cisco IOS Release 12.2(33)SXI.
Usage Guidelines
Use this command to turn on or turn off debugging messages related to the CNS Configuration Agent.
Examples
In the following example, debugging messages are enabled for CNS configuration processes:
Router# debug cns config all 00:04:09: 00:04:09: 00:04:09: 00:04:09: 00:04:09: server 00:04:09: 00:04:09: 00:04:09: 00:04:09: 00:04:09: config_id_get: entered config_id_get: Invoking cns_id_mode_get() config_id_get: cns_id_mode_get() returned INTERNAL config_id_get: successful exit cns_config_id=minna1,cns_config_id_len=6 cns_establish_connect_intf(): The device is already connected with the config cns_initial_config_agent(): connecting with port 80 pull_config() entered cns_config_id(): returning config_id=minna1 Message finished 150 readend %CNS-4-NOTE: SUCCESSFUL_COMPLETION
DB-387
-Process= "CNS Initial Configuration Agent", ipl= 0, pid= 82 00:04:10: %SYS-5-CONFIG_I: Configured from console by console
Related Commands
Command cns config cancel cns config initial cns config partial cns config retrieve debug cns event debug cns exec debug cns xml-parser show cns config
Description Cancels a CNS configuration. Starts the initial CNS Configuration Agent. Starts the partial CNS Configuration Agent. Gets the configuration of a routing device using CNS. Displays information on CNS events. Displays information on CNS management. Displays information on the CNS XML parser. Displays information about the CNS Configuration Agent.
DB-388
December 2010
Syntax Description
Displays debugging messages related to the event agent. Displays all debugging messages. Displays debugging messages related to event connections. Displays debugging messages related to subscribers.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into the Cisco IOS Release 12.0(18)ST. This command was implemented on Cisco 2600 series and Cisco 3600 series routers. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to turn on or turn off debugging messages related to the CNS Event Gateway.
Examples
In the following example, debugging messages about all CNS Events are enabled:
Router# debug cns event all 00:09:14: -Process= 00:09:14: 00:09:14: 00:09:14: 00:09:14: %CNS-4-NOTE: SUCCESSFUL_COMPLETION "CNS Initial Configuration Agent", ipl= 0, pid= 82 event_agent():event_agent starting .. event_agent_open_connection(): attempting socket connect to Primary Gateway event_agent_open_connection():cns_socket_connect() succeeded:return_code=0 event_agent_open_connection():timeout_len=1:ka_total_timeout =0: total_timeout=0 00:09:14: event_id_get: entered 00:09:14: event_id_get: Invoking cns_id_mode_get()
DB-389
Syntax Description
Displays debugging messages related to the exec agent. Displays all debugging messages. Displays debugging messages related to image agent connections. Displays debugging output related to messages generated by exec agent services.
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SB. This command was integrated into Cisco IOS Release 12.2(33)SXI.
Usage Guidelines
Use the debug cns exec command to troubleshoot CNS exec agent services.
Examples
The following example shows a debugging message for the CNS exec agent when a response has been posted to HTTP:
Router# debug cns exec agent 4d20h: CNS exec agent: response posted
Related Commands
DB-390
December 2010
Syntax Description
Displays debugging messages related to the image agent. Displays all debugging messages. Displays debugging messages related to image agent connections. Displays debugging messages related to errors generated by image agent services.
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command was integrated into Cisco IOS Release 12.2(33)SB. This command was integrated into Cisco IOS Release 12.2(33)SXI.
Usage Guidelines
Use the debug cns image command to troubleshoot CNS image agent services.
DB-391
Syntax Description
snmp xml
Displays debugging messages related to nongranular Simple Network Management Protocol (SNMP) encapsulated CNS-management events. Displays debugging messages related to granular eXtensible Markup Language (XML) encapsulated CNS-management events.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, debugging messages about SNMP- and XML-encapsulated CNS-management events are enabled:
Router# debug cns management snmp Router# debug cns management xml Router# show debugging CNS Management (SNMP Encapsulation) debugging is on CNS Management (Encap XML) debugging is on Router# show running-config | include cns cns mib-access encapsulation snmp cns mib-access encapsulation xml cns notifications encapsulation snmp cns notifications encapsulation xml cns event 10.1.1.1 11011 Router# 00:12:50: Enqueued a notification in notif_q 00:12:50: ea_produce succeeded Subject:cisco.cns.mibaccess:notification Message Length:385 00:12:50: Trap sent via CNS Transport Mapping. Router# 00:13:31: Response sent via CNS Transport Mapping. Router# 00:14:38: Received a request 00:14:38: ea_produce succeeded Subject:cisco.cns.mibaccess:response Message Length:241
DB-392
December 2010
Related Commands
Command cns event debug cns config debug cns xml-parser show debugging show running-config
Description Configures the CNS event gateway, which provides CNS event services to Cisco IOS clients. Displays information on CNS configurations. Displays information on the CNS XML parser. Displays information about the types of debugging that are enabled for your router. Displays the current running configuration.
DB-393
Syntax Description
Displays all CNS debugging. Reports usage of common XML decoding library functions by applications and reports the decoded contents. Displays failures in the Document Object Model (DOM) infrastructure messages tree built by the XML parser. Displays failures and progress of the parsing of an XML message by the XML parser.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command replaces the debug cns xml-parser command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB. This command was integrated into Cisco IOS Release 12.2(33)SXI.
12.2(33)SB 12.2(33)SXI
Examples
In the following example, debugging messages for the CNS XML parser are enabled:
Router# debug cns xml parser 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: Registering Registering Registering Registering Registering Registering Registering Registering Registering Registering Registering Registering Registering tag tag tag tag tag tag tag tag tag tag tag tag tag <config-server> <server-info> <ip-address> <web-page> <config-event> <identifier> <config-id> <config-data> <cli> <error-info> <error-message> <line-number> <config-write>
DB-394
December 2010
00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: -Process=
Registering tag <exec-cmd-event> Registering tag <identifier-exec> Registering tag <event-response> Registering tag <reply-subject> Registering tag <server-response> Registering tag <ip-address-exec> Registering tag <port-number> Registering tag <url> Registering tag <cli-exec> Registering tag <config-pwd> Pushing tag <config-data> on to stack open tag is <config-data> Pushing tag <config-id> on to stack open tag is <config-id> Popping tag <config-id> off stack close tag is </config-id> Pushing tag <cli> on to stack open tag is <cli> Popping tag <cli> off stack close tag is </cli> Popping tag <config-data> off stack close tag is </config-data> %CNS-4-NOTE: SUCCESSFUL_COMPLETION "CNS Initial Configuration Agent", ipl= 0, pid= 96
Related Commands
Description Configures the CNS Event Gateway. Displays information about the CNS Event Agent.
DB-395
Effective with Cisco IOS Release 12.3(2)T, the debug cns xml-parser command is replaced by the debug cns xml command. See the debug cns xml command for more information. To turn on debugging messages related to the Cisco Networking Services (CNS) eXtensible Markup Language (XML) parser, use the debug cns xml-parser command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug cns xml-parser no debug cns xml-parser
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(18)ST. This command was implemented on the Cisco 2600 and Cisco 3600 series. This command was replaced by the debug cns xml command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, debugging messages for the CNS XML parser are enabled:
Router# debug cns xml-parser 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: Registering Registering Registering Registering Registering Registering Registering Registering Registering Registering Registering Registering Registering Registering Registering Registering Registering tag tag tag tag tag tag tag tag tag tag tag tag tag tag tag tag tag <config-server> <server-info> <ip-address> <web-page> <config-event> <identifier> <config-id> <config-data> <cli> <error-info> <error-message> <line-number> <config-write> <exec-cmd-event> <identifier-exec> <event-response> <reply-subject>
DB-396
December 2010
00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:05: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: 00:12:06: -Process=
Registering tag <server-response> Registering tag <ip-address-exec> Registering tag <port-number> Registering tag <url> Registering tag <cli-exec> Registering tag <config-pwd> Pushing tag <config-data> on to stack open tag is <config-data> Pushing tag <config-id> on to stack open tag is <config-id> Popping tag <config-id> off stack close tag is </config-id> Pushing tag <cli> on to stack open tag is <cli> Popping tag <cli> off stack close tag is </cli> Popping tag <config-data> off stack close tag is </config-data> %CNS-4-NOTE: SUCCESSFUL_COMPLETION "CNS Initial Configuration Agent", ipl= 0, pid= 96
Related Commands
Description Configures the CNS Event Gateway. Displays information about the CNS Event Agent.
DB-397
debug compress
To debug compression, enter the debug compress command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug compress no debug compress
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to display output from the compression and decompression configuration you made. Live traffic must be configured through the Cisco 2600 access router with a data compression Advanced Interface Module (AIM) installed for this command to work.
Examples
The following example is output from the debug compress command, which shows that compression is taking place on a Cisco 2600 access router using data compression AIM hardware compression is configured correctly:
Router# debug compress COMPRESS debugging is on Router#compr-in:pak:0x810C6B10 npart:0 size:103 pak:0x810C6B10 start:0x02406BD4 size:103 npart:0 compr-out:pak:0x8118C8B8 stat:0x00000000 npart:1 size:71 lcb:0xED pak:0x8118C8B8 start:0x0259CD3E size:71 npart:1 mp:0x8118A980 start:0x0259CD3E size:71 decmp-in:pak:0x81128B78 start:0x0255AF44 size:42 npart:1 hdr:0xC035 pak:0x81128B78 start:0x0255AF44 size:42 npart:1 mp:0x81174480 start:0x0255AF44 size:42 decmp-out:pak:0x8118C8B8 start:0x025B2C42 size:55 npart:1 stat:0 pak:0x8118C8B8 start:0x025B2C42 size:55 npart:1 mp:0x8118B700 start:0x025B2C42 size:55
DB-398
December 2010
Description Indicates that a packet needs to be compressed. Indicates completion of compression of packet. Indicates receipt of a compressed packet that needs to be decompressed. Indicates completion of decompression of a packet. Provides the address in memory of a software structure that describes the compressed packet. The npart:0 indicates that the packet is contained in a single, contiguous area of memory. The start address of the packet is 0x02406bd4 and the size of the packet is 103. The npart:1 indicates that the packet is contained in 1 or more regions of memory. The start address of the packet is 0x0259CD3E and the size of the packet is 71. Describes one of these regions of memory. Provides the address of a structure describing this region. Provides the address of the start of this region.
Related Commands
Description Displays debugging information about the packets that are received on a Frame Relay interface. Displays information on traffic and exchanges in an internetwork implementing the PPP. Displays compression statistics. Displays hardware information including DRAM, SRAM, and the revision-level information on the line card.
DB-399
debug condition
To filter debugging output for certain debug commands on the basis of specified conditions, use the debug condition command in privileged EXEC mode. To remove the specified condition, use the no form of this command. debug condition {called dial-string | caller dial-string | calling tid/imsi string | domain domain-name | ip ip-address | mac-address hexadecimal-MAC-address | portbundle ip ip-address bundle bundle-number | session-id session-number | username username | vcid vc-id} no debug condition {condition-id | all}
Syntax Description
Filters output on the basis of the called party number. Filters output on the basis of the calling party number. Filters debug messages for general packet radio service (GPRS) tunneling protocol (GTP) processing on the gateway GPRS support node (GGSN) based on the tunnel identifier (TID) or international mobile system identifier (IMSI) in a Packet Data Protocol (PDP) Context Create Request message. Filters output on the basis of the specified domain. Filters output on the basis of the specified IP address.
mac-address Filters messages on the specified MAC address. hexadecimal-MAC-address portbundle ip IP-address bundle bundle-number session-id session-number username username vcid vc-id condition-id all Filters output on the basis of the port-bundle host key (PBHK) that uniquely identifies the session. Specifies the port bundle. Filters output on the specified Intelligent Service Architecture (ISA) session identifier. Filters output on the basis of the specified username. Filters output on the basis of the specified VC ID. Removes the condition indicated. Removes all debugging conditions, and conditions specified by the debug condition interface command. Use this keyword to disable conditional debugging and reenable debugging for all interfaces.
Defaults
All debugging messages for enabled protocol-specific debug commands are generated.
Command Modes
Privileged EXEC
DB-400
December 2010
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(23)S. This command was updated with the vcid and ip keywords to support the debugging of Any Transport over MPLS (AToM) messages. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Relese 12.2(15)T. This command was introduced on the GGSN. The calling keyword and tid/imsi string argument were added. The ability to filter output on the following conditions was added: domain, MAC address, PBHK, and ISA session ID. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug condition command to restrict the debug output for some commands. If any debug condition commands are enabled, output is generated only for interfaces associated with the specified keyword. In addition, this command enables debugging output for conditional debugging events. Messages are displayed as different interfaces meet specific conditions. If multiple debug condition commands are enabled, output is displayed if at least one condition matches. All the conditions do not need to match. The no form of this command removes the debug condition specified by the condition identifier. The condition identifier is displayed after you use a debug condition command or in the output of the show debug condition command. If the last condition is removed, debugging output resumes for all interfaces. You will be asked for confirmation before removing the last condition or all conditions. Not all debugging output is affected by the debug condition command. Some commands generate output whenever they are enabled, regardless of whether they meet any conditions. The following components are supported for Intelligent Service Architecture (ISA) distributed conditional debugging:
Authentication, authorization, and accounting (AAA) and RADIUS ATM components Feature Manager Policy Manager PPP PPP over Ethernet (PPPoE) Session Manager Virtual Private Dialup Network (VPDN)
DB-401
Ensure that you enable TID/IMSI-based conditional debugging by entering debug condition calling before configuring debug gprs gtp and debug gprs charging. In addition, ensure that you disable the debug gprs gtp and debug gprs charging commands using the no debug all command before disabling conditional debugging using the no debug condition command. This will prevent a flood of debugging messages when you disable conditional debugging.
Examples
Example 1
In the following example, the router displays debugging messages only for interfaces that use a username of user1. The condition identifier displayed after the command is entered identifies this particular condition.
Router# debug condition username user1 Condition 1 set
Example 2
The following example specifies that the router should display debugging messages only for VC 1000:
Router# debug condition vcid 1000 Condition 1 set 01:12:32: 1000 Debug: Condition 1, vcid 1000 triggered, count 1 01:12:32: 1000 Debug: Condition 1, vcid 1000 triggered, count 1
The following example enables other debugging commands. These debugging commands will only display information for VC 1000.
Router# debug mpls l2transport vc event AToM vc event debugging is on Router# debug mpls l2transport vc fsm AToM vc fsm debugging is on
The following commands shut down the interface on which VC 1000 is established.
Router(config)# interface s3/1/0 Router(config-if)# shut
The debugging output shows the change to the interface where VC 1000 is established.
01:15:59: AToM MGR [13.13.13.13, 1000]: Event local down, state changed from established to remote ready 01:15:59: AToM MGR [13.13.13.13, 1000]: Local end down, vc is down 01:15:59: AToM SMGR [13.13.13.13, 1000]: Processing imposition update, vc_handle 6227BCF0, update_action 0, remote_vc_label 18 01:15:59: AToM SMGR [13.13.13.13, 1000]: Imposition Disabled 01:15:59: AToM SMGR [13.13.13.13, 1000]: Processing disposition update, vc_handle 6227BCF0, update_action 0, local_vc_label 755 01:16:01:%LINK-5-CHANGED: Interface Serial3/1/0, changed state to administratively down 01:16:02:%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial3/1/0, changed state to down
Related Commands
Description Limits output for some debugging commands based on the interfaces.
DB-402
December 2010
Syntax Description
application-name
Name of the VoiceXML application for which you want to display all enabled debugging messages.
Defaults
If this command is not configured, debugging messages are enabled for all VoiceXML applications.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for the Cisco 3640, Cisco 3660, Cisco AS5300, Cisco AS5350, and Cisco AS5400. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command filters debugging output only for the debug vxml and debug http client commands, except that it does not filter output for the debug vxml error, debug vxml background, debug http client error, or debug http client background commands. It does not filter messages for any other debug commands such as the debug voip ivr command or the debug voice ivr command. This command filters debugging output for all VoiceXML applications except the application named in the command. When this command is configured, the gateway displays debugging messages only for the specified VoiceXML application. To filter debugging output with this command, the <cisco-debug> element must be enabled in the VoiceXML document. For more information about the <cisco-debug> element, refer to the Cisco VoiceXML Programmers Guide. To see debugging output for VoiceXML applications, you must first configure global debug commands such as the debug vxml command or the debug http client command. If no global debug commands are turned on, you do not see debugging messages even if the debug condition application voice command is configured and the <cisco-debug> element is enabled in the VoiceXML document. This command can be configured multiple times to display output for more than one application. To see which debug conditions have been set, use the show debug condition command.
DB-403
Examples
The following example disables debugging output for all applications except the myapp1 application, if the <cisco-debug> element is enabled in the VoiceXML documents that are executed by myapp1:
Router# debug condition application voice myapp1
Related Commands
Description Displays debugging messages for the HTTP client. Displays debugging messages for VoiceXML features. Displays the debugging conditions that have been enabled for VoiceXML application.
DB-404
December 2010
Syntax Description
Interface type for which output is displayed. Interface number for which output is displayed. GLBP group number in the range from 0 to 1023. (Optional) Number in the range from 1 to 255 used to identify a virtual MAC address.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(17b)SXA. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug condition glbp command:
Router# debug condition glbp fastethernet 0/0 10 1 Condition 1 set 5d23h: Fa0/0 GLBP10.1 Debug: Condition 1, glbp Fa0/0 GLBP10.1 triggered, count 1
Related Commands
Command debug glbp errors debug glbp events debug glbp packets debug glbp terse
Description Displays debugging messages about GLBP errors. Displays debugging messages about GLBP events. Displays debugging messages about GLBP packets. Displays a limited range of debugging messages about GLBP errors, events, and packets.
DB-405
Syntax Description
Interface type and number. For more information, use the question mark (?) online help function. (Optional) Specifies the data-link connection identifier (DLCI), if the interface to be debugged is a Frame Relay-encapsulated interface. (Optional) Specifies the virtual channel identifier (VCI) or virtual path identifier/virtual channel identifier (VPI/VCI) pair, if the interface to be debugged is an ATM-encapsulated interface. (Optional) Specifies the VLAN ID, if the interface to be debugged is ATM, Ethernet, Fast Ethernet, or Gigabit Ethernet interface.
vc {vci | vpi/vci}
vlan-id vlan-id
Command Default
Command Modes
Command History
Modification This command was introduced. This command was modified. The dlci and vc keywords were added for additional Frame Relay and ATM functionality. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(28)SB, and the ability to filter debug output on the basis of VLAN ID was added. This command was integrated into Cisco IOS Release 12.4(9)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SRE.
12.2(33)SRE
DB-406
December 2010
Usage Guidelines
Use this command to restrict the debugging output for some commands on the basis of an interface or virtual circuit. When you enter this command, debugging output is disbaled for all interfaces except the specified interface or virtual circuit. In addition, this command enables conditional debugging to limit output for specific debugging events. Messages are displayed as different interfaces meet specific conditions. The no form of this command performs the following functions:
Disables the debug condition interface command for the specified interface. Output is no longer generated for the interface, assuming that the interface meets no other applicable conditions. If the interface meets other conditions that have been set by another debug condition command, debugging output will still be generated for the interface. If some other debug condition command has been enabled, output is stopped for that interface until the condition is met on the interface. You will be asked for confirmation before the last condition or all conditions are removed.
Not all debugging output is affected by the debug condition command. Some commands generate output whenever they are enabled, regardless of whether they meet any conditions. The commands that are affected by the debug condition commands are generally related to dial access functions, where a large amount of output is expected. Output from the following commands is controlled by the debug condition command:
debug aaa debug atm debug dialer events debug frame-relay debug isdn debug modem debug ppp
One or more ATM-encapsulated interfaces must be enabled, and one or more of the following debug commands must be enabled to use conditional debugging with ATM:
debug atm arp debug atm counters debug atm errors debug atm events debug atm oam debug atm packet debug atm state
One or more of the following debug commands must be enabled to use conditional debugging with Frame Relay:
debug frame-relay adjacency debug frame-relay ipc debug frame-relay lmi debug frame-relay packet debug frame-relay pseudowire
DB-407
Examples
In the following example, only debug command output related to serial interface 1 is displayed. The condition identifier for this command is 1.
Router# debug condition interface serial 1 Condition 1 set
The following example shows how to enable an ATM interface, specifies an IP address for the interface, turns on conditional debugging for that interface with a VPI/VCI pair of 255/62610, and verifies that debugging has been enabled:
Router> enable Password: Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface atm 2/0 Router(config-if)# ip address 209.165.201.2 255.255.255.0 Router(config-if)# pvc 255/62610 Router(config-if-atm-vc)# no shutdown Router(config-if)# exit Router(config)# exit 2w3d: %SYS-5-CONFIG_I: Configured from console by console Router# debug condition interface atm 2/0 vc 255/62610 Condition 1 set 2w3d: ATM VC Debug: Condition 1, atm-vc 255/62610 AT2/0 triggered, count 1 Router# show debug condition Condition 1: atm-vc 255/62610 AT2/0 (1 flags triggered) Flags: ATM VC
The following example shows how to enable Frame Relay conditional debugging on Frame Relay DLCI 105:
Router# debug condition interface serial 4/3 dlci 105 Router# debug frame-relay packet
The following example shows how to disable the conditional debugging on VC. A warning message is displayed when the last condition is removed.
Router> enable Router# no debug condition interface atm 1/0 vc 4335 This condition is the last interface condition set. Removing all conditions may cause a flood of debugging messages to result, unless specific debugging flags are first removed. Proceed with removal? [yes/no]: y Condition 1 has been removed
Related Commands
Description Limits output for some debug commands on the basis of specific conditions. Displays debugging information about the packets received on a Frame Relay interface. Displays the debugging filters that have been enabled for VoiceXML. applications, ATM-enabled interfaces, or Frame Relay interfaces
DB-408
December 2010
Syntax Description
number exact-match
Numeric label that uniquely identifies the match list. Range is 1 to 16. The number for the match list is set using the call filter match-list command. All related debug output is filtered until all conditions in the match list are explicitly met. This is the best choice for most situations because the output is the most concise. No related debug output is filtered until there is a single explicit match failure. As long as zero or more conditions are met, debug output will not be filtered. This choice is useful in debugging call startup problems like digit collection, but is not ideal for many situations because there is much debug output until matches explicitly fail.
partial-match
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output for the debug condition match-list 1 command. The next several lines match the above conditions.
Router# debug condition match-list 1 07:22:19://-1/3C0B9468-15C8-11D4-8013-000A8A389BA8/VTSP:(7/0:D):0:0:0/vtsp_gcfm_incoming_c ond_notify: add incoming port cond success: 7/0:D 07:22:19://-1/3C0B9468-15C8-11D4-8013-000A8A389BA8/VTSP:(7/0:D):0:0:0/vtsp_gcfm_incoming_c ond_notify: add incoming dialpeer tag success:1
DB-409
07:22:19://-1/3C0B9468-15C8-11D4-8013-000A8A389BA8/VTSP:(7/0:D):0:0:0/vtsp_update_dsm_stre am_mgr_filter_flag: cannot find dsp_stream_mgr_t 07:22:19://-1/3C0B9468-15C8-11D4-8013-000A8A389BA8/VTSP:(7/0:D):0:0:0/vtsp_update_dsm_stre am_mgr_filter_flag: update dsp_stream_mgr_t debug flag 07:22:19: //49/3C0B9468-15C8-11D4-8013-000A8A389BA8/VTSP:(7/0:D):0:0:0/vtsp_insert_cdb: ,cdb 0x6482C518, CallID=49 07:22:19://49/3C0B9468-15C8-11D4-8013-000A8A389BA8/VTSP:(7/0:D):0:0:0/vtsp_do_call_setup_i nd: Call ID=98357, guid=3C0B9468-15C8-11D4-8013-000A8A389BA8
Description Shows the global unique identifier (GUID). Identifies the voice telephony service provider (VTSP) module. Shows the port name, channel number, DSP slot, and DSP channel number for the VTSP module.
Related Commands
call filter match-list voice Creates a call filter match list for debugging voice calls. show call filter match-list Displays call filter match lists.
DB-410
December 2010
Syntax Description
interface group-number
Filters output on the basis of the interface. Filters output on the basis of HSRP group number. The range is 0 to 255 for HSRP Version 1 and 0 to 4095 for HSRP Version 2.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug condition standby command to restrict the debug output for the debug standby command. If the debug condition standby command is enabled, output is generated only for the interfaces and HSRP group numbers specified. The interface you specify must be a valid interface capable of supporting HSRP. The group can be any group (0 to 255 for HSRPv1 and 0 to 4095 for HSRPv2). Use the no form of this command to remove the HSRP debug condition. If the last condition is removed, debugging output resumes for all interfaces. You will be asked for confirmation before removing the last condition or all conditions. You can set debug conditions for groups that do not exist, which allows you to capture debug information during the initialization of a new group. You must enable the debug standby command in order for any HSRP debug output to be produced. If you do not configure the debug condition standby command after entering the debug standby command, then debug output is produced for all groups on all interfaces.
Examples
In the following example, the router displays debugging messages only for Ethernet interface 0/0 that are part of HSRP group 23:
Router# debug standby
DB-411
HSRP debugging is on Router# debug condition standby ethernet0/0 23 Condition 00:27:39: 00:27:42: 00:27:45: 00:27:48: 00:27:51: 1 set HSRP: HSRP: HSRP: HSRP: HSRP:
23 23 23 23 23
Related Commands
Command debug condition interface debug standby debug standby errors debug standby events debug standby events icmp debug standby packets
Description Limits output for some debugging commands based on the interfaces. Displays HSRP state changes. Displays error messages related to HSRP. Displays events related to HSRP. Displays debugging messages for the HSRP ICMP redirects filter. Displays debugging information for packets related to HSRP.
DB-412
December 2010
Syntax Description
port
Voice port for which you want to display all enabled debugging messages.
Note
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command filters out debugging output for all voice ports except the port specified in the command. When this command is configured, the gateway displays debugging messages only for the specified port. To see debugging output, you must first enable debug commands such as the debug voip application stcapp all command or the debug sccp all command. If no debug commands are turned on, you do not see debugging messages even if the debug condition voice-port command is enabled. This command can be configured multiple times to display output for more than one voice port. To see which debug conditions have been set, use the show debug command. Before disabling conditions, first disable any debugging commands; otherwise output for all ports could flood the logging buffer.
Examples
The following example filters debugging output so that only output for ports 2/1 and 2/3 is displayed:
Router# debug condition voice-port 2/1 Condition 1 set *Mar 1 22:24:15.102:
DB-413
*Mar
1 22:24:24.794:
Router# show debug Condition 1: voice-port 2/1 (1 flags triggered) Flags: voice-port condition Condition 2: voice-port 2/3 (1 flags triggered) Flags: voice-port condition
Related Commands
Command debug sccp all debug voip application stcapp all debug voip application stcapp port show debug
Description Displays debugging information for Simple Client Control Protocol (SCCP). Displays debugging information for the components of the SCCP Telephony Control Application (STCAPP). Enables STCAPP debugging for a specific port. Displays the types of debugging and the debugging conditions that are enabled on your router.
DB-414
December 2010
Syntax Description
vrf-name
Name of a VRF.
Command Modes
Command History
Usage Guidelines
Note
Examples
The following example shows how to limit debugging output to VRF red:
Router# debug condition vrf red
Related Commands
DB-415
Syntax Description
fib type
Filters control-plane and data-plane debug messages for the xconnect segment pair specified by matching against the Forwarding Information Base (FIB) Interface Descriptor Block (IDB) information associated with a particular interface on a line card. Filters control-plane and data-plane debug messages for the xconnect segment pair specified by the interface type and number on a Route Processor. (Optional) The Frame Relay data-link connection identifier (DLCI) for the xconnect segment pair associated with a Frame Relay segment. (Optional) The ATM virtual path (VP) number for the xconnect segment pair associated with an ATM segment. (Optional) The ATM virtual circuit (VC) number for the xconnect segment pair associated with an ATM segment. Filters control-plane and data-plane debug messages for the xconnect segment pair specified by the remote peer IP address and the pseudowire virtual circuit ID (VCID). The IP address of the remote peer router. The VCID of the xconnect pseudowire. Filters data-plane debug messages for the xconnect segment pair specified by a segment ID. The segment ID. The segment ID value can be found in the output of the show ssm id command.
Command Default
Command Modes
Privileged EXEC
DB-416
December 2010
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug condition xconnect command to specify conditions for filtering the debug messages displayed by related subscriber service switch (SSS), xconnect, and attachment circuit debug commands.
Examples
The following example sets filter conditions that allow related debug commands to display debug messages for only the xconnect segment pair specified by the remote peer IP address and the pseudowire VCID:
debug condition xconnect peer 10.0.0.1 vcid 100
The following example sets filter conditions that allow related debug commands to display debug messages for only the xconnect segment pair specified by the serial interface number and DLCI:
debug condition xconnect interface serial 0/0 100
The following example sets filter conditions that allow related debug commands to display debug messages for only the xconnect segment pair specified by the port mode ATM interface number:
debug condition xconnect interface atm 0/0
The following example sets filter conditions that allow related debug commands to display debug messages for only the xconnect segment pair specified by the VP mode ATM interface number:
debug condition xconnect interface atm 0/0 vp 1
The following example sets filter conditions that allow related debug commands to display debug messages for only the xconnect segment pair specified by the VC mode ATM interface number:
debug condition xconnect interface atm 0/0 vc 1/40
The following example finds the segment ID associated with an L2TPv3 xconnect segment pair and sets filter conditions that allow related debug commands to display debug messages for only that xconnect segment pair:
Router# show ssm id ! Segment-ID: 8193 Type: L2TPv3[8] ! Router# debug conditional xconnect segment 8193
Related Commands
Command debug acircuit debug sss aaa authorization event debug sss aaa authorization fsm
Description Displays errors and events that occur on the attachment circuits. Displays messages about AAA authorization events that are part of normal call establishment. Displays information about AAA authorization state changes.
DB-417
Command debug sss error debug sss event debug sss fsm debug xconnect show ssm id
Description Displays diagnostic information about errors that may occur during SSS call setup. Displays diagnostic information about SSS call setup events. Displays diagnostic information about the SSS call setup state. Displays debug messages related to an xconnect configuration. Displays SSM information for switched Layer 2 segments.
DB-418
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(31)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SB
Examples
The following is sample output with debug configuration lock enabled (assuming that the feature is enabled using the configuration mode exclusive manual command in global configuration mode):
Router# debug configuration lock Session1 from console ========================== Router# configure terminal lock Configuration mode locked exclusively. The lock will be cleared once you exit out of configuration mode using end/exit Enter configuration commands, one per line. End with CNTL/Z. Router(config)# Parser : LOCK REQUEST in EXCLUSIVE mode Parser: <configure terminal lock> - Config. Lock requested by process <3> client <PARSER Client> Parser: <configure terminal lock> - Config. Lock acquired successfully ! Router(config)#
Session2 VTY (User from session2 is trying to enter single user config (exclusive) config mode) ================================= Router# configure terminal lock Configuration mode locked exclusively by user 'unknown' process '3' from terminal '0'. Please try later. Router#
DB-419
Session1 from console ======================= Router(config)# Parser : LOCK REQUEST in EXCLUSIVE mode Parser: <configure terminal lock> - Config. Lock requested by process <104> client <PARSER Client> Parser: <configure terminal lock> - NON_BLOCKING : Config mode locked <EXCLUSIVE> owner <3> Router(config)# Router(config)# end Router# %SYS-5-CONFIG_I: Configured from console by console Parser: <Configure terminal> - Config. EXC UnLock requested by user<3> Parser: <Configure terminal> - Config UNLOCKED ! Router#
Related Commands
Description Enables single-user (exclusive) access functionality for the Cisco IOS CLI. Displays information about the lock status of the running configuration file during a configuration replace operation.
DB-420
December 2010
debug confmodem
To display information associated with the discovery and configuration of the modem attached to the router, use the debug confmodem command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug confmodem no debug confmodem
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug confmodem command is used in debugging configurations that use the modem autoconfig command.
Examples
The following is sample output from the debug confmodem command. In the first three lines, the router is searching for a speed at which it can communicate with the modem. The remaining lines show the actual sending of the modem command.
Router# debug confmodem TTY4:detection speed(115200) response -----TTY4:detection speed(57600) response -----TTY4:detection speed(38400) response ---OK--TTY4:Modem command: --AT&F&C1&D2S180=3S190=1S0=1-TTY4: Modem configuration succeeded TTY4: Done with modem configuration
DB-421
debug conn
To display information from the connection manager, time-division multiplexing (TDM) and digital signal processor (DSP) clients, use the debug conn command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug conn no debug conn
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command is supported on Cisco 3600 series routers. This command is supported on Cisco 2600 series routers and was integrated into Cisco IOS Release 12.2(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
Router(config)# connect conn1 t1 3/0 1 t1 4/0 1 Router(config-tdm-conn)# exit *Mar *Mar *Mar *Mar *Mar 6 6 6 6 6 18:30:59:%CONN TDM:Segment attached to dsx1 18:30:59:%CONN TDM:Parsed segment 1 18:30:59:%CONN TDM:Segment attached to dsx1 18:30:59:%CONN TDM:Parsed segment 2 18:30:59:%CONN:Creating new connection
DB-422
December 2010
Router(config)# *Mar 6 18:31:01:%CONN TDM:Interwork Segments *Mar 6 18:31:01:CONN TDM:Init Segment @ 61C26980 *Mar 6 18:31:01:CONN TDM:Init Segment @ 61C26A44 *Mar 6 18:31:01:%CONN TDM:Activating Segment @ 61C26980 *Mar 6 18:31:01:%CONN:Segment alarms for conn conn1 are 2 *Mar 6 18:31:01:%CONN TDM:Activating Segment @ 61C26A44 *Mar 6 18:31:01:%CONN:Segment alarms for conn conn1 are 0 *Mar 6 18:31:01:%CONN TDM:Connecting Segments *Mar 6 18:31:01:%CONN TDM:MAKING CONNECTION *Mar 6 18:31:01:%CONN:cm_activate_connection, stat = 5 Router(config)#
DB-423
debug control-plane
To display debugging output from the control-plane routines, use the debug control plane command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug control-plane [all | host | port-filtering | queue-thresholding | log] no debug control-plane [all | host | port-filtering | queue-thresholding | log]
Syntax Description
(Optional) Displays all events on all control-plane interfaces. (Optional) Displays all events on the control-plane host interface. (Optional) Displays TCP/IP protocol port-filtering events. (Optional) Displays TCP/IP protocol queue-thresholding events. (Optional) Displays control-plane logging events.
Command Default
Command Modes
Privileged EXEC
Command History
Moditication This command was introduced. The log keyword was added to support control plane logging. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug control plane command if you want to display the debugging output from the control-plane routines.
Examples
The following example show a display from the debug control-plane command:
Router# debug control-plane Control-plane infrastructure events debugging is on Router# cp_receive_classify - marking pak host ingress pak marked cef-exception
The following example shows a display from the debug control-plane command using the port-filtering option:
Router# debug control-plane port-filtering TCP/IP Port filtering events debugging is on Dropped UDP dport 1243 sport 62134 saddr 209.165.200.225
DB-424
December 2010
Description UPD destination port. UPD source port. Source address of the IP packets.
Related Commands
Description Clears packet counters for control-plane interfaces and subinterfaces. Enters control-plane configuration mode, which allows users to associate or modify attributes or parameters that are associated with the control plane of the device.
show control-plane Displays the control plane packet counters for the control plane cef-exception counters CEF-exception subinterface. show control-plane cef-exception features show control-plane counters show control-plane features show control-plane host counters show control-plane host features show control-plane host open-ports show control-plane transit counters Displays the configured features for the control plane CEF-exception subinterface. Displays the control-plane packet counters for the aggregate control-plane interface. Displays the configured features for the aggregate control-plane interface. Displays the control plane packet counters for the control plane host subinterface. Displays the configured features for the control plane host subinterface. Displays a list of open TCP/UDP ports that are registered with the port-filter database. Displays the control plane packet counters for the control plane transit subinterface.
DB-425
debug cops
To display a one-line summary of each Common Open Policy Service (COPS) message sent from and received by the router, use the debug cops command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug cops [detail] no debug cops [detail]
Syntax Description
detail
(Optional) Displays additional debug information, including the contents of COPS and Resource Reservation Protocol (RSVP) messages.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To generate a complete record of the policy process, enter this command and, after entering a carriage return, enter the additional command debug ip rsvp policy.
Examples
This first example displays the one-line COPS message summaries, as the router goes through six different events.
Router# debug cops COPS debugging is on
Event 1
Router(config)# ip rsvp policy cops servers 2.0.0.1 Router(config)# 15:13:45:COPS: Opened TCP connection to 2.0.0.1/3288
DB-426
December 2010
SENDING MESSAGE ** message, Client-type:1, Length:28. Handle:[NONE] RECEIVED MESSAGE ** message, Client-type:1, Length:16. Handle:[NONE]
Event 2
Event 3
Event 4
Event 5
Event 6
The router gets configured to cease communicating with the policy server:
Router(config)# no ip rsvp policy cops servers 15:14:23:COPS:** SENDING MESSAGE ** 15:14:23:COPS CC message, Client-type:1, Length:16. Handle:[NONE] 15:14:23:COPS:Closed TCP connection to 2.0.0.1/3288 Router(config)#
DB-427
This second example uses the detail keyword to display the contents of the COPS and RSVP messages, and additional debugging information:
Router# debug cops detail COPS debugging is on 02:13:29:COPS:** SENDING MESSAGE ** COPS HEADER:Version 1, Flags 0, Opcode 1 (REQ), Client-type:1, Length:216 HANDLE (1/1) object. Length:8. 00 00 21 01 CONTEXT (2/1) object. Length:8. R-type:5. M-type:1 IN_IF (3/1) object. Length:12. Address:10.1.2.1. If_index:4 OUT_IF (4/1) object. Length:12. Address:10.33.0.1. If_index:3 CLIENT SI (9/1) object. Length:168. CSI data: 02:13:29: SESSION type 1 length 12: 02:13:29: Destination 10.33.0.1, Protocol_Id 17, Don't Police , DstPort 44 02:13:29: HOP type 1 length 12:0A010201 02:13:29: :00000000 02:13:29: TIME_VALUES type 1 length 8 :00007530 02:13:29: SENDER_TEMPLATE type 1 length 12: 02:13:29: Source 10.31.0.1, udp_source_port 44 02:13:29: SENDER_TSPEC type 2 length 36: 02:13:29: version=0, length in words=7 02:13:29: Token bucket fragment (service_id=1, length=6 words 02:13:29: parameter id=127, flags=0, parameter length=5 02:13:29: average rate=1250 bytes/sec, burst depth=10000 bytes 02:13:29: peak rate =1250000 bytes/sec 02:13:29: min unit=0 bytes, max unit=1514 bytes 02:13:29: ADSPEC type 2 length 84: 02:13:29: version=0 length in words=19 02:13:29: General Parameters break bit=0 service length=8 02:13:29: IS Hops:1 02:13:29: Minimum Path Bandwidth (bytes/sec):1250000 02:13:29: Path Latency (microseconds):0 02:13:29: Path MTU:1500 02:13:29: Guaranteed Service break bit=0 service length=8 02:13:29: Path Delay (microseconds):192000 02:13:29: Path Jitter (microseconds):1200 02:13:29: Path delay since shaping (microseconds):192000 02:13:29: Path Jitter since shaping (microseconds):1200 02:13:29: Controlled Load Service break bit=0 service length=0 02:13:29:COPS:Sent 216 bytes on socket, 02:13:29:COPS:Message event! 02:13:29:COPS:State of TCP is 4 02:13:29:In read function 02:13:29:COPS:Read block of 96 bytes, num=104 (len=104) 02:13:29:COPS:** RECEIVED MESSAGE ** COPS HEADER:Version 1, Flags 1, Opcode 2 (DEC), Client-type:1, Length:104 HANDLE (1/1) object. Length:8. 00 00 21 01 CONTEXT (2/1) object. Length:8. R-type:1. M-type:1 DECISION (6/1) object. Length:8. COMMAND cmd:1, flags:0 DECISION (6/3) object. Length:56. REPLACEMENT 00 10 0E 01 61 62 63 64 65 66 67 68 69 6A 6B 6C 00 24 0C 02 00 00 00 07 01 00 00 06 7F 00 00 05 44 9C 40 00 46 1C 40 00 49 98 96 80 00 00 00 C8 00 00 01 C8 CONTEXT (2/1) object. Length:8. R-type:4. M-type:1 DECISION (6/1) object. Length:8. COMMAND cmd:1, flags:0 02:13:29:Notifying client (callback code 2) 02:13:29:COPS:** SENDING MESSAGE ** COPS HEADER:Version 1, Flags 1, Opcode 3 (RPT), Client-type:1, Length:24 HANDLE (1/1) object. Length:8. 00 00 21 01 REPORT (12/1) object. Length:8. REPORT type COMMIT (1)
DB-428
December 2010
To see an example where the debug cops command is used along with the debug ip rsvp policy command, refer to the second example of the debug ip rsvp policy command.
Related Commands
DB-429
debug cot
To display information about the Continuity Test (COT) functionality, use the debug cot command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug cot {api | dsp | queue | detail} no debug cot {api | dsp | queue | detail}
Syntax Description
api dsp
Displays information about the COT application programming interface (API). Displays information related to the COT/Digital Signal Processor configuration (DSP) interface. Typical DSP functions include data modems, voice codecs, fax modems and codecs, and low-level signaling such as channel-associated signaling (CAS)/R2. Display information related to the COT internal queue. Display information about COT internal detail; summary of the debug cot api, debug cot dsp, and debug cot queue commands.
queue detail
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cot api command:
Router# debug cot api COT API debugging is on 08:29:55: cot_request_handler(): CDB@0x60DEDE14, req(COT_CHECK_TONE_ON): 08:29:55: shelf 0 slot 0 appl_no 1 ds0 1 08:29:55: freqTX 2010 freqRX 1780 key 0xFFF1 duration 60000
DB-430
December 2010
Table 59
Description Shelf ID of the COT operation request. Designates the slot number, 1 to 4. Hardware unit that provides the external interface connections from a router to the network. Number of the COT operation request. COT operation identifier. Timeout duration of the COT operation. Requested transmit tone frequency. Requested receive tone frequency.
The following is sample output from the debug cot dsp command:
Router# debug cot dsp Router# 00:10:42:COT:DSP (1/1) Allocated 00:10:43:In cot_callback 00:10:43: returned key 0xFFF1, status = 0 00:10:43:COT:Received DSP Q Event 00:10:43:COT:DSP (1/1) Done 00:10:43:COT:DSP (1/1) De-allocated
Field DSP (1/1) Allocated Received DSP Q Event DSP (1/1) Done DSP (1/1) De-allocated
Description Slot and port of the DSP allocated for the COT operation. Indicates the COT subsystem received an event from the DSP. Slot and port of the DSP transitioning to IDLE state. Slot and port of the DSP de-allocated after the completion of the COT operation.
The following is sample output from the debug cot queue command:
Router# debug cot queue Router# 00:11:26:COT(0x60EBB48C):Adding new request (0x61123DBC) to In Progress Q 00:11:26:COT(0x60EBB48C):Adding COT(0x61123DBC) to the Q head 00:11:27:In cot_callback 00:11:27: returned key 0xFFF1, status = 0
DB-431
Description Internal COT operation request. Internal COT operation request queue.
The following is sample output from the debug cot detail command.
Router# debug cot detail Router# 00:04:57:cot_request_handler():CDB@0x60EBB48C, req(COT_CHECK_TONE_ON): 00:04:57: 00:04:57: shelf 0 slot 0 appl_no 1 ds0 1 freqTX 1780 freqRX 2010 key 0xFFF1 duration 1000
00:04:57:COT:DSP (1/0) Allocated 00:04:57:COT:Request Transition to COT_WAIT_TD_ON 00:04:57:COT(0x60EBB48C):Adding new request (0x61123DBC) to In Progress Q 00:04:57:COT(0x60EBB48C):Adding COT(0x61123DBC) to the Q head 00:04:57:COT:Start Duration Timer for Check Tone Request 00:04:58:COT:Received Timer Event 00:04:58:COT:T24 Timer Expired 00:04:58:COT Request@ 0x61123DBC, CDB@ 0x60EBB48C, Params@0x61123E08 00:04:58: request type = COT_CHECK_TONE_ON 00:04:58: shelf 0 slot 0 appl_no 1 ds0 1 00:04:58: duration 1000 key FFF1 freqTx 1780 freqRx 2010 00:04:58: state COT_WAIT_TD_ON_CT 00:04:58: event_proc(0x6093B55C) 00:04:58:Invoke NI2 callback to inform COT request status 00:04:58:In cot_callback 00:04:58: returned key 0xFFF1, status = 0 00:04:58:Return from NI2 callback 00:04:58:COT:Request Transition to IDLE 00:04:58:COT:Received DSP Q Event 00:04:58:COT:DSP (1/0) Done 00:04:58:COT:DSP (1/0) De-allocated
Because the debug cot detail command is a summary of the debug cot api, debug cot dsp, and debug cot queue commands, the field descriptions are the same.
DB-432
December 2010
Effective with Release 12.3(4)T, the debug cpp event command is no longer available in Cisco IOS 12.3(T) releases. To display general Combinet Proprietary Protocol (CPP) events, use the debug cpp event command in privileged EXEC mode. The no form of this command disables debugging output. debug cpp event no debug cpp event
Syntax Description
Command History
Modification This command was introduced. This command is no longer available in Cisco IOS 12.(3)T releases. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
CPP allows a router to engage in negotiation over an ISDN B channel to establish connections with a Combinet bridge. The debug cpp event command displays events such as CPP sequencing, group creation, and keepalives.
Examples
One or more of the messages in Table 62 appear when you use the debug cpp event command. Each message begins with the short name of the interface the event occurred on (for example, SERIAL0:1 or BRI0:1) and might contain one or more packet sequence numbers or remote site names.
Table 62 debug cpp event Messages
Message BRI0:1: negotiation complete BRI0:1: negotiation timed out BRI0:1: sending negotiation packet
Description Call was set up on the interface (in this example, BRI0:1). Call timed out. Negotiation packet was sent to set up the call.
BRI0:1: out of sequence packet - got 10, Packet was received that was out of sequence. The first range 1 8 number displayed in the message is the sequence number received, and the following numbers are the range of valid sequence numbers.
DB-433
Table 62
Description Timer expired before the packet was received. The first number displayed in the message is the sequence number of the packet that was lost, and the second number is the next sequence number. Router fails to maintain keepalives. Dialer group is created on the remote site (in this example, ber19).
BRI0:1: Line Integrity Violation BRI0:1: create cpp group ber19 destroyed cpp group ber19
Related Commands
DB-434
December 2010
Effective with Release 12.3(4)T, the debug cpp negotiation command is no longer available in Cisco IOS 12.3T releases. To display Combinet Proprietary Protocol (CPP) negotiation events, use the debug cpp negotiation command in privileged EXEC mode. The no form of this command disables debugging output. debug cpp negotiation no debug cpp negotiation
Syntax Description
Command History
Modification This command was introduced. This command is no longer available in Cisco IOS 12.3T releases. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
CPP allows a router to engage in negotiation over an ISDN B channel to establish connections with a Combinet bridge. The debug cpp negotiation command displays events such as the type of packet and packet size being sent.
Examples
The following is sample output from the debug cpp negotiation command. In this example, a sample connection is shown.
Router# debug cpp negotiation %LINK-3-UPDOWN: Interface BRI0: B-Channel 2, changed state to down %LINK-3-UPDOWN: Interface BRI0, changed state to up %SYS-5-CONFIG_I: Configured from console by console %LINK-3-UPDOWN: Interface BRI0: B-Channel 1, changed state to up BR0:1:(I) NEG packet - len 77 attempting proto:2 ether id:0040.f902.c7b4 port 1 number:5559876 port 2 number:5559876 origination port:1 remote name:berl9 password is correct
DB-435
Table 63
Field BR0:1 (I) NEG packet - len 77 attempting proto: ether id: port 1 number: port 2 number: origination port: remote name: password is correct
Description Interface name, packet type, and packet size. CPP protocol type. Ethernet address of the destination router. ISDN phone number of remote B channel #1. ISDN phone number of remote B channel #2. B channel 1 or 2 called. Remote site name to which this call is connecting. Password is accepted so the connection is established.
Related Commands
Description Displays information about the COT functionality. Displays CPP packets.
DB-436
December 2010
Effective with Release 12.3(4)T, the debug cpp packet command is no longer available in Cisco IOS 12.3T Releases. To display Combinet Proprietary Protocol (CPP) packets, use the debug cpp packet command in privileged EXEC mode. The no form of this command disables debugging output. debug cpp packet no debug cpp packet
Syntax Description
Command History
Modification This command was introduced. This command is no longer available in Cisco IOS 12.3T releases. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
CPP allows a router to engage in negotiation over an ISDN B channel to establish connections with a Combinet bridge. The debug cpp packet command displays the hexadecimal values of the packets.
Examples
The following is sample output from the debug cpp packet command. This example shows the interface name, packet type, packet size, and the hexadecimal values of the packet.
Router# debug cpp packet BR0:1:input packet - len 60 00 00 00 00 00 00 00 40 F9 02 C7 B4 08 0.!6 00 01 08 00 06 04 00 02 00 40 F9 02 C7 B4 83 6C A1 02!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 64/66/68 ms BR0:1 output packet - len 116 06 00 00 40 F9 02 C7 B4 00 00 0C 3E 12 3A 08 00 45 00 00 64 00 01 00 00 FF 01 72 BB 83 6C A1 01
Related Commands
Description Displays information about the COT functionality. Displays CPP negotiation events.
DB-437
debug credentials
To set debugging on the credentials service that runs between the Cisco Unified CME CTL provider and CTL client or between the Cisco Unified SRST router and Cisco Unified CallManager, use the debug credentials command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug credentials no debug credentials
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for Cisco Unified SRST. This command was introduced for Cisco Unified CME. This command was integrated into Cisco IOS Release 12.4(9)T for Cisco Unified CME. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command with Cisco Unified CME phone authentication to monitor a CTL provider as it provides credentials to the CTL client.
Cisco Unified SRST
Use this command to monitor Cisco Unified CallManager while it requests certificates from the Cisco Unified SRST router. It sets debugging on the credentials service that runs between the SRST router and Cisco Unified CallManager
Examples
The following sample output displays the CTL provider establishing a TLS session with the CTL client and providing all the relevant credentials for the services that are running on this router to the CTL client.
Router# debug credentials Credentials server debugging is enabled May May May May 25 25 25 25 12:08:17.944: 12:08:17.948: 12:08:18.948: 12:08:19.948: Credentials Credentials Credentials Credentials service: service: service: service: Start TLS Handshake 1 TLS Handshake returns TLS Handshake returns TLS Handshake returns 10.5.43.174 4374 OPSSLReadWouldBlockErr OPSSLReadWouldBlockErr OPSSLReadWouldBlockErr
DB-438
December 2010
The following is sample output showing the credentials service that runs between the Cisco Unified SRST router and Cisco Unified CallManager. The credentials service provides Cisco Unified CallManager with the certificate from the SRST router.
Router# debug credentials Credentials server debugging is enabled Router# May 25 12:08:17.944: Credentials service: May 25 12:08:17.948: Credentials service: May 25 12:08:18.948: Credentials service: May 25 12:08:19.948: Credentials service: May 25 12:08:20.964: Credentials service:
Start TLS Handshake 1 10.5.43.174 4374 TLS Handshake returns OPSSLReadWouldBlockErr TLS Handshake returns OPSSLReadWouldBlockErr TLS Handshake returns OPSSLReadWouldBlockErr TLS Handshake completes
Description Indicates the beginning of the TLS handshake between the secure Cisco Unified SRST router and Cisco Unified CallManager. In this example, 1 indicates the socket, 10.5.43.174 is the IP address, and 4374 is the port of Cisco Unified CallManager.
TLS Handshake returns Indicates that the handshake is in process. OPSSLReadWouldBlockErr TLS Handshake completes Indicates that the TLS handshake has finished and that the Cisco Unified CallManager has received the secure Cisco Unified SRST device certificate.
Related Commands
Command credentials
Description Enters credentials configuration mode to configure a Cisco Unified CME CTL provider certificate or a Cisco Unified SRST router certificate. Specifies a user name and password to authenticate the CTL client during the CTL protocol. Enables the Cisco Unified CME or SRST router to receive messages through the specified IP address and port. Displays the credentials settings on a Cisco Unified CME or SRST router. Displays information about the types of debugging that are enabled for your router. Specifies the name of the trustpoint to be associated with a Cisco Unified CME CTL provider certificate or with a Cisco Unified SRST router certificate.
ctl-service admin ip source-address (credentials) show credentials show debugging trustpoint (credentials)
DB-439
debug crm
To troubleshoot the Carrier Resource Manager (CRM), use the debug crm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug crm [all | default | detail | error [call [informational] | software [informational]] | function | inout] no debug crm
Syntax Description
(Optional) Displays all CRM debugging messages. (Optional) Displays detail, error, and inout information. This option also runs if no keywords are added. (Optional) Displays non-inout information related to call processing, such as call updates or call acceptance checking. (Optional) Displays CRM error messages. (Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software errors. (Optional) Displays CRM function names and exit points from each function so that call processing can be traced within the CRM subsystem. (Optional) Displays information from the functions that form the external interfaces of CRM to other modules or subsystems.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The all, default, detail, error, call, informational, software, function, and inout keywords were added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Disable console logging and use buffered logging before using the debug crm command. Using the debug crm command generates a large volume of debugs, which can affect router performance.
DB-440
December 2010
Examples
The following is sample output from the debug crm all command for an incoming ISDN call on a trunk group:
Router# debug crm all 01:21:23: //-1/xxxxxxxxxxxx/CRM/crm_send_periodic_update: 01:21:23: //-1/xxxxxxxxxxxx/CRM/print_event: RouteLabel=2023, CarrierType=TDM, EventType=Single RouteLabel Update, EventReason=Both Capacity Update, Max Capacity mask 0x0000001F, Current Capacity Mask 0x0000001F 01:21:23: //-1/xxxxxxxxxxxx/CRM/crm_call_update: Increment the call count CarrierID=2023, TrunkGroupLabel=2023 Update is for TrunkGroupLabel, Mask=0x00000001 01:21:23: //-1/xxxxxxxxxxxx/CRM/crm_call_update: IncomingVoiceCalls=1 Router# 01:21:48: //-1/xxxxxxxxxxxx/CRM/crm_send_periodic_update: 01:21:48: //-1/xxxxxxxxxxxx/CRM/print_event: RouteLabel=2023, CarrierType=TDM, EventType=Single RouteLabel Update, EventReason=Both Capacity Update, Max Capacity mask 0x0000001F, Current Capacity Mask 0x0000001F 01:22:13: //-1/xxxxxxxxxxxx/CRM/crm_send_periodic_update: 01:22:13: //-1/xxxxxxxxxxxx/CRM/print_event: RouteLabel=2023, CarrierType=TDM, EventType=Single RouteLabel Update, EventReason=Both Capacity Update, Max Capacity mask 0x0000001F, Current Capacity Mask 0x0000001F Router# 01:22:18: //-1/xxxxxxxxxxxx/CRM/crm_call_update: Decrement the call count CarrierID=2023, TrunkGroupLabel=2023 Update is for TrunkGroupLabel, Mask=0x00000001 01:22:18: //-1/xxxxxxxxxxxx/CRM/crm_call_update: IncomingVoiceCalls=0
Field //-1/xxxxxxxxxxxx/CRM/print_event:
CallEntry ID is -1. This indicates that the CallEntry ID is unavailable. GUID is xxxxxxxxxxxxxxxxx. This indicates that the GUID is unavailable. CRM is the module name. The print_event: field shows that the CRM is showing the print event function.
Either the trunk group label or carrier ID. Indicates the type of trunk. Indicates if a single route or all routes are updated. Shows the reason for this event being sent.
DB-441
Related Commands
Command max-calls
Description Specifies the maximum number of calls the trunk group can handle.
DB-442
December 2010
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example enables IPSec VPN SPA debugging for a Blade Failure Group:
Router# debug crypto ace b2b ACE B2B Failover debugging is on
Related Commands
Command
Description
linecard-group feature Assigns a group ID to a Blade Failure Group. card show crypto ace redundancy show redundancy linecard-group Displays information about a Blade Failure Group. Displays the components of a Blade Failure Group.
DB-443
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-444
December 2010
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-445
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
The following example enables ACE Crypto engine congestion manager debugging:
Router# debug crypto ace congestion-mgr ACE Crypto Engine Congestion Manager debugging is on
DB-446
December 2010
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-447
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-448
December 2010
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-449
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-450
December 2010
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-451
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-452
December 2010
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-453
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-454
December 2010
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-455
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-456
December 2010
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-457
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-458
December 2010
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-459
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-460
December 2010
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-461
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-462
December 2010
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-463
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-464
December 2010
Syntax Description
Defaults
None
Command Modes
Command History
Release 12.2(33)SXI5
Examples
DB-465
Syntax Description
(Optional) Internet Key Exchange (IKE) and IP Security (IPSec) connection ID filter. Valid values range from 1 to 32766. (Optional) Crypto engine ID value, which can be retrieved via the show crypto isakmp sa detail command. Valid values are 1, which represents software engines, and 2, which represents hardware engines. (Optional) IPSec flow-ID filter. Valid values range from 1 to 32766. (Optional) Group Domain of Interpretation (GDOI) group filter.
isakmp profile profile-name (Optional) Filter for Internet Security Association Key Management Protocol (ISAKMP) profile.
fvrf string1
(Optional) Front-door virtual private network (VPN) routing and forwarding (FVRF) filter. The string argument must be the name string of an FVRF instance. (Optional) Inside VRF (IVRF) filter. The string argument must be the name string of an IVRF instance. (Optional) IKE local address filter.
(Optional) IKE peer filter. At least one of the following keywords and arguments must be used:
group stringUnity group name filter of the IKE peer. hostname stringFully qualified domain name (FQDN) host name filter of the IKE peer. ipv4 ipaddressIP address filter of the IKE peer. subnet subnet maskRange of IKE peer IP addresses. username stringFQDN username filter of the IKE peer.
DB-466
December 2010
(Optional) Security policy index (SPI) filter. The integer must be a 32-bit unsigned integer. (Optional) Deletes all crypto debug filters.
Note
It is suggested that you turn off all crypto global debugging before using this keyword; otherwise, your system may be flooded with debug messages.
unmatched
(Optional) Filters all debug messages or only specified debug messages by choosing any of the following keywords:
engineOutput crypto engine debugs even if no context available. gdoi-groupOutput GDOI group debugs even if no match occurs. ipsecOutput IPsec debugs even if no context available. isakmpOutput IKE debugs even if no context available.
username string
1. Additional conditional filters (ipv4 address, subnet mask, username, hostname, group, connection-ID, flow-ID, SPI, FVRF, and IVRF) can be specified more than once by repeating the debug crypto condition command with any of the available filters.
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)SXD. The gdoi-group groupname, isakmp profile profile-name, local ipv4 ip-address, unmatched, and username string keywords and arguments were added. This command is supported in the Cisco IOS 12.2SX family of releases. Support in a specific 12.2SX release is dependent on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
Before enabling the debug crypto condition command, you must decide what debug condition types (also known as debug filters) and values will be used. The volume of debug messages is dependent on the number of conditions you define.
Note
Specifying numerous debug conditions may consume CPU cycles and have a negative effect on router performance.
DB-467
To begin crypto conditional debugging, you must also enable at least one global crypto debug commanddebug crypto isakmp, debug crypto ipsec, and debug crypto engine; otherwise, conditional debugging will not occur. This requirement helps to ensure that the performance of the router will not be impacted when conditional debugging is not being used.
Note
Examples
The following example shows how to display debug messages when the peer IP address is 10.1.1.1, 10.1.1.2, or 10.1.1.3 and when the connection-ID 2000 of crypto engine 0 is used. This example also shows how to enable global debug crypto CLIs and enable the show crypto debug-condition command to verify conditional settings.
Router# debug crypto condition connid 2000 engine-id 1 Router# debug crypto condition peer ipv4 10.1.1.1 Router# debug crypto condition peer ipv4 10.1.1.2 Router# debug crypto condition peer ipv4 10.1.1.3 Router# debug crypto condition unmatched ! Verify crypto conditional settings. Router# show crypto debug-condition Crypto conditional debug currently is turned ON IKE debug context unmatched flag:ON IPsec debug context unmatched flag:ON Crypto Engine debug context unmatched flag:ON IKE peer IP address filters: 10.1.1.1 10.1.1.2 10.1.1.3 Connection-id filters:[connid:engine_id]2000:1, ! Enable global crypto CLIs to start conditional debugging. Router# debug crypto isakmp Router# debug crypto ipsec Router# debug crypto engine
The following example shows how to disable all crypto conditional settings via the reset keyword:
Router# Router# Router# Router# no debug crypto isakmp no debug crypto ipsec no debug crypto engine debug crypto condition reset
! Verify that all crypto conditional settings have been disabled. Router# show crypto debug-condition Crypto conditional debug currently is turned OFF IKE debug context unmatched flag:OFF IPsec debug context unmatched flag:OFF Crypto Engine debug context unmatched flag:OFF
DB-468
December 2010
Related Commands
Description Displays crypto debug conditions that have already been enabled in the router. Displays crypto conditional debug messages when context information is unavailable to check against debug conditions. Displays the settings used by current SAs. Displays all current IKE SAs at a peer.
DB-469
Syntax Description
(Optional) One or more of these keywords can be enabled to display debug messages for the specified areas. If none of these keywords are entered, debug messages for all crypto areas will be shown.
Defaults
Debug messages that do not have context information to match any debug conditions (filters) will not be printed.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)SXD. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
After the debug crypto condition command has been enabled, you can use the debug crypto condition unmatched command to define whether the debug output is being printed when no context information is available in the code to check against the debug filters. For example, if the crypto engines connection-ID is the filter that the debug conditions are being checked against, the debug crypto condition unmatched command displays debug messages in the early negotiation phase when a connection-ID is unavailable to check against debug conditions.
Examples
The following example shows how to enable debug messages for all crypto-related areas:
Router# debug crypto condition unmatched
Related Commands
Description Defines conditional debug filters. Displays crypto debug conditions that have already been enabled in the router.
DB-470
December 2010
Description Displays the settings used by current SAs. Displays all current IKE SAs at a peer.
DB-471
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You can use this command if a cTCP session fails to come up.
Examples
The following example shows that debugging has been turned on for a cTCP session:
Router# debug crypto ctcp
Related Commands
DB-472
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug crypto engine command to display information pertaining to the crypto engine, such as when Cisco IOS software is performing encryption or decryption operations. The crypto engine is the actual mechanism that performs encryption and decryption. A crypto engine can be software or a hardware accelerator. Some platforms can have multiple crypto engines; therefore, the router will have multiple hardware accelerators.
Examples
The following is sample output from the debug crypto engine command. The first sample output shows messages from a router that successfully generates Rivest, Shamir, and Adelma (RSA) keys. The second sample output shows messages from a router that decrypts the RSA key during Internet Key Exchange (IKE) negotiation.
Router# debug crypto engine 00:25:13:CryptoEngine0:generate key pair 00:25:13:CryptoEngine0:CRYPTO_GEN_KEY_PAIR 00:25:13:CRYPTO_ENGINE:key process suspended and continued 00:25:14:CRYPTO_ENGINE:key process suspended and continuedcr Router# debug crypto engine 00:27:45:%SYS-5-CONFIG_I:Configured from console by console 00:27:51:CryptoEngine0:generate alg parameter 00:27:51:CRYPTO_ENGINE:Dh phase 1 status:0 00:27:51:CRYPTO_ENGINE:Dh phase 1 status:0 00:27:51:CryptoEngine0:generate alg parameter 00:27:52:CryptoEngine0:calculate pkey hmac for conn id 0
DB-473
00:27:52:CryptoEngine0:create ISAKMP SKEYID for conn id 1 00:27:52:Crypto engine 0:RSA decrypt with public key 00:27:52:CryptoEngine0:CRYPTO_RSA_PUB_DECRYPT 00:27:52:CryptoEngine0:generate hmac context for conn id 1 00:27:52:CryptoEngine0:generate hmac context for conn id 1 00:27:52:Crypto engine 0:RSA encrypt with private key 00:27:52:CryptoEngine0:CRYPTO_RSA_PRIV_ENCRYPT 00:27:53:CryptoEngine0:clear dh number for conn id 1 00:27:53:CryptoEngine0:generate hmac context for conn id 1 00:27:53:validate proposal 0 00:27:53:validate proposal request 0 00:27:54:CryptoEngine0:generate hmac context for conn id 1 00:27:54:CryptoEngine0:generate hmac context for conn id 1 00:27:54:ipsec allocate flow 0 00:27:54:ipsec allocate flow 0
Related Commands
DB-474
December 2010
Syntax Description
Defaults
The logging of commands sent from the VPN module driver to the VPN module hardware is disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 1720 and Cisco 1750 routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug crypto engine accelerator logs command when encryption traffic is sent to the router and a problem with the encryption module is suspected. This command is intended only for Cisco TAC personnel to collect debugging information.
Examples
The debug crypto engine accelerator logs command uses a debug flag to log commands and associated parameters sent from the VPN module driver to the VPN module hardware as follows:
Router# debug crypto engine accelerator logs encryption module logs debugging is on
Related Commands
Description Enables or disables the crypto engine accelerator if it exists. Prints information about the last 32 CGX Library packet processing commands, and associated parameters sent from the VPN module driver to the VPN module hardware.
DB-475
Command show crypto engine accelerator sa-database show crypto engine configuration
Description Prints active (in-use) entries in the platform-specific VPN module database. Displays the Cisco IOS crypto engine of your router.
DB-476
December 2010
Syntax Description
Debug messages are shown for Internet Key Exchange (IKE)-related error operations only. Debug messages are shown for IP Security (IPSec)-related error operations only. Debug messages are shown for crypto engine-related error operations only.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(!8)SXD. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug crypto error command will display only error-related debug messages; that is, an error debug will not be shown if the operation is functioning properly. This command should be used when debug conditions cannot be determined; for example, enable this command when a random, small subset of IKE peers is failing negotiation.
Note
The global crypto command-line interfaces (CLIs) (the debug crypto isakmp, debug crypto ipsec, and debug crypto engine commands) will override the debug crypto error command. Thus, this command should not be used in conjunction with the global CLIs because you may overwhelm the router.
Note
DB-477
Examples
DB-478
December 2010
Syntax Description
(Optional) Displays detailed debug information. (Optional) Displays information about error debugs. (Optional) Displays user-level information. (Optional) Displays information about group members. (Optional) Displays information about the GDOI infrastructure. (Optional) Displays information about key servers. (Optional) Displays information about cooperative key servers. (Optional) Displays information about packet-level debugs (administrator-level information). (Optional) Displays information about the pseudotime stamp that is contained in a packet. (Optional) Displays lowest-level debugs (message-level information). The detail, error, event, packet, and terse keywords can be used with the other nonlevel keywords (for example, gm error, infra error, ks coop event, replay error).
Command Default
Command Modes
Command History
Modification This command was introduced. The detail, error, event, gm, infra, ks, coop, packet, replay, and terse keywords were added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was implemented on the Cisco ASR 1000 series routers.
Usage Guidelines
Using this command displays various GDOI debugs. For debugging information for cooperative key servers, use the debug crypto gdoi ks coop command.
DB-479
Examples
enc(config-if)# 00:00:40: GDOI:(0:0:N/A:0):Registration installed 2 new ipsec SA(s) for group diffint.
DB-480
December 2010
DB-481
debug crypto ha
To display crypto high availability debugging information, use the debug crypto ha command in privileged EXEC mode. To disable debugging messages, use the no form of this command. debug crypto ha no debug crypto ha
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example is sample output from the debug crypto ha command:
Router# debug crypto ha Active router: Router# show debug Cryptographic Subsystem: Crypto High Availability Manager debugging is on vrf-lite-R1# *Sep 28 21:27:50.899:Sending IKE Add SA Message *Sep 28 21:27:50.899:HA Message 0:flags=0x01 len=394 HA_IKE_MSG_ADD_SA (2) *Sep 28 21:27:50.899: ID:04000003 *Sep 28 21:27:50.899: attr HA_IKE_ATT_MY_COOKIE (2) len 8 *Sep 28 21:27:50.899: 9B 1A 76 AA 99 11 1A 1F *Sep 28 21:27:50.899: attr HA_IKE_ATT_HIS_COOKIE (3) len 8 *Sep 28 21:27:50.899: E2 A2 A3 5F 53 1D EA 15 *Sep 28 21:27:50.899: attr HA_IKE_ATT_SRC (4) len 4 *Sep 28 21:27:50.899: 04 00 00 05 *Sep 28 21:27:50.899: attr HA_IKE_ATT_DST (5) len 4 *Sep 28 21:27:50.899: 04 00 00 03 *Sep 28 21:27:50.899: attr HA_IKE_ATT_PEER_PORT (6) len 2 *Sep 28 21:27:50.899: 01 F4 *Sep 28 21:27:50.899: attr HA_IKE_ATT_F_VRF (7) len 1 *Sep 28 21:27:50.899: 00 *Sep 28 21:27:50.899: attr HA_IKE_ATT_INIT_OR_RESP (8) len 1 *Sep 28 21:27:50.899: 00 *Sep 28 21:27:50.899: attr HA_IKE_ATT_NAT_DISCOVERY (9) len 1 *Sep 28 21:27:50.899: 02 *Sep 28 21:27:50.899: attr HA_IKE_ATT_IDTYPE (38) len 1 *Sep 28 21:27:50.899: 01 *Sep 28 21:27:50.899: attr HA_IKE_ATT_PROTOCOL (39) len 1
DB-482
December 2010
*Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep . . .
28 28 28 28 28 28 28 28 28 28 28 28 28 28 28
21:27:50.899: 21:27:50.899: 21:27:50.899: 21:27:50.899: 21:27:50.899: 21:27:50.899: 21:27:50.899: 21:27:50.899: 21:27:50.899: 21:27:50.899: 21:27:50.899: 21:27:50.899: 21:27:50.899: 21:27:50.899: 21:27:50.899:
11 attr HA_IKE_ATT_PORT (40) len 2 01 F4 attr HA_IKE_ATT_ADDR (41) len 4 04 00 00 05 attr HA_IKE_ATT_MASK (42) len 4 00 00 00 00 attr HA_IKE_ATT_ID_STR (44) len 4 00 00 00 00 attr HA_IKE_ATT_PEERS_CAPABILITIES (11) len 4 00 00 07 7F attr HA_IKE_ATT_MY_CAPABILITIES (12) len 4 00 00 07 7F attr HA_IKE_ATT_STATE_MASK (13) len 4 00 00 27 FF
Related Commands
Description Enables debugging messages for IPSec high availability. Enables debugging messages for ISAKMP high availability.
DB-483
Syntax Description
(Optional) Enables debug messages capturing IKEv2 errors. (Optional) Enables debug messages capturing IKEv2 message exchanges. (Optional) Enables debug messages capturing IKEv2 packet description, contents, and policy matching. (Optional) Enables debug messages capturing IKEv2 packet dump. (Optional) Enables debug messages capturing IKEv2 state machine events.
Command Modes
Command History
Release 15.1(1)T
Usage Guidelines
Examples
DB-484
December 2010
Syntax Description
Command Modes
Examples
The following is sample output from the debug crypto ipsec command. In this example, security associations (SAs) have been successfully established.
Router# debug crypto ipsec
IPsec requests SAs between 172.21.114.123 and 172.21.114.67, on behalf of the permit ip host 172.21.114.123 host 172.21.114.67 command. IPsec is configured to first use the set esp-des w/esp-md5-hmac, but it will also use ah-sha-hmac on a secondary basis.
00:24:30: IPSEC(sa_request): , (key eng. msg.) src= 172.21.114.123, dest= 172.21.114.67, src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1), dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-des esp-md5-hmac , lifedur= 120s and 4608000kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4 00:24:30: IPSEC(sa_request): , (key eng. msg.) src= 172.21.114.123, dest= 172.21.114.67, src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1), dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1)., protocol= AH, transform= ah-sha-hmac , lifedur= 120s and 4608000kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0.
Internet Key Exchange (IKE) prompts for Service Provider Interfaces (SPIs) from IPsec. For inbound security associations, IPsec controls its own SPI space.
00:24:34: IPSEC(key_engine): got a queue event... 00:24:34: IPSEC(spi_response): getting spi 302974012ld for SA from 172.21.114.67 to 172.21.114.123 for prot 3 00:24:34: IPSEC(spi_response): getting spi 525075940ld for SA from 172.21.114.67 to 172.21.114.123 for prot 2
IKE will verify whether IPsec accepts the SA proposal. In this example, it is the SA proposal sent by the local IPsec that is accepted first.
00:24:34: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) dest= 172.21.114.67, src= 172.21.114.123, dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1), src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-des esp-md5-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4
DB-485
After the proposal is accepted, IKE finishes the negotiations, generates the keying material, and then notifies IPsec of the new security associations (one security association for each direction).
00:24:35: IPSEC(key_engine): got a queue event...
The following output pertains to the inbound SA. The conn_id value references an entry in the crypto engine connection table.
00:24:35: IPSEC(initialize_sas): , (key eng. msg.) dest= 172.21.114.123, src= 172.21.114.67, dest_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1), src_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-des esp-md5-hmac , lifedur= 120s and 4608000 kb, spi= 0x120F043C(302974012), conn_id= 29, keysize= 0, flags= 0x4
The following is sample output from the debug crypto ipsec command as seen on the peer router. In this example, IKE verifies whether IPsec will accept an SA proposal. Although the peer sent two proposals, IPsec accepted the first proposal.
00:26:15: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) dest= 172.21.114.67, src= 172.21.114.123, dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1), src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-des esp-md5-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4
IKE does the remaining processing, completing the negotiation and generating keys. IKE then notifies IPsec about the new SAs.
00:26:15: IPSEC(key_engine): got a queue event...
DB-486
December 2010
DB-487
Syntax Description
Defaults
Command Modes
Command History
Release 12.2(4)YA
Modification This command was introduced on Cisco 806, Cisco 826, Cisco 827, and Cisco 828 routers; Cisco 1700 series routers; and Cisco uBR905 and Cisco uBR925 cable access routers. This command was integrated into Cisco IOS Release 12.2(13)T. This command was expanded to support the Easy VPN Remote feature. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS 12.2SX family of releases. Support in a specific 12.2SX release is dependent on your feature set, platform, and platform hardware.
Usage Guidelines
To force the Voice DSP Contol Message Logger to reestablish the virtual private network (VPN) connections, use the clear crypto sa and clear crypto isakmp commands to delete the IPSec security associations and Internet Key Exchange (IKE) connections, respectively.
Examples
The following example shows debugging messages when the Voice DSP Contol Message Logger is turned on and typical debugging messages that appear when the VPN tunnel is created:
Router# debug crypto ipsec client ezvpn EzVPN debugging is on router# 00:02:28: EZVPN(hw1): 00:02:28: EZVPN(hw1): 00:02:28: EZVPN(hw1): 00:02:28: EZVPN(hw1): 00:02:28: EZVPN(hw1):
Current State: IPSEC_ACTIVE Event: RESET ezvpn_close New State: CONNECT_REQUIRED Current State: CONNECT_REQUIRED
DB-488
December 2010
00:02:28: 00:02:28: 00:02:28: 00:02:29: 00:02:29: 00:02:29: 00:02:29: 00:02:29: 00:02:29: 00:02:29: 00:02:29: 00:02:29: 00:02:29: 00:02:29: 00:02:29: 00:02:30: 00:02:30: 00:02:30: 00:02:30: 00:02:30: 00:02:30: 00:02:30:
EZVPN(hw1): Event: CONNECT EZVPN(hw1): ezvpn_connect_request EZVPN(hw1): New State: READY EZVPN(hw1): Current State: READY EZVPN(hw1): Event: MODE_CONFIG_REPLY EZVPN(hw1): ezvpn_mode_config EZVPN(hw1): ezvpn_parse_mode_config_msg EZVPN: Attributes sent in message: Address: 10.0.0.5 Default Domain: cisco.com EZVPN(hw1): ezvpn_nat_config EZVPN(hw1): New State: SS_OPEN EZVPN(hw1): Current State: SS_OPEN EZVPN(hw1): Event: SOCKET_READY EZVPN(hw1): No state change EZVPN(hw1): Current State: SS_OPEN EZVPN(hw1): Event: MTU_CHANGED EZVPN(hw1): No state change EZVPN(hw1): Current State: SS_OPEN EZVPN(hw1): Event: SOCKET_UP ezvpn_socket_up EZVPN(hw1): New State: IPSEC_ACTIVE
The following example shows the typical display for a VPN tunnel that is reset with the clear crypto ipsec client ezvpn command:
3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: 3d17h: EZVPN: Current State: READY EZVPN: Event: RESET ezvpn_reconnect_request ezvpn_close ezvpn_connect_request EZVPN: New State: READY EZVPN: Current State: READY EZVPN: Event: MODE_CONFIG_REPLY ezvpn_mode_config ezvpn_parse_mode_config_msg EZVPN: Attributes sent in message: DNS Primary: 172.16.0.250 DNS Secondary: 172.16.0.251 NBMS/WINS Primary: 172.16.0.252 NBMS/WINS Secondary: 172.16.0.253 Split Tunnel List: 1 Address : 172.16.0.128 Mask : 255.255.255.128 Protocol : 0x0 Source Port: 0 Dest Port : 0 Split Tunnel List: 2 Address : 172.16.1.128 Mask : 255.255.255.128 Protocol : 0x0 Source Port: 0 Dest Port : 0 Default Domain: cisco.com ezvpn_nat_config EZVPN: New State: SS_OPEN EZVPN: Current State: SS_OPEN EZVPN: Event: SOCKET_READY EZVPN: No state change EZVPN: Current State: SS_OPEN EZVPN: Event: SOCKET_READY EZVPN: No state change EZVPN: Current State: SS_OPEN EZVPN: Event: MTU_CHANGED
DB-489
No state change Current State: SS_OPEN Event: SOCKET_UP New State: IPSEC_ACTIVE Current State: IPSEC_ACTIVE Event: MTU_CHANGED No state change Current State: IPSEC_ACTIVE Event: SOCKET_UP
The following example shows the typical display for a VPN tunnel that is removed from the interface with the no crypto ipsec client ezvpn command:
4d16h: 4d16h: 4d16h: 4d16h: 4d16h: 4d16h: EZVPN: Current State: IPSEC ACTIVE EZVPN: Event: REMOVE INTERFACE CFG ezvpn_close_and_remove ezvpn_close ezvpn_remove EZVPN: New State: IDLE
Related Commands
Description Displays debugging messages for generic IPSec events. Displays debugging messages for IKE events.
DB-490
December 2010
Syntax Description
detail update
(Optional) Displays detailed debug information. (Optional) Displays updates for inbound and outbound related data.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example is sample output of the debug crypto ipsec ha command for both the active and stanby router:
Active Router Router# debug crypto ipsec ha Crypto IPSEC High Availability debugging is on *Sep 29 17:03:01.851:IPSec HA (crypto_ha_ipsec_notify_add_sa):called *Sep 29 17:03:01.851:IPSec HA (crypto_ha_ipsec_notify_add_sa):New IPsec SA added... notifying HA Mgr Standby Router Router# debug crypto ipsec ha Crypto IPSEC High Availability debugging is on vrf-lite-R1# *Sep 29 17:03:01.031:IPSec HA (crypto_ha_ipsec_mgr_recv_add_sas):HA mgr wants to insert the following bundle *Sep 29 17:03:01.031:IPSec HA (crypto_ha_ipsec_mgr_recv_add_sas):This SA Supports DPD *Sep 29 17:03:01.031:IPSec HA (crypto_ha_ipsec_gen_sa):Sending Kei to IPSec num_kei 2 *Sep 29 17:03:01.039:IPSec HA (crypto_ha_ipsec_notify_add_sa):called *Sep 29 17:03:01.039:IPSec HA (crypto_ha_ipsec_notify_add_sa):operation not performed as standby ip 4.0.0.3
The following example is sample debug output with the detail keyword:
Active Router
DB-491
*Sep 29 17:05:48.803:IPSec HA (crypto_ha_ipsec_mgr_set_state_common):called for vip 4.0.0.3 *Sep 29 17:06:11.655:IPSec HA (crypto_ha_ipsec_mgr_bulk_sync_sas):Bulk sync request from standby for local addr 4.0.0.3 *Sep 29 17:06:44.059:IPSec HA (crypto_ha_ipsec_notify_add_sa):called *Sep 29 17:06:44.059:IPSec HA (crypto_ha_ipsec_notify_add_sa):New IPsec SA added... notifying HA Mgr Standby Router Router# debug crypto ipsec ha detail Crypto IPSEC High Availability Detail debugging is on vrf-lite-R1# *Sep 29 17:06:44.063:IPSec HA (crypto_ha_ipsec_mgr_recv_add_sas):HA mgr wants to insert the following bundle *Sep 29 17:06:44.063:IPSec HA (crypto_ha_ipsec_mgr_recv_add_sas):This SA Supports DPD *Sep 29 17:06:44.063:IPSec HA (crypto_ha_ipsec_gen_sa):Sending Kei to IPSec num_kei 2 *Sep 29 17:06:44.071:IPSec HA (crypto_ha_ipsec_notify_add_sa):called *Sep 29 17:06:44.071:IPSec HA (crypto_ha_ipsec_notify_add_sa):operation not performed as standby ip 4.0.0.3
The following example is sample debug output with the update keyword:
Active Router *Sep 29 17:27:30.839:IPSec HA(check_and_send_replay_update):Replay triggered update seq_num 1000 last-sent 0 dir inbound *Sep 29 17:27:30.839:IPSec HA(create_update_struct):Sending inbound update *Sep 29 17:27:30.839:IPSec HA(send_update_struct): Outbound - New KB 0, New replay 0 Inbound - New KB 3998772, New replay 1000 *Sep 29 17:29:30.883:IPSec HA(check_and_send_replay_update):Replay triggered update seq_num 2000 last-sent 1000 dir inbound *Sep 29 17:29:30.883:IPSec HA(create_update_struct):Sending inbound update *Sep 29 17:29:30.883:IPSec HA(send_update_struct): Outbound - New KB 0, New replay 0 Inbound - New KB 3998624, New replay 2000 *Sep 29 17:30:30.899:IPSec HA(check_and_send_replay_update):Replay triggered update seq_num 3000 last-sent 2000 dir inbound *Sep 29 17:30:30.899:IPSec HA(create_update_struct):Sending inbound update *Sep 29 17:30:30.899:IPSec HA(send_update_struct): Outbound - New KB 0, New replay 0 Inbound - New KB 3998476, New replay 3000 *Sep 29 17:32:30.943:IPSec HA(check_and_send_replay_update):Replay triggered update seq_num 4000 last-sent 3000 dir inbound *Sep 29 17:32:30.943:IPSec HA(create_update_struct):Sending inbound update *Sep 29 17:32:30.943:IPSec HA(send_update_struct): Outbound - New KB 0, New replay 0 Inbound - New KB 3998327, New replay 4000 Standby Router *Sep 29 17:27:28.887:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):called
DB-492
December 2010
*Sep 29 17:27:28.887:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):UPDATING INBOUND SA:ip = 4.0.0.3, protocol = 50, spi = B8A47EC9, NEW KB LIFE = 3998772, NEW REPLAY WINDOW START = 1000, *Sep 29 17:29:28.915:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):called *Sep 29 17:29:28.915:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):UPDATING INBOUND SA:ip = 4.0.0.3, protocol = 50, spi = B8A47EC9, NEW KB LIFE = 3998624, NEW REPLAY WINDOW START = 2000, *Sep 29 17:30:28.939:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):called *Sep 29 17:30:28.939:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):UPDATING INBOUND SA:ip = 4.0.0.3, protocol = 50, spi = B8A47EC9, NEW KB LIFE = 3998476, NEW REPLAY WINDOW START = 3000, *Sep 29 17:32:28.955:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):called *Sep 29 17:32:28.955:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):UPDATING INBOUND SA:ip = 4.0.0.3, protocol = 50, spi = B8A47EC9, NEW KB LIFE = 3998327, NEW REPLAY WINDOW START = 4000,
Related Commands
Description Displays crypto high availability debugging information. Enables debugging messages for ISAKMP high availability.
DB-493
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to display IPSec events while setting up or removing policy definitions during OSPF configuration.
Examples
The following example enables the display of IPSec events for IPv6 networks:
Router# debug crypto ipv6 ipsec
Related Commands
Description Displays debugging messages about crypto engines, which perform encryption and decryption. Displays debug messages for IPv6 packets allowing you to see the contents of packets outbound from a Cisco router when the remote node is not a Cisco node. Displays communication between the client and IPSec during policy setup and removal processes. Displays the interaction between OSPF and IPSec, including creation or removal of policies.
DB-494
December 2010
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Consult Cisco Technical Support before using this command. Use this command to display the contents of IPv6 packets. This command is useful when the remote node is not a Cisco device and communication between the Cisco and non-Cisco router cannot be established. This command enables you to look at the contents of the packets outbound from the Cisco router. This command examines the content of every IPv6 packet and may slow network performance.
Examples
This example shows the ouptut of each packet when the debug crypto ipv6 packet command is enabled:
Router# debug crypto ipv6 packet Crypto IPv6 IPSEC packet debugging is on Router# *Oct 30 16:57:06.330: IPSECv6:before Encapsulation of IPv6 packet: 0E37A7C0: 6E000000 00285901 0E37A7D0:FE800000 00000000 020A8BFF FED42C1D 0E37A7E0:FF020000 00000000 00000000 00000005 0E37A7F0:03010028 01010104 00000001 8AD80000 0E37A800:00000006 01000013 000A0028 0A0250CF 0E37A810:01010104 0A0250CF *Oct 30 16:57:06.330: IPSECv6:Encapsulated IPv6 packet : 0E37A7B0:6E000000 00403301 FE800000 00000000
n....@3.~.......
DB-495
0E37A7C0:020A8BFF FED42C1D FF020000 00000000 0E37A7D0:00000000 00000005 59040000 000022B8 0E37A7E0:0000001A 38AB1ED8 04C1C6FB FF1248CF 0E37A7F0:03010028 01010104 00000001 8AD80000 0E37A800:00000006 01000013 000A0028 0A0250CF 0E37A810:01010104 0A0250CF *Oct 30 16:57:11.914: IPSECv6:Before Decapsulation of IPv6 packet : 0E004A50: 6E000000 00403301 0E004A60:FE800000 00000000 023071FF FE7FE81D 0E004A70:FF020000 00000000 00000000 00000005 0E004A80:59040000 000022B8 00001D88 F5AC68EE 0E004A90:1AC00088 947C6BF2 03010028 0A0250CF 0E004AA0:00000001 E9080000 00000004 01000013 0E004AB0:000A0028 0A0250CF 01010104 01010104 0E004AC0: *Oct 30 16:57:11.914: IPSECv6:Decapsulated IPv6 packet : 0E004A70:6E000000 00285901 FE800000 00000000 0E004A80:023071FF FE7FE81D FF020000 00000000 0E004A90:00000000 00000005 03010028 0A0250CF 0E004AA0:00000001 E9080000 00000004 01000013 0E004AB0:000A0028 0A0250CF 01010104 01010104 0E004AC0: *Oct 30 16:57:16.330: IPSECv6:before Encapsulation of IPv6 packet: 0E003DC0: 6E000000 00285901 0E003DD0:FE800000 00000000 020A8BFF FED42C1D 0E003DE0:FF020000 00000000 00000000 00000005 0E003DF0:03010028 01010104 00000001 8AD80000 0E003E00:00000006 01000013 000A0028 0A0250CF 0E003E10:01010104 0A0250CF *Oct 30 16:57:16.330: IPSECv6:Encapsulated IPv6 packet : 0E003DB0:6E000000 00403301 FE800000 00000000 0E003DC0:020A8BFF FED42C1D FF020000 00000000 0E003DD0:00000000 00000005 59040000 000022B8 0E003DE0:0000001B F8E3C4E2 4CC4B690 DDF32B5C 0E003DF0:03010028 01010104 00000001 8AD80000 0E003E00:00000006 01000013 000A0028 0A0250CF 0E003E10:01010104 0A0250CF
Related Commands
Command debug crypto engine debug crypto ipv6 ipsec debug crypto socket
Description Displays debugging messages about crypto engines, which perform encryption and decryption. Displays IPSec events for IPv6 networks. Displays communication between the client and IPSec during policy setup and removal processes.
DB-496
December 2010
Syntax Description
aaa
Command Modes
Privileged EXEC
Command History
Modifications This command was introduced. The aaa keyword was added. This command was integrated into Cisco IOS Release 12.2(18)SXD. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug crypto isakmp command for an IKE peer that initiates an IKE negotiation. First, IKE negotiates its own security association (SA), checking for a matching IKE policy.
Router# debug crypto isakmp 20:26:58: 20:26:58: 20:26:58: 20:26:58: 20:26:58: 20:26:58: 20:26:58: 20:26:58: ISAKMP (8): ISAKMP (8): ISAKMP (8): ISAKMP: ISAKMP: ISAKMP: ISAKMP: ISAKMP (8): beginning Main Mode exchange processing SA payload. message ID = 0 Checking ISAKMP transform 1 against priority 10 policy encryption DES-CBC hash SHA default group 1 auth pre-share atts are acceptable. Next payload is 0
IKE has found a matching policy. Next, the IKE SA is used by each peer to authenticate the other peer.
20:26:58: 20:26:59: 20:26:59: 20:26:59: 20:26:59: 20:26:59: 20:26:59: ISAKMP ISAKMP ISAKMP ISAKMP ISAKMP ISAKMP ISAKMP (8): (8): (8): (8): (8): (8): (8): SA is doing pre-shared key authentication processing KE payload. message ID = 0 processing NONCE payload. message ID = 0 SKEYID state generated processing ID payload. message ID = 0 processing HASH payload. message ID = 0 SA has been authenticated
Next, IKE negotiates to set up the IP Security (IPSec) SA by searching for a matching transform set.
20:26:59: ISAKMP (8): beginning Quick Mode exchange, M-ID of 767162845
DB-497
20:26:59: ISAKMP (8): processing SA payload. message ID = 767162845 20:26:59: ISAKMP (8): Checking IPSec proposal 1 20:26:59: ISAKMP: transform 1, ESP_DES 20:26:59: ISAKMP: attributes in transform: 20:26:59: ISAKMP: encaps is 1 20:26:59: ISAKMP: SA life type in seconds 20:26:59: ISAKMP: SA life duration (basic) of 600 20:26:59: ISAKMP: SA life type in kilobytes 20:26:59: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0 20:26:59: ISAKMP: authenticator is HMAC-MD5 20:26:59: ISAKMP (8): atts are acceptable.
A matching IPSec transform set has been found at the two peers. Now the IPSec SA can be created (one SA is created for each direction).
20:26:59: ISAKMP 20:26:59: ISAKMP 20:26:59: ISAKMP 20:26:59: ISAKMP 20:26:59: 20:26:59: 20:26:59: 20:26:59: 20:26:59: to 155.0.0.2 20:26:59: 20:26:59: 20:26:59: (8): processing NONCE payload. message ID = 767162845 (8): processing ID payload. message ID = 767162845 (8): processing ID payload. message ID = 767162845 (8): Creating IPSec SAs inbound SA from 155.0.0.2 to 155.0.0.1 (proxy 155.0.0.2 to 155.0.0.1 ) has spi 454886490 and conn_id 9 and flags 4 lifetime of 600 seconds lifetime of 4608000 kilobytes outbound SA from 155.0.0.1 to 155.0.0.2 (proxy 155.0.0.1 ) has spi 75506225 and conn_id 10 and flags 4 lifetime of 600 seconds lifetime of 4608000 kilobytes
The following is sample output from the debug crypto isakmp command using the aaa keyword:
Router# debug crypto isakmp aaa Start Example 01:38:55: ISAKMP AAA: Sent Accounting Message 01:38:55: ISAKMP AAA: Accounting message successful 01:38:55: ISAKMP AAA: Rx Accounting Message 01:38:55: ISAKMP AAA: Adding Client Attributes to Accounting Record 01:38:55: ISAKMP AAA: Accounting Started
Update Example 01:09:55: ISAKMP AAA: Accounting received kei with flags 0x1042 01:09:55: ISAKMP AAA: Updating Stats 01:09:55: Previous in acc (PKTS) IN: 10 OUT: 10 01:09:55: Traffic on sa (PKTS) IN: 176 OUT: 176
Related Commands
Description Defines an ISAKMP profile and audits IPSec user sessions. Enters crypto map configuration mode and creates or modifies a crypto map entry, creates a crypto profile that provides a template for configuration of a dynamically created crypto map, or configures a client accounting list.
DB-498
December 2010
Syntax Description
detail
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output for a standby router from the debug crypto isakmp ha command:
Active Router no debug message Standby Router Router# debug crypto isakmp ha Crypto ISAKMP High Availability debugging is on vrf-lite-R1# *Sep 28 21:54:41.815:IKE HA:(4.0.0.3) Adding STANDBY IKE SA *Sep 28 21:54:41.843:IKE HA:Create peer struct for local 4.0.0.3 remote 4.0.0.5 & locked *Sep 28 21:54:41.843:IKE HA:IKE SA inserted on standby with src = 4.0.0.5, dst = 4.0.0.3
The following sample output is displayed when the detail keyword is issued. (Note that debug output without issuing the detail keyword is the same as the debug output with the detail keyword.)
Active Router Router# debug crypto isakmp ha detail Crypto ISAKMP High Availability detailed debugging is on vrf-lite-R1# *Sep 29 16:59:15.035:IKE HA:IKE SA is already failed over Standby Router Router# debug crypto isakmp ha detail Crypto ISAKMP High Availability detailed debugging is on vrf-lite-R2# *Sep 29 16:59:14.371:IKE HA:(4.0.0.3) Adding STANDBY IKE SA
DB-499
*Sep 29 16:59:14.411:IKE HA:Create peer struct for local 4.0.0.3 remote 4.0.0.5 & locked *Sep 29 16:59:14.411:IKE HA:IKE SA inserted on standby with src = 4.0.0.5, dst = 4.0.0.3
Related Commands
Description Displays crypto high availability debugging information. Enables debugging messages for IPSec high availability.
DB-500
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Encryption and authentication are provided by a software service on the router called a crypto engine. The crypto engine performs authentication through DSS public and private keys when a connection is set up. DSS is a means of sending a signature at the end of a message that positively identifies the author of the message. The signature cannot be forged or duplicated by others, so whoever received a message with a DSS signature knows exactly who sent the message. If the process of exchanging DSS public keys with a peer router by means of the config crypto key-exchange command is not successful, try to exchange DSS public keys again after enabling the debug crypto key-exchange command to help you diagnose the problem.
Examples
The following is sample output from the debug crypto key-exchange command. The first shows output from the initiating router in a key exchange. The second shows output from the passive router in a key exchange. The number of bytes received should match the number of bytes sent from the initiating side, although the number of messages can be different.
Router# debug crypto key-exchange CRYPTO-KE: CRYPTO-KE: CRYPTO-KE: CRYPTO-KE: CRYPTO-KE: Sent Sent Sent Sent Sent 4 bytes. 2 bytes. 2 bytes. 2 bytes. 64 bytes.
Router# debug crypto key-exchange CRYPTO-KE: CRYPTO-KE: CRYPTO-KE: CRYPTO-KE: CRYPTO-KE: CRYPTO-KE: Received Received Received Received Received Received 4 bytes. 2 bytes. 2 bytes. 2 bytes. 49 bytes. 15 bytes.
Related Commands
Description Displays connection setup messages and their flow through the router.
DB-501
Syntax Description
detail
(Optional) Displays different events as they occur in the IPsec MIB subsystem.
Note
Because the output for this keyword can be quite long, due consideration should be given to enabling debug crypto mib detail.
error
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(4)T. The detail and error keywords were added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows IPsec MIB debug message notification being enabled:
Router# debug crypto mib Crypto IPSec Mgmt Entity debugging is on
The following example shows that detailed information about events that are occurring in the subsystem has been requested:
Router# debug crypto mib detail
The following example shows that information has been requested about error events in the MIB agent:
Router# debug crypto mib error
DB-502
December 2010
Related Commands
Command show crypto mib ipsec flowmib history failure size show crypto mib ipsec flowmib history tunnel size show crypto mib ipsec flowmib version
Description Displays the size of the IPSec failure history table. Displays the size of the IPSec tunnel history table. Displays the IPSec Flow MIB version used by the router.
DB-503
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug crypto pki messages command displays messages about the actual data being sent and received during public key infrastructure (PKI) transactions. This command is internal for use by Cisco support personnel. You can use the show crypto ca certificates command to display information about your certificate.
Examples
The following is sample output from the debug crypto pki messages command:
Router# debug crypto pki messages Fingerprint: 2CFC6265 77BA6496 3AEFCB50 29BC2BF2 00:48:23:Write out pkcs#10 content:274 00:48:23:30 82 01 0E 30 81 B9 02 01 00 30 22 31 20 00:48:23:48 86 F7 0D 01 09 02 16 11 70 6B 69 2D 33 00:48:23:63 6F 2E 63 6F 6D 30 5C 30 0D 06 09 2A 86 00:48:23:01 05 00 03 4B 00 30 48 02 41 00 DD 2C C6 00:48:23:11 E2 81 95 01 6A 80 34 25 10 C4 5F 3D 8B 00:48:23:6C 2D 65 4C B6 A6 B0 02 1C B2 84 C1 C8 AC 00:48:23:30 98 CB 36 A2 47 4E 7E 6F C9 3E B8 26 BE 00:48:23:A0 32 30 10 06 09 2A 86 48 86 F7 0D 01 09 00:48:23:30 1E 06 09 2A 86 48 86 F7 0D 01 09 0E 31 00:48:23:0B 06 03 55 1D 0F 04 04 03 02 05 A0 30 0D 00:48:23:F7 0D 01 01 04 05 00 03 41 00 2C FD 88 2C 00:48:23:5C FD AE 52 8F 2C 13 95 9E 9D 8B A4 C9 48
30 36 48 35 33 A4 15 07 11 06 8A 32
1E 61 86 A5 1C 28 02 31 14 09 13 84
06 2E F7 3F 19 6E 03 03 0F 2A B6 BF
09 63 0D 0F 50 EF 01 13 30 86 81 05
2A 69 01 97 FD 9D 00 01 0D 48 88 03
86 73 01 6C 91 3B 01 63 30 86 EA 49
DB-504
December 2010
00:48:23:63 27 A3 AC 6D 74 EB 69 E3 06 E9 E4 9F 0A A8 FB 20 F0 02 03 00:48:23:BE 90 57 02 F2 75 8E 0F 16 60 10 6F BE 2B 00:48:23:Enveloped Data ... 00:48:23:30 80 06 09 2A 86 48 86 F7 0D 01 00:48:23:31 80 30 82 01 0F 02 01 00 30 78 00:48:23:04 06 13 02 55 53 31 0B 30 09 06 00:48:23:13 30 11 06 03 55 04 07 13 0A 53 00:48:23:31 15 30 13 06 03 55 04 0A 13 0C 00:48:23:74 65 6D 31 0E 30 0C 06 03 55 04 00:48:23:Signed Data 1382 bytes 00:48:23:30 80 06 09 2A 86 48 86 F7 0D 01 00:48:23:31 0E 30 0C 06 08 2A 86 48 86 F7 00:48:23:2A 86 48 86 F7 0D 01 07 01 A0 80 00:48:23:02 55 53 31 0B 30 09 06 03 55 04 00:48:23:33 34 5A 17 0D 31 30 31 31 31 35 00:48:23:31 20 30 1E 06 09 2A 86 48 86 F7 00:48:23:2D 33 36 61 2E 63 69 73 63 6F 2E 00:48:23:2A 86 48 86 F7 0D 01 01 01 05 00 00:48:23:2C C6 35 A5 3F 0F 97 6C 11 E2 81 00:48:23:3D 8B 33 1C 19 50 FD 91 6C 2D 65 00:48:23:86 F7 0D 01 01 01 05 00 04 40 C6 00:48:23:15 F7 3E 15 6D 71 E1 D0 13 2B 14 00:48:23:EF C2 D6 CB 91 39 19 F8 44 68 0E 00:48:23:3F EC C6 04 A5 D9 7C B1 56 47 3F 00:48:23:00 00 00:48:24:Received pki message:1778 types . . . 07 30 03 61 43 0B 07 0D 24 08 31 0D 63 03 95 4C 24 64 C5 5B 03 6A 55 6E 69 13 02 02 80 13 38 01 6F 4B 01 B6 36 1B B5 D4 A0 31 04 74 73 05 A0 05 04 02 35 09 6D 00 6A A6 D6 0C 84 93 80 0B 08 61 63 49 80 05 82 43 34 02 30 30 80 B0 D5 0F 18 00 30 30 13 20 6F 50 30 00 02 41 33 16 5C 48 34 02 A6 96 8B 00 80 09 02 43 20 49 80 30 75 31 34 11 30 02 25 1C 92 BF 2D 00 02 06 43 72 53 53 02 80 30 13 5A 70 0D 41 10 B2 80 F9 A4 00 01 03 41 75 79 55 01 06 80 30 30 6B 06 00 C4 84 5D 2E B1 00 00 55 31 7A 73 31 01 09 06 11 22 69 09 DD 5F C1 E5 05 CD 00
Related Commands
Command crypto ca enroll debug crypto pki transactions show crypto ca certificates
Description Obtains the certificate of your router from the CA. Displays debugging messages for the trace of interaction (message type) between the CA and the router. Displays information about your certificate, the certificate of the CA, and any RA certificates.
DB-505
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to enable debugging for a certificate server. This example also contains sample debug messages, which allow users to troubleshoot the various certificate-request-related stages and tasks that are handled by the certificate server.
Router# debug crypto pki server Crypto PKI Certificate Server debugging is on Oct 15 19:50:41.003:CRYPTO_CS:old RA cert flag 0x4 Oct 15 19:50:41.003:CRYPTO_CS:new RA cert flag 0x1000C Oct 15 19:50:41.003:CRYPTO_CS:nvram filesystem Oct 15 19:50:41.279:CRYPTO_CS:serial number 0x1 written. Oct 15 19:50:53.383:CRYPTO_CS:created a new serial file. Oct 15 19:50:53.383:CRYPTO_CS:SCEP server started Oct 15 19:50:53.419:%SYS-5-CONFIG_I:Configured from console by console Oct 15 19:50:53.731:CRYPTO_CS:received a SCEP GetCACert request Oct 15 19:50:53.739:CRYPTO_CS:CA certificate sent Oct 15 19:50:54.355:CRYPTO_CS:received a SCEP GetCACert request Oct 15 19:50:54.363:CRYPTO_CS:CA certificate sent Oct 15 19:50:57.791:CRYPTO_CS:received a SCEP request Oct 15 19:50:57.795:CRYPTO_CS:read SCEP:registered and bound service SCEP_READ_DB_8 Oct 15 19:50:57.947:CRYPTO_CS:scep msg type - 19 Oct 15 19:50:57.947:CRYPTO_CS:trans id 3673CE2FF0235A4AE6F26242B00A4BB4 Oct 15 19:50:58.679:CRYPTO_CS:read SCEP:unregistered and unbound service SCEP_READ_DB_8 Oct 15 19:50:58.683:CRYPTO_CS:received an enrollment request Oct 15 19:50:58.691:CRYPTO_CS:request has been authorized, transaction id=3673CE2FF0235A4AE6F26242B00A4BB4 Oct 15 19:50:58.699:CRYPTO_CS:byte 2 in key usage in PKCS#10 is 0x7
DB-506
December 2010
Oct 15 19:50:58.699:CRYPTO_CS:signature Oct 15 19:50:58.699:CRYPTO_CS:key_usage is 1 Oct 15 19:50:58.703:CRYPTO_CS:enrollment request with pendingID 1 sent to the CA Oct 15 19:50:58.707:CRYPTO_CS:write SCEP:registered and bound service SCEP_WRTE_DB_8 Oct 15 19:50:59.531:CRYPTO_CS:write SCEP:unregistered and unbound service SCEP_WRTE_DB_8 ..... Oct 15 19:53:08.403:CRYPTO_CS:CS_RA_REQUEST:save cert in dbase, pending id = 2 Oct 15 19:53:08.403:CRYPTO_CS:enrollment request 2 granted Oct 15 19:53:08.403:CRYPTO_PKI:All enrollment requests completed for trustpoint ra. Oct 15 19:53:08.403:%CRYPTO-6-CERTRET:Certificate received from Certificate Authority Oct 15 19:53:08.403:CRYPTO_PKI:All enrollment requests completed for trustpoint ra. Oct 15 19:53:08.403:CRYPTO_PKI:All enrollment requests completed for trustpoint ra. Oct 15 19:53:08.407:CRYPTO_PKI:All enrollment requests completed for trustpoint ra. Oct 15 19:53:19.623:IPSEC(key_engine):major = 1 Oct 15 19:53:19.623:IPSEC(key_engine):expired_timer:skip ... Oct 15 19:53:35.707:CRYPTO_CS:received a SCEP request Oct 15 19:53:35.711:CRYPTO_CS:read SCEP:registered and bound service SCEP_READ_DB_14 Oct 15 19:53:35.859:CRYPTO_CS:scep msg type - 20 Oct 15 19:53:35.859:CRYPTO_CS:trans id 4D774FFE2F7CA9991A7F6A785E803E77 Oct 15 19:53:36.591:CRYPTO_CS:read SCEP:unregistered and unbound service SCEP_READ_DB_14 Oct 15 19:53:36.595:CRYPTO_CS:received an enrollment request Oct 15 19:53:36.595:CRYPTO_CS:write SCEP:registered and bound service SCEP_WRTE_DB_14 Oct 15 19:53:37.623:CRYPTO_CS:write SCEP:unregistered and unbound service SCEP_WRTE_DB_14 Oct 15 19:53:37.631:CRYPTO_CS:Certificate sent to requestor
Related Commands
Description Enables a Cisco IOS certificate server and enters certificate server configuration mode.
DB-507
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug crypto pki transactions command to display debugging messages pertaining to public key infrastructure (PKI) certificates. The messages will show status information during certificate enrollment and verification. You can also use the show crypto ca certificates command to display information about your certificate.
Examples
The following example, which authenticates and enrolls a CA, contains sample output for the debug crypto pki transactions command:
Router(config)# crypto ca authenticate msca Certificate has the following attributes: Fingerprint:A5DE3C51 AD8B0207 B60BED6D 9356FB00 % Do you accept this certificate? [yes/no]:y Router# debug crypto pki transactions 00:44:00:CRYPTO_PKI:Sending CA Certificate Request: GET /certsrv/mscep/mscep.dll/pkiclient.exe?operation=GetCACert&message=msca HTTP/1.0 00:44:00:CRYPTO_PKI:http connection opened 00:44:01:CRYPTO_PKI:HTTP response header: HTTP/1.1 200 OK
DB-508
December 2010
Server:Microsoft-IIS/5.0 Date:Fri, 17 Nov 2000 18:50:59 GMT Content-Length:2693 Content-Type:application/x-x509-ca-ra-cert Content-Type indicates we have received CA and RA certificates. 00:44:01:CRYPTO_PKI:WARNING:A certificate chain could not be constructed while selecting certificate status 00:44:01:CRYPTO_PKI:WARNING:A certificate chain could not be constructed while selecting certificate status 00:44:01:CRYPTO_PKI:Name:CN = msca-rootRA, O = Cisco System, C = US 00:44:01:CRYPTO_PKI:Name:CN = msca-rootRA, O = Cisco System, C = US 00:44:01:CRYPTO_PKI:transaction GetCACert completed 00:44:01:CRYPTO_PKI:CA certificate received. 00:44:01:CRYPTO_PKI:CA certificate received. Router(config)# crypto ca enroll msca % % Start certificate enrollment .. % Create a challenge password. You will need to verbally provide this password to the CA Administrator in order to revoke your certificate. For security reasons your password will not be saved in the configuration. Please make a note of it. Password: Re-enter password: % The subject name in the certificate will be:Router.cisco.com % Include the router serial number in the subject name? [yes/no]:n % Include an IP address in the subject name? [yes/no]:n Request certificate from CA? [yes/no]:y % Certificate request sent to Certificate Authority % The certificate request fingerprint will be displayed. % The 'show crypto ca certificate' command will also show the fingerprint. Router(config)# 00:44:29:CRYPTO_PKI:transaction PKCSReq completed 00:44:29:CRYPTO_PKI:status: 00:44:29:CRYPTO_PKI:http connection opened 00:44:29:CRYPTO_PKI: received msg of 1924 bytes 00:44:29:CRYPTO_PKI:HTTP response header: HTTP/1.1 200 OK Server:Microsoft-IIS/5.0 Date:Fri, 17 Nov 2000 18:51:28 GMT Content-Length:1778 Content-Type:application/x-pki-message 00:44:29:CRYPTO_PKI:signed attr:pki-message-type: 00:44:29:13 01 33 00:44:29:CRYPTO_PKI:signed attr:pki-status: 00:44:29:13 01 30 00:44:29:CRYPTO_PKI:signed attr:pki-recipient-nonce: 00:44:29:04 10 B4 C8 2A 12 9C 8A 2A 4A E1 E5 15 DE 22 C2 B4 FD 00:44:29:CRYPTO_PKI:signed attr:pki-transaction-id: 00:44:29:13 20 34 45 45 41 44 42 36 33 38 43 33 42 42 45 44 45 39 46 00:44:29:34 38 44 33 45 36 39 33 45 33 43 37 45 39 00:44:29:CRYPTO_PKI:status = 100:certificate is granted 00:44:29:CRYPTO__PKI:All enrollment requests completed. 00:44:29:%CRYPTO-6-CERTRET:Certificate received from Certificate Authority
DB-509
Related Commands
Command crypto ca authenticate crypto ca enroll debug crypto pki messages show crypto ca certificates
Description Authenticates the CA (by getting the certificate of the CA). Obtains the certificate of your router from the CA. Displays debugging messages for details of the interaction (message dump) between the CA and the router. Displays information about your certificate, the certificate of the CA, and any RA certificates.
DB-510
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command replaced the debug crypto wui command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
For more detailed information about authentication, authorization, and accounting (AAA), use the debug aaa authorization command.
Examples
The following is sample output from the debug crypto provisioning command. The output includes explanations of the process.
Router# debug crypto provisioning Petitioner device ! The user starts the Welcome phase. Nov 7 03:15:48.171: CRYPTO_WUI_TTI: received welcome get request. ! The router generates a Rivest, Shamir, and Adelman (RSA) keypair for future enrollment. Nov 7 03:15:48.279: CRYPTO_WUI_TTI: keyhash 'A506BE3B83C6F4B4A6EFCEB3D584AACA' ! The TTI transaction is completed. Nov 7 03:16:10.607: CRYPTO_WUI_TTI: received completion post request. Registrar device !. During the introduction phase, the browser prompts for login information. 06:39:18: CRYPTO_WUI_TTI: received introduction post request. 06:39:18: CRYPTO_WUI_TTI: checking AAA authentication (ipsecca_script_aaalist, ttiuser) ! This happens if the user types in the wrong username or password. 06:39:19: CRYPTO_WUI_TTI: authentication declined by AAA, or AAA server not found - 0x3 06:39:19: CRYPTO_WUI_TTI: aaa query fails!
DB-511
! The user re-enters login information. 06:39:19: CRYPTO_WUI_TTI: received introduction post request. 06:39:19: CRYPTO_WUI_TTI: checking AAA authentication (ipsecca_script_aaalist, ttiuser) 06:39:20: CRYPTO_WUI_TTI: checking AAA authorization (ipsecca_script_aaalist, ttiuser) ! The login attempt succeeds and authorization information is retrieved from the AAA database. 06:39:21: CRYPTO_WUI_TTI: aaa query ok! ! These attributes are inserted into the configuration template. 06:39:21: CRYPTO_WUI_TTI: building TTI av pairs from AAA attributes 06:39:21: CRYPTO_WUI_TTI: "subjectname" = "CN=user, O=company, C=country" 06:39:21: CRYPTO_WUI_TTI: "$1" = "ntp server 192.0.2.1" 06:39:21: CRYPTO_WUI_TTI: "$2" = "hostname user-vpn" ! The registrar stores this subject name and overrides the subject name in the subsequent enrollment request. 06:39:21: CRYPTO_WUI_TTI: subjectname=CN=user, O=company, C=country ! The registrar stores this key information so that it may be used to automatically grant the subsequent enrollment request. 06:39:21: CRYPTO_WUI_TTI: key_hash=A506BE3B83C6F4B4A6EFCEB3D584AACA
Related Commands
Description Authenticates the introducer in an SDP operation. Specifies the appropriate authorized fields for the certificate subject name and list of template variables to be expanded into the Cisco IOS CLI snippet that is sent back to the petitioner in an SDP operation. Displays information on AAA TACACS+ authorization. Specifies a remote URL for a Cisco IOS CLI configuration template. Establishes a template username and password to access the configuration template on the file system.
DB-512
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Encryption and authentication are provided by a software service on the router called a crypto engine. The crypto engine performs authentication through Digital Signature Standard (DSS) public and private keys when a connection is set up. DSS is a means of sending a signature at the end of a message that positively identifies the author of the message. The signature cannot be forged or duplicated by others, so whoever receives a message with a DSS signature knows exactly who sent the message. When connections are not completing, use the debug crypto sesmgmt command to follow the progress of connection messages as a first step in diagnosing the problem. You see a record of each connection message as the router discovers it, and can track its progress through the necessary signing, verifying, and encryption session setup operations. Other significant connection setup events, such as the pregeneration of Diffie-Hellman public numbers, are also shown. For information on Diffie-Hellman public numbers, refer to the Cisco IOS Security Configuration Guide. Also use the show crypto connections command to display additional information on connections.
Examples
The following is sample output from the debug crypto sesmgmt command. The first shows messages from a router that initiates a successful connection. The second shows messages from a router that receives a connection.
Router# debug crypto sesmgmt CRYPTO: Dequeued a message: Inititate_Connection CRYPTO: DH gen phase 1 status for conn_id 2 slot 0:OK CRYPTO: Signing done. Status:OK CRYPTO: ICMP message sent: s=172.21.114.163, d=172.21.114.162 CRYPTO-SDU: send_nnc_req: NNC Echo Request sent CRYPTO: Dequeued a message: CRM CRYPTO: DH gen phase 2 status for conn_id 2 slot 0:OK CRYPTO: Verify done. Status=OK CRYPTO: Signing done. Status:OK CRYPTO: ICMP message sent: s=172.21.114.163, d=172.21.114.162 CRYPTO-SDU: recv_nnc_rpy: NNC Echo Confirm sent CRYPTO: Create encryption key for conn_id 2 slot 0:OK CRYPTO: Replacing -2 in crypto maps with 2 (slot 0) Router# debug crypto sesmgmt CRYPTO: Dequeued a message: CIM CRYPTO: Verify done. Status=OK
DB-513
CRYPTO: DH gen phase 1 status for conn_id 1 slot 0:OK CRYPTO: DH gen phase 2 status for conn_id 1 slot 0:OK CRYPTO: Signing done. Status:OK CRYPTO: ICMP message sent: s=172.21.114.162, d=172.21.114.163 CRYPTO-SDU: act_on_nnc_req: NNC Echo Reply sent CRYPTO: Create encryption key for conn_id 1 slot 0:OK CRYPTO: Replacing -2 in crypto maps with 1 (slot 0) CRYPTO: Dequeued a message: CCM CRYPTO: Verify done. Status=OK
Related Commands
DB-514
December 2010
Syntax Description
(Optional) Identifies the location of a particular digital signal processor (DSP) channel.
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug csm neat command turns on debugging for all CSM VoIP calls. If no arguments are specified, debugging is enabled for all voice calls.
Note
The debug csm neat command does not display any information if you try to debug ISDN voice calls. To view debugging information about ISDN calls, use the debug cdapi command. The no debug cms neat command turns off debugging information for all voice calls. If the slot, dspm, dsp, or dsp-channel arguments are specified (if the specified DSP channel is engaged in a CSM call), CSM call-related debugging information is turned on for this channel. The no form of this command turns off debugging for that particular channel.
Examples
The following examples show sample output from the debug csm neat command. The following shows that CSM has received an event from ISDN.
Router# debug csm neat March 18 04:05:07.052: EVENT_FROM_ISDN::dchan_idb=0x60D7B6B8, call_id=0xCF, ces=0x1 bchan=0x0, event=0x1, cause=0x0
DB-515
Description Indicates the address of the hardware interface description block (IDB) for the D channel. Indicates the call ID assigned by ISDN. Indicates the call ID assigned by ISDN Indicates the number of the B channel assigned for this call Indicates the ISDN event cause
The following example shows that CSM has allocated the CSM voice control block for the DSP device on slot 1 port 10 for this call.
March 18 04:05:07.052: VDEV_ALLOCATE: slot 1 and port 10 is allocated.
In this example, CSM must first allocate the CSM voice control block to initiate the state machine. After the voice control block has been allocated, CSM obtains from the DSP Resource Manager the actual DSP channel that will be used for the call. At that point, CSM will switch to the actual logical port number. The slot number in this example refers to the physical slot on the Cisco AS5400 access server. The port number is the logical DSP number interpreted as listed in Table 67.
Table 67 Logical DSP Numbers
Logical Port 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Physical DSP Channel DSPRM 1 DSPRM 1 DSPRM 1 DSPRM 1 DSPRM 1 DSPRM 1 DSPRM 1 DSPRM 1 DSPRM 1 DSPRM 1 DSPRM 1 DSPRM 1 DSPRM 2 DSPRM 2 DSPRM 2 DSPRM 2 DSPRM 2 DSPRM 2 DSP 1 DSP 1 DSP 2 DSP 2 DSP 3 DSP 3 DSP 4 DSP 4 DSP 5 DSP 5 DSP 6 DSP 6 DSP 1 DSP 1 DSP 2 DSP 2 DSP 3 DSP 3 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2
DB-516
December 2010
Table 67
Logical Port 18 19 20 21 22 23 48 49 50 51 52 53 54 55 56 57 58 59
Physical DSP Channel DSPRM 2 DSPRM 2 DSPRM 2 DSPRM 2 DSPRM 2 DSPRM 2 DSPRM 5 DSPRM 5 DSPRM 5 DSPRM 5 DSPRM 5 DSPRM 5 DSPRM 5 DSPRM 5 DSPRM 5 DSPRM 5 DSPRM 5 DSPRM 5 DSP 4 DSP 4 DSP 5 DSP 5 DSP 6 DSP 6 DSP 1 DSP 1 DSP 2 DSP 2 DSP 3 DSP 3 DSP 4 DSP 4 DSP 5 DSP 5 DSP 6 DSP 6 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2 DSP channel 1 DSP channel 2
The following example shows that the function csm_vtsp_init_tdm() has been called with a voice control block of address 0x60B8562C. This function will be called only when the call is treated as a voice call.
March 18 04:05:07.052: csm_vtsp_init_tdm (voice_vdev=0x60B8562C)
The following example shows that CSM has obtained a DSP channel from the DSP Resource Manager:
March 18 04:05:07.052: csm_vtsp_init_tdm: dsprm_tdm_allocate: tdm slot 1, dspm 2, dsp 5, dsp_channel 1csm_vtsp_init_tdm: dsprm_tdm_allocate: tdm stream 5, channel 9, bank 0, bp_channel 10
Table 68 describes the significant fields shown in the DSP channel initialized TDM display.
Table 68 debug csm neat TDM Channel Field Descriptions
Field TDM slot 1, dspm 2, dsp 5, dsp_channel 1 TDM stream 5, channel 9, bank 0, bp_channel 10
Description Indicates the physical DSP channel that will be used for this call. Indicates the on-chip and backplane TDM channel assigned to this DSP channel. Stream 5, channel 9 gives the on-chip TDM channel mapped to the DSP; bank 0, bp_channel 10 means that the backplane stream 0 and backplane channel #1 are assigned to this DSP.
DB-517
The following shows that CSM received an incoming call event from ISDN:
March 18 04:05:07.052: EVENT_FROM_ISDN:(00CF): DEV_INCALL at slot 1 and port 20
Slot 1, port 20 means the logical DSP channel 20 (mapped to DSPRM 2, DSP 5, DSP channel 1). The following shows that the DEV_INCALL message been translated into a CSM_EVENT_ISDN_CALL message:
March 18 04:05:07.052: CSM_PROC_IDLE: CSM_EVENT_ISDN_CALL at slot 1, port 20
This message is passed to the CSM central state machine while it is in the CSM_IDLE state and is in the CSM_PROC_IDLE procedure. The logical DSP channel port 20 on slot 1 is used to handle this call. The following shows that CSM has invoked the vtsp_ic_notify() function with a CSM voice call control block 0x60B8562C.
March 18 04:05:07.052: vtsp_ic_notify : (voice_vdev= 0x60B8562C)
Inside this function, CSM will send a SETUP INDICATION message to the VTSP. This function will be invoked only if the call is a voice call. The following shows that CSM received a SETUP INDICATION RESPONSE message from the VTSP as an acknowledgment.
March 18 04:05:07.056: csm_vtsp_call_setup_resp (vdev_info=0x60B8562C, vtsp_cdb=0x60FCA114)
This means that the VTSP received the CALL SETUP INDICATION message previously sent and has proceeded to process the call.
vdev_infoContains the address of the CSM voice data block. vtsp_cdbContains the address of the VTSP call control block.
The following shows that CSM received a CALL CONNECT message from the VTSP:
March 18 04:05:07.596: csm_vtsp_call_connect (vtsp_cdb=0x60FCA114, voice_vdev=0x60B8562C)
This indicates that the VTSP received a CONNECT message for the call leg initiated to the Internet side.
vtsp_cdbContains the address of the VTSP call control block. voice_vdevContains the address of the CSM voice data block.
The following shows that while CSM is in the CSM_IC2_RING state, it receives a SETUP INDICATION RESPONSE from the VTSP. This message is translated into CSM_EVENT_MODEM_OFFHOOK and passed to the CSM central state machine.
March 18 04:05:07.596: CSM_PROC_IC2_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 20
The following shows that CSM received a CONNECT message from ISDN for the call using the logical DSP channel on slot 1 and port 20:
March 18 04:05:07.616: EVENT_FROM_ISDN:(00CF): DEV_CONNECTED at slot 1 and port 20
The following shows that CSM translated the CONNECT event from ISDN into the CSM_EVENT_ISDN_CONNECTED message, which is then passed to the CSM central state machine:
March 18 04:05:07.616: CSM_PROC_IC4_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1, port 20
The following shows that CSM received a CALL SETUP REQUEST from the VTSP:
May 16 12:22:27.580: csm_vtsp_call_setup_request (vtsp_cdb=0x60FCFA20, vtsp_sdb=0x60DFB608)
DB-518
December 2010
vtsp_cdbContains the address of the VTSP call control block. vtsp_sdbContains the address of the signalling data block for the signalling interface to be used to send the outgoing call.
The following shows that the physical DSP channel has been allocated for this outgoing call:
May 16 12:22:27.580: csm_vtsp_call_setup_request: tdm slot 1, dspm 5, dsp 4, dsp_channel 1
The following shows the on-chip and backplane TDM channel assigned to this DSP channel:
May 16 12:22:27.580: csm_vtsp_call_setup_request: tdm stream 5, channel 25, bank 0, bp_channel 27
In this sample output, tdm stream 5, channel 25, bank 0, bp_channel 27 indicates the on-chip and backplane TDM channel assigned to this DSP channel. Stream 5, channel 25 gives the on-chip TDM channel mapped to the DSP; bank 0, bp_channel 27 means that the backplane stream 0 and backplane channel 1 are assigned to this DSP. The following shows the calling number and the called number for this call.
May 16 12:22:27.580: csm_vtsp_call_setup_request: calling number: 10001, called number: 30001
The following shows that the CALL SETUP REQUEST from the VTSP has been translated into the ' CSM_EVENT_MODEM_OFFHOOK message and is passed to the CSM central state machine:
May 16 12:22:27.580: CSM_PROC_IDLE: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 54
The logical DSP channel number for the DSP (slot 1, port 54) is now displayed, which maps to the physical DSP channel slot 1, dspm 5, dsp 4, dsp_channel 1. The following shows that CSM collected all the digits for dialing out:
May 16 12:22:27.580: CSM_PROC_OC3_COLLECT_ALL_DIGIT: CSM_EVENT_GET_ALL_DIGITS at slot 1, port 54
For PRI and for applications that do not require digit collection of outdialing digits (for example, voice calls), the intermediate digit collection states are omitted and the CSM state machine moves to this state directly, pretending that the digit collection has been done. The following shows an information message:
March 16 12:22:27.580: CSM_PROC_OC3_COLLECT_ALL_DIGIT: called party num: (30001) at slot 1, port 54
The following shows that CSM attempts to find a free signalling D channel to direct the outgoing call:
March 16 12:22:27.580: March 16 12:22:27.580: dchan_idb=0x60E8ACF0) March 16 12:22:27.580: March 16 12:22:27.580: dchan_idb=0x60D7ACB0) csm_vtsp_check_dchan (voice_vdev=0x60B8562C) csm_vtsp_check_dchan (vtsp requested dchan=0x60D7ACB0, csm_vtsp_check_dchan (voice_vdev=0x60B8562C) csm_vtsp_check_dchan (vtsp requested dchan=0x60D7ACB0,
In the case of voice calls, the free signaling D channel must match the voice interface specified inside the signalling data block (vtsp_sdb) passed from the VTSP. The following shows that CSM has received an event from ISDN:
March 16 12:22:27.624: EVENT_FROM_ISDN::dchan_idb=0x60D7ACB0, call_id=0xA121, ces=0x1 bchan=0x1E, event=0x3, cause=0x0
DB-519
dchan_idbIndicates the address of the hardware IDB for the D channel call_idIndicates the call id assigned by ISDN bchanIndicates the number of the B channel assigned for this call causeIndicates the ISDN event cause
The following shows that CSM has received a CALL PROCEEDING message from ISDN.
March 16 12:22:27.624: EVENT_FROM_ISDN:(A121): DEV_CALL_PROC at slot 1 and port 54
The following shows that the CALL PROCEEDING event received from ISDN has been interpreted as a CSM_EVENT_ISDN_BCHAN_ASSIGNED message:
March 16 12:22:27.624: CSM_PROC_OC4_DIALING: CSM_EVENT_ISDN_BCHAN_ASSIGNED at slot 1, port 54
ISDN has assigned a B channel for this outgoing call. This B channel must be on the same PRI span as the signalling D channel allocated previously. The following shows that the csm_vtsp_setup_for_oc function is called:
March 16 12:22:27.624: csm_vtsp_setup_for_oc (voice_vdev=0x60B8562C)
This is invoked when an outgoing call initiated by the VTSP receives a response from the ISDN stack. The following shows that ISDN has sent a CONNECT message to CSM indicating that the call leg to the PSTN side has been established:
March 16 12:22:28.084: EVENT_FROM_ISDN::dchan_idb=0x60D7ACB0, call_id=0xA121, ces=0x1 bchan=0x1E, event=0x4, cause=0x0 March 16 12:22:28.084: EVENT_FROM_ISDN:(A121): DEV_CONNECTED at slot 1 and port 54
The following shows that while CSM is in the OC5_WAIT_FOR_CARRIER state, it has received the 'CONNECT' message from ISDN and has translated it into the CSM_EVENT_ISDN_CONNECTED message, which is passed to the CSM central state machine:
March 16 12:22:28.084: CSM_PROC_OC5_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1, port 54
The following shows that the function vtsp_confirm_oc() has been called:
March 16 12:22:28.084: vtsp_confirm_oc : (voice_vdev= 0x60B8562C)
This is invoked after CSM received the CONNECT message from ISDN. CSM sends a confirmation of the CONNECT to the VTSP.
DB-520
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Disable console logging and use buffered logging before using the debug csm tgrm command. Using the debug csm tgrm command generates a large volume of debugs, which can affect router performance.
Examples
The following is sample output from the debug csm tgrm command. The output shows that the call type is voice, the direction is incoming, and the call is accepted by the CSM.
Router# debug csm tgrm
Router# 00:02:25:CSM-TGRM:csm_rx_cas_event_from_neat(EVENT_DIAL_IN) - c(T1 7/1:1:3) call_type=VOICE, dir=INCOMING Router# 00:02:30:CSM-TGRM:csm_proc_ic3_wait_for_res_resp() c(T1 7/1:1:3) VOICE <ACCEPTED !!>
DB-521
Description Type of call: VOICE or MODEM. Direction of the call: INCOMING or OUTGOING.
DB-522
December 2010
Syntax Description
(Optional) Identifies the location of a particular digital signal processor (DSP) channel.
Command Modes
Privileged EXEC
Usage Guidelines
The debug csm voice command turns on debugging for all CSM VoIP calls. If this command has no keyword specified, then debugging is enabled for all voice calls.
Note
The debug csm voice command does not display any information if you try to debug isdn voice calls. To view debugging information about isdn calls, use the debug cdapi command.
The no debug cms voice command turns off debugging information for all voice calls. If the slot | dspm | dsp | dsp-channel argument is specified, then (if the specified DSP channel is engaged in a CSM call) CSM call-related debugging information will be turned on for this channel. The no form of this command turns off debugging for that particular channel.
Examples
The following examples show sample output from the debug csm voice command. The following shows that CSM has received an event from ISDN.
Router# debug csm voice Oct 18 04:05:07.052: EVENT_FROM_ISDN::dchan_idb=0x60D7B6B8, call_id=0xCF, ces=0x1 bchan=0x0, event=0x1, cause=0x0
dchan_idbIndicates the address of the hardware interface description block (IDB) for the D channel call_idIndicates the call ID assigned by ISDN bchanIndicates the number of the B channel assigned for this call causeIndicates the ISDN event cause
The following shows that CSM has allocated the CSM voice control block for the DSP device on slot 1 port 10 for this call.
Oct 18 04:05:07.052: VDEV_ALLOCATE: slot 1 and port 10 is allocated.
DB-523
This AS5300 access server might not be actually used to handle this call. CSM must first allocate the CSM voice control block to initiate the state machine. After the voice control block has been allocated, CSM obtains from the DSP Resource Manager the actual DSP channel that will be used for the call. At that point, CSM will switch to the actual logical port number. The slot number refers to the physical slot on the AS5300 access server. The port number is the logical DSP number interpreted as listed in Table 70.
Table 70 Logical DSP Numbers
Logical Port Number Port 0 Port 1 Port 2 Port 3 Port 4 Port 5 Port 6 Port 7 Port 8 Port 9 Port 10 Port 11 Port 12 Port 13 Port 14 Port 15 Port 16 Port 17 Port 18 Port 19 Port 20 Port 21 Port 22 Port 23 Port 48 Port 49 Port 50 Port 51 Port 52 Port 53 Port 54
Physical DSP Channel DSPRM 1, DSP 1, DSP channel 1 DSPRM 1, DSP 1, DSP channel 2 DSPRM 1, DSP 2, DSP channel 1 DSPRM 1, DSP 2, DSP channel 2 DSPRM 1, DSP 3, DSP channel 1 DSPRM 1, DSP 3, DSP channel 2 DSPRM 1, DSP 4, DSP channel 1 DSPRM 1, DSP 4, DSP channel 2 DSPRM 1, DSP 5, DSP channel 1 DSPRM 1, DSP 5, DSP channel 2 DSPRM 1, DSP 6, DSP channel 1 DSPRM 1, DSP 6, DSP channel 2 DSPRM 2, DSP 1, DSP channel 1 DSPRM 2, DSP 1, DSP channel 2 DSPRM 2, DSP 2, DSP channel 1 DSPRM 2, DSP 2, DSP channel 2 DSPRM 2, DSP 3, DSP channel 1 DSPRM 2, DSP 3, DSP channel 2 DSPRM 2, DSP 4, DSP channel 1 DSPRM 2, DSP 4, DSP channel 2 DSPRM 2, DSP 5, DSP channel 1 DSPRM 2, DSP 5, DSP channel 2 DSPRM 2, DSP 6, DSP channel 1 DSPRM 2, DSP 6, DSP channel 2 DSPRM 5, DSP 1, DSP channel 1 DSPRM 5, DSP 1, DSP channel 2 DSPRM 5, DSP 2, DSP channel 1 DSPRM 5, DSP 2, DSP channel 2 DSPRM 5, DSP 3, DSP channel 1 DSPRM 5, DSP 3, DSP channel 2 DSPRM 5, DSP 4, DSP channel 1
DB-524
December 2010
Table 70
Physical DSP Channel DSPRM 5, DSP 4, DSP channel 2 DSPRM 5, DSP 5, DSP channel 1 DSPRM 5, DSP 5, DSP channel 2 DSPRM 5, DSP 6, DSP channel 1 DSPRM 5, DSP 6, DSP channel 2
The following shows that the function csm_vtsp_init_tdm() has been called with a voice control block of address 0x60B8562C. This function will be called only when the call is treated as a voice call.
Oct 18 04:05:07.052: csm_vtsp_init_tdm (voice_vdev=0x60B8562C)
The following shows that CSM has obtained a DSP channel from the DSP Resource Manager:
Oct 18 04:05:07.052: csm_vtsp_init_tdm: dsprm_tdm_allocate: tdm slot 1, dspm 2, dsp 5, dsp_channel 1csm_vtsp_init_tdm: dsprm_tdm_allocate: tdm stream 5, channel 9, bank 0, bp_channel 10
The DSP channel has the following initialized TDM channel information:
TDM slot 1, dspm 2, dsp 5, dsp_channel 1Indicates the physical DSP channel that will be used for this call. TDM stream 5, channel 9, bank 0, bp_channel 10Indicates the on-chip and backplane TDM channel assigned to this DSP channel. Stream 5, channel 9 gives the on-chip TDM channel mapped to the DSP; bank 0, bp_channel 10 means that the backplane stream 0 and backplane channel #1 are assigned to this DSP.
The following shows that CSM has received an incoming call event from ISDN:
Oct 18 04:05:07.052: EVENT_FROM_ISDN:(00CF): DEV_INCALL at slot 1 and port 20
Slot 1, port 20 means the logical DSP channel 20 (mapped to DSPRM 2, DSP 5, DSP channel 1). The following shows that the DEV_INCALL message has been translated into a CSM_EVENT_ISDN_CALL message:
Oct 18 04:05:07.052: CSM_PROC_IDLE: CSM_EVENT_ISDN_CALL at slot 1, port 20
This message is passed to the CSM central state machine while it is in the CSM_IDLE state and is in the CSM_PROC_IDLE procedure. The logical DSP channel port 20 on slot 1 is used to handle this call. The following shows that CSM has invoked the vtsp_ic_notify() function with a CSM voice call control block 0x60B8562C.
Oct 18 04:05:07.052: vtsp_ic_notify : (voice_vdev= 0x60B8562C)
Inside this function, CSM will send a SETUP INDICATION message to the VTSP. This function will be invoked only if the call is a voice call. The following shows that CSM has received a SETUP INDICATION RESPONSE message from the VTSP as an acknowledgment.
Oct 18 04:05:07.056: csm_vtsp_call_setup_resp (vdev_info=0x60B8562C, vtsp_cdb=0x60FCA114)
DB-525
This means that the VTSP has received the CALL SETUP INDICATION message previously sent and has proceeded to process the call.
vdev_infoContains the address of the CSM voice data block. vtsp_cdbContains the address of the VTSP call control block.
The following shows that CSM has received a CALL CONNECT message from the VTSP:
Oct 18 04:05:07.596: csm_vtsp_call_connect (vtsp_cdb=0x60FCA114, voice_vdev=0x60B8562C)
This indicates that the VTSP has received a CONNECT message for the call leg initiated to the Internet side.
vtsp_cdbContains the address of the VTSP call control block. voice_vdevContains the address of the CSM voice data block.
The following shows that while CSM is in the CSM_IC2_RING state, it receives a SETUP INDICATION RESPONSE from the VTSP. This message is translated into CSM_EVENT_MODEM_OFFHOOK and passed to the CSM central state machine.
Oct 18 04:05:07.596: CSM_PROC_IC2_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 20
The following shows that CSM has received a CONNECT message from ISDN for the call using the logical DSP channel on slot 1 and port 20:
Oct 18 04:05:07.616: EVENT_FROM_ISDN:(00CF): DEV_CONNECTED at slot 1 and port 20
The following shows that CSM has translated the CONNECT event from ISDN into the CSM_EVENT_ISDN_CONNECTED message, which is then passed to the CSM central state machine:
Oct 18 04:05:07.616: CSM_PROC_IC4_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1, port 20
The following shows that CSM has received a CALL SETUP REQUEST from the VTSP:
May 16 12:22:27.580: csm_vtsp_call_setup_request (vtsp_cdb=0x60FCFA20, vtsp_sdb=0x60DFB608)
vtsp_cdbContains the address of the VTSP call control block. vtsp_sdbContains the address of the signalling data block for the signalling interface to be used to send the outgoing call.
The following shows that the physical DSP channel has been allocated for this outgoing call:
May 16 12:22:27.580: csm_vtsp_call_setup_request: tdm slot 1, dspm 5, dsp 4, dsp_channel 1
The following shows the on-chip and backplane TDM channel assigned to this DSP channel:
May 16 12:22:27.580: csm_vtsp_call_setup_request: tdm stream 5, channel 25, bank 0, bp_channel 27
In this sample output, tdm stream 5, channel 25, bank 0, bp_channel 27 indicates the on-chip and backplane TDM channel assigned to this DSP channel. Stream 5, channel 25 gives the on-chip TDM channel mapped to the DSP; bank 0, bp_channel 27 means that the backplane stream 0 and backplane channel 1 are assigned to this DSP. The following shows the calling number and the called number for this call.
May 16 12:22:27.580: csm_vtsp_call_setup_request: calling number: 10001, called number: 30001
DB-526
December 2010
The following shows that the CALL SETUP REQUEST from the VTSP has been translated into the ' CSM_EVENT_MODEM_OFFHOOK message and is passed to the CSM central state machine:
May 16 12:22:27.580: CSM_PROC_IDLE: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 54
The logical DSP channel number for the DSP (slot 1, port 54) is now displayed, which maps to the physical DSP channel slot 1, dspm 5, dsp 4, dsp_channel 1. The following shows that CSM has collected all the digits for dialing out:
May 16 12:22:27.580: CSM_PROC_OC3_COLLECT_ALL_DIGIT: CSM_EVENT_GET_ALL_DIGITS at slot 1, port 54
For PRI and for applications that do not require digit collection of outdialing digits (for example, voice calls), the intermediate digit collection states are omitted and the CSM state machine moves to this state directly, pretending that the digit collection has been done. The following shows an information message:
May 16 12:22:27.580: CSM_PROC_OC3_COLLECT_ALL_DIGIT: called party num: (30001) at slot 1, port 54
The following shows that CSM attempts to find a free signalling D channel to direct the outgoing call:
May 16 12:22:27.580: csm_vtsp_check_dchan May 16 12:22:27.580: csm_vtsp_check_dchan dchan_idb=0x60E8ACF0) May 16 12:22:27.580: csm_vtsp_check_dchan May 16 12:22:27.580: csm_vtsp_check_dchan dchan_idb=0x60D7ACB0) (voice_vdev=0x60B8562C) (vtsp requested dchan=0x60D7ACB0, (voice_vdev=0x60B8562C) (vtsp requested dchan=0x60D7ACB0,
In the case of voice calls, the free signaling D channel must match the voice interface specified inside the signalling data block (vtsp_sdb) passed from the VTSP. The following shows that CSM has received an event from ISDN:
May 16 12:22:27.624: EVENT_FROM_ISDN::dchan_idb=0x60D7ACB0, call_id=0xA121, ces=0x1 bchan=0x1E, event=0x3, cause=0x0
dchan_idbindicates the address of the hardware IDB for the D channel call_idIndicates the call id assigned by ISDN bchanIndicates the number of the B channel assigned for this call causeIndicates the ISDN event cause
The following shows that CSM has received a CALL PROCEEDING message from ISDN.
May 16 12:22:27.624: EVENT_FROM_ISDN:(A121): DEV_CALL_PROC at slot 1 and port 54
The following shows that the CALL PROCEEDING event received from ISDN has been interpreted as a CSM_EVENT_ISDN_BCHAN_ASSIGNED message:
*May 16 12:22:27.624: CSM_PROC_OC4_DIALING: CSM_EVENT_ISDN_BCHAN_ASSIGNED at slot 1, port 54
ISDN has assigned a B channel for this outgoing call. This B channel must be on the same PRI span as the signalling D channel allocated previously.
DB-527
This is invoked when an outgoing call initiated by the VTSP receives a response from the ISDN stack. The following shows that ISDN has sent a CONNECT message to CSM indicating that the call leg to the PSTN side has been established:
May 16 12:22:28.084: EVENT_FROM_ISDN::dchan_idb=0x60D7ACB0, call_id=0xA121, ces=0x1 bchan=0x1E, event=0x4, cause=0x0 May 16 12:22:28.084: EVENT_FROM_ISDN:(A121): DEV_CONNECTED at slot 1 and port 54
The following shows that while CSM is in the OC5_WAIT_FOR_CARRIER state, it has received the 'CONNECT' message from ISDN and has translated it into the CSM_EVENT_ISDN_CONNECTED message, which is passed to the CSM central state machine:
May 16 12:22:28.084: CSM_PROC_OC5_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1, port 54
The following shows that the function vtsp_confirm_oc() has been called:
May 16 12:22:28.084: vtsp_confirm_oc : (voice_vdev= 0x60B8562C)
This is invoked after CSM received the CONNECT message from ISDN. CSM sends a confirmation of the CONNECT to the VTSP.
DB-528
December 2010
debug ctl-client
To collect debug information about the CTL client, use the debug ctl-client command in privileged EXEC configuration mode. To disable collection of debug information, use the no form of this command. debug ctl-client no debug ctl-client
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(9)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following example shows debug messages for the CTL client:
Router# debug ctl-client 001954: 001955: 001956: 001957: 001958: 001959: 001960: 001961: 001962: 001963: 001964: 001965: 001966: .Jul .Jul .Jul .Jul .Jul .Jul .Jul .Jul .Jul .Jul .Jul .Jul .Jul 21 21 21 21 21 21 21 21 21 21 21 21 21 18:23:02.136: 18:23:02.272: 18:23:02.276: 18:23:02.276: 18:23:02.280: 18:23:02.280: 18:23:02.284: 18:23:02.284: 18:23:02.288: 18:23:02.288: 18:23:02.292: 18:23:02.424: 18:23:02.640: ctl_client_create_ctlfile: create_ctl_record: Function 0 Trustpoint cisco1 create_ctl_record: record added for function 0 create_ctl_record: Function 0 Trustpoint sast2 create_ctl_record: record added for function 0 create_ctl_record: Function 1 Trustpoint cisco1 create_ctl_record: record added for function 1 create_ctl_record: Function 3 Trustpoint cisco1 create_ctl_record: record added for function 3 create_ctl_record: Function 4 Trustpoint cisco1 create_ctl_record: record added for function 4 ctl_client_create_ctlfile: Signature length 128 CTL File Created Successfully
DB-529
debug ctunnel
To display debugging messages for the IP over a Connectionless Network Service (CLNS) Tunnel feature, use the debug ctunnel command in privileged EXEC mode. To disable debugging messages, use the no form of this command. debug ctunnel no debug ctunnel
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
As packets are sent over the virtual interface, the following type of output will appear on the console when the debug ctunnel command is used:
Router# debug ctunnel 4d21h: CTunnel1: IPCLNP encapsulated 49.0001.1111.1111.1111.00->49.0001.2222.2222.2222.00 (linktype=7, len=89)
DB-530
December 2010
debug custom-queue
To enable custom queueing output, use the debug custom-queue command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug custom-queue no debug custom-queue
Syntax Description
Command Modes
Privileged EXEC
Examples
Related Commands
DB-531
debug cwmp
To debug the TR-069 Agent, use the debug cwmp command in privileged EXEC mode. To disable, use the no form of this command. debug cwmp {all | error | profile | trace} no debug cwmp {all | error | profile | trace}
Syntax Description
Specifies all debug messages. Specifies error messages. Specifies the error and trace messages in the Cisco WAN Management Protocol (CWMP) profiles. Specifies trace message.
Command Modes
Command History
Release 12.4(20)T
Examples
The following is sample output from the debug cwmp error command:
Device# debug cwmp error CWMP ERROR: cwmp_session_response_data -> HTTPC Response failed with httpc error
The following is sample trace message output from the debug cwmp profile command:
Device# debug cwmp profile CWMP PROFILE: cwmp_generate_connection_request_URL -> ConnectionRequestURL = http://172.27.116.170/00000C/FTX1101A1XH/cwmp
The following is sample error message output from the debug cwmp profile command:
Device# debug cwmp profile CWMP PROFILE ERROR: validate_dhcp_pool_min_max_address -> Missing InternetGatewayDevice.LANDevice.5.LANHostConfigManagement.MaxAddress
The following is sample output from the debug cwmp trace command:
Device# debug cwmp trace CWMP: cwmp_process -> CWMP Engine started
DB-532
December 2010
debug dampening
To display debug trace information messages for interface dampening, use the debug dampening command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug dampening [all | interface] no debug dampening [all | interface]
Syntax Description
all interface
(Optional) Enables trace debugging for all dampening features. (Optional) Enables trace debugging for IP event dampening.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(18)SXD. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output is similar to the output that will be displayed when the debug dampening command is entered with the interface keyword. The sample output shows the following information:
Ethernet interface 1/1 is configured with the IP Event Dampening feature. The half-life period is set to 30 seconds, the reuse threshold to 500, the suppress threshold to 1000, and the restart penalty to 90. The shutdown command and then the no shutdown command was entered on Ethernet interface 1/1. The interface was suppressed and then reused by the IP Event Dampening feature.
Router# debug dampening interface 00:07:17:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from UP to DOWN 00:07:17:EvD(Ethernet1/1):charge penalty 1000, new accum. penalty 1000, flap count 1 00:07:17:EvD(Ethernet1/1):accum. penalty 1000, now suppressed with a reuse intervals of 30 00:07:17:IF-EvD(Ethernet1/1):update CLNS Routing state to DOWN, interface is suppressed 00:07:17:IF-EvD(Ethernet1/1):IP Routing reports state transition from DOWN to DOWN 00:07:17:IF-EvD(Ethernet1/1):update IP Routing state to DOWN, interface is suppressed 00:07:17:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from DOWN to UP
DB-533
00:07:17:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from UP to DOWN 00:07:17:EvD(Ethernet1/1):accum. penalty decayed to 1000 after 0 second(s) 00:07:17:EvD(Ethernet1/1):charge penalty 1000, new accum. penalty 2000, flap count 2 00:07:17:EvD(Ethernet1/1):accum. penalty 2000, now suppressed with a reuse intervals of 60 00:07:17:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from DOWN to UP 00:07:17:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from UP to DOWN 00:07:17:EvD(Ethernet1/1):accum. penalty decayed to 2000 after 0 second(s) 00:07:17:EvD(Ethernet1/1):charge penalty 1000, new accum. penalty 3000, flap count 3 00:07:17:EvD(Ethernet1/1):accum. penalty 3000, now suppressed with a reuse intervals of 78 00:07:17:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from DOWN to UP 00:07:17:IF-EvD(Ethernet1/1):IP Routing reports state transition from UP to UP 00:07:17:IF-EvD(Ethernet1/1):IP Routing reports state transition from UP to UP 00:07:17:IF-EvD(Ethernet1/1):IP Routing reports state transition from UP to UP 00:07:17:IF-EvD(Ethernet1/1):IP Routing reports state transition from UP to UP 00:07:17:IF-EvD(Ethernet1/1):IP Routing reports state transition from UP to UP 00:07:20:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from UP to UP 00:07:20:IF-EvD(Ethernet1/1):IP Routing reports state transition from UP to UP 00:07:47:IF-EvD:unsuppress interfaces 00:08:36:IF-EvD:unsuppress interfaces 00:08:36:EvD(Ethernet1/1):accum. penalty decayed to 483 after 79 second(s) 00:08:36:EvD(Ethernet1/1):accum. penalty 483, now unsuppressed 00:08:36:IF-EvD(Ethernet1/1):update IP Routing state to UP, interface is not suppressed 00:08:36:IF-EvD(Ethernet1/1):update CLNS Routing state to UP, interface is not suppressed 00:08:36:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from UP to UP
Field
Description
... Routing reports state transition Displays the status of the specified interface from the perspective from UP to DOWN of the specified protocol. Interface state changes are displayed. The interface is specified within parentheses. The protocol is specified at the beginning of the message. charge penalty 1000, new accum. Displays the penalty assigned to the flapping interface and amount penalty 1000, flap count 1 of penalty that is added to the accumulated penalty. The interface flap count is also displayed. accum. penalty 1000, now Displays the status of the interface, accumulated penalty, and suppressed with a reuse intervals configured reuse threshold. of 30 update CLNS Routing state to DOWN, interface is suppressed accum. penalty decayed to 1000 after 0 second(s) unsuppress interfaces Displays the status of the specified interface. Interface state changes and suppression status are displayed. Displays the decay rate of the accumulated penalty. Indicates that dampened interfaces have been unsuppressed.
DB-534
December 2010
debug data-store
To display persistant storage device (PSD)-related debugging messages for the , use the debug data-store command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug data-store no debug data-store
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(2)XB. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network flows and fewer users. Debugging during these periods reduces the effect these commands have on other users on the system.
Examples
DB-535
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(2)XB. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network flows and fewer users. Debugging during these periods reduces the effect these commands have on other users on the system.
Examples
DB-536
December 2010
Related Commands
Command auto-retrieve clear data-store statistics show data-store show data-store statistics
Description Configures the GGSN to automatically initiate a retrieval of G-CDRs from PSDs defined in a PSD server group. Clears PSD-related statistics. Displays the status of the PSD client and PSD server-related information. Displays statistics related to the PSD client.
DB-537
Syntax Description
Defaults
Command Modes
Privileged EXEC
Usage Guidelines
The debug dbconn all command displays debug output for Advanced Program-to-Program Communication (APPC), Database Connection configuration, Distributed Relational Database Architecture (DRDA), error messages, event traces, and TCP. The Database Connection debug flags are appc, config, drda, event, and tcp.
Examples
See the sample output provided for the debug dbconn appc, debug dbconn config, debug dbconn drda, debug dbconn event, and debug dbconn tcp commands.
Related Commands
Command debug dbconn appc debug dbconn config debug dbconn drda debug dbconn event debug dbconn tcp
Description Displays APPC-related trace or error messages. Displays trace or error messages for Database Connection configuration and control blocks. Displays error messages and stream traces for DRDA. Displays trace or error messages for CTRC events related to DB2 communications. Displays error messages and traces for TCP.
DB-538
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
In a router with stable Database Connection, the alias_cp_name field in the trace message should not be blank. There should be no other APPC error message. You can use Advanced Peer-to-Peer Networking (APPN) debug commands with this debug command to track APPN-related errors.
Examples
The following is sample output from the debug dbconn appc command. In a normal situation, only the following message is displayed:
DBCONN-APPC: alias_cp_name is "ASH"
The following error messages are displayed if there is a network configuration error or other APPN-related problem:
DBCONN-APPC-612C2B28: APPC error: opcode 0x1, primary_rc 0x0003, secondary_rc 0x00000004 DBCONN-APPC-612C2B28: Verb block = DBCONN-APPC-612C2B28: 0001 0200 0003 0000 0000 0004 0020 100C DBCONN-APPC-612C2B28: 610A 828B 0000 0000 0000 0000 0000 0000 DBCONN-APPC-612C2B28: 0000 0000 8014 0003 0000 0000 0000 0000 DBCONN-APPC-612C2B28: D3E4 F6F2 E2E3 C1D9 C4C2 F240 4040 4040 DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040 DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040 DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040 DBCONN-APPC-612C2B28: 4040 4040 4040 4040 0200 0000 0000 0000 DBCONN-APPC-612C2B28: 0000 0000 D4C5 D9D9 C9C5 4040 4040 D7C5 DBCONN-APPC-612C2B28: E3C5 D940 4040 4040 0000 0000 0000 0000 DBCONN-APPC-612C2B28: 00E2 E3C1 D9E6 4BE3 D6D9 C3C8 4040 4040 DBCONN-APPC-612C2B28: 4040 0000 0000 0000 0000 0000 DBCONN-APPC-612C2B28: ALLOCATE verb block = DBCONN-APPC-612C2B28: 0001 0200 0003 0000 0000 0004 0020 100C DBCONN-APPC-612C2B28: 610A 828B 0000 0000 0000 0000 0000 0000 DBCONN-APPC-612C2B28: 0000 0000 8014 0003 0000 0000 0000 0000 DBCONN-APPC-612C2B28: D3E4 F6F2 E2E3 C1D9 C4C2 F240 4040 4040 DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040 DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040 DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040 DBCONN-APPC-612C2B28: 4040 4040 4040 4040 0200 0000 0000 0000
DB-539
You can use the debug appn command to obtain more information. The following message is displayed if a database connection is manually cleared and an outstanding APPC verb is pending:
DBCONN-APPC-%612C2B28: Canceling pending APPC verb 0x1
Related Commands
Command debug dbconn all debug dbconn config debug dbconn drda debug dbconn event debug dbconn tcp
Description Turns on all debug flags for Database Connection. Displays trace or error messages for Database Connection configuration and control blocks. Displays error messages and stream traces for DRDA. Displays trace or error messages for Database Connection events. Displays error messages and traces for TCP.
DB-540
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Most of the messages for Database Connection and control blocks do not report any errors. If a connection is inactive and cannot be cleared, use this command with the debug dbconn appc, debug dbconn tcp, and debug appn commands to locate the problem. The alias_cp_name field must match the configured APPN cpname.
Examples
The following is sample output from the debug dbconn config command:
Router# debug dbconn config DBCONN-CONFIG: DBCONN-CONFIG: rdbname=STELLA DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: DBCONN-CONFIG: alias_cp_name is "ASH " connection 612BDAAC matching server on 198.147.235.5:0 with APPN shutdown; clearing connection 1234abcd created server 612C2720 server 612C2720 (listen 60F72E94) is active server 612C2720 (listen 60F72E94) is active new connection 612BDAAC listen 60F72E94 accepts connection 612BDAAC server 60F74614 takes connection 612BDAAC listen 60F72E94 releases connection 612BDAAC server 60F74614 releases connection 612BDAAC deleting connection 612BDAAC listen 60F72E94 abandons connection 612BDAAC server 612C2720 abandons connection 612BDAAC deleting server 612C2720 daemon 60381738 takes zombie connection 612BDAAC daemon 60381738 releases zombie connection 612BDAAC
DB-541
Related Commands
Command debug dbconn all debug dbconn appc debug dbconn drda debug dbconn event debug dbconn tcp
Description Turns on all debug flags for Database Connection. Displays APPC-related trace or error messages. Displays error messages and stream traces for DRDA. Displays trace or error messages for Database Connection events. Displays error messages and traces for TCP.
DB-542
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug dbconn drda command:
Router# debug dbconn drda *Jun 30 16:09:32.363: DBCONN-DRDA-62008300: REQDSS, correlator 1 *Jun 30 16:09:32.363: DBCONN-DRDA-62008300: X'1041' *Jun 30 16:09:32.363: DBCONN-DRDA-62008300: length 28, code point X'115E' *Jun 30 16:09:32.363: DBCONN-DRDA-62008300: length 8, code point X'116D' *Jun 30 16:09:32.363: DBCONN-DRDA-62008300: length 15, code point X'115A' (skipping...) DSS X'006CD0410001', length 108, in chain, OBJECT X'00661041', length 98, code point OBJECT X'0020115E' in COLLECTION X'1041', OBJECT X'000C116D' in COLLECTION X'1041', OBJECT X'0013115A' in COLLECTION X'1041',
Related Commands
Command debug dbconn all debug dbconn appc debug dbconn config
Description Turns on all debug flags for Database Connection. Displays APPC-related trace or error messages. Displays trace or error messages for Database Connection configuration and control blocks.
DB-543
Description Displays trace or error messages for CTRC events related to DB2 communications. Displays error messages and traces for TCP.
DB-544
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following examples display output from the debug dbconn event command in a variety of situations. A normal trace for the debug dbconn event displays as follows:
Router# debug dbconn event DBCONN-EVENT: Dispatch to 60FD6C00, from 0, msg 60F754CC, msgid 6468 'dh', buffer 0. DBCONN-EVENT: [*] Post to 61134240(cn), from 60EC5470(tc), msg 611419E4, msgid 0x6372 'cr', buffer 612BF68C. DBCONN-EVENT: Flush events called for pto 61182742, pfrom 61239837. DBCONN-EVENT: Event discarded: to 61182742 (cn), from 61239837(ap), msg 61339273, msgid 0x6372 'cr' buffer 0. DBCONN-EVENT: == Send to 1234abcd, from 22938acd, msg 72618394, msgid 0x6372 'cr', buffer 0.
If the following messages are displayed, contact Cisco technical support personnel:
DBCONN-TCPFSM-1234abcd: Cannot occur in state 2 on input 6363 ('cc') DBCONN-APPCFSM-1234abcd: Cannot occur in state 3 on input 6363 ('cc')
DB-545
Related Commands
Command debug dbconn all debug dbconn appc debug dbconn config debug dbconn drda debug dbconn tcp show debugging
Description Turns on all debug flags for Database Connection. Displays APPC-related trace or error messages. Display trace or error messages for Database Connection configuration and control blocks. Displays error messages and stream traces for DRDA. Displays error messages and traces for TCP. Displays the state of each debugging option.
DB-546
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug dbconn tcp command:
Router# debug dbconn tcp DBCONN-TCP-63528473: tcpdriver_passive_open returned NULL DBCONN-TCP-63528473: (no memory) tcp_reset(63829482) returns 4 DBCONN-TCP: tcp_accept(74625348,&error) returns tcb 63829482, error 4 DBCONN-TCP: (no memory) tcp_reset(63829482) returns 4 DBCONN-TCP-63528473: (open) tcp_create returns 63829482, error = 4 DBCONN-TCP-63528473: tcb_connect(63829482,1.2.3.4,2010) returns 4 DBCONN-TCP-63528473: (open error) tcp_reset(63829482) returns 4 DBCONN-TCP-63528473: tcp_create returns 63829482, error = 4 DBCONN-TCP-63528473: tcb_bind(63829482,0.0.0.0,2001) returns 4 DBCONN-TCP-63528473: tcp_listen(63829482,,) returns 4 DBCONN-TCP-63528473: (errors) Calling tcp_close (63829482)
Related Commands
Description Turns on all debug flags for Database Connection. Displays APPC-related trace or error messages.
DB-547
Command debug dbconn config debug dbconn drda debug dbconn event show debugging
Description Displays trace or error messages for Database Connection configuration and control blocks. Displays error messages and stream traces for DRDA. Displays trace or error messages for CTRC events related to DB2 communications. Displays the state of each debugging option.
DB-548
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug decnet adj command:
Router# debug decnet adj DNET-ADJ: DNET-ADJ: DNET-ADJ: DNET-ADJ: DNET-ADJ: DNET-ADJ: DNET-ADJ: DNET-ADJ: DNET-ADJ: DNET-ADJ: DNET-ADJ: Level 1 hello from 1.3 sending hellos Sending hellos to all routers on interface Ethernet0, blksize 1498 Level 1 hello from 1.3 1.5 adjacency initializing sending triggered hellos Sending hellos to all routers on interface Ethernet0, blksize 1498 Level 1 hello from 1.3 1.5 adjacency up Level 1 hello from 1.5 1.5 adjacency down, listener timeout
The following line indicates that the router is sending hello messages to all routers on this segment, which in this case is Ethernet 0:
DNET-ADJ: Sending hellos to all routers on interface Ethernet0, blksize 1498
The following line indicates that the router has heard a hello message from address 1.5 and is creating an adjacency entry in its table. The initial state of this adjacency will be initializing.
DNET-ADJ: 1.5 adjacency initializing
The following line indicates that the router is sending an unscheduled (triggered) hello message as a result of some event, such as new adjacency being heard:
DNET-ADJ: sending triggered hellos
The following line indicates that the adjacency with 1.5 is now up, or active:
DNET-ADJ: 1.5 adjacency up
The following line indicates that the adjacency with 1.5 has timed out, because no hello message has been heard from adjacency 1.5 in the time interval originally specified in the hello message from 1.5:
DNET-ADJ: 1.5 adjacency down, listener timeout
DB-549
The following line indicates that the router is sending an unscheduled hello message, as a result of some event, such as the adjacency state changing:
DNET-ADJ: hello update triggered by state changed in dn_add_adjacency
DB-550
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
When you use connect packet filtering, it may be helpful to use the decnet access-group configuration command to apply the following basic access list:
access-list 300 permit 0.0 63.1023 eq any
You can then log all connect packets sent on interfaces to which you applied this list, in order to determine those elements on which your connect packets must be filtered.
Note
Packet password and account information is not logged in the debug decnet connects message, nor is it displayed by the show access EXEC command. If you specify password or account information in your access list, they can be viewed by anyone with access to the configuration of the router.
Examples
The following is sample output from the debug decnet connects command:
Router# debug decnet connects DNET-CON: list 300 item #2 matched src=19.403 dst=19.309 on Ethernet0: permitted srcname=RICK srcuic=[0,017] dstobj=42 id=USER
Field DNET-CON: list 300 item #2 matched src=19.403 dst=19.309 on Ethernet0: permitted
Description Indicates that this is a debug decnet connects packet. Indicates that a packet matched the second item in access list 300. Indicates the source DECnet address for the packet. Indicates the destination DECnet address for the packet. Indicates the router interface on which the access list filtering the packet was applied. Indicates that the access list permitted the packet.
DB-551
Table 72
Description Indicates the originator user of the packet. Indicates the source UIC of the packet. Indicates that DECnet object 42 is the destination. Indicates the access user.
DB-552
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug decnet events command:
Router# debug decnet events DNET: Hello from area 50 rejected - exceeded max area' parameter (45) DNET: Hello from area 50 rejected - exceeded max area' parameter (45)
The following line indicates that the router received a hello message from a router whose area was greater than the max-area parameter with which this router was configured:
DNET: Hello from area 50 rejected - exceeded'max area' parameter (45)
The following line indicates that the router received a hello message from a router whose node ID was greater than the max-node parameter with which this router was configured:
DNET: Hello from node 1002 rejected - exceeded'max node' parameter (1000)
DB-553
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug decnet packet command:
Router# debug decnet packet DNET-PKT: src 1.4 dst 1.5 sending to PHASEV DNET-PKT: Packet fwded from 1.4 to 1.5, via 1.5, snpa 0000.3080.cf90, TokenRing0
The following line indicates that the router is sending a converted packet addressed to node 1.5 to Phase V:
DNET-PKT: src 1.4 dst 1.5 sending to PHASEV
The following line indicates that the router forwarded a packet from node 1.4 to node 1.5. The packet is being sent to the next hop of 1.5 whose subnetwork point of attachment (MAC address) on that interface is 0000.3080.cf90.
DNET-PKT: Packet fwded from 1.4 to 1.5, via 1.5, snpa 0000.3080.cf90, TokenRing0
DB-554
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug decnet routing command:
Router# debug decnet routing DNET-RT: DNET-RT: DNET-RT: DNET-RT: DNET-RT: DNET-RT: DNET-RT: DNET-RT: DNET-RT: DNET-RT: Received level 1 routing from 1.3 on Ethernet0 at 1:16:34 Sending routes Sending normal routing updates on Ethernet0 Sending level 1 routing updates on interface Ethernet0 Level1 routes from 1.5 on Ethernet0: entry for node 5 created route update triggered by after split route pointers in dn_rt_input Received level 1 routing from 1.5 on Ethernet 0 at 1:18:35 Sending L1 triggered routes Sending L1 triggered routing updates on Ethernet0 removing route to node 5
The following line indicates that the router has received a level 1 update on Ethernet interface 0:
DNET-RT: Received level 1 routing from 1.3 on Ethernet0 at 1:16:34
The following line indicates that the router is sending its scheduled updates on Ethernet interface 0:
DNET-RT: Sending normal routing updates on Ethernet0
The following line indicates that the route will send an unscheduled update on this interface as a result of some event. In this case, the unscheduled update is a result of a new entry created in the routing table of the interface.
DNET-RT: route update triggered by after split route pointers in dn_rt_input
The following line indicates that the router sent the unscheduled update on Ethernet 0:
DNET-RT: Sending L1 triggered routes DNET-RT: Sending L1 triggered routing updates on Ethernet0
The following line indicates that the router removed the entry for node 5 because the adjacency with node 5 timed out, or the route to node 5 through a next-hop router was disconnected:
DNET-RT: removing route to node 5
DB-555
debug dhcp
To display debugging information about the Dynamic Host Configuration Protocol (DHCP) client activities and to monitor the status of DHCP packets, use the debug dhcp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug dhcp [detail] no debug dhcp [detail]
Syntax Description
detail
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The output of this command was enhanced to display default static routes. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You can also use the debug dhcp command to monitor the subnet allocation and releasing for on-demand address pools. For debugging purposes, the debug dhcp detail command provides the most useful information such as the lease entry structure of the client and the state transitions of the lease entry. The debug output shows the scanned option values from received DHCP messages that are replies to a router request. The values of the op, htype, hlen, hops, server identifier option, xid, secs, flags, ciaddr, yiaddr, siaddr, and giaddr fields of the DHCP packet are shown in addition to the length of the options field.
Examples
The following examples show and explain some of the typical debugging messages you may see when using the debug dhcp detail command. The following sample output shows when a DHCP client sends a DHCPDISCOVER broadcast message to find its local DHCP server:
Router# debug dhcp detail 00:07:16:DHCP:DHCP client process started:10 00:07:16:RAC:Starting DHCP discover on Ethernet2 00:07:16:DHCP:Try 1 to acquire address for Ethernet2 00:07:16:%SYS-5-CONFIG_I:Configured from console by console 00:07:19:DHCP:Shutting down from get_netinfo() 00:07:19:DHCP:Attempting to shutdown DHCP Client 00:07:21:DHCP:allocate request 00:07:21:DHCP:new entry. add to queue
DB-556
December 2010
The first seven lines of the following output show the current values stored in the lease entry structure for the client:
00:07:21:Temp IP addr:0.0.0.0 for peer on Interface:Ethernet2 00:07:21:Temp sub net mask:0.0.0.0 00:07:21: DHCP Lease server:0.0.0.0, state:1 Selecting 00:07:21: DHCP transaction id:582 00:07:21: Lease:0 secs, Renewal:0 secs, Rebind:0 secs 00:07:21: Next timer fires after:00:00:03 00:07:21: Retry count:1 Client-ID:cisco-0010.7b6e.afd8-Et2 00:07:21:DHCP:SDiscover:sending 308 byte length DHCP packet 00:07:21:DHCP:SDiscover 308 bytes 00:07:21: B'cast on Ethernet2 interface from 0.0.0.0
The following output shows the offered addresses and parameters sent to the DHCP client by the DHCP server via a DHCPOFFER message. The messages containing the Scan field indicate the options that were scanned from the received BOOTP packet and the corresponding values:
00:07:23:DHCP:Received a BOOTREP pkt 00:07:23:DHCP:Scan:Message type:DHCP Offer 00:07:23:DHCP:Scan:Server ID Option:10.1.1.1 = A010101 00:07:23:DHCP:Scan:Lease Time:180 00:07:23:DHCP:Scan:Renewal time:90 00:07:23:DHCP:Scan:Rebind time:157 00:07:23:DHCP:Scan:Subnet Address Option:255.255.255.0
The following output shows selected fields in the received BOOTP packet:
00:07:23:DHCP:rcvd pkt source:10.1.1.1, destination: 255.255.255.255 00:07:23: UDP sport:43, dport:44, length:308 00:07:23: DHCP op:2, htype:1, hlen:6, hops:0 00:07:23: DHCP server identifier:10.1.1.1 00:07:23: xid:582, secs:0, flags:8000 00:07:23: client:0.0.0.0, your:10.1.1.2 00:07:23: srvr: 0.0.0.0, gw:0.0.0.0 00:07:23: options block length:60 00:07:23:DHCP Offer Message Offered Address:10.1.1.2 00:07:23:DHCP:Lease Seconds:180 Renewal secs: 90 Rebind secs:157 00:07:23:DHCP:Server ID Option:10.1.1.1 00:07:23:DHCP:offer received from 10.1.1.1
The following output shows when the DHCP client sends a DHCPREQUEST broadcast message to the DHCP server to accept the offered parameters:
00:07:23:DHCP:SRequest attempt # 1 for entry: 00:07:23:Temp IP addr:10.1.1.2 for peer on Interface:Ethernet2 00:07:23:Temp sub net mask:255.255.255.0 00:07:23: DHCP Lease server:10.1.1.1, state:2 Requesting 00:07:23: DHCP transaction id:582 00:07:23: Lease:180 secs, Renewal:0 secs, Rebind:0 secs 00:07:23: Next timer fires after:00:00:02 00:07:23: Retry count:1 Client-ID:cisco-0010.7b6e.afd8-Et2 00:07:23:DHCP:SRequest- Server ID option:10.1.1.1 00:07:23:DHCP:SRequest- Requested IP addr option:10.1.1.2 00:07:23:DHCP:SRequest placed lease len option:180 00:07:23:DHCP:SRequest:326 bytes 00:07:23:DHCP:SRequest:326 bytes 00:07:23: B'cast on Ethernet2 interface from 0.0.0.0
DB-557
The following output shows when the DHCP server sends a DHCPACK message to the client with the full set of configuration parameters:
00:07:23:DHCP:Received a BOOTREP pkt 00:07:23:DHCP:Scan:Message type:DHCP Ack 00:07:23:DHCP:Scan:Server ID Option:10.1.1.1 = A010101 00:07:23:DHCP:Scan:Lease Time:180 00:07:23:DHCP:Scan:Renewal time:90 00:07:23:DHCP:Scan:Rebind time:157 00:07:23:DHCP:Scan:Subnet Address Option:255.255.255.0 00:07:23:DHCP:rcvd pkt source:10.1.1.1, destination: 255.255.255.255 00:07:23: UDP sport:43, dport:44, length:308 00:07:23: DHCP op:2, htype:1, hlen:6, hops:0 00:07:23: DHCP server identifier:10.1.1.1 00:07:23: xid:582, secs:0, flags:8000 00:07:23: client:0.0.0.0, your:10.1.1.2 00:07:23: srvr: 0.0.0.0, gw:0.0.0.0 00:07:23: options block length:60 00:07:23:DHCP Ack Message 00:07:23:DHCP:Lease Seconds:180 Renewal secs: 90 Rebind secs:157 00:07:23:DHCP:Server ID Option:10.1.1.1Interface Ethernet2 assigned DHCP address 10.1.1.2, mask 255.255.255.0 00:07:26:DHCP Client Pooling:***Allocated IP address:10.1.1.2 00:07:26:Allocated IP address = 10.1.1.2 255.255.255.0
The following output shows when a default gateway (option 3) is assigned a static IP address that is the default route and that static routes were added from the DHCP server:
*Oct 2 06:22:24: gateway. *Oct 2 06:22:24: *Oct 2 06:22:24: *Oct 2 06:22:24: *Oct 2 06:22:24: Setting default_gateway to 68.8.8.1 ! This is the option 3 default Adding default route 68.8.8.1 DHCP: Adding static route to 4.3.2.1 255.255.255.255 via 68.8.8.1 DHCP: Adding static route to 1.1.1.1 255.255.255.255 via 68.8.8.1 DHCP: Adding static route to 67.2.2.2 255.255.255.255 via 68.8.8.1
Most fields are self-explanatory; however, fields that may need further explanation are described in Table 73.
Table 73 debug dhcp Field Descriptions
Description Subnet mask option (option 1). Value of the DHCP server ID option (option 54). Note that this is not the same as the siaddr field, which is the server IP address. srvr is the value of the siaddr field. gw is the value of the giaddr field.
srvr:0.0.0.0, gw:0.0.0.0
Related Commands
Command debug ip ddns update debug ip dhcp server host (host-list) ip ddns update hostname
Description Enables debugging for DDNS updates. Enables DHCP server debugging. Specifies a list of hosts that will receive DDNS updates of A and PTR RRs. Enables a host to be used for DDNS updates of A and PTR RRs.
DB-558
December 2010
Command
Description
ip ddns update method Specifies a method of DDNS updates of A and PTR RRs and the maximum interval between the updates. ip dhcp client update dns ip dhcp-client update dns ip dhcp update dns ip host-list show ip ddns update show ip ddns update method show ip dhcp server pool show ip host-list update dns Enables DDNS updates of A RRs using the same hostname passed in the hostname and FQDN options by a client. Enables DDNS updates of A RRs using the same hostname passed in the hostname and FQDN options by a client. Enables DDNS updates of A and PTR RRs for most address pools. Specifies a list of hosts that will receive DDNS updates of A and PTR RRs. Displays information about the DDNS updates. Displays information about the DDNS update method. Displays DHCP server pool statistics. Displays the assigned hosts in a list. Dynamically updates a DNS with A and PTR RRs for some address pools.
DB-559
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example displays debug messages regarding DHCP redundancy events. The last line is output when the debug dhcp redundancy command is enabled. The line indicates that the active Route Processor has sent a dynamic lease synchronization message for IP address 10.1.1.1:
Router# debug dhcp redundancy *Mar 15 10:32:21: DHCPD: assigned IP address 10.1.1.1 to client *Mar 15 10:32:21: DHCPD: dynamic sync sent for 10.1.1.1
Related Commands
Description Displays debugging information about DHCP server and relay agent redundancy events.
DB-560
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
When dial-on-demand routing (DDR) is enabled on the interface, information concerning the cause of any call (called the Dialing cause) is displayed.
Examples
In the following example, the line of output for an IP packet lists the name of the DDR interface and the source and destination addresses of the packet:
Router# debug dialer events Dialing cause: Serial0: ip (s=172.16.1.111 d=172.16.2.22)
The following line of output for a bridged packet lists the DDR interface and the type of packet (in hexadecimal). For information on these packet types, see the Ethernet Type Codes appendix of the Cisco IOS Bridging and IBM Networking Command Reference publication.
Dialing cause: Serial1: Bridge (0x6005)
Most messages are self-explanatory; however, messages that may need some explanation are described in Table 74.
Table 74 debug dialer events Message Descriptions
Message
Description
Dialer0: Already xxx call(s) in progress Number of calls in progress (xxx) exceeds the maximum on Dialer0, dialing not allowed number of calls set on the interface. Dialer0: No free dialer - starting fast idle timer BRI0: rotary group to xxx overloaded (yyy) BRI0: authenticated host xxx with no matching dialer profile All the lines in the interface or rotary group are busy, and a packet is waiting to be sent to the destination. Number dialer (xxx) exceeds the load set on the interface (yyy). No dialer profile matches xxx, the Challenge Handshake Authentication Protocol (CHAP) name or remote name of the remote host.
DB-561
Table 74
Message BRI0: authenticated host xxx with no matching dialer map BRI0: Cant place call, verify configuration
Description No dialer map matches xxx, the CHAP name or remote name of the remote host. Dialer string or dialer pool on an interface not set.
Table 75 describes the messages that the debug dialer events command can generate for a serial interface used as a V.25bis dialer for DDR.
Table 75 debug dialer events Command Message Descriptions for DDR
Message
Description
Serial 0: Dialer result = xxxxxxxxxx Result returned from the V.25bis dialer. It is useful in debugging if calls are failing. On some hardware platforms, this message cannot be displayed due to hardware limitations. Possible values for the xxxxxxxxxx variable depend on the V.25bis device with which the router is communicating. Serial 0: No dialer string defined. Dialing cannot occur. Serial 0: Attempting to dial xxxxxxxxxx Packet is received that should cause a call to be placed. However, no dialer string is configured, so dialing cannot occur. This message usually indicates a configuration problem. Packet has been received that passes the dial-on-demand access lists. That packet causes phone number xxxxxxxxxx to be dialed.
Serial 0: Unable to dial xxxxxxxxxx Phone call to xxxxxxxxxx cannot be placed. This failure might be due to a lack of memory, full output queues, or other problems. Serial 0: disconnecting call Serial 0: idle timeout Serial 0: re-enable timeout Serial 0: wait for carrier timeout Router hangs up a call. One of these three messages is displayed when a dialer timer expires. These messages are mostly informational, but are useful for debugging a disconnected call or call failure.
Related Commands
Description Displays debugging information about the packets received on a dialer interface.
DB-562
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug dialer forwarding command to configure a virtual private dialout network (VPDN) on the HGW and a network access server (NAS) to dial from the HGW to the client. An L2TP tunnel is created between the HGW and the NAS and the packets are forwarded transparently at the NAS.
Examples
The following is sample output from the debug dialer forwarding command for dialing from the HGW to the client.
Note
DB-563
Timeout in seconds [2]: Extended commands [n]: Sweep range of sizes [n]: Type escape sequence to abort. Sending 1, 100-byte ICMP Echos to 1.1.1.3, timeout is 2 seconds: 1d00h:Vi3 DDR-FWD 83093A60:event [REQUEST] state before [IDLE] 1d00h:Vi3 DDR-FWD 83093A60:VPN Authorization started 1d00h:Vi3 DDR-FWD 83093A60:VPN author result 1 1d00h:Vi3 DDR-FWD 83093A60:event [AUTHOR FOUND] state before [AUTHORIZING] 1d00h:Vi3 DDR-FWD 83093A60:event [FORWARDED] state before [FORWARDING] 1d00h:Vi3 DDR-FWD 83093A60:Connection is up, start LCP now *Mar 2 00:31:33:%LINK-3-UPDOWN:Interface Virtual-Access3, changed state to up. Success rate is 0 percent (0/1) R2604# *Mar 2 00:31:35:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access3, changed state to up Router#
Related Commands
Description Displays debugging information about events on a dialer interface. Displays debugging information about packets received on a dialer interface.
DB-564
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug dialer map command to track large-scale dialout (LSDO) and incoming calls that use dynamic dialer maps. This command shows the whole trace including when the map is created and removed. If an interface is configured for dial-on-demand routing (DDR), and a map to a specified address does not exist, then a dynamic dialer map is created and when the call disconnects, the dialer map is removed.
Note
Examples
In the following sample output from the debug dialer map command, a dialer map is created when an incoming call is connected and removed when that call is disconnected:
Router# debug dialer map Dial on demand dynamic dialer maps debugging is on
DB-565
*Mar 22 12:19:18.734:%LINEPROTO-5-UPDOWN:Line protocol on Interface BRI0/0:1, changed state to up *Mar 22 12:19:21.598:%ISDN-6-CONNECT:Interface BRI0/0:1 is now connected to unknown R2604
Related Commands
Description Displays debugging information about events on a dialer interface. Displays debugging information about packets received on a dialer interface.
DB-566
December 2010
debug dialpeer
Note
Effective with release 12.3(8)T, the debug dialpeer command is replaced by the debug voip dialpeer command. See the debug voip dialpeer command for more information. To view dial peer information, use the debug dialpeer command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug dialpeer no debug dialpeer
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was replaced by the debug voip dialpeer command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Disable console logging and use buffered logging before using the debug dialpeer command. Using the debug dialpeer command generates a large volume of debugging messages, which can affect router performance.
Examples
The following is sample output for the debug dialpeer command. The output shows the destination pattern configured on the matched dial-peer. Expanded string is the string after applying number translation to the original number. It shows that dial-peer 1311 was an incoming dial-peer match. It also shows that routing label was att1. It shows that dial-peer 5108888 and 111399 are an outgoing dial-peer match.
Router# debug dialpeer Router# 00:22:28: Inside dpMatchCore: 00:22:28: destination pattn:5108880101 expanded string:5108880101 00:22:28:MatchNextPeer:Peer 1311 matched 00:22:28: Inside dpMatchCore: 00:22:28: destination pattn:5108880101 expanded string:5108880101
DB-567
00:22:28: Inside dpMatchCore: 00:22:28: destination pattn:4088880101 expanded string:4088880101 00:22:28: Inside dpMatchCore: 00:22:28: destination pattn:4088880101 expanded string:4088880101 00:22:28: dpAssociateIncomingPeer_T:Matching route label att1 00:22:28: Inside dpMatchCore: 00:22:28: destination pattn:5108880101 expanded string:5108880101 00:22:28: dpAssociateIncomingPeer_T:Matching peer with src route label att1 failed 00:22:28: Inside dpMatchCore: 00:22:28: destination pattn:5108880101 expanded string:5108880101 00:22:28:MatchNextPeer:Peer 1311 matched 00:22:28: Inside dpMatchPeersMoreArg 00:22:28:dpMatchPeersMoreArg:Match Dest. pattern; called (5108880101) 00:22:28: Inside dpMatchCore: 00:22:28: destination pa Router#ttn:5108880101 expanded string:5108880101 00:22:28:MatchNextPeer:Peer 5108888 matched 00:22:28:MatchNextPeer:Peer 111399 matched 00:22:28:dpMatchPeersMoreArg:Result=0 after MATCH_ORIGINATE
Field destination pattn expanded string Match Dest. pattern; called Matching route label MatchNextPeer Result
Description Destination pattern configured on the dial peer. The string after applying number translation to the original number. Indicates that dial-peer match is going to match destination pattern against the called number. The trunk group label or carrier id that is used for matching a dial peer. Indicates the dial peer tag that matched. Indicates the result of dial peer matching algorithm: 0 = Successful 1 = More digits needed for a possible match -1 = No match (match failed) -2 = The digits matched, but the destination address could not be obtained
Related Commands
Command call-block (dial peer) carrier-id (dial-peer) session target (ENUM) show dial-peer voice translation-profile (dial-peer) trunkgroup (dial-peer) trunk-group-label (dial-peer)
Description Enables blocking of incoming calls on the dial peer. Identifies the carrier handling the incoming call. Specifies the ENUM search table for the target session. Displays the configuration of the dial peer. Assigns a translation profile to the dial peer. Assigns a trunk group to the dial peer. Identifies the trunk group handling the incoming call.
DB-568
December 2010
debug diameter
To display information about the Diameter Protocol, use the debug diameter command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug diameter [dcca | connection | error | packet | event | fsm | failover] no debug diameter [dcca | connection | error | packet | event | fsm | failover]
Syntax Description
(Optional) Enables debugging for Diameter-Credit Control Accounting. (Optional) Enables debugging output for the connection between two Diameter nodes. (Optional) Enables debugging output for Diameter errors. (Optional) Enables debugging output for Diameter data packets. (Optional) Enables debugging output for Diameter events. (Optional) Enables debugging output for the finite state machine. (Optional) Enables debugging output for Diameter redundancy.
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to display information about any of the listed classes of information about the Diameter Protocol.
Examples
The following examples show output from the debug diameter command:
Peer configuration and peer connection after a peer is configured
Router# debug diameter all *May 9 17:58:14.832: Dia Base: Diameter Peer configured. Allocate connection context. *May 9 17:58:14.832: Dia Base: Allocate the peer connection context 50F63888, handle C000000C *May 9 17:58:14.832: Dia Base: (C000000C): Received peer configuration event *May 9 17:58:14.832: Dia Peer FSM (50F63888): input event START in state CLOSED *May 9 17:58:14.832: Dia Peer FSM (50F63888): Starting Connection timer *May 9 17:58:14.832: Dia Peer FSM (50F63888): event START, state CLOSED-->WAIT_CONN_ACK *May 9 17:58:14.836: Dia Transport: socket 0 - connecting to 9.113.33.6 (3868) *May 9 17:58:14.836: Dia Transport: socket 0 - connection in progress *May 9 17:58:14.836: Dia Transport: socket 0 - local address 9.113.33.5
DB-569
(49214) *May 9 17:58:14.836: Dia Transport: socket 0 - resume socket write - nothing to write *May 9 17:58:14.836: Dia Base: (C000000C): Received peer connection event from transport *May 9 17:58:14.836: Dia Peer FSM (50F63888): input event RCV_CONN_ACK in state WAIT_CONN_ACK *May 9 17:58:14.836: Dia Base: Sending diameter message to peer "Unknown" *May 9 17:58:14.836: DIAMETER: CER message, ver=1, len=120, app=0, [2328318322/2328318322] *May 9 17:58:14.836: DIAMETER: Origin-host-name [264] "host" (M) *May 9 17:58:14.836: DIAMETER: Origin-Realm [296] "cisco" (M) *May 9 17:58:14.836: DIAMETER: Host-IP-address [257] 9.113.33.5 (M) *May 9 17:58:14.836: DIAMETER: Vendor-ID [266] 9 (M) *May 9 17:58:14.836: DIAMETER: Product-name [269] "C7200-G8IS-M" *May 9 17:58:14.836: DIAMETER: Auth-Application-ID [258] 4 (M) *May 9 17:58:14.836: DIAMETER: Firmware-Revision [267] 1 50D0B710: 01000078 80000101 00000000 ...x........ 50D0B720: 8AC75172 8AC75172 00000108 4000000C .GQr.GQr....@... 50D0B730: 686F7374 00000128 4000000D 63697363 host...(@...cisc 50D0B740: 6F000000 00000101 4000000E 00010971 [email protected] 50D0B750: 21050000 0000010A 4000000C 00000009 !.......@....... 50D0B760: 0000010D 00000014 43373230 302D4738 ........C7200-G8 50D0B770: 49532D4D 00000102 4000000C 00000004 IS-M....@....... 50D0B780: 0000010B 0000000C 00000001 00 ............. *May 9 17:58:14.836: Dia Base: Request message hash ctx created for [2328318322/2328318322] *May 9 17:58:14.836: Dia Peer FSM (50F63888): Starting CER timer *May 9 17:58:14.836: Dia Peer FSM (50F63888): event RCV_CONN_ACK, state WAIT_CONN_ACK-->WAIT_CEA *May 9 17:58:14.836: Dia Transport: Dia Transport write message event *May 9 17:58:14.836: Dia Transport: socket 0 - complete msg sent *May 9 17:58:14.840: Dia Transport: socket 0 - complete read of 20 bytes *May 9 17:58:14.840: Dia Transport: complete header read from socket 0 *May 9 17:58:14.840: Dia Transport: read msg (172) bytes from socket 0 *May 9 17:58:14.840: Dia Transport: socket 0 complete read of 172 bytes *May 9 17:58:14.840: Dia Base: Diameter message received from the peer "Unknown" *May 9 17:58:14.840: DIAMETER: CEA message, ver=1, len=192, app=0, [2328318322/2328318322] *May 9 17:58:14.840: DIAMETER: Result-code [268] 2001 (M) *May 9 17:58:14.840: DIAMETER: Origin-host-name [264] "diameter2.cisco.com" (M) *May 9 17:58:14.840: DIAMETER: Origin-Realm [296] "cisco.com" (M) *May 9 17:58:14.840: DIAMETER: Host-IP-address [257] 10.77.154.80 (M) *May 9 17:58:14.840: DIAMETER: Vendor-ID [266] 9 (M) *May 9 17:58:14.840: DIAMETER: Product-name [269] "Diameter-Server" *May 9 17:58:14.840: DIAMETER: Supported-Vendor-ID [265] 10415 (M) *May 9 17:58:14.840: DIAMETER: Supported-Vendor-ID [265] 12645 (M) *May 9 17:58:14.840: DIAMETER: Supported-Vendor-ID [265] 9 (M) *May 9 17:58:14.840: DIAMETER: Supported-Vendor-ID [265] 9 (M)
DB-570
December 2010
*May 9 17:58:14.840: DIAMETER: Auth-Application-ID [258] 4 (M) 65940780: 010000C0 00000101 00000000 ...@........ 65940790: 8AC75172 8AC75172 0000010C 4000000C .GQr.GQr....@... 659407A0: 000007D1 00000108 4000001B 6469616D [email protected] 659407B0: 65746572 322E6369 73636F2E 636F6D00 eter2.cisco.com. 659407C0: 00000128 40000011 63697363 6F2E636F ...(@...cisco.co 659407D0: 6D000000 00000101 4000000E 00010A4D [email protected] 659407E0: 9A500000 0000010A 4000000C 00000009 .P......@....... 659407F0: 0000010D 00000017 4469616D 65746572 ........Diameter 65940800: 2D536572 76657200 00000109 4000000C -Server.....@... 65940810: 000028AF 00000109 4000000C 00003165 ..(/[email protected] 65940820: 00000109 4000000C 00000009 00000109 ....@........... 65940830: 4000000C 00000009 00000102 4000000C @...........@... 65940840: 00000004 00 ..... *May 9 17:58:14.840: Dia Base: Request message hash ctx removed for [2328318322/2328318322] *May 9 17:58:14.840: Dia Base: (C000000C): Received msg event from message i/o *May 9 17:58:14.840: Dia Peer FSM (50F63888): input event RCV_CEA in state WAIT_CEA *May 9 17:58:14.840: Dia Peer FSM (50F63888): Starting Watchdog timer *May 9 17:58:14.840: %DIABASE-4-DIA_PEER_UP: Diameter peer 9.113.33.6 port 3868 TCP UP *May 9 17:58:14.840: Dia Peer FSM (50F63888): event RCV_CEA, state WAIT_CEA-->OPEN
DB-571
*May 9 17:59:14.840: DIAMETER: Origin-Realm [296] "cisco.com" (M) 65940780: 01000050 00000118 00000000 ...P........ 65940790: 8AC75173 8AC75173 0000010C 4000000C .GQs.GQs....@... 659407A0: 000007D1 00000108 4000001B 6469616D [email protected] 659407B0: 65746572 322E6369 73636F2E 636F6D00 eter2.cisco.com. 659407C0: 00000128 40000011 63697363 6F2E636F ...(@...cisco.co 659407D0: 6D000000 00 m.... *May 9 17:59:14.840: Dia Base: Request message hash ctx removed for [2328318323/2328318323] *May 9 17:59:14.840: Dia Base: (C000000C): Received msg event from message i/o *May 9 17:59:14.840: Dia Peer FSM (50F63888): input event RCV_DWA in state OPEN *May 9 17:59:14.840: Dia Peer FSM (50F63888): Starting Watchdog timer *May 9 17:59:14.840: Dia Peer FSM (50F63888): event RCV_DWA, state OPEN-->OPEN
DB-572
December 2010
*May 9 18:05:02.812: Dia Base: Sending diameter message to peer "diameter2.cisco.com" *May 9 18:05:02.812: DIAMETER: DPR message, ver=1, len=60, app=0, [2328318329/2328318329] *May 9 18:05:02.812: DIAMETER: Origin-host-name [264] "host" (M) *May 9 18:05:02.816: DIAMETER: Origin-Realm [296] "cisco" (M) *May 9 18:05:02.816: DIAMETER: Peer-disconnect-reason [273] Server-do-not-want-to-talk (M) 653D1810: 0100003C 8000011A ...<.... 653D1820: 00000000 8AC75179 8AC75179 00000108 .....GQy.GQy.... 653D1830: 4000000C 686F7374 00000128 4000000D @...host...(@... 653D1840: 63697363 6F000000 00000111 4000000C cisco.......@... 653D1850: 00000002 00 ..... *May 9 18:05:02.816: Dia Base: Request message hash ctx created for [2328318329/2328318329] *May 9 18:05:02.816: Dia Peer FSM (50F63888): Starting DPR timer *May 9 18:05:02.816: Dia Peer FSM (50F63888): event STOP, state OPEN-->CLOSING *May 9 18:05:02.816: Dia Transport: Dia Transport write message event *May 9 18:05:02.816: Dia Transport: socket 0 - complete msg sent *May 9 18:05:02.816: Dia Transport: socket 0 - complete read of 20 bytes *May 9 18:05:02.816: Dia Transport: complete header read from socket 0 *May 9 18:05:02.816: Dia Transport: read msg (60) bytes from socket 0 *May 9 18:05:02.816: Dia Transport: socket 0 - complete read of 60 bytes *May 9 18:05:02.816: Dia Base: Diameter message received from the peer "diameter2.cisco.com" *May 9 18:05:02.816: DIAMETER: DPA message, ver=1, len=80, app=0, [2328318329/2328318329] *May 9 18:05:02.816: DIAMETER: Result-code [268] 2001 (M) *May 9 18:05:02.816: DIAMETER: Origin-host-name [264] "diameter2.cisco.com" (M) *May 9 18:05:02.816: DIAMETER: Origin-Realm [296] "cisco.com" (M) 65913A20: 01000050 ...P 65913A30: 0000011A 00000000 8AC75179 8AC75179 .........GQy.GQy 65913A40: 0000010C 4000000C 000007D1 00000108 [email protected].... 65913A50: 4000001B 6469616D 65746572 322E6369 @...diameter2.ci 65913A60: 73636F2E 636F6D00 00000128 40000011 sco.com....(@... 65913A70: 63697363 6F2E636F 6D000000 00 cisco.com.... *May 9 18:05:02.816: Dia Base: Request message hash ctx removed for [2328318329/2328318329] *May 9 18:05:02.816: Dia Base: (C000000C): Received msg event from message i/o *May 9 18:05:02.816: Dia Peer FSM (50F63888): input event RCV_DPA in state CLOSING *May 9 18:05:02.816: Dia Base: (C000000C): Free the peer connection context 50F63888
Related Commands
DB-573
debug dlsw
To enable debugging of data-link switching plus (DLSw+), use the debug dlsw command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug dlsw [border-peers [interface interface | ip address ip-address] | core [flow-control messages | state | xid] [circuit-number] | local-circuit circuit-number | peers [interface interface [fast-errors | fast-paks] | ip address ip-address [fast-errors | fast-paks | fst-seq | udp]] | reachability [error | verbose] [sna | netbios] no debug dlsw [border-peers [interface interface | ip address ip-address] | core [flow-control messages | state | xid] [circuit-number] | local-circuit circuit-number | peers [interface interface [fast-errors | fast-paks] | ip address ip-address [fast-errors | fast-paks | fst-seq | udp]] | reachability [error | verbose] [sna | netbios]
Syntax Description
(Optional) Enables debugging output for border peer events. (Optional) Specifies a remote peer to debug by a direct interface. (Optional) Specifies a remote peer to debug by its IP address. (Optional) Enables debugging output for DLSw core events. (Optional) Enables debugging output for congestion in the WAN or at the remote end station. (Optional) Enables debugging output of core messagesspecific packets received by DLSw either from one of its peers or from a local medium via the Cisco link services interface. (Optional) Enables debugging output for state changes on the circuit. (Optional) Enables debugging output for the exchange identification state machine. (Optional) Specifies the circuit for which you want core debugging output to reduce the output. (Optional) Enables debugging output for circuits performing local conversion. Local conversion occurs when both the input and output data-link connections are on the same local peer and no remote peer exists. (Optional) Enables debugging output for peer events. (Optional) Debugs errors for fast-switched packets. (Optional) Debugs fast-switched packets. (Optional) Debugs Fast-Sequenced Transport (FST) sequence numbers on fast switched packets. (Optional) Debugs User Datagram Protocol (UDP) packets. (Optional) Enables debugging output for reachability events (explorer traffic). If no options are specified, event-level information is displayed for all protocols.
DB-574
December 2010
error | verbose
(Optional) Specifies how much reachability information you want displayed. The verbose keyword displays everything, including errors and events. The error keyword displays error information only. If no option is specified, event-level information is displayed. (Optional) Specifies that reachability information be displayed for only Systems Network Architecture (SNA) or Network Basic Input/Output System (NetBIOS) protocols. If no option is specified, information for all protocols is displayed.
sna | netbios
Usage Guidelines
When you specify no optional keywords, the debug dlsw command enables all available DLSW debugging output. Normally you need to use only the error or verbose option of the debug dlsw reachability command to help identify problems. The error option is recommended for use by customers and provides a subset of the messages from the normal event-level debugging. The verbose option provides a very detailed view of events, and is typically used only by service personnel. To reduce the amount of debug information displayed, use the sna or netbios option with the debug dlsw reachability command if you know that you have an SNA or NetBIOS problem. The DLSw core is the engine that is responsible for the establishment and maintenance of remote circuits. If possible, specifying the index of the specific circuit you want to debug reduces the amount of output displayed. However, if you want to watch a circuit initially come up, do not use the circuit-number option with the core keyword. The core flow-control option provides information about congestion in the WAN or at the remote end station. In these cases, DLSw sends Receiver Not Ready (RNR) frames on its local circuits, slowing data traffic on established sessions and giving the congestion an opportunity to clear. The core state option allows you to see when the circuit changes state. This capability is especially useful for determining why a session cannot be established or why a session is being disconnected. The core XID option allows you to track the exchange identification (XID)-state machine. The router tracks XID commands and responses used in negotiations between end stations before establishing a session.
Examples
The following examples show and explain some of the typical DLSw debugging messages you might see when using the debug dlsw command. The following example enables UDP packet debugging for a specific remote peer:
Router# debug dlsw peers ip-address 1.1.1.6 udp
The following message is sample output from the debug dlsw border-peers command:
*Mar *Mar *Mar *Mar 10 10 10 10 17:39:56: 17:39:56: 17:40:19: 17:40:22: CSM: delete group mac cache for group 0 CSM: delete group name cache for group 0 CSM: update group cache for mac 0000.3072.1070, group 10 DLSw: send_to_group_members(): copy to peer 10.19.32.5
DB-575
DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw:
START-TPFSM (peer 10.3.8.7(2065)): event:TCP-WR PIPE OPENED state:WAIT_WR dtp_action_f() start read open timer for peer 10.3.8.7(2065) END-TPFSM (peer 10.3.8.7(2065)): state:WAIT_WR->WAIT_RD passive open 10.3.8.7(11004) -> 2065 START-TPFSM (peer 10.3.8.7(2065)): event:TCP-RD PIPE OPENED state:WAIT_RD dtp_action_g() read pipe opened for peer 10.3.8.7(2065) CapExId Msg sent to peer 10.3.8.7(2065) END-TPFSM (peer 10.3.8.7(2065)): state:WAIT_RD->WAIT_CAP START-TPFSM (peer 10.3.8.7(2065)): event:SSP-CAP MSG RCVD state:WAIT_CAP dtp_action_j() cap msg rcvd from peer 10.3.8.7(2065) Recv CapExId Msg from peer 10.3.8.7(2065) Pos CapExResp sent to peer 10.3.8.7(2065) END-TPFSM (peer 10.3.8.7(2065)): state:WAIT_CAP->WAIT_CAP START-TPFSM (peer 10.3.8.7(2065)): event:SSP-CAP MSG RCVD state:WAIT_CAP dtp_action_j() cap msg rcvd from peer 10.3.8.7(2065) Recv CapExPosRsp Msg from peer 10.3.8.7(2065) END-TPFSM (peer 10.3.8.7(2065)): state:WAIT_CAP->WAIT_CAP Processing delayed event:SSP-CAP EXCHANGED - prev state:WAIT_CAP START-TPFSM (peer 10.3.8.7(2065)): event:SSP-CAP EXCHANGED state:WAIT_CAP dtp_action_k() cap xchged for peer 10.3.8.7(2065) closing read pipe tcp connection for peer 10.3.8.7(2065) END-TPFSM (peer 10.3.8.7(2065)): state:WAIT_CAP->PCONN_WT Processing delayed event:TCP-PEER CONNECTED - prev state:PCONN_WT START-TPFSM (peer 10.3.8.7(2065)): event:TCP-PEER CONNECTED state:PCONN_WT dtp_action_m() peer connected for peer 10.3.8.7(2065) END-TPFSM (peer 10.3.8.7(2065)): state:PCONN_WT->CONNECT START-TPFSM (peer 10.3.8.7(2065)): event:CORE-ADD CIRCUIT state:CONNECT dtp_action_u(), peer add circuit for peer 10.3.8.7(2065) END-TPFSM (peer 10.3.8.7(2065)): state:CONNECT->CONNECT
DB-576
December 2010
DLSw: START-TPFSM (peer 10.10.10.4(2065)): event:CORE-ADD CIRCUIT state:CONNECT DLSw: dtp_action_u(), peer add circuit for peer 10.10.10.4(2065) DLSw: END-TPFSM (peer 10.10.10.4(2065)): state:CONNECT->CONNECT
DB-577
DLSw: Peer Received : CLSI Msg : CONNECT.Cfm CLS_OK dlen: 28 DLSw: START-LLC2PFSM (peer on interface Serial1): event:CLS-CONNECT.CNF state:CON_PEND DLSw: dllc2p_action_e() send capabilities to peer on interface Serial1 PEER-DISP Sent : CLSI Msg : SIGNAL_STN.Req dlen: 8 PEER-DISP Sent : CLSI Msg : DATA.Req dlen: 418 DLSw: CapExId Msg sent to peer on interface Serial1 DLSw: END-LLC2PFSM (peer on interface Serial1): state:CON_PEND->WAIT_CAP DLSw: Peer Received : CLSI Msg : DATA.Ind dlen: 418 DLSw: START-LLC2PFSM (peer on interface Serial1): event:SSP-CAP MSG RCVD state:WAIT_CAP DLSw: dllc2p_action_k() cap msg rcvd for peer on interface Serial1 DLSw: Recv CapExId Msg from peer on interface Serial1 PEER-DISP Sent : CLSI Msg : DATA.Req dlen: 96 DLSw: Pos CapExResp sent to peer on interface Serial1 DLSw: END-LLC2PFSM (peer on interface Serial1): state:WAIT_CAP->WAIT_CAP DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: Peer Received : CLSI Msg : DATA.Ind dlen: 96 START-LLC2PFSM (peer on interface Serial1): event:SSP-CAP MSG RCVD state:WAIT_CAP dllc2p_action_k() cap msg rcvd for peer on interface Serial1 Recv CapExPosRsp Msg from peer on interface Serial1 END-LLC2PFSM (peer on interface Serial1): state:WAIT_CAP->WAIT_CAP Processing delayed event:SSP-CAP EXCHANGED - prev state:WAIT_CAP START-LLC2PFSM (peer on interface Serial1): event:SSP-CAP EXCHANGED state:WAIT_CAP dllc2p_action_l() cap xchged for peer on interface Serial1 END-LLC2PFSM (peer on interface Serial1): state:WAIT_CAP->CONNECT
The following message is from a router that received a Logical Link Control, type 2 (LLC2) connection:
DLSw-LLC2: Sending enable port ; port no : 0 PEER-DISP Sent : CLSI Msg : ENABLE.Req dlen: 20 DLSw: Peer Received : CLSI Msg : ENABLE.Cfm CLS_OK dlen: DLSw-LLC2 : Sending activate sap for Serial0 - port_id = port_type = 7 dgra(UsapID) = 93AB34 PEER-DISP Sent : CLSI Msg : ACTIVATE_SAP.Req dlen: 60 DLSw: Peer Received : CLSI Msg : ACTIVATE_SAP.Cfm CLS_OK DLSw Got ActSapcnf back for Serial0 - port_id = 8944700,
20 887C3C
DLSw: Peer Received : CLSI Msg : CONECT_STN.Ind dlen: 39 DLSw: START-LLC2PFSM (peer on interface Serial0): event:CLS-CONNECT_STN.IND state:DISCONN DLSw: dllc2p_action_s() conn_stn for peer on interface Serial0 PEER-DISP Sent : CLSI Msg : REQ_OPNSTN.Req dlen: 106 DLSw: END-LLC2PFSM (peer on interface Serial0): state:DISCONN->CONS_PEND DLSw: Peer Received : CLSI Msg : REQ_OPNSTN.Cfm CLS_OK dlen: 106 DLSw: START-LLC2PFSM (peer on interface Serial0): event:CLS-REQOPNSTN.CNF state:CONS_PEND DLSw: dllc2p_action_h() send capabilities to peer on interface Serial0 PEER-DISP Sent : CLSI Msg : CONNECT.Rsp dlen: 20 PEER-DISP Sent : CLSI Msg : DATA.Req dlen: 418 DLSw: CapExId Msg sent to peer on interface Serial0 DLSw: END-LLC2PFSM (peer on interface Serial0): state:CONS_PEND->WAIT_CAP DLSw: Peer Received : CLSI Msg : CONNECTED.Ind dlen: 8 DLSw: START-LLC2PFSM (peer on interface Serial0): event:CLS-CONNECTED.IND state:WAIT_CAP DLSw: END-LLC2PFSM (peer on interface Serial0): state:WAIT_CAP->WAIT_CAP DLSw: Peer Received : CLSI Msg : DATA.Ind dlen: 418 DLSw: START-LLC2PFSM (peer on interface Serial0): event:SSP-CAP MSG RCVD state:WAIT_CAP DLSw: dllc2p_action_k() cap msg rcvd for peer on interface Serial0 DLSw: Recv CapExId Msg from peer on interface Serial0 PEER-DISP Sent : CLSI Msg : DATA.Req dlen: 96 DLSw: Pos CapExResp sent to peer on interface Serial0 DLSw: END-LLC2PFSM (peer on interface Serial0): state:WAIT_CAP->WAIT_CAP
DB-578
December 2010
Peer Received : CLSI Msg : DATA.Ind dlen: 96 START-LLC2PFSM (peer on interface Serial0): event:SSP-CAP MSG RCVD state:WAIT_CAP dllc2p_action_k() cap msg rcvd for peer on interface Serial0 Recv CapExPosRsp Msg from peer on interface Serial0 END-LLC2PFSM (peer on interface Serial0): state:WAIT_CAP->WAIT_CAP Processing delayed event:SSP-CAP EXCHANGED - prev state:WAIT_CAP START-LLC2PFSM (peer on interface Serial0): event:SSP-CAP EXCHANGED state:WAIT_CAP dllc2p_action_l() cap xchged for peer on interface Serial0 END-LLC2PFSM (peer on interface Serial0): state:WAIT_CAP->CONNECT
The following messages occur when a CUR_ex (CANUREACH explorer) frame is received from other peers, and the peer statements or the promiscuous keyword have not been enabled so that the router is not configured correctly:
22:42:44: DLSw: Not promiscuous - Rej conn from 172.20.96.1(2065) 22:42:51: DLSw: Not promiscuous - Rej conn from 172.20.99.1(2065)
In the following messages, the router sends a keepalive message every 30 seconds to keep the peer connected. If three keepalive messages are missed, the peer is torn down. These messages are displayed only if keepalives are enabled (by default, keepalives are disabled):
22:44:03: 22:44:03: 22:44:34: 22:44:34: DLSw: DLSw: DLSw: DLSw: Keepalive Keepalive Keepalive Keepalive Request sent to peer 172.20.98.1(2065) (168243148) Response from peer 172.20.98.1(2065) (168243176) Request sent to peer 172.20.98.1(2065) (168274148) Response from peer 172.20.98.1(2065) (168274172)
The following peer debugging messages indicate that the local peer is disconnecting from the specified remote peer because of missed peer keepalives:
0:03:24: 0:03:24: 0:03:24: 0:03:24: DLSw: DLSw: DLSW: DLSw: keepalive failure for peer on interface Serial0 action_d(): for peer on interface Serial0 DIRECT aborting connection for peer on interface Serial0 peer on interface Serial0, old state CONNECT, new state DISCONN
The following peer debugging messages result from an attempt to connect to an IP address that does not have DLSw enabled. The local router attempts to connect in 30-second intervals:
23:13:22: 23:13:22: 23:13:22: 23:13:52: 23:13:52: 23:13:52: action_a() attempting to connect peer 172.20.100.1(2065) DLSw: CONN: peer 172.20.100.1 open failed, rejected [9] action_a() retries: 8 next conn time: 861232504 action_a() attempting to connect peer 172.20.100.1(2065) DLSw: CONN: peer 172.20.100.1 open failed, rejected [9] action_a() retries: 9 next conn time: 861292536
The following peer debugging messages that indicates a remote peer statement is missing on the router (address 172.20.100.1) to which the connection attempt is sent:
23:14:52: 23:14:52: 23:14:52: 23:14:52: 23:14:52: 23:14:52: 23:14:52: action_a() attempting to connect peer 172.20.100.1(2065) DLSw: action_a(): Write pipe opened for peer 172.20.100.1(2065) DLSw: peer 172.20.100.1(2065), old state DISCONN, new state WAIT_RD DLSw: dlsw_tcpd_fini() closing connection for peer 172.20.100.1 DLSw: action_d(): for peer 172.20.100.1(2065) DLSw: aborting tcp connection for peer 172.20.100.1(2065) DLSw: peer 172.20.100.1(2065), old state WAIT_RD, new state DISCONN
The following messages show a peer connection opening with no errors or abnormal events:
23:16:37: 23:16:37: 23:16:37: 23:16:37: 23:16:37: 23:16:37: action_a() attempting to connect peer 172.20.100.1(2065) DLSw: action_a(): Write pipe opened for peer 172.20.100.1(2065) DLSw: peer 172.20.100.1(2065), old state DISCONN, new state WAIT_RD DLSW: passive open 172.20.100.1(17762) -> 2065 DLSw: action_c(): for peer 172.20.100.1(2065) DLSw: peer 172.20.100.1(2065), old state WAIT_RD, new state CAP_EXG
DB-579
23:16:37: 23:16:37: 23:16:37: 23:16:37: 23:16:37: 23:16:37: 23:16:37: 23:16:37: 23:16:37: 23:16:37: 23:16:37: 23:16:38:
DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw: DLSw:
peer 172.20.100.1(2065) conn_start_time set to 861397784 CapExId Msg sent to peer 172.20.100.1(2065) Recv CapExId Msg from peer 172.20.100.1(2065) Pos CapExResp sent to peer 172.20.100.1(2065) action_e(): for peer 172.20.100.1(2065) Recv CapExPosRsp Msg from peer 172.20.100.1(2065) action_e(): for peer 172.20.100.1(2065) peer 172.20.100.1(2065), old state CAP_EXG, new state CONNECT dlsw_tcpd_fini() closing write pipe for peer 172.20.100.1 action_g(): for peer 172.20.100.1(2065) closing write pipe tcp connection for peer 172.20.100.1(2065) peer_act_on_capabilities() for peer 172.20.100.1(2065)
The following two messages show that an information frame is passing through the router:
DLSw: dlsw_tr2fct() lmac:c000.a400.0000 rmac:0800.5a29.75fe ls:5 rs:4 i:34 DLSw: dlsw_tr2fct() lmac:c000.a400.0000 rmac:0800.5a29.75fe ls:4 rs:4 i:34
Reachability is stored in cache. DLSw+ maintains two reachability caches: one for MAC addresses and one for NetBIOS names. Depending on how long entries have been in the cache, they are either fresh or stale. If a router has a fresh entry in the cache for a certain resource, it answers a locate request for that resource without verifying that it is still available. A locate request is typically a TEST frame for MAC addresses or a FIND_NAME_QUERY for NetBIOS. If a router has a stale entry in the cache for a certain resource, it verifies that the entry is still valid before answering a locate request for the resource by sending a frame to the last known location of the resource and waits for a resource. If the entry is a REMOTE entry, the router sends a CUR_ex frame to the remote peer to verify. If the entry is a LOCAL entry, it sends either a TEST frame or a NetBIOS FIND_NAME_QUERY on the appropriate local port. By default, all reachability cache entries remain fresh for 4 minutes after they are learned. For MAC addresses, you can change this time with the dlsw timer sna-verify-interval command. For NetBIOS names, you can change this time with the dlsw timer netbios-verify-interval command. By default, all reachability cache entries age out of the cache 16 minutes after they are learned. For MAC addresses, you can change this time with the dlsw timer sna-cache-timeout command. For NetBIOS names, you can change the time with the dlsw timer netbios-cache-timeout command.
Table 77 describes the debug output indicating that the DLSW router received an SSP message that is flow controlled and should be counted against the window of the sender.
Dec 6 11:26:49: CSM: Received SSP CUR csex flags = 80, mac 4000.90b1.26cf, The csex flags = 80 means that this is an CUR_ex (explorer). Dec 5 10:48:33: DLSw: 1620175180 decr r - s:27 so:0 r:27 ro:0
Table 77
Field decr r s so
Description Decrement received count. This DLSW routers granted units for the circuit. 0=This DLSW router does not owe a flow control acknowledgment. 1=This router owes a flow control acknowledgment.
DB-580
December 2010
Table 77
Field r ro
Description Partners number of granted units for the circuit. Indicates whether the partner owes flow control acknowledgment.
The following message shows that DLSW received the I frame from the LAN:
Dec 5 10:48:35: DLSW Received-disp : CLSI Msg : DATA.Ind dlen: 4
The next group of messages show that the DLSW reachability cache is added, and that a name query is perform from the router MARIAN:
23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:11: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: core_to_csm CLSI_MSG_PROC - port_id 5EFBB4 0800.5a30.7a9b passes local mac excl. filter update local cache for mac 0800.5a30.7a9b, port 5EFBB4 update local cache for name MARIAN , port 5EFBB4 Received CLS_UDATA_STN from Core Received netbios frame type A Processing Name Query Netbios Name Query: ws_status = 6 Write to peer 0 ok. Freeing clsi message core_to_csm CLSI_MSG_PROC - port_id 658AB4 0800.5a30.7a9b passes local mac excl. filter update local cache for mac 0800.5a30.7a9b, port 658AB4 update local cache for name MARIAN , port 658AB4 Received CLS_UDATA_STN from Core Received netbios frame type A Processing Name Query Netbios Name Query: ws_status = 5 DLXNR_PEND match found.... drop name query Freeing clsi message core_to_csm CLSI_MSG_PROC - port_id 5EFBB4 0800.5a30.7a9b passes local mac excl. filter update local cache for mac 0800.5a30.7a9b, port 5EFBB4 update local cache for name MARIAN , port 5EFBB4 Received CLS_UDATA_STN from Core Received netbios frame type A Processing Name Query Netbios Name Query: ws_status = 5 DLXNR_PEND match found.... drop name query Freeing clsi message core_to_csm CLSI_MSG_PROC - port_id 658AB4 0800.5a30.7a9b passes local mac excl. filter update local cache for mac 0800.5a30.7a9b, port 658AB4 update local cache for name MARIAN , port 658AB4
DB-581
23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:12: 23:45:18: 23:45:18: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38:
CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM:
Received CLS_UDATA_STN from Core Received netbios frame type A Processing Name Query Netbios Name Query: ws_status = 5 DLXNR_PEND match found.... drop name query Freeing clsi message core_to_csm CLSI_MSG_PROC - port_id 5EFBB4 0800.5a30.7a9b passes local mac excl. filter update local cache for mac 0800.5a30.7a9b, port 5EFBB4 update local cache for name MARIAN , port 5EFBB4 Received CLS_UDATA_STN from Core Received netbios frame type A Processing Name Query Netbios Name Query: ws_status = 5 DLXNR_PEND match found.... drop name query Freeing clsi message core_to_csm CLSI_MSG_PROC - port_id 658AB4 0800.5a30.7a9b passes local mac excl. filter update local cache for mac 0800.5a30.7a9b, port 658AB4 update local cache for name MARIAN , port 658AB4 Received CLS_UDATA_STN from Core Received netbios frame type A Processing Name Query Netbios Name Query: ws_status = 5 DLXNR_PEND match found.... drop name query Freeing clsi message Deleting Reachability cache Deleting DLX NR pending record.... core_to_csm CLSI_MSG_PROC - port_id 5EFBB4 0800.5a30.7a9b passes local mac excl. filter update local cache for mac 0800.5a30.7a9b, port 5EFBB4 update local cache for name MARIAN , port 5EFBB4 Received CLS_UDATA_STN from Core Received netbios frame type 8 Write to peer 0 ok. Freeing clsi message core_to_csm CLSI_MSG_PROC - port_id 658AB4 0800.5a30.7a9b passes local mac excl. filter update local cache for mac 0800.5a30.7a9b, port 658AB4 update local cache for name MARIAN , port 658AB4 Received CLS_UDATA_STN from Core Received netbios frame type 8 Write to peer 0 ok. Freeing clsi message
The following messages show that the router named MARIAN is added to the network:
23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: 23:45:38: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: CSM: core_to_csm CLSI_MSG_PROC - port_id 5EFBB4 0800.5a30.7a9b passes local mac excl. filter update local cache for mac 0800.5a30.7a9b, port 5EFBB4 update local cache for name MARIAN , port 5EFBB4 Received CLS_UDATA_STN from Core Received netbios frame type 8 Write to peer 0 ok. Freeing clsi message core_to_csm CLSI_MSG_PROC - port_id 658AB4 0800.5a30.7a9b passes local mac excl. filter update local cache for mac 0800.5a30.7a9b, port 658AB4 update local cache for name MARIAN , port 658AB4 Received CLS_UDATA_STN from Core Received netbios frame type 8 Write to peer 0 ok. Freeing clsi message
DB-582
December 2010
In the next group of messages, an attempt is made to add the router named GINGER on the Ethernet interface:
0:07:44: 0:07:44: 0:07:44: 0:07:44: 0:07:44: 0:07:44: 0:07:44: CSM: CSM: CSM: CSM: CSM: CSM: CSM: core_to_csm CLSI_MSG_PROC - port_id 658AB4 0004.f545.24e6 passes local mac excl. filter update local cache for mac 0004.f545.24e6, port 658AB4 update local cache for name GINGER , port 658AB4 Received CLS_UDATA_STN from Core Received netbios frame type 8 Write to peer 0 ok.
In the following example, the output from the show dlsw reachability command indicates that GINGER is on the Ethernet interface and MARIAN is on the Token Ring interface:
Router# show dlsw reachability DLSw MAC address reachability cache list Mac Addr status Loc. peer/port 0004.f545.24e6 FOUND LOCAL P007-S000 0800.5a30.7a9b FOUND LOCAL P000-S000 P007-S000 DLSw NetBIOS Name reachability cache list NetBIOS Name status Loc. peer/port GINGER FOUND LOCAL P007-S000 MARIAN FOUND LOCAL P000-S000 P007-S000
DB-583
In release 12.3(8)T, the debug dmsp doc-to-fax command is replaced by the debug fax dmsp command. See the debug fax dmsp command for more information. To display debugging messages for the doc Media Service Provider (docMSP) TIFF or text2Fax engine, use the debug dmsp doc-to-fax command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug dmsp doc-to-fax [text-to-fax | tiff-reader] no debug dmsp doc-to-fax [text-to-fax | tiff-reader]
Syntax Description
text-to-fax tiff-reader
(Optional) Displays debugging messages that occur while the DocMSP Component is receiving text packets and producing T4 fax data. (Optional) Displays debugging messages that occur while the DocMSP Component is receiving TIFF packets and producing T4 fax data.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 access server. This command was replaced by the debug fax dmsp command in the Cisco IOS 12.3T release. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug dmsp doc-to-fax command:
Router# debug dmsp doc-to-fax Jan Jan Jan Jan Jan Jan Jan 1 1 1 1 04:58:39.898: 04:58:39.902: 04:58:39.902: 04:58:39.902: docmsp_call_setup_request: callid=18 docmsp_call_setup_request(): ramp data dir=OFFRAMP, conf dir=SRC docmsp_caps_ind: call id=18, src=17 docmsp_bridge cfid=5, srccid=18, dstcid=17
1 04:58:39.902: docmsp_bridge(): ramp data dir=OFFRAMP, conf dir=SRC, encode out=2 1 04:58:39.902: docmsp_rcv_msp_ev: call id =18, evID = 42 1 04:58:39.902: docmsp_bridge cfid=6, srccid=18, dstcid=15
DB-584
December 2010
Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
04:58:39.902: 04:58:39.902: 04:58:39.902: 04:58:39.902: 04:58:39.922: 04:58:42.082: 04:58:42.082: 04:58:42.082: 04:58:42.102: 04:58:42.106: 04:58:42.106: 04:58:42.122: 04:58:42.126: 04:58:42.126: 04:58:42.142: 04:58:42.146:
docmsp_bridge(): ramp data dir=OFFRAMP, conf dir=DEST, encode out=2 docmsp_process_rcv_data: call id src=0, dst=18 docmsp_generate_page: docmsp_generate_page: new context for Call 18 docmsp_get_msp_event_buffer: docmsp_xmit: call id src=15, dst=18 docmsp_process_rcv_data: call id src=15, dst=18 offramp_data_process: docmsp_xmit: call id src=15, dst=18 docmsp_process_rcv_data: call id src=15, dst=18 offramp_data_process: docmsp_xmit: call id src=15, dst=18 docmsp_process_rcv_data: call id src=15, dst=18 offramp_data_process: docmsp_xmit: call id src=15, dst=18 docmsp_xmit: call id src=15, dst=18
Related Commands
DB-585
In release 12.3(8)T, the debug dmsp fax-to-doc command is replaced by the debug fax dmsp command. See the debug fax dmsp command for more information. To display debugging messages for doc MSP (docMSP) fax-to-doc, use the debug dmsp fax-to-doc command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug dmsp fax-to-doc [tiff-writer] no debug dmsp fax-to-doc [tiff-writer]
Syntax Description
tiff-writer
(Optional) Displays debug messages that occur while the DocMSP Component is receiving T4 fax data and producing TIFF packets.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 access server. This command was replaced by the debug fax dmsp command in the Cisco IOS 12.3T release. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug dmsp fax-to-doc command:
Router# debug dmsp fax-to-doc *Oct *Oct *Oct *Oct 16 16 16 16 08:29:54.487: 08:29:54.487: 08:29:54.487: 08:29:54.487: docmsp_call_setup_request: callid=22 docmsp_call_setup_request(): ramp data dir=OFFRAMP, conf dir=SRC docmsp_caps_ind: call id=22, src=21 docmsp_bridge cfid=15, srccid=22, dstcid=21
*Oct 16 08:29:54.487: docmsp_bridge(): ramp data dir=OFFRAMP, conf dir=SRC, encode out=2 *Oct 16 08:29:54.487: docmsp_bridge cfid=16, srccid=22, dstcid=17 *Oct *Oct *Oct *Oct *Oct 16 16 16 16 16 08:29:54.487: 08:29:54.487: 08:29:54.487: 08:29:54.487: 08:29:54.515: docmsp_bridge(): ramp data dir=OFFRAMP, conf dir=DEST, encode out=2 docmsp_xmit: call id src=17, dst=22 docmsp_process_rcv_data: call id src=17, dst=22 offramp_data_process: docmsp_get_msp_event_buffer:
DB-586
December 2010
16 16 16 16
docmsp_call_setup_request: callid=24 docmsp_call_setup_request(): ramp data dir=ONRAMP, conf dir=DEST docmsp_caps_ind: call id=24, src=20 docmsp_bridge cfid=17, srccid=24, dstcid=20
Related Commands
Description Displays debugging messages for the doc Media Service Provider TIFF or text2Fax engine.
DB-587
debug dmvpn
To display debug Dynamic Multipoint VPN (DMVPN) session information, use the debug dmvpn command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug dmvpn {all | error | detail | packet} {all | debug-type} no debug dmvpn {all | error | detail | packet} {all | debug-type}
Syntax Description
Enables all levels of debugging. Enables error-level debugging. Enables detail-level debugging. Enables packet-level debugging. Enables NHRP, sockets, tunnel protection, and crypto debugging. The type of debugging that you want to enable. The following keywords can be specified for the debug-type argument:
nhrp Enables Next Hop Resolution Protocol (NHRP) debugging only. crypto Enables crypto Internet Key Exchange (IKE) and IPsec debugging. tunnel Enables tunnel protection debugging. socket Enables crypto secure socket debugging.
The keywords can be used alone, or in any combination with each other, but each keyword can be used only once.
Command Default
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You must specify both the level and the type of debugging that you want to enable. The debugging levels are all, error, detail, or packet. You can enable NHRP, crypto Internet Key Exchange (IKE) and IPsec, tunnel protection, and crypto secure socket debugging at any of the four debugging levels.
DB-588
December 2010
To enable conditional DMVPN debugging, you must first specify the level and type of debugging that you want to enable, and then use the debug dmvpn condition command to specify the conditions that you want to enable.
Error-Level Debugging
When error-level debugging is enabled with the debug dmvpn error command, the following debugging commands are enabled by default:
debug crypto ipsec error debug crypto isakmp error debug nhrp error
Detail-Level Debugging
When detail-level debugging is enabled with the debug dmvpn detail command, the following debugging commands are enabled by default:
debug crypto ipsec debug crypto isakmp debug crypto sockets debug nhrp debug nhrp cache debug nhrp rate debug tunnel protection
Packet-Level Debugging
When packet-level debugging is enabled with the debug dmvpn packet command, the following debugging commands are enabled by default:
Note
Executing the debug dmvpn all command with a high number of active sessions may result in high CPU utilization and large data output.
Examples
The following example shows how to enable all debugging levels for DMVPN tunnel debugging:
Router# debug dmvpn all tunnel
Related Commands
Command debug crypto error debug crypto ipsec debug crypto isakmp debug dmvpn condition
Description Enables error debugging for a crypto area. Displays IPsec events. Displays messages about IKE events. Display conditional debug DMVPN session information.
DB-589
Description Enables NHRP conditional debugging. Displays NHRP error-level debugging information.
DB-590
December 2010
Syntax Description
unmatched peer nbma tunnel ipv4-address ipv6-address vrf vrf-name interface tunnel tunnel-interface
Specifies debugging when context information is not available. Specifies information for a specific DMVPN peer. Displays DMVPN information based on peer mapping nonbroadcast access (NBMA) address. Displays DMVPN information based on the peer virtual private network (VPN) address. The DMVPN peer IPv4 address. The DMVPN peer IPv6 address. Displays information based on the specified virtual routing and forwarding (VRF) name. The VRF name. Displays DMVPN information based on a specific interface. Specifies the tunnel address for a DMVPN peer. The tunnel interface number.
Command Default
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. The ipv6-address argument was added.
12.4(20)T
Usage Guidelines
Conditional debugging is enabled only after the DMVPN debugging type and level have been specified using the debug dmvpn command.
DB-591
Console Output
The following debug dmvpn commands do not have any console output on the Cisco 3845 and Cisco 7200 series routers:
debug dmvpn condition unmatched debug dmvpn condition peer debug dmvpn condition interface debug dmvpn condition vrf
Note
When the debug dmvpn condition unmatched command is enabled on the Cisco 3845 and Cisco 7200 series routers, issuing the show debugging command does not produce any console output.
Examples
The following example shows how to enable conditional DMVPN debugging for a specific peer NBMA address:
Router# debug dmvpn condition peer nbma 192.0.2.1
The following example shows how to enable conditional DMVPN debugging when context is not available to check against debugging conditions:
Router# debug dmvpn condition unmatched
The following example shows how to disable conditional debugging for a specific tunnel interface:
Router# no debug dmvpn condition interface tunnel 1
Related Commands
Command debug crypto error debug crypto ipsec debug crypto isakmp debug dmvpn debug nhrp condition debug nhrp error
Description Enables error debugging for a crypto area. Displays IPsec events. Displays messages about IKE events. Displays debug DMVPN session information. Enables NHRP conditional debugging. Displays NHRP error-level debugging information.
DB-592
December 2010
debug dot11
To enable debugging of radio functions, use the debug dot11 command in privileged EXEC mode. To stop or disable the debug operation, use the no form of this command. debug dot11 {events | forwarding | mgmt | packets | syslog | virtual-interface} no debug dot11 {events | forwarding | mgmt | packets | syslog | virtual-interface}
Syntax Descriptionn
Displays information about all radio-related events. Displays information about radio-forwarded packets. Displays information about radio access point management activity. Displays information about received or transmitted radio packets. Displays information about the radio system log. Displays information about radio virtual interfaces.
Command Default
Debugging is disabled.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following example shows how to enable debugging of all radio-related events:
Router# debug dot11 events
Related Commands
Description Enables debugging of dot11 AAA operations. Enables radio debug options.
DB-593
Syntax Descriptionn
accounting authenticator
Provides information about 802.11 AAA accounting packets. Provides information about MAC and Extensible Authentication Protocol (EAP) authentication packets. Use the following options to activate authenticator debugging:
allActivates debugging for all authenticator packets dispatcherActivates debugging for authentication request handler packets mac-authenActivates debugging for MAC authentication packets processActivates debugging for authenticator process packets rxdataActivates debugging for EAP over LAN (EAPOL) packets from client devices state-machineActivates debugging for authenticator state-machine packets txdataActivates debugging for EAPOL packets sent to client devices
dispatcher manager
Provides information about 802.11 AAA dispatcher (interface between association and manager) packets. Provides information about the AAA manager. Use these options to activate AAA manager debugging:
allActivates all AAA manager debugging dispatcherActivates debug information for AAA manager-authenticator dispatch traffic keysActivates debug information for AAA manager key processing rxdataActivates debugging for AAA manager packets received from client devices state-machineActivates debugging for AAA manager state-machine packets supplicantActivates debugging for Light Extensible Authentication Protocol (LEAP) supplicant packets txdataActivates debugging for AAA manager packets sent to client devices.
DB-594
December 2010
Command Default
Debugging is disabled.
Command Modes
Command History
Modification This command was introduced. This command was modified to include the accounting, authenticator, dispatcher, and manager debugging options. This command was integrated into Cisco IOS Release 12.4(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to display debugging information about dot11 AAA operations.
Examples
The following example shows how to activate debugging for 802.11 AAA accounting packets:
Router# debug dot11 aaa accounting
Related Commands
DB-595
Note
Syntax Description
events unit
Activates debugging of radio admission control events. Activates verbose debugging of radio admission control events.
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
This example shows how to begin debugging of all admission control radio-related events:
SOAP-AP# debug dot11 cac events
This example shows how to begin verbose debugging of all admission control radio-related events:
SOAP-AP# debug dot11 cac unit
This example shows how to stop debugging of all admission control radio-related events:
SOAP-AP# debug dot11 cac events
This example shows how to stop verbose debugging of all admission control radio-related events:
SOAP-AP# no debug dot11 cac unit
DB-596
December 2010
Related Commands
Command admin-traffic (SSID configuration mode) admit-traffic (QOS Class interface configuration mode) show debugging show dot11 ids eap traffic-stream
Description Enables CAC admission control for an SSID on the access point. Configures CAC admission control on the access point. Displays all debug settings and the debug packet headers Displays all CAC radio events on the access point. Configures CAC traffic data rates and priorities for a radio interface on the access point.
DB-597
Syntax Description
The radio interface. The 2.4-GHz radio is 0. The 5-GHz radio is 1. Configures the access point to simulate radar generation as part of Dynamic Frequency Selection (DFS). (Optional) Radio channel to move to. Range is from 24 to 161. Enables RF monitor mode. Use these options to turn on monitor modes:
accept-radio-firmware Configures the access point to disable checking the radio firmware version.
ackDisplays ACK packets. ACK packets acknowledge receipt of a signal, information, or packet. addressDisplays packets to or from the specified IP address beaconDisplays beacon packets crcDisplays packets with CRC errors linesSpecifies a print line count plcpDisplays Physical Layer Control Protocol (PLCP) packets printEnables RF monitor printing mode probeDisplays probe packets storeEnables RF monitor storage mode hexPrints entire packets without formatting ifPrints the in and out interfaces for packets ivPrints the packet Wired Equivalent Privacy (WEP) IV linesPrints the line count for the trace micPrints the Cisco Message Integrity Check (MIC) plcpDisplays the PLCP printfPrints using printf instead of buginf rawPrints without formatting data shortadrPrints MAC addresses in short form
DB-598
December 2010
stop-on-failure trace
Configures the access point to not restart when the radio driver fails. Enables trace mode. Use these options to turn on trace modes:
Command Default
Debugging is disabled.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
This example shows how to begin monitoring of all packets with CRC errors:
Router# debug dot11 dot11radio 0 monitor crc
Related Commands
Description Enables debugging of radio functions. Enables debugging of dot11 AAA operations.
DB-599
Note
Syntax Description
eap cipher-errors
Activates debugging of IDS authentication events Activates debugging of cipher errors detected by IDS
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
This example shows how to activate wireless IDS debugging for authentication events:
SOAP-AP# debug dot11 ids eap
Related Commands
Command dot11 ids eap attempts show debugging show dot11 ids eap
Description Configures limits on authentication attempts and EAPOL flooding on scanner access points in monitor mode Displays all debug settings and the debug packet headers Displays wireless IDS statistics
DB-600
December 2010
Syntax Description
Debugs MFP events on the access point. Debugs all MFP events. Debugs MFP detector key management events. Debugs high level MFP events. Debugs MFP generator key management events. Debugs MFP IO (generate or detect frame) events. Debugs MFP reporting events. Debugs MFP WDS statistics received from the detectors. Debugs MFP WDS events. Debugs MFP WLCCP messages.
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
This example shows how to debug the MFP detectors on the access point:
ap(config)# debug dot11 ids mfp ap detectors
Related Commands
Description Configures MFP parameters on the access point. Displays MFP parameters on the access point.
DB-601
debug dot1x
To display 802.1X debugging information, use the debug dot1x command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug dot1x [all | errors | events | feature | packets | redundancy | registry | state-machine] no debug dot1x [all | errors | events | feature | packets | redundancy | registry | state-machine]
Syntax Description
(Optional) Enables all 802.1X debugging messages. (Optional) Provides information about all 802.1X errors. (Optional) Provides information about all 802.1X events. (Optional) Provides information about 802.1X features for switches only. (Optional) Provides information about all 802.1X packets. (Optional) Provides information about 802.1X redundancy. (Optional) Provides information about 802.1X registries. (Optional) Provides information regarding the 802.1X state machine.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The authsm, backend, besm, core, and reauthsm keywords were removed. The errors, events, packets, registry, and state-machine keywords were added. This command was integrated into Cisco IOS Release 12.3(2)XA. This command was integrated into Cisco IOS Release 12.3(4)T. The supplicant keyword was added. The feature keyword was added for switches only. The redundancy keyword was added. The aaa, process, rxdata, supplicant, txdata, and vlan keywords were deleted. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-602
December 2010
*Nov 7 13:07:56.876: dot1x-packet:dot1x_mgr_process_eapol_pak: queuing an EAPOL pkt on Authenticator Q *Nov 7 13:07:56.876: dot1x-ev:Enqueued the eapol packet to the global authenticator queue *Nov 7 13:07:56.876: dot1x-packet:Received an EAPOL frame on interface FastEthernet1 *Nov 7 13:07:56.876: dot1x-ev:Received pkt saddr =000f.23c4.a401 , daddr = 0180.c200.0003, pae-ether-type = 888e.0202.0000 *Nov 7 13:07:56.876: dot1x-packet:Received an EAPOL-Logoff packet on interface FastEthernet1 *Nov 7 13:07:56.876: EAPOL pak dump rx *Nov 7 13:07:56.876: EAPOL Version: 0x2 type: 0x2 length: 0x0000 *Nov 7 13:07:56.876: dot1x-sm:Posting EAPOL_LOGOFF on Client=82AC85CC *Nov 7 13:07:56.876: dot1x_auth Fa1: during state auth_authenticating, got event 7(eapolLogoff)
Related Commands
Description Clears 802.1X interface information. Creates an identity profile and enters identity profile configuration mode. Displays details for an identity profile.
DB-603
Syntax Description
Enables debugging of all conditions. Enables debugging of the authenticator state machine, which is responsible for controlling access to the network through 802.1x-enabled ports. Enables debugging of the interaction between the 802.1x process and the router RADIUS client. Enables debugging of the backend state machine, which is responsible for relaying authentication request between the client and the authentication server. Enables debugging of the 802.1x process, which includes 802.1x initialization, configuration, and the interaction with the port manager module. Enables debugging of the reauthentication state machine, which manages periodic reauthentication of the client.
core reauthsm
Defaults
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.3(4)T on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2(33)SRA 12.2SX
Usage Guidelines
The undebug dot1x command is the same as the no debug dot1x command.
DB-604
December 2010
Related Commands
Description Displays information about the types of debugging that are enabled. Displays 802.1x statistics, administrative status, and operational status for the router or for the specified interface.
DB-605
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
When a TrBRF interface is configured on the Remote Switch Module (RSM), the DRiP protocol is activated. The DRiP protocol adds the VLAN ID specified in the router command to its database and recognizes the VLAN as a locally configured, active VLAN.
Examples
The following is sample output from the debug drip event command:
Router# debug drip event
DRiP recognizes that the VLAN ID it is getting is a new one from the network:
6116C840: 0100 0CCCCCCC 6116C850: 00102F72 CBFB0024 AAAA0300 000C0102 6116C860: 01FF0214 0002E254 00015003 00102F72 ...LLL ../rK{.$**...... ......bT..P.../r
DB-606
December 2010
6116C870: C8000010 04C00014 044003EB 14 H....@[email protected]. DRIP : remote update - Never heard of this vlan
DRiP attempts to resolve any conflicts when it discovers a new VLAN. The value action = 1 means to notify the local platform of change in state.
DRIP : resolve remote for vlan 20 in VLAN0 DRIP : resolve remote - action = 1
No action is required:
DRIP : resolve remote - action = 0
Thirty seconds have expired, and DRiP sends its local database entries to all its trunk ports:
DRIP : local timer DRIP : transmit on 612B92C0: 01000C00 612B92D0: 0300000C 612B92E0: 00000C50 612B92F0: 01FF0114 612B9300: 19000001 expired 0000.0c50.1900, length = 24 00000000 0C501900 0000AAAA 00020000 00000100 0CCCCCCC 19000020 AAAA0300 000C0102 00000003 00000002 00000C50 04C00064 04
DB-607
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Before you use this command, you can optionally use the clear drip command first. As a result the DRiP counters are reset to 0. If the DRiP counters begin to increment, the router is receiving packets.
Examples
The following is sample output from the debug drip packet command:
Router# debug drip packet
The following type of output is displayed when a packet is entering the router and you use the show debug command:
039E5FC0: 0100 0CCCCCCC 00E0A39B 039E5FD0: AAAA0300 000C0102 01FF0314 039E5FE0: 00008805 00E0A39B 3C000000 039E5FF0: 04C00032 044003EB 0F 039FBD20: 01000C00 3FFB0028 0000A5F6 04C00028 00000010 ...LLL.`#.?{.( **............%v .....`#.<....@.( [email protected][email protected]. ........
The following type of output is displayed when a packet is sent by the router:
039FBD30: 039FBD40: 039FBD50: 039FBD60: 039FBD70: A6AEB450 00000100 AAAA0300 00000002 04 0000AAAA 0CCCCCCC 000C0102 0010A6AE 0300000C 0010A6AE 01FF0114 B4500001 00020000 B4500020 00000003 04C00064 &.4P..**........ .....LLL..&.4P. **.............. ......&[email protected] .
DB-608
December 2010
Related Commands
DB-609
Syntax Description
This command has no arguments or keywords; however, it can be used with the execute-on command.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To perform this command from the router shelf on the Cisco AS5800 series platform, use the execute-on slot slot-number debug dsc clock form of this command. The debug dsc clock command displays TDM clock-switching events on the dial shelf controller. The information displayed includes the following:
Clock configuration messages received from trunks via NBUS Dial shelf controller clock configuration messages from the router shelf over the dial shelf interface link Clock switchover algorithm events
Examples
The following example shows that the debug dsc clock command has been enabled, and that trunk messages are received, and that the configuration message has been received:
AS5800# debug dsc clock Dial Shelf Controller Clock debugging is on AS5800# 00:02:55: Clock Addition msg of len 12 priority 8 from slot 1 port 1 on line 0 00:02:55: Trunk 1 has reloaded
DB-610
December 2010
Related Commands
Description Executes commands remotely on a line card. Displays information about the dial shelf controller clock.
DB-611
debug dsip
To display debugging output for Distributed System Interconnect Protocol (DSIP) used between a router shelf and a dial shelf, use the debug dsip command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug dsip {all | api | boot | console | trace | transport} no debug dsip {all | api | boot | console | trace | transport}
Syntax Description
View all DSIP debugging messages. View DSIP client interface (API) debugging messages. View DSIP booting messages that are generated when a download of the feature board image is occurring properly. View DSIP console operation while debugging. Enable logging of header information concerning DSIP packets entering the system into a trace buffer. This logged information can be viewed with the show dsip tracing command. Debug the DSIP transport layer, the module that interacts with the underlying physical media driver.
transport
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug dsip command is used to enable the display of debugging messages for DSIP between the router shelf and the dial shelf. Using this command, you can display booting messages generated when the download of an image occurs, view console operation, and trace logging of MAC header information and DSIP transport layer information as modules interact with the underlying physical media driver. This command can be applied to a single modem or a group of modems. Once the debug dsip trace command has been enabled, you can read the information captured in the trace buffer using the show dsip tracing command.
DB-612
December 2010
Examples
The following example indicates the debug dsip trace command logs MAC headers of the various classes of DSIP packets. To view the logged information, use the show dsip tracing command:
AS5800# debug dsip trace NIP tracing debugging is on AS5800# show dsip tracing NIP Control Packet Trace -----------------------------------------------------------Dest:00e0.b093.2238 Src:0007.4c72.0058 Type:200B SrcShelf:1 SrcSlot:11 MsgType:0 MsgLen:82 Timestamp: 00:49:14 -----------------------------------------------------------Dest:00e0.b093.2238 Src:0007.4c72.0028 Type:200B SrcShelf:1 SrcSlot:5 MsgType:0 MsgLen:82 Timestamp: 00:49:14 ------------------------------------------------------------
Related Commands
Description Displays information about the dial shelf, including clocking information. Displays DSIP media header information logged using the debug dsip trace command.
DB-613
debug dspapi
Note
Effective with release 12.3(8)T, the debug dspapi command is replaced by the debug voip dspapi command. See the debug voip dspapi command for more information. To enable debugging for Digital Signal Processor (DSP) application programming interface (API) message events, use the debug dspapi command in privileged EXEC mode. To reset the default value for this feature, use the no form of this command. debug dspapi {all | command | detail | error | notification | response} no debug dspapi {all | command | detail | error | notification | response}
Syntax Description
Enables all debug dspapi options (command, detail, error, notification and response). Displays commands sent to the DSPs. Displays additional detail for the DSP API debugs enabled. Displays any DSP API errors. Displays notification messages sent from the DSP (for example, tone detection notification). Displays responses sent by the DSP (for example, responses to statistic requests).
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 and Cisco AS5800. This command was implemented on the Cisco AS5350 and Cisco AS5400. This command was implemented on the Cisco 1700, Cisco 2600 series, Cisco 3600 series, and the Cisco 3810. This command was integrated into Cisco IOS Release 12.2(8)T. This command was replaced by the debug voip dspapi command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-614
December 2010
Usage Guidelines
DSP API message events used to communicate with DSPs are intended for use with Connexant (Nextport) and Texas Instrument (54x) DSPs. This command severely impacts performance and should be used only for single-call debug capture.
Examples
The following example shows how to enable debugging for all DSP API message events:
Router# debug dspapi all
Related Commands
DB-615
debug dspfarm
To display digital signal processor (DSP) farm service debugging information, use the debug dspfarm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug dspfarm {all | errors | events | packets} no debug dspfarm
Syntax Description
All DSP-farm debug-trace information. DSP-farm errors. DSP-farm events. DSP-farm packets.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco VG200. This command was implemented on the Cisco 2600 series, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 3700 series. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The router on which this command is used must be equipped with one or more digital T1/E1 packet voice trunk network modules (NM-HDVs) or high-density voice (HDV) transcoding/conferencing DSP farms (NM-HDV-FARMs) to provide DSP resources. Debugging is turned on for all DSP-farm-service sessions. You can debug multiple sessions simultaneously, with different levels of debugging for each.
Examples
The following is sample output from the debug dspfarm events command:
Router# debug dspfarm events DSP Farm service events debugging is on *Mar *Mar *Mar *Mar 1 1 1 1 00:45:51: 00:45:53: 00:45:55: 00:45:56: Sent Sent Sent Sent 180 180 180 180 bytes bytes bytes bytes to to to to DSP DSP DSP DSP 4 4 4 4 channel channel channel channel 2 3 1 2
DB-616
December 2010
*Mar 1 00:45:58: Sent 180 bytes to DSP 4 channel 3 *Mar 1 00:46:00: Sent 180 bytes to DSP 4 channel 1 *Mar 1 00:46:01: xapi_dspfarm_modify_connection: sess_id 26, conn_id 2705, conn_mode 3, ripaddr 10.10.1.7, rport 20170 *Mar 1 00:46:01: dspfarm_process_appl_event_queue: XAPP eve 6311C4B0 rcvd *Mar 1 00:46:01: dspfarm_find_stream: stream 63121F1C, found in sess 631143CC, cid 2705 *Mar 1 00:46:01: dspfarm_modify_connection: old_mode 4, new_mode 3 *Mar 1 00:46:01: dspfarm_close_local_rtp: stream 63121F1C, local_rtp_port 22656 *Mar 1 00:46:01: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C4C8, eve_id 5, context 6311426C, result 0 *Mar 1 00:46:01: xapi_dspfarm_delete_connection: sess_id 26, conn_id 2705 *Mar 1 00:46:01: dspfarm_process_appl_event_queue: XAPP eve 6311C4E0 rcvd *Mar 1 00:46:01: dspfarm_find_stream: stream 63121F1C, found in sess 631143CC, cid 2705 *Mar 1 00:46:01: dspfarm_close_local_rtp: stream 63121F1C, local_rtp_port 0 *Mar 1 00:46:01: dspfarm_release_dsp_resource: sess 631143CC, stream 63121F1C, num_stream 3, sess_type 2, sess_dsp_id 2040000, stream_dsp_id 2040002 *Mar 1 00:46:01: dspfarm_drop_conference:slot 2 dsp 4 ch 2 *Mar 1 00:46:01: dspfarm_send_drop_conf: Sent drop_conference to DSP 4 ch 2 *Mar 1 00:46:01: dspfarm_xapp_enq: Sent msg 8 to DSPFARM *Mar 1 00:46:01: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C4F8, eve_id 9, context 6311426C, result 0 *Mar 1 00:46:01: dspfarm_process_dsp_event_queue: DSP eve 6312078C rcvd *Mar 1 00:46:01: dspfarm_delete_stream: sess_id 26, conn_id 2705, stream 63121F1C, in sess 631143CC is freed *Mar 1 00:46:01: Sent 180 bytes to DSP 4 channel 3 *Mar 1 00:46:04: Sent 180 bytes to DSP 4 channel 3 *Mar 1 00:46:05: xapi_dspfarm_modify_connection: sess_id 26, conn_id 2689, conn_mode 3, ripaddr 10.10.1.5, rport 19514 *Mar 1 00:46:05: dspfarm_process_appl_event_queue: XAPP eve 6311C510 rcvd *Mar 1 00:46:05: dspfarm_find_stream: stream 63121E34, found in sess 631143CC, cid 2689 *Mar 1 00:46:05: dspfarm_modify_connection: old_mode 4, new_mode 3 *Mar 1 00:46:05: dspfarm_close_local_rtp: stream 63121E34, local_rtp_port 25834 *Mar 1 00:46:05: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C528, eve_id 5, context 63114244, result 0 *Mar 1 00:46:05: xapi_dspfarm_delete_connection: sess_id 26, conn_id 2689 *Mar 1 00:46:05: dspfarm_process_appl_event_queue: XAPP eve 6311C540 rcvd *Mar 1 00:46:05: dspfarm_find_stream: stream 63121E34, found in sess 631143CC, cid 2689 *Mar 1 00:46:05: dspfarm_close_local_rtp: stream 63121E34, local_rtp_port 0 *Mar 1 00:46:05: dspfarm_release_dsp_resource: sess 631143CC, stream 63121E34, num_stream 2, sess_type 2, sess_dsp_id 2040000, stream_dsp_id 2040001 *Mar 1 00:46:05: dspfarm_drop_conference:slot 2 dsp 4 ch 1 *Mar 1 00:46:05: dspfarm_send_drop_conf: Sent drop_conference to DSP 4 ch 1 *Mar 1 00:46:05: dspfarm_xapp_enq: Sent msg 8 to DSPFARM *Mar 1 00:46:05: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C558, eve_id 9, context 63114244, result 0 *Mar 1 00:46:05: dspfarm_process_dsp_event_queue: DSP eve 6311586C rcvd *Mar 1 00:46:05: dspfarm_delete_stream: sess_id 26, conn_id 2689, stream 63121E34, in sess 631143CC is freed *Mar 1 00:46:05: xapi_dspfarm_modify_connection: sess_id 26, conn_id 2721, conn_mode 3, ripaddr 10.10.1.6, rport 21506 *Mar 1 00:46:05: dspfarm_process_appl_event_queue: XAPP eve 6311C570 rcvd *Mar 1 00:46:05: dspfarm_find_stream: stream 63122004, found in sess 631143CC, cid 2721 *Mar 1 00:46:05: dspfarm_modify_connection: old_mode 4, new_mode 3 *Mar 1 00:46:05: dspfarm_close_local_rtp: stream 63122004, local_rtp_port 19912 *Mar 1 00:46:05: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C588, eve_id 5, context 63114294, result 0 *Mar 1 00:46:05: xapi_dspfarm_delete_connection: sess_id 26, conn_id 2721 *Mar 1 00:46:05: dspfarm_process_appl_event_queue: XAPP eve 6311C5A0 rcvd *Mar 1 00:46:05: dspfarm_find_stream: stream 63122004, found in sess 631143CC, cid 2721 *Mar 1 00:46:05: dspfarm_close_local_rtp: stream 63122004, local_rtp_port 0 *Mar 1 00:46:05: dspfarm_release_dsp_resource: sess 631143CC, stream 63122004, num_stream 1, sess_type 2, sess_dsp_id 2040000, stream_dsp_id 2040003 *Mar 1 00:46:05: dspfarm_drop_conference:slot 2 dsp 4 ch 3 *Mar 1 00:46:05: dspfarm_drop_conference: Last conferee - closing the conf session
DB-617
*Mar 1 00:46:05: dspfarm_send_close_conf: Sent close_conference to DSP 4 *Mar 1 00:46:05: dspfarm_drop_conference: Removed the conf in dsp 4 *Mar 1 00:46:05: dspfarm_xapp_enq: Sent msg 8 to DSPFARM *Mar 1 00:46:05: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C5B8, eve_id 9, context 63114294, result 0 *Mar 1 00:46:05: dspfarm_process_dsp_event_queue: DSP eve 6311586C rcvd *Mar 1 00:46:05: dspfarm_delete_stream: sess_id 26, conn_id 2721, stream 63122004, in sess 631143CC is freed
Related Commands
Command debug frame-relay vc-bundle dspfarm (DSP farm) sccp show dspfarm
Description Sets debugging for SCCP and its applications at one of four levels. Enables DSP-farm service. Enables SCCP and its associated transcoding and conferencing applications. Displays summary information about DSP resources.
DB-618
December 2010
Syntax Description
name
Command Modes
Privileged EXEC
Usage Guidelines
The debug dspu activation command displays all DSPU activation traffic. To restrict the output to a specific host or PU, include the host or PU name argument. You cannot turn off debugging output for an individual PU if that PU has not been named in the debug dspu activation command.
Examples
The following is sample output from the debug dspu activation command. Not all intermediate numbers are shown for the activated and deactivated logical unit (LU) address ranges.
Router# debug dspu activation DSPU: DSPU: DSPU: DSPU: . . . DSPU: DSPU: DSPU: DSPU: . . . DSPU: DSPU: DSPU: DSPU: LS PU LU LU HOST3745 connected HOST3745 activated HOST3745-2 activated HOST3745-3 activated
LU LU LS PU
DB-619
Description Downstream PU debugging message. Link station (LS) event triggered the message. PU event triggered the message. LU event triggered the message. Host name or PU name. Host name or PU name and the LU address, separated by a dash. Event that occurred to trigger the message.
Related Commands
Command debug dspu packet debug dspu state debug dspu trace
Description Displays information on a DSPU packet. Displays information on DSPU FSM state changes. Displays information on DSPU trace activity.
DB-620
December 2010
Syntax Description
name
Command Modes
Privileged EXEC
Usage Guidelines
The debug dspu packet command displays all DSPU packet data flowing through the router. To restrict the output to a specific host or physical unit (PU), include the host or PU name argument. You cannot turn off debugging output for an individual PU if that PU has not been named in the debug dspu packet command.
Examples
The following is sample output from the debug dspu packet command:
Router# debug dspu packet DSPU: Rx: PU HOST3745 data length 12 data: 2D0003002BE16B80 000D0201 DSPU: Tx: PU HOST3745 data length 25 data: 2D0000032BE1EB80 000D020100850000 000C060000010000 00 DSPU: Rx: PU HOST3745 data length 12 data: 2D0004002BE26B80 000D0201 DSPU: Tx: PU HOST3745 data length 25 data: 2D0000042BE2EB80 000D020100850000 000C060000010000 00
Description Received frame (packet) from the remote PU to the router PU. Transmitted frame (packet) from the router PU to the remote PU. Host name or PU associated with the transmit or receive. Number of bytes of data, followed by up to 128 bytes of displayed data.
Related Commands
Command debug drip event debug dspu state debug dspu trace
Description Displays debugging messages for DRiP packets. Displays information on DSPU FSM state changes. Displays information on DSPU trace activity.
DB-621
Syntax Description
name
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug dspu state command to display only the FSM state changes. To see all FSM activity, use the debug dspu trace command. You cannot turn off debugging output for an individual PU if that PU has not been named in the debug dspu state command.
Examples
The following is sample output from the debug dspu state command. Not all intermediate numbers are shown for the activated and deactivated logical unit (LU) address ranges.
Router# debug dspu state DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: . . . DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: . . . DSPU: DSPU: LS LS LS LS PU LU LU HOST3745: input=StartLs, Reset -> PendConOut HOST3745: input=ReqOpn.Cnf, PendConOut -> Xid HOST3745: input=Connect.Ind, Xid -> ConnIn HOST3745: input=Connected.Ind, ConnIn -> Connected HOST3745: input=Actpu, Reset -> Active HOST3745-2: input=uActlu, Reset -> upLuActive HOST3745-3: input=uActlu, Reset -> upLuActive
LU HOST3745-253: input=uActlu, Reset -> upLuActive LU HOST3745-254: input=uActlu, Reset -> upLuActive LS LS LS PU LU LU HOST3745: input=PuStopped, Connected -> PendDisc HOST3745: input=Disc.Cnf, PendDisc -> PendClose HOST3745: input=Close.Cnf, PendClose -> Reset HOST3745: input=T2ResetPu, Active -> Reset HOST3745-2: input=uStopLu, upLuActive -> Reset HOST3745-3: input=uStopLu, upLuActive -> Reset
LU HOST3745-253: input=uStopLu, upLuActive -> Reset LU HOST3745-254: input=uStopLu, upLuActive -> Reset
DB-622
December 2010
Description Downstream PU debug message. Link station (LS) event triggered the message. PU event triggered the message. LU event triggered the message. Host name or PU name and LU address. Input received by the FSM. Previous state and current new state as seen by the FSM.
Related Commands
Command debug drip event debug drip packet debug dspu trace
Description Displays debugging messages for DRiP packets. Displays information on DSPU packet. Displays information on DSPU trace activity.
DB-623
Syntax Description
name
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug dspu trace command to display all FSM state changes. To see FSM state changes only, use the debug dspu state command. You cannot turn off debugging output for an individual PU if that PU has not been named in the debug dspu trace command.
Examples
The following is sample output from the debug dspu trace command:
Router# debug dspu trace DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: DSPU: LS LS LS LS LU LS LS LU LS LS LU LS LS LU LS LS LU LS HOST3745 input = 0 ->(1,a1) HOST3745 input = 5 ->(5,a6) HOST3745 input = 7 ->(5,a9) HOST3745 input = 9 ->(5,a28) HOST3745-2 in:0 s:0->(2,a1) HOST3745 input = 19 ->(8,a20) HOST3745 input = 18 ->(8,a17) HOST3745-3 in:0 s:0->(2,a1) HOST3745 input = 19 ->(8,a20) HOST3745 input = 18 ->(8,a17) HOST3745-252 in:0 s:0->(2,a1) HOST3745 input = 19 ->(8,a20) HOST3745 input = 18 ->(8,a17) HOST3745-253 in:0 s:0->(2,a1) HOST3745 input = 19 ->(8,a20) HOST3745 input = 18 ->(8,a17) HOST3745-254 in:0 s:0->(2,a1) HOST3745 input = 19 ->(8,a20)
DB-624
December 2010
Description Time stamp. Downstream PU debug message. Link station (LS) event triggered the message. A PU event triggered the message. LU event triggered the message. Host name or PU name and LU address.
in:input s:state ->(new-state, String describing the following: action) inputLU FSM input
stateCurrent FSM state new-stateNew FSM state actionFSM action inputPU or LS FSM input new-stateNew PU or LS FSM state actionPU or LS FSM action
input=input ->
(new-state,action)
Related Commands
Command debug drip event debug drip packet debug dspu state
Description Displays debugging messages for DRiP packets. Displays information on DSPU packet. Displays information on DSPU FSM state changes.
DB-625
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug dss ipx event command:
Router# debug dss ipx event DSS IPX events debugging is on Router# configure terminal Enter configuration commands, one per line. Router(config)# interface vlan 22 Router(config-if)# ipx access-group 800 out 05:51:36:DSS-feature:dss_ipxcache_version():idb:NULL, reason:42, prefix:0, mask:FFFFFFFF 05:51:36:DSS-feature:dss_ipx_access_group():idb:Vlan22 05:51:36:DSS-feature:dss_ipx_access_list() 05:51:36:DSS-base 05:51:33.834 dss_ipx_invalidate_interface Vl22 05:51:36:DSS-base 05:51:33.834 dss_set_ipx_flowmask_reg 2 05:51:36:%IPX mls flowmask transition from 1 to 2 due to new status of simple IPX access list on interfaces End with CNTL/Z.
DB-626
December 2010
Related Commands
DB-627
debug eap
To display information about Extensible Authentication Protocol (EAP), use the debug eap command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug eap [all | method] [authenticator | peer ] {all | errors | events | packets | sm} no debug eap [all | method] [authenticator | peer ] {all | errors | events | packets | sm}
Syntax Description
all | method
The all keyword turns on debugging for all EAP methods, including the EAP framework. The method argument turns on debugging for specific methods. This keyword or argument is dynamically linked into the parse chain and is present only if the method itself is present. If this keyword or argument is omitted, the debug command is applied to the EAP framework.
(Optional) Limits the scope of the output to only authenticator contexts. (Optional) Limits the scope of the output to only peer contexts. Debugging is turned on for all debug types. Displays information about EAP packet errors. Displays information about EAP events. Turns on packet debugging for the specified method or methods. Turns on state machine debugging for the specified method or methods.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The method argument and authenticator and peer keywords were added. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output from the debug eap all command shows all EAP information:
Router# debug eap all *Nov *Nov *Nov 7 13:05:58.512: EAP-EVENT: Received get canned status from lower layer (0x00000000) 7 13:05:59.460: EAP-EVENT: Received context create from lower layer (0x00000009) 7 13:05:59.460: eap_authen : initial state eap_auth_initialize has enter
DB-628
December 2010
*Nov 7 13:05:59.460: EAP-EVENT: Started 'Authenticator Start' timer (1s) for EAP sesion handle 0xD6000008 *Nov 7 13:05:59.460: EAP-EVENT: Allocated new EAP context (handle = 0xD6000008) *Nov 7 13:05:59.464: EAP-EVENT: Started EAP tick timer *Nov 7 13:06:00.488: EAP-EVENT: 'Authenticator Start' timer expired for EAP sesion handle 0xD6000008 *Nov 7 13:06:00.488: eap_authen : during state eap_auth_initialize, got event 21(eapStartTmo) *Nov 7 13:06:00.488: @@@ eap_authen : eap_auth_initialize -> eap_auth_select_action *Nov 7 13:06:00.488: eap_authen : during state eap_auth_select_action, got event 17(eapDecisionPropose) *Nov 7 13:06:00.488: @@@ eap_authen : eap_auth_select_action -> eap_auth_propose_method
Related Commands
DB-629
Syntax Description
(Optional) Enables debugging for neighbors formed using the IPv4 protocol family. (Optional) Enables debugging for neighbors formed using the IPv6 protocol family. (Optional) IPv4 or IPv6 address of the neighbor. Specifying an address enables debugging for the service family at this address.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRE. This command was integrated into Cisco IOS Release 12.2(33)XNE. This command was integrated into Cisco IOS XE Release 2.5.
Usage Guidelines
Caution
Use of debug commands can have severe performance penalties and should be used with extreme caution. For this reason, Cisco recommends that you contact Cisco technical support before enabling a debug command.
Examples
The following example shows how to enable debugging of an EIGRP address-family neighbor at 10.0.0.0:
Router# debug eigrp address-family ipv4 neighbor 10.0.0.0 Neighbor target enabled on AS 3 for 10.0.0.0 *Mar 17 15:50:53.244: EIGRP: 10.0.0.0/24 - do advertise out Serial1/2 *Mar 17 15:50:53.244: EIGRP: Int 10.0.0.0/24 metric 20512000 -20000000 512000
DB-630
December 2010
17 17 17 17 17 17 17
10.0.0.0/24 - do advertise out Serial1/2 Int 10.0.0.0/24 metric 28160 - 256002560 10.0.0.0/24 - do advertise out Serial1/2 10.0.0.0/24 - do advertise out Serial1/2 Int 10.0.0.0/24 metric 28160 - 25600256 Processing incoming UPDATE packet 10.0.0.0/24 - do advertise out Serial1/1
Related Commands
DB-631
Syntax Description
Enables debugging for neighbors formed using the IPv4 protocol family. Enables debugging for neighbors formed using the IPv6 protocol family. (Optional) Autonomous system number of the EIGRP routing process. If no autonomous system number is specified, debugging information is displayed for all autonomous systems. (Optional) Enables debugging for the specified VRF. (Optional) Name of the VRF address family to which the command is applied. (Optional) IPv4 or IPv6 address of neighbor. Specifying an address enables debugging for all entries with this address.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRE. This command was integrated into Cisco IOS Release 12.2(33)XNE. This command was integrated into Cisco IOS XE Release 2.5.
Usage Guidelines
Caution
Use of debug commands can have severe performance penalties and should be used with extreme caution. For this reason, Cisco recommends that you contact Cisco technical support before enabling a debug command.
DB-632
December 2010
Examples
The following example shows how to enable EIGRP event notification debugging:
Router# debug eigrp address-family ipv4 notifications *Mar *Mar *Mar *Mar *Mar *Mar 17 17 17 17 17 17 15:58:07.144: 15:58:08.148: 15:58:12.144: 15:58:12.144: 15:58:12.144: 15:58:12.144: IP-EIGRP: Callback: reload_iptable IP-EIGRP: iptable_redistribute into eigrp AS 1 IP-EIGRP: Callback: redist frm static AS 0 10.0.0.0/24 into: eigrp AS 1 event: 1 IP-EIGRP: Callback: redist frm static AS 0 172.16.0.0/24 into: eigrp AS 1 event: 1
Related Commands
DB-633
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Support for IPv6 was added. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command was integrated into Cisco IOS Release 12.2(37)SE. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command helps you observe EIGRP feasible successor activity and to determine whether route updates are being installed and deleted by the routing process.
Examples
The following is sample output from the debug eigrp fsm command:
Router# debug eigrp fsm DUAL: dual_rcvupdate(): 172.25.166.0 255.255.255.0 via 0.0.0.0 metric 750080/0 DUAL: Find FS for dest 172.25.166.0 255.255.255.0. FD is 4294967295, RD is 42949 67295 found DUAL: RT installed 172.25.166.0 255.255.255.0 via 0.0.0.0 DUAL: dual_rcvupdate(): 192.168.4.0 255.255.255.0 via 0.0.0.0 metric 4294967295/ 4294967295 DUAL: Find FS for dest 192.168.4.0 255.255.255.0. FD is 2249216, RD is 2249216 DUAL: 0.0.0.0 metric 4294967295/4294967295not found Dmin is 4294967295 DUAL: Dest 192.168.4.0 255.255.255.0 not entering active state. DUAL: Removing dest 192.168.4.0 255.255.255.0, nexthop 0.0.0.0 DUAL: No routes. Flushing dest 192.168.4.0 255.255.255.0
In the first line, DUAL stands for diffusing update algorithm. It is the basic mechanism within EIGRP that makes the routing decisions. The next three fields are the Internet address and mask of the destination network and the address through which the update was received. The metric field shows the
DB-634
December 2010
metric stored in the routing table and the metric advertised by the neighbor sending the information. If shown, the term Metric... inaccessible usually means that the neighbor router no longer has a route to the destination, or the destination is in a hold-down state. In the following output, EIGRP is attempting to find a feasible successor for the destination. Feasible successors are part of the DUAL loop avoidance methods. The FD field contains more loop avoidance state information. The RD field is the reported distance, which is the metric used in update, query, or reply packets. The indented line with the not found message means a feasible successor (FS) was not found for 192.168.4.0 and EIGRP must start a diffusing computation. This means it begins to actively probe (sends query packets about destination 192.168.4.0) the network looking for alternate paths to 192.164.4.0.
DUAL: Find FS for dest 192.168.4.0 255.255.255.0. FD is 2249216, RD is 2249216 DUAL: 0.0.0.0 metric 4294967295/4294967295not found Dmin is 4294967295
The following output indicates the route DUAL successfully installed into the routing table:
DUAL: RT installed 172.25.166.0 255.255.255.0 via 0.0.0.0
The following output shows that no routes to the destination were discovered and that the route information is being removed from the topology table:
DUAL: Dest 192.168.4.0 255.255.255.0 not entering active state. DUAL: Removing dest 192.168.4.0 255.255.255.0, nexthop 0.0.0.0 DUAL: No routes. Flushing dest 192.168.4.0 255.255.255.0
DB-635
Syntax Description
siatimer static
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Support for IPv6 was added. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command was integrated into Cisco IOS Release 12.2(37)SE. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug eigrp neighbor command:
Router# debug eigrp neighbor static EIGRP Static Neighbors debugging is on Router# configure terminal Router(config)# router eigrp 100 Router(config-router)# neighbor 10.1.1.1 e3/1 Router(config-router)# 22:40:07:EIGRP:Multicast Hello is disabled on Ethernet3/1! 22:40:07:EIGRP:Add new static nbr 10.1.1.1 to AS 100 Ethernet3/1 Router(config-router)# no neighbor 10.1.1.1 e3/1
DB-636
December 2010
Router(config-router)# 22:41:23:EIGRP:Static nbr 10.1.1.1 not in AS 100 Ethernet3/1 dynamic list 22:41:23:EIGRP:Delete static nbr 10.1.1.1 from AS 100 Ethernet3/1 22:41:23:EIGRP:Multicast Hello is enabled on Ethernet3/1!
Related Commands
Description Defines a neighboring router with which to exchange routing information. Displays EIGRP neighbors. Displays IPv6 EIGRP neighbors.
DB-637
Syntax Description
rib interface
Captures notifications from the routing information base (RIB) Captures notifications from the interface.
Command Default
Debugging of EIGRP notifications for the L2L3 API interface is not enabled.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Use of debug commands can have severe performance penalties and should be used with extreme caution. For this reason, Cisco recommends that you contact Cisco technical support before enabling a debug command.
Examples
The following example displays information about the L2L3 API Interface:
Router# debug eigrp notifications rib
Related Commands
Description Sets a threshold value to minimize hysteresis in a router-to-radio configuration. Creates a virtual multipoint interface (VMI) that can be configured and applied dynamically.
DB-638
December 2010
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 15.0(1)M.
Usage Guidelines
The output from the debug eigrp nsf command displays NSF-specific events. This command can be issued on either an NSF-capable or an NSF-aware router.
Examples
The following example shows how to enable Enhanced Interior Gateway Routing Protocol (EIGRP) NSF debugging and display information about neighbor devices:
Router# debug eigrp nsf EIGRP NSF debugging is on Router# show ip eigrp neighbors detail EIGRP-IPv4 Neighbors for AS(100) H Address Interface 0
Hold Uptime SRTT (sec) (ms) 1.1.2.1 Et1/0 11 00:00:25 10 Version 5.1/3.0, Retrans: 2, Retries: 0, Prefixes: 1 Topology-ids from peer - 0
RTO
DB-639
Router# *Sep 23 resync: Router# *Sep 23 Router# *Sep 23 *Sep 23 *Sep 23 *Sep 23 Router#
18:57:19.423: %DUAL-5-NBRCHANGE: EIGRP-IPv4 100: Neighbor 1.1.2.1 (Ethernet1/0) is peer graceful-restart 18:57:19.423: EIGRP: NSF: AS100, NSF or GR initiated by 1.1.2.1, flags 0x4:(RS) 18:57:36.028: 18:57:36.028: 18:57:36.038: 18:57:36.038: EIGRP: EIGRP: EIGRP: EIGRP: NSF: NSF: NSF: NSF: AS100, Receive EOT from 1.1.2.1, Flags 0x8:(EOT) route hold timer set to flush stale routes AS100. route hold timer expiry EIGRP-IPv4: Search for stale routes from 1.1.2.1
Router# show ip eigrp neighbors detail EIGRP-IPv4 Neighbors for AS(100) H Address Interface 0
1.1.2.1 Et1/0 Time since Restart 00:01:34 Version 5.1/3.0, Retrans: 2, Retries: 0, Prefixes: 1 Topology-ids from peer - 0 Router#
RTO
The following sample output shows when a router was unable to handle an event with NSF-Awareness:
*Sep 23 18:59:56.040: EIGRP: NSF: AS100: Checking if Graceful Restart is possible with neighbor 1.1.2.1, peer_down reason 'peer restarted' *Sep 23 18:59:56.040: EIGRP: NSF: Not possible: 'peer_down was called with a HARD resync flag' Router# *Sep 23 18:59:56.040: %DUAL-5-NBRCHANGE: EIGRP-IPv4 100: Neighbor 1.1.2.1 (Ethernet1/0) is down: peer restarted Router# *Sep 23 19:00:00.170: %DUAL-5-NBRCHANGE: EIGRP-IPv4 100: Neighbor 1.1.2.1 (Ethernet1/0) is up: new adjacency Router# *Sep 23 19:00:00.170: EIGRP: NSF: Enqueuing NULL update to 1.1.2.1, flags 0x1:(INIT)
DB-640
December 2010
Syntax Description
SIAquery SIAreply ack hello ipxsap probe query reply request retry stub terse update verbose
(Optional) Displays information about Stuck-in-Active (SIA) query messages. (Optional) Displays information about SIA reply messages. (Optional) Displays information about EIGRP acknowledgment packets. (Optional) Displays information about EIGRP hello packets. (Optional) Displays information about IPX EIGRP SAP packets. (Optional) Displays information about EIGRP probe packets. (Optional) Displays information about EIGRP query packets. (Optional) Displays information about EIGRP reply packets. (Optional) Displays information about EIGRP request packets. (Optional) Displays information about EIGRP retry packets. (Optional) Displays information about EIGRP stub packets. (Optional) Displays information about all EIGRP packets except Hello packets. (Optional) Displays information about EIGRP update packets. (Optional) Displays information about all EIGRP packets.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The keywords were supported. Support for IPv6 was added. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command was integrated into Cisco IOS Release 12.2(37)SE. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
If a communication session is closing when it should not be, an end-to-end connection problem can be the cause. The debug eigrp packet command is useful for analyzing the messages traveling between the local and remote hosts.
DB-641
Note
Although this command accepts a number of keywords, we dont recommend their use unless directed by TAC.
Examples
The following is sample output from the debug eigrp packet command:
Router# debug eigrp packet EIGRP: Sending HELLO on Ethernet0/1 AS 109, Flags 0x0, Seq 0, Ack 0 EIGRP: Sending HELLO on Ethernet0/1 AS 109, Flags 0x0, Seq 0, Ack 0 EIGRP: Sending HELLO on Ethernet0/1 AS 109, Flags 0x0, Seq 0, Ack 0 EIGRP: Received UPDATE on Ethernet0/1 from AS 109, Flags 0x1, Seq 1, Ack 0 EIGRP: Sending HELLO/ACK on Ethernet0/1 to AS 109, Flags 0x0, Seq 0, Ack 1 EIGRP: Sending HELLO/ACK on Ethernet0/1 to AS 109, Flags 0x0, Seq 0, Ack 1 EIGRP: Received UPDATE on Ethernet0/1 from AS 109, Flags 0x0, Seq 2, Ack 0
The output shows transmission and receipt of EIGRP packets. These packet types may be hello, update, request, query, or reply packets. The sequence and acknowledgment numbers used by the EIGRP reliable transport algorithm are shown in the output. Where applicable, the network-layer address of the neighboring router is also included. Table 82 describes the significant fields shown in the display.
Table 82 debug eigrp packet Field Descriptions
Description EIGRP packet information. Autonomous system number. A flag of 1 means the sending router is indicating to the receiving router that this is the first packet it has sent to the receiver. A flag of 2 is a multicast that should be conditionally received by routers that have the conditionally receive (CR) bit set. This bit gets set when the sender of the multicast has previously sent a sequence packet explicitly telling it to set the CR bit.
HELLO
Hello packets are the neighbor discovery packets. They are used to determine whether neighbors are still alive. As long as neighbors receive the hello packets the router is sending, the neighbors validate the router and any routing information sent. If neighbors lose the hello packets, the receiving neighbors invalidate any routing information previously sent. Neighbors also send hello packets.
DB-642
December 2010
Syntax Description
(Optional) Displays information for a Cisco SAF External Client. Displays information for managing clients and TCP connections. (Optional) Reliability metric. The range is 0 to 255, entered in increments of 2.5 where 255 is 100-percent reliable. (Optional) Displays information on an external-client protocol. (Optional) Displays a client, message, or protocol debug for the specified Cisco SAF External Client. Specifies the IP Version 4 address family for this debug. Specifies the IP Version 6 address family for this debug. (Optional) Specifies all virtual routing forwarding (VRF) instance tables or a specific VRF table for an IP address. (Optional) Specifies a VRF table for an IP address.
autonomous-system The Autonomous system number. -number service-instancenumber client client-label neighbors neighbor-ipaddress notifications topology service-instancenumber (Optional) Service-instance number between 1 and 65535. Service instance numbers display as: service:subservice:instance.instance.instance.instance. (Optional) Displays EIGRP client information. (Optional) A specific client. (Optional) Displays EIGRP neighbor debugging information. (Optional) The IP address of the neighbor. (Optional) Displays EIGRP notification debugging information. (Optional) Specifies a service topology. (Optional) Service-instance number between 1 and 65535. Topology service instance numbers display as: service:subservice:instance.instance.instance.instance.
Command Modes
DB-643
Command History
Release 15.0(1)M
Usage Guidelines
Use the debug eigrp service-family external-client client command to display information to help manage clients and TCP connections. Use the debug eigrp service-family external-client messages command to display message content and decoded messages. Use the debug eigrp service-family external-client protocol command to display encode and decode information to help manage the interaction with the Cisco SAF internal API.
Note
Using the debug eigrp service-family ipv6 commands requires an IPv6-enabled SAF client, which currently does not exist.
Examples
The following is sample output of a Cisco SAF External-Client debugging protocol message:
Router# debug eigrp service-family external-client protocol *Jun 11 14:27:11.467: SAF-EC: attribute found, type: 1005 *Jun 11 14:27:11.467: No error *Jun 11 14:27:11.467: Class: Request Method: Register *Jun 11 14:27:11.467: Packet Length: 80 bytes Not including 20 byte Saf Header *Jun 11 14:27:11.467: Magic Cookie: 7F5A9BC7 Transaction ID: 8F1F3F36EE43784D0DFABEA6 *Jun 11 14:27:11.467: Realm: 014: Length: 5: "SAF"
DB-644
December 2010
11 11 11 11 11
Username: 006: Length: 5: uname Client Label: 1005: Length: 2: c1 Protocol Version: 1003: Length: 4: 10000 Client Name: 1001: Length: 2: c1 Page Size: 1004: Length: 4: 5
Router# *Jun 11 14:27:11.467: Message Integrity: 008: Length: 20: AB3D7C39E4E0673B1539750D6E21A79ACFCE51F8 *Jun 11 14:27:11.467: SAF-EC: request start. *Jun 11 14:27:11.467: SAF-EC: client successfully registered. client_handle 3 Router#
Related Commands
Description Exits service-family configuration mode. Configures the EIGRP process. Specifies service-family configuration mode.
DB-645
Syntax Description
(Optional) Information for acknowledgment (ACK) messages sent by the system. (Optional) Build information messages (messages that indicate that a topology table was either successfully built or could not be built). (Optional) Additional detail for debug output. (Optional) Information regarding topology table linked-list management. (Optional) Information regarding topology table linked-list management. (Optional) Information regarding the impact on packet generation when a peer is down. (Optional) Stuck-in-active (SIA) messages. (Optional) Information regarding peer startup and initialization packets that have been transmitted. (Optional) Unusual events relating to packet processing.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Support for IPv6 was added. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command was integrated into Cisco IOS Release 12.2(37)SE. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-646
December 2010
Examples
The following is sample output from the debug eigrp transmit command:
Router# debug eigrp transmit EIGRP Transmission Events debugging is on (ACK, PACKETIZE, STARTUP, PEERDOWN, LINK, BUILD, STRANGE, SIA, DETAIL) Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router#(config)# router eigrp 100 Router#(config-router)# network 10.4.9.0 0.0.0.255 Router#(config-router)# 5d22h: DNDB UPDATE 10.0.0.0/8, serno 0 to 1, refcount 0 Router#(config-router)#
DB-647
debug emm
To enable debugging of Embedded Menu Manager (EMM) Menu Definition Files (MDFs), use the debug emm command in user EXEC or privileged EXEC mode. To disable EMM MDF debugging, use the no form of this command. debug emm no debug emm
Syntax Description
Command Default
Command Modes
Command History
Release 12.4(20)T
Usage Guidelines
Do not run this command on the same vty as the EMM menu.
Examples
The following is sample output from the debug emm command. The output is described in the EMM XML Schema Definition (XSD), which is available for download at this website: http://forums.cisco.com/eforum/servlet/EEM?page=main
Router# debug emm EMM debugging is on *Jun 10 15:45:42.043: Looking for MenuTitle, parent = Menu *Jun 10 15:45:42.063: Looking for GlobalTCL, parent = Menu *Jun 10 15:45:42.083: Looking for MenuTitle, parent = Menu
Related Commands
Description Loads and launches preconfigured MDFs or launches loaded preconfigured EMM menus. Changes the terminal clear-screen escape sequence. Displays loaded preconfigured MDFs.
DB-648
December 2010
debug eou
To display information about Extensible Authentication Protocol over User Datagram Protocol (UDP) (EAPoUDP), use the debug eou command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug eou {all | eap | errors | events | packets | ratelimit | sm} no debug eou {all | eap | errors | events | packets | ratelimit | sm}
Syntax Description
Displays all EAPoUDP information. Displays EAPoUDP packets. Displays information about EAPoUDP packet errors. Displays information about EAPoUDP events. Displays EAPoUDP packet-related information. Displays EAPoUDP posture-validation information. Displays EAPoUDP state machine transitions.
Defaults
If you do not enter any keywords, debugging is turned on for all EAPoUDP messages.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output from the debug eou all command shows all EAPoUDP information:
Router# debug eou all *Apr 9 19:30:40.782: eou-ev:EOU Init Validation for idb= FastEthernet0/0.420 src_mac= 0001.027c.f364 src_ip= 10.0.0.1 *Apr 9 19:30:40.786: eou_auth 10.0.0.1: initial state eou_initialize has enter *Apr 9 19:30:40.786: @@@ eou_auth 10.0.0.1: eou_initialize -> eou_hello *Apr 9 19:30:40.786: eou-ev:eou_send_hello_request: Send Hello Request host= 10.0.0.15 eou_port= 5566 (hex) *Apr ID=0 *Apr *Apr *Apr 9 19:30:40.790: EAPoUDP (tx) Flags:0 Ver=1 opcode=2 Len=8 MsgId=3839857370 Assoc 9 19:30:40.790: Dumping TLV contents 9 19:30:40.790: TLV M:1 R:0 Type=ASSOCIATION ID Length=4 Association=-1994800267 9 19:30:40.999: EAPoUDP (rx) Flags:128 Ver=1 opcode=2 Len=24 MsgId=3839857370 Assoc
DB-649
ID=2300167029 *Apr 9 19:30:40.999: Dumping TLV contents *Apr 9 19:30:40.999: TLV M:1 R:0 Type=COOKIE PAYLOAD Length=12 07167CE0: 8919C375 259B6D41 5FEA5D27 ..Cu%.mA_j]' 07167CF0: *Apr 9 19:30:40.999: TLV M:1 R:0 Type=ASSOCIATION ID Length=4 Association=1016688999 *Apr 9 19:31:50.048: *Apr 9 19:31:50.048: *Apr 9 19:31:50.048: 14(eouEapSuccess) *Apr 9 19:31:50.048: *Apr 9 19:31:50.052: @@@ eou_auth 10.0.0.1: eou_eap -> eou_eap eou-ev:10.0.0.1: msg = 24(eventEouEapSuccess) eou_auth 10.0.0.1: during state eou_eap, got event @@@ eou_auth 10.0.0.1: eou_eap -> eou_result eou-ev:Starting RESULT timer 3(10.0.0.1)
Related Commands
Description Displays information about EAP messages. Displays information about EAPoUDP network admission control events.
DB-650
December 2010
Syntax Description
mac-address mac-address
(Optional) Defines the MAC address of the Cisco IP phone. (Optional) Specifies the MAC address of the Cisco IP phone.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(2)XT
Modification This command was introduced on the following platforms: Cisco 1750, Cisco 1751, Cisco 2600 series and Cisco 3600 series multiservice routers; and Cisco IAD2420 series Integrated Access Devices (IADs). This command was implemented on the Cisco 3725 and Cisco 3745 routers. This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. This command was implemented on the Cisco 1760 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone alarm command shows all the SkinnyStation alarm messages sent by the Cisco IP phone. Under normal circumstances, this message is sent by the Cisco IP phone just before it registers, and the message has the severity level for the alarm set to Informational and contains the reason for the phone reboot or re-register. This type of message is entirely benign and does not indicate an error condition. If the mac-address keyword is not used, the debug ephone alarm command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command. You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
DB-651
Examples
The following example shows a SkinnyStation alarm message that is sent before the Cisco IP phone registers:
Router# debug ephone alarm phone keypad reset CM-closed-TCP CM-bad-state
Related Commands
Command debug ephone detail debug ephone error debug ephone keepalive debug ephone loopback debug ephone pak debug ephone raw debug ephone register debug ephone state debug ephone statistics show debugging
Description Sets detail debugging for the Cisco IP phone. Sets error debugging for the Cisco IP phone. Sets keepalive debugging for the Cisco IP phone. Sets MWI debugging for the Cisco IP phone. Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. Provides raw low-level protocol debugging display for all SCCP messages. Sets registration debugging for the Cisco IP phone. Sets state debugging for the Cisco IP phone. Sets statistics debugging for the Cisco IP phone. Displays information about the types of debugging that are enabled for your router.
DB-652
December 2010
Syntax Description
mac-address mac-address
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command for troubleshooting BLF speed-dial and BLF call-list features for phones in a presence service.
Examples
The following is sample output from the debug ephone blf command.
Router# debug ephone blf EPHONE BLF debugging is enabled *Sep *Sep *Sep [16] *Sep *Sep *Sep *Sep *Sep [23] *Sep *Sep *Sep *Sep *Sep [16] *Sep *Sep *Sep *Sep 4 07:18:26.307: skinny_asnl_callback: subID 16 type 4 4 07:18:26.307: ASNL_RESP_NOTIFY_INDICATION 4 07:18:26.307: ephone-1[1]:ASNL notify indication message, feature index 4, subID 4 4 4 4 4 4 4 4 4 4 4 4 4 4 07:18:26.307: 07:18:26.307: 07:18:26.307: 07:18:26.307: 07:18:26.307: 07:18:26.311: 07:18:26.311: 07:18:28.951: 07:18:28.951: 07:18:28.951: 07:18:28.951: 07:18:28.951: 07:18:28.951: 07:18:28.951: ephone-1[1]:line status 6, subID [16] ephone-1[1]:StationFeatureStatV2Message sent, status 2 skinny_asnl_callback: subID 23 type 4 ASNL_RESP_NOTIFY_INDICATION ephone-2[2]:ASNL notify indication message, feature index 2, subID ephone-2[2]:line status 6, subID [23] ephone-2[2]:StationFeatureStatV2Message sent, status 2 skinny_asnl_callback: subID 16 type 4 ASNL_RESP_NOTIFY_INDICATION ephone-1[1]:ASNL notify indication message, feature index 4, subID ephone-1[1]:line status 1, subID [16] ephone-1[1]:StationFeatureStatV2Message sent, status 1 skinny_asnl_callback: subID 23 type 4 ASNL_RESP_NOTIFY_INDICATION
DB-653
4 07:18:28.951: ephone-2[2]:ASNL notify indication message, feature index 2, subID 4 07:18:28.951: ephone-2[2]:line status 1, subID [23] 4 07:18:28.951: ephone-2[2]:StationFeatureStatV2Message sent, status 1
Related Commands
Command blf-speed-dial presence call-list show presence global show presence subscription
Description Enables BLF monitoring for a speed-dial number on a phone registered to Cisco Unified CME. Enables BLF monitoring for call lists and directories on phones registered to a Cisco Unified CME router. Displays configuration information about the presence service. Displays information about active presence subscriptions.
DB-654
December 2010
Syntax Description
mac-address mac-address
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command displays call flow notification information for all calls between Cisco CallManager and Cisco CallManager Express, but it is most useful for filtering out specific information for transfer and forward cases. For basic call information, use the debug ephone state command. If you do not specify the mac-address keyword, the debug ephone ccm-compatible command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the no form of this command with the mac-address keyword. Debugging can be enabled or disabled on any number of Cisco IP phones. Cisco IP phones that have debugging enabled are listed in the debug field of the show ephone command output. When debugging is enabled for a Cisco IP phone, debug output is displayed for all phone extensions (virtual voice ports) associated with that phone.
Examples
The following sample output displays call flow notifications between Cisco CallManager and Cisco CallManager Express:
Router# debug ephone ccm-compatible *May 1 04:30:02.650:ephone-2[2]:DtAlertingTone/DtHoldTone - mediaActive reset during CONNECT *May 1 04:30:02.654:ephone-2[2]:DtHoldTone - force media STOP state *May 1 04:30:02.654://93/xxxxxxxxxxxx/CCAPI/ccCallNotify:(callID=0x5D,nData-> bitmask=0x00000007) *May 1 04:30:02.654://93/xxxxxxxxxxxx/VTSP:(50/0/3):-1:0:5/vtsp_process_event: vtsp:[50/0/3 (93), S_CONNECT, E_CC_SERVICE_MSG] *May 1 04:30:02.654://93/xxxxxxxxxxxx/VTSP:(50/0/3):-1:0:5/act_service_msg_dow n:.
DB-655
*May 1 04:30:02.658:dn_callerid_update DN 3 number= 12009 name= CCM7960 in state CONNECTED *May 1 04:30:02.658:dn_callerid_update (incoming) DN 3 info updated to *May 1 04:30:02.658:calling= 12009 called= 13003 origCalled= *May 1 04:30:02.658:callingName= CCM7960, calledName= , redirectedTo = *May 1 04:30:02.658:ephone-2[2][SEP003094C2999A]:refreshDisplayLine for line 1 DN 3 chan 1 *May 1 04:30:03.318:ephone-2[2]:DisplayCallInfo incoming call *May 1 04:30:03.318:ephone-2[2]:Call Info DN 3 line 1 ref 24 called 13003 calling 12009 origcalled 13003 calltype 1 *May 1 04:30:03.318:ephone-2[2]:Original Called Name UUT4PH3 *May 1 04:30:03.318:ephone-2[2]:CCM7960 calling *May 1 04:30:03.318:ephone-2[2]:UUT4PH3
Related Commands
Description Displays call state information. Displays information about the types of debugging that are enabled for your router. Displays information about registered Cisco IP phones.
DB-656
December 2010
Syntax Description
mac-address mac-address
(Optional) Defines the MAC address of the Cisco IP phone. (Optional) Specifies the MAC address of the Cisco IP phone.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.1(5)YD
Modification This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. This command was implemented on the Cisco 1760 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone detail command includes the error and state levels. If the mac-address keyword is not used, the debug ephone detail command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command. You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
DB-657
Examples
The following is sample output of detail debugging of the Cisco IP phone with MAC address 0030.94c3.8724. The sample is an excerpt of some of the activities that takes place during call setup, connected state, active call, and the call being disconnected.
Router# debug ephone detail mac-address 0030.94c3.8724 Ephone detail debugging is enabled 1d04h: ephone-1[1]:OFFHOOK . . 1d04h: Skinny Call State change for DN 1 SIEZE . . 1d04h: ephone-1[1]:SetCallState line 1 DN 1 TsOffHook . . 1d04h: ephone-1[1]:SetLineLamp 1 to ON . . 1d04h: ephone-1[1]:KeypadButtonMessage 5 . . 1d04h: ephone-1[1]:KeypadButtonMessage 0 . . 1d04h: ephone-1[1]:KeypadButtonMessage 0 . . 1d04h: ephone-1[1]:KeypadButtonMessage 2 . . 1d04h: ephone-1[1]:Store ReDial digit: 5002 . SkinnyTryCall to 5002 instance 1 . . 1d04h: ephone-1[1]:Store ReDial digit: 5002 1d04h: ephone-1[1]: SkinnyTryCall to 5002 instance 1 . . 1d04h: Skinny Call State change for DN 1 ALERTING . . 1d04h: ephone-1[1]:SetCallState line 1 DN 1 TsRingOut . . 1d04h: ephone-1[1]:SetLineLamp 1 to ON 1d04h: SetCallInfo calling dn 1 dn 1 calling [5001] called [5002] . . 1d04h: ephone-1[1]: Jane calling 1d04h: ephone-1[1]: Jill . . 1d04h: SkinnyUpdateDnState by EFXS_RING_GENERATE for DN 2 to state RINGING . . 1d04h: SkinnyGetCallState for DN 2 CONNECTED .
DB-658
December 2010
. 1d04h: 1d04h: . . 1d04h: . . 1d04h: . . 1d04h: 1d04h: 1d04h: . . 1d04h: . . 1d04h: . . 1d04h: . . 1d04h: 1d04h: 1d04h: 1d04h: 1d04h: 1d04h: 1d04h: 1d04h: 1d04h: 1d04h: 1d04h: 1d04h: 1d04h: .
duration 10 ms bytes 80
ephone-1[1]:OpenReceiveChannelAck 1.2.172.21 port=20180 ephone-1[1]:Outgoing calling DN 1 Far-ephone-2 called DN 2 SkinnyGetCallState for DN 1 CONNECTED
ephone-1[1]:SetLineLamp 3 to OFF
ephone-1[1]:Clean Up Speakerphone state ephone-1[1]:SpeakerPhoneOnHook ephone-1[1]:Clean up activeline 1 ephone-1[1]:StopTone sent to ephone ephone-1[1]:Clean Up phone offhook state SkinnyGetCallState for DN 1 IDLE called DN -1, calling DN -1 phone -1 ephone-1[1]:SetLineLamp 1 to OFF UnBinding ephone-1 from DN 1 UnBinding called DN 2 from DN 1 ephone-1[1]:ONHOOK ephone-1[1]:SpeakerPhoneOnHook ephone-1[1]:ONHOOK NO activeline
Related Commands.
Command debug ephone alarm debug ephone error debug ephone keepalive debug ephone loopback debug ephone pak debug ephone raw debug ephone register debug ephone state debug ephone statistics show debugging
Description Sets SkinnyStation alarm messages debugging for the Cisco IP phone. Sets error debugging for the Cisco IP phone. Sets keepalive debugging for the Cisco IP phone. Sets MWI debugging for the Cisco IP phone. Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. Provides raw low-level protocol debugging display for all SCCP messages. Sets registration debugging for the Cisco IP phone. Sets state debugging for the Cisco IP phone. Sets statistics debugging for the Cisco IP phone. Displays information about the types of debugging that are enabled for your router.
DB-659
Syntax Description
mac-address mac-address
(Optional) Defines the MAC address of the Cisco IP phone. (Optional) Specifies the MAC address of the Cisco IP phone.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.1(5)YD
Modification This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. This command was implemented on the Cisco 1760 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone error command cancels debugging at the detail and state level. If the mac-address keyword is not used, the debug ephone error command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command. You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
DB-660
December 2010
Examples
The following is sample output of error debugging for the Cisco IP phone with MAC address 0030.94c3.8724:
Router# debug ephone error mac-address 0030.94c3.8724 EPHONE error debugging is enabled socket [2] send ERROR 11 Skinny Socket [2] retry failure
Related Commands
Command debug ephone alarm debug ephone detail debug ephone keepalive debug ephone loopback debug ephone pak debug ephone raw debug ephone register debug ephone state debug ephone statistics show debugging
Description Sets SkinnyStation alarm messages debugging for the Cisco IP phone. Sets detail debugging for the Cisco IP phone. Sets keepalive debugging for the Cisco IP phone. Sets MWI debugging for the Cisco IP phone. Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. Provides raw low-level protocol debugging display for all SCCP messages. Sets registration debugging for the Cisco IP phone. Sets state debugging for the Cisco IP phone. Sets statistics debugging for the Cisco IP phone. Displays information about the types of debugging that are enabled for your router.
DB-661
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Cisco Product Cisco Unified CME 4.0(3) Cisco Unified CME 4.1 Cisco Unified CME 4.1
Modification This command was introduced. This command was introduced. This command was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command displays status messages produced by the extension assigner application, including messages related to the functions performed by the following Tcl commands:
phone queryVerifies whether the ephone tag has been assigned a MAC address. phone assignBinds the MAC address from the callers phone to a preexisting ephone template. phone unassignRemoves the MAC address from the ephone tag.
Before using this command, you must load the Tcl script for the extension assigner application.
Examples
The following is sample output of extension assigner debugging as the extension assigner application queries phones for their status and issues commands to assign or unassign extension numbers.
*Jun 9 19:08:10.627: ephone_query: inCallID=47, tag=4, ephone_tag=4 *Jun 9 19:08:10.627: extAssigner_IsEphoneMacPreset: ephone_tag = 4, ipKeyswitch.max_ephones = 96 *Jun 9 19:08:10.627: extAssigner_IsEphoneMacPreset: ephone_ptr->mac_addr_str = 000B46BDE075, MAC_EXT_RESERVED_VALUE = 02EAEAEA0000 *Jun 9 19:08:10.627: SkinnyGetActivePhoneIndexFromCallid: callID = 47
DB-662
December 2010
*Jun 9 19:08:10.627: SkinnyGetActivePhoneIndexFromCallid: vdbPtr->physical_interface_type (26); CV_VOICE_EFXS (26) *Jun 9 19:08:10.627: SkinnyGetActivePhoneIndexFromCallid: vdbPtr->type (6); CC_IF_TELEPHONY (6) *Jun 9 19:08:10.627: SkinnyGetActivePhoneIndexFromCallid: htsp->sig_type (26); CV_VOICE_EFXS (26) *Jun 9 19:08:10.627: SkinnyGetActivePhoneIndexFromCallid: dn = 4, chan = 1 *Jun 9 19:08:10.627: ephone_query: EXTASSIGNER_RC_SLOT_ASSIGNED_TO_CALLING_PHONE *Jun 9 19:08:22.763: ephone_unassign: inCallID=47, tag=4, ephone_tag=4 *Jun 9 19:08:22.763: extAssigner_IsEphoneMacPreset: ephone_tag = 4, ipKeyswitch.max_ephones = 96 *Jun 9 19:08:22.763: extAssigner_IsEphoneMacPreset: ephone_ptr->mac_addr_str = 000B46BDE075, MAC_EXT_RESERVED_VALUE = 02EAEAEA000 *Jun 9 19:08:22.763: is_ephone_auto_assigned: button-1 dn_tag=4 *Jun 9 19:08:22.763: is_ephone_auto_assigned: NO *Jun 9 19:08:22.763: SkinnyGetActivePhoneIndexFromCallid: callID = 47 *Jun 9 19:08:22.763: SkinnyGetActivePhoneIndexFromCallid: vdbPtr->physical_interface_type (26); CV_VOICE_EFXS (26) *Jun 9 19:08:22.767: SkinnyGetActivePhoneIndexFromCallid: vdbPtr->type (6); CC_IF_TELEPHONY (6) *Jun 9 19:08:22.767: SkinnyGetActivePhoneIndexFromCallid: htsp->sig_type (26); CV_VOICE_EFXS (26) *Jun 9 19:08:22.767: SkinnyGetActivePhoneIndexFromCallid: dn = 4, chan = 1 *Jun 9 19:08:29.795: ephone-4[8]:fStationOnHookMessage: Extension Assigner request restart, cmd=2, new mac=02EAEAEA0004, ephone_tag=4 *Jun 9 19:08:30.063: %IPPHONE-6-UNREGISTER_NORMAL: ephone-4:SEP000B46BDE075 IP:5.5.0.1 Socket:8 DeviceType:Phone has unregistered normally. *Jun 9 19:08:30.063: ephone-4[8][SEP000B46BDE075]:extAssigner_assign: new mac=02EAEAEA0004, ephone-tag=4 *Jun 9 19:08:30.063: extAssigner_simple_assign: mac=02EAEAEA0004, tag=4 *Jun 9 19:08:30.063: ephone_updateCNF: update cnf_file ephone_tag=4 *Jun 9 19:08:30.063: extAssigner_assign: restart again (mac=02EAEAEA0004) ephone_tag=4 *Jun 9 19:08:30.131: %IPPHONE-6-REG_ALARM: 23: Name=SEP000B46BDE075 Load=8.0(2.0) Last=Reset-Restart *Jun 9 19:08:30.135: %IPPHONE-6-REGISTER_NEW: ephone-7:SEP000B46BDE075 IP:5.5.0.1 Socket:10 DeviceType:Phone has registered. *Jun 9 19:08:30.503: %IPPHONE-6-UNREGISTER_NORMAL: ephone-7:SEP000B46BDE075 IP:5.5.0.1 Socket:10 DeviceType:Phone has unregistered normally. *Jun 9 19:08:43.127: %IPPHONE-6-REG_ALARM: 22: Name=SEP000B46BDE075 Load=8.0(2.0) Last=Reset-Reset *Jun 9 19:08:43.131: %IPPHONE-6-REGISTER: ephone-7:SEP000B46BDE075 IP:5.5.0.1 Socket:13 DeviceType:Phone has registered.
Related Commands
debug voip application Displays status messages produced by voice over IP application scripts. script
DB-663
Syntax Description
mac-address mac-address
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.1(1)T.
Usage Guidelines
Use this command for troubleshooting LPCOR calls to phones in a Cisco Unified CME system. If the mac-address keyword is not used, this command debugs all phones that are registered to the Cisco Unified CME router. You can disable debugging for specific phones by using the mac-address keyword with the no form of this command.
Examples
The following is sample output from the debug ephone lpcor command for a call between ephone-1 and ephone-2 that was blocked by LPCOR policy validation:
Router# debug ephone lpcor *Jun 24 11:23:45.599: ephone-1[0/3][SEP003094C25F38]:ephone_get_lpcor_index: dir 0 *Jun 24 11:23:46.603: ephone-2[1/2][SEP0021A02DB62A]:ephone_get_lpcor_index: dir 1
Related Commands
Command debug voip application lpcor debug voip lpcor lpcor incoming lpcor outgoing show ephone show voice lpcor policy
Description Enables debugging of the LPCOR application system. Displays debugging information for the LPCOR feature. Associates an incoming call with a LPCOR resource-group policy. Associates an outgoing call with a LPCOR resource-group policy. Displays information about phones registered to Cisco Unified CME. Displays the LPCOR policy for the specified resource group.
DB-664
December 2010
Syntax Description
mac-address mac-address
(Optional) Defines the MAC address of the Cisco IP phone. (Optional) Specifies the MAC address of the Cisco IP phone.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.1(5)YD
Modification This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. This command was implemented on the Cisco 3725 and Cisco 3745 routers. This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. This command was implemented on the Cisco 1760 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone keepalive command sets keepalive debugging. If the mac-address keyword is not used, the debug ephone keepalive command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command. You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
DB-665
Examples
The following is sample output of the keepalive status for the Cisco IP phone with MAC address 0030.94C3.E1A8:
Router# debug ephone keepalive mac-address 0030.94c3.E1A8 EPHONE keepalive debugging is enabled for phone 0030.94C3.E1A8 1d05h: 1d05h: 1d05h: 1d05h: 1d05h: 1d05h: 1d05h: 1d05h: 1d05h: 1d05h: ephone-1 Set interface FastEthernet0/0 ETHERNET ephone-1[1]:Keepalive socket[1] SEP003094C3E1A8 ephone-1 Set interface FastEthernet0/0 ETHERNET ephone-1[1]:Keepalive socket[1] SEP003094C3E1A8 Skinny Checking for stale sockets ephone-1 Set interface FastEthernet0/0 ETHERNET ephone-1[1]:Keepalive socket[1] SEP003094C3E1A8 ephone-1 Set interface FastEthernet0/0 ETHERNET ephone-1[1]:Keepalive socket[1] SEP003094C3E1A8 Skinny active socket list (3/96): 1 2 4
Related Commands
Command debug ephone alarm debug ephone detail debug ephone error debug ephone loopback debug ephone pak debug ephone raw debug ephone register debug ephone state debug ephone statistics show debugging
Description Sets SkinnyStation alarm messages debugging for the Cisco IP phone. Sets detail debugging for the Cisco IP phone. Sets error debugging for the Cisco IP phone. Sets MWI debugging for the Cisco IP phone. Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. Provides raw low-level protocol debugging display for all SCCP messages. Sets registration debugging for the Cisco IP phone. Sets state debugging for the Cisco IP phone. Sets statistics debugging for the Cisco IP phone. Displays information about the types of debugging that are enabled for your router.
DB-666
December 2010
Syntax Description
mac-address mac-address
Command Modes
Privileged EXEC
Command History
Release 12.2(2)XT
Modification This command was introduced for Cisco IOS Telephony Services (now known as Cisco CallManager Express) Version 2.0 on the Cisco 1750, Cisco 1751, Cisco 2600 series, Cisco 3600 series, and Cisco IAD2420 series. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745. This command was implemented on the Cisco 2600-XM and Cisco 2691. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone loopback command sets debugging for incoming and outgoing calls on all loopback-dn pairs or on the single loopback-dn pair that is associated with the IP phone that has the MAC address specified in this command. If you enable the debug ephone loopback command and the debug ephone pak command at the same time, the output displays packet debug output for the voice packets that are passing through the loopback-dn pair. You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with that Cisco IP phone.
Examples
The following example contains two excerpts of output for a call that is routed through a loopback. The first excerpt is output from the show running-config command and displays the loopback configuration used for this example. The second excerpt is output from the debug ephone loopback command.
Router# show running-config
DB-667
. . . ephone-dn 14 number 1514 ! ! ephone-dn 42 number 17181.. loopback-dn 43 forward 4 no huntstop ! ! ephone-dn 43 number 19115.. loopback-dn 42 forward 4 ! . . .
A loopback call is started. An incoming call to 1911514 (ephone-dn 43) uses the loopback pair of ephone-dns to become an outgoing call to extension 1514. The number in the outgoing call has only four digits because the loopback-dn command specifies forwarding of four digits. The outgoing call uses ephone-dn 42, which is also specified in the loopback-dn command under ephone-dn 43. When the extension at 1514 rings, the following debug output is displayed:
Router# debug ephone loopback Mar 7 00:57:25.376:Pass processed call info to special DN 43 chan 1 Mar 7 00:57:25.376:SkinnySetCallInfoLoopback DN 43 state IDLE to DN 42 state IDLE Mar 7 00:57:25.376:Called Number = 1911514 Called Name = Mar 7 00:57:25.376:Calling Number = 8101 Calling Name = orig Called Number = Copy Caller-ID info from Loopback DN 43 to DN 42 Mar 7 00:57:25.376:DN 43 Forward 1514 Mar 7 00:57:25.376:PredictTarget match 1514 DN 14 is idle Mar 7 00:57:25.380:SkinnyUpdateLoopbackState DN 43 state RINGING calledDn -1 Mar 7 00:57:25.380:Loopback DN 42 state IDLE Mar 7 00:57:25.380:Loopback DN 43 calledDN -1 callingDn -1 G711Ulaw64k Mar 7 00:57:25.380:SkinnyUpdateLoopbackState DN 43 to DN 42 signal OFFHOOK Mar 7 00:57:25.380:SetDnCodec Loopback DN 43 codec 4:G711Ulaw64k vad 0 size 160 Mar 7 00:57:25.380:SkinnyDnToneLoopback DN 42 state SIEZE to DN 43 state RINGING Mar 7 00:57:25.380:TONE ON DtInsideDialTone Mar 7 00:57:25.380:SkinnyDnToneLoopback called number = 1911514 Mar 7 00:57:25.380:DN 43 Forward 1514 Mar 7 00:57:25.380:DN 42 from 43 Dial 1514 Mar 7 00:57:25.384:SkinnyDnToneLoopback DN 42 state ALERTING to DN 43 state RINGING Mar 7 00:57:25.384:TONE OFF Mar 7 00:57:25.384:SkinnyDnToneLoopback DN 42 state ALERTING to DN 43 state RINGING Mar 7 00:57:25.384:TONE OFF Mar 7 00:57:25.384:SkinnyUpdateLoopbackState DN 42 state ALERTING calledDn -1 Mar 7 00:57:25.384:Loopback DN 43 state RINGING Mar 7 00:57:25.384:Loopback Alerting DN 42 calledDN -1 callingDn -1 G711Ulaw64k Mar 7 00:57:25.388:ephone-5[7]:DisplayCallInfo incoming call Mar 7 00:57:25.388:SkinnyDnToneLoopback DN 42 state ALERTING to DN 43 state RINGING Mar 7 00:57:25.388:TONE ON DtAlertingTone Mar 7 00:57:25.388:SkinnyDnToneLoopback DN 42 to DN 43 deferred alerting by DtAlertingTone Mar 7 00:57:25.388:EFXS_STATE_ONHOOK_RINGING already done for DN 43 chan 1 Mar 7 00:57:25.388:Set prog_ind 0 for DN 42 chan 1 . .
DB-668
December 2010
When extension 1514 answers the call, the following debug output is displayed:
. . . Mar 7 00:57:32.158:SkinnyDnToneLoopback DN 42 state ALERTING to DN 43 state RINGING Mar 7 00:57:32.158:TONE OFF Mar 7 00:57:32.158:dn_support_g729 true DN 42 chan 1 (loopback) Mar 7 00:57:32.158:SetDnCodec Loopback DN 43 codec 4:G711Ulaw64k vad 0 size 160 Mar 7 00:57:32.158:SkinnyUpdateLoopbackState DN 42 state CALL_START calledDn 14 Mar 7 00:57:32.158:Loopback DN 43 state RINGING Mar 7 00:57:32.158:SkinnyUpdateLoopbackState DN 42 to DN 43 deferred alerting by CALL_START already sent Mar 7 00:57:32.158:SetDnCodec reassert defer_start for DN 14 chan 1 Mar 7 00:57:32.158:Delay media until loopback DN 43 is ready Mar 7 00:57:32.158:SkinnyUpdateLoopbackCodec check for DN 14 chan 1 from DN 42 loopback DN 43 Mar 7 00:57:32.158:SkinnyUpdateLoopbackCodec DN chain is 14 1, other=42, lb=43, far=-1 1, final=43 1 Mar 7 00:57:32.158:SkinnyUpdateLoopbackCodec DN 14 chan 1 DN 43 chan 1 codec 4 match Mar 7 00:57:32.162:SkinnyUpdateLoopbackState DN 42 state CONNECTED calledDn 14 Mar 7 00:57:32.162:Loopback DN 43 state RINGING Mar 7 00:57:32.162:SkinnyUpdateLoopbackState DN 42 to DN 43 signal ANSWER Mar 7 00:57:32.162:Loopback DN 42 calledDN 14 callingDn -1 G711Ulaw64k Mar 7 00:57:32.162:Loopback DN 43 calledDN -1 callingDn -1 incoming G711Ulaw64k Mar 7 00:57:32.162:ephone-5[7][SEP000DBDBEF37D]:refreshDisplayLine for line 1 DN 14 chan 1 Mar 7 00:57:32.162:dn_support_g729 true DN 43 chan 1 (loopback) Mar 7 00:57:32.162:SetDnCodec Loopback DN 42 codec 4:G711Ulaw64k vad 0 size 160 Mar 7 00:57:32.162:SkinnyUpdateLoopbackState DN 43 state CALL_START calledDn -1 Mar 7 00:57:32.162:Loopback DN 42 state CONNECTED Mar 7 00:57:32.162:SkinnyUpdateLoopbackState DN 43 has defer_dn 14 chan 1 set Mar 7 00:57:32.162:SkinnyUpdateLoopbackState DN 43 has defer_dn 14 chan 1: -invoke SkinnyOpenReceive Mar 7 00:57:32.162:SkinnyUpdateLoopbackCodec check for DN 14 chan 1 from DN 42 loopback DN 43 Mar 7 00:57:32.162:SkinnyUpdateLoopbackCodec DN chain is 14 1, other=42, lb=43, far=-1 1, final=43 1 Mar 7 00:57:32.162:SkinnyUpdateLoopbackCodec DN 14 chan 1 DN 43 chan 1 codec 4 match Mar 7 00:57:32.162:SkinnyUpdateLoopbackState DN 43 state CALL_START calledDn -1 Mar 7 00:57:32.162:Loopback DN 42 state CONNECTED Mar 7 00:57:32.454:SkinnyGetDnAddrInfo DN 43 LOOPBACK update media address to 10.0.0.6 25390 from DN 14 Mar 7 00:57:33.166:ephone-5[7]:DisplayCallInfo incoming call . . .
When the called extension, 1514, goes back on-hook, the following debug output is displayed:
. . . Mar Mar Mar Mar Mar Mar Mar Mar
7 7 7 7 7 7 7 7
00:57:39.224:Loopback DN 42 disc reason 16 normal state CONNECTED 00:57:39.224:SkinnyUpdateLoopbackState DN 42 state CALL_END calledDn -1 00:57:39.224:Loopback DN 43 state CONNECTED 00:57:39.224:SkinnyUpdateLoopbackState DN 42 to DN 43 signal ONHOOK 00:57:39.236:SkinnyDnToneLoopback DN 42 state IDLE to DN 43 state IDLE 00:57:39.236:TONE OFF 00:57:39.236:SkinnyDnToneLoopback DN 43 state IDLE to DN 42 state IDLE 00:57:39.236:TONE OFF
DB-669
Table 83
Field Called Number Forward PredictTarget Match signal OFFHOOK Dial deferred alerting DN chain
Description Original called number as presented to the incoming side of the loopback-dn. Outgoing number that is expected to be dialed by the outgoing side of the loopback-dn pair. Extension (ephone-dn) that is anticipated by the loopback-dn to be the far-end termination for the call. Indicates that the outgoing side of the loopback-dn pair is going off-hook prior to placing the outbound call leg. Outbound side of the loopback-dn that is actually dialing the outbound call leg. Indicates that the alerting, or ringing, tone is returning to the original inbound call leg in response to the far-end ephone-dn state. Chain of ephone-dns that has been detected, starting from the far-end that terminates the call. Each entry in the chain indicates an ephone-dn tag and channel number. Entries appear in the following order, from left to right:
Ephone-dn tag and channel of the far-end call terminator (in this example, ephone-dn 14 is extension 1514). otherEphone-dn tag of the outgoing side of the loopback. lbEphone-dn tag of the incoming side of the loopback. farEphone-dn tag and channel of the far-end call originator, or -1 for a nonlocal number. finalEphone-dn tag for the originator of the call on the incoming side of the loopback. If the originator is not a local ephone-dn, this is set to -1. This number represents the final ephone-dn tag in the chain, looking toward the originator.
Indicates that there is no codec conflict between the two calls on either side of the loopback-dn. IP address of the IP phone at the final destination extension (ephone-dn), after resolving the chain of ephone-dns involved. Disconnect cause code, in decimal. These are normal CC_CAUSE code values that are also used in call control API debugging. Common cause codes include the following:
DB-670
December 2010
Related Commands
Description Provides voice packet level debugging. Configures loopback-dn virtual loopback voice ports used to establish demarcation points for VoIP voice calls and supplementary services. Displays information about registered Cisco IP phones. Displays information for ephone-dns that have been set up for loopback calls.
DB-671
Syntax Description
detail
(Optional) Displays signaling connection control protocol (SCCP) messages sent and received between ephones in the Cisco Unified CallManager Express (Cisco Unified CME) system.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(9)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone message command enables message tracing between ephones. The debug ephone command debugs all ephones associated with a Cisco Unified CME router. You can enable or disable debugging on any number of ephones. To see the ephones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a ephone, the debug output is displayed for the directory numbers associated with the ephone.
Examples
The following is sample output for the debug ephone message command for ephones:
Router# debug ephone message EPHONE skinny message debugging is enabled *Jul 17 12:12:54.883: Received message from phone 7, SkinnyMessageID = StationKe epAliveMessageID *Jul 17 12:12:54.883: Sending message to phone 7, SkinnyMessageID = StationKe epAliveAckMessageID
DB-672
December 2010
Related Commands
Command debug ephone alarm debug ephone detail debug ephone error debug ephone mwi debug ephone pak debug ephone raw debug ephone register debug ephone state debug ephone statistics debug ephone video show debugging show ephone
Description Sets SkinnyStation alarm messages debugging for the ephone. Sets detail debugging for the ephone. Sets error debugging for the ephone. Sets MWI debugging for the ephone. Provides voice packet level debugging and displays the contents of one voice packet in every 1024 voice packets. Provides raw low-level protocol debugging display for all SCCP messages. Sets registration debugging for the ephone. Sets state debugging for the ephone. Sets statistics debugging for the ephone. Sets video debugging for the ephone. Displays information about the types of debugging that are enabled for your router. Displays information about ephones.
DB-673
Syntax Description
mac-address mac-address
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(24)T .
Usage Guidelines
Use this command to troubleshoot calls that use the MLPP service.
Examples
The following is sample output from the debug ephone mlpp command. This example shows output for the following call scenario:
Ephone 1 is connected to ephone 3 (nonMLPP call). Ephone 4 makes an MLPP call to ephone 3. Preemption tone is played to both ephone 1 and 3. Ephone 3 is disconnected after the preemption tone timeout and precedence ringing. Ephone 3 answers the MLPP call and is connected to ephone 4.
Router# debug ephone mlpp Sep 5 14:23:00.499: ephone-4[3/3][SEP001AE2BC3EE7]:indication=1 Sep 5 14:23:00.499: ephone-4[3/3][SEP001AE2BC3EE7]:max precedence=0 Sep 5 14:23:02.299: ephone-4[3/3][SEP001AE2BC3EE7]:mlpp_ephone_display_update callID=294 Sep 5 14:23:02.299: ephone-4[3/3][SEP001AE2BC3EE7]:indication=1 Sep 5 14:23:02.299: ephone-4[3/3][SEP001AE2BC3EE7]:mlpp precedence=4, domain=0 Sep 5 14:23:02.303: ephone-3[2/1][SEP001B54BA0D64]:preemption=1 Sep 5 14:23:02.303: ephone-3[2/1][SEP001B54BA0D64]:preemption=1 Sep 5 14:23:02.303: mlpp_ephone_find_call: preempt_htsp=1774234732, prempt_htsp->mlpp_preemptor_cid=294 Sep 5 14:23:02.303: //294/A6B5C03A8141/VOIP-MLPP/voice_mlpp_get_preemptInfo: mlpp_ephone_find_call is successful Sep 5 14:23:02.303: ephone-4[3/3][SEP001AE2BC3EE7]:indication=1 Sep 5 14:23:02.303: ephone-4[3/3][SEP001AE2BC3EE7]:mlpp precedence=4, domain=0 Sep 5 14:23:02.303: ephone-4[3/3][SEP001AE2BC3EE7]:indication=1 Sep 5 14:23:02.303: ephone-4[3/3][SEP001AE2BC3EE7]:mlpp precedence=4, domain=0 Sep 5 14:23:02.303: ephone-6[5/6][SEP0018187F49FD]:indication=1 Sep 5 14:23:02.303: ephone-6[5/6][SEP0018187F49FD]:mlpp precedence=4, domain=0
DB-674
December 2010
Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep
5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5
14:23:02.303: 14:23:02.307: 14:23:02.307: 14:23:02.307: 14:23:02.307: 14:23:07.307: 14:23:07.307: 14:23:07.319: 14:23:07.319: 14:23:07.319: 14:23:07.319: 14:23:07.319: 14:23:10.623: 14:23:10.623: 14:23:10.623: 14:23:10.623: 14:23:10.623: 14:23:10.623: 14:23:10.623: 14:23:10.623: 14:23:10.623:
ephone-4[3/3][SEP001AE2BC3EE7]:indication=1 ephone-1[0/2][SEP0014A9818797]:indication=1 ephone-3[2/1][SEP001B54BA0D64]:indication=1 ephone-1[0/2][SEP0014A9818797]:indication=1DtPreemptionTone ephone-3[2/1][SEP001B54BA0D64]:indication=1DtPreemptionTone ephone-3[2/1][SEP001B54BA0D64]:indication=1 ephone-1[0/2][SEP0014A9818797]:indication=1 ephone-3[2/1][SEP001B54BA0D64]:indication=1 ephone-3[2/1][SEP001B54BA0D64]:indication=1 ephone-3[2/1][SEP001B54BA0D64]:mlpp precedence=4, domain=0 ephone-3[2/1][SEP001B54BA0D64]:indication=1 ephone-3[2/1][SEP001B54BA0D64]: MLPP Precedence Ring 6 instead ephone-3[2/1][SEP001B54BA0D64]:indication=1 ephone-3[2/1][SEP001B54BA0D64]:indication=1 ephone-3[2/1][SEP001B54BA0D64]:mlpp precedence=4, domain=0 ephone-3[2/1][SEP001B54BA0D64]:indication=1 ephone-3[2/1][SEP001B54BA0D64]:mlpp precedence=4, domain=0 ephone-4[3/3][SEP001AE2BC3EE7]:indication=1 ephone-4[3/3][SEP001AE2BC3EE7]:mlpp precedence=4, domain=0 ephone-6[5/6][SEP0018187F49FD]:indication=1 ephone-6[5/6][SEP0018187F49FD]:mlpp precedence=4, domain=0
Related Commands
Command debug voice mlpp mlpp indication mlpp max-precedence mlpp preemption
Description Displays debugging information for MLPP service. Enables MLPP indication on an SCCP phone or analog FXS port. Sets the maximum precedence (priority) level that a phone user can specify when making an MLPP call. Enables preemption capability on an SCCP phone or analog FXS port.
DB-675
Syntax Description
mac-address mac-address
Command Modes
Privileged EXEC
Command History
Release 12.2(2)XT
Modification This command was introduced for Cisco IOS Telephony Services (now known as Cisco CallManager Express) Version 2.0 and Cisco Survivable Remote Site Telephony (SRST) Version 2.0 on the Cisco 1750, Cisco 1751, Cisco 2600 series, Cisco 3600 series, and Cisco IAD2420 series. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745. This command was implemented on the Cisco 2600-XM and Cisco 2691. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Always use the no moh command before modifying or replacing the MOH file in Flash memory. When a configuration using the multicast moh command is used and the debug ephone moh command is enabled, if you delete or modify the MOH file in the router's Flash memory, the debug output can be excessive and can flood the console. The multicast MOH configuration should be removed before using the no moh command when the debug ephone moh command is enabled.
Examples
The following sample output shows MOH activity prior to the first MOH session. Note that if you enable multicast MOH, that counts as the first session.
Router# debug ephone moh Mar Mar Mar Mar Mar 7 7 7 7 7 00:52:33.817:MOH AU file 00:52:33.817:skinny_open_moh_play 00:52:33.825: 2E73 6E64 0000 0018 00:52:33.825: 0000 1F40 0000 0001 00:52:33.825: FFFF FFFF FFFF FFFF
set type to 3 0007 3CCA 0000 0001 FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF
DB-676
December 2010
Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar
7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7
00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 00:52:33.825: 00:52:33.825:AU file processing Found .snd 00:52:33.825:AU file data start at 24 end at 474338 00:52:33.825:AU file codec Media_Payload_G711Ulaw64k 00:52:33.825:MOH read file header type AU start 24 end 474338 00:52:33.825:MOH pre-read block 0 at write-offset 0 from 24 00:52:33.833:MOH pre-read block 1 at write-offset 8000 from 8024 00:52:33.845:Starting read server with play-offset 0 write-offset 16000
Field type
Description 0invalid 1raw file 2wave format file (.wav) 3AU format (.au) 4live feed A .snd header was located in the AU file. Data start and end file offset within the MOH file, as indicated by the file header. File format found (AU, WAVE, or RAW). Location in the internal MOH buffer to which data is being written, and location from which that data was read in the file. Indicates the relative positioning of MOH file read-ahead buffering. Data is normally written from a Flash file into the internal circular buffer, ahead of the location from which data is being played or output.
AU file processing Found .snd AU file data start at, end at read file header type pre-read block, write-offset
play-offset, write-offset
Related Commands
Description Generates an audio stream from a file for MOH in a Cisco CME system. Uses the MOH audio stream as a multicast source in a Cisco CME system.
DB-677
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(2)XT
Modification This command was introduced on the following platforms: Cisco 1750, Cisco 1751, Cisco 2600 series and Cisco 3600 series multiservice routers; and Cisco IAD2420 series Integrated Access Devices (IADs). This command was implemented on the Cisco 3725 and Cisco 3745 routers. This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. This command was implemented on the Cisco 1760 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone mwi command sets message waiting indication debugging for the Cisco IOS Telephony Service router. Because the MWI protocol activity is not specific to any individual Cisco IP phone, setting the MAC address keyword qualifier for this command is not useful.
Note
Unlike the other related debug ephone commands, the mac-address keyword does not help debug a particular Cisco IP phone.
Examples
The following is sample output of the message waiting indication status for the Cisco IOS Telephony Service router:
Router# debug ephone mwi
DB-678
December 2010
Related Commands
Command debug ephone alarm debug ephone detail debug ephone error debug ephone keepalive debug ephone pak debug ephone raw debug ephone register debug ephone state debug ephone statistics show debugging
Description Sets SkinnyStation alarm messages debugging for the Cisco IP phone. Sets detail debugging for the Cisco IP phone. Sets error debugging for the Cisco IP phone. Sets keepalive debugging for the Cisco IP phone. Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. Provides raw low-level protocol debugging display for all SCCP messages. Sets registration debugging for the Cisco IP phone. Sets state debugging for the Cisco IP phone. Sets statistics debugging for the Cisco IP phone. Displays information about the types of debugging that are enabled for your router.
DB-679
Syntax Description
mac-address mac-address
(Optional) Defines the MAC address of the Cisco IP phone. (Optional) Specifies the MAC address of the Cisco IP phone.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.1(5)YD
Modification This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. This command was implemented on the Cisco 1760 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone pak command provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. If the mac-address keyword is not used, the debug ephone pak command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command. You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
DB-680
December 2010
Examples
The following is sample output of packet debugging for the Cisco IP phone with MAC address 0030.94c3.8724:
Router# debug ephone pak mac-address 0030.94c3.8724 EPHONE packet debugging is enabled for phone 0030.94c3.8724 01:29:14: ***ph_xmit_ephone DN 3 tx_pkts 5770 dest=10.2.1.1 orig len=32 pakcopy=0 discards 27 ip_enctype 0 0 last discard: unsupported payload type 01:29:14: to_skinny_duration 130210 offset -30 last -40 seq 0 adj 0 01:29:14: IP: 45B8 003C 0866 0000 3F11 3F90 2800 0001 0A02 0101 01:29:14: TTL 63 TOS B8 prec 5 01:29:14: UDP: 07D0 6266 0028 0000 01:29:14: sport 2000 dport 25190 length 40 checksum 0 01:29:14: RTP: 8012 16AF 9170 6409 0E9F 0001 01:29:14: is_rtp:1 is_frf11:0 vlen:0 delta_t:160 vofr1:0 vofr2:0 scodec:11 rtp_bits:8012 rtp_codec:18 last_bad_payload 19 01:29:14: vencap FAILED 01:29:14: PROCESS SWITCH 01:29:15: %SYS-5-CONFIG_I: Configured from console by console 01:29:34: ***SkinnyPktIp DN 3 10.2.1.1 to 40.0.0.1 pkts 4880 FAST sw 01:29:34: from_skinny_duration 150910 01:29:34: nw 3BBC2A8 addr 3BBC2A4 mac 3BBC2A4 dg 3BBC2C4 dgs 2A 01:29:34: MAC: 1841 0800 01:29:34: IP: 45B8 0046 682E 0000 3E11 E0BD 0A02 0101 2800 0001 01:29:34: TTL 62 TOS B8 prec 5 01:29:34: UDP: 6266 07D0 0032 0000 01:29:34: sport 25190 dport 2000 length 50 checksum 0 01:29:34: RTP: 8012 55FF 0057 8870 3AF4 C394 01:29:34: RTP: rtp_bits 8012 seq 55FF ts 578870 ssrc 3AF4C394 01:29:34: PAYLOAD: 01:29:34: 1409 37C9 54DE 449C 3B42 0446 3AAB 182E 01:29:34: 56BC 5184 58E5 56D3 13BE 44A7 B8C4 01:29:34: 01:29:37: ***ph_xmit_ephone DN 3 tx_pkts 6790 dest=10.2.1.1 orig len=32 pakcopy=0 discards 31 ip_enctype 0 0 last discard: unsupported payload type 01:29:37: to_skinny_duration 153870 offset -150 last -40 seq 0 adj 0 01:29:37: IP: 45B8 003C 0875 0000 3F11 3F81 2800 0001 0A02 0101 01:29:37: TTL 63 TOS B8 prec 5 01:29:37: UDP: 07D0 6266 0028 0000 01:29:37: sport 2000 dport 25190 length 40 checksum 0 01:29:37: RTP: 8012 1AAF 9173 4769 0E9F 0001 01:29:37: is_rtp:1 is_frf11:0 vlen:0 delta_t:160 vofr1:0 vofr2:0
Related Commands
Command debug ephone alarm debug ephone detail debug ephone error debug ephone keepalive debug ephone loopback debug ephone raw debug ephone register debug ephone state
Description Sets SkinnyStation alarm messages debugging for the Cisco IP phone. Sets detail debugging for the Cisco IP phone. Sets error debugging for the Cisco IP phone. Sets keepalive debugging for the Cisco IP phone. Sets MWI debugging for the Cisco IP phone. Provides raw low-level protocol debugging display for all SCCP messages. Sets registration debugging for the Cisco IP phone. Sets state debugging for the Cisco IP phone.
DB-681
Description Sets statistics debugging for the Cisco IP phone. Displays information about the types of debugging that are enabled for your router.
DB-682
December 2010
Syntax Description
mac-address mac-address
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for Cisco CallManager Express 3.0 and Cisco Survivable Remote Site Telephony (SRST) Version 3.0. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Once enabled, the debug ephone qov command produces output only when the QOV statistics reported by phones exceed preset limits. Phones are polled every few seconds for QOV statistics on VoIP calls only, not on local PSTN calls. An output report is produced when limits are surpassed for either or both of the following:
Lost packetsA report is triggered when two adjacent QOV samples show an increase of four or more lost packets between samples. The report is triggered by an increase of lost packets in a short period of time, not by the total number of lost packets. Jitter and latencyA report is triggered when either jitter or latency exceeds 100 milliseconds.
To receive a QOV report at the end of each call regardless of whether the QOV limits have been exceeded, enable the debug ephone alarm command in addition to the debug ephone qov command. The debug ephone statistics command displays the raw statistics that are polled from phones and used to generate QOV reports.
DB-683
Examples
The following sample output describes QOV statistics for a call on ephone 5:
Router# debug ephone qov Mar 7 00:54:57.329:ephone-5[7]:QOV DN 14 chan 1 (1514) ref 4 called=1514 calling=8101 Mar 7 00:54:57.329:ephone-5[7][SEP000DBDBEF37D]:Lost 91 Jitter 0 Latency 0 Mar 7 00:54:57.329:ephone-5[7][SEP000DBDBEF37D]:previous Lost 0 Jitter 0 Latency 0 Mar 7 00:54:57.329:ephone-5[7][SEP000DBDBEF37D]:Router sent 1153 pkts, current phone got 1141 received by all (shared) phones 0 Mar 7 00:54:57.329:ephone-5[7]:worst jitter 0 worst latency 0 Mar 7 00:54:57.329:ephone-5[7]:Current phone sent 1233 packets Mar 7 00:54:57.329:ephone-5[7]:Signal Level to phone 3408 (-15 dB) peak 3516 (-15 dB)
Description Number of lost packets reported by the IP phone. The most recent jitter and latency parameters reported by the IP phone. Values from the previous QOV statistics report that were used as the comparison points against which the current statistics triggered generation of the current report. Number of packets sent by the router to the IP phone. This number is the total for the entire call, even if the call is moved from one phone to another during a call, which can happen with shared lines. Number of packets received by the phone currently terminating the call. This number is the total for the entire call, even if the call is moved from one phone to another during a call, which can happen with shared lines. Highest value reported by the phone during the call. Number of packets that the current phone claims it sent during the call. Signal level seen in G.711 voice packet data prior to the sending of the most recent voice packet to the phone. The first number is the raw sample value, converted from G.711 to 16-bit linear format and left-justified. The number in parentheses is the value in decibels (dB), assuming that 32,767 is about +3 dB.
Note
worst jitter, worst latency Current phone sent packets Signal Level to phone
Related Commands
Description Displays alarm messages for IP phones. Displays call statistics for IP phones.
DB-684
December 2010
Syntax Description
mac-address mac-address
(Optional) Defines the MAC address of the Cisco IP phone. (Optional) Specifies the MAC address of the Cisco IP phone.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.1(5)YD
Modification This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. This command was implemented on the Cisco 3725 and Cisco 3745 routers. This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. This command was implemented on the Cisco 1760 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone raw command provides raw low-level protocol debug display for all SCCP messages. The debug display provides byte level display of Skinny TCP socket messages. If the mac-address keyword is not used, the debug ephone raw command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command. You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
DB-685
Examples
The following is sample output of raw protocol debugging for the Cisco IP phone with MAC address 0030.94c3.E1A8:
Router# debug ephone raw mac-address 0030.94c3.E1A8 EPHONE raw protocol debugging is enabled for phone 0030.94C3.E1A8 1d05h: skinny socket received 4 bytes on socket [1] 0 0 0 0 1d05h: 1d05h: SkinnyMessageID = 0 1d05h: skinny send 4 bytes 4 0 0 0 0 0 0 0 0 1 0 0 1d05h: socket [1] sent 12 bytes OK (incl hdr) for ephone-(1) 1d06h: skinny socket received 4 bytes on socket [1] 0 0 0 0 1d06h: 1d06h: SkinnyMessageID = 0 1d06h: skinny send 4 bytes 4 0 0 0 0 0 0 0 0 1 0 0 1d06h: socket [1] sent 12 bytes OK (incl hdr) for ephone-(1)
Related Commands
Command debug ephone alarm debug ephone detail debug ephone error debug ephone keepalive debug ephone loopback debug ephone pak debug ephone register debug ephone state debug ephone statistics show debugging
Description Sets SkinnyStation alarm messages debugging for the Cisco IP phone. Sets detail debugging for the Cisco IP phone. Sets error debugging for the Cisco IP phone. Sets keepalive debugging for the Cisco IP phone. Sets MWI debugging for the Cisco IP phone. Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. Sets registration debugging for the Cisco IP phone. Sets state debugging for the Cisco IP phone. Sets statistics debugging for the Cisco IP phone. Displays information about the types of debugging that are enabled for your router.
DB-686
December 2010
Syntax Description
mac-address mac-address
(Optional) Defines the MAC address of the Cisco IP phone. (Optional) Specifies the MAC address of the Cisco IP phone.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.1(5)YD
Modification This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. This command was implemented on the Cisco 1760 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone register command sets registration debugging for the Cisco IP phones. If the mac-address keyword is not used, the debug ephone register command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command. You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
DB-687
Examples
The following is sample output of registration debugging for the Cisco IP phone with MAC address 0030.94c3.8724:
Router# debug ephone register mac-address 0030.94c3.8724 Ephone registration debugging is enabled 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: . . . 1d06h: . New Skinny socket accepted [1] (2 active) sin_family 2, sin_port 50778, in_addr 10.1.0.21 skinny_add_socket 1 10.1.0.21 50778 ephone-(1)[1] StationRegisterMessage (2/3/12) from 10.1.0.21 ephone-(1)[1] Register StationIdentifier DeviceName SEP003094C3E1A8 ephone-(1)[1] StationIdentifier Instance 1 deviceType 7 ephone-1[-1]:stationIpAddr 10.1.0.21 ephone-1[-1]:maxStreams 0 ephone-(1) Allow any Skinny Server IP address 10.1.0.6
Related Commands
Command debug ephone alarm debug ephone detail debug ephone error debug ephone keepalive debug ephone loopback debug ephone pak debug ephone raw debug ephone state debug ephone statistics show debugging
Description Sets SkinnyStation alarm messages debugging for the Cisco IP phone. Sets detail debugging for the Cisco IP phone. Sets error debugging for the Cisco IP phone. Sets keepalive debugging for the Cisco IP phone. Sets MWI debugging for the Cisco IP phone. Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. Provides raw low-level protocol debugging display for all SCCP messages. Sets state debugging for the Cisco IP phone. Sets statistics debugging for the Cisco IP phone. Displays information about the types of debugging that are enabled for your router.
DB-688
December 2010
Syntax Description
mac-address mac-address
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(9)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is used with Cisco Unified CallManager Express (Cisco Unified CME). This command outputs only the debug messages that correspond to SCCP messages sent to IP phones to indicate the SCCP phone call state, such as RingIn, OffHook, Connected, and OnHook. These debug messages are also included in the output for the debug ephone detail command among other information.
Examples
The following example sets SCCP state debugging for one Cisco Unified CME phone with the MAC address of 678B.AEF9.DAB5.
Router# debug ephone sccp-state mac-address 678B.AEF9.DAB5 EPHONE SCCP state message debugging is enabled for ephones 000B.BEF9.DFB5 *Mar 8 06:38:45.863: 4085254871 unknown *Mar 8 06:38:50.487: *Mar 8 06:38:52.399: *Mar 8 06:38:52.399: TsConnected *Mar 8 06:38:58.415: 4085254871 unknown %ISDN-6-CONNECT: Interface Serial2/0/0:22 is now connected to ephone-2[13]:SetCallState line 4 DN 60(60) chan 1 ref 100 TsRingIn ephone-2[13]:SetCallState line 4 DN 60(-1) chan 1 ref 100 TsOffHook ephone-2[13]:SetCallState line 4 DN 60(-1) chan 1 ref 100 %ISDN-6-CONNECT: Interface Serial2/0/0:22 is now connected to
DB-689
*Mar 8 06:38:59.963: ephone-2[13]:SetCallState line 4 DN 60(-1) chan 1 ref 100 TsOnHook *Mar 8 06:38:59.975: %ISDN-6-DISCONNECT: Interface Serial2/0/0:22 disconnected from 4085254871 , call lasted 7 seconds
Related Commands
Description Sets detail debugging for one or all Cisco Unified IP phones.
DB-690
December 2010
Syntax Description
mac-address mac-address
(Optional) Defines the MAC address of the Cisco IP phone. (Optional) Specifies the MAC address of the Cisco IP phone.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.1(5)YD
Modification This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. This command was implemented on Cisco 1760 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone state command sets state debugging for the Cisco IP phones. If the mac-address keyword is not used, the debug ephone state command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command. You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
DB-691
Examples
The following is sample output of state debugging for the Cisco IP phone with MAC address 0030.94c3.E1A8:
Router# debug ephone state mac-address 0030.94c3.E1A8 EPHONE state debugging is enabled for phone 0030.94C3.E1A8 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: ephone-1[1]:OFFHOOK ephone-1[1]:SIEZE on activeline 0 ephone-1[1]:SetCallState line 1 DN 1 TsOffHook ephone-1[1]:Skinny-to-Skinny call DN 1 to DN 2 instance 1 ephone-1[1]:SetCallState line 1 DN 1 TsRingOut ephone-1[1]:Call Info DN 1 line 1 ref 158 called 5002 calling 5001 ephone-1[1]: Jane calling ephone-1[1]: Jill ephone-1[1]:SetCallState line 3 DN 2 TsRingIn ephone-1[1]:Call Info DN 2 line 3 ref 159 called 5002 calling 5001 ephone-1[1]: Jane calling ephone-1[1]: Jill ephone-1[1]:SetCallState line 3 DN 2 TsCallRemoteMultiline ephone-1[1]:SetCallState line 1 DN 1 TsConnected ephone-1[1]:OpenReceive DN 1 codec 4:G711Ulaw64k duration 10 ms bytes 80 ephone-1[1]:OpenReceiveChannelAck 1.2.172.21 port=24010 ephone-1[1]:StartMedia 1.2.172.22 port=24612 DN 1 codec 4:G711Ulaw64k duration 10 ms bytes 80 ephone-1[1]:CloseReceive ephone-1[1]:StopMedia ephone-1[1]:SetCallState line 3 DN 2 TsOnHook ephone-1[1]:SetCallState line 1 DN 1 TsOnHook ephone-1[1]:SpeakerPhoneOnHook ephone-1[1]:ONHOOK ephone-1[1]:SpeakerPhoneOnHook SkinnyReportDnState DN 1 ONHOOK
Related Commands
Command debug ephone alarm debug ephone detail debug ephone error debug ephone keepalive debug ephone loopback debug ephone pak debug ephone raw debug ephone register debug ephone show debugging
Description Sets SkinnyStation alarm messages debugging for the Cisco IP phone. Sets detail debugging for the Cisco IP phone. Sets error debugging for the Cisco IP phone. Sets keepalive debugging for the Cisco IP phone. Sets MWI debugging for the Cisco IP phone. Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. Provides raw low-level protocol debugging display for all SCCP messages. Sets registration debugging for the Cisco IP phone. Sets statistics debugging for the Cisco IP phone. Displays information about the types of debugging that are enabled for your router.
DB-692
December 2010
Syntax Description
mac-address mac-address
(Optional) Defines the MAC address of the Cisco IP phone. (Optional) Specifies the MAC address of the Cisco IP phone.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.1(5)YD
Modification This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. This command was implemented on the Cisco 1760 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone statistics command provides a debug monitor display of the periodic messages from the Cisco IP phone to the router. These include transmit-and-receive packet counts and an estimate of drop packets. The call statistics can also be displayed for live calls using the show ephone command. If the mac-address keyword is not used, the debug ephone statistics command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command. You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
DB-693
Examples
The following is sample output of statistics debugging for the Cisco IP phone with MAC address 0030.94C3.E1A8:
Router# debug ephone statistics mac-address 0030.94C3.E1A8 EPHONE statistics debugging is enabled for phone 0030.94C3.E1A8 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: 1d06h: Clear Call Stats for DN 1 call ref 162 Clear Call Stats for DN 1 call ref 162 Clear Call Stats for DN 1 call ref 162 Clear Call Stats for DN 2 call ref 163 ephone-1[1]:GetCallStats line 1 ref 162 DN 1: 5001 ephone-1[1]:Call Stats for line 1 DN 1 5001 ref 162 ephone-1[1]:TX Pkts 0 bytes 0 RX Pkts 0 bytes 0 ephone-1[1]:Pkts lost 4504384 jitter 0 latency 0 ephone-1[1]:Src 0.0.0.0 0 Dst 0.0.0.0 0 bytes 80 vad 0 G711Ulaw64k ephone-1[1]:GetCallStats line 1 ref 162 DN 1: 5001 STATS: DN 1 Packets Sent 0 STATS: DN 2 Packets Sent 0 ephone-1[1]:Call Stats found DN -1 from Call Ref 162 ephone-1[1]:Call Stats for line 0 DN -1 5001 ref 162 ephone-1[1]:TX Pkts 275 bytes 25300 RX Pkts 275 bytes 25300 ephone-1[1]:Pkts lost 0 jitter 0 latency 0
Related Commands
Command debug ephone alarm debug ephone detail debug ephone error debug ephone keepalive debug ephone loopback debug ephone pak debug ephone raw debug ephone register debug ephone state show debugging
Description Sets SkinnyStation alarm messages debugging for the Cisco IP phone. Sets detail debugging for the Cisco IP phone. Sets error debugging for the Cisco IP phone. Sets keepalive debugging for the Cisco IP phone. Sets MWI debugging for the Cisco IP phone. Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. Provides raw low-level protocol debugging display for all SCCP messages. Sets registration debugging for the Cisco IP phone. Sets state debugging for the Cisco IP phone. Displays information about the types of debugging that are enabled for your router.
DB-694
December 2010
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(9)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ephone video command sets ephone video traces, which provide information about different video states for the call, including video capabilities selection, start, and stop. The debug ephone command debugs all ephones that are registered to the Cisco Unified CallManager Express (Cisco Unified CME) system. You can enable or disable debugging on any number of ephones. To see the ephones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a ephone, the debug output is displayed for the directory numbers associated with the ephone.
Examples
The following is sample output for the debug ephone video command for ephones:
Router# debug ephone video *Mar 13 16:10:02.703: tx_idxpref = 3, *Mar 13 16:10:02.703: tx_mpi = 1 *Mar 13 16:10:04.711: *Mar 13 16:10:04.711: *Mar 13 16:10:04.711: *Mar 13 16:10:04.719: chan 1 dn 19 SkinnyVideoCodecMatch_Caps2Caps: match capability: tx_idxcap = 4, rx_idxcap = 0, rx_idxpref = 0, videoBitRate = 7040 ephone-19[1][SEPFFFA00000019]:checkToOpenMultiMedia: dn=19, chan=1 ephone-19[1]:skinnyDP[19].s2s = 0 ephone-19[1]:s2s is not set - hence not video capable ephone-19[1][SEPFFFA00000019]:SkinnyStartMultiMediaTransmission:
DB-695
*Mar 13 16:10:04.723: ephone-19[1]:Accept OLC and open multimedia channel *Mar 13 16:10:04.723: ephone-19[1][SEPFFFA00000019]:SkinnyOpenMultiMediaReceiveChannel: dn 19 chan 1 *Mar 13 16:10:04.967: ephone-19[1][SEPFFFA00000019]:fStationOpenReceiveChannelAckMessage: MEDIA_DN 19 MEDIA_CHAN 1 *Mar 13 16:10:04.967: ephone-19[1]:fStationOpenMultiMediaReceiveChannelAckMessage: *Mar 13 16:10:04.967: ephone-19[1]:Other_dn == -1 sk3745-2# *Mar 13 16:10:14.787: ephone-19[1]:SkinnyStopMedia: Stop Multimedia *Mar 13 16:10:14.787: ephone-19[1][SEPFFFA00000019]:SkinnyCloseMultiMediaReceiveChannel: passThruPartyID = 0, callReference = 23 *Mar 13 16:10:14.787: ephone-19[1]:SkinnyStopMultiMediaTransmission: line 1 chan 1 dn 19
Related Commands
Command debug ephone alarm debug ephone detail debug ephone error debug ephone message debug ephone mwi debug ephone pak debug ephone raw debug ephone register debug ephone state debug ephone statistics show debugging show ephone
Description Sets SkinnyStation alarm messages debugging for the ephone. Sets detail debugging for the ephone. Sets error debugging for the ephone. Sets message debugging for the ephone. Sets MWI debugging for the ephone. Provides voice packet level debugging and displays the contents of one voice packet in every 1024 voice packets. Provides raw low-level protocol debugging display for all SCCP messages. Sets registration debugging for the ephone. Sets state debugging for the ephone. Sets statistics debugging for the ephone. Displays information about the types of debugging that are enabled for your router. Displays information about registered ephones.
DB-696
December 2010
Syntax Description
mac-address mac-address
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command displays the voice-mail integration patterns that were created using the pattern commands in vm-integration configuration mode. The patterns are used to forward calls to a voice-mail number that is set with the voicemail command. If you do not specify the mac-address keyword, the debug ephone vm-integration command debugs all Cisco IP phones that are registered to the router. To remove debugging for Cisco IP phones, enter the no form of this command with the mac-address keyword.
Examples
The following sample output shows information for the vm-integration tokens that have been defined:
Router# debug ephone vm-integration *Jul *Jul *Jul *Jul *Jul *Jul *Jul *Jul *Jul *Jul *Jul 23 23 23 23 23 23 23 23 23 23 23 15:38:03.294:ephone-3[3]:StimulusMessage 15 (1) From ephone 2 15:38:03.294:ephone-3[3]:Voicemail access number pattern check 15:38:03.294:SkinnyGetCallState for DN 3 chan 1 IDLE 15:38:03.294:called DN -1 chan 1, calling DN -1 chan 1 phone -1 s2s:0 15:38:03.294:dn number for dn 3 is 19003 15:38:03.294:Updated number for token 1 is 19003 15:38:03.294:CDN number for dn 3 is 15:38:03.294:Updated number for token 2 is 15:38:03.294:Updated number for token 0 is 15:38:03.294:Update is 219003* 15:38:03.294:New Voicemail number is 19101219003*
DB-697
Table 86
Description First token that was defined in the pattern. Second token that was defined in the pattern. Third token that was defined in the pattern.
Related Commands
Description Configures the DTMF digit pattern forwarding necessary to activate the voice-mail system when a user presses the Messages button on a phone. Configures the DTMF digit pattern forwarding necessary to activate the voice-mail system once an internal extension reaches a busy extension and the call is forwarded to voice mail. Configures the DTMF digit pattern forwarding necessary to activate the voice-mail system once an internal extension fails to connect to an extension and the call is forwarded to voice mail. Configures the DTMF digit pattern forwarding necessary to activate the voice-mail system once an external trunk call reaches a busy extension and the call is forwarded to voice mail. Configures the DTMF digit pattern forwarding necessary to activate the voice-mail system when an external trunk call reaches an unanswered extension and the call is forwarded to voice mail. Enters voice-mail integration configuration mode and enables voice-mail integration with DTMF and analog voice-mail systems. Defines the telephone number that is speed-dialed when the Messages button on a Cisco IP phone is pressed.
vm-integration
voicemail
DB-698
December 2010
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(24
Usage Guidelines
This command displays debugging information about the Whisper Intercom feature configured on a directory number of a SCCP phone.
Examples
The following example displays output from the debug ephone whisper-intercom command:
Router# debug ephone whisper-intercom ephone-1[0] Mac:1111.C1C1.0001 TCP socket:[8] activeLine:0 whisperLine:2 REGISTERED in SCCP ver 12/12 max_streams=3 mediaActive:0 whisper_mediaActive:0 startMedia:1 offhook:1 ringing:0 reset:0 reset_sent:0 paging 0 debug:0 caps:5 IP:10.6.2.185 9237 7970 keepalive 16 max_line 8 button 1: dn 1 number 2001 CH1 IDLE CH2 IDLE button 2: dn 161 number 6001 auto dial 6002 CH1 WHISPER Preferred Codec: g711ulaw Active Call on DN 161 chan 1 :6001 0.0.0.0 0 to 10.6.2.185 9280 via 10.6.2.185 G711Ulaw64k 160 bytes no vad Tx Pkts 0 bytes 0 Rx Pkts 0 bytes 0 Lost 0 Jitter 0 Latency 0 callingDn -1 calledDn 162
ephone-2[1] Mac:1111.C1C1.0002 TCP socket:[7] activeLine:0 whisperLine:2 REGISTERED in SCCP ver 12/12 max_streams=3 mediaActive:0 whisper_mediaActive:1 startMedia:0 offhook:1 ringing:0 reset:0 reset_sent:0 paging 0 debug:0 caps:5 IP:10.6.2.185 9240 7970 keepalive 16 max_line 8 button 1: dn 2 number 2002 CH1 IDLE CH2 IDLE
DB-699
button 2: dn 162 number 6002 auto dial 6001 CH1 WHISPER Preferred Codec: g711ulaw Active Call on DN 162 chan 1 :6002 10.6.2.185 9280 to 10.6.2.254 2000 via 10.6.2.185 G711Ulaw64k 160 bytes no vad Tx Pkts 0 bytes 0 Rx Pkts 0 bytes 0 Lost 0 Jitter 0 Latency 0 callingDn 161 calledDn -1
Related Commands
Description Displays information about whisper intercom ephone-dns that have been created in Cisco Unified CME. Enables the Whisper Intercom feature on a directory number.
DB-700
December 2010
debug errors
To display errors, use the debug errors command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug errors no debug errors
Syntax Description
Command Modes
Privileged EXEC
Examples
The first line of output indicates that a packet was routed to the interface, but no static map was set up to route that packet to the proper virtual circuit. The second line of output shows that an OAM F5 (virtual circuit) cell error occurred.
DB-701
debug eswilp
To enable debugging of Ethernet switch network module features, use the debug eswilp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug eswilp {dot1x | filtermgr | fltdrv | igmp | port-driver | power-supply | span | switch-pm} no debug eswilp {dot1x | filtermgr | fltdrv | igmp | port-driver | power-supply | span | switch-pm}
Syntax Description
Displays Ethernet Switch with Inline Power (ESWILP) 802.1x debugging messages. Displays ESWILP filter manager debugging messages. Displays ESWILP filter driver debugging messages. Displays ESWILP Internet Group Management Protocol (IGMP) debugging messages. Displays ESWILP port driver debugging messages. Displays ESWILP power supply information debugging messages. Displays ESWILP Switched Port Analyzer (SPAN) debugging messages. Displays ESWILP switch port manager debugging messages.
Defaults
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. The dot1x, filtermgr, and fltdrv keywords were added. This command was integrated into Cisco IOS Release 12.3(4)T on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.3(4)T
12.2(33)SRA 12.2SX
Usage Guidelines
The undebug eswilp command is the same as the no debug eswilp command.
DB-702
December 2010
Examples
The following example shows debugging messages for the IGMP snooping services on the Ethernet switch network module being displayed:
Router# debug eswilp igmp
Related Commands
Description Displays information about the types of debugging that are enabled.
DB-703
debug ethernet cfm all [domain domain-name | level level-id] [evc evc-name | vlan vlan-id] no debug ethernet cfm all [domain domain-name | level level-id] [evc evc-name | vlan vlan-id]
CFM IEEE 802.1ag Standard (CFM IEEE)
debug ethernet cfm all [domain domain-name] [port | vlan vlan-id] no debug ethernet cfm all [domain domain-name] [port | vlan vlan-id]
Syntax Description
(Optional) Indicates that a domain is specified. (Optional) String of a maximum of 154 characters. (Optional) Indicates that a maintenance level is specified. (Optional) Integer in the range of 0 to 7 that specifies the maintenance level. (Optional) Identifies the Ethernet virtual connection (EVC). An EVC is an association of two or more user network interfaces (UNIs). (Optional) String that identifies the EVC name. (Optional) Indicates a DOWN service direction with no VLAN association (untagged). (Optional) Indicates that a VLAN is specified. (Optional) Integer in the range of 1 to 4094 that identifies the affected VLAN.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(11)T. The evc keyword and evc-name argument were introduced on the Cisco 7600 Series Route Switch Processor 720 (RSP 720) and the Cisco 7600 Series Supervisor Engine 720.
DB-704
December 2010
Release 12.2(33)SXI2
Modification This command was integrated into Cisco IOS Release 12.2(33)SXI2.
The level and evc keywords and the level-id and evc-name arguments are not supported in Cisco IOS Release 12.2(33)SXI2.
12.2(33)SRE 15.1(1)T
This command was integrated into Cisco IOS Release 12.2(33)SRE. This command was integrated into Cisco IOS Release 15.1(1)T.
Usage Guidelines
In CFM IEEE, if a domain name has more than 43 characters, a warning message is displayed notifying that the maintenance domain ID (MDID) will be truncated to 43 characters in continuity check messages (CCMs) if id <fmt> <MDID> is not configured. This command allows you to conditionally enable debug messages. The messages depend on the version of CFM you are running. When CFM IEEE is running, you are prompted to respond yes or no. The messages relate to the following:
Maintenance domain Maintenance level Maintenance domain plus VLAN or EVC Maintenance level plus VLAN or EVC Maintenance domain Maintenance level VLAN or EVC Combination of maintenance domain and VLAN or EVC Combination of maintenance level and VLAN or EVC
The output from the debug ethernet cfm all command is a log of activity that shows all Ethernet CFM-related debug messages. Use this command to troubleshoot Ethernet CFM in your network.
Examples
The following example shows output of the debug ethernet cfm all command:
Router# debug ethernet cfm all domain Domain_L5 vlan 9 This may impact network performance. Continue? (yes/[no]): yes Ethernet CFM level 5 domain Domain_L5 vlan 9 packet debugging is on Ethernet CFM level 5 domain Domain_L5 vlan 9 event debugging is on Router# Jun 17 21:41:49.839: CFM-PKT: Received a CC packet with MPID 401, level 5, vlan 9 from interface Ethernet0/0.9 Jun 17 21:41:49.839: CFM-EVT: Found remote mep for domain Domain_L5, level 5 vlan 9, mpid 401 mac aabb.cc03.bb99 Jun 17 21:41:49.839: CFM-EVT: Updated rmep in MIP CCDB, domain Domain_L5 level 5, vlan 9 mac aabb.cc03.bb99 intf Ethernet0/0.9 Router# Jun 17 21:41:56.007: CFM-PKT: Sending Up direction MEP 220 CC message, level 5, vlan 9 Router# Jun 17 21:42:00.539: CFM-PKT: Received a CC packet with MPID 401, level 5, vlan 9 from interface Ethernet0/0.9
DB-705
Jun 17 21:42:00.539: CFM-EVT: Found remote mep for domain Domain_L5, level 5 vlan 9, mpid 401 mac aabb.cc03.bb99 Jun 17 21:42:00.539: CFM-EVT: Updated rmep in MIP CCDB, domain Domain_L5 level 5, vlan 9 mac aabb.cc03.bb99 intf Ethernet0/0.9
Related Commands
Command debug ethernet cfm diagnostic debug ethernet cfm error debug ethernet cfm events debug ethernet cfm packets
Description Enables low-level diagnostic debugging of Ethernet CFM general or packet-related events. Enables debugging of Ethernet CFM errors. Enables debugging of Ethernet CFM events. Enables debugging of Ethernet CFM message packets.
DB-706
December 2010
debug ethernet cfm diagnostic [events | packets] no debug ethernet cfm diagnostic [events | packets]
CFM IEEE 802.1ag Standard (CFM IEEE)
debug ethernet cfm diagnostic [ais | events | lck | mip-autocreate | packets [ais | cc | lb | lck | lt]] no debug ethernet cfm diagnostic [ais | events | lck | mip-autocreate | packets [ais | cc | lb | lck | lt]]
Syntax Description
(Optional) Triggers debugging of Alarm Indication Signal (AIS) activities. (Optional) Triggers debugging of events. (Optional) Triggers debugging of lck events.
When used with the packets keyword, triggers debugging of lck packets.
(Optional) Triggers debugging of MIP autocreate activities. (Optional) Triggers debugging of packets. (Optional) Triggers debugging of alarm indication signal (AIS) packets. (Optional) Triggers debugging of continuity check (cc) packets. (Optional) Triggers debugging of loopback (lb) packets. (Optional) Triggers debugging of linktrace (lt) packets.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(11)T. This command was integrated into Cisco IOS Release 12.2(33)SXI2. This command was integrated into Cisco IOS Release 12.2(33)SRE. This command was integrated into Cisco IOS Release 15.1(1)T.
DB-707
Usage Guidelines
The output from this command is a log of activity. Use this command to troubleshoot Ethernet CFM in your network.
Examples
The following example shows output of the debug ethernet cfm diagnostic command with no options specified:
Router# debug ethernet cfm diagnostic Ethernet CFM diagnostic events debugging is on Ethernet CFM diagnostic packets debugging is on Ethernet CFM diagnostic mip_autocreate debugging is on Ethernet CFM diagnostic ais debugging is on Ethernet CFM diagnostic lck debugging is on Ethernet CFM diagnostic packet cc debugging is on Ethernet CFM diagnostic packet lb debugging is on Ethernet CFM diagnostic packet lt debugging is on Ethernet CFM diagnostic packet filter debugging is on Ethernet CFM diagnostic packet ais debugging is on Ethernet CFM diagnostic packet lck debugging is on Router# Router# *Jun 17 21:48:56.803: CFM-PKT: Sending Up direction MEP 401 CC message, level 5, vlan 9 *Jun 17 21:48:56.803: CFMPAL-PKT: pak (CC) sent to interface Ethernet0/0.1 (linktype=1AG) Router# *Jun 17 21:49:00.535: CFMPAL-PKT: Received a CFM packet (CC) from port Ethernet0/0.11 (linktype=1AG) *Jun 17 21:49:00.535: cc_filter, service mcl = 7 for vlan = 11 *Jun 17 21:49:00.535: ecfm_pal_cc_filter:computed levels - fl = -1, fm = -1, hm = -1, level = 7 *Jun 17 21:49:00.535: ecfm_pal_cc_filter:hi_ofm=-1, lo_ofm=-1, hi_ifm=-1, lo_ifm=-1, mcl=7, mip_level=-1 *Jun 17 21:49:00.535: pak_level EQUAL MCL *Jun 17 21:49:00.535: L > fl, Punt and Forward *Jun 17 21:49:00.535: CFMPAL-EVT: packet not sent out on Ethernet0/1.11, hmep = 7 *Jun 17 21:49:00.535: CFM-PKT: Received a CC packet from interface Ethernet0/0.11 *Jun 17 21:49:00.535: CFM-PKT: cfm packet dump - 105 bytes, interface Ethernet0/0.11, vlan 11 *Jun 17 21:49:00.535: CFM-PKT: ethernet CFM (1AG) message dump, dest: 0180.c200.0037 src: aabb.cc03.b999 Version: 0 Maintenance Level: 7 MsgType: CC(1) Flags: 0x5 First TLV Offset: 70 *Jun 17 21:49:00.535: 01 80 C2 00 00 37 AA BB CC 03 B9 99 89 02 E0 01 05 46 26 FB 65 04 *Jun 17 21:49:00.535: 09 44 6F 6D 61 69 6E 5F 4C 37 02 0B 63 75 73 74 5F 37 30 30 00 00 *Jun 17 21:49:00.535: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 *Jun 17 21:49:00.535: 00 00 00 00 00 00 00 00 00 2C 20 56 65 02 00 01 02 04 00 01 05 00 *Jun 17 21:49:00.535: 00 0C 01 02 00 *Jun 17 21:49:00.535: CFM-PKT: Received a CC packet with MPID 101, level 7, vlan interface Ethernet0/0.11 *Jun 17 21:49:00.535: CFMPAL-I-PKT: pak (CC) sent to interface Ethernet0/2.1 (linktype=1AG) Router# *Jun 17 21:49:02.675: CFM-PKT: Sending Up direction MEP 301 CC message, level 7, AC E5 00 5F 6C 37 00 00 00 01 1F 00
11 from
vlan 11
DB-708
December 2010
*Jun 17 21:49:02.675: CFMPAL-PKT: pak (CC) sent to interface Ethernet0/0.11 (linktype=1AG) *Jun 17 21:49:02.675: CFMPAL-PKT: pak (CC) sent to interface Ethernet0/2.1 (linktype=1AG) *Jun 17 21:49:02.943: CFMPAL-PKT: Received a CFM packet (CC) from port Ethernet0/0.1 (linktype=1AG) *Jun 17 21:49:02.947: cc_filter, service mcl = 5 for vlan = 9 *Jun 17 21:49:02.947: ecfm_pal_cc_filter:computed levels - fl = -1, fm = -1, hm = -1, level = 5 *Jun 17 21:49:02.947: ecfm_pal_cc_filter:hi_ofm=-1, lo_ofm=-1, hi_ifm=-1, lo_ifm=-1, mcl=5, mip_level=-1 *Jun 17 21:49:02.947: pak_level EQUAL MCL *Jun 17 21:49:02.947: L > fl, Punt and Forward *Jun 17 21:49:02.947: CFMPAL-EVT: packet not sent out on Ethernet0/1.1, hmep = 5 *Jun 17 21:49:02.947: CFM-PKT: Received a CC packet from interface Ethernet0/0.1 *Jun 17 21:49:02.947: CFM-PKT: cfm packet dump - 105 bytes, interface Ethernet0/0.1, vlan 9 *Jun 17 21:49:02.947: CFM-PKT: ethernet CFM (1AG) message dump, dest: 0180.c200.0035 src: aabb.cc03.b999 Version: 0 Maintenance Level: 5 MsgType: CC(1) Flags: 0x5 First TLV Offset: 70 *Jun 17 21:49:02.947: 01 80 C2 DC 04 Router# *Jun 17 21:49:02.947: 09 44 6F 00 00 *Jun 17 21:49:02.947: 00 00 00 00 00 *Jun 17 21:49:02.947: 00 00 00 05 00 *Jun 17 21:49:02.947: 00 0C 01 *Jun 17 21:49:02.947: CFM-PKT: interface Ethernet0/0.1 00 00 35 AA BB CC 03 B9 99 89 02 A0 01 05 46 06 5B 0C 0E 00
Related Commands
Command debug ethernet cfm all debug ethernet cfm error debug ethernet cfm events debug ethernet cfm packets
Description Enables all Ethernet CFM debug messages. Enables debugging of Ethernet CFM errors. Enables debugging of Ethernet CFM events. Enables debugging of Ethernet CFM message packets.
DB-709
Syntax Description
Command Default
Debugging is disabled.
Command Modes
Command History
Modification This command was introduced. This command replaces the debug ethernet cfm errors command. This command was integrated into Cisco IOS Release 12.2(33)SRE. This command was integrated into Cisco IOS Release 15.1(1)T.
Usage Guidelines
There is no filtering capability for this command. The output from this command is a log of activity. Use this command to troubleshoot Ethernet CFM in your network.
Examples
The following example shows output of the debug ethernet cfm error command:
Router# debug ethernet cfm error Ethernet CFM error debugging is on Router# Router# Router#! turn off cc messages on the other side for vlan 9 Router# *Jun 17 21:53:44.955: CFM-ERR: Lifetime timer fired for level 5, vlan 9 mac aabb.cc03.b999, mpid 220 Router# Router# show ethernet cfm error -------------------------------------------------------------------------------MPID Domain Id Mac Address Type Id Lvl MAName Reason Age -------------------------------------------------------------------------------220 Domain_L5 aabb.cc03.b999 Vlan 9 5 cust_500_l5 Lifetime Timer Expired 17s
DB-710
December 2010
Related Commands
Command debug ethernet cfm all debug ethernet cfm diagnostic debug ethernet cfm events debug ethernet cfm packets
Description Enables all Ethernet CFM debug messages. Enables low-level diagnostic debugging of Ethernet CFM general events or packet-related events. Enables debugging of Ethernet CFM events. Enables debugging of Ethernet CFM message packets.
DB-711
Effective with Cisco IOS Release 12.2(33)SXI2, the debug ethernet cfm errors command is replaced by the debug ethernet cfm error command. See the debug ethernet cfm error command for more information. To enable debugging of Ethernet connectivity fault management (CFM) errors, use the debug ethernet cfm errors command in privileged EXEC mode. To disable the debugging, use the no form of this command. debug ethernet cfm errors no debug ethernet cfm errors
Syntax Description
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(11)T. This command was replaced by the debug ethernet cfm error command.
Usage Guidelines
The output from this command is a log of activity. Use this command to troubleshoot Ethernet CFM in your network.
Examples
The following example shows output of the debug ethernet cfm errors command:
Router# debug ethernet cfm errors 10:46:26: 10:46:26: svlan 2 10:48:55: 10:48:56: 10:48:57: CFM-ERR: MPID matched with a local MEP!, level 5, svlan 2, mpid 50 CFM-ERR: Received duplicate mpid 50 due to configuration error for level 5, CFM-ERR: Lifetime timer fired for level 4, svlan 2 mac aabb.cc00.0501, mpid 43 CFM-ERR: Lifetime timer fired for level 6, svlan 2 mac aabb.cc00.0300, mpid 21 CFM-ERR: Lifetime timer fired for level 5, svlan 5 mac aabb.cc00.0602, mpid 60
DB-712
December 2010
Related Commands
Command debug ethernet cfm all debug ethernet cfm diagnostic debug ethernet cfm events debug ethernet cfm packets
Description Enables all Ethernet CFM debug messages. Enables low-level diagnostic debugging of Ethernet CFM general events or packet-related events. Enables debugging of Ethernet CFM events. Enables debugging of Ethernet CFM message packets.
DB-713
debug ethernet cfm events [domain domain-name | level level-id] [evc evc-name | vlan vlan-id] no debug ethernet cfm events [domain domain-name | level level-id] [evc evc-name | vlan vlan-id]
CFM IEEE 802.1ag Standard (CFM IEEE)
debug ethernet cfm events [domain domain-name] [port | vlan vlan-id] no debug ethernet cfm events [domain domain-name] [port | vlan vlan-id]
Syntax Description
(Optional) Indicates that a domain is specified. (Optional) String of a maximum of 154 characters. (Optional) Indicates that a maintenance level is specified. (Optional) Integer in the range of 0 to 7 that specifies the maintenance level. (Optional) Identifies the Ethernet virtual connection (EVC). An EVC is an association of two or more user network interfaces (UNIs). (Optional) String that identifies the EVC name. (Optional) Indicates a DOWN service direction with no VLAN association. (Optional) Indicates that a VLAN is specified. (Optional) Integer in the range of 1 to 4094.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(11)T. The evc keyword and evc-name argument were introduced on the Cisco 7600 Series Route Switch Processor 720 (RSP 720) and the Cisco 7600 Series Supervisor Engine 720. This command was integrated into Cisco IOS Release 12.2(33)SXI2.
12.2(33)SXI2
The level and evc keywords and the level-id and evc-name arguments are not supported in Cisco IOS Release 12.2(33)SXI2.
DB-714
December 2010
Modification This command was integrated into Cisco IOS Release 12.2(33)SRE. This command was integrated into Cisco IOS Release 15.1(1)T.
Usage Guidelines
In CFM IEEE, if a domain name has more than 43 characters, a warning message is displayed notifying that the maintenance domain ID (MDID) will be truncated to 43 characters in continuity check messages (CCMs) if id <fmt> <MDID> is not configured. This command allows you to filter debug messages. The messages depend on the version of CFM you are running. When CFM IEEE is running, you are prompted to respond yes or no. The messages relate to the following:
Maintenance domain Maintenance level VLAN or EVC Combination of maintenance domain and VLAN or EVC Combination of maintenance level and VLAN or EVC
The output from this command is a log of activity. Use this command to troubleshoot Ethernet CFM in your network.
Examples
The following example shows output of the debug ethernet cfm events command:
Router# debug ethernet cfm events Ethernet CFM event debugging is on for all Router# show debug Ethernet CFM error debugging is on Ethernet CFM level 7 domain Domain_L7 vlan 11 event debugging is on Ethernet CFM level 5 domain Domain_L5 vlan 9 event debugging is on Ethernet CFM level 3 domain abc port event debugging is on Router# *Jun 17 21:55:56.835: CFM-EVT: Found remote mep for domain Domain_L5, level 5 vlan 9, mpid 220 mac aabb.cc03.b999 *Jun 17 21:55:56.835: CFM-EVT: Updated rmep in MIP CCDB, domain Domain_L5 level 5, vlan 9 mac aabb.cc03.b999 intf Ethernet0/0.1 *Jun 17 21:55:57.107: CFM-EVT: Found remote mep for domain Domain_L7, level 7 vlan 11, mpid 101 mac aabb.cc03.b999 *Jun 17 21:55:57.107: CFM-EVT: Updated rmep in MIP CCDB, domain Domain_L7 level 7, vlan 11 mac aabb.cc03.b999 intf Ethernet0/0.11 Router# *Jun 17 21:56:07.527: CFM-EVT: Found remote mep for domain Domain_L5, level 5 vlan 9, mpid 220 mac aabb.cc03.b999 *Jun 17 21:56:07.527: CFM-EVT: Updated rmep in MIP CCDB, domain Domain_L5 level 5, vlan 9 mac aabb.cc03.b999 intf Ethernet0/0.1 *Jun 17 21:56:07.787: CFM-EVT: Found remote mep for domain Domain_L7, level 7 vlan 11, mpid 101 mac aabb.cc03.b999 *Jun 17 21:56:07.787: CFM-EVT: Updated rmep in MIP CCDB, domain Domain_L7 level 7, vlan 11 mac aabb.cc03.b999 intf Ethernet0/0.11
DB-715
Related Commands
Command debug ethernet cfm all debug ethernet cfm diagnostic debug ethernet cfm error debug ethernet cfm packets
Description Enables all Ethernet CFM debug messages. Enables low-level diagnostic debugging of Ethernet CFM general events or packet-related events. Enables debugging of Ethernet CFM errors. Enables debugging of Ethernet CFM message packets.
DB-716
December 2010
Syntax Description
Command Default
Debugging is disabled.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SXI2. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows sample output of the debug ethernet cfm ha command:
Router# debug ethernet cfm ha 00:18:12: CFM-HA: RF progression Callbk CID 207, Seq 169, Event RF_PROG_STANDBY_FILESYS, Op 0, State ACTIVE, Peer STANDBY COLD-FILESYS 00:04:30: %SYS-SPSTBY-6-BOOTTIME: Time taken to reboot after reload = 391 seconds 00:18:22: CFM-HA: RF progression Callbk CID 207, Seq 169, Event RF_PROG_STANDBY_BULK, Op 0, State ACTIVE, Peer STANDBY COLD-BULK 00:18:22: CFM-HA: All Remote Mep Action 1 00:18:22: CFM-HA: MIP CCDB Bulk Sync Invoked 00:18:22: CFM-HA: Get buffer size 316 msg 4 00:18:22: CFM-HA: Get buffer size 316 msg 4 00:18:22: CFM-HA: Get buffer size 8 msg 1 00:18:22: CFM-HA: Event to Sync Buffer: Add MIP CCDB : vlan 100, level 5, mpid 100, version 2, lifetime 210000, addr 0014.69b6.200e, id_fmt 4 ma_fmt 2 00:18:22: CFM-HA: Get buffer size 316 msg 4 00:18:22: CFM-HA: Event to Sync Buffer: Add MIP CCDB : vlan 200, level 6, mpid 1998, version 2, lifetime 35000, addr 0014.f15c.a403, id_fmt 4 ma_fmt 2 00:18:22: CFM-HA: Get buffer size 316 msg 4 00:18:22: CFM-HA: Sending 2 records in Bulk 00:18:22: CFM-HA: All Remote Mep Action 1 00:18:22: CFM-HA:MEP CCDB Bulk Sync Invoked 00:18:22: CFM-HA: Get buffer size 284 msg 2 00:18:22: CFM-HA: Get buffer size 284 msg 2 00:18:22: CFM-HA: Get buffer size 8 msg 1
DB-717
00:18:22: CFM-HA: Event to Sync Buffer: Add port_state 2, archive FALSE , intf_state 1, name 00:18:22: CFM-HA: Get buffer size 284 msg 2 00:18:22: CFM-HA: Event to Sync Buffer: Add port_state 2, archive FALSE , intf_state 1, name 00:18:22: CFM-HA: Get buffer size 284 msg 2 00:18:22: CFM-HA: Sending 2 records in Bulk
MEP CCDB: vlan 100, level 5, mpid 100, ccheck_rmep_ok FALSE, addr 0014.69b6.200e,
MEP CCDB: vlan 200, level 6, mpid 1998, ccheck_rmep_ok FALSE, addr 0014.f15c.a403,
Related Commands
Command debug ethernet cfm diagnostic debug ethernet cfm error debug ethernet cfm events debug ethernet cfm packets
Description Enables low-level diagnostic debugging of Ethernet CFM general or packet-related events. Enables debugging of Ethernet CFM errors. Enables debugging of Ethernet CFM events. Enables debugging of Ethernet CFM message packets.
debug ethernet cfm all Enables all Ethernet CFM debug messages.
DB-718
December 2010
debug ethernet cfm packets [domain domain-name | level level-id] [evc evc-name | vlan vlan-id] no debug ethernet cfm packets [domain domain-name | level level-id] [evc evc-name | vlan vlan-id]
CFM IEEE 802.1ag Standard (CFM IEEE)
debug ethernet cfm packets [domain domain-name] [port | vlan vlan-id] no debug ethernet cfm packets [domain domain-name] [port | vlan vlan-id]
Syntax Description
(Optional) Indicates that a domain is specified. (Optional) String of a maximum of 154 characters. (Optional) Indicates that a maintenance level is specified. (Optional) Integer in the range of 0 to 7 that specifies the maintenance level. (Optional) Identifies the Ethernet virtual connection (EVC). An EVC is an association of two or more user network interfaces (UNIs). (Optional) String that identifies the EVC name. (Optional) Indicates a DOWN service direction with no VLAN association (untagged). (Optional) Indicates that a VLAN is specified. (Optional) Integer in the range of 1 to 4094.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(11)T. The evc keyword and evc-name argument were introduced on the Cisco 7600 Series Route Switch Processor 720 (RSP 720) and the Cisco 7600 Series Supervisor Engine 720.
DB-719
Release 12.2(33)SXI2
Modification This command was integrated into Cisco IOS Release 12.2(33)SXI2.
The level and evc keywords and the level-id and evc-name arguments are not supported in Cisco IOS Release 12.2(33)SXI2.
12.2(33)SRE 15.1(1)T
This command was integrated into Cisco IOS Release 12.2(33)SRE. This command was integrated into Cisco IOS Release 15.1(1)T.
Usage Guidelines
In CFM IEEE, if a domain name has more than 43 characters, a warning message is displayed notifying that the maintenance domain ID (MDID) will be truncated to 43 characters in continuity check messages (CCMs) if id <fmt> <MDID> is not configured. This command allows you to filter debug messages. The messages depend on the version of CFM you are running. When CFM IEEE is running, you are prompted to respond yes or no. The messages relate to the following:
Maintenance domain Maintenance level VLAN or EVC Combination of maintenance domain and VLAN or EVC Combination of maintenance level and VLAN or EVC
The output from this command is a log of activity. Use this command to troubleshoot Ethernet CFM in your network.
Examples
The following is sample output of the debug ethernet cfm packets command:
Router# debug ethernet cfm packets Ethernet CFM packet debugging is on for all Router# *Jun 17 22:03:38.059: CFM-PKT: Sending Up direction Router# *Jun 17 22:03:42.879: CFM-PKT: Sending Up direction Router# *Jun 17 22:03:46.431: CFM-PKT: Received a CC packet interface Ethernet0/0.1 *Jun 17 22:03:46.703: CFM-PKT: Received a CC packet interface Ethernet0/0.11 Router# *Jun 17 22:03:48.783: CFM-PKT: Sending Up direction Router# *Jun 17 22:03:53.571: CFM-PKT: Sending Up direction Router# *Jun 17 22:03:57.083: CFM-PKT: Received a CC packet interface Ethernet0/0.1 *Jun 17 22:03:57.355: CFM-PKT: Received a CC packet interface Ethernet0/0.11 Router#
MEP 301 CC message, level 7, vlan 11 MEP 401 CC message, level 5, vlan 9 with MPID 220, level 5, vlan 9 from with MPID 101, level 7, vlan 11 from
MEP 301 CC message, level 7, vlan 11 MEP 401 CC message, level 5, vlan 9 with MPID 220, level 5, vlan 9 from with MPID 101, level 7, vlan 11 from
DB-720
December 2010
Related Commands
Command debug ethernet cfm all debug ethernet cfm diagnostic debug ethernet cfm error debug ethernet cfm events
Description Enables all Ethernet CFM debug messages. Enables low-level diagnostic debugging of Ethernet CFM general events or packet-related events. Enables debugging of Ethernet CFM errors. Enables debugging of Ethernet CFM events.
DB-721
Syntax Description
Displays all Ethernet L2CTRL debugging messages. Displays Ethernet L2CTRL error information Displays Ethernet L2CTRL event information.
Command Modes
Command History
Release 12.2(33)SRD
Examples
The following is sample output from the debug ethernet l2ctrl events command: When bridge-domain of 30 is defined on a service instance 3 at gigabitethernet interface 1/0/0 the output is as follows:
Router# debug ethernet l2ctrl events 17:17:03.174: EI/L2CTRL/ADD/EV: Gi1/0/0 (if_num 10) efp 3 (0x4944B5E8) vlan 30 state Up
When bridge-domain of 30 is not configured on service instance 3 at gigabitethernet interface 1/0/0 the output is as follows:
Router# debug ethernet l2ctrl events 17:16:30.546: EI/L2CTRL/DELETE/EV: Gi1/0/0 efp 3 vlan 30
The following is sample output from debug ethernet l2ctrl errors command:
Router# debug ethernet l2ctrl errors 17:16:30.546: DELETE/ERR: no vport found for Gi1/0/0 efp 3
Related Commands
DB-722
December 2010
Syntax Description
All debug messages are to be filtered. All errors are to be filtered. All events are to be filtered. All high availability (HA) messages are to be filtered. All decoded messages are to be filtered. (Optional) Specifies an interface to use to filter debug messages. (Optional) String that identifies the type of interface. Valid options are the following:
ethernetEthernet IEEE 802.3 interface fastethernetFast Ethernet IEEE 802.3 interface gigabitethernetGigabit Ethernet IEEE 802.3z interface
number
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC(#)
Command History
Modification This command was introduced. Support for this command on the Cisco 7600 router was integrated into Cisco IOS Release 12.2(33)SRB. Modified to support ha keyword.
Usage Guidelines
When you use the all keyword, keep in mind the number of interfaces that support Ethernet LMI. Some messages may be lost if many interfaces are supported. Use of the errors keyword enables debugging of Ethernet LMI errors such as invalid messages; for example, unexpected information element (IE) and mandatory IE missing. Use of the events keyword enables debugging of Ethernet LMI events such as status changes, timeouts, and messages received. Use of the ha keyword enables debugging of Ethernet LMI high availability messages.
DB-723
Use of the packets keyword enables debugging of decoded Ethernet LMI packets. The output from this command is a log of activity. Use this command to troubleshoot Ethernet LMI in your network.
Examples
The following example output from the debug ethernet lmi all command shows event and packet messages:
Router# debug ethernet lmi all Ethernet Ethernet Ethernet Ethernet Ethernet LMI LMI LMI LMI LMI errors debugging is on ha debugging is on packets debugging is on events debugging is on packets hex debugging is on
00:29:32: ELMI Et0/0 EVENT: ce_event: State 0x0, Event 0x4 00:29:32: ELMI Et0/0 EVENT: Old State=0x0, Event=0x4, New State=0x2 00:29:32: ELMI Et0/0 EVENT: Updated Stat Type: ETHER_LMI_ST_LMSG_SENT 00:29:32: ELMI Et0/0 PKT HEX: TX->:0x01750101010202B4B30305000000000400000000000 00:29:32: ELMI Et0/0 PACKET: Outgoing Protocol Version : 0x1 Message : STATUS ENQ (0x75) Report Type : Check Sequence Number : Snd(0xB4), Rcv(0xB3) Data Instance : Value(0x4) 00:29:32: ELMI Et0/0 PKT HEX: RX<-:0x017D0101010202B4B40305000000000400000000000 00:29:32: ELMI Et0/0 PACKET: Incoming Protocol Version : 0x1 Message : STATUS (0x7D) Report Type : Check Sequence Number : Snd(0xB4), Rcv(0xB4) Data Instance : Value(0x4) 00:29:32: ELMI Et0/0 EVENT: ce_event: State 0x2, Event 0x1 00:29:32: ELMI Et0/0 EVENT: Update seq: current send 0xB4 rcv 0xB3 00:29:32: ELMI Et0/0 EVENT: Updated Stat Type: ETHER_LMI_ST_LMSG_RCVD 00:29:32: ELMI Et0/0 EVENT: Old State=0x2, Event=0x1, New State=0x0 00:06:30: ELMI HA: cpf_status_callback status 2 00:07:37: ELMI HA: RF progression Callbk CID 202, Seq 142, Event RF_PROG_STANDBY_CONFIG, Op 0, State ACTIVE, Peer STANDBY COLD-CONFIG 00:07:37: ELMI HA: ISSU: Force negotiation version to V1 00:07:51: ELMI HA: RF progression Callbk CID 202, Seq 142, Event RF_PROG_STANDBY_FILESYS, Op 0, State ACTIVE, Peer STANDBY COLD-FILESYS
The following example output from the debug ethernet lmi all command shows detailed information about the user-network interfaces (UNIs) and Ethernet virtual connections (EVCs) for packet messages.
Router# debug ethernet lmi all Ethernet Ethernet Ethernet Ethernet Ethernet LMI LMI LMI LMI LMI errors debugging is on ha debugging is on packets debugging is on events debugging is on packets hex debugging is on
Jun 16 18:59:49.372: ELMI Gi0/1 PKT HEX: RX<-:0x017D0101000202D30103050000000004 Jun 16 18:59:49.372: ELMI Gi0/1 PACKET: Incoming Protocol Version : 0x1 Message : STATUS (0x7D)
DB-724
December 2010
Report Type : Full Sequence Number : Snd(0xD3), Rcv(0x1) Data Instance : Value(0x4) UNI : Bundle UNI Id : 'uni_sandiego' EVC Status : Evc Ref(0x1), New, Active EVC Parameters : Point-to-Point EVC Id : 'EVC_P2P_110' Remote UNI Sum : Cfgd(1), Up(1) EVC Status : Evc Ref(0x2), New, Active EVC Parameters : MultiPoint-to-MultiPoint EVC Id : 'EVC_MP2MP_101' Remote UNI Sum : Cfgd(2), Up(2) CEVLAN EVC Map : Evc Ref(0x1), Seq(0x1) EVC Map : Num Vlans(1), 110 CEVLAN EVC Map : Evc Ref(0x2), Seq(0x1) EVC Map : Num Vlans(1), 101 Remote UNI Status : Evc Ref(0x1), Uni Ref(0x26), Up UNI Id o deb al : 'cisco_newyork' Remote UNI Status : Evc Ref(0x2), Uni Ref(0x1D), Up UNI Id : 'uni_newyork' Remote UNI Status : Evc Ref(0x2), Uni Ref(0x96), Up UNI Id : 'miami-detroit' Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun Jun 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.372: 18:59:49.376: 18:59:49.376: 18:59:49.376: 18:59:50.100: 18:59:59.376: 18:59:59.376: 18:59:59.376: ELMI Gi0/1 EVENT: ce_event: State 0x1, Event 0x0 ELMI Gi0/1 EVENT: Update seq: current send 0x1 rcv 0x0 ELMI Gi0/1 EVENT: Update uni: ELMI Gi0/1 EVENT: Update evc_sts: ref_id: 0x1 ELMI Gi0/1 EVENT: Update evc_param: type 0x0 ELMI Gi0/1 EVENT: Update evc_id ELMI Gi0/1 EVENT: Update remote_uni_sum cfgd 1 up 1 ELMI Gi0/1 EVENT: Update evc_sts: ref_id: 0x2 ELMI Gi0/1 EVENT: Update evc_param: type 0x1 ELMI Gi0/1 EVENT: Update evc_id ELMI Gi0/1 EVENT: Update remote_uni_sum cfgd 2 up 2 ELMI Gi0/1 EVENT: Update cevlan_evc_map: ref_id: 0x1 seq#1 ELMI Gi0/1 EVENT: Update evc_map: num_vlans 1 ELMI Gi0/1 EVENT: Update cevlan_evc_map: ref_id: 0x2 seq# 1 ELMI Gi0/1 EVENT: Update evc_map: num_vlans 1 ELMI Gi0/1 EVENT: Update remote_uni_det: evc ref_id: 0x1 u6 ELMI Gi0/1 EVENT: Update remote_uni_det: evc ref_id: 0x2 uD ELMI Gi0/1 EVENT: Update remote_uni_det: evc ref_id: 0x2 u6 ELMI Gi0/1 EVENT: upd_lmi_db: new uni_evc ref 0x1 ELMI Gi0/1 EVENT: upd_lmi_db: new uni_evc ref 0x2 %ETHER_LMI-6-MISMATCHED_VLAN_NOT_CONFIGURED: VLAN 101,110 1 %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthn ELMI Gi0/1 EVENT: Update di: current 0x0 rcvd 0x4 ELMI Gi0/1 EVENT: Old State=0x1, Event=0x0, New State=0x0 ELMI Gi0/1 EVENT: Updated Stat Type: ETHER_LMI_ST_LFULL_MSD %SYS-5-CONFIG_I: Configured from console by console ELMI Gi0/1 EVENT: ce_event: State 0x0, Event 0x4 ELMI Gi0/1 EVENT: Old State=0x0, Event=0x4, New State=0x2 ELMI Gi0/1 EVENT: Updated Stat Type: ETHER_LMI_ST_LMSG_SENT
The following example shows output of the debug ethernet lmi all interface command for interface Ethernet 0/0.
Router# debug ethernet lmi all interface ethernet 0/0 Ethernet Ethernet Ethernet Ethernet LMI LMI LMI LMI errors debugging is on for Ethernet0/0 ha debugging is on for Ethernet0/0 packets debugging is on for Ethernet0/0 events debugging is on for Ethernet0/0
DB-725
Ethernet LMI packets hex debugging is on for Ethernet0/0 00:45:14: 00:45:14: 00:45:14: 00:45:14: 00:45:14: ELMI ELMI ELMI ELMI ELMI Et0/0 EVENT: ce_event: State 0x0, Event 0x4 Et0/0 EVENT: Old State=0x0, Event=0x4, New State=0x2 Et0/0 EVENT: Updated Stat Type: ETHER_LMI_ST_LMSG_SENT Et0/0 PKT HEX: TX->:0x0175010101020213120305000000000400000000000 Et0/0 PACKET: Outgoing Protocol Version : 0x1 Message : STATUS ENQ (0x75) Report Type : Check Sequence Number : Snd(0x13), Rcv(0x12) Data Instance : Value(0x4)
00:45:14: ELMI Et0/0 PKT HEX: RX<-:0x017D010101020213130305000000000400000000000 00:45:14: ELMI Et0/0 PACKET: Incoming Protocol Version : 0x1 Message : STATUS (0x7D) Report Type : Check Sequence Number : Snd(0x13), Rcv(0x13) Data Instance : Value(0x4) 00:45:14: 00:45:14: 00:45:14: 00:45:14: ELMI ELMI ELMI ELMI Et0/0 Et0/0 Et0/0 Et0/0 EVENT: EVENT: EVENT: EVENT: ce_event: State 0x2, Event 0x1 Update seq: current send 0x13 rcv 0x12 Updated Stat Type: ETHER_LMI_ST_LMSG_RCVD Old State=0x2, Event=0x1, New State=0x0
DB-726
December 2010
Syntax Description
Debugging for all Ethernet OAM flags is on. Debugging for Ethernet OAM configurations is on. Debugging for Ethernet OAM high-availability events is on. Debugging for Ethernet OAM link monitoring is on. Debugging for Ethernet OAM loopback messages is on. Debugging for Ethernet OAM protocol data units (PDUs) is on. Decoding for ingress or egress OAMPDUs, or both, is on. Debugging for Ethernet ingress OAMPDUs is on. Debugging for Ethernet egress OAMPDUs is on. Debugging for the Ethernet OAM state machine is on.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
When you use the all keyword, keep in mind the number of interfaces supporting Ethernet OAM. If many interfaces are supported, some messages may be lost and system performance can degrade. The output from this command is a log of activity. Use this command to troubleshoot Ethernet OAM in your network.
Examples
The following example shows output of the debug ethernet oam all command:
Router# debug ethernet oam all
DB-727
*Aug 17 14:00:53.732: ether_oam_port Gi2/9: during state INACTIVE, got event 3(link_up) *Aug 17 14:00:53.732: @@@ ether_oam_port Gi2/9: INACTIVE -> FAULT *Aug 17 14:00:53.732: ether_oam_port Gi2/9: idle during state FAULT *Aug 17 14:00:53.732: @@@ ether_oam_port Gi2/9: FAULT -> FAULT2 *Aug 17 14:00:53.732: ether_oam_port Gi2/9: during state FAULT2, got event 6(mode_active) *Aug 17 14:00:53.732: @@@ ether_oam_port Gi2/9: FAULT2 -> ACTIVE_SEND_LOCAL *Aug 17 14:00:54.212: EOAM RX PAK(Gi2/9): *Aug 17 14:00:54.212: 03 00 08 00 01 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:54.212: 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 *Aug 17 14:00:54.212: 00 00 00 00 00 00 00 00 *Aug 17 14:00:54.212: ether_oam_port Gi2/9: during state SEND_LOCAL_REMOTE, got event 8(local_satisfied) 1w5d: %ETHERNET_OAM-6-ENTER_SESSION: The client on interface Gi2/11 has entered the OAM session. *Aug 17 14:00:55.212: EOAM RX PAK(Gi2/9): *Aug 17 14:00:55.212: 03 00 50 00 01 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:55.212: 00 00 00 SYMPRD w=104857600 lt=1 ht=0 elapsed_time=1032(ms) rx_sym=1000000000 err_sym=0 *Aug 17 14:00:55.740: EOAM LM(Gi2/9): FRM w=1 lt=1 ht=0 t_frm=0 err_frm=0 *Aug 17 14:00:55.740: EOAM LM(Gi2/9): FRMPRD w=10000000 lt=1 ht=0 t_frm=1 err_frm=0 *Aug 17 14:00:55.740: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:55.740: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:55.832: EOAM TX PAK(Gi2/9): *Aug 17 14:00:55.832: 03 00 50 00 0 1 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:55.832: 00 00 00 01 02 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:55.832: 00 00 00 01 *Aug 17 14:00:55.832: EOAM TX PAK(Gi2/9): 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:56.212: 00 00 00 01 02 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:56.212: 00 00 00 01 00 00 00 00 00 00 00 00 00 00 *Aug 17 14:00:56.212: EOAM RX PAK(Gi2/9): infotlv w/ same revision *Aug 17 14:00:56.820: EOAM LM(Gi2/9): SYMPRD w=104857600 lt=1 ht=0 elapsed_time=1000(ms) rx_sym=1000000000 err_sym=0 *Aug 17 14:00:56.820: EOAM LM(Gi2/9): FRM w=1 lt=1 ht=0 t_frm=0 err_frm=0 *Aug 17 14:00:56.820: EOAM LM(Gi2/9): 05 FRMPRD w=10000000 lt=1 ht=0 t_frm=3 err_frm=0 *Aug 17 14:00:57.820: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:57.820: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:57.856: EOAM TX PAK(Gi2/9): *Aug 17 14:00:57.856: 03 00 50 00 01 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:57.856: 00 00 00 01 02 10 01 00 00 00 0D 17 14:00:58.212: 05 DC 00 00 0C *Aug 17 14:00:57.856: 00 00 00 01 *Aug 17 14:00:57.856: EOAM TX PAK(Gi2/9): sent OAMPDU w/ op=0 *Aug 17 14:00:58.212: EOAM RX PAK(Gi2/9): *Aug 17 14:00:58.212: EOAM RX PAK(Gi2/9): infotlv w/ same revision *Aug 17 14:00:58.820: EOAM LM(Gi2/9): SYMPRD w=104857600 lt=1 ht=0 elapsed_time=1000(ms) rx_sym=1000000000 err_sym=0 *Aug 17 14:00:58.820: EOAM LM(Gi2/9): FRM w=1 lt=1 ht=0 t_frm=0 err_frm=0 *Aug 17 14:00:58.820: EOAM LM(Gi2/9): FRMPRD w=10000000 lt=1 ht=0 t_frm=4 err_frm=0 *Aug 17 14:00:58.820: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:58.820: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:58.856: EOAM TX PAK(Gi2/9): *Aug 17 14:00:58.856: 03 00 50 00 01 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:58.856: 00 00 00 01 02 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:58.856: 00 sent OAMPDU w/ op=0w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:59.856: EOAM TX PAK(Gi2/9): *Aug 17 14:00:59.856: 03 00 50 00 01 10 01 00 00 *Aug 17 14:01:00.832: EOAM LM(Gi2/9): SYMPRD w=104857600 lt=1 ht=0 elapsed_time=1008(ms) rx_sym=1000000000 err_sym=0 *Aug 17 14:01:00.832: EOAM LM(Gi2/9): FRM w=1 lt=1 ht=0 t_frm=0 err_frm=0 *Aug 17 14:01:00.832: EOAM LM(Gi2/9): FRMPRD w=10000000 lt=1 ht=0 t_frm=6 err_frm=0 *Aug 17 14:01:00.832: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:01:00.832: EOA M LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:01:00.856: EOAM TX PAK(Gi2/9):
DB-728
December 2010
DB-729
Syntax Description
Displays all Ethernet customer-service debug messages. Displays debug messages about the interaction between the Ethernet infrastructure and its clients. Displays Ethernet customer service error messages occurring in the Ethernet infrastructure subsystem. Displays Ethernet virtual connection (EVC) debug messages. (Optional) String from 1 to 100 characters that identifies an EVC for debugging. Displays High Availability (HA) Ethernet service debug messages. Displays debug messages related to Ethernet customer service instances. (Optional) Displays Ethernet service-instance debug messages for a specific Ethernet service instance ID and interface. (Optional) Integer in the range from 1 to 4294967295 that is the service identifier. Displays debugging for Ethernet services on all interfaces or on a specified interface. (Optional) When used as an option with the instance keyword, service instance debug messages for the interface are displayed.
Type and number of the physical interface. Displays debug messages for the Ethernet service quality of service (QoS). Displays debug messages for the Ethernet service microblocks. Displays debug messages for the Ethernet operations, administration, and maintenance (OAM) manager component of the infrastructure.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was implemented on the Cisco 7600 series routers. The ha keyword was added.
DB-730
December 2010
Usage Guidelines
The debug ethernet service command is useful for troubleshooting. The undebug ethernet service command is the same as the no debug ethernet service command. When you use the evc keyword without specifying an EVC ID, debugging is enabled for all EVCs on the system. When you use the instance keyword without specifying options, debugging for all service instances is enabled. If a service instance ID and interface are specified, only debug messages for the associated service instance are displayed. If only an interface is specified, debug messages for all service instances on that interface only are displayed.
Examples
The following example shows output after issuing the debug ethernet service all command:
Router# debug ethernet service all Ethernet Ethernet Ethernet Ethernet Ethernet Ethernet Ethernet Ethernet service service service service service service service service error debugging is on api debugging is on interface debugging is on instance debugging is on instance qos debugging is on evc debugging is on OAM Manager debugging is on ha debugging is on
Related Commands
Description Displays information about the types of debugging that are enabled.
DB-731
Syntax Description
action cli action cns action mail all api calls api errors common detector all detector appl
Displays debugging messages about command-line interface (CLI) event messages. Displays debugging messages about Cisco Networking Services (CNS) event messages. Displays debugging messages about e-mail event messages. Displays all debugging messages. Displays debugging messages about EEM client application programming interface (API) calls. Displays debugging messages about EEM client API errors. Displays common library code debugging messages. Displays all event detector debugging messages. Displays debugging messages about the application-specific event detector.
Note
In Cisco IOS Release 12.4(20)T and later releases, the application keyword was replaced with the appl keyword.
detector cli detector config detector counter detector env detector gold detector interface detector ioswdsysmon detector ipsla detector nf detector none
Displays debugging messages about the CLI event detector. Displays debugging messages about the config event detector. Displays debugging messages about the counter event detector. Displays debugging messages about the environmental event detector. Displays debugging messages about the GOLD event detector. Displays debugging messages about the interface counter event detector. Displays debugging messages about the IOS watchdog event detector. Displays debugging messages about the IP SLA event detector. Displays debugging messages about the NetFlow event detector. Displays debugging messages about the none event detector.
DB-732
December 2010
detector oir detector resource detector rf detector routing detector rpc detector snmp detector snmp-notification detector syslog detector test detector timer detector track metricdir policydir server ISSU server events server scheduling snap calls snap errors tcl cli_library tcl commands tcl smtp_library xml parser
Displays debugging messages about the OIR event detector. Displays debugging messages about the Embedded Resource Manager (ERM) event detector. Displays debugging messages about the redundancy-facility (RF) event detector. Displays debugging messages about the routing event detector. Displays debugging messages about the remote procedure call (RPC) event detector. Displays debugging messages about the Simple Network Management Protocol (SNMP) event detector. Displays debugging messages about the SNMP notification event detector. Displays debugging messages about the syslog event detector. Displays debugging messages about the test event detector. Displays debugging messages about the timer event detector. Displays debugging messages about the Enhanced Object Tracking (EOT). Displays debugging messages about the EEM metric event detector. Displays debugging messages about the EEM policy director. Displays debugging messages about In-Service Software Upgrade (ISSU) server events. Displays debugging messages about the EEM server events. Displays all debugging messages about the EEM server scheduling events. Displays debugging messages about EEM SNAP client application programming interface (API) calls. Displays debugging messages about EEM SNAP client API errors. Displays all debugging messages about the Tool Command Language (Tcl) command-line interface (CLI) library. Displays all debugging messages about the Tcl commands. Displays all debugging messages about the Tcl Simple Mail Transfer Protocol (SMTP) library. Displays debugging messages about the EEM XML parser.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. This command was integrated into Cisco IOS Release 12.3(2)XE. The detector application, detector counter, detector interface, detector ioswdsysmon, and detector timer keywords were added and this command was integrated into Cisco IOS Release 12.2(25)S.
DB-733
Modification The action cli, action mail, detector all, detector cli, detector none, detector oir, and metricdir keywords were added. This command was integrated into Cisco IOS Release 12.2(28)SB. The detector resource, detector rf, and detector track keywords were added. The detector gold keyword was added and this command was integrated into Cisco IOS Release 12.2(18)SXF4 to support Software Modularity images only. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(18)SXF5. The common, detector config, detector env, detector rf, detector snmp-notification, detector test, server ISSU, and xml parser keywords were added and the detector application keyword was replaced with the detector appl keyword. The detector ipsla, detector nf, and detector routing keywords were added.
12.4(22)T
Usage Guidelines
Use the debug event manager command to troubleshoot EEM command operations.
Caution
Use any debugging command with caution because the volume of generated output can slow or stop the router operations. We recommend that this command be used only under the supervision of a Cisco engineer.
Examples
The following example turns on debugging messages about EEM server events and then configures an applet to write a messageTest messageto syslog. The debug output that follows displays the various EEM operations that occur as the applet is processed.
Router# debug event manager server events Debug Embedded Event Manager server events debugging is on Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# event manager applet timer-test Router(config-applet)# event timer countdown time 20 Router(config-applet)# action label1 syslog msg "Test message" Router(config-applet)# end 03:46:55: fh_server: fh_io_msg: received msg 6 from client jobid 11 03:46:55: fh_server: fh_io_msg: handling event register with esid = 23 03:46:55: fh_msg_send_to_fd: receive a reply msg, minor: 5 03:46:55: fh_server: fh_io_msg: received msg 26 from client jobid 11 03:46:55: fh_msg_send_to_fd: receive a reply msg, minor: 5 03:46:55: %SYS-5-CONFIG_I: Configured from console by console 03:47:15: fd_pulse_hndlr: received a pulse from /dev/fm/fd_timer 03:47:15: fh_msg_send_to_fd: receive a reply msg, minor: 5 03:47:15: fd_pulse_hndlr: received FH_MSG_EVENT_PUBLISH 03:47:15: fh_schedule_callback: fh_schedule_callback: cc=632C0B68 prev_epc=0; epc=63A41670 03:47:15: fh_io_msg: received FH_MSG_API_INIT; jobid=13, processid=82, client=3, job name=EEM Callback Thread
DB-734
December 2010
fh_server: fh_io_msg: received msg 10 from client jobid 13 %HA_EM-6-LOG: timer-test: Test message fh_server: fh_io_msg: received msg 62 from client jobid 13 fh_schedule_callback: fh_schedule_callback: cc=632C0B68 prev_epc=63A41670; epc=0 fh_server: fh_io_msg: received msg 1 from client jobid 13 fh_io_msg: received FH_MSG_API_CLOSE client=3
Field Debug Embedded Event Manager server events debugging fh_server fh_io_msg fh_msg_send_to_fd fd_pulse_hndlr
Description Indicates the type of debugging output and whether the debugging is on or off. Indicates a server event message. Indicates that a message has been sent to, or received from, a client process. Indicates that a message has been sent to the event detector. Indicates that a message has been received by the event detector pulse handler.
DB-735
debug events
To display events, use the debug events command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug events no debug events
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command displays events that occur on the interface processor and is useful for diagnosing problems in an network. It provides an overall picture of the stability of the network. In a stable network, the debug events command does not return any information. If the command generates numerous messages, the messages can indicate the possible source of problems. When configuring or making changes to a router or interface for, enable the debug events command. Doing so alerts you to the progress of the changes or to any errors that might result. Also use this command periodically when you suspect network problems.
Examples
DB-736
December 2010
state
Indicates current state of the ATM Interface Processor (AIP). Possible values are:
1 = An ENABLE will be issued soon. 0 = The AIP will remain shut down.
asr
Defines a bitmask, which indicates actions or completions to commands. Valid bitmask values are:
0x0800 = AIP crashed, reload may be required. 0x0400 = AIP detected a carrier state change. 0x0n00 = Command completion status. Command completion status codes are:
n = 8 Invalid physical layer interface module (PLIM) detected n = 4 Command failed n = 2 Command completed successfully n = 1 CONFIG request failed n = 0 Invalid value
The following line indicates that the AIP was reset. The PLIM detected was 1, so the maximum rate is set to 100 Mbps.
RESET(4/0): PLIM type is 1, Rate is 100Mbps
The following line indicates that the AIP was given a shutdown command, but the current configuration indicates that the AIP should be up:
aip_disable(4/0): state=1
The following line indicates that a configuration command has been completed by the AIP:
aip_love_note(4/0): asr=0x201
The following line indicates that the AIP was given a no shutdown command to take it out of the shutdown state:
aip_enable(4/0)
The following line indicates that the AIP detected a carrier state change. It does not indicate that the carrier is down or up, only that it has changed.
aip_love_note(4/0): asr=0x4000
The following line of output indicates that the AIP enable function is restarting all permanent virtual circuits (PVCs) automatically:
DB-737
The following lines of output indicate that PVC 1 was set up and a successful completion code was returned:
aip_setup_vc(4/0): vc:1 vpi:1 vci:1 aip_love_note(4/0): asr=0x200
DB-738
December 2010
Syntax Description
all default detail error call informational software event function inout
(Optional) Displays all fax DMSP debugging messages. (Optional) Displays fax DMSP error and inout information. This option also runs if no keywords are added. (Optional) Displays fax DMSP background messages. (Optional) Displays fax DMSP error messages. (Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software errors. (Optional) Displays fax DMSP events. (Optional) Displays fax DMSP functions. (Optional) Displays fax DMSP in/out functions.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command replaces the debug dmsp doc-to-fax and debug dmsp fax-to-doc commands. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug fax dmsp all command:
Router# debug fax dmsp all 2d07h: //70/67D6061D8012/DMSP/docmsp_call_setup_request: ramp data dir=ONRAMP, conf dir=DEST 2d07h: //70/67D6061D8012/DMSP/docmsp_caps_ind: cid(0x46), srcCallID(0x44) 2d07h: //70/67D6061D8012/DMSP/docmsp_bridge: conf id(0x33), srcCallID(0x46), dstCallID(0x44),
DB-739
ramp data dir=ONRAMP, conf dir=DEST, encode out=1 2d07h: //70/67D6061D8012/DMSP/docmsp_bridge: Bridge done 2d07h: //70/67D6061D8012/DMSP/docmsp_bridge: conf id(0x34), srcCallID(0x46), dstCallID(0x45), ramp data dir=ONRAMP, conf dir=SRC, encode out=1 2d07h: //70/67D6061D8012/DMSP/docmsp_bridge: Bridge done 2d07h: //70/67D6061D8012/DMSP/docmsp_xmit: srcCallID(0x44), dstCallID(0x46), direction=0 2d07h: //68/67D6061D8012/DMSP/docmsp_process_rcv_data: evID=0, proto_flag=3, srcCallID(0x44), dstCallID(0x46) 2d07h: //70/67D6061D8012/DMSP_ON/docmsp_tiff_writer_data_process: START_OF_CONNECTION 2d07h: //70/67D6061D8012/DMSP_ON/docmsp_tiff_writer_data_process: START_OF_FAX_PAGE 2d07h: //70/67D6061D8012/DMSP_ON/docmsp_tiff_writer_get_buffer_callback: tiff_segment=0x63A88ECC 2d07h: //70/67D6061D8012/DMSP_ON/docmsp_tiff_writer_get_buffer_callback: tiff_segment=0x63D58944 2d07h: //70/67D6061D8012/DMSP/docmsp_process_rcv_data: Done
CallEntry ID is 70. This indicates a unique call leg. GUID is 67D6061D8012. This identifies the call. DMSP is the module name. The docmsp_call_setup_request field shows that the DMSP is requesting a call setup.
ramp data dir conf dir docmsp_bridge: docmsp_xmit: docmsp_process_rcv_data: docmsp_tiff_writer_data_process: docmsp_tiff_writer_get_buffer_ callback:
Indicates if the data direction is on-ramp or off-ramp. Indicates if the data is from the source or destination. Indicates that the DMSP is setting up a bridge to the destination. Indicates that the DMSP is transmitting. Indicates that the DMSP is starting the process to receive data. Indicates the process that is being started. Indicates the segment for the DMSP TIFF writer get_buffer_callback parameter.
DB-740
December 2010
Syntax Description
all default detail error call informational software event function inout receive send
(Optional) Displays all fax FMSP debugging messages. (Optional) Displays fax FMSP error and inout information. This option also runs if no keywords are added. (Optional) Displays fax FMSP background messages. (Optional) Displays fax FMSP error messages. (Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software errors. (Optional) Displays fax FMSP events. (Optional) Displays fax FMSP functions. (Optional) Displays fax FMSP in/out functions. (Optional) Receives T.30 or T.38 debugs. (Optional) Sends T.30 or T.38 debugs.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command replaces the debug fmsp receive and debug fmsp send commands. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug fax fmsp all command:
Router# debug fax fmsp all 2d08h: //76/90A52CB88014/FMSP/faxmsp_call_setup_request: session(0x63A8A474), vdbPtr(0x62CA45A8),data dir=ONRAMP, conf dir=DEST 2d08h: //76/90A52CB88014/FMSP/faxmsp_bridge:
DB-741
confID(0x38), srcCID(0x4C), dstCID(0x4B) 2d08h: //76/90A52CB88014/FMSP/faxmsp_bridge: ramp data dir=ONRAMP, conf dir=DEST 2d08h: //76/90A52CB88014/FMSP/faxmsp_bridge: Explicit caps ind. done; Wait for registry cap ind 2d08h: //76/90A52CB88014/FMSP/faxmsp_caps_ind: per_bridge_info(0x63D52FD8), cap_ind_state(0x6) 2d08h: //76/90A52CB88014/FMSP/faxmsp_caps_ind[1617]: 2d08h: //76/90A52CB88014/FMSP/faxmsp_caps_ack: direction=0, srcCID(0x4B), dstCID(0x0) 2d08h: //76/90A52CB88014/FMSP/faxmsp_codec_download_done: per_bridge_info(0x63D52FD8), application_data(0x63C54698), state(0x2), direction=2 2d08h: //76/90A52CB88014/FMSP/faxMsp_get_tx_buffer: event(0x402897C0), bufferBegin(0x63A86B5C), dataBegin(0x402897EC) 2d08h: //76/90A52CB88014/FMSP/faxMsp_get_tx_buffer: event(0x40289B50), bufferBegin(0x63C55794), dataBegin(0x40289B7C) 2d08h: //76/90A52CB88014/FMSP/faxMsp_get_tx_buffer: event(0x40851E58), bufferBegin(0x63D4EAE4), dataBegin(0x40851E84) 2d08h: //76/90A52CB88014/FMSP/faxmsp_xmit: srcCallID(0x4B), dstCallID(0x4C) 2d08h: //76/90A52CB88014/FMSP/faxmsp_xmit[1813]: 2d08h: //76/90A52CB88014/FMSP/faxmsp_process_rcv_data: state(0x1), evID=918065, evProtoFlag=2 2d08h: //76/90A52CB88014/FMSP/t38_rx_buffer: t38 rx msg dump (size=6): 00 00 01 00 00 00 2d08h: //76/90A52CB88014/FMSP/faxmsp_process_rcv_data[1994]: 2d08h: //76/90A52CB88014/FMSP/fax2_phaseB_receive: CSI_PACKET(8881111) DIS_PACKET(speed=5, resolution=1, encoding=1) 2d08h: //76/90A52CB88014/FMSP/faxMsp_get_tx_buffer: event(0x40289690), bufferBegin(0x63A7E798), dataBegin(0x402896BC) 2d08h: //76/90A52CB88014/FMSP/faxMsp_get_tx_buffer: event(0x4028858C), bufferBegin(0x63B89AC0), dataBegin(0x402885B8) 2d08h: //76/90A52CB88014/FMSP/t38_tx_command: t38 tx msg dump (size=47): 00 04 2A C0 04 80 00 16 FF C0 02 8C 8C 8C 8C 1C 1C 1C 04 04 04 04 04 04 04 04 04 04 04 04 04 28 00 09 FF C8 01 00 77 1F 01 01 19 80 40 00 00 2d08h: //76/90A52CB88014/FMSP/fax2_phaseB_receive: fax2_response_receive, PROCESSING
CallEntry ID is 76. This indicates a unique call leg. GUID is 90A52CB88014. This identifies the call. FMSP is the module name. The faxmsp_call_setup_request field shows that the FMSP is requesting a call setup.
Indicates if the data direction is on-ramp or off-ramp. Indicates if the data is from the source or destination.
DB-742
December 2010
Table 90
Description Indicates that the FMSP is setting up a bridge to the destination. Indicates that the FMSP is transmitting data. Indicates that the FMSP is beginning the process to receive data. Shows the contents of the T.38 transmit buffer. Shows the T.38 transmit command.
DB-743
Syntax Description
all default detail error call informational software event function inout
(Optional) Displays all fax mail debugging messages. (Optional) Displays fax mail error and inout information. This option also runs if no keywords are added. (Optional) Displays fax mail background messages. (Optional) Displays fax mail error messages. (Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software errors. (Optional) Displays fax mail events. (Optional) Displays fax mail functions. (Optional) Displays fax mail in/out functions.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command replaces the debug foip off-ramp and debug foip on-ramp commands. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug fax foip all command:
Router# debug fax foip all 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_call_handoff: Authentication: Id: 0 Method: IVR or unknown Status: SUCCESS Enabled: FALSE
DB-744
December 2010
Template: List: fax MailtoAddress: Calling Oct3A=0x0 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_conference_vtsp_fmsp: Begin Conferencing VTSP and FMSP 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_conference_vtsp_fmsp[887]: 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_change_state: Old State=0, New State=1 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_call_handoff[2953]: 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_validate_context[930]: 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_conference_created: VTSP and FMSP Are Conferenced; Waiting for FMSP Call Detail Event 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_change_state: Old State=1, New State=2 2d07h: %ISDN-6-CONNECT: Interface Serial2:30 is now connected to unknown 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_validate_context[930]: 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_msp_event: 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Prepare MSPI Call Setup Request 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Envelope [email protected] 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Envelope [email protected] 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: RFC822 To Comment=dileung 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Faxmail Subject=hagar-c5300-bw12 subject line here 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Disposition Notification= 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Originator TSI=RFC822 From Comment= 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Auth/Account ID: `0' 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Call Setup Request To MSPI 2d07h: //37/67E715B7800A/FOIP_ON/lapp_on_setup_mspi[748]: 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_conference_fmsp_dmsp: Starting Conference with FMSP and DMSP 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_conference_fmsp_dmsp: Tiff File Created; Time=2003:06:05 22:46:48
CallEntry ID is 35. This indicates a unique call leg. GUID is 67E715B7800A. This identifies the call. FOIP_ON identifies the fax mail onramp call leg. FOIP_OFF would identify an offramp call leg. The lapp_on_call_handoff field shows that the fax mail is initiating a call handoff.
lapp_on_conference_vtsp_fmsp:
Indicates that fax mail is starting a conference for VTSP and FMSP.
DB-745
Table 91
Description Indicates that the fax mail is changing state. Indicates that the conference is working properly between the VTSP and FMSP. Indicates that fax mail is displaying an MPSI event. Indicates that fax mail is starting a conference for FMSP and DMSP.
DB-746
December 2010
Syntax Description
(Optional) Displays all MMoIP AAA debugging messages. (Optional) Displays MMoIP AAA error and inout information. This option also runs if no keywords are added. (Optional) Displays MMoIP AAA error messages. (Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software errors. (Optional) Displays MMoIP AAA in/out functions.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command replaces the debug mmoip aaa command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows output from the debug fax mmoip aaa all command for an onramp fax connection:
Router# debug fax mmoip aaa all 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: UID=3 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: fax_account_id_origin=NONE_ID 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: [email protected], Length=39 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: fax_pages=0 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp:
DB-747
fax_connect_speed=disable bps 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: fax_mdn_flag=FALSE 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: fax_auth_status=USER NOT AUTHENTICATED 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: email_server_address=172.19.140.112 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: email_server_ack_flag=TRUE 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: gateway_id=Router.cisco.com 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: call_type=Fax Receive 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: abort_cause=10
CallEntry ID is 3. This indicates a unique call leg. GUID is D9242FD08002. This identifies the call. MMOIP_AAA_ON identifies the fax mail onrampMMOIP AAA call leg. MMOIP_AAA_OFF would identify the offramp call leg. The mmoip_aaa_accounting_onramp field shows that the accounting for an onramp fax is active.
Displays the fax message ID. Displays the name of the router. Indicates that the fax is being received.
DB-748
December 2010
Syntax Description
all default detail error call informational software event function inout
(Optional) Displays all fax MSPI debugging messages. (Optional) Displays fax MSPI error and inout information. This option also runs if no keywords are added. (Optional) Displays fax MSPI background messages. (Optional) Displays fax MSPI error messages. (Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software errors. (Optional) Displays fax MSPI events. (Optional) Displays fax MSPI functions. (Optional) Displays fax MSPI in/out functions.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command replaces the debug mspi receive and debug mspi send commands. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug fax mspi all command:
Router# debug fax mspi all Router# 2d07h: %ISDN-6-CONNECT: Interface Serial2:30 is now connected to unknown 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_call_setup_request: Outgoing Peer Tag=22 Envelope [email protected] Envelope [email protected]
DB-749
Mime Outer Type=2 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_check_connect: MMccb(Count=0) 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_check_connect: SMTP Connected To The Server ! 2d07h: //41/ACF704FA800B/MSPI/mspi_bridge: MMccb(State=CONNECTED, Type=Onramp), Destination Call Id=0x2A 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=0), Source Call 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=1), Source Call 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=2), Source Call 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=3), Source Call 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_onramp_buff_finished_callback: MMccb(Call State=CONFERENCED, Buffer Count=9) 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_onramp_buff_finished_callback: MMccb(Call State=CONFERENCED, Buffer Count=8) 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_onramp_buff_finished_callback: MMccb(Call State=CONFERENCED, Buffer Count=7) 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_onramp_buff_finished_callback: 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=0), Source Call 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=1), Source Call 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=2), Source Call 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=3), Source Call 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=4), Source Call 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=5), Source Call Router#
CallEntry ID is 41. This indicates a unique call leg. GUID is ACF704FA800B. This identifies the call. MSPI_ON identifies the fax mail onramp MSPI call leg. MSPI_OFF would identify the offramp call leg. The mspi_call_setup_request field shows that the MSPI is requesting a call setup.
Indicates the unique dial peer tag. Indicates the sender of the fax mail message. Indicates the receiver of the fax mail message. Indicates that the MSPI is transmitting data.
DB-750
December 2010
Table 93
Description Describes the MPSI state. Describes whether the fax is on-ramp or off-ramp. Indicates the buffer count. Identifies the source call ID.
DB-751
Syntax Description
all default detail error call informational software event function inout
(Optional) Displays all fax MTA debugging messages. (Optional) Displays fax MTA error and inout information. This option also runs if no keywords are added. (Optional) Displays fax MTA background messages. (Optional) Displays fax MTA error messages. (Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software errors. (Optional) Displays fax MTA events. (Optional) Displays fax MTA functions. (Optional) Displays fax MTA in/out functions.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command replaces the debug mta receive all, debug mta send all, and debug mta send rcpt-to commands. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug fax mta all command:
Router# debug fax mta all 2d07h: %ISDN-6-CONNECT: Interface Serial2:30 is now connected to unknown 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_new_context_guid[2177]: 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_open: [email protected], [email protected] 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_open[1868]: 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_add_headers:
DB-752
December 2010
from_comment= 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_work_routine: socket 0 readable for first time 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 220 vip2-das.cisco.com ESMTP Sendmail 8.9.3/8.9.3; Thu, 5 Jun 2003 23:24:54 -0700 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: EHLO Router.cisco.com 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-vip2-das.cisco.com Hello [172.19.140.108], pleased to meet you 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-EXPN 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-VERB 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-8BITMIME 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-SIZE 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-DSN 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-ONEX 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-ETRN 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-XUSR 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250 HELP 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: MAIL FROM:<[email protected]> 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250 <[email protected]>... Sender ok 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: RCPT TO:<[email protected]> 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250 <[email protected]>... Recipient ok 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 354 Enter mail, end with "." on a line by itself 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: Received: by Router.cisco.com for <[email protected]> (with Cisco NetWorks); Thu, 05 Jun 2003 23:11:09 +0000 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: To: "jdoe" <[email protected]> 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: Message-ID: <[email protected]> 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: Date: Thu, 05 Jun 2003 23:11:09 +0000 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0
DB-753
CallEntry ID is -1. This indicates that a call leg has not been identified. GUID is CEB9FA0B800E. This identifies the call. SMTPC is the module name. The esmtp_client_engine_open field shows that the fax mail client engine is opening a session.
Indicates the sender of the fax mail message. Indicates the receiver of the fax mail message. Indicates that the fax mail client engine is writing data. Indicates that the fax mail client engine is receiving data.
DB-754
December 2010
Syntax Description
Enables debugging for all incoming and outgoing calls. Enables debugging for incoming numbers that begin with a specified string of digits. Enables debugging for outgoing numbers that begin with a specified string of digits. Digits that specify the incoming or outgoing number.
Defaults
Command Modes
Privileged EXEC
Command History
Modification The debug fax relay t30 command was introduced on Cisco AS5350, Cisco AS5400, and Cisco AS5850 access servers. This command was integrated into Cisco IOS Release 12.2(11)T for the Cisco AS5350, Cisco AS5400, and Cisco AS5850 access servers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The incoming or outgoing numbers must be a valid E.164 destination. The period symbol (.) as a wildcard should not be used. Instead of a wildcard, leave the space blank to indicate that any numbers can be valid. There are no limits to the number of debug entries. The number entered generates a match if the calling or called number matches up to the final number of the debug entry. For example, the 408555 entry would match 408555, 4085551, 4085551212, or any other number starting with 408555.
Examples
The following command enables debugging for any incoming calls that start with 408555:
Router# debug fax relay t30 calling-number 408555 Debugging fax relay t30 from 408555
DB-755
The following command enables debugging for any calls received to a number starting with 555-1212:
Router# debug fax relay t30 called-number 4155551212 Debugging fax relay t30 to 4155551212
DB-756
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug fddi smt-packets command. In this example, an SMT frame has been output by FDDI 1/0. The SMT frame is a next station addressing (NSA) neighbor information frame (NIF) request frame with the parameters as shown.
Router# debug fddi smt-packets SMT O: Fddi1/0, FC=NSA, DA=ffff.ffff.ffff, SA=00c0.eeee.be04, class=NIF, type=Request, vers=1, station_id=00c0.eeee.be04, len=40 - code 1, len 8 -- 000000016850043F - code 2, len 4 -- 00010200 - code 3, len 4 -- 00003100 - code 200B, len 8 -- 0000000100000000
Description SMT frame was sent from FDDI interface 1/0. Also, SMT I indicates that an SMT frame was received on the FDDI interface 1/0. Interface associated with the frame. Frame control byte in the MAC header. Destination and source addresses in FDDI form. Frame class. Values can be echo frame (ECF), neighbor information frame (NIF), parameter management frame (PMF), request denied frame (RDF), status information frame (SIF), and status report frame (SRF). Frame type. Values can be Request, Response, and Announce. Version identification. Values can be 1 or 2. Station identification.
DB-757
Table 95
Description Packet size. Parameter type X0001upstream neighbor address (UNA), parameter length in bytes, and parameter value. SMT parameters are described in the SMT specification ANSI X3T9.
DB-758
December 2010
debug filesystem
To enable ATA ROM monitor library (monlib) debugging messages, use the debug filesystem command in privileged EXEC mode. To disable ATA monlib debugging messages, use the no form of this command. debug filesystem {disk0 | disk1} no debug filesystem {disk0 | disk1}
Syntax Description
disk0 disk1
Selects disk 0 as the disk on which to enable or disable debugging. Selects disk 1 as the disk on which to enable or disable debugging.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug filesystem command enables the display of ATA monlib debugging messages during boot operations. To display the debugging messages when ROMMON accesses the PCMCIA disk, the ROMMON must have disk support. In other words, if a dev command is entered in ROMMON mode, the output should display the supported disks as shown in the following example:
rommon 1> dev Devices in device table: id name bootflash: boot flash slot0: PCMCIA slot 0 slot1: PCMCIA slot 1 disk0: PCMCIA slot 0 disk1: PCMCIA slot 1 eprom: eprom
Examples
The following example shows how to enable ATA monlib debugging messages on disk 0, reboot the router to view ATA monlib debugging messages, and then disable ATA monlib debugging messages:
Router# debug filesystem disk0 rommon 1> boot disk0:c7200-is-mz.123-5.7.PI3a Initializing ATA monitor library.......
DB-759
ATA_read_sector:dev = 0 ATA_data_xfer:1:dev = 0, command = 32, nsecs = 8, sector = 3, cyl_low = 0, cyl_high = 0, head = 171 ATA_read_sector:dev = 0, retval = 0 dfs_openfile:Using monlib version 2 dfs_openfile:Using version info 1 dfs_openfile:finding file.. /c7200-is-mz.123-5.7.PI3a ATA_read_sector:dev = 0 ATA_data_xfer:1:dev = 0, command = 32, nsecs = 1, sector = 15, cyl_low = 0, cyl_high = 0, head = 163 ATA_read_sector:dev = 0, retval = 0 ATA_read_sector:dev = 0 ATA_data_xfer:1:dev = 0, command = 32, nsecs = 128, sector = 35, cyl_low = 0, cyl_high = 0, head = 171 ATA_read_sector:dev = 0, retval = 0 dfs_openfile:opened file.. /c7200-is-mz.123-5.7.PI3a with fd = 0 DFSLIB_read:reading file.. fd = 0, byte_count = 4 DFSLIB_read:read from.. fd = 0, byte_count = 4, retval = 4 DFSLIB_read:reading file.. fd = 0, byte_count = 52 DFSLIB_read:read from.. fd = 0, byte_count = 52, retval = 52 DFSLIB_read:reading file.. fd = 0, byte_count = 40 DFSLIB_read:read from.. fd = 0, byte_count = 40, retval = 40 . . . DFSLIB_read:reading file.. fd = 0, byte_count = 40 DFSLIB_read:read from.. fd = 0, byte_count = 40, retval = 40 DFSLIB_read:reading file.. fd = 0, byte_count = 19539160 ATA_read_sector:dev = 0 ATA_data_xfer:1:dev = 0, command = 32, nsecs = 1, sector = 15, cyl_low = 0, cyl_high = 0, head = 163 ATA_read_sector:dev = 0, retval = 0 ATA_read_sector:dev = 0 . . . ATA_read_sector:dev = 0 ATA_data_xfer:1:dev = 0, command = 32, nsecs = 19, sector = 1, cyl_low = 38, cyl_high = 0, head = 169 ATA_read_sector:dev = 0, retval = 0 DFSLIB_read:read from.. fd = 0, byte_count = 19539160, retval = 19539160 Self decompressing the image :##################################################################### ########################################################################################## ########## ############################################################### [OK] Router# no debug filesystem disk0
Description The number of the device being accessed. The operation that is being executed. The number of sectors on the device. The starting sector. The starting cylinder, low and high.
DB-760
December 2010
Table 96
Description The head number. The status of the operation being executed.
DB-761
Syntax Description
(Optional) The name of a flow exporter that you previously configured. (Optional) Enables debugging for flow exporter errors. (Optional) Enables debugging for flow exporter events. (Optional) Enables packet level debugging for flow exporters. (Optional) Configures the number of packets to debug for packet level debugging of flow exporters.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You must have already enabled traffic monitoring with Flexible NetFlow using an exporter before you can use the debug flow exporter command.
Examples
The following example indicates that a flow exporter packet has been queued for process send:
Router# debug flow exporter May 21 21:29:12.603: FLOW EXP: Packet queued for process send
Related Commands
Description Clears the Flexible NetFlow statistics for exporters. Enables debugging output for Flexible NetFlow flow exporters.
DB-762
December 2010
Command destination dscp flow exporter export-protocol option show flow exporter source template transport ttl
Description Configures an export destination for Flexible NetFlow flow exporters. Configure optional DSCP parameters for Flexible NetFlow flow exporters. Creates a Flexible NetFlow flow exporter. Configures the export protocol version for Flexible NetFlow flow exporters. Configure options for Flexible NetFlow flow exporters. Displays Flexible NetFlow flow exporter status and statistics. Configures the source IP address interface for Flexible NetFlow flow exporters. Configures the template resend timeout for Flexible NetFlow flow exporters. Configures the transport protocol for Flexible NetFlow flow exporters. Configures the TTL value for Flexible NetFlow flow exporters.
DB-763
Syntax Description
(Optional) The name of a flow monitor that you previously configured. (Optional) Enables debugging for the flow monitor cache. (Optional) Enables debugging for flow monitor errors. (Optional) Enables packet level debugging for flow monitors. (Optional) The number of packets to debug for packet-level debugging of flow monitors.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You must have already enabled traffic monitoring with Flexible NetFlow before you can use the debug flow monitor command.
Examples
The following example shows that the cache for FLOW-MONITOR-1 was deleted:
Router# debug flow monitor FLOW-MONITOR-1 cache May 21 21:53:02.839: FLOW MON: 'FLOW-MONITOR-1' deleted cache
Related Commands
Description Configures flow cache parameters for Flexible NetFlow flow monitors. Clears the Flexible NetFlow flow monitor.
DB-764
December 2010
Command debug flow monitor exporter flow monitor protocol-distribution record show flow monitor size-distribution
Description Enables debugging output for Flexible NetFlow flow monitors. Specifies a flow exporter for Flexible NetFlow flow monitors. Creates a Flexible NetFlow flow monitor. Configures the collection of protocol distribution statistics for Flexible NetFlow flow monitors. Configures a flow record a for Flexible NetFlow flow monitor. Displays Flexible NetFlow flow monitor status and statistics. Configures the collection of size distribution statistics for Flexible NetFlow flow monitors.
DB-765
Syntax Description
(Optional) The name of a flow record that you previously configured. (Optional) Traditional IPv4 input NetFlow with origin autonomous systems. (Optional) The name of the NetFlow predefined record that you want to run debugging on. See Table 97. (Optional) Includes peer information for the NetFlow predefined records that support the peer keyword.
Note
The peer keyword is not supported for every type of NetFlow predefined record. See Table 97.
(Optional) Includes information on other flow record options. (Optional) Information on the flow exporter statistics. (Optional) Information on the interface tables. (Optional) Information on the sampler tables. (Optional) Show detailed information. (Optional) Only show errors.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-766
December 2010
Usage Guidelines
You must have already enabled traffic monitoring with Flexible NetFlow before you can use the debug flow record command.
Keywords and Descriptions for the record Argument
Table 97 describes the keywords and descriptions for the record argument.
Table 97 Keywords and Descriptions for the record Argument
as as-tos bgp-nexthop-tos destination-prefix destination-prefix-tos original-input original-output prefix prefix-port prefix-tos protocol-port protocol-port-tos source-prefix source-prefix-tos
Autonomous system record. Autonomous systems and TOS record. BGP next-hop and TOS record. Destination Prefix record. Destination Prefix and TOS record. Traditional IPv4 input NetFlow. Traditional IPv4 output NetFlow. Source and Destination Prefixes record. Prefix Port record.
Note
The peer keyword is not available for this record. The peer keyword is not available for this record.
Examples
Related Commands
Command collect counter collect flow collect interface collect ipv4 collect routing collect timestamp collect transport debug flow record
Description Configures the counters as a non-key field and collect the counter values. Configures flow identifying fields as a non-key fields and collect their values. Configure the input and/or output interface as a non-key field and collect the values. Configures an IPv4 field as a non-key field and collect the value in it. Configures a routing attribute as a non-key field and collect the value of the field. Configures the timestamp fields as a non-key field and collect the values. Configures a transport layer field as a non-key field and collect the values. Enables debugging output for Flexible NetFlow flow records.
DB-767
Command flow record match flow match interface match ipv4 match routing match timestamp match transport show flow record
Description Create a Flexible NetFlow flow record. Configures one or more of the flow fields as key fields. Configures the direction that traffic flows in respect to an interface (interface field) as a key field. Configures one or more of the IPv4 fields as a key field. Configures one or more of the routing fields as a key field. Configures a timestamp field as a key field. Configures one or more of the transport fields as a key field. Displays Flexible NetFlow flow record status and statistics.
DB-768
December 2010
debug flow-sampler
To enable debugging output for NetFlow sampler activity, use the debug flow-sampler command in privileged EXEC mode. To disable debugging output for NetFlow sampler activity, use the no form of this command. debug flow-sampler {class-based | events | ipc | match} no debug flow-sampler {class-based | events | ipc | match}
Syntax Description
Displays debug messages for class-based NetFlow samplers. Displays debug messages when a NetFlow sampler map is added, deleted, or applied to an interface. Displays NetFlow sampler-related debug messages for interprocess communications (IPC) between the route processor and line cards. Displays debug messages when a packet is sampled (is matched with a NetFlow sampler).
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.0(26)S. The class-based keyword was added. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Because debugging output is assigned high priority in the CPU process, you should use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, you should use debug commands during periods of lower network traffic and fewer users. Debugging during these periods reducess the likelihood that increased debug command processing overhead will affect system use.
Examples
The following is sample output from the debug flow-sampler events command:
DB-769
Router# debug flow-sampler events Flow sampler events debugging is on Router# configure terminal Router(config# no flow-sampler mysampler2 Router(config)# 5d00h: Flow: Sampler mysampler2 detached from FastEthernet0/1 5d00h: Flow: Sampler mysampler2 deleted
The following is sample output from the debug flow-sampler match command:
Router# debug flow-sampler match Flow sampler Router# 4d23h: Flow: Router# 4d23h: Flow: Router# 4d23h: Flow: Router# 4d23h: Flow: match debugging is on Packet matched sampler mysampler1 on interface FastEthernet0/0 Packet matched sampler mysampler1 on interface FastEthernet0/0 Packet matched sampler mysampler1 on interface FastEthernet0/0 Packet matched sampler mysampler1 on interface FastEthernet0/0
Description Name of the NetFlow sampler. Unique ID of the NetFlow sampler. Number of packets matched (sampled) for the NetFlow sampler. NetFlow sampling mode. NetFlow sampling interval (in packets).
Related Commands
Description Enables a Random Sampled NetFlow sampler. Defines a Random Sampled NetFlow sampler map. Enables the export of NetFlow data to a collector.
mode (flow sampler map) Specifies a Random Sampled NetFlow sampling mode and sampling rate. netflow-sampler show flow-sampler show ip flow export Enables a class-based NetFlow sampler. Displays attributes (including mode, sampling rate, and number of sampled packets) of one or all Random Sampled NetFlow samplers. Displays the statistics for the NetFlow data export.
DB-770
December 2010
debug fm private-hosts
To enable debug messages for the Private Hosts feature manager, use the debug fm private-hosts command in privileged EXEC mode. debug fm private-hosts {all | vmr | unusual | events}
Syntax Description
Enable debug messages for all Private Hosts errors and events. Enable debug messages for the Multicast VLAN Registration (MVR) feature. Enable debug messages for unexpected Private Hosts behavior. Enable debug messages for Private Hosts events.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
Related Commands
DB-771
Effective with release 12.3(8)T, the debug fmsp receive command is replaced by the debug fax fmsp command. See the debug fax fmsp command for more information. To display debugging messages for Fax Media Services Provider (FMSP) receive, use the debug fmsp receive command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug fmsp receive [t30 | t38] no debug fmsp receive [t30 | t38]
Syntax Description
t30 t38
(Optional) Specifies the T.30 fax protocol. (Optional) Specifies the T.38 fax protocol.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 access server. This command was implemented on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. Support for this command was implemented in Cisco 7200 series images. This command was replaced by the debug fax fmsp command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug fmsp receive command:
Router# debug fmsp receive *Oct 16 08:31:33.243: faxmsp_call_setup_request: call id=28 *Oct 16 08:31:33.243: faxmsp_call_setup_request: ramp data dir=ONRAMP, conf dir=DEST *Oct 16 08:31:33.243: faxmsp_bridge(): cfid=19, srccid=28, dstcid=27 *Oct 16 08:31:33.243: faxmsp_bridge(): ramp data dir=ONRAMP, conf dir=DEST *Oct 16 08:31:33.243: faxmsp_bridge(): Explicit caps ind. done; will wait for registry caps ind
DB-772
December 2010
*Oct *Oct *Oct *Oct *Oct *Oct *Oct caps *Oct *Oct *Oct *Oct *Oct *Oct *Oct
16 16 16 16 16
faxmsp_caps_ind: call id=28, src=27 faxmsp_caps_ack: call id src=27 faxmsp_call_setup_request: call id=29 faxmsp_call_setup_request: ramp data dir=OFFRAMP, conf dir=SRC faxmsp_bridge(): cfid=20, srccid=29, dstcid=26 faxmsp_bridge(): ramp data dir=OFFRAMP, conf dir=SRC faxmsp_bridge(): Explicit caps ind. done; will wait for registry faxmsp_caps_ind: call id=29, src=26 faxmsp_caps_ack: call id src=26 faxmsp_codec_download_done: call id=29 faxmsp_codec_download_done: call id=28 faxmsp_xmit: callid src=26, dst=29 faxmsp_xmit: callid src=27, dst=28 faxmsp_process_rcv_data: call id src=26, dst=29
16 08:31:33.283: 16 08:31:33.283: ind 16 08:31:33.283: 16 08:31:33.283: 16 08:31:33.635: 16 08:31:33.635: 16 08:31:33.643: 16 08:31:33.643: 16 08:31:33.643:
Related Commands
DB-773
Effective with release 12.3(8)T, the debug fmsp send command is replaced by the debug fax fmsp command. See the debug fax fmsp command for more information. To display debugging messages for Fax Media Services Provider (FMSP) send, use the debug fmsp send command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug fmsp send [t30 | t38] no debug fmsp send [t30 | t38]
Syntax Description
t30 t38
(Optional) Specifies the T.30 fax protocol. (Optional) Specifies the T.38 fax protocol.
Defaults
Command Modes
Command History
Modification This command was introduced on the Cisco AS5300 access server. This command was implemented on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. This feature was implemented on the Cisco 7200 series routers. This command was replaced by the debug fax fmsp command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug fmsp send command:
Router# debug fmsp send Jan Jan Jan Jan Jan ind Jan Jan Jan 1 05:02:56.782: faxmsp_call_setup_request: call id=21 1 05:02:56.782: faxmsp_call_setup_request: ramp data dir=OFFRAMP, conf dir=SRC 1 05:02:56.782: faxmsp_bridge(): cfid=7, srccid=21, dstcid=20 1 05:02:56.782: faxmsp_bridge(): ramp data dir=OFFRAMP, conf dir=SRC 1 05:02:56.782: faxmsp_bridge(): Explicit caps ind. done; will wait for registry caps 1 05:02:56.782: faxmsp_caps_ind: call id=21, src=20 1 05:02:56.782: faxmsp_caps_ack: call id src=20 1 05:02:57.174: faxmsp_codec_download_done: call id=21
DB-774
December 2010
Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
05:02:57.174: 05:02:57.178: 05:02:57.178: 05:02:57.178: 05:02:57.182: 05:02:57.182: 05:03:01.814: 05:03:01.814: 05:03:01.814: 05:03:02.802: 05:03:02.802: 05:03:02.822: 05:03:02.822: 05:03:02.854: 05:03:02.854:
faxMsp_tx_buffer callID=21 faxMsp_tx_buffer callID=21 faxMsp_tx_buffer callID=21 faxMsp_tx_buffer callID=21 faxmsp_xmit: callid src=20, dst=21 faxmsp_process_rcv_data: call id src=20, faxmsp_xmit: callid src=20, dst=21 faxmsp_process_rcv_data: call id src=20, faxMsp_tx_buffer callID=21 faxmsp_xmit: callid src=20, dst=21 faxmsp_process_rcv_data: call id src=20, faxmsp_xmit: callid src=20, dst=21 faxmsp_process_rcv_data: call id src=20, faxmsp_xmit: callid src=20, dst=21 faxmsp_process_rcv_data: call id src=20,
dst=21 dst=21
Related Commands
DB-775
Effective with release 12.3(8)T, the debug foip off-ramp command is replaced by the debug fax foip command. See the debug fax foip command for more information. To display debugging messages for off-ramp fax mail, use the debug foip off-ramp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug foip off-ramp no debug foip off-ramp
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 access server. This command was introduced on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. This feature was implemented on the Cisco 7200 series routers. This command was replaced by the debug fax foip command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug foip off-ramp command:
Router# debug foip off-ramp Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan 1 1 1 1 1 1 1 1 1 1 1 1 1 02:31:17.539: 02:31:17.539: 02:31:17.543: 02:31:17.543: 02:31:22.867: 02:31:22.867: 02:31:22.867: 02:31:22.867: 02:31:22.867: 02:31:22.867: 02:31:22.867: 02:31:30.931: 02:31:30.931: lapp off: CC_EV_CALL_HANDOFF, cid(0xB) loffHandoff: called number=5271714, callid=0xB loffSetupPeer: cid1(0xB) destPat(5271714),matched(1),pref(5),tag(20),encap(1) lapp off: CC_EV_CALL_CONNECTED, cid(0xC) st=CALL_SETTING cid(0xB,0x0,0x0,0xC),cfid(0x0,0x0,0x0) loffConnected loffFlushPeerTagQueue cid(11) peer list: (empty) lapp off: CC_EV_CONF_CREATE_DONE, cid(0xC), cid2(0xD), cfid(0x1) st=CONFERENCING3 cid(0xB,0x0,0xD,0xC),cfid(0x0,0x0,0x1) loffConfDone3 lapp off: CC_EV_FROM_FMSP_ON_CALL_DETAIL, cid(0xD) st=WAIT_SESS_INFO cid(0xB,0x0,0xD,0xC),cfid(0x0,0x0,0x1)
DB-776
December 2010
1 1 1 1 1
02:31:30.931: loffSessionInfo 02:31:30.931: encd=2, resl=2, spd=26, min_scan_len=0, csid= 4085271714 02:31:30.931: lapp off: CC_EV_CONF_CREATE_DONE, cid(0xD), cid2(0xE), cfid(0x2) 02:31:30.931: st=CONFERENCING2 cid(0xB,0xE,0xD,0xC),cfid(0x0,0x2,0x1) 02:31:30.931: loffConfDone2
Related Commands
DB-777
Effective with release 12.3(8)T, the debug foip on-ramp command is replaced by the debug fax foip command. See the debug fax foip command for more information. To display debugging messages for on-ramp fax mail, use the debug foip on-ramp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug foip on-ramp no debug foip on-ramp
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 access server. This command was introduced on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. This feature was implemented on the Cisco 7200 series routers. This command was replaced by the debug fax foip command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug foip on-ramp command:
Router# debug foip on-ramp *Oct 16 08:07:01.947: CID(11), DISP(0) *Oct 16 08:07:01.947: *Oct 16 08:07:01.947: *Oct 16 08:07:01.947: *Oct 16 08:07:01.947: *Oct 16 08:07:01.947: *Oct 16 08:07:01.947: *Oct 16 08:07:01.947: *Oct 16 08:07:01.951: *Oct 16 08:07:01.951: CID(11), DISP(0) *Oct 16 08:07:01.951: lapp_on_application: Incoming Event: (15 = CC_EV_CALL_HANDOFF), lapp_on_call_handoff: Authentication enabled = FALSE lapp_on_call_handoff: Authentication ID = 0 lapp_on_call_handoff: Authentication ID source = IVR or unknown lapp_on_call_handoff: Authentication status = SUCCESS lapp_on_call_handoff: Accounting enabled = FALSE lapp_on_call_handoff: Accounting method list = fax lapp_on_conference_vtsp_fmsp: Begin conferencing VTSP and FMSP... lapp_on_change_state: old state(0) new state(1) lapp_on_application: Incoming Event: (29 = CC_EV_CONF_CREATE_DONE), lapp_on_application: Current call state = 1
DB-778
December 2010
*Oct 16 08:07:01.951: lapp_on_conference_created: The VTSP and the FMSP are conferenced *Oct 16 08:07:01.951: lapp_on_conference_created: Wait for FMSP call detail event
Related Commands
DB-779
debug format
To verify the syntax of eXtensible Markup Language Programmatic Interface (XML-PI) spec files, use the debug format command in privileged EXEC mode. To disable debugging, use the no form of this command. debug format {all | error} no debug format {all | error}
Syntax Description
all error
Specifies verbose mode to display selected debug data with comments followed by full debug output. Displays minimal format error statements.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was modified. It was integrated into Cisco IOS Release 12.2(33)SRE.
Usage Guidelines
Use the debug format all command to troubleshoot errors in XML-PI spec files. The command displays XML output, the XML Schema Definition (XSD), and parsing locations. For less verbose output, use the debug format error command.
Examples
The following examples show how to use the verbose output from the debug format all command to troubleshoot spec file entries based on information collected from the show interfaces command. Begin by displaying the show interfaces command output.
Router# show interfaces FastEthernet0/0 is up, line protocol is up Hardware is i82543 (Livengood), address is 000b.60dc.9408 (bia 000b.60dc.9408) Internet address is 10.4.4.5/8 MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, 100BaseTX/FX ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:07, output 00:00:03, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
DB-780
December 2010
Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 769 packets input, 121369 bytes Received 696 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog 0 input packets with dribble condition detected 959 packets output, 94185 bytes, 0 underruns 2 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 2 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out FastEthernet0/1 is down, line protocol is down Hardware is i82543 (Livengood), address is 000b.60dc.9406 (bia 000b.60dc.9406) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Unknown duplex, Unknown Speed, 100BaseTX/FX ARP type: ARPA, ARP Timeout 04:00:00 Last input never, output never, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog 0 input packets with dribble condition detected 0 packets output, 0 bytes, 0 underruns 2 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 2 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out Loopback0 is up, line protocol is up Hardware is Loopback MTU 1514 bytes, BW 8000000 Kbit, DLY 5000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation LOOPBACK, loopback not set Last input never, output never, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/0 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 output buffer failures, 0 output buffers swapped out
The next step is to generate XML output for the show interfaces command:
Router# show interfaces | format slot0:spec3.3.odm <?xml version="1.0" encoding="UTF-8"?>
DB-781
<ShowInterfaces> <Interface> <Name>FastEthernet0/0</Name> <State>UP</State> <lineprotocol>up</lineprotocol> <Hardware>i82543</Hardware> <address>000b.60dc.9408</address> <bia>000b.60dc.9408</bia> <Internetaddress>10.4.4.5/8</Internetaddress> <MTU>1500</MTU> <BW>100000</BW> <DLY>100</DLY> <reliability>255/255,</reliability> <txload>1/255,</txload> <rxload>1/255</rxload> <Encapsulation>ARPA,</Encapsulation> <loopback>Notset</loopback> <Keepalive>Set</Keepalive> <KeepAliveInterval>10</KeepAliveInterval> <TunnelInfo> </TunnelInfo> <DuplexInfo> <Duplextype>duplex,</Duplextype> <DuplexSpeed>100Mb/s,</DuplexSpeed> </DuplexInfo> <ARPtype>ARPA,</ARPtype> <ARPTimeout>04:00:00</ARPTimeout> <LMIInfo> </LMIInfo> <BroadcastInfo> </BroadcastInfo> <Lastinput>00:00:26,</Lastinput> <output>00:00:08,</output> <outputhang>never</outputhang> <LastclearingOfCounters>never</LastclearingOfCounters> <Inputqueue> <Size>0/75/0/0</Size> <Max>0/75/0/0</Max> <Drops>0/75/0/0</Drops> <flushes>0/75/0/0</flushes> </Inputqueue> <Totaloutputdrops>0</Totaloutputdrops> <Queueingstrategy>fifo</Queueingstrategy> <Outputqueue> <Size>0/40</Size> <Max>0/40</Max> </Outputqueue> <Conversations> </Conversations> <ReservedConversations> </ReservedConversations> <Fiveminuteinputrateinbits>0</Fiveminuteinputrateinbits> <Fiveminuteinputrateinpkts>0</Fiveminuteinputrateinpkts> <Fiveminuteoutputrateinbits>0</Fiveminuteoutputrateinbits> <Fiveminuteoutputrateinpkts>0</Fiveminuteoutputrateinpkts> <L2Switched> </L2Switched> <L3in> </L3in> <L3out> </L3out> <packetsinput>771</packetsinput> <nobuffer>0</nobuffer> <broadcasts>0</broadcasts>
DB-782
December 2010
<runts>0</runts> <giants>0</giants> <throttles>0</throttles> <inputerrors>0</inputerrors> <CRC>0</CRC> <frame>0</frame> <overrun>0</overrun> <ignored>0</ignored> <packetsoutput>0</packetsoutput> <underruns>0</underruns> <outputerrors>0</outputerrors> <collisions>0</collisions> <interfaceresets>0</interfaceresets> <outputbufferfailures>0</outputbufferfailures> <outputbuffersswappedout>0</outputbuffersswappedout> </Interface> </ShowInterfaces>
Analyze the two outputs: In this case, output about only one interface is listed in the show interfaces | format slot0:spec3.3.odm command, but based on the original show interfaces command output, it was expected that there would be output about three interfaces. Enter the following commands to enable the verbose debugging mode that displays all Operational Data Model (ODM) errors:
Router# debug format all Router# show interfaces | format slot0:spec3.3.odm
The debug format statements are read in groups of two lines. As the following example shows, the first line describes what the attempted match was; the second line provides the offset and the byte count from the beginning of the show interfaces command output that the cursor of the screen scraper has reached.
*May *May 4 01:20:35.279: ODM: Could not match Property mcast 4 01:20:35.279: offset 703: 5 minute output rate 0 bits/sec, 0 packets/sec
The following example shows where the spec file entry (SFE) caused the ODM algorithm to return a truncated XML. Notice how the offset jumps from 703 to 3001. This is a large jump that implies a search between multicast and IP multicast probably caused the screen scraper to jump too far into the text. Because the cursor is not at a buffer, this condition is the likely candidate for the error. Looking at the spec file entry and doing a manual search through the show command output will confirm this suspicion.
*May 4 01:20:35.279: offset 703: 5 minute output rate 0 bits/sec, 0 packets/sec 786 pa *May 4 01:20:35.279: ODM: Could not match Property mcast *May 4 01:20:35.279: offset 703: 5 minute output rate 0 bits/sec, 0 packets/sec 786 pa *May 4 01:20:35.279: ODM: Could not match Property IP multicasts *May 4 01:20:35.279: offset 3001: no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 *May 4 01:20:35.279: ODM: Could not match Property watchdog *May 4 01:20:35.279: offset 3122: ignored, 0 abort 0 packets output, 0 bytes, 0 underru *May 4 01:20:35.279: ODM: Could not match Property input packets with dribble condition detected
Related Commands
Description Displays statistics for all interfaces configured on the router or access server
DB-783
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)ZY on the Catalyst 6500 series of switches equipped with the Programmable Intelligent Services Accelerator (PISA). This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Examples
The following sample output is from the debug fpm event command:
Router# debug fpm event *Jun 21 09:22:21.607: policy-classification-inline(): matches class: class-default *Jun 21 09:22:21.607: packet-access-control(): policy-map: fpm-policy, dir: input, match. retval: 0x0, ip-flags: 0x80000000
DB-784
December 2010
debug frame-relay
To display debugging information about the packets received on a Frame Relay interface, use the debug frame-relay command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug frame-relay no debug frame-relay
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Support for Banyan VINES was removed. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command helps you analyze the packets that have been received. However, because the debug frame-relay command generates a substantial amount of output, use it only when the rate of traffic on the Frame Relay network is less than 25 packets per second. To analyze the packets that have been sent on a Frame Relay interface, use the debug frame-relay packet command.
Examples
DB-785
Description Indicates that serial interface 0 has received this Frame Relay datagram as input. Indicates the value of the data-link connection identifier (DLCI) for this packet in decimal (and q922). In this case, 500 has been configured as the multicast DLCI.
DB-786
December 2010
Table 99
Description Indicates the packet type code. Possible supported signalling message codes are as follows:
0x308Signalling message; valid only with a DLCI of 0 0x309LMI message; valid only with a DLCI of 1023 0x0201IP on a 3 MB net 0x0201Xerox ARP on 10 MB networks 0xCCRFC 1294 (only for IP) 0x0600XNS 0x0800IP on a 10 MB network 0x0806IP ARP 0x0808Frame Relay Address Resolution Protocol (ARP)
Possible High-Level Data Link Control (HDLC) type codes are as follows:
0x6001DEC Maintenance Operation Protocol (MOP) booting protocol 0x6002DEC MOP console protocol 0x6003DECnet Phase IV on Ethernet 0x6004DEC LAT on Ethernet 0x8005HP Probe 0x8035RARP 0x8038DEC spanning tree 0x809bApple EtherTalk 0x80f3AppleTalk ARP 0x8019Apollo domain 0x8137Internetwork Packet Exchange (IPX) 0x9000Ethernet loopback packet IP 0x1A58IPX, standard form 0xFEFEConnectionless Network Service (CLNS) 0xEFEFEnd System-to-Intermediate System (ES-IS) 0x1998Uncompressed TCP 0x1999Compressed TCP 0x6558Serial line bridging
datagramsize 24
DB-787
Syntax Description
Displays information regarding the adjacent PVC only. (Optional) Data-link connection identifier for a specific PVC. Displays information regarding the adjacent PVC bundle and its members. (Optional) Name of the PVC bundle.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to monitor adjacency activity and status for an adjacent node.
Note
Debug messages that are prefixed with FR_ADJ (instead of FR-ADJ) indicate serious failures in the Frame Relay PVC bundle performance. Contact the Cisco Technical Assistance Center (TAC) if you see debugging messages with this prefix.
DB-788
December 2010
Examples
The following sample output from the debug frame-relay adjacency vc-bundle command shows PVC bundle MP-4-dynamic going down. Each bundle member PVC is marked for removal from the CEF adjacency table, and then the adjacency for the PVC bundle itself is marked for removal. The adjacencies are actually removed from the table later when a background clean-up process runs.
Router# debug frame-relay adjacency vc-bundle MP-4-dynamic 00:46:35: 00:46:35: 00:46:35: 00:46:35: 00:46:35: 00:46:35: 00:46:35: 00:46:35: 00:46:35: FR-ADJ: FR-ADJ: FR-ADJ: FR-ADJ: FR-ADJ: FR-ADJ: FR-ADJ: FR-ADJ: FR-ADJ: vcb vcb vcb vcb vcb vcb vcb vcb vcb MP-4-dynamic: MP-4-dynamic: MP-4-dynamic: MP-4-dynamic: MP-4-dynamic: MP-4-dynamic: MP-4-dynamic: MP-4-dynamic: MP-4-dynamic: ip ip ip ip ip ip ip ip ip 10.2.2.2: 10.2.2.2: 10.2.2.2: 10.2.2.2: 10.2.2.2: 10.2.2.2: 10.2.2.2: 10.2.2.2: 10.2.2.2: member 400: removing member 401: removing member 402: removing member 403: removing member 404: removing member 405: removing member 406: removing member 407: removing removing primary adj adj adj adj adj adj adj adj adj
Related Commands
Description Displays information pertaining to all the PVC bundles configured on the router.
DB-789
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug frame-relay callcontrol command is used specifically for observing FRF.4/Q.933 signalling messages and related state changes. The FRF.4/Q.933 specification describes a state machine for call control. The signalling code implements the state machine. The debug statements display the actual event and state combinations. The Frame Relay switched virtual circuit (SVC) signalling subsystem is an independent software module. When used with the debug frame-relay networklayerinterface command, the debug frame-relay callcontrol command provides a better understanding of the call setup and teardown sequence. The debug frame-relay networklayerinterface command provides the details of the interactions between the signalling subsystem on the router and the Frame Relay subsystem.
Examples
State changes can be observed during a call setup on the calling party side. The debug frame-relay networklayerinterface command shows the following state changes or transitions:
STATE_NULL -> STATE_CALL_INITIATED -> STATE_CALL_PROCEEDING->STATE_ACTIVE
The following messages are samples of output generated during a call setup on the calling side:
6d20h: U0_SetupRequest: Serial0 6d20h: L3SDL: Ref: 1, Init: STATE_NULL, Rcvd: SETUP_REQUEST, Next: STATE_CALL_INITIATED 6d20h: U1_CallProceeding: Serial0 6d20h: L3SDL: Ref: 1, Init: STATE_CALL_INITIATED, Rcvd: MSG_CALL_PROCEEDING, Next: STATE_CALL_PROCEEDING 6d20h: U3_Connect: Serial0 6d20h: L3SDL: Ref: 1, Init: STATE_CALL_PROCEEDING, Rcvd: MSG_CONNECT, Next: STATE_ACTIVE 6d20h:
The following messages are samples of output generated during a call setup on the called party side. Note the state transitions as the call goes to the active state:
STATE_NULL -> STATE_CALL_PRESENT-> STATE_INCOMING_CALL_PROCEEDING->STATE_ACTIVE 1w4d: U0_Setup: Serial2/3 1w4d: L3SDL: Ref: 32769, Init: STATE_NULL, Rcvd: MSG_SETUP, Next: STATE_CALL_PRESENT 1w4d: L3SDL: Ref: 32769, Init: STATE_CALL_PRESENT, Rcvd: MSG_SETUP, Next: STATE_INCOMING_CALL_PROC 1w4d: L3SDL: Ref: 32769, Init: STATE_INCOMING_CALL_PROC, Rcvd: MSG_SETUP, Next: STATE_ACTIVE
DB-790
December 2010
Description No call exists. User has requested the network to establish a call. User has received confirmation from the network that the network has received all call information necessary to establish the call. User has received a request to establish a call but has not yet responded. User has sent acknowledgment that all call information necessary to establish the call has been received (for an incoming call). On the called side, the network has indicated that the calling user has been awarded the call. On the calling side, the remote user has answered the call.
Active
User has requested that the network clear the end-to-end call and is waiting for a response. User has received an invitation to disconnect the call because the network has disconnected the call. User has requested that the network release the call and is waiting for a response.
Related Commands
Description Displays debugging information about the packets that are received on a Frame Relay interface. Displays NLI information.
DB-791
Syntax Description
events packet
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following examples show typical output from the debug frame-relay end-to-end keepalive packet command. The following example shows output for an outgoing request packet:
EEK (o, Serial0.1 DLCI 200): 1 1 1 3 2 4 3
The seven number fields that follow the colon signify the following: Field first (example value = 1) second (example value = 1) third (example value = 1) fourth (example value = 3) fifth (example value = 2) sixth (example value = 4) seventh (example value = 3) Description Information Element (IE) type. IE length. Report ID. 1 = request, 2 = reply. Next IE type. 3 = LIV ID (Keepalive ID). IE length. (This IE is a Keepalive IE.) Send sequence number. Receive sequence number.
DB-792
December 2010
The seven number fields that follow the colon signify the following: Field first (example value = 1) second (example value = 1) third (example value = 2) fourth (example value = 3) fifth (example value = 2) sixth (example value = 4) seventh (example value = 4) Description Information Element (IE) type. IE length. Report ID. 1 = request, 2 = reply. Next IE type. 3 = LIV ID (Keepalive ID). IE length. (This IE is a Keepalive IE.) Send sequence number. Receive sequence number.
The following example shows typical output from the debug frame-relay end-to-end keepalive events command:
EEK SUCCESS (request, Serial0.2 DLCI 400) EEK SUCCESS (reply, Serial0.1 DLCI 200) EEK sender timeout (Serial0.1 DLCI 200)
DB-793
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(23)S for the Frame Relay over MPLS feature. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is useful for identifying the cause of end-to-end connection problems during the installation of a Frame Relay network or node.
Note
Because the debug frame-relay events command does not generate much output, you can use it at any time, even during periods of heavy traffic, without adversely affecting other users on the system.
Examples
The following is sample output from the debug frame-relay events command:
Router# debug frame-relay events Serial2(i): Serial2(i): Serial2(i): Serial2(i): Serial2(i): Serial2(i): reply reply reply reply reply reply rcvd rcvd rcvd rcvd rcvd rcvd 172.16.170.26 172.16.170.28 172.16.170.34 172.16.170.38 172.16.170.41 172.16.170.65 126 128 134 144 228 325
DB-794
December 2010
As the output shows, the debug frame-relay events command returns one specific message type. The first line, for example, indicates that IP address 172.16.170.26 sent a Frame Relay ARP reply; this packet was received as input on serial interface 2. The last field (126) is the data-link connection identifier (DLCI) to use when communicating with the responding router. For Frame Relay over MPLS, the following is sample output for the debug frame-relay events command. The command output shows the status of the VCs.
Router# debug frame-relay events Frame Relay events debugging is on
This example shows the messages that are displayed when you shut the core-facing interface on a provider edge (PE) router:
04:40:38:%SYS-5-CONFIG_I: Configured from console by consolenf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface hssi2/0 Router(config-if)# shut 04:40:43:%OSPF-5-ADJCHG: Process 10, Nbr 12.12.12.12 on Hssi2/0 from FULL to DOWN, Neighbor Down: Interface down or detached 04:40:43: FRoMPLS [12.12.12.12, 100]: PW pvc_status set INACTIVE 04:40:43: FRoMPLS [12.12.12.12, 100]: Setting pw segment DOWN 04:40:43: FRoMPLS [12.12.12.12, 100]: Setting connection DOWN 04:40:43: FRoMPLS [12.12.12.12, 101]: PW pvc_status set INACTIVE 04:40:43: FRoMPLS [12.12.12.12, 101]: Setting pw segment DOWN 04:40:43: FRoMPLS [12.12.12.12, 101]: Setting connection DOWN 04:40:45:%LINK-5-CHANGED: Interface Hssi2/0, changed state to administratively down 04:40:46:%LINEPROTO-5-UPDOWN: Line protocol on Interface Hssi2/0, changed state to down
This example shows the messages that are displayed when you enable the core-facing interface on a PE router:
Router(config-if)# no shut 04:40:56:%LINK-3-UPDOWN: Interface Hssi2/0, changed state to up 04:40:57:%LINEPROTO-5-UPDOWN: Line protocol on Interface Hssi2/0, changed state to up 04:41:06:%OSPF-5-ADJCHG: Process 10, Nbr 12.12.12.12 on Hssi2/0 from LOADING to FULL, Loading Done 04:41:19: FRoMPLS [12.12.12.12, 100]: PW pvc_status set ACTIVE 04:41:19: FRoMPLS [12.12.12.12, 100]: Setting pw segment UP 04:41:19: FRoMPLS [12.12.12.12, 101]: PW pvc_status set ACTIVE 04:41:19: FRoMPLS [12.12.12.12, 101]: Setting pw segment UP
This example shows the messages that are displayed when you shut the edge-facing interface on a PE router:
Router(config)# interface pos4/0 Router(config-if)# shut 04:42:50: FRoMPLS [12.12.12.12, 100]: acmgr_circuit_down 04:42:50: FRoMPLS [12.12.12.12, 100]: Setting connection DOWN 04:42:50: FRoMPLS [12.12.12.12, 100]: PW pvc_status set INACTIVE 04:42:52:%LINK-5-CHANGED: Interface POS4/0, changed state to administratively down 04:42:53:%LINEPROTO-5-UPDOWN: Line protocol on Interface POS4/0, changed state to down
This example shows the messages that are displayed when you enable the edge-facing interface on a PE router:
Router(config)# interface pos4/0 Router(config-if)# no shut 04:43:20:%LINK-3-UPDOWN: Interface POS4/0, changed state to up
DB-795
c72-33-2(config-if)# 04:43:20: FRoMPLS [12.12.12.12, 04:43:20: FRoMPLS [12.12.12.12, 04:43:20: FRoMPLS [12.12.12.12, 04:43:20: FRoMPLS [12.12.12.12,
Local up, sending acmgr_circuit_up PW nni_pvc_status set ACTIVE PW pvc_status set ACTIVE Setting pw segment UP
DB-796
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output that shows the display message returned in response to the debug frame-relay foresight command:
Router# debug frame-relay foresight FR rate control for DLCI 17 due to ForeSight msg
This message indicates the router learned from the ForeSight message that data-link connection identifier (DLCI) 17 is now experiencing congestion. The output rate for this circuit should be slowed down, and in the router this DLCI is configured to adapt traffic shaping in response to foresight messages.
Related Commands
DB-797
Syntax Description
(Optional) Displays event or error messages related to Frame Relay fragmentation. (Optional) Displays fragments received or sent on the specified interface. (Optional) The interface type for which you wish to display fragments received or sent. (Optional) The Interface number. (Optional) The data-link connection identifier (DLCI) value of the PVC for which you wish to display fragments received or sent.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command will display event or error messages related to Frame Relay fragmentation; it is only enabled at the PVC level on the selected interface. This command is not supported on the Cisco MC3810 networking device for fragments received by a PVC configured via the voice-encap command.
Examples
The following is sample output from the debug frame-relay fragment command:
Router# debug frame-relay fragment interface serial 0/0 109 This may severely impact network performance. You are advised to enable 'no logging console debug'. Continue?[confirm] Frame Relay fragment/packet debugging is on Displaying fragments/packets on interface Serial0/0 dlci 109 only
Serial0/0(i): dlci 109, rx-seq-num 126, exp_seq-num 126, BE bits set, frag_hdr 04 C0 7E
DB-798
December 2010
The following is sample output from the debug frame-relay fragment event command:
Router# debug frame-relay fragment event This may severely impact network performance. You are advised to enable 'no logging console debug'. Continue?[confirm] Frame Relay fragment event/errors debugging is on Frame-relay reassembled packet is greater than MTU size, packet dropped on serial 0/0 dlci 109 Unexpected B bit frame rx on serial0/0 dlci 109, dropping pending segments
Related Commands
Command debug ccfrf11 session debug ccsip all debug ccsw voice vofr-session debug voice vofr debug vpm error debug vtsp port debug vtsp vofr subframe
Description Displays the ccfrf11 function calls during call setup and teardown. Displays the ccswvoice function calls during call setup and teardown. Displays the ccswvoice function calls during call setup and teardown. Displays Cisco trunk and FRF.11 trunk call setup attempts; shows which dial peer is used in the call setup. Displays the behavior of the Holst state machine. Displays the behavior of the VTSP state machine. Displays the first 10 bytes (including header) of selected VoFR subframes for the interface.
DB-799
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug frame-relay hqf command to track which quality of service (QoS) features are being used on an interface. QoS for a given FR interface changes depending on the commands being used.
Note
You cannot configure weighted fair queueing (WFQ) with HQF; they are mutually exclusive.
Install an interface level service policy without legacy queueing or payload compression. Attach a Modular Quality of Service (QoS) Command-Line Interface (CLI) (MQC) service policy to a permanent virtual circuit (PVC) with no legacy restrictions. This task is accomplished by adding a service policy to a frame map class. A valid MQC service policy shapes all traffic via the class default and has a child policy to support any further traffic classification, as shown in the following example:
policy-map llq class voice priority 32 policy-map shape1 class class-default shape average 96000 service-policy llq policy-map shape2 class class-default shape average 128000 service-policy llq map-class frame-relay mqc-class1
DB-800
December 2010
service-policy output shape1 map-class frame-relay mqc-class2 service-policy output shape2 interface serial4/0 encapsulation frame-relay frame-relay class mqc-class1 <----- Map-class installed frame-relay interface-dlci 16 <----- Inherits map-class1 frame-relay interface-dlci 17 class mqc-class2 <----- Map-class installed for DLCI 17
Examples
The following is sample output from the debug frame-relay hqf command:
Router# debug frame-relay hqf debug frame-relay hqf is enabled
Router# show running-configuration . . . 00:25:54: %SYS-5-CONFIG_I: Configured from console by console serial4/1 Building configuration... Current configuration : 167 bytes ! interface Serial4/1 serial restart-delay 0 service-policy output shape end
The following commands and subsequent output show events that occur when HQF is enabled or disabled as a result of queueing changes at the interface level while debugging is on:
Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface serial4/1 Router(config-if)# policy-map shape Router(config-pmap)# class class-default Router(config-pmap-c)# shape average 128000 1000 Router(config-pmap-c)# interface serial4/1 Router(config-if)# encapsulation frame-relay Router(config-if)# frame-relay fragment 80 end-to-end Router(config-if)# service-policy output shape Router(config-if)# frame-relay map ip 10.0.0.1 16 payload frf9 stac 00:26:52: Serial4/1- Setting up interface for legacy QOS. <---Indicates legacy QoS is being installed on an interface. 00:26:52: Legacy fair-queueing installed on interface. being installed and HQF is being removed. You see this and service policies since these policies must be able This usually means that either payload compression has legacy queueing has been set up on the main interface. <---Indicates that legacy QoS is only with interface fragmentation to support both QoS mechanisms. been enabled on an interface or
Router(config-if)# no frame-relay map ip 10.0.0.1 16 payload frf9 stac 00:27:08: Serial4/1- Setting up HQF/MQC QOS. <---Indicates that the last legacy restriction has been removed and HQF is being installed on the interface.
DB-801
00:27:08: Serial4/1- Setting up interface for legacy QOS. <--- Indicates that legacy QoS is being installed on the interface. Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface serial4/1 Router(config-if)# frame-relay map ip 10.0.0.1 16 Router(config-if)# no service-policy output shape Router(config-if)# no frame-relay fragment 80 end-to-end
The following commands and subsequent output show events that occur when HQF is enabled or disabled as a result of queueing changes at the PVC level while debugging is on:
Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface serial4/1 Router(config-if)# map-class frame-relay frts-shape Router(config-map-class)# frame-relay fragment 80 Router(config-map-class)# service-policy output shape Router(config-map-class)# interface serial4/1 Router(config-if)# frame-relay interface-dlci 16 Router(config-fr-dlci)# class frts-shape 00:28:54: Serial4/1- Setting up HQF/MQC QOS. <---Indicates that the last legacy restriction has been removed and that HQF is being installed on the interface. Router(config-fr-dlci)# no class frts-shape 00:29:02: Serial4/1- Setting up interface for legacy QOS. <--- Indicates that legacy QoS has been installed on the interface.
Related Commands
DB-802
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Within the FRF.4/Q.933 signalling specification, messages are divided into subunits called information elements. Each information element defines parameters specific to the call. These parameters can be values configured on the router, or values requested from the network. The debug frame-relay informationelements command shows the signalling message in hexadecimal format. Use this command to determine parameters being requested and granted for a call.
Note
Use the debug frame-relay informationelements command when the debug frame-relay callcontrol command does not explain why calls are not being set up.
Caution
The debug frame-relay informationelements command displays a substantial amount of information in bytes. You must be familiar with FRF.4/Q.933 to decode the information contained within the debug output.
Examples
The following is sample output from the debug frame-relay informationelements command. In this example, each information element has a length associated with it. For those with odd-numbered lengths, only the specified bytes are valid, and the extra byte is invalid. For example, in the message Call Ref, length: 3, 0x0200 0x0100, only 02 00 01 is valid; the last 00 is invalid.
lw0d# debug frame-relay informationelements Router: Outgoing MSG_SETUP Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Dir: Dir: Dir: Dir: Dir: Dir: Type: Prot Disc, length: 1, 0x0800 Type: Call Ref, length: 3, 0x0200 0x0100 Type: Message type, length: 1, 0x0500 Type: Bearer Capability, length: 5, 0x0403 0x88A0 0xCF00 Type: DLCI, length: 4, 0x1902 0x46A0 Type: Link Lyr Core, length: 27, 0x4819 0x090B 0x5C0B 0xDC0A 0x3140 0x31C0 0x0B21 0x4021 0xC00D 0x7518 0x7598 0x0E09 0x307D 0x8000 Dir: U --> N, Type: Calling Party, length: 12, 0x6C0A 0x1380 0x3837 0x3635 U U U U U U --> --> --> --> --> --> N, N, N, N, N, N,
DB-803
0x3433 0x3231 Dir: U --> N, Type: Calling Party Subaddr, length: 4, 0x6D02 0xA000 Dir: U --> N, Type: Called Party, length: 11, 0x7009 0x9331 0x3233 0x3435 0x3637 0x386E Dir: U --> N, Type: Called Party Subaddr, length: 4, 0x7102 0xA000 Dir: U --> N, Type: Low Lyr Comp, length: 5, 0x7C03 0x88A0 0xCE65 Dir: U --> N, Type: User to User, length: 4, 0x7E02 0x0000
Information Element Prot Disc Call Ref Message type Bearer Capability DLCI Link Lyr Core Calling Party Calling Party Subaddr Called Party Called Party Subaddr Low Lyr Comp User to User
Description Protocol discriminator. Call reference. Message type such as setup, connect, and call proceeding. Coding format such as data type, and Layer 2 and Layer 3 protocols. Data-link connection identifier. Link-layer core quality of service (QoS) requirements. Type of source number (X121/E164) and the number. Subaddress that originated the call. Type of destination number (X121/E164) and the number. Subaddress of the called party. Coding format, data type, and Layer 2 and Layer 3 protocols intended for the end user. Information between end users.
Related Commands
Description Displays Frame Relay Layer 3 (network layer) call control information.
DB-804
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was modified to display debugging output for control protocol frames for Frame Relay Forum Implementation Agreement (FRF) .20. This command was modified to display debugging output for Enhanced Compressed Real-Time Transport Protocol (ECRTP). This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.4(11)T 12.2SX
Usage Guidelines
The debug frame-relay ip tcp header-compression command shows the control packets that are passed to initialize IP header compression (IPHC) on a permanent virtual circuit (PVC). For Cisco IPHC, typically two packets are passed: one sent and one received per PVC. (Inverse Address Resolution Protocol (InARP) packets are sent on PVCs that do not have a mapping defined between a destination protocol address and the data-link connection identifier (DLCI) or Frame Relay PVC bundle that connects to the destination address.) For FRF .20 IPHC, typically four packets are passed per PVC. Debug messages are displayed only if the IPHC control protocol is renegotiated (for an interface or PVC state change or for a configuration change).
DB-805
Examples
The following is sample output from the debug frame-relay ip tcp header-compression command when Cisco IPHC (not FRF .20 IPHC) is configured in the IPHC profile:
Router# debug frame-relay ip tcp header-compression *Nov 14 09:22:07.991: InARP REQ: Tx compr_flags 43 *Nov 14 09:22:08.103: InARP RSP: Rx compr_flags: 43
The following is sample output from the debug frame-relay ip tcp header-compression command when FRF .20 IPHC (without either Real-time Transport Protocol (RTP) or ECRTP) is configured in the IPHC profile:
Router# debug frame-relay ip tcp header-compression FRF20(DLCI 16): Rxed Request, state 0 : ident 0, tot len 19, conf_opts FE, len 15 negotiation codes 1, version 1 Par: IPV4, len 12, TCP_SPACE 16, NON_TCP_SPACE 0, F_MAX_PERIOD 256, F_MAX_TIME 5, MAX_HEADER 168 : ident 0, tot len 19, conf_opts FE, len 15 negotiation codes 1, version 1 Par: IPV4, len 12, TCP_SPACE 16, NON_TCP_SPACE 0, F_MAX_PERIOD 256, F_MAX_TIME 5, MAX_HEADER 168 0 : ident 3, tot len 19, conf_opts FE, len 15 negotiation codes 0, version 1 Par: IPV4, len 12, TCP_SPACE 16, NON_TCP_SPACE 0, F_MAX_PERIOD 256, F_MAX_TIME 5, MAX_HEADER 168 : ident 3, tot len 19, conf_opts FE, len 15 negotiation codes 0, version 1 Par: IPV4, len 12, TCP_SPACE 16, NON_TCP_SPACE 0, F_MAX_PERIOD 256, F_MAX_TIME 5, MAX_HEADER 168 FRF20(DLCI 16): STARTING IPHC
*Nov 14 09:18:37.019:
The following is sample output from the debug frame-relay ip tcp header-compression command when FRF .20 IPHC and RTP are configured in the IPHC profile:
Router# debug frame-relay ip tcp header-compression FRF20(DLCI 16): Txed Request, state 1 : ident 0, tot len 21, conf_opts FE, len 17 negotiation codes 1, version 1 Par: IPV4, len 14, TCP_SPACE 16, NON_TCP_SPACE 16, F_MAX_PERIOD 256, F_MAX_TIME 5, MAX_HEADER 168 01:33:06: Subopt: rtp enabled
The following is sample output from the debug frame-relay ip tcp header-compression command when FRF .20 IPHC and ECRTP are configured in the IPHC profile:
Router# debug frame-relay ip tcp header-compression FRF20(DLCI 16): Txed Request, state 1 : ident 0, tot len 21, conf_opts FE, len 17 negotiation codes 1, version 1 Par: IPV4, len 14, TCP_SPACE 16, NON_TCP_SPACE 16, F_MAX_PERIOD 256, F_MAX_TIME 5, MAX_HEADER 168 01:33:06: Subopt: ecrtp enabled
DB-806
December 2010
Description Indicates that an InARP request was sent or received. Following are the possible values:
InARP REQ TxAn InARP request was sent. InARP REQ RxAn InARP request was received.
InARP RSP: Rx
Indicates that an InARP response was sent or received. Following are the possible values:
InARP REQ TxAn InARP response was sent. InARP REQ RxAn InARP response was received.
compr_flags: 43
Compression flags that Frame Relay peers use to negotiate Cisco IPHC options. It consists of a bit mask, and the number is displayed in hexadecimal format. Following are the bits:
0x0001TCP IPHC 0x0002RTP IPHC 0x0004Passive TCP compression 0x0008Passive RTP compression 0x0040Frame Relay IPHC options
Indicates that the DLCI for this packet is configured with FRF .20 IPHC. Direction of the IPHC control protocol message. Following are the possible values:
Txed (transmitted) or Rxed (received) indicates the message direction, and Request or Ack (acknowledgement) indicates the message type. A peer sends a request indicating its configuration, and the other peer replies with an acknowledgement indicating its configuration. The lowest configuration value of this two-frame exchange sets the parameters in one direction. This means that typically four frames are exchanged in total: two Request/Ack pairs, with each pair negotiating the parameters in one direction.
DB-807
Table 102
Field state 1
Description State of the FRF .20 IPHC protocol request. Following are the possible values: 0FRF20_DISABLED. FRF .20 is disabled (because of an inactive PVC, an interface that is down, or a configuration mismatch). 1FRF20_REQ_SENT. An FRF .20 control protocol request has been sent. 2FRF20_REQ_RXED. An FRF .20 control protocol request has been received. 3FRF20_WAIT_REQ. An FRF .20 control protocol request has been sent and acknowledged, and the local end is waiting for a request from the peer. 4FRF20_OPERATIONAL. The FRF .20 control protocol is successfully negotiated, and frames can be compressed.
ident 0
Identifier. This is the transaction number used to correlate an FRF .20 control protocol request with an acknowledgement. This number is the same in messages that correspond to each other. Sum (in bytes) of the lengths of the following:
tot len 21
All parameters Negotiation codes Identifier Suboptions for each parameter set (IPV4 or IPV6)
Type of PPP parameter (expressed in hexadecimal). For FRF .20, the only possible value is FE (254 in decimal). Total length of all parameters (in bytes). Negotiation state with the peer. Following are the possible values:
0Reply with response only. 1Reply with response and initiate request.
With a response only, sending a response frame completes the negotiation. With a response and initiate request, the local peer also must send a request. version 1 Par IPV4 len 14 Version of the FRF .20 control protocol. List of parameters and values. Datagram type. The value is always IPV4, because Cisco IPHC does not support IPv6. Total length (in bytes) of all parameters starting with IP type and ending with associated suboptions (if any). The value is greater than or equal to 12 depending on the suboptions. Maximum value of a TCP context identifier (CID) in the space of context identifiers allocated for TCP. Range: 3255. Default value: 16. A value of zero means that TCP headers are not being compressed.
TCP_SPACE 16
DB-808
December 2010
Table 102
Field
Description
NON_TCP_SPACE 16 Maximum value of a context identifier (CID) in the space of context identifiers allocated for non-TCP. Range: 31000. Cisco routers do not support the maximum value (65535) of the FRF .20 specification. Default value: 16. A value of zero means that non-TCP headers are not being compressed. These context identifiers are carried in COMPRESSED_NON_TCP, COMPRESSED_UDP and COMPRESSED_RTP packet headers. F_MAX_PERIOD 256 Largest number of compressed non-TCP headers that can be sent without sending a full header. Range: 165535. Default value: 256. A value of zero indicates infinity, which means that the number of consecutive COMPRESSED_NON_TCP headers is unlimited. F_MAX_TIME 5 Maximum time interval (in seconds) between full (uncompressed) headers. Range: 1255. Default value: 5. A value of zero indicates infinity (meaning that no full headers will be transmitted). Largest header size (in bytes) that can be compressed. Range: 60168. Cisco routers do not support the full range of values (6065535) of the FRF .20 specification. Default value: 168. Timestamp of the debug command output. Compression suboptions that are enabled. The value is either rtp or ecrtp.
MAX_HEADER 168
01:33:06 Subopt
DB-809
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug frame-relay lapf command to troubleshoot the data-link control portion of Layer 2 that runs over data-link connection identifier (DLCI) 0. Use this command only if you have a problem bringing up Layer 2. You can use the show interface serial command to determine the status of Layer 2. If it shows a Link Access Procedure, Frame Relay (LAPF) state of down, Layer 2 has a problem.
Examples
The following is sample output from the debug frame-relay lapf command. In this example, a line being brought up indicates an exchange of set asynchronous balanced mode extended (SABME) and unnumbered acknowledgment (UA) commands. A SABME is initiated by both sides, and a UA is the response. Until the SABME gets a UA response, the line is not declared to be up. The p/f value indicates the poll/final bit setting. TX means send, and RX means receive.
Router# debug frame-relay lapf Router: Router: Router: Router: Router: Router: Router: Router: *LAPF *LAPF *LAPF *LAPF *LAPF *LAPF *LAPF *LAPF Serial0 Serial0 Serial0 Serial0 Serial0 Serial0 Serial0 Serial0 TX -> SABME Cmd p/f=1 Enter state 5 RX <- UA Rsp p/f=1 lapf_ua_5 Link up! RX <- SABME Cmd p/f=1 lapf_sabme_78 TX -> UA Rsp p/f=1
In the following example, a line in an up LAPF state should see a steady exchange of RR (receiver ready) messages. TX means send, RX means receive, and N(R) indicates the receive sequence number.
Router# debug frame-relay lapf Router: Router: Router: Router: Router: Router: Router: Router: *LAPF *LAPF *LAPF *LAPF *LAPF *LAPF *LAPF *LAPF Serial0 Serial0 Serial0 Serial0 Serial0 Serial0 Serial0 Serial0 T203 expired, state lapf_rr_7 TX -> RR Rsp p/f=1, RX <- RR Cmd p/f=1, lapf_rr_7 TX -> RR Rsp p/f=1, RX <- RR Cmd p/f=1, lapf_rr_7 = 7 N(R)= 3 N(R)= 3 N(R)= 3 N(R)= 3
DB-810
December 2010
Syntax Description
interface name
Command Modes
Privileged EXEC
Usage Guidelines
You can use this command to determine whether the router and the Frame Relay switch are sending and receiving LMI packets properly.
Note
Because the debug frame-relay lmi command does not generate much output, you can use it at any time, even during periods of heavy traffic, without adversely affecting other users on the system.
Examples
The following is sample output from the debug frame-relay lmi command:
router# debug frame-relay lmi
LMI exchange
The first four lines describe an LMI exchange. The first line describes the LMI request the router has sent to the switch. The second line describes the LMI reply the router has received from the switch. The third and fourth lines describe the response to this request from the switch. This LMI exchange is followed by two similar LMI exchanges. The last six lines consist of a full LMI status message that includes a description of the two permanent virtual circuits (PVCs) of the router.
DB-811
S2546
Serial1(out): StEnq, clock 20212760, myseq 206, mineseen 205, yourseen 136, DTE up Serial1(in): Status, clock 20212764, myseq 206 RT IE 1, length 1, type 1 KA IE 3, length 2, yourseq 138, myseq 206 Serial1(out): StEnq, clock 20222760, myseq 207, mineseen 206, yourseen 138, DTE up Serial1(in): Status, clock 20222764, myseq 207 RT IE 1, length 1, type 1 KA IE 3, length 2, yourseq 140, myseq 207 Serial1(out): clock 20232760, myseq 208, mineseen 207, yourseen 140, line up RT IE 1, length 1, type 1 KA IE 3, length 2, yourseq 142, myseq 208 Serial1(out): StEnq, clock 20252760, myseq 210, mineseen 209, yourseen 144, DTE up Serial1(in): Status, clock 20252764, RT IE 1, length 1, type 0 KA IE 3, length 2, yourseq 146, myseq 210 PVC IE 0x7, length 0x6, dlci 400, status 0, bw 56000 PVC IE 0x7, length 0x6, dlci 401, status 0, bw 56000
Table 103 describes the significant fields shown in the first line of the display.
Table 103 debug frame-relay lmi Field Descriptions
Description Indicates that the LMI request was sent out on serial interface 1. Command mode of message, as follows:
System clock (in milliseconds). Useful for determining whether an appropriate amount of time has transpired between events. Myseq counter maps to the CURRENT SEQ counter of the router. Yourseen counter maps to the LAST RCVD SEQ counter of the switch. Line protocol up/down state for the DTE (user) port.
Table 104 describes the significant fields shown in the third and fourth lines of the display.
Table 104 debug frame-relay lmi Field Descriptions
Description Value of the report type information element. Length of the report type information element (in bytes). Report type in RT IE. Value of the keepalive information element. Length of the keepalive information element (in bytes). Yourseq counter maps to the CURRENT SEQ counter of the switch. Myseq counter maps to the CURRENT SEQ counter of the router.
Table 105 describes the significant fields shown in the last line of the display.
Table 105 debug frame-relay lmi Field Descriptions
Description Value of the PVC information element type. Length of the PVC IE (in bytes).
DB-812
December 2010
Table 105
Description DLCI decimal value for this PVC. Status value. Possible values include the following:
bw 56000
DB-813
Syntax Description
(Optional) Displays incoming and outgoing bundle link control messages and bundle link status changes. (Optional) Displays information for a specific bundle interface. (Optional) Displays information for a specific bundle link interface.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was introduced on VIP-enabled Cisco 7500 series routers. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(17b)SXA. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Using the debug frame-relay multilink command without the control keyword could severely impact router performance and is not recommended.
Using the debug frame-relay multilink command without the mfr or serial keywords displays error conditions that occur at the bundle layer.
Examples
The following example shows output from the debug frame-relay multilink command for bundle MFR0, which has three bundle links:
Router# debug frame-relay multilink control MFR0 00:42:54:Serial5/3(o):msg=Add_link, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3, BL state=Idle E1 00 01 01 07 4D 46 52 30 00
DB-814
December 2010
00:42:54:Serial5/2(o):msg=Add_link, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2, BL state=Idle E1 00 01 01 07 4D 46 52 30 00 00:42:54:Serial5/1(o):msg=Add_link, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1, BL state=Idle E1 00 01 01 07 4D 46 52 30 00 00:42:54:%LINK-3-UPDOWN:Interface MFR0, changed state to down 00:42:54:Serial5/3(i):msg=Add_link_ack, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3, BL state=Add_sent E1 00 02 01 07 4D 46 52 30 00 00:42:54:Serial5/2(i):msg=Add_link_ack, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2, BL state=Add_sent E1 00 02 01 07 4D 46 52 30 00 00:42:54:Serial5/1(i):msg=Add_link_ack, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1, BL state=Add_sent E1 00 02 01 07 4D 46 52 30 00 00:42:54:%SYS-5-CONFIG_I:Configured from console by console 00:43:00:Serial5/1(i):msg=Add_link, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1, BL state=Ack_rx E1 00 01 01 07 4D 46 52 30 00 00:43:00:Serial5/1(o):msg=Add_link_ack, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1, BL state=Ack_rx E1 00 02 01 07 4D 46 52 30 00 00:43:00:%LINK-3-UPDOWN:Interface MFR0, changed state to up 00:43:00:Serial5/1(i):msg=Hello, Link=Serial5/1, Bundle=MFR0, Linkid=Serial5/1, BL state=Up E1 00 04 03 06 30 A7 E0 54 00 00:43:00:Serial5/1(o):msg=Hello_ack, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1, BL state=Up E1 00 05 03 06 90 E7 0F C2 06 00:43:01:Serial5/2(i):msg=Add_link, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2, BL state=Ack_rx E1 00 01 01 07 4D 46 52 30 00 00:43:01:Serial5/2(o):msg=Add_link_ack, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2, BL state=Ack_rx E1 00 02 01 07 4D 46 52 30 00 00:43:01:Serial5/2(i):msg=Hello, Link=Serial5/2, Bundle=MFR0, Linkid=Serial5/2, BL state=Up E1 00 04 03 06 30 A7 E0 54 00 00:43:01:Serial5/2(o):msg=Hello_ack, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2, BL state=Up E1 00 05 03 06 90 E7 0F C2 06 00:43:01:%LINEPROTO-5-UPDOWN:Line protocol on Interface Serial5/1, changed state to up 00:43:01:Serial5/3(i):msg=Add_link, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3, BL state=Ack_rx E1 00 01 01 07 4D 46 52 30 00 00:43:01:Serial5/3(o):msg=Add_link_ack, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3, BL state=Ack_rx E1 00 02 01 07 4D 46 52 30 00 00:43:01:Serial5/3(i):msg=Hello, Link=Serial5/3, Bundle=MFR0, Linkid=Serial5/3, BL state=Up E1 00 04 03 06 30 A7 E0 54 00 00:43:01:Serial5/3(o):msg=Hello_ack, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3, BL state=Up E1 00 05 03 06 90 E7 0F C2 06 00:43:02:%LINEPROTO-5-UPDOWN:Line protocol on Interface Serial5/2 , changed state to up 00:43:02:%LINEPROTO-5-UPDOWN:Line protocol on Interface Serial5/3 , changed state to up
DB-815
Description Type of bundle link control message that was sent or received. Interface number of the bundle link. Bundle with which the link is associated. Bundle link identification name. Operational state of the bundle link.
Related Commands
Description Displays configuration information and statistics about multilink Frame Relay bundles and bundle links.
DB-816
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The Frame Relay switched virtual circuit (SVC) signaling subsystem is decoupled from the rest of the router code by means of the NLI intermediate software layer. The debug frame-relay networklayerinterface command shows activity within the network-layer interface when a call is set up or torn down. All output that contains an NL relates to the interaction between the Q.933 signaling subsystem and the NLI.
Note
The debug frame-relay networklayerinterface command has no significance to anyone not familiar with the inner workings of the Cisco IOS software. This command is typically used by service personnel to debug problem situations.
Examples
The following is sample output from the debug frame-relay networklayerinterface command. This example displays the output generated when a call is set up. The second example shows the output generated when a call is torn down.
Router# debug frame-relay networklayerinterface Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: NLI STATE: L3_CALL_REQ, Call ID 1 state 0 NLI: Walking the event table 1 NLI: Walking the event table 2 NLI: Walking the event table 3 NLI: Walking the event table 4 NLI: Walking the event table 5 NLI: Walking the event table 6 NLI: Walking the event table 7 NLI: Walking the event table 8 NLI: Walking the event table 9 NLI: NL0_L3CallReq NLI: State: STATE_NL_NULL, Event: L3_CALL_REQ, Next: STATE_L3_CALL_REQ NLI: Enqueued outgoing packet on holdq NLI: Map-list search: Found maplist bermuda daddr.subaddr 0, saddr.subaddr 0, saddr.subaddr 0 saddr.subaddr 0, daddr.subaddr 0, daddr.subaddr 0 nli_parameter_negotiation NLI STATE: NL_CALL_CNF, Call ID 1 state 10 NLI: Walking the event table 1
DB-817
NLI: Walking the event table 2 NLI: Walking the event table 3 NLI: NLx_CallCnf NLI: State: STATE_L3_CALL_REQ, Event: NL_CALL_CNF, Next: STATE_NL_CALL_CNF Checking maplist junk working with maplist bermuda Checking maplist bermuda working with maplist bermuda NLI: Emptying holdQ, link 7, dlci 100, size 104
Router# debug frame-relay networklayerinterface Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: Router: NLI: L3 Call Release Req for Call ID 1 NLI STATE: L3_CALL_REL_REQ, Call ID 1 state 3 NLI: Walking the event table 1 NLI: Walking the event table 2 NLI: Walking the event table 3 NLI: Walking the event table 4 NLI: Walking the event table 5 NLI: Walking the event table 6 NLI: Walking the event table 7 NLI: Walking the event table 8 NLI: Walking the event table 9 NLI: Walking the event table 10 NLI: NLx_L3CallRej NLI: State: STATE_NL_CALL_CNF, Event: L3_CALL_REL_REQ, Next: STATE_L3_CALL_REL_REQ NLI: junk: State: STATE_NL_NULL, Event: L3_CALL_REL_REQ, Next: STATE_NL_NULL NLI: Map-list search: Found maplist junk daddr.subaddr 0, saddr.subaddr 0, saddr.subaddr 0 saddr.subaddr 0, daddr.subaddr 0, daddr.subaddr 0 nli_parameter_negotiation NLI STATE: NL_REL_CNF, Call ID 1 state 0 NLI: Walking the event table 1 NLI: Walking the event table 2 NLI: Walking the event table 3 NLI: Walking the event table 4 NLI: Walking the event table 5 NLI: Walking the event table 6 NLI: Walking the event table 7 NLI: NLx_RelCnf NLI: State: STATE_NL_NULL, Event: NL_REL_CNF, Next: STATE_NL_NULL
Table 107 describes the significant states and events shown in the display.
Table 107 NLI State and Event Descriptions
Description Internal call setup request. Network layer indicates that an SVC is required. Call in initial stateno call exists. Setup message sent out and waiting for a reply. This is the state the network-layer state machine changes to when a call request is received from Layer 3 but no confirmation has been received from the network. Message sent from the Q.933 signalling subsystem to the NLI asking that internal resources be allocated for the call.
NL_CALL_CNF
DB-818
December 2010
Table 107
Description Q.933 state indicating that the call is active. After the network confirms a call request using a connect message, the Q.933 state machine changes to this state. Internal software state indicating that software resources are assigned and the call is up. After Q.933 changes to the STATE_L3_CALL_CNF state, it sends an NL_CALL_CNF message to the network-layer state machine, which then changes to the STATE_NL_CALL_CNF state. Internal request to release the call. Internal software state indicating the call is in the process of being released. At this point, the Q.933 subsystem is told that the call is being released and a disconnect message goes out for the Q.933 subsystem. Indication from the Q.933 signalling subsystem that the signalling subsystem is releasing the call. After receiving a release complete message from the network indicating that the release process is complete, the Q.933 subsystem sends an NL_REL_CNF event to the network-layer subsystem.
STATE_NL_CALL_CNF
L3_CALL_REL_REQ STATE_L3_CALL_REL_REQ
NL_REL_CNF
Related Commands
Description Displays Frame Relay Layer 3 (network layer) call control information.
DB-819
Syntax Description
(Optional) Name of interface or subinterface. (Optional) Data-link connection indentifier (DLCI) decimal value.
Command Modes
Privileged EXEC
Usage Guidelines
This command helps you analyze the packets that are sent on a Frame Relay interface. Because the debug frame-relay packet command generates a substantial amount of output, only use it when traffic on the Frame Relay network is fewer than 25 packets per second. Use the options to limit the debugging output to a specific DLCI or interface. To analyze the packets received on a Frame Relay interface, use the debug frame-relay command.
Examples
The following is sample output from the debug frame-relay packet command:
router# debug frame-relay packets Serial0: broadcast = 1, link 809B, addr 65535.255 Serial0(o):DLCI 500 type 809B size 24 Serial0: broadcast - 0, link 809B, addr 10.2 Serial0(o):DLCI 100 type 809B size 104 Serial0: broadcast search Serial0(o):DLCI 300 type 809B size 24 Serial0(o):DLCI 400 type 809B size 24
The debug frame-relay packet output consists of groups of output lines; each group describes a Frame Relay packet that has been sent. The number of lines in the group can vary, depending on the number of DLCIs on which the packet was sent. For example, the first two pairs of output lines describe two different packets, both of which were sent out on a single DLCI. The last three lines describe a single Frame Relay packet that was sent out on two DLCIs.
DB-820
S2547
December 2010
Description Interface that has sent the Frame Relay packet. Destination of the packet. Possible values include the following:
broadcast = 1Broadcast address broadcast = 0Particular destination broadcast searchSearches all Frame Relay map entries for this particular protocol that include the broadcast keyword.
link 809B addr 65535.255 Serial0(o): DLCI 500 type 809B size 24
Link type, as documented in the debug frame-relay command. Destination protocol address for this packet. In this case, it is an AppleTalk address. (o) indicates that this is an output event. Decimal value of the DLCI. Packet type, as documented under the debug frame-relay command. Size of this packet (in bytes).
The following lines describe a Frame Relay packet sent to a particular address; in this case AppleTalk address 10.2:
Serial0: broadcast - 0, link 809B, addr 10.2 Serial0(o):DLCI 100 type 809B size 104
The following lines describe a Frame Relay packet that went out on two different DLCIs, because two Frame Relay map entries were found:
Serial0: broadcast search Serial0(o):DLCI 300 type 809B size 24 Serial0(o):DLCI 400 type 809B size 24
The following lines do not appear. They describe a Frame Relay packet sent to a true broadcast address.
Serial1: broadcast search Serial1(o):DLCI 400 type 800 size 288
DB-821
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command displays error messages for link states and Local Management Interface (LMI) status changes for PPP over Frame Relay sessions. To debug process-switched packets, use the debug frame-relay packet or debug ppp packet commands. To analyze the packets that have been sent on a Frame Relay interface, use the debug frame-relay packet command. The debug frame-relay ppp command is generated from process-level switching only and is not CPU intensive.
Examples
The following shows output from the debug frame-relay ppp command where the encapsulation failed for VC 100.
Router# debug frame-relay ppp FR-PPP: encaps failed for FR VC 100 on Serial0 down FR-PPP: input- Serial0 vc or va down, pak dropped
The following shows the output from the debug frame relay ppp and debug frame-relay packet commands. This example shows a virtual interface (virtual interface 1) establishing a PPP connection over PPP.
Router# debug frame-relay ppp Router# debug frame-relay packet Vi1 LCP: O CONFREQ [Closed] id 1 len 10 Vi1 LCP: MagicNumber 0xE0638565 (0x0506E0638565) Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 16 Vi1 PPP: I pkt type 0xC021, datagramsize 14 Vi1 LCP: I CONFACK [REQsent] id 1 len 10 Vi1 LCP: MagicNumber 0xE0638565 (0x0506E0638565) Vi1 PPP: I pkt type 0xC021, datagramsize 14 Vi1 LCP: I CONFREQ [ACKrcvd] id 6 len 10 Vi1 LCP: MagicNumber 0x000EAD99 (0x0506000EAD99) Vi1 LCP: O CONFACK [ACKrcvd] id 6 len 10 Vi1 LCP: MagicNumber 0x000EAD99 (0x0506000EAD99) Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 16 Vi1 IPCP: O CONFREQ [Closed] id 1 len 10 Vi1 IPCP: Address 170.100.9.10 (0x0306AA64090A)
DB-822
December 2010
Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize Vi1 PPP: I pkt type 0x8021, datagramsize 14 Vi1 IPCP: I CONFREQ [REQsent] id 1 len 10 Vi1 IPCP: Address 170.100.9.20 (0x0306AA640914) Vi1 IPCP: O CONFACK [REQsent] id 1 len 10 Vi1 IPCP: Address 170.100.9.20 (0x0306AA640914) Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize Vi1 PPP: I pkt type 0x8021, datagramsize 14 Vi1 IPCP: I CONFACK [ACKsent] id 1 len 10 Vi1 IPCP: Address 170.100.9.10 (0x0306AA64090A) Vi1 PPP: I pkt type 0xC021, datagramsize 16 Vi1 LCP: I ECHOREQ [Open] id 1 len 12 magic 0x000EAD99 Vi1 LCP: O ECHOREP [Open] id 1 len 12 magic 0xE0638565 Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize Vi1 LCP: O ECHOREQ [Open] id 1 len 12 magic 0xE0638565 Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize Vi1 LCP: echo_cnt 4, sent id 1, line up
16
16
18 18
The following shows the output for the debug frame-relay ppp and debug frame-relay packet commands that report a failed PPP over Frame Relay session. The problem is due to a challenge handshake authentication protocol (CHAP) failure.
Router# debug frame-relay ppp Router# debug frame-relay packet Vi1 LCP: O CONFREQ [Listen] id 24 len 10 Vi1 LCP: MagicNumber 0xE068EC78 (0x0506E068EC78) Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 16 Vi1 PPP: I pkt type 0xC021, datagramsize 19 Vi1 LCP: I CONFREQ [REQsent] id 18 len 15 Vi1 LCP: AuthProto CHAP (0x0305C22305) Vi1 LCP: MagicNumber 0x0014387E (0x05060014387E) Vi1 LCP: O CONFACK [REQsent] id 18 len 15 Vi1 LCP: AuthProto CHAP (0x0305C22305) Vi1 LCP: MagicNumber 0x0014387E (0x05060014387E) Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 21 Vi1 PPP: I pkt type 0xC021, datagramsize 14 Vi1 LCP: I CONFACK [ACKsent] id 24 len 10 Vi1 LCP: MagicNumber 0xE068EC78 (0x0506E068EC78) Vi1 PPP: I pkt type 0xC223, datagramsize 32 Vi1 CHAP: I CHALLENGE id 12 len 28 from "krishna" Vi1 LCP: O TERMREQ [Open] id 25 len 4 Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 10 Vi1 PPP: I pkt type 0xC021, datagramsize 8 Vi1 LCP: I TERMACK [TERMsent] id 25 len 4 Serial2/1(i): dlci 201(0x3091), pkt type 0x2000, datagramsize 303 %SYS-5-CONFIG_I: Configured from console by console Vi1 LCP: TIMEout: Time 0x199580 State Listen
DB-823
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.4(11)T. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Command-line interface (CLI) provisioning events Pseudowire circuit status updates Failures occurring during the management of these events
Examples
The following example enables the display of Frame Relay pseudowire events. In this example, the interface has been shut down and then enabled.
Router# debug frame-relay pseudowire Router(config)# interface hssi1/0/0 Router(config-if)# shutdown 09:18:33.303: 09:18:33.303: 09:18:33.303: 09:18:35.299: FRoPW [10.15.15.15, 100]: acmgr_circuit_down FRoPW [10.15.15.15, 100]: SW AC update circuit state to down FRoPW [10.15.15.15, 100]: Setting connection DOWN %LINK-5-CHANGED: Interface Hssi1/0/0, changed state to administratively down
DB-824
December 2010
09:18:36.299: %LINEPROTO-5-UPDOWN: Line protocol on Interface Hssi1/0/0, changed state to down Router(config-if)# no shutdown 09:18:41.919: 09:18:41.919: 09:18:41.919: 09:18:41.919: 09:18:41.919: 09:18:42.919: up %LINK-3-UPDOWN: Interface Hssi1/0/0, changed state to up FRoPW [10.15.15.15, 100]: Local up, sending acmgr_circuit_up FRoPW [10.15.15.15, 100]: Setting pw segment UP FRoPW [10.15.15.15, 100]: PW nni_pvc_status set ACTIVE label_oce_get_label_bundle: flags 14 label 28 %LINEPROTO-5-UPDOWN: Line protocol on Interface Hssi1/0/0, changed state to
Description When the event occurred (in hours, minutes, and seconds). 10.15.15.15 is the IP address of the peer provider edge (PE) router. 100 is the DLCI number of the Frame Relay permanent virtual circuit (PVC) used for this pseudowire.
DB-825
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 7500 series and Cisco 10000 series Internet routers. This command was integrated into Cisco IOS Release 12.2(18)S on Cisco 7500 series routers. Support was added for the Cisco 7304 router. The Cisco 7500 series router is not supported in Cisco IOS Release 12.2(20)S. SSO support was added to the Multilink Frame Relay feature on the Cisco 12000 series Internet router. SSO support was added to the Multilink Frame Relay feature on the Cisco 12000 series Internet router. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to debug Frame Relay synchronization problems. The debug frame-relay redundancy command logs synchronization events and errors.
Examples
The following example displays debug messages regarding Frame Relay redundancy on the networking device:
Router# debug frame-relay redundancy
DB-826
December 2010
Related Commands
Command
Description
DB-827
Syntax Description
The name of the Frame Relay interface. The DLCI number of the switched PVC to be debugged. (Optional) Interval in seconds at which debugging messages will be updated.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(5)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug frame-relay switching command can be used only on switched Frame Relay PVCs, not terminated PVCs. Debug statistics are displayed only if they have changed.
Note
Although statistics are displayed at configured intervals, there may be a delay between the occurrence of a debug event (such as a packet drop) and the display of that event. The delay may be as much as the configured interval plus 10 seconds.
DB-828
December 2010
Examples
The following is sample output from the debug frame-relay switching command:
Router# debug frame-relay switching interface s2/1 1000 interval 2 Frame Relay switching debugging is on Display frame switching debug on interface Serial2/1 dlci 1000 1d02h: Serial2/1 dlci 1000: 32 packets switched to Serial2/0 dlci 1002 1d02h: Serial2/1 dlci 1000: 1800 packets output 1d02h: Serial2/1 dlci 1000: 4 packets dropped - outgoing PVC inactive 1d02h: Serial2/1 dlci 1000: Incoming PVC status changed to ACTIVE 1d02h: Serial2/1 dlci 1000: Outgoing PVC status changed to ACTIVE 1d02h: Serial2/1 dlci 1000: Incoming interface hardware module state changed to UP 1d02h: Serial2/1 dlci 1000: Outgoing interface hardware module state changed to UP
DB-829
Syntax Description
detail
Displays detailed information about the members of the bundle specified by vc-bundle-name. Displays detailed information about the members of all PVC bundles if vc-bundle-name is not specified. Displays information pertaining only to the state changes of the PVC bundle and PVC bundle members specified by vc-bundle-name. Displays state-change information for all PVC bundles and bundle members if vc-bundle-name is not specified. (Optional) Specifies a particular PVC bundle.
state-change
vc-bundle-name
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to monitor state changes and Inverse ARP activity for one or all of the PVC bundles and bundle members configured on a router.
Note
Debugging messages that are prefixed with FR_VCB (instead of FR-VCB) indicate serious failures in the Frame Relay PVC bundle performance. Contact the Cisco Technical Assistance Center (TAC) if you see debugging messages with this prefix.
Examples
The following is sample output from the debug frame-relay vc-bundle command that shows Inverse ARP information for the PVC bundle. PVC bundle member 406 is the only PVC in the bundle to handle Inverse ARP packets. The Inverse ARP packets coming in on other bundle member PVCs are dropped.
Router# debug frame-relay vc-bundle 00:23:48:FR-VCB:MP-4-dynamic:inarp received on elected member 406 00:23:48:FR-VCB:MP-4-dynamic:installing dynamic map 00:23:48:FR-VCB:MP-4-dynamic:dropping inarp received on member 407
DB-830
December 2010
In the following example the PVC bundle goes down because the protected group goes down. All information about active transmission on each PVC is removed.
00:58:27:FR-VCB:MP-4-dynamic:member 402 state changed to DOWN 00:58:27:FR-VCB:MP-4-dynamic:protected group is DOWN 00:58:27:FR-VCB:MP-4-dynamic:state changed to DOWN 00:58:27:FR-VCB:MP-4-dynamic:active table reset
The following is sample output from the debug frame-relay vc-bundle detail command. State change and Inverse ARP activity is displayed for all PVC bundles and bundle members on the router.
Router# debug frame-relay adjacency vc-bundle detail 00:33:40: 00:33:40: 00:33:40: 00:33:41: 00:33:48: 00:33:48: 00:33:48: 00:33:48: 00:33:48: 00:33:48: 00:33:48: 00:33:48: 00:33:48: 00:33:48: 00:33:49: 00:33:49: 00:33:49: 00:33:49: 00:33:49: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: FR-VCB: MP-4-dynamic: member 404 state changed to UP MP-4-dynamic: active table update MP-3-static: sending inarp pkt on member 300 MP-3-static: inarp received on elected member 300 MP-3-static: inarp received on elected member 300 MAIN-1-static: dropping inarp received on member 100 MP-4-dynamic: dropping inarp received on member 404 MP-4-dynamic: dropping inarp received on member 405 P2P-5: dropping inarp received on member 507 MP-3-static: dropping inarp received on member 303 MAIN-2-dynamic: dropping inarp received on member 202 MAIN-1-static: dropping inarp received on member 107 MP-3-static: dropping inarp received on member 305 MAIN-1-static: dropping inarp received on member 105 P2P-5: dropping inarp received on member 505 P2P-5: dropping inarp received on member 504 P2P-5: dropping inarp received on member 503 P2P-5: dropping inarp received on member 502 P2P-5: dropping inarp received on member 501
Related Commands
Description Displays information pertaining to an adjacent node that has one or more Frame Relay PVC bundles.
DB-831
Syntax Description
destination interface
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug frame-relay virtual command to display debugging messages for the virtual Frame Relay interface. The debug frame-relay virtual command produces output only when problems occur.
Examples
The following example shows the output if one of the routers has not been configured. This output occurs when the other end is trying to send the receiving box Frame Relay packets.
VFR: Radio1/0 has no VFR for 00:00:C068:6F:AA
Related Commands
Description Links the virtual Frame Relay interface to the specified radio interface and destination MAC address. Defines the virtual interface and then associates the interface with a specific wireless connection. Shows the output of the interface virtual-frame relay command.
DB-832
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
For complete information on the FRAS process, use the debug fras message along with the debug fras error command.
Examples
The following is sample output from the debug fras error command. This example shows that no logical connection exists between the local station and remote station in the current setup.
Router# debug fras error FRAS: No route, lmac 1000.5acc.7fb1 rmac 4fff.0000.0000, lSap=0x4, rSap=0x4 FRAS: Can not find the Setup
Related Commands
Command debug cls message debug fras message debug fras state
Description Displays information about CLS messages. Displays general information about FRAS messages. Displays information about FRAS data-link control state changes.
DB-833
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
If many LLC2 sessions are being activated or deactivated at any time, this command may generate a substantial amount of output to the console.
Examples
The following is sample output from the debug fras-host activation command:
Router# debug fras-host activation FRHOST: 0x04 FRHOST: 0x04 FRHOST: 0x05 FRHOST: 0x04 FRHOST: 0x04 FRHOST: 0x05 Snd Fwd BNN TST C to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x00 SSAP = XID to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = XID to BNN, DA = 400f.dddd.001e SA = 4001.3745.1088 DSAP = 0x04 SSAP =
XID to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = BNN, DA = 400f.dddd.001e SA = 4001.3745.1088 DSAP = 0x04 SSAP =
The first line indicates that the FRAS Host sent a TEST Command to the host. In the second line, the FRAS Host forwards an XID frame from a BNN device to the host. In the third line, the FRAS Host forwards an XID from the host to the BNN device. Table 110 describes the significant fields shown in the display.
Table 110 debug fras-host activation Field Descriptions
Description Destination MAC address of the frame. Source MAC address of the frame. Destination SAP of the frame. Source SAP of the frame.
DB-834
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug fras-host error command when the I-field in a TEST Response frame from a host does not match the I-field of the TEST Command sent by the FRAS Host:
Router# debug fras-host error FRHOST: SRB TST R Protocol Violation - LLC I-field not maintained.
DB-835
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Caution
Use this command with great care. If many LLC2 sessions are active and passing data, this command may generate a substantial amount of output to the console and impact device performance.
Examples
The following is sample output from the debug fras-host packet command:
Router# debug fras-host packet FRHOST: 0x04 FRHOST: 0x04 FRHOST: 0x05 FRHOST: 0x04 FRHOST: 0x04 FRHOST: 0x05 FRHOST: 0x04 FRHOST: 0x05 FRHOST: 0x04 FRHOST: 0x04 Snd Fwd BNN TST C to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x00 SSAP = XID to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = XID to BNN, DA = 400f.dddd.001e SA = 4001.3745.1088 DSAP = 0x04 SSAP =
XID to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = BNN, DA = 400f.dddd.001e SA = 4001.3745.1088 DSAP = 0x04 SSAP =
UA to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = BNN, DA = 400f.dddd.001e SA = 4001.3745.1088 DSAP = 0x04 SSAP =
BNN LLC-2 to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = BNN, DA = 400f.dddd.001e SA = 4001.3745.1088 DSAP = 0x04 SSAP =
The debug fras-host packet output contains all of the output from the debug fras-host activation command and additional information. The first six lines of this sample display are the same as the output from the debug fras-host activation command. The last lines show LLC-2 frames being sent between the Frame Relay Boundary Network Node (BNN) device and the host.
DB-836
December 2010
Description Destination MAC address of the frame. Source MAC address of the frame. Destination service access point (SAP) of the frame. Source SAP of the frame.
DB-837
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Use of this command may result in a substantial amount of output to the screen. Only use this command for problem determination.
Examples
The following is sample output from the debug fras-host snmp command. In this example, the MIB variable k_frasHostConnEntry_get() is providing SNMP information for the FRAS host.
Router# debug fras-host snmp k_frasHostConnEntry_get(): serNum = -1, vRingIfIdx = 31, frIfIdx = 12 Hmac = 4001.3745.1088, frLocSap = 4, Rmac = 400f.dddd.001e, frRemSap = 4
Description Serial number of the SNMP request. Interface index of a virtual Token Ring. Interface index of a Frame Relay serial interface. MAC address associated with the host for this connection. SAP associated with the host for this connection. MAC address associated with the FRAD for this connection. LLC 2 SAP associated with the FRAD for this connection.
DB-838
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
For complete information on the FRAS process, use the debug fras error command along with the debug fras message command.
Examples
The following is sample output from the debug fras message command. This example shows incoming Cisco Link Services (CLS) primitives.
Router# debug fras message FRAS: receive 4C23 FRAS: receive CC09
Related Commands
Command debug cls message debug fras error debug fras state
Description Limits output for some debugging commands based on the interfaces. Displays information about FRAS protocol errors. Displays information about FRAS data-link control state changes.
DB-839
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug fras state command. This example shows the state changing from a request open station is sent state to an exchange XID state. Possible states are the following: reset, request open station is sent, exchange xid, connection request is sent, signal station wait, connection response wait, connection response sent, connection established, disconnect wait, and number of link states.
Router# debug fras state FRAS: TR0 (04/04) oldstate=LS_RQOPNSTNSENT, input=RQ_OPNSTN_CNF FRAS: newstate=LS_EXCHGXID
Related Commands
Command debug cls message debug fras error debug fras message
Description Limits output for some debug commands based on the interfaces. Displays information about FRAS protocol errors. Displays general information about FRAS messages.
DB-840
December 2010
debug ftpserver
To display information about the FTP server process, use the debug ftpserver command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ftpserver no debug ftpserver
Syntax Description
Command Modes
Privileged EXEC
Examples
DB-841
FTPSRV_DEBUG:(REPLY) 150 FTPSRV_DEBUG:Opening BINARY mode data connection for syslogd.1 (607317 FTPSRV_DEBUG:(REPLY) 226 FTPSRV_DEBUG:Transfer complete.
The sample output corresponds to the following FTP client session. In this example, the user connects to the FTP server, views the contents of the top-level directory, and gets a file.
FTPclient% ftp FTProuter Connected to FTProuter.cisco.com. 220 FTProuter IOS-FTP server (version 1.00) ready. Name (FTProuter:me): aa 331 Password required for 'aa'. Password: 230 Logged in. Remote system type is Cisco. ftp> pwd 257 "disk0:/syslogd.dir/" is current directory. ftp> dir 200 PORT command successful. 150 Opening ASCII mode data connection for file list. syslogd.1 syslogd.2 syslogd.3 syslogd.4 syslogd.5 syslogd.6 syslogd.7 syslogd.8 syslogd.9 syslogd.cur 226 Transfer complete. ftp> bin 200 Type set to I. ftp> get syslogd.1 200 PORT command successful. 150 Opening BINARY mode data connection for syslogd.1 (607317 bytes). 226 Transfer complete. 607317 bytes received in 7.7 seconds (77 Kbytes/s) ftp>
The following debug ftpserver command output indicates that no top-level directory is specified. Therefore, the client cannot access any location on the FTP server. Use the ftp-server topdir command to specify the top-level directory.
Mar Mar 3 10:29:14: FTPSRV_DEBUG:(REPLY) 550 3 10:29:14: FTPSRV_DEBUG:Access denied to 'disk0:'
DB-842
December 2010
Syntax Description
events
Displays a message whenever a GUP announcement is sent or received. GUP is the protocol used between individual gatekeepers in a cluster, which keeps all the gatekeepers synchronized with all endpoints registered on the cluster. ASN.1 library. ASN.1 is an International Telecommunication Union (ITU) standard for protocol syntax and message encoding. Entering this keyword causes a packet dump of all GUP announcement messages.
asn1
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(2)T. This command was implemented on the Cisco AS5850 universal gateway. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to enable a packet dump of all GUP announcement messages:
Router# debug gatekeeper gup asn1 00:10:21:ENCODE BUFFER::= 00 0A2A8648 86F70C0A 00000120 001E8001 86A08001 86A00547 656E6576 614E0000 00000142 80004700 65006E00 65007600 61080050 00610072 00690073 00000000 0000 00:10:21: 00:10:21:PDU ::= value GUP_Information ::= protocolIdentifier { 1 2 840 113548 10 0 0 1 } message announcementIndication : announcementInterval 30 endpointCapacity 100000
DB-843
callCapacity 100000 hostName '47656E657661'H percentMemory 39 percentCPU 0 currentCalls 0 currentEndpoints 0 zoneInformation gatekeeperIdentifier {"Geneva"} altGKIdentifier {"Paris"} totalBandwidth 0 interzoneBandwidth 0 remoteBandwidth 0 RAW_BUFFER::= 00 0A2A8648 86F70C0A 00000120 001E800B 858A8001 86A00144 80007400 6F007200 6E006100 64006F00 2D006700 6B120063 00790063 006C006F 006E0065 002D0067 006B0000 00000000 *Mar 3 15:40:31: *Mar 3 15:40:31:Sending GUP ANNOUNCEMENT INDICATION to 172.18.195.140RAW_BUFFER::= 00 0A2A8648 86F70C0A 00000120 001E800A EF8A8001 86A00144 80006300 79006300 6C006F00 6E006500 2D006700 6B120074 006F0072 006E0061 0064006F 002D0067 006B0000 00000000 *Mar 3 15:40:31:PDU DATA = 60EAB248 value GUP_Information ::= protocolIdentifier { 1 2 840 113548 10 0 0 1 } message announcementIndication : { announcementInterval 30 endpointCapacity 716682 callCapacity 100000 zoneInformation gatekeeperIdentifier {"cyclone-gk"} altGKIdentifier {"tornado-gk"} totalBandwidth 0 interzoneBandwidth 0 remoteBandwidth 0 Mar 3 15:40:31:Received GUP ANNOUNCEMENT INDICATION from 172.18.195.140
Related Commands
Command load-balance
DB-844
December 2010
Syntax Description
events
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(2)T. This command was implemented on the Cisco AS5850 universal gateway. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output for the debug gatekeeper load command.
Note
The following output examples are independent of each other and would not ordinarily be seen at the same time.
Router# debug gatekeeper load Router# Router# show debugging gk load-balancing debug level = Events Router# gk_load_overloaded:Overloaded, 5-second CPU utilization too high gk_load_overloaded:Overloaded due to excessive calls/endpoints gk_load_balance_endpt_request:load balance occurred. New load_balance_count=2
DB-845
Related Commands
Command load-balance
DB-846
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to see information about a Gatekeeper server. This command shows any errors that occur in sending messages to the external applications or in parsing messages from the external applications.
Examples
To turn the Gatekeeper server debugging message off, see the following examples:
Router# no debug all Router# no debug gatekeeper servers
Related Commands
Description Displays information about the Gatekeeper servers configured on your network by ID.
DB-847
Syntax Description
Displays extended details about quota server operations on the GGSN. Displays packets sent between the quota server process on the GGSN and the CSG. Optionally, displays output in hexadecimal notation. Displays events related to quota server processing on the GGSN. Displays details about GTP TLV parsing between the quota server and the Content Services Gateway. Displays errors related to quota server processing on the GGSN.
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(9)T.
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with communication between the GGSN quota server process and the CSG.
Examples
The following example enables the display of detailed quota server processing debug outputpre-allocated quota and quota push:
Router#debug ggsn quota-server detail ggsn quota-server details debugging is on Router# Jun 2 02:40:39.391: GGSN-QS:Encoding QUOTA PUSH REQUEST Jun 2 02:40:39.391: GGSN-QS:Adding TLV USER_INDEX Jun 2 02:40:39.391: GGSN-QS: IP Address: 3.3.3.1 User ID: 12345 Jun 2 02:40:39.391: GGSN-QS:Adding TLV SERVICE_ID: 1 Jun 2 02:40:39.391: GGSN-QS:Adding TLV QUADRANS_GRANTED Jun 2 02:40:39.391: GGSN-QS: Quadrans: 1250 Threshold: 1000 Units: SECONDS Jun 2 02:40:39.391: GGSN-QS:Adding TLV QUADRANS_GRANTED Jun 2 02:40:39.391: GGSN-QS: Quadrans: 5000 Threshold: 5000 Units: BYTES_IP Jun 2 02:40:39.391: GGSN-QS:Adding TLV TIMEOUT: 50000 Jun 2 02:40:39.391: GGSN-QS:Adding TLV TARIFF_TIME: 1147698000 Jun 2 02:40:39.391: GGSN-QS:Sending QUOTA_PUSH_REQ from QS (4.4.4.4:3386) to CSG (30.1.1.1:3386)
DB-848
December 2010
Jun 2 02:40:39.395: pak=0x6523B5B0, datagramstart=0x200143D8, network_start=0x200143BC datagramsize 91 Jun 2 02:40:39.395: GGSN-QS msgtype 0xF0, seq 1, len 85, from 4.4.4.4:3386 to 30.1.1.1:3386 200143D0: 0FF00055 00017E01 .p.U..~. 200debug ggsn quota-server detail143E0: FC005001 31000000 4A002E00 46001400 |.P.1...J...F... 200143F0: 09030303 01313233 34350015 00013100 .....12345....1. 20014400: 2D000E00 00000000 0004E201 03000003 -.........b..... 20014410: E8002D00 0E000000 00000013 88020300 h.-............. 20014420: 00138800 17000400 00C35000 4D000444 .........CP.M..D 20014430: 687B50 h{P Jun 2 02:40:39.395: GGSN-QS:Received Data Record Transfer Response from (30.1.1.1:3386) Sequence number 1 Jun 2 02:40:39.395: GGSN-QS:Cause = 128 Jun 2 02:40:39.395: GGSN-QS:Request Responded Sequence Number = 1 Jun 2 02:40:39.395: GGSN-QS:Private Ext IE length 32 QM Rsp length 29 Jun 2 02:40:39.395: GGSN-QS:Received message QUOTA_PUSH_RESP from CSG Jun 2 02:40:39.395: GGSN-QS:UserIndex TLV: IP Address 3.3.3.1 UserName/MSISDN 12345 Jun 2 02:40:39.395: GGSN-QS:Session ID TLV: 1736898353 Jun 2 02:40:39.395: GGSN-QS:Service ID TLV: 1 Jun 2 02:40:39.399: GGSN-QS:Detected real CSG 30.1.1.1 for virtual CSG 30.1.1.1 Jun 2 02:40:39.399: GGSN-QS:real CSG newly detected ggsn quota-server details debugging is on Router#
DB-849
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(17b)SXA. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug glbp errors command:
Router# debug glbp errors GLBP Errors debugging is on 1d19h: GLBP: Fa0/0 API active virtual address 10.21.8.32 not found 1d19h: GLBP: Fa0/0 API active virtual address 10.21.8.32 not found 1d19h: GLBP: Fa0/0 API active virtual address 10.21.8.32 not found
Related Commands
Description Displays debugging messages about GLBP that match specific conditions.
DB-850
December 2010
Syntax Description
(Optional) Displays all debugging output about GLBP events. (Optional) Displays GLBP API events. (Optional) Displays GLBP client cache events. (Optional) Displays detailed debugging output about GLBP events. (Optional) Displays GLBP high-availability (HA) events. (Optional) Displays GLBP Internet Control Message Protocol (ICMP) events. (Optional) Displays GLBP protocol events. (Optional) Displays GLBP redundancy events. (Optional) Displays a limited range of debugging output about GLBP events. (Optional) Displays GLBP tracking events.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(17b)SXA. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was enhanced to display information about GLBP support of Stateful Switchover (SSO). The ha keyword was added. The cache keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug glbp events command when the terse keyword is specified:
Router# debug glbp events terse GLBP Events debugging is on (protocol, redundancy, track)
DB-851
The following is sample output from the debug glbp events command on an active RP displaying an interface shutdown event:
Router# debug glbp events GLBP Events debugging is on *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:53.583: *Sep 15 09:14:55.583: administratively down *Sep 15 09:14:55.587: *Sep 15 09:14:56.595: state to down GLBP: Et0/0 API Software interface going down GLBP: Et0/0 API Software interface going down GLBP: Et0/0 Interface down GLBP: Et0/0 1.1 Listen: e/Forwarder disabled GLBP: Et0/0 1.1 Listen -> Init GLBP: Et0/0 Fwd 1.1 HA Encoded (state Init) into sync buffer GLBP: Et0/0 1.2 Active: e/Forwarder disabled GLBP: Et0/0 1.2 Active -> Init %GLBP-6-FWDSTATECHANGE: Ethernet0/0 Grp 1 Fwd 2 state Active -> Init GLBP: Et0/0 Fwd 1.2 HA Encoded (state Init) into sync buffer GLBP: Et0/0 1 Standby: e/GLBP disabled GLBP: Et0/0 1 Active router IP is unknown, was 172.24.1.2 GLBP: Et0/0 1 Standby router is unknown, was local GLBP: Et0/0 1 Standby -> Init GLBP: Et0/0 Grp 1 HA Encoded (state Init) into sync buffer %LINK-5-CHANGED: Interface Ethernet0/0, changed state to GLBP: API Hardware state change %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0/0, changed
The following is sample output from the debug glbp events command on a standby RP displaying an interface shutdown event:
RouterRP-standby# debug glbp events GLBP . . . *Sep *Sep *Sep Events debugging is on
15 09:14:53.691: GLBP: Et0/0 Fwd 1.1 HA sync, state Listen -> Init 15 09:14:53.691: GLBP: Et0/0 Fwd 1.2 HA sync, state Active -> Init 15 09:14:53.691: GLBP: Et0/0 Grp 1 HA sync, state Standby -> Init
The following is sample output from the debug glbp events command when the cache keyword is specified:
Router# debug glbp events cache GLBP Events debugging is on (cache) Jun 30 08:57:50.171: GLBP: Et0/0 1 Added Jun 30 08:57:50.171: GLBP: Et0/0 1 Added Jun 30 08:57:50.171: GLBP: Et0/0 1 Added Jun 30 08:57:50.171: GLBP: Et0/0 1 Added Jun 30 08:57:50.171: GLBP: Et0/0 1 Added Jun 30 08:57:50.171: GLBP: Et0/0 1 Added
Related Commands
Description Displays debugging messages about GLBP that match specific conditions.
DB-852
December 2010
Syntax Description
(Optional) Displays all debugging output about GLBP packets. (Optional) Displays detailed debugging output about GLBP packets. (Optional) Displays debugging output about GLBP hello packets. (Optional) Displays debugging output about GLBP reply packets. (Optional) Displays debugging output about GLBP request packets. (Optional) Displays a limited range of debugging output about GLBP packets.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(17b)SXA. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output from the debug glbp packets command shows debugging output about GLBP hello packets:
Router# debug glbp packets hello GLBP Packets (Hello) 1d19h: GLBP: 1d19h: GLBP: 1d19h: GLBP: 1d19h: GLBP: debugging is on Fa0/0 Fa0/0 Fa0/0 Fa0/0 Grp Grp Grp Grp 10 10 10 10 Hello Hello Hello Hello out out out out 10.21.8.32 10.21.8.32 10.21.8.32 10.21.8.32 VG VG VG VG Active Active Active Active pri pri pri pri 254 254 254 254 vIP vIP vIP vIP 10.21.8.10 10.21.8.10 10.21.8.10 10.21.8.10 1 1 1 1
Related Commands
Description Displays debugging messages about GLBP that match specific conditions.
DB-853
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(17b)SXA. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug glbp terse command:
Router# debug glbp terse GLBP: GLBP Errors debugging is on GLBP Events debugging is on (protocol, redundancy, track) GLBP Packets debugging is on (Request, Reply)
Related Commands
Command debug condition glbp debug glbp errors debug glbp events debug glbp packets
Description Displays debugging messages about GLBP that match specific conditions. Displays debugging messages about GLBP errors. Displays debugging messages about GLBP events. Displays debugging messages about GLBP packets.
DB-854
December 2010
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(9)T.
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with eGGSN processing.
Examples
The following example enables the display of eGGSN events and state transactionspre-allocated quota. This is PDP context create, prepaid user data transfer, and then context teardown. PDP Context Create:
Router#debug gprs category fsm event eGGSN category fsm event debugging is on Router# Jun 2 02:55:08.491: GPRS:1234050000000010:created service-aware subblock Jun 2 02:55:11.383: GPRS:1234050000000010:it is the only one PDP of the user, need CCR msg Jun 2 02:55:11.383: GPRS:1234050000000010:sent ccr_init Jun 2 02:55:11.823: GPRS:1234050000000010:create new category 1 Jun 2 02:55:11.823: GPRS:1234050000000010:shdb 0xFB00001C created for category 1 (handle 0x8C000007) Jun 2 02:55:11.823: GPRS:1234050000000010:successfully create a category Jun 2 02:55:14.623: GPRS:1234050000000010:created sync_object for CREATE_PDP Jun 2 02:55:14.623: GPRS:1234050000000010:get 1 impacted categories into sync_object for CREATE_PDP Jun 2 02:55:14.623: GPRS:1234050000000010:insert category 1 from sync_object for CREATE_PDP Jun 2 02:55:14.623: GPRS:1234050000000010:number of really impacted by CREATE_PDP = 1 Jun 2 02:55:14.623: GPRS:1234050000000010:FSM_ggsn_rcvd_quota Jun 2 02:55:14.623: GPRS:1234050000000010:category 1 trans from INIT to PENDING QP on event CCA_QUOTA Jun 2 02:55:14.627: GPRS:1234050000000010:FSM_ggsn_rcvd_qp_ack_in_qp
DB-855
Jun 2 02:55:14.627: GPRS:1234050000000010:remove category 1 from sync_object for CREATE_PDP 0 still pending in the sync_object Jun 2 02:55:14.627: GPRS:1234050000000010:send Create PDP Context Res to SGSN Jun 2 02:55:14.627: GPRS:1234050000000010:delete sync object for CREATE_PDP, it has 0 categories Jun 2 02:55:14.627: GPRS:1234050000000010:category 1 trans from PENDING QP to AUTHORIZED on event CSG_QP_ACK Router# Router#
The following example enables the display of eGGSN events and state transactionsfor PDPs without pre-allocated quota. PDP Context Create:
Router#debug gprs category fsm event eGGSN category fsm event debugging is on Router# Jun 2 02:58:45.727: GPRS:1234050000000010:created service-aware subblock Jun 2 02:58:48.623: GPRS:1234050000000010:it is the only one PDP of the user, need CCR msg Jun 2 02:58:48.623: GPRS:1234050000000010:sent ccr_init Router#
DB-856
December 2010
Syntax Description
events packets
Displays events related to GPRS charging processing on the GGSN. Displays GPRS charging packets that are sent between the GGSN and the charging gateway.
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. This command was integrated into Cisco IOS Release 12.2(4)MX. This command was integrated into Cisco IOS Release 12.2(8)YD. This command was integrated into Cisco IOS Release 12.2(8)B. This command was integrated into Cisco IOS Release 12.2(8)YY. This command was integrated into Cisco IOS Release 12.3(4)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is useful for system operators if problems are encountered with GPRS charging functions.
Caution
Because the debug gprs charging command generates a substantial amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples
The following example enables the display of events related to GPRS charging events on the GGSN:
Router# debug gprs charging events
DB-857
The following example enables the display of GPRS charging packets sent between the GGSN and the charging gateway:
Router# debug gprs charging events
DB-858
December 2010
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(9)T.
Usage Guidelines
This command is useful for system operators and development engineers if Diameter protocol problems are encountered on the GGSN.
Examples
Example 1
DB-859
Jun 2 03:13:46.287: GPRS:1234050000000010:DCCA FSM:Event = CCA_SUCCESS, Old State = PENDING_I, New State = OPEN Router# Router#show gprs gtp pdp tid 1234050000000010 ser all Diameter Credit Control: Enabled Current Billing status: Prepaid Reason to convert to postpaid: N/A Charging Profile Index: 1 DCCA profile name: dcca-profile1, Source: charging profile Rule base id: 1, Source: DCCA server ServiceID State Quota(octets) 1 Router# AUTHORIZED 5000
Example 2
DB-860
December 2010
Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-CG-Address : 20.1.1.1 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-QoS-Profile : 99-0911012964FFFF1100FFFF Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-SGSN-Address : 11.20.1.1 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-GGSN-Address : 10.20.61.1 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-IMSI-MCC-MNC : 21435 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-GGSN-MCC-MNC : 001002 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-NSAPI : 1 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-Selection-Mode : 0 Jun 2 03:05:28.459: GPRS:1234050000000010:3GPP-Charging-Char : 0100 Jun 2 03:05:28.463: GPRS:1234050000000010:GPRS DCCA: Stopping Tx timer Jun 2 03:05:28.463: GPRS:1234050000000010:DCCA FSM:Event = CCR_FINAL, Old State = OPEN, New State = PENDING_T Jun 2 03:05:28.463: GPRS:1234050000000010:GPRS DCCA: Stopping Tx timer Jun 2 03:05:28.871: GPRS:GPRS DCCA: DCCA request was cancelled, Droping AAA reply Router# Router#sgpt 1234050000000010 ser all %ERROR: Cannot find the PDP Router#
DB-861
Syntax Description
Defaults
Command History
Release 12.1(9)E 12.2(4)MX 12.2(8)YD 12.2(8)YW 12.3(2)XB 12.3(8)XU 12.3(11)YJ 12.3(14)YQ 12.2SX
Modification This command was introduced. This command was incorporated in Cisco IOS Release 12.2(4)MX. This command was incorporated in Cisco IOS Release 12.2(8)YD. This command was incorporated in Cisco IOS Release 12.2(8)YW. This command was incorporated in Cisco IOS Release 12.3(2)XB. This command was incorporated in Cisco IOS Release 12.3(8)XU. This command was incorporated in Cisco IOS Release 12.3(11)YJ. This command was incorporated in Cisco IOS Release 12.3(14)YQ. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network flows and fewer users. Debugging during these periods reduces the effect these commands have on other users on the system. This command displays debug messages for GPRS DFP weight calculation. To display debug messages for the DFP agent subsystem, use the debug ip dfp agent command.
DB-862
December 2010
Examples
The following example configures a debug session to check all GPRS DFP weight calculation:
Router# debug gprs dfp GPRS DFP debugging is on Router#
DB-863
Syntax Description
Defaults
Command History
Modification This command was introduced. This command was incorporated in Cisco IOS Release 12.2(8)YD. This command was incorporated in Cisco IOS Release 12.2(8)YW. This command was incorporated in Cisco IOS Release 12.3(2)XB. This command was incorporated in Cisco IOS Release 12.3(8)XU. This command was incorporated in Cisco IOS Release 12.3(11)YJ. This command was incorporated in Cisco IOS Release 12.3(14)YQ. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with DHCP processing on the GGSN. To display standard debug messages between the DHCP client on the router and a DHCP server, you can also use the debug dhcp or debug dhcp detail commands with the debug gprs dhcp command.
Caution
Because the debug gprs dhcp command generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples
The following example shows sample output for DHCP processing on the GGSN:
Router# debug gprs dhcp 2d13h: GPRS:DHCP req:TID 1111111100000099, Req 1 2d13h: GPRS:Requesting IP address for pdp 1111111100000099 from server 172.16.0.8 tableid 0 2d13h: GPRS:DHCP ip allocation pass (10.88.17.43) for pdp 1111111100000099 2d13h: GPRS:Using DHCP ip address 10.88.17.43 for pdp 1111111100000099
DB-864
December 2010
The following example shows sample output for standard debug messaging for DHCP processing on the router between the DHCP client and a DHCP server:
2d13h: 2d13h: 2d13h: 2d13h: 2d13h: 2d13h: 2d13h: 2d13h: 2d13h: 2d13h: 2d13h: 2d13h: 2d13h: 2d13h: 2d13h: 2d13h: 2d13h: DHCP: proxy allocate request DHCP: new entry. add to queue DHCP: SDiscover attempt # 1 for entry: DHCP: SDiscover: sending 283 byte length DHCP packet DHCP: SDiscover with directed serv 172.16.0.8, 283 bytes DHCP: XID MATCH in dhcpc_for_us() DHCP: Received a BOOTREP pkt DHCP: offer received from 172.16.0.8 DHCP: SRequest attempt # 1 for entry: DHCP: SRequest- Server ID option: 172.16.0.8 DHCP: SRequest- Requested IP addr option: 10.88.17.43 DHCP: SRequest placed lease len option: 604800 DHCP: SRequest: 301 bytes DHCP: SRequest: 301 bytes DHCP: XID MATCH in dhcpc_for_us() DHCP: Received a BOOTREP pkt DHCP Proxy Client Pooling: ***Allocated IP address: 10.88.17.43
Related Commands
Description Displays debug messages between the DHCP client on the router and a DHCP server.
DB-865
Syntax Description
Displays events related to GTP processing on the GGSN. Displays GTP signaling messages that are sent between the SGSN and GGSN. Displays GTP packets that are sent between the SGSN and GGSN.
Defaults
Command History
Release 12.1(1)GA 12.1(5)T 12.2(4)MX 12.2(8)YD 12.2(8)YW 12.3(2)XB 12.3(8)XU 12.3(11)YJ 12.3(14)YQ 12.2SX
Modification This command was introduced. This command was integrated in Cisco IOS Release 12.1(5)T. This command was incorporated in Cisco IOS Release 12.2(4)MX, and the ppp {details | events} option was added. This command was incorporated in Cisco IOS Release 12.2(8)YD. This command was incorporated in Cisco IOS Release 12.2(8)YW. This command was incorporated in Cisco IOS Release 12.3(2)XB. This command was incorporated in Cisco IOS Release 12.3(8)XU. This command was incorporated in Cisco IOS Release 12.3(11)YJ. This command was incorporated in Cisco IOS Release 12.3(14)YQ. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with communication between the GGSN and the SGSN using GTP.
Caution
Because the debug gprs gtp command generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples
The following example enables the display of events related to GTP processing on the GGSN:
Router# debug gprs gtp events
DB-866
December 2010
The following example enables the display of GTP packets sent between the SGSN and GGSN:
Router# debug gprs gtp packets
The following example enables the display of GTP PPP events between the SGSN and GGSN:
Router# debug gprs gtp ppp events
The following example enables the display of detailed GTP PPP debug output along with GTP PPP events between the SGSN and GGSN:
Router# debug gprs gtp ppp details Router# debug gprs gtp ppp events
DB-867
Syntax Description
Defaults
Command History
Modification This command was introduced. This command was incorporated in Cisco IOS Release 12.2(8)YD. This command was incorporated in Cisco IOS Release 12.2(8)YW. This command was incorporated in Cisco IOS Release 12.3(2)XB. This command was incorporated in Cisco IOS Release 12.3(8)XU. This command was incorporated in Cisco IOS Release 12.3(11)YJ. This command was incorporated in Cisco IOS Release 12.3(14)YQ. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is useful for system operators and development engineers to verify parsing of GTP IEs in signaling requests that are received by GDM or by the GGSN. If the packet is parsed successfully, you will receive a message along with the TID for the packet as shown in the following example:
GPRS:TID:7300000000000000:Packet Parsed successfully
The debug gprs gtp parsing command can be used to verify GDM or GGSN processing of IEs.
Caution
Because the debug gprs gtp parsing command generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples
The following example enables the display of debug messages that occur while GDM or the GGSN parses GTP IEs:
Router# debug gprs gtp parsing
DB-868
December 2010
Syntax Description
events details
Displays messages specific to certain conditions that are occurring during PPP PDP type processing. Displays more extensive and lower-level messages related to PPP PDP type processing.
Defaults
Command History
Modification This command was introduced. This command was incorporated in Cisco IOS Release 12.2(8)YD. This command was incorporated in Cisco IOS Release 12.2(8)YW. This command was incorporated in Cisco IOS Release 12.3(2)XB. This command was incorporated in Cisco IOS Release 12.3(8)XU. This command was incorporated in Cisco IOS Release 12.3(11)YJ. This command was incorporated in Cisco IOS Release 12.3(14)YQ. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with PPP PDP type processing on the GGSN. You can enable both forms of the debug gprs gtp ppp command at the same time, as separate command line entries. The events keyword generates output specific to certain conditions that are occurring, which helps qualify the output being received using the details option.
Caution
Because the debug gprs gtp ppp command generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples
The following debug examples provide sample output for a create PDP context request and clear PDP context using PPP PDP type on the GGSN. The examples show output while both debug events and details are enabled on the GGSN.
DB-869
Example 1
The following example displays details and events output related to PPP PDP context processing for a create PDP context requested received by the GGSN:
Router# debug gprs gtp ppp events GTP PPP events display debugging is on Router# debug gprs gtp ppp details GTP PPP details display debugging is on 7200b# 3d23h: GPRS: 3d23h: GTP-PPP Fa1/0: Create new gtp_ppp_info 3d23h: GPRS: 3d23h: GTP-PPP: domain gprs.cisco.com not in any VPDN group 3d23h: GPRS: 3d23h: GTP-PPP: aaa-group accounting not configured under APN gprs.cisco.com 3d23h: GPRS:GTP-PPP: Don't cache internally generated pak's header 3d23h: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up 3d23h: GPRS: 3d23h: GTP-PPP Vi2: gtp_ppp_cstate_react changing states 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS: 3d23h: GTP-PPP: Vi2: Concat names user00 & gprs.cisco.com 3d23h: GPRS: 3d23h: GTP-PPP: New username after concat: [email protected] 3d23h: GPRS: 3d23h: GTP-PPP: Vi2: Concat names [email protected] & gprs.cisco.com 3d23h: GPRS: 3d23h: GTP-PPP: New username after concat: [email protected] 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access2, changed state to up 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS: 3d23h: GTP-PPP Vi2: gtp_ppp_protocol_up is notified about intf UP 3d23h: GPRS:
3d23h: GTP-PPP Vi2: PDP w/ MS addr 98.102.0.1 inserted into IP radix tree
Example 2
The following example displays both details and events related to PPP PDP type processing after clearing PDP contexts on the GGSN:
Router# clear gprs gtp pdp-context all 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 3d23h: GPRS: pak 30 pak 30
DB-870
December 2010
3d23h: 3d23h: 3d23h: 3d23h: 3d23h: 3d23h: 3d23h: 3d23h: 3d23h: down
GTP-PPP Vi2: gtp_ppp_pdp_terminate shutting down the vaccess GPRS: GTP-PPP Vi2: gtp_ppp_pdp_shut_va shutting down intf %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to down GPRS: GTP-PPP Vi2: gtp_ppp_cstate_react changing states GPRS: GTP-PPP Vi2: gtp_ppp_free_va resetting intf vectors %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access2, changed state to
DB-871
Syntax Description
events details
Displays messages specific to certain conditions that are occurring during PPP regeneration processing. Displays more extensive and lower-level messages related to PPP regeneration processing.
Defaults
Command History
Modification This command was introduced. This command was incorporated in Cisco IOS Release 12.2(8)YD. This command was incorporated in Cisco IOS Release 12.2(8)YW. This command was incorporated in Cisco IOS Release 12.3(2)XB. This command was incorporated in Cisco IOS Release 12.3(8)XU. This command was incorporated in Cisco IOS Release 12.3(11)YJ. This command was incorporated in Cisco IOS Release 12.3(14)YQ. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with communication between GDM and a GGSN. You can enable both forms of the debug gprs gtp ppp-regeneration command at the same time, as separate command line entries. The events keyword generates output specific to certain conditions that are occurring, which helps qualify the output being received using the details option.
Caution
Because the debug gprs gtp ppp-regeneration command generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples
The following debug examples provide sample output for a create PDP context request and clear PDP context using PPP regeneration on the GGSN. The examples show output while both debug events and details are enabled on the GGSN.
DB-872
December 2010
Example 1
The following example displays details and events output related to PPP regeneration processing for a create PDP context requested received by the GGSN:
Router# debug gprs gtp ppp-regeneration details GTP PPP regeneration details display debugging is on Router# debug gprs gtp ppp-regeneration events GTP PPP regeneration events display debugging is on 06:24:02: PPP-REGEN state counters: pending counter is 0 06:24:02: State[IDLE] counter is 0 06:24:02: State[AUTHORIZING] counter is 0 06:24:02: State[VPDN CONNECTING] counter is 0 06:24:02: State[PPP NEGOTIATING] counter is 0 06:24:02: State[PPP CONNECTED] counter is 0 06:24:02: State[PPP TERMINATING] counter is 0 06:24:02: PPP-REGEN state counters: pending counter is 1 06:24:02: State[IDLE] counter is 1 06:24:02: State[AUTHORIZING] counter is 0 06:24:02: State[VPDN CONNECTING] counter is 0 06:24:02: State[PPP NEGOTIATING] counter is 0 06:24:02: State[PPP CONNECTED] counter is 0 06:24:02: State[PPP TERMINATING] counter is 0 06:24:02: GPRS:1011111111500001:Authen: PAP username: tomy1@corporate_1.com 06:24:02: GPRS:1011111111500001:Session timer started 06:24:02: GPRS:Processing PPP regen reqQ 06:24:02: GPRS:1011111111500001:Processing Initiate PPP regen from reqQ 06:24:02: GPRS:1011111111500001:got event [REQUEST PPP REGEN] in state [IDLE] 06:24:02: PPP-REGEN state counters: pending counter is 1 06:24:02: State[IDLE] counter is 0 06:24:02: State[AUTHORIZING] counter is 1 06:24:02: State[VPDN CONNECTING] counter is 0 06:24:02: State[PPP NEGOTIATING] counter is 0 06:24:02: State[PPP CONNECTED] counter is 0 06:24:02: State[PPP TERMINATING] counter is 0 06:24:02: GPRS:1011111111500001:state [IDLE->AUTHORIZING] on event [REQUEST PPP REGEN] 06:24:02: GPRS:1011111111500001:Got VPN authorization info 06:24:02: GPRS:1011111111500001:got event [AUTHOR SUCCESS] in state [AUTHORIZING] 06:24:02: PPP-REGEN state counters: pending counter is 1 06:24:02: State[IDLE] counter is 0 06:24:02: State[AUTHORIZING] counter is 0 06:24:02: State[VPDN CONNECTING] counter is 1 06:24:02: State[PPP NEGOTIATING] counter is 0 06:24:02: State[PPP CONNECTED] counter is 0 06:24:02: State[PPP TERMINATING] counter is 0 06:24:02: GPRS:1011111111500001:state [AUTHORIZING->VPDN CONNECTING] on event [AUTHOR SUCCESS] 06:24:02: GPRS:1011111111500001:Author succeeded, establishing the tunnel 06:24:02: GPRS:1011111111500001:Create/Clone vaccess to negotiate PPP 06:24:02: GPRS:1011111111500001:no need to set NS ppp_config 06:24:02: GPRS:1011111111500001:MS no static IP addr. Get one via IPCP 06:24:02: GPRS:1011111111500001:VPDN to inform PPP regen: CONNECTED 06:24:02: GPRS:1011111111500001:got event [VPDN CONNECTED] in state [VPDN CONNECTING] 06:24:02: PPP-REGEN state counters: pending counter is 1 06:24:02: State[IDLE] counter is 0 06:24:02: State[AUTHORIZING] counter is 0 06:24:02: State[VPDN CONNECTING] counter is 0 06:24:02: State[PPP NEGOTIATING] counter is 1 06:24:02: State[PPP CONNECTED] counter is 0 06:24:02: State[PPP TERMINATING] counter is 0 06:24:02: GPRS:1011111111500001:state [VPDN CONNECTING->PPP NEGOTIATING] on event [VPDN CONNECTED] 06:24:02: GPRS:1011111111500001:Start PPP negotiations on vaccess 06:24:02: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up
DB-873
06:24:02: GPRS:1011111111500001:IPCP is up 06:24:02: GPRS:1011111111500001:LNS allocates 10.100.1.1 for MS 06:24:02: GPRS:1011111111500001:IP addr 10.100.1.1 is negotiated for MS 06:24:02: GPRS:1011111111500001:PPP connected 06:24:02: GPRS:1011111111500001:got event [PPP NEGOTIATED] in state [PPP NEGOTIATING] 06:24:02: PPP-REGEN state counters: pending counter is 0 06:24:02: State[IDLE] counter is 0 06:24:02: State[AUTHORIZING] counter is 0 06:24:02: State[VPDN CONNECTING] counter is 0 06:24:02: State[PPP NEGOTIATING] counter is 0 06:24:02: State[PPP CONNECTED] counter is 1 06:24:02: State[PPP TERMINATING] counter is 0 06:24:02: GPRS:1011111111500001:state [PPP NEGOTIATING->PPP CONNECTED] on event [PPP NEGOTIATED] 06:24:02: GPRS:1011111111500001:PPP succeeded negotiation, session established 06:24:02: GPRS:1011111111500001:Session timer stopped 06:24:03: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access2, changed state to up
Example 2
The following example displays both details and events related to PPP regeneration processing after clearing PDP contexts on the GGSN:
Router# clear gprs gtp pdp-context all 06:28:05: PPP-REGEN state counters: pending counter is 0 06:28:05: State[IDLE] counter is 0 06:28:05: State[AUTHORIZING] counter is 0 06:28:05: State[VPDN CONNECTING] counter is 0 06:28:05: State[PPP NEGOTIATING] counter is 0 06:28:05: State[PPP CONNECTED] counter is 1 06:28:05: State[PPP TERMINATING] counter is 0 06:28:05: GPRS:1011111111500001:PPP regen current state PPP CONNECTED 06:28:05: GPRS:1011111111500001:GTP disconnecting the PPP regen session 06:28:05: GPRS:Processing PPP regen reqQ 06:28:05: GPRS:1011111111500001:Processing Disconnect PPP regen from reqQ 06:28:05: GPRS:1011111111500001:got event [CANCEL REGEN'ED PPP] in state [PPP CONNECTED] 06:28:05: PPP-REGEN state counters: pending counter is 1 06:28:05: State[IDLE] counter is 0 06:28:05: State[AUTHORIZING] counter is 0 06:28:05: State[VPDN CONNECTING] counter is 0 06:28:05: State[PPP NEGOTIATING] counter is 0 06:28:05: State[PPP CONNECTED] counter is 0 06:28:05: State[PPP TERMINATING] counter is 1 06:28:05: GPRS:1011111111500001:state [PPP CONNECTED->PPP TERMINATING] on event [CANCEL REGEN'ED PPP] 06:28:05: GPRS:1011111111500001:Cancel request after VPND tunnel is up 06:28:05: PPP-REGEN state counters: pending counter is 1 06:28:05: State[IDLE] counter is 0 06:28:05: State[AUTHORIZING] counter is 0 06:28:05: State[VPDN CONNECTING] counter is 0 06:28:05: State[PPP NEGOTIATING] counter is 0 06:28:05: State[PPP CONNECTED] counter is 0 06:28:05: State[PPP TERMINATING] counter is 1 06:28:05: GPRS:1011111111500001:PPP down 06:28:05: GPRS:1011111111500001:got event [PPP FAILED] in state [PPP TERMINATING] 06:28:05: PPP-REGEN state counters: pending counter is 1 06:28:05: State[IDLE] counter is 1 06:28:05: State[AUTHORIZING] counter is 0 06:28:05: State[VPDN CONNECTING] counter is 0 06:28:05: State[PPP NEGOTIATING] counter is 0 06:28:05: State[PPP CONNECTED] counter is 0 06:28:05: State[PPP TERMINATING] counter is 0
DB-874
December 2010
06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:05: 06:28:06: to down
GPRS:1011111111500001:state [PPP TERMINATING->IDLE] on event [PPP FAILED] GPRS:1011111111500001:LCP went down GPRS:1011111111500001:VPDN disconnect GPRS:1011111111500001:got event [CLEANUP CONTEXT] in state [IDLE] GPRS:1011111111500001:state [IDLE->IDLE] on event [CLEANUP CONTEXT] GPRS:1011111111500001:Freeing context structure GPRS:1011111111500001:VPDN handle invalid, no need to free it GPRS:1011111111500001:remove PPP regen context from Vi2 GPRS:1011111111500001:Session timer stopped PPP-REGEN state counters: pending counter is 0 State[IDLE] counter is 0 State[AUTHORIZING] counter is 0 State[VPDN CONNECTING] counter is 0 State[PPP NEGOTIATING] counter is 0 State[PPP CONNECTED] counter is 0 State[PPP TERMINATING] counter is 0 GPRS:1011111111500001:PPP regen context 0x633F196C released %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to down %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access2, changed state
DB-875
Syntax Description
events packets
Displays events related to GDM processing. Displays packets that are sent between GDM and a GGSN.
Defaults
Command History
Modification This command was introduced. This command was incorporated in Cisco IOS Release 12.2(8)YD. This command was incorporated in Cisco IOS Release 12.2(8)B. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with communication between GDM and an SGSN, or between GDM and a GGSN.
Caution
Because the debug gprs gtp-director command generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples
The following debug examples provide sample output for a create PDP context request, delete PDP context request, and clear PDP context using PPP regeneration on the GGSN. The first three examples show output related to debug events messaging only. The last three examples show output while both debug events and details are enabled on the GGSN.
Example 1
The following example displays events related to PPP regeneration processing for a create PDP context requested received by the GGSN:
Router# debug gprs gtp-director events *Mar 1 00:02:42.787: GPRS:1111110000000000:Authen: PAP username: [email protected] *Mar 1 00:02:42.787: GPRS:1111110000000000:Processing Initiate PPP regen from reqQ *Mar 1 00:02:42.787: GPRS:1111110000000000:got event [REQUEST PPP REGEN] in state [IDLE] *Mar 1 00:02:42.787: GPRS:1111110000000000:state [IDLE->AUTHORIZING] on event [REQUEST PPP REGEN] *Mar 1 00:02:42.787: GPRS:1111110000000000:Got VPN authorization info
DB-876
December 2010
*Mar 1 00:02:42.787: GPRS:1111110000000000:got event [AUTHOR SUCCESS] in state [AUTHORIZING] *Mar 1 00:02:42.787: GPRS:1111110000000000:state [AUTHORIZING->VPDN CONNECTING] on event [AUTHOR SUCCESS] *Mar 1 00:02:42.787: GPRS:1111110000000000:Author succeeded, establishing the tunnel *Mar 1 00:02:42.787: GPRS:1111110000000000:Create/Clone vaccess to negotiate PPP *Mar 1 00:02:42.791: GPRS:1111110000000000:MS no static IP addr. Get one via IPCP *Mar 1 00:02:42.827: GPRS:1111110000000000:VPDN to inform PPP regen: CONNECTED *Mar 1 00:02:42.827: GPRS:1111110000000000:got event [VPDN CONNECTED] in state [VPDN CONNECTING] *Mar 1 00:02:42.827: GPRS:1111110000000000:state [VPDN CONNECTING->PPP NEGOTIATING] on event [VPDN CONNECTED] *Mar 1 00:02:42.827: GPRS:1111110000000000:Start PPP negotiations on vaccess *Mar 1 00:02:42.831: %LINK-3-UPDOWN: Interface Virtual-Access3, changed state to up *Mar 1 00:02:42.835: GPRS:1111110000000000:IPCP is up *Mar 1 00:02:42.835: GPRS:1111110000000000:IP addr 10.10.1.187 is negotiated for MS *Mar 1 00:02:42.835: GPRS:1111110000000000:DNS - Primary: 10.3.0.1 Secondary: 0.0.0.0 NetBios - Primary: 0.0.0.0, Secondary: 0.0.0.0 *Mar 1 00:02:42.835: GPRS:1111110000000000:PPP connected *Mar 1 00:02:42.835: GPRS:1111110000000000:got event [PPP NEGOTIATED] in state [PPP NEGOTIATING] *Mar 1 00:02:42.835: GPRS:1111110000000000:state [PPP NEGOTIATING->PPP CONNECTED] on event [PPP NEGOTIATED] *Mar 1 00:02:42.835: GPRS:1111110000000000:PPP succeeded negotiation, session established *Mar 1 00:02:43.835: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to up
Example 2
The following example displays events related to PPP regeneration processing for a delete PDP context requested received by the GGSN:
Router# debug gprs gtp-director events *Mar 1 00:03:18.331: GPRS:1111110000000000:GTP disconnecting the PPP regen session *Mar 1 00:03:18.331: GPRS:1111110000000000:Processing Disconnect PPP regen from reqQ *Mar 1 00:03:18.331: GPRS:1111110000000000:got event [CANCEL REGEN'ED PPP] in state [PPP CONNECTED] *Mar 1 00:03:18.331: GPRS:1111110000000000:state [PPP CONNECTED->PPP TERMINATING] on event [CANCEL REGEN'ED PPP] *Mar 1 00:03:18.331: GPRS:1111110000000000:Cancel request after VPND tunnel is up *Mar 1 00:03:18.335: GPRS:1111110000000000:PPP down *Mar 1 00:03:18.335: GPRS:1111110000000000:got event [PPP FAILED] in state [PPP TERMINATING] *Mar 1 00:03:18.339: GPRS:1111110000000000:state [PPP TERMINATING->IDLE] on event [PPP FAILED] *Mar 1 00:03:18.339: GPRS:1111110000000000:PPP failed negotiation *Mar 1 00:03:18.339: GPRS:1111110000000000:got event [CLEANUP CONTEXT] in state [IDLE] *Mar 1 00:03:18.339: GPRS:1111110000000000:VPDN to inform PPP regen: DISCONNECTED *Mar 1 00:03:18.339: GPRS:1111110000000000:got event [VPDN DISCONNECTED] in state [IDLE] *Mar 1 00:03:18.339: GPRS:1111110000000000:state [IDLE->IDLE] on event [CLEANUP CONTEXT] *Mar 1 00:03:18.339: GPRS:1111110000000000:Freeing context structure *Mar 1 00:03:18.339: %LINK-3-UPDOWN: Interface Virtual-Access3, changed state to down *Mar 1 00:03:19.331: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to down
Example 3
The following example displays events related to PPP regeneration processing as the GGSN clears a PDP context request:
Router# debug gprs gtp-director events *Mar 1 00:04:50.083: GPRS:1111110000000000:GTP disconnecting the PPP regen session *Mar 1 00:04:50.083: GPRS:1111110000000000:Processing Disconnect PPP regen from reqQ
DB-877
*Mar 1 00:04:50.083: GPRS:1111110000000000:got event [CANCEL REGEN'ED PPP] in state [PPP CONNECTED] *Mar 1 00:04:50.083: GPRS:1111110000000000:state [PPP CONNECTED->PPP TERMINATING] on event [CANCEL REGEN'ED PPP] *Mar 1 00:04:50.083: GPRS:1111110000000000:Cancel request after VPND tunnel is up *Mar 1 00:04:50.087: GPRS:1111110000000000:PPP down *Mar 1 00:04:50.087: GPRS:1111110000000000:got event [PPP FAILED] in state [PPP TERMINATING] *Mar 1 00:04:50.091: GPRS:1111110000000000:state [PPP TERMINATING->IDLE] on event [PPP FAILED] *Mar 1 00:04:50.091: GPRS:1111110000000000:PPP failed negotiation *Mar 1 00:04:50.091: GPRS:1111110000000000:got event [CLEANUP CONTEXT] in state [IDLE] *Mar 1 00:04:50.091: GPRS:1111110000000000:VPDN to inform PPP regen: DISCONNECTED *Mar 1 00:04:50.091: GPRS:1111110000000000:got event [VPDN DISCONNECTED] in state [IDLE] *Mar 1 00:04:50.091: GPRS:1111110000000000:state [IDLE->IDLE] on event [CLEANUP CONTEXT] *Mar 1 00:04:50.091: GPRS:1111110000000000:Freeing context structure *Mar 1 00:04:50.091: %LINK-3-UPDOWN: Interface Virtual-Access4, changed state to down *Mar 1 00:04:51.083: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access4, changed state to down
Example 4
The following example displays both debug events and details related to PPP regeneration processing for a create PDP context requested received by the GGSN:
Router# debug gprs gtp-director events Router# debug gprs gtp-director details *Mar 1 00:05:21.083: PPP-REGEN state counters: pending counter is 0 *Mar 1 00:05:21.083: State[IDLE] counter is 0 *Mar 1 00:05:21.083: State[AUTHORIZING] counter is 0 *Mar 1 00:05:21.083: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:21.083: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:21.083: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:21.083: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:21.087: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:05:21.087: State[IDLE] counter is 1 *Mar 1 00:05:21.087: State[AUTHORIZING] counter is 0 *Mar 1 00:05:21.087: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:21.087: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:21.087: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:21.087: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:21.087: GPRS:1111110000000000:Authen: PAP username: [email protected] *Mar 1 00:05:21.087: GPRS:1111110000000000:Session timer started *Mar 1 00:05:21.087: GPRS:1111110000000000:Processing Initiate PPP regen from reqQ *Mar 1 00:05:21.087: GPRS:1111110000000000:got event [REQUEST PPP REGEN] in state [IDLE] *Mar 1 00:05:21.087: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:05:21.087: State[IDLE] counter is 0 *Mar 1 00:05:21.087: State[AUTHORIZING] counter is 1 *Mar 1 00:05:21.087: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:21.087: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:21.087: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:21.087: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:21.087: GPRS:1111110000000000:state [IDLE->AUTHORIZING] on event [REQUEST PPP REGEN] *Mar 1 00:05:21.087: GPRS:1111110000000000:Got VPN authorization info *Mar 1 00:05:21.087: GPRS:1111110000000000:got event [AUTHOR SUCCESS] in state [AUTHORIZING] *Mar 1 00:05:21.087: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:05:21.087: State[IDLE] counter is 0 *Mar 1 00:05:21.087: State[AUTHORIZING] counter is 0 *Mar 1 00:05:21.087: State[VPDN CONNECTING] counter is 1 *Mar 1 00:05:21.087: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:21.087: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:21.087: State[PPP TERMINATING] counter is 0
DB-878
December 2010
*Mar 1 00:05:21.087: GPRS:1111110000000000:state [AUTHORIZING->VPDN CONNECTING] on event [AUTHOR SUCCESS] *Mar 1 00:05:21.087: GPRS:1111110000000000:Author succeeded, establishing the tunnel *Mar 1 00:05:21.087: GPRS:1111110000000000:Create/Clone vaccess to negotiate PPP *Mar 1 00:05:21.091: GPRS:1111110000000000:MS no static IP addr. Get one via IPCP *Mar 1 00:05:21.127: GPRS:1111110000000000:VPDN to inform PPP regen: CONNECTED *Mar 1 00:05:21.127: GPRS:1111110000000000:got event [VPDN CONNECTED] in state [VPDN CONNECTING] *Mar 1 00:05:21.127: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:05:21.127: State[IDLE] counter is 0 *Mar 1 00:05:21.127: State[AUTHORIZING] counter is 0 *Mar 1 00:05:21.127: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:21.127: State[PPP NEGOTIATING] counter is 1 *Mar 1 00:05:21.127: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:21.127: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:21.127: GPRS:1111110000000000:state [VPDN CONNECTING->PPP NEGOTIATING] on event [VPDN CONNECTED] *Mar 1 00:05:21.127: GPRS:1111110000000000:Start PPP negotiations on vaccess *Mar 1 00:05:21.131: %LINK-3-UPDOWN: Interface Virtual-Access5, changed state to up *Mar 1 00:05:22.135: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access5, changed state to up *Mar 1 00:05:23.143: GPRS:1111110000000000:IPCP is up *Mar 1 00:05:23.143: GPRS:1111110000000000:LNS allocates 10.10.1.187 for MS *Mar 1 00:05:23.143: GPRS:1111110000000000:IP addr 10.10.1.187 is negotiated for MS *Mar 1 00:05:23.143: GPRS:1111110000000000:DNS - Primary: 10.3.0.1 Secondary: 0.0.0.0 NetBios - Primary: 0.0.0.0, Secondary: 0.0.0.0 *Mar 1 00:05:23.143: GPRS:1111110000000000:PPP connected *Mar 1 00:05:23.143: GPRS:1111110000000000:got event [PPP NEGOTIATED] in state [PPP NEGOTIATING] *Mar 1 00:05:23.143: PPP-REGEN state counters: pending counter is 0 *Mar 1 00:05:23.143: State[IDLE] counter is 0 *Mar 1 00:05:23.143: State[AUTHORIZING] counter is 0 *Mar 1 00:05:23.143: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:23.143: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:23.143: State[PPP CONNECTED] counter is 1 *Mar 1 00:05:23.143: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:23.143: GPRS:1111110000000000:state [PPP NEGOTIATING->PPP CONNECTED] on event [PPP NEGOTIATED] *Mar 1 00:05:23.143: GPRS:1111110000000000:PPP succeeded negotiation, session established *Mar 1 00:05:23.143: GPRS:1111110000000000:Session timer stopped
Example 5
The following example displays both debug events and details related to PPP regeneration processing for a delete PDP context requested received by the GGSN:
Router# debug gprs gtp-director events Router# debug gprs gtp-director details *Mar 1 00:05:52.399: PPP-REGEN state counters: pending counter is 0 *Mar 1 00:05:52.399: State[IDLE] counter is 0 *Mar 1 00:05:52.399: State[AUTHORIZING] counter is 0 *Mar 1 00:05:52.399: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:52.399: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:52.399: State[PPP CONNECTED] counter is 1 *Mar 1 00:05:52.399: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:52.399: GPRS:1111110000000000:PPP regen current state PPP CONNECTED *Mar 1 00:05:52.399: GPRS:1111110000000000:GTP disconnecting the PPP regen session *Mar 1 00:05:52.399: GPRS:1111110000000000:Processing Disconnect PPP regen from reqQ *Mar 1 00:05:52.399: GPRS:1111110000000000:got event [CANCEL REGEN'ED PPP] in state [PPP CONNECTED] *Mar 1 00:05:52.399: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:05:52.399: State[IDLE] counter is 0 *Mar 1 00:05:52.399: State[AUTHORIZING] counter is 0 *Mar 1 00:05:52.399: State[VPDN CONNECTING] counter is 0
DB-879
*Mar 1 00:05:52.399: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:52.399: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:52.399: State[PPP TERMINATING] counter is 1 *Mar 1 00:05:52.399: GPRS:1111110000000000:state [PPP CONNECTED->PPP TERMINATING] on event [CANCEL REGEN'ED PPP] *Mar 1 00:05:52.399: GPRS:1111110000000000:Cancel request after VPND tunnel is up *Mar 1 00:05:52.403: GPRS:1111110000000000:PPP down *Mar 1 00:05:52.403: GPRS:1111110000000000:got event [PPP FAILED] in state [PPP TERMINATING] *Mar 1 00:05:52.407: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:05:52.407: State[IDLE] counter is 1 *Mar 1 00:05:52.407: State[AUTHORIZING] counter is 0 *Mar 1 00:05:52.407: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:52.407: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:52.407: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:52.407: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:52.407: GPRS:1111110000000000:state [PPP TERMINATING->IDLE] on event [PPP FAILED] *Mar 1 00:05:52.407: GPRS:1111110000000000:PPP failed negotiation *Mar 1 00:05:52.407: GPRS:1111110000000000:got event [CLEANUP CONTEXT] in state [IDLE] *Mar 1 00:05:52.407: GPRS:1111110000000000:VPDN to inform PPP regen: DISCONNECTED *Mar 1 00:05:52.407: GPRS:1111110000000000:got event [VPDN DISCONNECTED] in state [IDLE] *Mar 1 00:05:52.407: GPRS:1111110000000000:state [IDLE->IDLE] on event [CLEANUP CONTEXT] *Mar 1 00:05:52.407: GPRS:1111110000000000:Freeing context structure *Mar 1 00:05:52.407: GPRS:1111110000000000:Session timer stopped *Mar 1 00:05:52.407: PPP-REGEN state counters: pending counter is 0 *Mar 1 00:05:52.407: State[IDLE] counter is 0 *Mar 1 00:05:52.407: State[AUTHORIZING] counter is 0 *Mar 1 00:05:52.407: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:52.407: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:52.407: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:52.407: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:52.407: GPRS:1111110000000000:PPP regen context 0x6219F4BC released *Mar 1 00:05:52.407: GPRS:GTP-PPP-REGEN context magic(0x619D4FBC) invalid *Mar 1 00:05:52.407: %LINK-3-UPDOWN: Interface Virtual-Access5, changed state to down *Mar 1 00:05:53.399: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access5, changed state to down
Example 6
The following example displays both debug events and details related to PPP regeneration processing as the GGSN clears a PDP context request:
Router# debug gprs gtp-director events Router# debug gprs gtp-director details *Mar 1 00:06:34.907: PPP-REGEN state counters: pending counter is 0 *Mar 1 00:06:34.907: State[IDLE] counter is 0 *Mar 1 00:06:34.907: State[AUTHORIZING] counter is 0 *Mar 1 00:06:34.907: State[VPDN CONNECTING] counter is 0 *Mar 1 00:06:34.907: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:06:34.907: State[PPP CONNECTED] counter is 1 *Mar 1 00:06:34.907: State[PPP TERMINATING] counter is 0 *Mar 1 00:06:34.907: GPRS:1111110000000000:PPP regen current state PPP CONNECTED *Mar 1 00:06:34.907: GPRS:1111110000000000:GTP disconnecting the PPP regen session *Mar 1 00:06:34.907: GPRS:1111110000000000:Processing Disconnect PPP regen from reqQ *Mar 1 00:06:34.907: GPRS:1111110000000000:got event [CANCEL REGEN'ED PPP] in state [PPP CONNECTED] *Mar 1 00:06:34.907: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:06:34.907: State[IDLE] counter is 0 *Mar 1 00:06:34.907: State[AUTHORIZING] counter is 0 *Mar 1 00:06:34.907: State[VPDN CONNECTING] counter is 0 *Mar 1 00:06:34.907: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:06:34.907: State[PPP CONNECTED] counter is 0 *Mar 1 00:06:34.907: State[PPP TERMINATING] counter is 1
DB-880
December 2010
*Mar 1 00:06:34.907: GPRS:1111110000000000:state [PPP CONNECTED->PPP TERMINATING] on event [CANCEL REGEN'ED PPP] *Mar 1 00:06:34.907: GPRS:1111110000000000:Cancel request after VPND tunnel is up *Mar 1 00:06:34.911: GPRS:1111110000000000:PPP down *Mar 1 00:06:34.911: GPRS:1111110000000000:got event [PPP FAILED] in state [PPP TERMINATING] *Mar 1 00:06:34.915: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:06:34.915: State[IDLE] counter is 1 *Mar 1 00:06:34.915: State[AUTHORIZING] counter is 0 *Mar 1 00:06:34.915: State[VPDN CONNECTING] counter is 0 *Mar 1 00:06:34.915: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:06:34.915: State[PPP CONNECTED] counter is 0 *Mar 1 00:06:34.915: State[PPP TERMINATING] counter is 0 *Mar 1 00:06:34.915: GPRS:1111110000000000:state [PPP TERMINATING->IDLE] on event [PPP FAILED] *Mar 1 00:06:34.915: GPRS:1111110000000000:PPP failed negotiation *Mar 1 00:06:34.915: GPRS:1111110000000000:got event [CLEANUP CONTEXT] in state [IDLE] *Mar 1 00:06:34.915: GPRS:1111110000000000:VPDN to inform PPP regen: DISCONNECTED *Mar 1 00:06:34.915: GPRS:1111110000000000:got event [VPDN DISCONNECTED] in state [IDLE] *Mar 1 00:06:34.915: GPRS:1111110000000000:state [IDLE->IDLE] on event [CLEANUP CONTEXT] *Mar 1 00:06:34.915: GPRS:1111110000000000:Freeing context structure *Mar 1 00:06:34.915: GPRS:1111110000000000:Session timer stopped *Mar 1 00:06:34.915: PPP-REGEN state counters: pending counter is 0 *Mar 1 00:06:34.915: State[IDLE] counter is 0 *Mar 1 00:06:34.915: State[AUTHORIZING] counter is 0 *Mar 1 00:06:34.915: State[VPDN CONNECTING] counter is 0 *Mar 1 00:06:34.915: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:06:34.915: State[PPP CONNECTED] counter is 0 *Mar 1 00:06:34.915: State[PPP TERMINATING] counter is 0 *Mar 1 00:06:34.915: GPRS:1111110000000000:PPP regen context 0x62196E10 released *Mar 1 00:06:34.915: GPRS:GTP-PPP-REGEN context magic(0x619D4FBC) invalid *Mar 1 00:06:34.915: %LINK-3-UPDOWN: Interface Virtual-Access3, changed state to down *Mar 1 00:06:35.907: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to down
DB-881
Syntax Description
Defaults
Command History
Modification This command was introduced. This command was incorporated in Cisco IOS Release 12.2(8)YD. This command was incorporated in Cisco IOS Release 12.2(8)YW. This command was incorporated in Cisco IOS Release 12.3(2)XB. This command was incorporated in Cisco IOS Release 12.3(8)XU. This command was incorporated in Cisco IOS Release 12.3(11)YJ. This command was incorporated in Cisco IOS Release 12.3(14)YQ. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with communication between a RADIUS server and the GGSN.
Caution
Because the debug gprs radius command generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples
The following example enables the display of debug messages related to RADIUS processing on the GGSN:
Router# debug gprs radius
DB-882
December 2010
Syntax Description
Displays debug messages related to GTP-SR. Displays errors related to GTP-SR. Displays events related to GTP-SR. Displays packets related to GTP-SR packets.
Command History
Modification This command was introduced. This command was incorporated in Cisco IOS Release 12.3(14)YQ. This command was integrated into Cisco IOS Release 12.4(9)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command displays debug level messages, errors, events, or packets for GTP-SR. It is useful for system operators and development engineers if problems are encountered with communication between the two GGSNs configured as an redundant pair and on which GTP-SR is enabled.
Examples
Example 1
The following sample outputs is for a GGSN failover and switchover of Standby to Active. There is no PDP context involved in this debug collection. Active GGSN:
Router-a#show gprs redundancy GPRS redundancy is enabled and Unit-Status is Standby Redundancy Transport Infrastructure status Redundancy Infrastructure state: Peer Redundancy Infrastructure state: GGSN Redundancy system up since: Time of last switchover: Total Number of Switchovers: GPRS Redundancy Statistics Last cleared: never CheckPointed-From-Active Statistics
DB-883
Total Number of Messages: Number of Context Setup messages: Number of Context Modify messages: Number of Context Remove messages: Number of Path Setup messages: Number of Path Modify messages: Number of Path Remove messages: Number of CGF Ready messages: Number of CGF Modify messages: Number of CGF Remove messages: Number of Internal State messages:
129 19 3 19 34 5 34 1 0 0 7
Router-a#debug gprs redundancy GPRS CF packets debugging is on GPRS CF events debugging is on GPRS CF errors debugging is on GPRS CF debug debugging is on Router-a# Router-a# Router-a# MWAM 10/2: 000064: Jun 1 2006 18:19:00.975 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.1100 Grp 51 state Standby -> Active MWAM 10/2: 000065: Jun 1 2006 18:19:00.975 EDT: GTP-SR: RF_Status=403-RF_STATUS_MAINTENANCE_ENABLE RFState=9-ACTIVE-FAST operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000066: Jun 1 2006 18:19:00.979 EDT: GTP-SR: RF_Event=200-RF_PROG_ACTIVE_FAST RFState=9-ACTIVE-FAST operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000067: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Received RF Progression Active Fast MWAM 10/2: 000068: Jun 1 2006 18:19:00.979 EDT: GTP-SR: RF_Event=201-RF_PROG_ACTIVE_DRAIN RFState=10-ACTIVE-DRAIN operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000069: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Received RF Progression Active Drain MWAM 10/2: 000070: Jun 1 2006 18:19:00.979 EDT: GTP-SR: RF_Event=202-RF_PROG_ACTIVE_PRECONFIG RFState=11-ACTIVE_PRECONFIG operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000071: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Received RF Progression Active PreConfig MWAM 10/2: 000072: Jun 1 2006 18:19:00.979 EDT: GTP-SR: RF_Event=203-RF_PROG_ACTIVE_POSTCONFIG RFState=12-ACTIVE_POSTCONFIG operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000073: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Received RF Progression Active PostConfig MWAM 10/2: 000074: Jun 1 2006 18:19:00.979 EDT: GTP-SR: RF_Event=204-RF_PROG_ACTIVE RFState=13-ACTIVE operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000075: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Received RF Progression Active MWAM 10/2: 000076: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Start of the Standby-to-Active transition MWAM 10/2: 000077: Jun 1 2006 18:19:00.979 EDT: GTP_SR: Old State Standby,Event Active Fast Received, New State Active MWAM 10/2: 000078: Jun 1 2006 18:19:00.979 EDT: GTP-SR:Context Type OWN, Handler Sync, Context Event OWN Ready, Context Sub Event No Sub Event MWAM 10/2: 000079: Jun 1 2006 18:19:00.979 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000080: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Event OWN Ready, Sub Event No Sub Event MWAM 10/2: 000081: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Removing element from state-list Initialized, final count 2 MWAM 10/2: 000082: Jun 1 2006 18:19:00.979 EDT: GTP-SR: adding element in state-list Bulk Synch Ready, final count 2 MWAM 10/2: 000083: Jun 1 2006 18:19:00.979 EDT: GTP-SR:Context Type CGF, Handler Sync, Context Event CGF Ready, Context Sub Event No Sub Event MWAM 10/2: 000084: Jun 1 2006 18:19:00.979 EDT: GTP-SR:State of Redundancy Context is Initialized
DB-884
December 2010
MWAM 10/2: 000085: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Event CGF Ready, Sub Event No Sub Event MWAM 10/2: 000086: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Removing element from state-list Initialized, final count 1 MWAM 10/2: 000087: Jun 1 2006 18:19:00.979 EDT: GTP-SR: adding element in state-list Bulk Synch Ready, final count 3 MWAM 10/2: 000088: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Invalid shdb 0x0 MWAM 10/2: 000089: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Transition CG 10.0.250.114 to (state 0) MWAM 10/2: 000090: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Invalid shdb 0x0 MWAM 10/2: 000091: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Transition CG 10.0.250.115 to (state 0) MWAM 10/2: 000092: Jun 1 2006 18:19:00.983 EDT: GTP-SR: SHDB AVL tree cleanup to start in 10 sec MWAM 10/2: 000093: Jun 1 2006 18:19:00.983 EDT: GTP-SR: Completion of Standby-to-Active transition MWAM 10/2: 000094: Jun 1 2006 18:19:00.983 EDT: GTP-SR: Chkpt Status Flow Off Indication MWAM 10/2: 000095: Jun 1 2006 18:19:00.987 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.301 Grp 51 state Standby -> Active MWAM 10/2: 000096: Jun 1 2006 18:19:00.987 EDT: GTP-SR: RF_Status=400-RF_STATUS_PEER_PRESENCE RFState=13-ACTIVE operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000097: Jun 1 2006 18:19:00.987 EDT: GTP-SR: zero elements to move to other list MWAM 10/2: 000098: Jun 1 2006 18:19:00.987 EDT: GTP-SR: zero elements to move to other list MWAM 10/2: 000099: Jun 1 2006 18:19:00.987 EDT: GTP-SR: RF_Status=401-RF_STATUS_PEER_COMM RFState=13-ACTIVE operand=0 RFPeerState=1-DISABLED MWAM 10/2: 000100: Jun 1 2006 18:19:01.107 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.1151 Grp 51 state Standby -> Active MWAM 10/2: 000101: Jun 1 2006 18:19:01.155 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.250 Grp 51 state Standby -> Active MWAM 10/2: 000102: Jun 1 2006 18:19:01.295 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.1101 Grp 51 state Standby -> Active MWAM 10/2: 000103: Jun 1 2006 18:19:01.355 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.1251 Grp 51 state Standby -> Active MWAM 10/2: 000104: Jun 1 2006 18:19:01.451 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.1201 Grp 51 state Standby -> Active MWAM 10/2: 000105: Jun 1 2006 18:19:01.459 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.220 Grp 51 state Standby -> Active Router-2# MWAM 10/2: 000106: Jun 1 2006 18:19:10.983 EDT: GTP-SR: SHDB AVL tree cleanup has 3 nodes removed, 0 leftover Router-a# Router-a# Router-a# MWAM 10/2: 000107: Jun 1 2006 18:20:25.947 EDT: GTP-SR: Chkpt Status Flow Off Indication MWAM 10/2: 000108: Jun 1 2006 18:20:25.947 EDT: GTP-SR: RF_Status=400-RF_STATUS_PEER_PRESENCE RFState=13-ACTIVE operand=1 RFPeerState=1-DISABLED MWAM 10/2: 000109: Jun 1 2006 18:20:25.947 EDT: GTP-SR: RF_Status=401-RF_STATUS_PEER_COMM RFState=13-ACTIVE operand=1 RFPeerState=1-DISABLED MWAM 10/2: 000110: Jun 1 2006 18:20:25.947 EDT: GTP-SR: RF_Event=300-RF_PROG_PLATFORM_SYNC RFState=13-ACTIVE operand=0 RFPeerState=0-UNKNOWN MWAM 10/2: 000111: Jun 1 2006 18:20:25.947 EDT: GTP-SR: Received RF Progression Platform Sync MWAM 10/2: 000112: Jun 1 2006 18:20:53.899 EDT: GTP-SR: RF_Event=102-RF_PROG_STANDBY_CONFIG RFState=13-ACTIVE operand=0 RFPeerState=5-STANDBY COLD-CONFIG MWAM 10/2: 000113: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Received RF Progression Standby Config MWAM 10/2: 000114: Jun 1 2006 18:20:53.899 EDT: GTP-SR: RF_Event=103-RF_PROG_STANDBY_FILESYS RFState=13-ACTIVE operand=0 RFPeerState=6-STANDBY COLD-FILESYS MWAM 10/2: 000115: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Received RF Progression Stadnby Filesys
DB-885
MWAM 10/2: 000116: Jun 1 2006 18:20:53.899 EDT: GTP-SR: RF_Event=104-RF_PROG_STANDBY_BULK RFState=13-ACTIVE operand=0 RFPeerState=7-STANDBY COLD-BULK MWAM 10/2: 000117: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Received RF Progression Standby Bulk MWAM 10/2: 000118: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Active GGSN sending Bulk Sync finished Msg MWAM 10/2: 000119: Jun 1 2006 18:20:53.899 EDT: GTP-SR: packing csg_path vaddr: 10.0.250.91 MWAM 10/2: 000120: Jun 1 2006 18:20:53.899 EDT: GTP-SR: packing csg_path port: 4386 MWAM 10/2: 000121: Jun 1 2006 18:20:53.899 EDT: GTP-SR: packing csg_path state: 1 MWAM 10/2: 000122: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000123: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Removing element from state-list Bulk Synch Ready, final count 2 MWAM 10/2: 000124: Jun 1 2006 18:20:53.899 EDT: GTP-SR: adding element in state-list Synched, final count 1 MWAM 10/2: 000125: Jun 1 2006 18:20:53.899 EDT: GTP-SR: sync next charging id 0x1C0AA436, local rsn 0x6B76EBDE MWAM 10/2: 000126: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Packing Pair Boot time 21:29:21 EDT Aug 19 2000 MWAM 10/2: 000127: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Packing Switcover Count 3 MWAM 10/2: 000128: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Packing local restart_count 21 MWAM 10/2: 000129: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000130: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Removing element from state-list Bulk Synch Ready, final count 1 MWAM 10/2: 000131: Jun 1 2006 18:20:53.899 EDT: GTP-SR: adding element in state-list Synched, final count 2 MWAM 10/2: 000132: Jun 1 2006 18:20:53.899 EDT: GTP-SR: sync cgf gw 10.0.250.114, operatemode NOT ACTIVE, nextseq 0x7530 MWAM 10/2: 000133: Jun 1 2006 18:20:53.899 EDT: GTP-SR: sync cgf gw 10.0.250.115, operatemode NOT ACTIVE, nextseq 0x7530 MWAM 10/2: 000134: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000135: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Removing element from state-list Bulk Synch Ready, final count 0 MWAM 10/2: 000136: Jun 1 2006 18:20:53.899 EDT: GTP-SR: adding element in state-list Synched, final count 3 MWAM 10/2: 000137: Jun 1 2006 18:20:53.899 EDT: GTP-SR:Active took time of 0 msec to transfer data for bulk sync MWAM 10/2: 000138: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Empty list to sync MWAM 10/2: 000139: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Redundancy RF Event Received is Standby Bulk Sync End MWAM 10/2: 000140: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Redundancy Event is Invalid MWAM 10/2: 000141: Jun 1 2006 18:20:53.899 EDT: GTP-SR: RF_Event=105-RF_PROG_STANDBY_HOT RFState=13-ACTIVE operand=0 RFPeerState=8-STANDBY HOT MWAM 10/2: 000142: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Received RF Progression Standby Hot Router-b Router-b#show gprs redundancy GPRS redundancy is enabled and Unit-Status is Active Redundancy Transport Infrastructure status Redundancy Infrastructure state: Peer Redundancy Infrastructure state: GGSN Redundancy system up since: Time of last switchover: Total Number of Switchovers: GPRS Redundancy Statistics Last cleared: never CheckPointed-To-Standby Statistics Total Number of Messages: Number of Context Setup messages: 3 0
DB-886
December 2010
of of of of of of of of of
Context Modify messages: Context Remove messages: Path Setup messages: Path Modify messages: Path Remove messages: CGF Ready messages: CGF Modify messages: CGF Remove messages: Internal State messages:
0 0 0 0 0 1 0 0 1
Example 2
The following sample outputs is for PDP context setup, prepaid user traffic, and then PDP context teardown. The debug is given for both Active and Standby GGSN. There is no GGSN switchover. Active GGSN:
Router-a#debug gprs redundancy GPRS CF packets debugging is on GPRS CF events debugging is on GPRS CF errors debugging is on GPRS CF debug debugging is on Router-a#show gprs redundancy GPRS redundancy is enabled and Unit-Status is Active Redundancy Transport Infrastructure status Redundancy Infrastructure state: Peer Redundancy Infrastructure state: GGSN Redundancy system up since: Time of last switchover: Total Number of Switchovers: GPRS Redundancy Statistics Last cleared: never CheckPointed-To-Standby Statistics Total Number of Messages: Number of Context Setup messages: Number of Context Modify messages: Number of Context Remove messages: Number of Path Setup messages: Number of Path Modify messages: Number of Path Remove messages: Number of CGF Ready messages: Number of CGF Modify messages: Number of CGF Remove messages: Number of Internal State messages: Router-a# MWAM 10/2: 000073: Aug 24 2000 23:18:55.947 (0x24D2FC3C) is (0x3A000001) MWAM 10/2: 000074: Aug 24 2000 23:18:55.963 context MWAM 10/2: 000075: Aug 24 2000 23:18:55.963 Initialized, final count 2 MWAM 10/2: 000076: Aug 24 2000 23:18:55.963 context MWAM 10/2: 000077: Aug 24 2000 23:18:55.963 Initialized, final count 3 MWAM 10/2: 000078: Aug 24 2000 23:18:55.963 Context Event Path Setup, Context Sub Event 3 0 0 0 0 0 0 1 0 0 1
EDT: GTP-SR:pdpmcb handle for pdpmcb EDT: GTP-SR: Need to allocate redundancy EDT: GTP-SR: adding element in state-list EDT: GTP-SR: Need to allocate redundancy EDT: GTP-SR: adding element in state-list EDT: GTP-SR:Context Type No Sub Event Path, Handler Sync,
DB-887
MWAM 10/2: 000079: Aug 24 2000 23:18:55.963 Initialized MWAM 10/2: 000080: Aug 24 2000 23:18:55.963 Sub Event MWAM 10/2: 000081: Aug 24 2000 23:18:55.963 Initialized, final count 2 MWAM 10/2: 000082: Aug 24 2000 23:18:55.963 Dynamic Sync Ready, final count 1 MWAM 10/2: 000083: Aug 24 2000 23:18:55.963 context MWAM 10/2: 000084: Aug 24 2000 23:18:55.963 Initialized, final count 3 MWAM 10/2: 000085: Aug 24 2000 23:18:55.963 Context Event Path Setup, Context Sub Event MWAM 10/2: 000086: Aug 24 2000 23:18:55.963 Initialized MWAM 10/2: 000087: Aug 24 2000 23:18:55.963 Sub Event MWAM 10/2: 000088: Aug 24 2000 23:18:55.963 Initialized, final count 2 MWAM 10/2: 000089: Aug 24 2000 23:18:55.963 Dynamic Sync Ready, final count 2 MWAM 10/2: 000090: Aug 24 2000 23:18:55.963 MWAM 10/2: 000091: Aug 24 2000 23:18:55.963 port 2123 MWAM 10/2: 000092: Aug 24 2000 23:18:55.963 port 2123 MWAM 10/2: 000093: Aug 24 2000 23:18:55.963 MWAM 10/2: 000094: Aug 24 2000 23:18:55.963 MWAM 10/2: 000095: Aug 24 2000 23:18:55.963 pathcb->restart_count_remote 1 MWAM 10/2: 000096: Aug 24 2000 23:18:55.963 create: allowed: 63, packed: 23 MWAM 10/2: 000097: Aug 24 2000 23:18:55.963 MWAM 10/2: 000098: Aug 24 2000 23:18:55.963 Dynamic Sync Ready, final count 1 MWAM 10/2: 000099: Aug 24 2000 23:18:55.963 Synched, final count 4 MWAM 10/2: 000100: Aug 24 2000 23:18:55.963 MWAM 10/2: 000101: Aug 24 2000 23:18:55.963 port 2152 MWAM 10/2: 000102: Aug 24 2000 23:18:55.963 port 2152 MWAM 10/2: 000103: Aug 24 2000 23:18:55.967 MWAM 10/2: 000104: Aug 24 2000 23:18:55.967 MWAM 10/2: 000105: Aug 24 2000 23:18:55.967 pathcb->restart_count_remote 0 MWAM 10/2: 000106: Aug 24 2000 23:18:55.967 create: allowed: 63, packed: 23 MWAM 10/2: 000107: Aug 24 2000 23:18:55.967 MWAM 10/2: 000108: Aug 24 2000 23:18:55.967 Dynamic Sync Ready, final count 0 MWAM 10/2: 000109: Aug 24 2000 23:18:55.967 Synched, final count 5 MWAM 10/2: 000110: Aug 24 2000 23:18:55.967 MWAM 10/2: 000111: Aug 24 2000 23:18:55.967 MWAM 10/2: 000112: Aug 24 2000 23:19:01.583 ID 4 username 100000000000000 on APN ms-apn MWAM 10/2: 000113: Aug 24 2000 23:19:01.583 context MWAM 10/2: 000114: Aug 24 2000 23:19:01.583 Initialized, final count 3 MWAM 10/2: 000115: Aug 24 2000 23:19:01.583 Initialized, final count 2
EDT: GTP-SR:State of Redundancy Context is EDT: GTP-SR: Event Path Setup, Sub Event No EDT: GTP-SR: Removing element from state-list EDT: GTP-SR: adding element in state-list EDT: GTP-SR: Need to allocate redundancy EDT: GTP-SR: adding element in state-list EDT: GTP-SR:Context Type Path, Handler Sync, No Sub Event EDT: GTP-SR:State of Redundancy Context is EDT: GTP-SR: Event Path Setup, Sub Event No EDT: GTP-SR: Removing element from state-list EDT: GTP-SR: adding element in state-list EDT: GTP-SR:packing pathcb->gtpv 1 EDT: GTP-SR:Local IP address 166.11.0.11, and EDT: GTP-SR:Remote IP address 10.10.50.3, and EDT: GTP-SR:packing pathcb->num_data_socks 0 EDT: GTP-SR:packing pathcb->flags 9 EDT: GTP-SR:packing EDT: GTP-SR: Different lengths during path EDT: GTP-SR: Ckpt Message was sucessfully sent EDT: GTP-SR: Removing element from state-list EDT: GTP-SR: adding element in state-list EDT: GTP-SR:packing pathcb->gtpv 1 EDT: GTP-SR:Local IP address 166.11.0.11, and EDT: GTP-SR:Remote IP address 10.10.50.3, and EDT: GTP-SR:packing pathcb->num_data_socks 0 EDT: GTP-SR:packing pathcb->flags 8 EDT: GTP-SR:packing EDT: GTP-SR: Different lengths during path EDT: GTP-SR: Ckpt Message was sucessfully sent EDT: GTP-SR: Removing element from state-list EDT: GTP-SR: adding element in state-list EDT: GTP-SR: Empty list to sync EDT: GTP-SR: Empty list to sync EDT: GTP-SR: Creating red context for category EDT: GTP-SR: Need to allocate redundancy EDT: GTP-SR: adding element in state-list EDT: GTP-SR: Removing element from state-list
DB-888
December 2010
MWAM 10/2: 000116: Aug 24 2000 23:19:01.583 EDT: GTP-SR: adding element in state-list Synched, final count 6 MWAM 10/2: 000117: Aug 24 2000 23:19:01.583 EDT: GPRS:0100000000000050:shdb 0x95000008 created for category 4 (handle 0xD0000001) MWAM 10/2: 000118: Aug 24 2000 23:19:01.591 EDT: GTP-SR: Don't checkpoint QP4QR Clear for Create/Update after a Quota Push Resp MWAM 10/2: 000119: Aug 24 2000 23:19:01.591 EDT: GTP-SR:Context Type PDP, Handler Sync, Context Event Context Setup, Context Sub Event No Sub Event MWAM 10/2: 000120: Aug 24 2000 23:19:01.591 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000121: Aug 24 2000 23:19:01.591 EDT: GTP-SR: Event Context Setup, Sub Event No Sub Event MWAM 10/2: 000122: Aug 24 2000 23:19:01.591 EDT: GTP-SR: Removing element from state-list Initialized, final count 1 MWAM 10/2: 000123: Aug 24 2000 23:19:01.591 EDT: GTP-SR: adding element in state-list Dynamic Sync Ready, final count 1 MWAM 10/2: 000124: Aug 24 2000 23:19:01.591 EDT: GTP-SR: for pdpmcb: 221 bytes to be packed MWAM 10/2: 000125: Aug 24 2000 23:19:01.591 EDT: GTP-SR: pdpmcb bitmap = 14346 MWAM 10/2: 000126: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->user-name 91100000000000000 MWAM 10/2: 000127: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->msisdn 9101000000000000F000 MWAM 10/2: 000128: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->selection_mode 0 MWAM 10/2: 000129: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->remove_staticIP 0 MWAM 10/2: 000130: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->llcframenum 0 MWAM 10/2: 000131: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->idle_timeout 3600 MWAM 10/2: 000132: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->session_timeout 0 MWAM 10/2: 000133: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpmcb_handle 973078529 MWAM 10/2: 000134: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->shdb 2080374789 MWAM 10/2: 000135: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing apn_name ms-apn MWAM 10/2: 000136: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing apnvalue ms-apn MWAM 10/2: 000137: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->teid 4194305 MWAM 10/2: 000138: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->imsi 01000000000000F0 MWAM 10/2: 000139: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.static_addr_allocated 0 MWAM 10/2: 000140: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.dynamic_addr_allocated 1 MWAM 10/2: 000141: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.dynamic_addr_requested 1 MWAM 10/2: 000142: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.addr_source 3 MWAM 10/2: 000143: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.allocated_prefix_len 16 MWAM 10/2: 000144: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.aggregate_prefix_len 16 MWAM 10/2: 000145: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.pdp_type_org 1 MWAM 10/2: 000146: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.pdp_type_num 33 MWAM 10/2: 000147: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.addrlen 6 MWAM 10/2: 000148: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb-ggsn_addr_si 166.11.0.11 MWAM 10/2: 000149: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb-ggsn_addr_data 166.11.0.11 MWAM 10/2: 000150: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->msisdn_len 9nGTP-SR:packing aaa charging profile index -1, MWAM 10/2: 000151: Aug 24 2000 23:19:01.591 EDT: GTP-SR:pdpmcb encoded len_t 0 MWAM 10/2: 000152: Aug 24 2000 23:19:01.591 EDT: GTP-SR: pdpcb bitmap = 0 MWAM 10/2: 000153: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->teid_cntl_remote 1 MWAM 10/2: 000154: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->teid_data_local 4194306
DB-889
MWAM 10/2: 000155: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->teid_data_remote 1000 MWAM 10/2: 000156: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->tid 0100000000000050 MWAM 10/2: 000157: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing naspi = 5 MWAM 10/2: 000158: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->internal_flags 9175041 MWAM 10/2: 000159: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->mnrgflag 0 MWAM 10/2: 000160: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->open_cdr_sent 0 MWAM 10/2: 000161: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->charging_reserved 0 MWAM 10/2: 000162: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->pri 1 MWAM 10/2: 000163: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->fastswitchable 0 MWAM 10/2: 000164: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb-sgsn_addr_sig 10.10.50.3 MWAM 10/2: 000165: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb-sgsn_addr_data 10.10.50.3 MWAM 10/2: 000166: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->sequence_sig 1 MWAM 10/2: 000167: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->fl_sig_up 0 MWAM 10/2: 000168: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->fl_data1_up 0 MWAM 10/2: 000169: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->fl_sig_down 0 MWAM 10/2: 000170: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->fl_data1_down 0 MWAM 10/2: 000171: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->fl_data2 0 MWAM 10/2: 000172: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->cause 128 MWAM 10/2: 000173: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->restart_count 0 MWAM 10/2: 000174: Aug 24 2000 23:19:01.591 EDT: GTP-SR: packing pdpcb->create_time Aug 24 2000 23:18:56 MWAM 10/2: 000175: Aug 24 2000 23:19:01.591 EDT: GTP-SR: packing pdpcb->last_access_time Aug 24 2000 23:18:56 MWAM 10/2: 000176: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->gtpv1_qos_req.qos_profile 152109353l MWAM 10/2: 000177: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->gtpv1_qos_neg.qos_profile 152109353l MWAM 10/2: 000178: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->teid_cntl_remote 1 MWAM 10/2: 000179: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->teid_data_local 4194306 MWAM 10/2: 000180: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->teid_data_remote 1000 MWAM 10/2: 000181: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->charging_id 471179447 MWAM 10/2: 000182: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->cdr_recseqnum 0 MWAM 10/2: 000183: Aug 24 2000 23:19:01.591 EDT: GTP-SR: packing of pdpcb->reorder_required FF MWAM 10/2: 000184: Aug 24 2000 23:19:01.591 EDT: GPRS:0100000000000050: GTP-SR: Successfully pack PDP MWAM 10/2: 000185: Aug 24 2000 23:19:01.591 EDT: GTP-SR: rulebase ID MS packed MWAM 10/2: 000186: Aug 24 2000 23:19:01.591 EDT: GTP-SR: cc_session ccfh 0 failover_supported 1 reqnum 1 packed MWAM 10/2: 000187: Aug 24 2000 23:19:01.591 EDT: GTP-SR: cc_session dest_host ips-clcis1.cisco.com dest_realm cisco.com packed MWAM 10/2: 000188: Aug 24 2000 23:19:01.591 EDT: GTP-SR: category ID 4 packed: MWAM 10/2: 000189: Aug 24 2000 23:19:01.591 EDT: GTP-SR: sync data len 164 MWAM 10/2: 000190: Aug 24 2000 23:19:01.591 EDT: GTP-SR: active shdb 0x95000008 MWAM 10/2: 000191: Aug 24 2000 23:19:01.591 EDT: GTP-SR: CSG session ID 27599459844129 MWAM 10/2: 000192: Aug 24 2000 23:19:01.591 EDT: GTP-SR: chrg last svc rec seqnum 0 MWAM 10/2: 000193: Aug 24 2000 23:19:01.591 EDT: GTP-SR: category state AUTHORIZED MWAM 10/2: 000194: Aug 24 2000 23:19:01.591 EDT: GTP-SR: category state trigger flags 0x3 MWAM 10/2: 000195: Aug 24 2000 23:19:01.591 EDT: GTP-SR: category sub flags 0x0 MWAM 10/2: 000196: Aug 24 2000 23:19:01.591 EDT: GTP-SR: sync flag 0x0 MWAM 10/2: 000197: Aug 24 2000 23:19:01.591 EDT: GTP-SR: quotas included MWAM 10/2: 000198: Aug 24 2000 23:19:01.591 EDT: GTP-SR: last req timestamp 0 MWAM 10/2: 000199: Aug 24 2000 23:19:01.591 EDT: GTP-SR: last req seqnum 0 MWAM 10/2: 000200: Aug 24 2000 23:19:01.595 EDT: GTP-SR: Ckpt Message was sucessfully sent
DB-890
December 2010
MWAM 10/2: 000201: Aug 24 2000 23:19:01.595 EDT: GTP-SR: Removing element from state-list Dynamic Sync Ready, final count 0 MWAM 10/2: 000202: Aug 24 2000 23:19:01.595 EDT: GTP-SR: adding element in state-list Synched, final count 7 MWAM 10/2: 000203: Aug 24 2000 23:19:01.595 EDT: GTP-SR: Empty list to sync MWAM 10/2: 000204: Aug 24 2000 23:19:03.939 EDT: GTP-SR:Context Type PDP, Handler Sync, Context Event Context Setup, Context Sub Event No Sub Event MWAM 10/2: 000205: Aug 24 2000 23:19:03.939 EDT: GTP-SR:State of Redundancy Context is Synched MWAM 10/2: 000206: Aug 24 2000 23:19:03.939 EDT: GTP-SR: Event Context Setup, Sub Event No Sub Event MWAM 10/2: 000207: Aug 24 2000 23:19:04.463 EDT: GTP-SR: Checkpoint SGSN init deletion via a category before final MCB deletion MWAM 10/2: 000208: Aug 24 2000 23:19:04.463 EDT: GTP-SR:Context Type Category, Handler Update, Context Event Category update, Context Sub Event No Sub Event MWAM 10/2: 000209: Aug 24 2000 23:19:04.463 EDT: GTP-SR:State of Redundancy Context is Synched MWAM 10/2: 000210: Aug 24 2000 23:19:04.463 EDT: GTP-SR: Event Category update, Sub Event No Sub Event MWAM 10/2: 000211: Aug 24 2000 23:19:04.463 EDT: GTP-SR: MCB internal flags 0x5802 packed MWAM 10/2: 000212: Aug 24 2000 23:19:04.463 EDT: GTP-SR: cc_session reqnum 1 packed MWAM 10/2: 000213: Aug 24 2000 23:19:04.463 EDT: GTP-SR: category ID 4 packed: MWAM 10/2: 000214: Aug 24 2000 23:19:04.463 EDT: GTP-SR: sync data len 52 MWAM 10/2: 000215: Aug 24 2000 23:19:04.463 EDT: GTP-SR: active shdb 0x95000008 MWAM 10/2: 000216: Aug 24 2000 23:19:04.463 EDT: GTP-SR: CSG session ID 27599459844129 MWAM 10/2: 000217: Aug 24 2000 23:19:04.463 EDT: GTP-SR: chrg last svc rec seqnum 0 MWAM 10/2: 000218: Aug 24 2000 23:19:04.463 EDT: GTP-SR: category state PENDING_SERVICE_STOP MWAM 10/2: 000219: Aug 24 2000 23:19:04.463 EDT: GTP-SR: category state trigger flags 0x3 MWAM 10/2: 000220: Aug 24 2000 23:19:04.463 EDT: GTP-SR: category sub flags 0x0 MWAM 10/2: 000221: Aug 24 2000 23:19:04.463 EDT: GTP-SR: sync flag 0xA MWAM 10/2: 000222: Aug 24 2000 23:19:04.463 EDT: GTP-SR: quotas not included MWAM 10/2: 000223: Aug 24 2000 23:19:04.463 EDT: GTP-SR: last req timestamp 0 MWAM 10/2: 000224: Aug 24 2000 23:19:04.463 EDT: GTP-SR: last req seqnum 0 MWAM 10/2: 000225: Aug 24 2000 23:19:04.463 EDT: GTP-SR: Different lengths during category sync: allowed 188, packed 56 MWAM 10/2: 000226: Aug 24 2000 23:19:04.463 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000227: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Checkpoint final MCB deletion after sending a CCR Final MWAM 10/2: 000228: Aug 24 2000 23:19:04.467 EDT: GTP-SR:Context Type PDP, Handler Delete, Context Event Context Remove, Context Sub Event No Sub Event MWAM 10/2: 000229: Aug 24 2000 23:19:04.467 EDT: GTP-SR:State of Redundancy Context is Synched MWAM 10/2: 000230: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Event Context Remove, Sub Event No Sub Event MWAM 10/2: 000231: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Checkpoint final MCB deletion MWAM 10/2: 000232: Aug 24 2000 23:19:04.467 EDT: GTP-SR:Context Type PDP, Handler Delete, Context Event Context Remove, Context Sub Event No Sub Event MWAM 10/2: 000233: Aug 24 2000 23:19:04.467 EDT: GTP-SR:State of Redundancy Context is Synched MWAM 10/2: 000234: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Event Context Remove, Sub Event No Sub Event MWAM 10/2: 000235: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Different lengths during PDP delete: allowed: 40, packed: 0 MWAM 10/2: 000236: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000237: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Removing element from state-list Synched, final count 6 MWAM 10/2: 000238: Aug 24 2000 23:19:04.467 EDT: GTP-SR: adding element in state-list Delete, final count 1 MWAM 10/2: 000239: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Removing element from state-list Delete, final count 0 MWAM 10/2: 000240: Aug 24 2000 23:19:04.467 EDT: GTP-SR: No redundancy context for sending a down event to standby
DB-891
MWAM 10/2: 000241: Aug 24 2000 23:19:04.471 EDT: GTP-SR: Removing element from state-list Synched, final count 5 Router-a# Router-a#
Standby GGSN:
Router-b#debug gprs redundancy GPRS CF packets debugging is on GPRS CF events debugging is on GPRS CF errors debugging is on GPRS CF debug debugging is on Router-b#sh gprs redun GPRS redundancy is enabled and Unit-Status is Standby Redundancy Transport Infrastructure status Redundancy Infrastructure state: Peer Redundancy Infrastructure state: GGSN Redundancy system up since: Time of last switchover: Total Number of Switchovers: GPRS Redundancy Statistics Last cleared: never CheckPointed-From-Active Statistics Total Number of Messages: Number of Context Setup messages: Number of Context Modify messages: Number of Context Remove messages: Number of Path Setup messages: Number of Path Modify messages: Number of Path Remove messages: Number of CGF Ready messages: Number of CGF Modify messages: Number of CGF Remove messages: Number of Internal State messages: Router-b# MWAM 10/2: 000065: Jun 1 2006 Create Redundancy Context MWAM 10/2: 000066: Jun 1 2006 MWAM 10/2: 000067: Jun 1 2006 context MWAM 10/2: 000068: Jun 1 2006 Initialized, final count 4 MWAM 10/2: 000069: Jun 1 2006 org_len=63, len=63 MWAM 10/2: 000070: Jun 1 2006 8 4B MWAM 10/2: 000071: Jun 1 2006 0 0 MWAM 10/2: 000072: Jun 1 2006 0 0 MWAM 10/2: 000073: Jun 1 2006 0 MWAM 10/2: 000074: Jun 1 2006 MWAM 10/2: 000075: Jun 1 2006 port 2123 MWAM 10/2: 000076: Jun 1 2006 port 2123 3 0 0 0 0 0 0 1 0 0 1
18:28:06.591 EDT: GTP-SR: Redundancy RF Event Received is 18:28:06.591 EDT: GTP-SR: Redundancy Event is Path Setup 18:28:06.591 EDT: GTP-SR: Need to allocate redundancy 18:28:06.591 EDT: GTP-SR: adding element in state-list 18:28:06.591 EDT: GTP-SR Packet Dump: Len for dump: 18:28:06.591 EDT: 18:28:06.591 EDT: 18:28:06.591 EDT: 18:28:06.595 EDT: 1 A 0 0 0 A 0 0 0 0 0 8 0 0 0 0 0 0 0 0 9 0 0 0 1 0 0 0 A6 B 0 0 0 0 0 0 0 0 0 0 B 0 0 0
32 3 0 0 0 0
4B 1 0 0 0 0
18:28:06.595 EDT: GTP-SR: un-packing u_path->gtpv 1 18:28:06.595 EDT: GTP-SR: Local IP address 166.11.0.11, and 18:28:06.595 EDT: GTP-SR: Remote IP address 10.10.50.3, and
DB-892
December 2010
MWAM 10/2: 000077: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing u_path->num_data_socks 0 MWAM 10/2: 000078: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing u_path->flags 9 MWAM 10/2: 000079: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing restart_count_remote 1 MWAM 10/2: 000080: Jun 1 2006 18:28:06.595 EDT: GTP-SR:Context Type Path, Handler Sync, Context Event Path Setup, Context Sub Event No Sub Event MWAM 10/2: 000081: Jun 1 2006 18:28:06.595 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000082: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Event Path Setup, Sub Event No Sub Event MWAM 10/2: 000083: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Removing element from state-list Initialized, final count 3 MWAM 10/2: 000084: Jun 1 2006 18:28:06.595 EDT: GTP-SR: adding element in state-list Bulk Synch Ready, final count 2 MWAM 10/2: 000085: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Redundancy RF Event Received is Create Redundancy Context MWAM 10/2: 000086: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Redundancy Event is Path Setup MWAM 10/2: 000087: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Need to allocate redundancy context MWAM 10/2: 000088: Jun 1 2006 18:28:06.595 EDT: GTP-SR: adding element in state-list Initialized, final count 4 MWAM 10/2: 000089: Jun 1 2006 18:28:06.595 EDT: GTP-SR Packet Dump: Len for dump: org_len=63, len=63 MWAM 10/2: 000090: Jun 1 2006 18:28:06.595 EDT: 1 0 0 0 0 0 0 0 8 1 A6 B 0 B 8 68 MWAM 10/2: 000091: Jun 1 2006 18:28:06.595 EDT: A A 32 3 8 68 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000092: Jun 1 2006 18:28:06.595 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000093: Jun 1 2006 18:28:06.595 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000094: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing u_path->gtpv 1 MWAM 10/2: 000095: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Local IP address 166.11.0.11, and port 2152 MWAM 10/2: 000096: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Remote IP address 10.10.50.3, and port 2152 MWAM 10/2: 000097: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing u_path->num_data_socks 0 MWAM 10/2: 000098: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing u_path->flags 8 MWAM 10/2: 000099: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing restart_count_remote 0 MWAM 10/2: 000100: Jun 1 2006 18:28:06.595 EDT: GTP-SR:Context Type Path, Handler Sync, Context Event Path Setup, Context Sub Event No Sub Event MWAM 10/2: 000101: Jun 1 2006 18:28:06.595 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000102: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Event Path Setup, Sub Event No Sub Event MWAM 10/2: 000103: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Removing element from state-list Initialized, final count 3 MWAM 10/2: 000104: Jun 1 2006 18:28:06.595 EDT: GTP-SR: adding element in state-list Bulk Synch Ready, final count 3 MWAM 10/2: 000105: Jun 1 2006 18:28:12.223 EDT: GTP-SR: Redundancy RF Event Received is Create Redundancy Context MWAM 10/2: 000106: Jun 1 2006 18:28:12.223 EDT: GTP-SR: Redundancy Event is Context Setup MWAM 10/2: 000107: Jun 1 2006 18:28:12.223 EDT: GTP-SR: Need to allocate redundancy context MWAM 10/2: 000108: Jun 1 2006 18:28:12.223 EDT: GTP-SR: adding element in state-list Initialized, final count 4 MWAM 10/2: 000109: Jun 1 2006 18:28:12.223 EDT: GTP-SR Packet Dump: Len for dump: org_len=755, len=128 MWAM 10/2: 000110: Jun 1 2006 18:28:12.223 EDT: 1 1 39 31 31 30 30 30 30 30 30 30 30 30 30 30 MWAM 10/2: 000111: Jun 1 2006 18:28:12.223 EDT: 30 30 30 0 0 0 0 91 1 0 0 0 0 0 0 F0
DB-893
MWAM 10/2: 0 0 MWAM 10/2: 63 69 73 MWAM 10/2: 0 0 MWAM 10/2: F0 B 1 MWAM 10/2: 0 0 MWAM 10/2: 6 0 MWAM 10/2:
000112: Jun 000113: Jun 000114: Jun 000115: Jun 000116: Jun 000117: Jun 000118: Jun
1 2006 18:28:12.223 EDT: 1 2006 18:28:12.223 EDT: 1 2006 18:28:12.227 EDT: 1 2006 18:28:12.227 EDT: 1 2006 18:28:12.227 EDT: 1 2006 18:28:12.227 EDT: 1 2006 18:28:12.227 EDT:
0 8
0 5
10 0
C0 23 1 63 6F 0 0 0 0 0 1 0 0 0 0
63 69 73 63 6F 31 31 31 0 1 0 0 0 0 5 1 0 0 0 0 0 3 0 0 0 8 0 0 0 0 0 0 0 0 0 0 0 0
7C 0 40 0 0 1 0 1
10 10 1
21 0
...
MWAM 10/2: 000119: Jun 1 2006 18:28:12.231 EDT: GTP-SR:pdpmcb handle for pdpmcb (0x24AA0CCC) is (0x41000001) MWAM 10/2: 000120: Jun 1 2006 18:28:12.231 EDT: GTP-SR: un-packing # of PDPs packed = 1 MWAM 10/2: 000121: Jun 1 2006 18:28:12.231 EDT: GTP-SR: un-packing pdpmcb->user-name 91100000000000000 MWAM 10/2: 000122: Jun 1 2006 18:28:12.231 EDT: GTP-SR: un-packing pdpmcb->msisdn 9101000000000000F000 MWAM 10/2: 000123: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->selection_mode 0 MWAM 10/2: 000124: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->remove_staticIP 0 MWAM 10/2: 000125: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->llcframenum 0 MWAM 10/2: 000126: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->idle_timeout 3600 MWAM 10/2: 000127: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->session_timeout 0 MWAM 10/2: 000128: Jun 1 2006 18:28:12.235 EDT: GTP-SR: pdpmcb bitmap = 30730 MWAM 10/2: 000129: Jun 1 2006 18:28:12.235 EDT: GTP-SR: apn name is ms-apn MWAM 10/2: 000130: Jun 1 2006 18:28:12.235 EDT: GTP-SR: packing pdpmcb->teid 4194305 MWAM 10/2: 000131: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->imsi 01000000000000F0 MWAM 10/2: 000132: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.pdp_addr 11.1.0.1 MWAM 10/2: 000133: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.static_addr_allocated 0 MWAM 10/2: 000134: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.dynamic_addr_allocated 1 MWAM 10/2: 000135: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.dynamic_addr_requested 1 MWAM 10/2: 000136: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.addr_source 3 MWAM 10/2: 000137: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.allocated_prefix_len 16 MWAM 10/2: 000138: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.aggregate_prefix_len 16 MWAM 10/2: 000139: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.pdp_type_org 1 MWAM 10/2: 000140: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.pdp_type_num 33 MWAM 10/2: 000141: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.addrlen 6 MWAM 10/2: 000142: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.dhcp_addr 0.0.0.0 MWAM 10/2: 000143: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb-ggsn_addr_si 166.11.0.11 MWAM 10/2: 000144: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb-ggsn_addr_data 166.11.0.11 MWAM 10/2: 000145: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->msisdn_len 9 MWAM 10/2: 000146: Jun 1 2006 18:28:12.247 EDT: GTP-SR: Got teid=4194305, as requested
DB-894
December 2010
MWAM 10/2: 000147: Jun 1 2006 18:28:12.247 EDT: GTP-SR: un-packing pdpcb->gtpv1_qos_req.qos_profile 152109353l MWAM 10/2: 000148: Jun 1 2006 18:28:12.247 EDT: GTP-SR: un-packing pdpcb->gtpv1_qos_neg.qos_profile 152109353l MWAM 10/2: 000149: Jun 1 2006 18:28:12.247 EDT: GTP-SR: un-packing pdpcb bitmap = 0 MWAM 10/2: 000150: Jun 1 2006 18:28:12.247 EDT: GTP-SR: un-packing pdpcb->tid0100000000000050 MWAM 10/2: 000151: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing nsapi = 5 MWAM 10/2: 000152: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb->internal_flags 9175041 MWAM 10/2: 000153: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb->mnrgflag 0 MWAM 10/2: 000154: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb->open_cdr_sent 0 MWAM 10/2: 000155: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb->charging_reserved 0 MWAM 10/2: 000156: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb->pri 1 MWAM 10/2: 000157: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb->fastswitchable 0 MWAM 10/2: 000158: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb-sgsn_addr_sig 10.10.50.3 MWAM 10/2: 000159: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb-sgsn_addr_data 10.10.50.3 MWAM 10/2: 000160: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->sequence_sig 1 MWAM 10/2: 000161: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->fl_sig_up 0 MWAM 10/2: 000162: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->fl_data1_up 0 MWAM 10/2: 000163: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->fl_sig_down 0 MWAM 10/2: 000164: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->fl_data1_down 0 MWAM 10/2: 000165: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->fl_data2 0 MWAM 10/2: 000166: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->cause 128 MWAM 10/2: 000167: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->restart_count 0 MWAM 10/2: 000168: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->create_time Apr 13 2006 01:25:25 MWAM 10/2: 000169: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->last_access_time Apr 13 2006 01:25:25 MWAM 10/2: 000170: Jun 1 2006 18:28:12.251 EDT: GTP-SR: unpacking pdpcb->teid_cntl_remote 1 MWAM 10/2: 000171: Jun 1 2006 18:28:12.251 EDT: GTP-SR: unpacking pdpcb->teid_data_local 4194306 MWAM 10/2: 000172: Jun 1 2006 18:28:12.251 EDT: GTP-SR: unpacking pdpcb->teid_data_remote 1000 MWAM 10/2: 000173: Jun 1 2006 18:28:12.251 EDT: GTP-SR: unpacking pdpcb->charging_id 471179447 MWAM 10/2: 000174: Jun 1 2006 18:28:12.251 EDT: GTP-SR: unpacking pdpcb->cdr_recseqnum 0 MWAM 10/2: 000175: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->reorder_required FF MWAM 10/2: 000176: Jun 1 2006 18:28:12.251 EDT: GTP-SR: We wanted teid 4194306, and got 4194306 MWAM 10/2: 000177: Jun 1 2006 18:28:12.251 EDT: GTP-SR: Got teid 4194306 as requested MWAM 10/2: 000178: Jun 1 2006 18:28:12.251 EDT: pdp_create_by_tid on standby:tid 100000050, pdp 24A90B24 MWAM 10/2: 000179: Jun 1 2006 18:28:12.251 EDT: GPRS:0100000000000050: GTP-SR: Successfully unpack PDP MWAM 10/2: 000180: Jun 1 2006 18:28:12.251 EDT: GTP-SR: rulebase ID MS unpacked MWAM 10/2: 000181: Jun 1 2006 18:28:12.251 EDT: GTP-SR: cc_session ccfh 0 failover_supported 1 reqnum 1 packed MWAM 10/2: 000182: Jun 1 2006 18:28:12.251 EDT: GTP-SR: new cc_session dest_host ips-clcis1.cisco.com unpacked MWAM 10/2: 000183: Jun 1 2006 18:28:12.251 EDT: GTP-SR: new cc_session dest_realm cisco.com unpacked
DB-895
MWAM 10/2: 000184: Jun 1 2006 18:28:12.251 EDT: GTP-SR: Unpacking 1 categories MWAM 10/2: 000185: Jun 1 2006 18:28:12.251 EDT: GTP-SR: Unpacking category of ID 4 MWAM 10/2: 000186: Jun 1 2006 18:28:12.255 EDT: GTP-SR: Creating red context for category ID 4 username 100000000000000 on APN ms-apn MWAM 10/2: 000187: Jun 1 2006 18:28:12.255 EDT: GTP-SR: Need to allocate redundancy context MWAM 10/2: 000188: Jun 1 2006 18:28:12.255 EDT: GTP-SR: adding element in state-list Initialized, final count 5 MWAM 10/2: 000189: Jun 1 2006 18:28:12.255 EDT: GTP-SR: Removing element from state-list Initialized, final count 4 MWAM 10/2: 000190: Jun 1 2006 18:28:12.255 EDT: GTP-SR: adding element in state-list Synched, final count 1 MWAM 10/2: 000191: Jun 1 2006 18:28:12.255 EDT: GPRS:0100000000000050:shdb 0xC6000008 created for category 4 (handle 0xDE000001) MWAM 10/2: 000192: Jun 1 2006 18:28:12.255 EDT: GTP-SR: red context installed for the new category (shdb: active 0x95000008, standby 0xC6000008) MWAM 10/2: 000193: Jun 1 2006 18:28:12.255 EDT: GTP-SR: new category ID 4 unpacked: MWAM 10/2: 000194: Jun 1 2006 18:28:12.255 EDT: GTP-SR: sync data len 164 MWAM 10/2: 000195: Jun 1 2006 18:28:12.255 EDT: GTP-SR: active shdb 0x95000008 MWAM 10/2: 000196: Jun 1 2006 18:28:12.255 EDT: GTP-SR: CSG session ID 27599459844129 MWAM 10/2: 000197: Jun 1 2006 18:28:12.255 EDT: GTP-SR: chrg last svc rec seqnum 0 MWAM 10/2: 000198: Jun 1 2006 18:28:12.255 EDT: GTP-SR: category state AUTHORIZED MWAM 10/2: 000199: Jun 1 2006 18:28:12.255 EDT: GTP-SR: category state trigger flags 0x3 MWAM 10/2: 000200: Jun 1 2006 18:28:12.255 EDT: GTP-SR: category sub flags 0x0 MWAM 10/2: 000201: Jun 1 2006 18:28:12.255 EDT: GTP-SR: sync flag 0x0 MWAM 10/2: 000202: Jun 1 2006 18:28:12.255 EDT: GTP-SR: quotas included MWAM 10/2: 000203: Jun 1 2006 18:28:12.255 EDT: GTP-SR: last req timestamp 0 MWAM 10/2: 000204: Jun 1 2006 18:28:12.255 EDT: GTP-SR: last req seqnum 0 MWAM 10/2: 000205: Jun 1 2006 18:28:12.255 EDT: GTP-SR: address received from active with radius source is MWAM 10/2: 000206: Jun 1 2006 18:28:12.259 EDT: GTP-SR:Context Type PDP, Handler Sync, Context Event Context Setup, Context Sub Event No Sub Event MWAM 10/2: 000207: Jun 1 2006 18:28:12.259 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000208: Jun 1 2006 18:28:12.259 EDT: GTP-SR: Event Context Setup, Sub Event No Sub Event MWAM 10/2: 000209: Jun 1 2006 18:28:12.259 EDT: GTP-SR: Removing element from state-list Initialized, final count 3 MWAM 10/2: 000210: Jun 1 2006 18:28:12.259 EDT: GTP-SR: adding element in state-list Bulk Synch Ready, final count 4 MWAM 10/2: 000211: Jun 1 2006 18:28:15.091 EDT: GTP-SR: Redundancy RF Event Received is Update Redundancy Context MWAM 10/2: 000212: Jun 1 2006 18:28:15.091 EDT: GTP-SR: Redundancy Event is Category update MWAM 10/2: 000213: Jun 1 2006 18:28:15.091 EDT: GTP-SR: red context found (active shdb 0x95000008, standby shdb 0xC6000008) MWAM 10/2: 000214: Jun 1 2006 18:28:15.091 EDT: GTP-SR Packet Dump: Len for dump: org_len=188, len=128 MWAM 10/2: 000215: Jun 1 2006 18:28:15.091 EDT: 7C 0 0 5 0 0 58 2 0 0 0 1 0 34 34 0 MWAM 10/2: 000216: Jun 1 2006 18:28:15.091 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 95 MWAM 10/2: 000217: Jun 1 2006 18:28:15.091 EDT: 0 0 8 0 0 19 1A 0 0 0 21 0 0 0 0 0 MWAM 10/2: 000218: Jun 1 2006 18:28:15.091 EDT: 0 0 9 0 0 0 3 0 0 A 0 0 0 0 0 0 MWAM 10/2: 000219: Jun 1 2006 18:28:15.091 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000220: Jun 1 2006 18:28:15.095 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000221: Jun 1 2006 18:28:15.095 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
DB-896
December 2010
...
MWAM 10/2: 000224: Jun 1 2006 18:28:15.095 EDT: GTP-SR: category found with handle 0xDE000001 shdbs: active 0x95000008 standby 0xC6000008 (MCB shdbs: active 0x7C000005, standby 0xC6000008) MWAM 10/2: 000225: Jun 1 2006 18:28:15.095 EDT: GTP-SR: MCB internal flags 0x5802 unpacked MWAM 10/2: 000226: Jun 1 2006 18:28:15.095 EDT: GTP-SR: cc_session reqnum 1 unpacked and installed MWAM 10/2: 000227: Jun 1 2006 18:28:15.095 EDT: GTP-SR: Unpacking category of ID 4 MWAM 10/2: 000228: Jun 1 2006 18:28:15.095 EDT: GTP-SR: sync obj created in prep for MCB deletion MWAM 10/2: 000229: Jun 1 2006 18:28:15.095 EDT: GTP-SR: category ID 4 unpacked: MWAM 10/2: 000230: Jun 1 2006 18:28:15.095 EDT: GTP-SR: sync data len 52 MWAM 10/2: 000231: Jun 1 2006 18:28:15.095 EDT: GTP-SR: active shdb 0x95000008 MWAM 10/2: 000232: Jun 1 2006 18:28:15.095 EDT: GTP-SR: CSG session ID 27599459844129 MWAM 10/2: 000233: Jun 1 2006 18:28:15.095 EDT: GTP-SR: chrg last svc rec seqnum 0 MWAM 10/2: 000234: Jun 1 2006 18:28:15.095 EDT: GTP-SR: category state PENDING_SERVICE_STOP MWAM 10/2: 000235: Jun 1 2006 18:28:15.095 EDT: GTP-SR: category state trigger flags 0x3 MWAM 10/2: 000236: Jun 1 2006 18:28:15.095 EDT: GTP-SR: category sub flags 0x0 MWAM 10/2: 000237: Jun 1 2006 18:28:15.095 EDT: GTP-SR: sync flag 0xA MWAM 10/2: 000238: Jun 1 2006 18:28:15.095 EDT: GTP-SR: quotas not included MWAM 10/2: 000239: Jun 1 2006 18:28:15.095 EDT: GTP-SR: last req timestamp 0 MWAM 10/2: 000240: Jun 1 2006 18:28:15.095 EDT: GTP-SR: last req seqnum 0 MWAM 10/2: 000241: Jun 1 2006 18:28:15.095 EDT: GTP-SR: Redundancy RF Event Received is Redundancy Context Delete MWAM 10/2: 000242: Jun 1 2006 18:28:15.095 EDT: GTP-SR: Redundancy Event is Context Remove MWAM 10/2: 000243: Jun 1 2006 18:28:15.095 EDT: GTP-SR Packet Dump: Len for dump: org_len=40, len=40 MWAM 10/2: 000244: Jun 1 2006 18:28:15.095 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000245: Jun 1 2006 18:28:15.095 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000246: Jun 1 2006 18:28:15.095 EDT: 0 0 0 0 0 0 0 0 MWAM 10/2: 000247: Jun 1 2006 18:28:15.095 EDT: GPRS:GTP-SR: Deleting v1 MCB on the standby MWAM 10/2: 000248: Jun 1 2006 18:28:15.095 EDT: GPRS:0100000000000050:GTP-SR: Deleting v1 PDP on the standby MWAM 10/2: 000249: Jun 1 2006 18:28:15.095 EDT: GTP-SR: MCB deletion sync obj deleted MWAM 10/2: 000250: Jun 1 2006 18:28:15.095 EDT: GTP-SR: Removing element from state-list Synched, final count 0 MWAM 10/2: 000251: Jun 1 2006 18:28:15.095 EDT: GTP-SR: Removing element from state-list Bulk Synch Ready, final count 3 MWAM 10/2: 000252: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Redundancy RF Event Received is Redundancy Context Delete MWAM 10/2: 000253: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Redundancy Event is Path Remove MWAM 10/2: 000254: Jun 1 2006 18:29:15.103 EDT: GTP-SR:Context Type Path, Handler Delete, Context Event Path Remove, Context Sub Event No Sub Event MWAM 10/2: 000255: Jun 1 2006 18:29:15.103 EDT: GTP-SR:State of Redundancy Context is Bulk Synch Ready MWAM 10/2: 000256: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Event Path Remove, Sub Event No Sub Event MWAM 10/2: 000257: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Removing element from state-list Bulk Synch Ready, final count 2 MWAM 10/2: 000258: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Redundancy RF Event Received is Redundancy Context Delete MWAM 10/2: 000259: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Redundancy Event is Path Remove MWAM 10/2: 000260: Jun 1 2006 18:29:15.103 EDT: GTP-SR:Context Type Path, Handler Delete, Context Event Path Remove, Context Sub Event No Sub Event
DB-897
MWAM 10/2: Bulk Synch MWAM 10/2: Sub Event MWAM 10/2: Bulk Synch
1 2006 18:29:15.103 EDT: GTP-SR:State of Redundancy Context is 1 2006 18:29:15.103 EDT: GTP-SR: Event Path Remove, Sub Event No
000263: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Removing element from state-list Ready, final count 1
Related Commands
Command
Description
clear gprs redundancy Clears statistics related to GTP-SR. statistics gprs redundancy Enables GTP-SR on a GGSN. gprs redundancy Configures the window size used to determine when the CDR record charging sync-window sequence number needs to be synchronized to the Standby GGSN. cdr rec-seqnum gprs redundancy Configures the window size used to determine when the GTP sequence charging sync-window number needs to be synchronized to the Standby GGSN. gtpp seqnum show gprs redundancy Displays statistics related to GTP-SR.
DB-898
December 2010
debug gvrp
To display GVRP debugging information, use the debug gvrp command in privileged EXEC mode. To disable debugging outpu, use the no form of this command. debug gvrp {all | config | error | event | ha | packets | switch} no debug gvrp
Syntax Description
(Optional) Enables all levels of debugging (Optional) Displays user configuration. (Optional) Enables error level debugging. (Optional) Enables event level debugging. (Optional) Enables ha level debugging. (Optional) Enables packet level debugging. (Optional) Enables switch level debugging.
Command Modes
Command History
Release 12.2(33)SRB
Usage Guidelines
Conditional interface debugging can be used to limit the debugging output messages related to an interface.
Examples
Related Commands
Description Displays details of the adininstrative and operational GVRP states of all or one particular .1Q trunk port in the device. Displays the GVRP configuration at the device leve.
DB-899
debug h225
To display additional information about the actual contents of H.225 Registration, Admission, and Status Protocol (RAS) messages, use the debug h225 command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug h225 {asn1 | events} no debug h225
Syntax Description
asn1 events
Indicates that only the Abstract Syntax Notation One (ASN.1) contents of any H.225 message sent or received will be displayed. Indicates that key Q.931 events that occur when placing an H.323 call from one gateway to another will be displayed.
Defaults
Disabled
Command Modes
Command History
Modification This command was introduced. This command was implemented on the Cisco AS5850. This command was integrated into Cisco IOS Release 12.2(11)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Both versions of the debug h225 command display information about H.225 messages. H.225 messages are used to exchange RAS information between gateways and gatekeepers as well as to exchange Q.931 information between gateways. The debug h225 events command displays key Q.931 events that occur when placing an H.323 call from one gateway to another. Q.931 events are carried in H.225 messages. This command enables you to monitor Q.931 state changes such as setup, alert, connected, and released.
Note
Although the debug information includes the hexadecimal output of the entire H.225 message, only the key state changes are decoded. The debug h225 asn1 command displays the ASN.1 contents of any H.225 message sent or received that contains ASN.1 content. Not all H.225 messages contain ASN.1 content. Some messages contain both Q.931 information and ASN.1 information; if you enter this command, only ASN.1 information will be displayed.
DB-900
December 2010
Examples
The following sample output for the debug h225 events command shows a call being placed from gateway GW13 to gateway GW14. Before the call was placed, the gateway exchanged RAS messages with the gatekeeper. Because RAS messages do not contain Q.931 information, these messages do not appear in this output.
Router# debug h225 events H.225 Event Messages debugging is on Router# *Mar 2 02:47:14.689: H225Lib::h225TConn:connect in progress on socket [2] *Mar 2 02:47:14.689: H225Lib::h225TConn:Q.931 Call State is initialized to be [Null]. *Mar 2 02:47:14.697:Hex representation of the SETUP TPKT to send.0300004D080200DC05040380C0A36C0991313323313333303070099131342331343330307E00260500800 60008914A000102004B1F5E5D8990006C0000000005BF7454000C0700000000000000 *Mar 2 02:47:14.701: *Mar 2 02:47:14.701: H225Lib::h225SetupRequest:Q.931 SETUP sent from socket [2] *Mar 2 02:47:14.701: H225Lib::h225SetupRequest:Q.931 Call State changed to [Call Initiated]. *Mar 2 02:47:14.729:Hex representation of the received TPKT03000021080280DC013401017E0012050340060008914A000100000109350E2B28 *Mar 2 02:47:14.729: *Mar 2 02:47:14.729: H225Lib::h225RecvData:Q.931 ALERTING received from socket [2] *Mar 2 02:47:14.729: H225Lib::h225RecvData:Q.931 Call State changed to [Call Delivered]. *Mar 2 02:47:17.565:Hex representation of the received TPKT03000034080280DC07040380C0A37E0023050240060008914A0001000109350E2B2802004B1F5E5D899000 6C0000000005BF7454 *Mar 2 02:47:17.569: *Mar 2 02:47:17.569: H225Lib::h225RecvData:Q.931 CONNECT received from socket [2] *Mar 2 02:47:17.569: H225Lib::h225RecvData:Q.931 Call State changed to [Active]. *Mar 2 02:47:23.273:Hex representation of the received TPKT0300001A080280DC5A080280107E000A050500060008914A0001 *Mar 2 02:47:23.273: *Mar 2 02:47:23.273: H225Lib::h225RecvData:Q.931 RELEASE COMPLETE received from socket [2] *Mar 2 02:47:23.273: H225Lib::h225RecvData:Q.931 Call State changed to [Null]. *Mar 2 02:47:23.293:Hex representation of the RELEASE COMPLETE TPKT to send.0300001A080200DC5A080280107E000A050500060008914A0001 *Mar 2 02:47:23.293: *Mar 2 02:47:23.293: H225Lib::h225TerminateRequest:Q.931 RELEASE COMPLETE sent from socket [2]. Call state changed to [Null]. *Mar 2 02:47:23.293: H225Lib::h225TClose:TCP connection from socket [2] closed
The following output shows the same call being placed from gateway GW13 to gateway GW14 using the debug h225 asn1 command. The output is very long, but you can track the following information:
The admission request to the gatekeeper. The admission confirmation from the gatekeeper. The ASN.1 portion of the H.225/Q.931 setup message from the calling gateway to the called gateway. The ASN.1 portion of the H.225/Q.931 setup response from the called gateway, indicating that the call has proceeded to alerting state. The ASN.1 portion of the H.225/Q.931 message from the called gateway, indicating that the call has been connected. The ASN.1 portion of the H.225/Q.931 message from the called gateway, indicating that the call has been released.
DB-901
The ANS.1 portion of the H.225 RAS message from the calling gateway to the gatekeeper, informing it that the call has been disengaged. The ASN.1 portion of the H.225 RAS message from the gatekeeper to the calling gateway, confirming the disengage request. The ASN.1 portion of the H.225/Q.931 release complete message sent from the called gateway to the calling gateway.
Router# debug h225 asn1 H.225 ASN1 Messages debugging is on Router# value RasMessage ::= admissionRequest : *Mar 2 02:48:18.445: { *Mar 2 02:48:18.445: requestSeqNum 03320, *Mar 2 02:48:18.445: callType pointToPoint :NULL, *Mar 2 02:48:18.445: callModel direct :NULL, *Mar 2 02:48:18.445: endpointIdentifier "60D6BA4C00000001", *Mar 2 02:48:18.445: destinationInfo *Mar 2 02:48:18.445: { *Mar 2 02:48:18.445: e164 :"14#14300" *Mar 2 02:48:18.445: }, *Mar 2 02:48:18.449: srcInfo *Mar 2 02:48:18.449: { *Mar 2 02:48:18.449: e164 :"13#13300" *Mar 2 02:48:18.449: }, *Mar 2 02:48:18.449: bandWidth 0640, *Mar 2 02:48:18.449: callReferenceValue 0224, *Mar 2 02:48:18.449: conferenceID '4B1F5E5D899000720000000005C067A4'H, *Mar 2 02:48:18.449: activeMC FALSE, *Mar 2 02:48:18.449: answerCall FALSE *Mar 2 02:48:18.449: } *Mar 2 02:48:18.449:25800CF7 00F00036 00300044 00360042 00410034 00430030 00300030 00300030 00300030 00310103 80470476 33010380 46046633 40028000 E04B1F5E 5D899000 72000000 0005C067 A400 29000CF7 40028000 0109350E 06B80077 value RasMessage ::= admissionConfirm : *Mar 2 02:48:18.469: { *Mar 2 02:48:18.469: requestSeqNum 03320, *Mar 2 02:48:18.469: bandWidth 0640, *Mar 2 02:48:18.469: callModel direct :NULL, *Mar 2 02:48:18.469: destCallSignalAddress ipAddress : *Mar 2 02:48:18.469: { *Mar 2 02:48:18.469: ip '0109350E'H, *Mar 2 02:48:18.469: port 01720 *Mar 2 02:48:18.469: }, *Mar 2 02:48:18.469: irrFrequency 0120 *Mar 2 02:48:18.473: } *Mar 2 02:48:18.473:value H323-UserInformation ::= *Mar 2 02:48:18.481:{ *Mar 2 02:48:18.481: h323-uu-pdu *Mar 2 02:48:18.481: { *Mar 2 02:48:18.481: h323-message-body setup : *Mar 2 02:48:18.481: { *Mar 2 02:48:18.481: protocolIdentifier { 0 0 8 2250 0 1 }, *Mar 2 02:48:18.481: sourceInfo *Mar 2 02:48:18.481: { *Mar 2 02:48:18.481: terminal *Mar 2 02:48:18.481: { *Mar 2 02:48:18.481: },
DB-902
December 2010
*Mar 2 02:48:18.481: mc FALSE, *Mar 2 02:48:18.481: undefinedNode FALSE *Mar 2 02:48:18.481: }, *Mar 2 02:48:18.481: activeMC FALSE, *Mar 2 02:48:18.481: conferenceID '4B1F5E5D899000720000000005C067A4'H, *Mar 2 02:48:18.481: conferenceGoal create :NULL, *Mar 2 02:48:18.485: callType pointToPoint :NULL, *Mar 2 02:48:18.485: sourceCallSignalAddress ipAddress : *Mar 2 02:48:18.485: { *Mar 2 02:48:18.485: ip '00000000'H, *Mar 2 02:48:18.485: port 00 *Mar 2 02:48:18.485: } *Mar 2 02:48:18.485: } *Mar 2 02:48:18.485: } *Mar 2 02:48:18.485:} *Mar 2 02:48:18.485:00800600 08914A00 0102004B 1F5E5D89 90007200 00000005 C067A400 0C070000 00000000 00 value H323-UserInformation ::= *Mar 2 02:48:18.525:{ *Mar 2 02:48:18.525: h323-uu-pdu *Mar 2 02:48:18.525: { *Mar 2 02:48:18.525: h323-message-body alerting : *Mar 2 02:48:18.525: { *Mar 2 02:48:18.525: protocolIdentifier { 0 0 8 2250 0 1 }, *Mar 2 02:48:18.525: destinationInfo *Mar 2 02:48:18.525: { *Mar 2 02:48:18.525: mc FALSE, *Mar 2 02:48:18.525: undefinedNode FALSE *Mar 2 02:48:18.525: }, *Mar 2 02:48:18.525: h245Address ipAddress : *Mar 2 02:48:18.525: { *Mar 2 02:48:18.525: ip '0109350E'H, *Mar 2 02:48:18.525: port 011050 *Mar 2 02:48:18.525: } *Mar 2 02:48:18.525: } *Mar 2 02:48:18.525: } *Mar 2 02:48:18.525:} *Mar 2 02:48:18.525:value H323-UserInformation ::= *Mar 2 02:48:22.753:{ *Mar 2 02:48:22.753: h323-uu-pdu *Mar 2 02:48:22.753: { *Mar 2 02:48:22.753: h323-message-body connect : *Mar 2 02:48:22.753: { *Mar 2 02:48:22.753: protocolIdentifier { 0 0 8 2250 0 1 }, *Mar 2 02:48:22.753: h245Address ipAddress : *Mar 2 02:48:22.753: { *Mar 2 02:48:22.753: ip '0109350E'H, *Mar 2 02:48:22.753: port 011050 *Mar 2 02:48:22.753: }, *Mar 2 02:48:22.753: destinationInfo *Mar 2 02:48:22.753: { *Mar 2 02:48:22.753: terminal *Mar 2 02:48:22.753: { *Mar 2 02:48:22.753: }, *Mar 2 02:48:22.757: mc FALSE, *Mar 2 02:48:22.757: undefinedNode FALSE *Mar 2 02:48:22.757: }, *Mar 2 02:48:22.757: conferenceID '4B1F5E5D899000720000000005C067A4'H *Mar 2 02:48:22.757: } *Mar 2 02:48:22.757: } *Mar 2 02:48:22.757:} *Mar 2 02:48:22.757:value H323-UserInformation ::= *Mar 2 02:48:27.109:{
DB-903
*Mar 2 02:48:27.109: h323-uu-pdu *Mar 2 02:48:27.109: { *Mar 2 02:48:27.109: h323-message-body releaseComplete : *Mar 2 02:48:27.109: { *Mar 2 02:48:27.109: protocolIdentifier { 0 0 8 2250 0 1 } *Mar 2 02:48:27.109: } *Mar 2 02:48:27.109: } *Mar 2 02:48:27.109:} *Mar 2 02:48:27.109:value RasMessage ::= disengageRequest : *Mar 2 02:48:27.117: { *Mar 2 02:48:27.117: requestSeqNum 03321, *Mar 2 02:48:27.117: endpointIdentifier "60D6BA4C00000001", *Mar 2 02:48:27.117: conferenceID '4B1F5E5D899000720000000005C067A4'H, *Mar 2 02:48:27.121: callReferenceValue 0224, *Mar 2 02:48:27.121: disengageReason normalDrop :NULL *Mar 2 02:48:27.121: } *Mar 2 02:48:27.121:3C0CF81E 00360030 00440036 00420041 00340043 00300030 00300030 00300030 00300031 4B1F5E5D 89900072 00000000 05C067A4 00E020 400CF8 value RasMessage ::= disengageConfirm : *Mar 2 02:48:27.133: { *Mar 2 02:48:27.133: requestSeqNum 03321 *Mar 2 02:48:27.133: } *Mar 2 02:48:27.133:value H323-UserInformation ::= *Mar 2 02:48:27.133:{ *Mar 2 02:48:27.133: h323-uu-pdu *Mar 2 02:48:27.133: { *Mar 2 02:48:27.133: h323-message-body releaseComplete : *Mar 2 02:48:27.133: { *Mar 2 02:48:27.133: protocolIdentifier { 0 0 8 2250 0 1 } *Mar 2 02:48:27.133: } *Mar 2 02:48:27.133: } *Mar 2 02:48:27.133:} *Mar 2 02:48:27.133:05000600 08914A00 01
DB-904
December 2010
Syntax Description
Command History
Modification This command was introduced. This command was modified. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
This command slows down the system considerably. Connections may time out.
Examples
Example 1
The following output shows two proxy call scenarios. A trace is collected on the gatekeeper with ASN1 turned on. The call is being established.
Router# debug h225 asn1 H.225 ASN1 Messages debugging is on Router#24800006 03C00030 00300036 00380041 00450037 00430030 00300030 00300030 00300030 00310140 0F007000 74006500 6C003200 33004000 7A006F00 6E006500 32002E00 63006F00 6D020180 AAAA4006 00700074 0065006C 00320031 0033401E 0000015F C8490FB4 B9D111BF AF0060B0 00E94500 value RasMessage ::= admissionRequest : { requestSeqNum 7, callType pointToPoint : NULL, endpointIdentifier "0068AE7C00000001", destinationInfo { h323-ID : "[email protected]" }, srcInfo { e164 : "7777", h323-ID : "ptel213" }, bandWidth 7680, callReferenceValue 1,
DB-905
conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, activeMC FALSE, answerCall FALSE } value RasMessage ::= admissionConfirm : { requestSeqNum 7, bandWidth 7680, callModel direct : NULL, destCallSignalAddress ipAddress : { ip '65000001'H, port 1720 }, irrFrequency 30 } 29000006 401E0000 65000001 06B8001D 2480001D 03C00030 00300036 00380041 00390036 00300030 00300030 00320140 0F007000 74006500 6C003200 33004000 32002E00 63006F00 6D014006 00700074 0065006C 00320031 C8490FB4 B9D111BF AF0060B0 00E94540 value RasMessage ::= admissionRequest : { requestSeqNum 30, callType pointToPoint : NULL, endpointIdentifier "0068A96000000002", destinationInfo { h323-ID : "[email protected]" }, srcInfo { h323-ID : "ptel213" }, bandWidth 640, callReferenceValue 1, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, activeMC FALSE, answerCall TRUE } value ACFnonStandardInfo ::= { srcTerminalAlias { e164 : "7777", h323-ID : "ptel213" }, dstTerminalAlias { h323-ID : "[email protected]" }, dstProxyAlias { h323-ID : "px2" }, dstProxySignalAddress { ip '66000001'H, port 1720 } } C00203AA AA800600 70007400 65006C00 32003100 3301800F 00320033 0040007A 006F006E 00650032 002E0063 006F006D 32660000 0106B8
DB-906
December 2010
value RasMessage ::= admissionConfirm : { requestSeqNum 30, bandWidth 7680, callModel direct : NULL, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, irrFrequency 30, nonStandardData { nonStandardIdentifier h221NonStandard : { t35CountryCode 181, t35Extension 0, manufacturerCode 18 }, data 'C00203AAAA8006007000740065006C00320031003301800F007000740065006C003200 ...'H } } 2980001D 401E0000 66000001 06B8001D 40B50000 1247C002 03AAAA80 06007000 74006500 6C003200 31003301 800F0070 00740065 006C0032 00330040 007A006F 006E0065 0032002E 0063006F 006D0180 02007000 78003266 00000106 B8 24C0001E 03C00030 00300036 00380041 00390036 00300030 00300030 00300030 00300030 00320140 0F007000 74006500 6C003200 33004000 7A006F00 6E006500 32002E00 63006F00 6D006600 000106B8 020180AA AA400600 70007400 65006C00 32003100 33401E00 00435FC8 490FB4B9 D111BFAF 0060B000 E94500 value RasMessage ::= admissionRequest : { requestSeqNum 31, callType pointToPoint : NULL, endpointIdentifier "0068A96000000002", destinationInfo { h323-ID : "[email protected]" }, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, srcInfo { e164 : "7777", h323-ID : "ptel213" }, bandWidth 7680, callReferenceValue 67, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, activeMC FALSE, answerCall FALSE } value RasMessage ::= admissionConfirm : { requestSeqNum 31, bandWidth 7680, callModel direct : NULL, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720
DB-907
}, irrFrequency 30 }
Example 2
The following output shows two proxy call scenarios. A trace is collected on the source proxy with ASN1 turned on. The call is being torn down
Router# debug h225 asn1 H.225 ASN1 Messages debugging is on Router# value H323-UserInformation ::= { h323-uu-pdu { h323-message-body setup : { protocolIdentifier { 0 0 8 2250 0 1 }, sourceAddress { h323-ID : "ptel213" }, sourceInfo { terminal { }, mc FALSE, undefinedNode FALSE }, destinationAddress { h323-ID : "[email protected]" }, activeMC FALSE, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, conferenceGoal create : NULL, callType pointToPoint : NULL, sourceCallSignalAddress ipAddress : { ip '3200000C'H, port 1720 } } } } value RasMessage ::= admissionRequest : { requestSeqNum 30, callType pointToPoint : NULL, endpointIdentifier "0068A96000000002", destinationInfo { h323-ID : "[email protected]" }, srcInfo { h323-ID : "ptel213" }, bandWidth 640, callReferenceValue 1, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H,
DB-908
December 2010
activeMC FALSE, answerCall TRUE } 2480001D 03C00030 00300036 00380041 00390036 00300030 00300030 00300030 00300030 00320140 0F007000 74006500 6C003200 33004000 7A006F00 6E006500 32002E00 63006F00 6D014006 00700074 0065006C 00320031 00334002 8000015F C8490FB4 B9D111BF AF0060B0 00E94540 2980001D 401E0000 66000001 06B8001D 40B50000 1247C002 03AAAA80 06007000 74006500 6C003200 31003301 800F0070 00740065 006C0032 00330040 007A006F 006E0065 0032002E 0063006F 006D0180 02007000 78003266 00000106 B8 value RasMessage ::= admissionConfirm : { requestSeqNum 30, bandWidth 7680, callModel direct : NULL, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, irrFrequency 30, nonStandardData { nonStandardIdentifier h221NonStandard : { t35CountryCode 181, t35Extension 0, manufacturerCode 18 }, data 'C00203AAAA8006007000740065006C00320031003301800F007000740065006C003200 ...'H } } C00203AA AA800600 70007400 65006C00 32003100 3301800F 00700074 0065006C 00320033 0040007A 006F006E 00650032 002E0063 006F006D 01800200 70007800 32660000 0106B8 value ACFnonStandardInfo ::= { srcTerminalAlias { e164 : "7777", h323-ID : "ptel213" }, dstTerminalAlias { h323-ID : "[email protected]" }, dstProxyAlias { h323-ID : "px2" }, dstProxySignalAddress { ip '66000001'H, port 1720 } } value RasMessage ::= admissionRequest : { requestSeqNum 31, callType pointToPoint : NULL, endpointIdentifier "0068A96000000002", destinationInfo {
DB-909
h323-ID : "[email protected]" }, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, srcInfo { e164 : "7777", h323-ID : "ptel213" }, bandWidth 7680, callReferenceValue 67, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, activeMC FALSE, answerCall FALSE } 24C0001E 03C00030 00300036 00380041 00390036 00300030 00300030 00320140 0F007000 74006500 6C003200 33004000 32002E00 63006F00 6D006600 000106B8 020180AA AA400600 32003100 33401E00 00435FC8 490FB4B9 D111BFAF 0060B000 2900001E 401E0000 66000001 06B8001D value RasMessage ::= admissionConfirm : { requestSeqNum 31, bandWidth 7680, callModel direct : NULL, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, irrFrequency 30 } value H323-UserInformation ::= { h323-uu-pdu { h323-message-body callProceeding : { protocolIdentifier { 0 0 8 2250 0 1 }, destinationInfo { gateway { protocol { h323 : { } } }, mc FALSE, undefinedNode FALSE } } } } 01000600 08914A00 01088001 2800 value H323-UserInformation ::= { h323-uu-pdu { 00300030 00300030 7A006F00 6E006500 70007400 65006C00 E94500
DB-910
December 2010
h323-message-body setup : { protocolIdentifier { 0 0 8 2250 0 1 }, sourceAddress { h323-ID : "ptel213" }, sourceInfo { vendor { vendor { t35CountryCode 181, t35Extension 0, manufacturerCode 18 } }, gateway { protocol { h323 : { } } }, mc FALSE, undefinedNode FALSE }, destinationAddress { h323-ID : "[email protected]" }, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, activeMC FALSE, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, conferenceGoal create : NULL, callType pointToPoint : NULL, sourceCallSignalAddress ipAddress : { ip '65000001'H, port 1720 }, remoteExtensionAddress h323-ID : "[email protected]" } } } 00B80600 08914A00 01014006 00700074 0065006C 00320031 40012800 01400F00 70007400 65006C00 32003300 40007A00 2E006300 6F006D00 66000001 06B8005F C8490FB4 B9D111BF 0E070065 00000106 B822400F 00700074 0065006C 00320033 00650032 002E0063 006F006D value H323-UserInformation ::= { h323-uu-pdu { h323-message-body callProceeding : { protocolIdentifier { 0 0 8 2250 0 1 },
DB-911
destinationInfo { gateway { protocol { h323 : { } } }, mc FALSE, undefinedNode FALSE } } } } value H323-UserInformation ::= { h323-uu-pdu { h323-message-body alerting : { protocolIdentifier { 0 0 8 2250 0 1 }, destinationInfo { mc FALSE, undefinedNode FALSE } } } } value H323-UserInformation ::= { h323-uu-pdu { h323-message-body alerting : { protocolIdentifier { 0 0 8 2250 0 1 }, destinationInfo { mc FALSE, undefinedNode FALSE } } } } 03000600 08914A00 010000 value H323-UserInformation ::= { h323-uu-pdu { h323-message-body connect : { protocolIdentifier { 0 0 8 2250 0 1 }, h245Address ipAddress : { ip '66000001'H, port 11011 }, destinationInfo { gateway {
DB-912
December 2010
protocol { h323 : { } } }, mc FALSE, undefinedNode FALSE }, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H } } } value H323-UserInformation ::= { h323-uu-pdu { h323-message-body connect : { protocolIdentifier { 0 0 8 2250 0 1 }, h245Address ipAddress : { ip '65000001'H, port 11007 }, destinationInfo { gateway { protocol { h323 : { } } }, mc FALSE, undefinedNode FALSE }, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H } } } 02400600 08914A00 01006500 00012AFF 08800128 005FC849 0FB4B9D1 11BFAF00 60B000E9 45
Example 3
The following output shows two proxy call scenarios. A trace is collected on a destination router where both destination proxy and destination Gatekeeper coexist. Both RAS and H.225 traces are enabled for one complete call.
px2# RASLib::RASRecvData: successfully rcvd message of length 80 from 40.0.0.33:1585 RASLib::RASRecvData: LRQ rcvd from [40.0.0.33:1585] on sock [6880372] RASlib::ras_sendto: msg length 111 sent to 40.0.0.33 RASLib::RASSendLCF: LCF sent to 40.0.0.33 H225Lib::h225TAccept: TCP connection accepted from 101.0.0.1:11002 on socket [2] H225Lib::h225TAccept: Q.931 Call State is initialized to be [Null]. Hex representation of the received TPKT 030000A60802008005040488988CA56C0591373737377E008D0500B8060008914A000101400
DB-913
6007000740065006C0032003100332800B50000124001280001400F007000740065006C00320 0330040007A006F006E00650032002E0063006F006D006600000106B8003DC8490FB4B9D111B FAF0060B000E945000E07006500000106B822400F007000740065006C003200330040007A006 F006E00650032002E0063006F006D H225Lib::h225RecvData: Q.931 SETUP received from socket [2] H225Lib::h225RecvData: State changed to [Call Present]. RASlib::ras_sendto: msg length 119 sent to 102.0.0.1 RASLib::RASSendARQ: ARQ sent to 102.0.0.1 RASLib::RASRecvData: successfully rcvd message of length 119 from 102.0.0.1:24999 RASLib::RASRecvData: ARQ rcvd from [102.0.0.1:24999] on sock [0x68FC74] RASlib::ras_sendto: msg length 16 sent to 70.0.0.31 RASLib::RASSendACF: ACF sent to 70.0.0.31 RASLib::RASRecvData: successfully rcvd message of length 16 from 102.0.0.1:1719 RASLib::RASRecvData: ACF rcvd from [102.0.0.1:1719] on sock [0x67E6A4] RASlib::ras_sendto: msg length 119 sent to 102.0.0.1 RASLib::RASSendARQ: ARQ sent to 102.0.0.1 RASLib::RASRecvData: successfully rcvd message of length 119 from 102.0.0.1:24999 RASLib::RASRecvData: ARQ rcvd from [102.0.0.1:24999] on sock [0x68FC74] RASlib::ras_sendto: msg length 16 sent to 70.0.0.31 RASLib::RASSendACF: ACF sent to 70.0.0.31 RASLib::RASRecvData: successfully rcvd message of length 16 from 102.0.0.1:1719 RASLib::RASRecvData: ACF rcvd from [102.0.0.1:1719] on sock [0x67E6A4] Hex representation of the CALL PROCEEDING TPKT to send. 0300001B08028080027E000F050100060008914A00010880012800 H225Lib::h225CallProcRequest: Q.931 CALL PROCEEDING sent from socket [2]. Call state remains unchanged (Q.931 FSM simplified for H.225.0) H225Lib::h225TConn: connect in progress on socket [4] H225Lib::h225TConn: Q.931 Call State is initialized to be [Null]. Hex representation of the SETUP TPKT to send. 030000A50802008005040388C0A56C0591373737377E008D0500B8060008914A00010140060 07000740065006C0032003100332800B50000124001280001400F007000740065006C0032003 30040007A006F006E00650032002E0063006F006D005A00000D06B8003DC8490FB4B9D111BFA F0060B000E945000E07006600000106B822400F007000740065006C003200330040007A006F0 06E00650032002E0063006F006D H225Lib::h225SetupRequest: Q.931 SETUP sent from socket [4] H225Lib::h225SetupRequest: Q.931 Call State changed to [Call Initiated]. RASLib::RASRecvData: successfully rcvd message of length 123 from 90.0.0.13:1700 RASLib::RASRecvData: ARQ rcvd from [90.0.0.13:1700] on sock [0x68FC74] RASlib::ras_sendto: msg length 16 sent to 90.0.0.13 RASLib::RASSendACF: ACF sent to 90.0.0.13 Hex representation of the received TPKT 0300001808028080027E000C050100060008914A00010200 H225Lib::h225RecvData: Q.931 CALL PROCEEDING received from socket [4] Hex representation of the received TPKT 0300001808028080017E000C050300060008914A00010200 H225Lib::h225RecvData: Q.931 ALERTING received from socket [4] H225Lib::h225RecvData: Q.931 Call State changed to [Call Delivered]. Hex representation of the ALERTING TPKT to send. 0300001808028080017E000C050300060008914A00010000 H225Lib::h225AlertRequest: Q.931 ALERTING sent from socket [2]. Call state changed to [Call Received]. Hex representation of the received TPKT 0300003508028080070404889886A57E0023050240060008914A0001005A00000D06A402003 DC8490FB4B9D111BFAF0060B000E945 H225Lib::h225RecvData: Q.931 CONNECT received from socket [4] H225Lib::h225RecvData: Q.931 Call State changed to [Active]. Hex representation of the CONNECT TPKT to send. 030000370802808007040388C0A57E0026050240060008914A000100660000012AFC0880012 8003DC8490FB4B9D111BFAF0060B000E945 H225Lib::h225SetupResponse: Q.931 CONNECT sent from socket [2] H225Lib::h225SetupResponse: Q.931 Call State changed to [Active]. RASlib::ras_sendto: msg length 108 sent to 102.0.0.1 RASLib::RASSendIRR: IRR sent to 102.0.0.1 RASLib::RASRecvData: successfully rcvd message of length 108 from 102.0.0.1:24999
DB-914
December 2010
RASLib::RASRecvData: IRR rcvd from [102.0.0.1:24999] on sock [0x68FC74] RASLib::RASRecvData: successfully rcvd message of length 101 from 90.0.0.13:1700 RASLib::RASRecvData: IRR rcvd from [90.0.0.13:1700] on sock [0x68FC74] Hex representation of the received TPKT 0300001A080280805A080280107E000A050500060008914A0001 H225Lib::h225RecvData: Q.931 RELEASE COMPLETE received from socket [2] H225Lib::h225RecvData: Q.931 Call State changed to [Null]. RASlib::ras_sendto: msg length 55 sent to 102.0.0.1 RASLib::RASSendDRQ: DRQ sent to 102.0.0.1 H225Lib::h225RecvData: no connection on socket [2] RASLib::RASRecvData: successfully rcvd message of length 55 from 102.0.0.1:24999 RASLib::RASRecvData: DRQ rcvd from [102.0.0.1:24999] on sock [0x68FC74] RASlib::ras_sendto: msg length 3 sent to 70.0.0.31 RASLib::RASSendDCF: DCF sent to 70.0.0.31 Hex representation of the RELEASE COMPLETE TPKT to send. 0300001A080280805A080280107E000A050500060008914A0001 H225Lib::h225TerminateRequest: Q.931 RELEASE COMPLETE sent from socket [2]. Call state changed to [Null]. H225Lib::h225TClose: TCP connection from socket [2] closed RASlib::ras_sendto: msg length 55 sent to 102.0.0.1 RASLib::RASSendDRQ: DRQ sent to 102.0.0.1 RASLib::RASRecvData: successfully rcvd message of length 3 from 102.0.0.1:1719 RASLib::RASRecvData: DCF rcvd from [102.0.0.1:1719] on sock [0x67E6A4] RASLib::RASRecvData: successfully rcvd message of length 55 from 102.0.0.1:24999 RASLib::RASRecvData: DRQ rcvd from [102.0.0.1:24999] on sock [0x68FC74] RASlib::ras_sendto: msg length 3 sent to 70.0.0.31 RASLib::RASSendDCF: DCF sent to 70.0.0.31 RASLib::RASRecvData: successfully rcvd message of length 3 from 102.0.0.1:1719 RASLib::RASRecvData: DCF rcvd from [102.0.0.1:1719] on sock [0x67E6A4] Hex representation of the RELEASE COMPLETE TPKT to send. 0300001A080280805A080280107E000A050500060008914A0001 H225Lib::h225TerminateRequest: Q.931 RELEASE COMPLETE sent from socket [4]. Call state changed to [Null]. H225Lib::h225TClose: TCP connection from socket [4] closed RASLib::RASRecvData: successfully rcvd message of length 55 from 90.0.0.13:1700 RASLib::RASRecvData: DRQ rcvd from [90.0.0.13:1700] on sock [0x68FC74] RASlib::ras_sendto: msg length 3 sent to 90.0.0.13 RASLib::RASSendDCF: DCF sent to 90.0.0.13
DB-915
Syntax Description
Command History
Modification This command was introduced. This command was modified. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following are sample output from the debug h225 events command.
Example 1
The following output shows two proxy call scenarios. A trace is collected on the source proxy with H.225 turned on. The call is being established.
Router# debug h225 events H.225 Event Messages debugging is on Router# H225Lib::h225TAccept: TCP connection accepted from 50.0.0.12:1701 on socket [2] H225Lib::h225TAccept: Q.931 Call State is initialized to be [Null]. Hex representation of the received TPKT 0300007408020001050404889886A56C0580373737377E005B0500B0060008914A000101400 6007000740065006C003200310033020001400F007000740065006C003200330040007A006F0 06E00650032002E0063006F006D004EC8490FB4B9D111BFAF0060B000E945000C07003200000 C06B8 H225Lib::h225RecvData: Q.931 SETUP received from socket [2] H225Lib::h225RecvData: State changed to [Call Present]. Hex representation of the CALL PROCEEDING TPKT to send. 0300001B08028001027E000F050100060008914A00010880012800 H225Lib::h225CallProcRequest: Q.931 CALL PROCEEDING sent from socket [2]. Call state remains unchanged (Q.931 FSM simplified for H.225.0) H225Lib::h225TConn: connect in progress on socket [4] H225Lib::h225TConn: Q.931 Call State is initialized to be [Null]. Hex representation of the SETUP TPKT to send. 030000A60802008405040488988CA56C0591373737377E008D0500B8060008914A000101400 6007000740065006C0032003100332800B50000124001280001400F007000740065006C00320 0330040007A006F006E00650032002E0063006F006D006600000106B8004EC8490FB4B9D111B FAF0060B000E945000E07006500000106B822400F007000740065006C003200330040007A006 F006E00650032002E0063006F006D H225Lib::h225SetupRequest: Q.931 SETUP sent from socket [4] H225Lib::h225SetupRequest: Q.931 Call State changed to [Call Initiated]. Hex representation of the received TPKT 0300001B08028084027E000F050100060008914A00010880012800
DB-916
December 2010
H225Lib::h225RecvData: Q.931 CALL PROCEEDING received from socket [4] Hex representation of the received TPKT 0300001808028084017E000C050300060008914A00010000 H225Lib::h225RecvData: Q.931 ALERTING received from socket [4] H225Lib::h225RecvData: Q.931 Call State changed to [Call Delivered]. Hex representation of the ALERTING TPKT to send. 0300001808028001017E000C050300060008914A00010000 H225Lib::h225AlertRequest: Q.931 ALERTING sent from socket [2]. Call state changed to [Call Received]. Hex representation of the received TPKT 030000370802808407040388C0A57E0026050240060008914A000100660000012AFF0880012 8004EC8490FB4B9D111BFAF0060B000E945 H225Lib::h225RecvData: Q.931 CONNECT received from socket [4] H225Lib::h225RecvData: Q.931 Call State changed to [Active]. Hex representation of the CONNECT TPKT to send. 0300003808028001070404889886A57E0026050240060008914A000100650000012AFC08800 128004EC8490FB4B9D111BFAF0060B000E945 H225Lib::h225SetupResponse: Q.931 CONNECT sent from socket [2] H225Lib::h225SetupResponse: Q.931 Call State changed to [Active].
Example 2
The following output shows two proxy call scenarios. A trace is collected on the source proxy with H.225 turned on. The call is being torn down.
Router# debug h225 events H.225 Event Messages debugging is on Router# Hex representation of the received TPKT 0300001A080200015A080200907E000A050500060008914A0001 H225Lib::h225RecvData: Q.931 RELEASE COMPLETE received from socket [2] H225Lib::h225RecvData: Q.931 Call State changed to [Null]. H225Lib::h225RecvData: no connection on socket [2] Hex representation of the RELEASE COMPLETE TPKT to send. 0300001A080280015A080280107E000A050500060008914A0001 H225Lib::h225TerminateRequest: Q.931 RELEASE COMPLETE sent from socket [2]. Call state changed to [Null]. H225Lib::h225TClose: TCP connection from socket [2] closed Hex representation of the RELEASE COMPLETE TPKT to send. 0300001A080280845A080280107E000A050500060008914A0001 H225Lib::h225TerminateRequest: Q.931 RELEASE COMPLETE sent from socket [4]. Call state changed to [Null]. H225Lib::h225TClose: TCP connection from socket [4] closed
DB-917
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(3)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
This command slows the system down considerably. Connections may time out.
DB-918
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(3)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-919
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To reduce the system impact of the output that this command generates, use the debug h245 srtp command during times of minimal system traffic. To reduce system overhead and redirect logging to an internal buffer, use the logging buffered command. Use the debug h225 asn1 command to display Abstract Syntax Notation One (ASN.1) contents of H.225 messages. Use the debug h245 asn1 command to display ASN.1 contents of H.245 messages. The output from the debug h245 srtp command is primarily used by Cisco technical personnel. See the Examples section for an explanation of selected fields.
Examples
The following example displays SRTP messages exchanged during H.225 and H.245 signaling:
Router# debug h245 srtp H.245 SRTP Messages debugging is on SY3725_1# 000072: Mar 16 16:46:38.237: //-1/xxxxxxxxxxxx/H323/cch323_post_call_setup_request: cch323_post_call_setup_request:1015: SRTP added to ev for stream:SRTP_TX_STREAM. 000073: Mar 16 16:46:38.237: //-1/xxxxxxxxxxxx/H323/cch323_dump_srtp_caps: crypto_bm=0x1, codec_bm=0xB. 000074: Mar 16 16:46:38.237: //-1/xxxxxxxxxxxx/H323/cch323_dump_srtp_media_params:
DB-920
December 2010
srtp_ssrc=0x0, crypto_services=0x0, crypto_suite=0x0, master_key_len=0x0, master_salt_len=0x0, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000075: Mar 16 16:46:38.237: //-1/xxxxxxxxxxxx/H323/cch323_dump_srtp_sess_params:
The following lines show SRTP configuration. Fields having a value set to 1 show that SRTP is enabled.
peer->voice_peer_tag = 101, ccb->srtp_call = 1, ccb->srtp_fallback = 1, ccb->srtp_transparent = 1 000079: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_get_caps_chn_info: Local[TX] SRTP Info:../voip/cch323/gw/src/cch323_h245_iwf_util.c:cch323_get_caps_chn_info:148 000080: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps:
DB-921
The following line shows SRTP capability for the DSP, indicated by the crypto_bm field. A value of 0x0 indicates the DSP is not SRTP capable.
crypto_bm=0x0, codec_bm=0x0. 000085: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x0, crypto_suite=0x0, master_key_len=0x0, master_salt_len=0x0, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000086: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x0, encryptedsrtp=0x0, encryptedsrtcp=0x0, fecorder=0x0, windowsizehint=0x0 000087: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_build_local_encoded_fastStartOLCs: ../voip/cch323/gw/src/cch323_h245_util.c:cch323_build_local_encoded_fastStartOLCs:1518: OGW: generating Keys. 000088: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_generate_srtp_info: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_generate_srtp_info:31: Entry 000089: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_generate_srtp_info: Generated SRTP info:../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_generate_srtp_info:83 000090: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps: crypto_bm=0x1, codec_bm=0xB. 000091: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000092: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x18, encryptedsrtp=0x1, encryptedsrtcp=0x1, fecorder=0x0, windowsizehint=0x40 000093: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_generate_srtp_info: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_generate_srtp_info:86: Exit 000094: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/cch323_generate_srtp_info: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_generate_srtp_info:31: Entry 000095: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/cch323_generate_srtp_info: Generated SRTP info:../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_generate_srtp_info:83 000096: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps: crypto_bm=0x0, codec_bm=0x0. 000097: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0,
DB-922
December 2010
crypto_services=0x3, crypto_suite=0x0, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000098: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x18, encryptedsrtp=0x1, encryptedsrtcp=0x1, fecorder=0x0, windowsizehint=0x40 000099: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/cch323_generate_srtp_info: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_generate_srtp_info:86: Exit 000100: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/build_fastStart_OLCs: FWD OLC SRTP params:../voip/cch323/gw/src/cch323_h245_util.c:build_fastStart_OLCs:1403 000101: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/build_fastStart_OLCs: RVR OLC SRTP Params:../voip/cch323/gw/src/cch323_h245_util.c:build_fastStart_OLCs:1417 000102: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_build_olc_for_ccapi: ../voip/cch323/gw/src/cch323_h245_util.c:cch323_build_olc_for_ccapi:1690: WE ARE OGW.
The following lines show the outgoing gateway sending SRTP capabilities:
000103: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_build_olc_for_ccapi: Local SRTP Info:../voip/cch323/gw/src/cch323_h245_util.c:cch323_build_olc_for_ccapi:1779 000104: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps: crypto_bm=0x1, codec_bm=0xB. 000105: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000106: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x18, encryptedsrtp=0x1, encryptedsrtcp=0x1, fecorder=0x0, windowsizehint=0x40
The following lines show that the gateway has received SRTP capabilities from the remote end:
000107: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_build_olc_for_ccapi: Remote SRTP Info:../voip/cch323/gw/src/cch323_h245_util.c:cch323_build_olc_for_ccapi:1783 000108: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps: crypto_bm=0x1, codec_bm=0x1.
DB-923
000109: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000110: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x18, encryptedsrtp=0x1, encryptedsrtcp=0x1, fecorder=0x0, windowsizehint=0x40 000111: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/h323_common_setup_rtcp_parameters: ../voip/cch323/gw/os/src/h323_gw_rtpapi.c:h323_common_setup_rtcp_parameters:378:olc->rtcp_ session.srtp_services:3 000112: Mar 16 16:46:38.305: vtsp_call_ssrc_update: updated ssrc=0x5227F02 000113: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:369: Entry 000114: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:416: TX [Local] SRTP Info . 000115: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000116: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:448: RX [Remote] SRTP Info . 000117: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000118: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: % SRTP Library session creation, id:0x80000002, context:0x653E0CF8, num_context=2, rtp:0x653D2CF4, rtp_session:0x66D79B00 000119: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:514: Exit
DB-924
December 2010
000120: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/h323_common_setup_rtcp_parameters: ../voip/cch323/gw/os/src/h323_gw_rtpapi.c:h323_common_setup_rtcp_parameters:378:olc->rtcp_ session.srtp_services:3 000121: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:369: Entry 000122: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:416: TX [Local] SRTP Info . 000123: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000124: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:448: RX [Remote] SRTP Info . 000125: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000126: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: % SRTP Library session update with 2 keysid:0x80000002 context:0x653E0CF8 000127: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:514: Exit 000128: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/h323_common_setup_rtcp_parameters: ../voip/cch323/gw/os/src/h323_gw_rtpapi.c:h323_common_setup_rtcp_parameters:378:olc->rtcp_ session.srtp_services:3 000129: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:369: Entry 000130: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:416: TX [Local] SRTP Info . 000131: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000132: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:448: RX [Remote] SRTP Info .
DB-925
000133: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000134: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: % SRTP Library session update with 2 keysid:0x80000002 context:0x653E0CF8 000135: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:514: Exit 000136: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_h245_cap_ind: Updated CCB(0x66D8D2D4) with TCS Remote SRTP Info: 000137: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps: crypto_bm=0x1, codec_bm=0xB. 000138: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000139: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x18, encryptedsrtp=0x1, encryptedsrtcp=0x1, fecorder=0x0, windowsizehint=0x40 000140: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_update_tcs_nonstd_info: cch323_update_tcs_nonstd_info:5800: Posting TCS SRTP caps to other callleg. 000141: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps: crypto_bm=0x1, codec_bm=0xB. 000142: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000143: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x18, encryptedsrtp=0x1, encryptedsrtcp=0x1,
DB-926
December 2010
Related Commands
Command debug h225 asn1 debug h245 asn1 logging buffered srtp (voice) srtp (dial-peer)
Description Displays ASN.1 contents of H.225 messages. Displays ASN.1 contents of H.245 messages. Enables system message logging to a local buffer. Enables secure calls globally. Enables secure calls for a specific dial peer.
DB-927
debug h323-annexg
To display all pertinent Annex G messages that have been transmitted and received, use the debug h323-annexg command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug h323-annexg {asn1 | errors | events | inout} no debug h323-annexg
Syntax Description.
Displays the Annex G ASN.1 messages. Displays the Annex G error messages encountered during processing. Displays the Annex G events received from the state machine. (Optional) This functionality is not yet implemented.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(4)T. This command was implemented on the Cisco AS5850. This command was implemented on the Cisco AS5850. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug h323-annexg events command:
Router# debug h323-annexg events Aug 16 14:03:40.983:be_process:BE QUEUE_EVENT (minor 73) wakeup Aug 16 14:03:40.983:be_sm:Received event BE_EV_DO_QUERY Aug 16 14:03:40.983:<- query_neighbor:Sent descriptorIDRequest to 172.18.195.46:2099 [320] Aug 16 14:03:40.983:be_sm:Started query-timer of 1 minutes for neighbor at 172.18.195.46 Aug 16 14:03:40.991:-> nxg_recv_msg:Rcvd dscrptrIDCnfrmtn from 172.18.195.46:2099 [320] Aug 16 14:03:41.531:<- send_descriptor_request:Sent descriptorRequest to 172.18.195.46:2099 [321] Aug 16 14:03:41.539:-> nxg_recv_msg:Rcvd descriptorConfirmation from 172.18.195.46:2099 [321] Aug 16 14:03:41.539:handle_descriptor_cfm:Descriptor from neighbor 172.18.195.46 unchanged, TTL is 60 Seconds
DB-928
December 2010
Related Commands
Command emulate
Description Displays all pertinent Annex E messages that have been transmitted and received.
DB-929
Syntax Description
if-config
(Optional) Displays debugging messages showing the timing of the reconfiguration of cable interfaces during HCCP redundancy operations.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router. Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router. The if-config option was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You must activate the debug hccp events command before the debug hccp timing command will generate any debug message output.
Examples
The following example shows typical output for the debug hccp timing command:
Router# debug hccp events Router# debug hccp timing HCCP timing measurement debugging is on May May May May May May May May May May May May 31 31 31 31 31 31 31 31 31 31 31 31 10:21:07.609 10:21:07.609 10:21:08.705 10:21:08.705 10:21:08.773 10:21:08.793 10:21:10.730 10:21:10.730 10:21:10.734 10:21:10.774 10:21:10.774 10:21:10.774 HCCP HCCP HCCP HCCP HCCP HCCP HCCP HCCP HCCP HCCP HCCP HCCP P is busy. Deactivating 1 6 P is busy. Deactivating 2 6 hwif_goingdown for Cable8/1/0. Deactivate 1 6 hwif_goingdown for Cable8/1/1. Deactivate 2 6 2 6 Working: become standby - 68 msec 1 6 Working: become standby - 20 msec 1 1 Working: turn on "uc" - 8 msec 1 1 Working: turn on "nru" - 0 msec 1 1 Working: become active - 4 msec 2 1 Working: turn on "uc" - 52 msec 2 1 Working: turn on "nru" - 0 msec 2 1 Working: become active - 0 msec
DB-930
December 2010
May May May May May May May May May May May May May May May May May May May May May May May May May May May May May May May May May May May May May May May May May
31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31
10:21:12.350 10:21:12.350 10:21:12.350 10:21:12.350 10:21:12.350 10:21:12.350 10:21:12.350 10:21:12.350 10:21:12.350 10:21:12.350 10:21:12.350 10:21:12.350 10:21:13.726 10:21:13.790 10:21:14.422 10:21:14.422 10:21:14.438 10:21:14.702 10:21:14.702 10:21:16.078 10:21:16.078 10:21:16.078 10:21:16.599 10:21:16.599 10:21:17.014 10:21:17.014 10:21:17.593 10:21:17.593 10:21:18.112 10:21:18.112 10:21:18.331 10:21:18.331 10:21:18.331 10:21:18.331 10:21:18.331 10:21:19.691 10:21:20.112 10:21:20.112 10:21:20.112 10:21:20.112 10:21:20.112
HCCP hwif_goingdown for Cable5/1/0. Deactivate 1 1 HCCP hwif_goingdown for Cable5/1/0. Deactivate 1 6 HCCP hwif_goingdown for Cable5/1/0. Deactivate 1 3 HCCP hwif_goingdown for Cable5/1/0. Deactivate 1 2 HCCP hwif_goingdown for Cable5/1/0. Deactivate 1 5 HCCP hwif_goingdown for Cable5/1/0. Deactivate 1 4 HCCP hwif_goingdown for Cable5/1/1. Deactivate 2 1 HCCP hwif_goingdown for Cable5/1/1. Deactivate 2 3 HCCP hwif_goingdown for Cable5/1/1. Deactivate 2 6 HCCP hwif_goingdown for Cable5/1/1. Deactivate 2 2 HCCP hwif_goingdown for Cable5/1/1. Deactivate 2 4 HCCP hwif_goingdown for Cable5/1/1. Deactivate 2 5 HCCP 1 1 Protect: turn off "uc" - 1972 msec HCCP 2 1 Protect: turn off "uc" - 2036 msec HCCP 1 1 Protect: turn off "nru" - 696 msec HCCP 1 1 Protect: unload config (if) - 0 msec HCCP 1 1 Protect: unload config (subif) - 16 msec HCCP 1 1 Protect: unload config (ds) - 264 msec HCCP 1 1 Protect: become standby - 0 msec HCCP 2 1 Protect: turn off "nru" - 2288 msec HCCP 2 1 Protect: unload config (if) - 0 msec HCCP 2 1 Protect: unload config (subif) - 0 msec HCCP 2 1 Protect: unload config (ds) - 520 msec HCCP 2 1 Protect: become standby - 0 msec HCCP: P missed hello ack in LEARN state and is locked. Deactivate 4 1 HCCP 4 1 Protect: turn off "rfswitch" - 52 msec HCCP 3 1 Working: turn on "rfswitch" - 0 msec HCCP 3 1 Working: become active - 0 msec HCCP 1 1 Protect: load config (if) - 0 msec HCCP 1 1 Protect: load config (subif) - 4 msec HCCP 1 1 Protect: load config (ds) - 100 msec HCCP 2 1 Working: turn off "rfswitch" - 0 msec HCCP 2 Cable5/0/1 Protect: resolve conflict Learn->Teach HCCP 2 1 Protect: load config (if) - 0 msec HCCP 2 1 Protect: load config (subif) - 0 msec HCCP 2 1 Protect: load config (ds) - 76 msec HCCP 2 1 Protect: turn on "rfswitch" - 48 msec HCCP 2 1 Protect: become active - 0 msec HCCP 2 1 Protect: load config (ds) - 76 msec HCCP 2 1 Protect: turn on "rfswitch" - 48 msec HCCP 2 1 Protect: become active - 0 msec
The following example shows typical output for the debug hccp timing if-config command:
Router# debug hccp events Router# debug hccp timing if-config HCCP Timing measurements messages of (UN)LOAD IF config CLI is on HCCP 1 1 Working: unload config (ds) - 112 msec HCCP 1 1 Protect: load config (ds) - 123 msec HCCP 1 1 Protect: load config (chnl set freq) - 35 msec
Related Commands
Command debug hccp authentication debug hccp channel-switch debug hccp events
Description Displays authentication debug messages for HCCP groups. Displays debug messages related to an RF or channel switch that is being used for HCCP N+1 (1:n) redundancy. Displays debug messages for all HCCP group interaction.
DB-931
Command debug hccp inter-db debug hccp plane debug hccp sync
Description Displays debug messages for the inter-database events during HCCP operations. Displays debug messages for HCCP-related messages sent between the routers control plane and data backplane. Displays debug messages for HCCP synchronization messages.
DB-932
December 2010
debug hpi
Note
Effective with release 12.3(8)T, the debug hpi command is replaced by the debug voip hpi command. See the debug voip hpi command for more information. To enable debugging for Host Port Interface (HPI) message events, use the debug hpi command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug hpi {all | buffer size | capture | command | destination url | detail | error | notification | response | stats} no debug hpi {all | buffer size | capture | command | destination url | detail | error | notification | response | stats}
Syntax Description
Enables all HPI debug options (command, detail, error, notification, and response). Sets the maximum amount of memory (in bytes) that the capture system allocates for its buffers when it is active. Valid size range is from 0 to 9000000. Default is 0. Displays HPI capture. Displays commands that are being sent to the 54x DSP. Turns capture on if it was off and sends the output to the specified URL. If capture was previously enabled for a different URL, the existing URL is closed, the new URL is opened, and output is sent to the new URL. Displays additional detail for the HPI debugs that are enabled. Displays any HPI errors. Displays notification messages sent that are from the 54x DSP (for example, tone detection notification). Displays responses (to commands) that are sent by the 54x DSP (for example, responses to statistic requests). Displays HPI statistics.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 and Cisco AS5800. This command was implemented on the Cisco 1700, Cisco 2600 series, Cisco 3600 series, and the Cisco MC3810. The stats keyword was added.
DB-933
Modification This command was implemented on the Cisco 827, Cisco 2400, Cisco 7200 series, and Cisco CVA 120. The following keywords were added: buffer, capture, and destination. This command was replaced by the debug voip hpi command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.3(8)T 12.2SX
Usage Guidelines
This command enables debugging for HPI message events, which are used to communicate with digital signal processors (DSPs). When used with the Voice DSP Contol Message Logger feature, the debug hpi buffer command sets the maximum amount of memory (in bytes) that the capture system can allocate for its buffers when it is active. The debug hpi capture destination url command turns capture on if it was off and sends the output to the given URL. If capture was previously enabled for a different URL, the existing URL is closed, the new URL is opened, and output is sent to the new URL. When you use the no debug hpi capture command, the capture option is turned off if it was on, any open files are closed, and any allocated memory is released. Use the debug hpi all command to view gateway DSP modem relay termination codes. The DSP-to-host messages for the modem relay termination indicate to the host the modem relay session termination time, physical or link layer, and other probable causes for disconnection. On receiving this indication from the DSP, the host can disconnect the call or place the channel in the modem passthrough state. When this command is used on a Cisco AS5300 during a calling session, the Cisco AS5300 displays the following information (of severity 6 whereas ordinary debug information is severity 7) on the screen by default:
2w6d:%ISDN-6-DISCONNECT:Interface Serial0:18 disconnected from 22022 , call lasted 12 seconds 2w6d:%ISDN-6-DISCONNECT:Interface Serial1:9 disconnected from 32010 , call lasted 14 seconds 2w6d:%ISDN-6-CONNECT:Interface Serial3:2 is now connected to 52003 2w6d:%ISDN-6-CONNECT:Interface Serial2:11 is now connected to 42002
To disable this default information on the Cisco AS5300 and to block the display of the debug hpi capture and show voice hpi capture commands, set the login console to a severity lower than 6.
Examples
The following example turns on the debug output from capture routines:
Router# debug hpi capture HPI Capture/Logger debugging is on
Related Commands
DB-934
December 2010
Syntax Description
Displays all debugging messages for the HTTP client. Displays debugging information for the HTTP client application programming interface (API) process. Displays background messages. Displays debugging information for the HTTP client cache module. Displays the HTTP client error messages. Displays debugging information for the HTTP client main process. Displays the HTTP client messages. Displays the HTTP client socket messages.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300, Cisco AS5350, and Cisco AS5400. This command was implemented on the Cisco 3640 and Cisco 3660, and the background keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The output of this command is effected by the debug condition application voice command. If the debug condition application voice command is configured and the <cisco-debug> element is enabled in the VoiceXML document, debugging output is limited to the VoiceXML application named in the debug condition application voice command.
Note
We recommend that you log output from the debug http client msg and debug http client socket commands to a buffer, rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
DB-935
Examples
The following is sample output from the debug http client api command:
Router# debug http client api HTTP Client API Process debugging is on *Jan 3 10:58:48.609: httpc_send_ev: event sent to HTTP Client: *Jan 3 10:58:48.609: method (GET), url (http://serverX.com/vxml/test/prompts/9.au) *Jan 3 10:58:48.609: callback (61008E78), argp (63590DB4), sid (0), timeout (60), retries (2) *Jan 3 10:58:48.609: httpc_free: app freeing response data(626FA608) *Jan 3 10:58:59.353: httpc_send_ev: event sent to HTTP Client: *Jan 3 10:58:59.353: method (GET), url (http://1.7.100.1/vxml/test/dropoffRecord) *Jan 3 10:58:59.353: callback (61008E78), argp (6393B684), sid (0), timeout (60), retries (0) *Jan 3 10:58:59.369: httpc_free: app freeing response data(626F9348) *Jan 3 10:59:45.033: httpc_send_ev: event sent to HTTP Client: *Jan 3 10:59:45.033: method (POST), url (http://rtsp-ws/dropoffAppend.php?append=&disconnect=1) *Jan 3 10:59:45.033: callback (60FE9064), argp (63448820), sid (7179), timeout (0), retries (0) *Jan 3 10:59:57.369: httpc_free: app freeing response data(626F9340)
The following is sample output from the debug http client cache command:
Router# debug http client cache HTTP Client Cache Module debugging is on *Jan 3 11:53:52.817: httpc_cache_rsp_return: cache(626F8E50)URL:http://serverX.com/vxml/test/root.vxml *Jan 3 11:53:52.829: httpc_cache_entry_free: cache(626F8B30)URL:http://serverX.com/vxml/test/getPhoneInfo.vxml?ani=1234567&dnis=7654321 *Jan 3 11:53:52.837: httpc_cache_entry_free: cache(626F9710)URL:http://1.7.100.1/vxml/test/engine.vxml?flow=iso *Jan 3 11:53:52.853: httpc_cache_rsp_return: cache(626F8B30)URL:http://1.7.100.1/vxml/test/root.vxml *Jan 3 11:53:52.873: httpc_cache_rsp_return: cache(626F9030)URL:http://1.7.100.1/vxml/test/getExtension.vxml *Jan 3 11:53:59.517: httpc_cache_entry_free: cache(626F9170)URL:http://1.7.100.1/vxml/test/checkExtension.vxml?extension=1234&attempt=1 *Jan 3 11:53:59.545: httpc_cache_rsp_return: cache(626F9A30)URL:http://1.7.100.1/vxml/test/dropoff.vxml *Jan 3 11:54:10.361: httpc_cache_rsp_return: cache(626F9DF0)URL:http://serverX.com/vxml/test/init.vxml *Jan 3 11:54:10.361: httpc_cache_rsp_return: cache(626FA430)URL:http://1.7.100.1/vxml/test/dropoffRecord *Jan 4 00:20:23.474: httpc_cache_store: entry(http://ServerY.com/vxml/init.vxml) size(10114 bytes) is too large to cache.
The following is sample output from the debug http client main command:
Router# debug http client main HTTP Client Main Process debugging is on *Jan 3 11:56:05.885: httpc_get, url: http://serverX.com/vxml/test/root.vxml *Jan 3 11:56:05.889: httpc_msg_send, sid: 0, method: 83951618 *Jan 3 11:56:05.889: httpc_enqueue_wmsg, sid: 0, method: 83951618 *Jan 3 11:56:05.893: httpc_process_write_queue, socket writeble fd: 0, process enqueued msg, sid: 0, method: 83951618 *Jan 3 11:56:05.893: httpc_msg_write, sid: 0, method: 83951618 *Jan 3 11:56:05.901: HTTPC_MSG_COMPLETE: rsp_code(304),msg(62C9C25C)URL:http://serverX.com/vxml/test/root.vxml, fd(0)
DB-936
December 2010
*Jan 3 11:56:05.901: httpc_process_redirect_rsp: msg(62C9C25C)URL:http://serverX.com/vxml/test/root.vxml, response code HTTPC_NOT_MODIFIED_304 *Jan 3 11:56:05.913: httpc_get, url: http://serverX.com/vxml/test/getPhoneInfo.vxml?ani=1234567&dnis=7654321 *Jan 3 11:56:05.917: httpc_msg_send, sid: 0, method: 65538 *Jan 3 11:56:05.917: httpc_enqueue_wmsg, sid: 0, method: 65538 *Jan 3 11:56:05.917: httpc_process_write_queue, socket writeble fd: 1, process enqueued msg, sid: 0, method: 65538 *Jan 3 11:56:05.917: httpc_msg_write, sid: 0, method: 65538 *Jan 3 11:56:05.925: HTTPC_MSG_COMPLETE: rsp_code(200),msg(62CB5824)URL:http://serverX.com/vxml/test/getPhoneInfo.vxml?ani=1234567& dnis=7654321, fd(1) *Jan 3 11:56:05.929: httpc_get, url: http://1.7.100.1/vxml/test/engine.vxml?flow=iso *Jan 3 11:56:05.929: httpc_msg_send, sid: 0, method: 65538 *Jan 3 11:56:05.929: httpc_enqueue_wmsg, sid: 0, method: 65538 *Jan 3 11:56:05.929: httpc_process_free_rsp: User returns noncache response (626F9670) *Jan 3 11:56:05.929: httpc_process_write_queue, socket writeble fd: 1, process enqueued msg, sid: 0, method: 65538 *Jan 3 11:56:05.929: httpc_msg_write, sid: 0, method: 65538 *Jan 3 11:56:05.937: HTTPC_MSG_COMPLETE: rsp_code(200),msg(62CB03AC)URL:http://1.7.100.1/vxml/test/engine.vxml?flow=iso, fd(1)
The following is sample output from the debug http client msg command:
Router# debug http client msg HTTP Client: HTTP Client Messages debugging is on *Jan 1 05:07:30.534: HTTP Client write buffer fd(0): GET /vxml/abcdefg/test/init.vxml HTTP/1.1 Host: c5300-2 Content-Type: application/x-www-form-urlencoded Connection: Keep-Alive Accept: text/vxml; level = 1, text/plain, text/html, audio/basic User-Agent: Cisco-IOS-C5300/12.2(20010829:180555) VoiceXML/1.0 *Jan 1 05:07:30.538: about to send data to socket 0 : first 263 bytes of data: 62397130: 62397140: 2F76786D 6C2F6162 63646566 62397150: 73742F69 6E69742E 76786D6C 62397160: 502F312E 310D0A48 6F73743A 62397170: 30302D32 0D0A436F 6E74656E 62397180: 70653A20 6170706C 69636174 62397190: 782D7777 772D666F 726D2D75 623971A0: 636F6465 640D0A43 6F6E6E65 623971B0: 6E3A204B 6565702D 416C6976 623971C0: 63636570 743A2074 6578742F 623971D0: 3B206C65 76656C20 3D20312C 623971E0: 742F706C 61696E2C 20746578 623971F0: 6D6C2C20 61756469 6F2F6261 62397200: 0A557365 722D4167 656E743A 62397210: 636F2D49 4F532D43 35333030 62397220: 32283230 30313038 32393A31 62397230: 35292056 6F696365 584D4C2F 62397240: 0A0D0A00 *Jan 1 05:07:30.546: read data from first 400 bytes of data: 47455420 672F7465 20485454 20633533 742D5479 696F6E2F 726C656E 6374696F 650D0A41 76786D6C 20746578 742F6874 7369630D 20436973 2F31322E 38303535 312E300D socket 0 : GET /vxml/abcdefg/te st/init.vxml HTT P/1.1..Host: c53 00-2..Content-Ty pe: application/ x-www-form-urlen coded..Connectio n: Keep-Alive..A ccept: text/vxml ; level = 1, tex t/plain, text/ht ml, audio/basic. .User-Agent: Cis co-IOS-C5300/12. 2(20010829:18055 5) VoiceXML/1.0. ....
DB-937
628DE8F0: 48545450 2F312E31 20323030 HTTP/1.1 200 628DE900: 204F4B0D 0A446174 653A2046 72692C20 OK..Date: Fri, 628DE910: 33312041 75672032 30303120 30373A30 31 Aug 2001 07:0 628DE920: 363A3335 20474D54 0D0A5365 72766572 6:35 GMT..Server 628DE930: 3A204170 61636865 2F312E33 2E313120 : Apache/1.3.11 628DE940: 28556E69 78292041 70616368 654A5365 (Unix) ApacheJSe 628DE950: 72762F31 2E300D0A 4C617374 2D4D6F64 rv/1.0..Last-Mod 628DE960: 69666965 643A2057 65642C20 3233204D ified: Wed, 23 M 628DE970: 61792032 30303120 31353A35 333A3233 ay 2001 15:53:23 628DE980: 20474D54 0D0A4554 61673A20 22323430 GMT..ETag: "240 628DE990: 37642D31 39322D33 62306264 63663322 7d-192-3b0bdcf3" 628DE9A0: 0D0A4163 63657074 2D52616E 6765733A ..Accept-Ranges: 628DE9B0: 20627974 65730D0A 436F6E74 656E742D bytes..Content628DE9C0: 4C656E67 74683A20 3430320D 0A4B6565 Length: 402..Kee 628DE9D0: 702D416C 6976653A 2074696D 656F7574 p-Alive: timeout 628DE9E0: 3D352C20 6D61783D 31300D0A 436F6E6E =5, max=10..Conn 628DE9F0: 65637469 6F6E3A20 4B656570 2D416C69 ection: Keep-Ali 628DEA00: 76650D0A 436F6E74 656E742D 54797065 ve..Content-Type 628DEA10: 3A207465 78742F76 786D6C0D 0A0D0A3C : text/vxml....< 628DEA20: 3F786D6C 20766572 73696F6E 3D22312E ?xml version="1. 628DEA30: 30223F3E 0A3C7678 6D6C2076 65727369 0"?>.<vxml versi 628DEA40: 6F6E3D22 312E3022 20617070 6C696361 on="1.0" applica 628DEA50: 74696F6E 3D22726F 6F742E76 786D6C22 tion="root.vxml" 628DEA60: 3E0A2020 3C666F72 6D3E0A20 2020203C >. <form>. < 628DEA70: 626C6F63 6B3E0A20 20202020 203C212D block>. <!628DEA80: 2D0A2020 20 -. *Jan 1 05:07:30.550: httpc_decode_msgheader: Client ignores this header: Server: Apache/1.3.11 (Unix) ApacheJServ/1.0 *Jan 1 05:07:30.554: httpc_decode_msgheader: Client ignores this header: Accept-Ranges: bytes *Jan 1 05:07:30.554: processing server rsp msg: msg(62C711C4)URL:http://vvv.com/vxml/abcdefg/test/init.vxml, fd(0): *Jan 1 05:07:30.554: Request msg: GET /vxml/abcdefg/test/init.vxml HTTP/1.1 *Jan 1 05:07:30.554: Message Response Code: 200 *Jan 1 05:07:30.554: Message Rsp Decoded Headers: *Jan 1 05:07:30.554: Date:Fri, 31 Aug 2001 07:06:35 GMT *Jan 1 05:07:30.554: Content-Length:402 *Jan 1 05:07:30.554: Content-Type:text/vxml *Jan 1 05:07:30.554: ETag:"2407d-192-3b0bdcf3" *Jan 1 05:07:30.554: Last-Modified:Wed, 23 May 2001 15:53:23 GMT *Jan 1 05:07:30.554: Connection:Keep-Alive *Jan 1 05:07:30.554: Keep-Alive:timeout=5, max=10 *Jan 1 05:07:30.554: httpc_dump_msg: headers: *Jan 1 05:07:30.554: HTTP/1.1 200 OK Date: Fri, 31 Aug 2001 07:06:35 GMT Server: Apache/1.3.11 (Unix) ApacheJServ/1.0 Last-Modified: Wed, 23 May 2001 15:53:23 GMT ETag: "2407d-192-3b0bdcf3" Accept-Ranges: bytes Content-Length: 402 Keep-Alive: timeout=5, max=10 Connection: Keep-Alive Content-Type: text/vxml *Jan 1 05:07:30.558: httpc_dump_msg: body: *Jan 1 05:07:30.558: <?xml version="1.0"?> <vxml version="1.0" application="root.vxml"> <form> <block> <!-<var name="ani" expr="session.telephone.ani"/> <var name="dnis" expr="session.telephone.dnis"/> --> <var name="ani" expr="1234567"/>
DB-938
December 2010
<var name="dnis" expr="7654321"/> <submit next="getPhoneInfo.vxml" method="get" namelist="ani dnis"/> </block> </form> </vxml>
The following is sample output from the debug http client socket command:
Router# debug http client socket HTTP Client Sockets debugging is on *Jan 3 11:32:38.353: port(80) *Jan 3 11:32:38.377: port(80) *Jan 3 11:32:38.381: *Jan 3 11:32:38.389: port(80) *Jan 3 11:32:38.393: *Jan 3 11:32:38.397: port(80) *Jan 3 11:32:40.361: *Jan 3 11:32:40.413: *Jan 3 11:40:43.557: httpc_process_read_ev: HTTPC SOCK_PENDING --> SOCK_CONNECTED fd(0) httpc_process_read_ev: HTTPC SOCK_PENDING --> SOCK_CONNECTED fd(1) httpc_socket_cleanup: fd(1) httpc_process_read_ev: HTTPC SOCK_PENDING --> SOCK_CONNECTED fd(1) httpc_socket_cleanup: fd(1) httpc_process_read_ev: HTTPC SOCK_PENDING --> SOCK_CONNECTED fd(1) httpc_socket_cleanup: fd(0) httpc_socket_cleanup: fd(1) httpc socket_connect failed fd(2)
The following is sample output from the debug http client error command:
Router# debug http client error HTTP Client Error debugging is on *Jan 3 12:07:40.209: HTTPC URL:http://serverX.com/vxml/test.vxml, Server rsp_code(404), fd(0) *Jan 3 12:08:01.677: HTTPC SOCK_FAIL() - msg(62CA5FB4)URL:http://serverX/vxml/test.vxml *Jan 3 12:08:01.677: httpc_free: NULL pointer argument *Jan 3 12:08:01.677: HTTPC URL:http://serverX/vxml/test.vxml, MSG_XMIT_ERROR, fd(-1) Jan 3 23:44:06 PDT: HTTPC URL:http://serverY.com:9000/ivr/sid-351/dropoffDeposit?pri=0&disconnect=1, TIMEOUT(60000 msec), fd(-1) Jan 3 23:44:07 PDT: HTTPC msg timeout waiting for rsp - fd(21) Jan 3 23:44:07 PDT: httpc_free: NULL pointer argument Jan 4 02:45:07 PDT: HTTPC msg timeout waiting for rsp - fd(0) Jan 4 02:45:07 PDT: HTTPC URL:http://rtsp-ws/dropoffAppend.php?append=&disconnect=1, TIMEOUT(10000 msec), fd(-1) Jan 4 02:46:07 PDT: httpc_msg_read: URL(http://1.7.100.1/vxml/root.vxml) - msg length not available.Failed to parse message body. Jan 4 02:46:07 PDT: httpc_msg_read: ERROR - DECODE Jan 4 02:46:08 PDT: HTTPC bad message read - fd(6), conp(632A93B4), msg(63280794)URL:http://1.7.100.1/vxml/test/root.vxml, len(1611) Jan 4 02:46:08 PDT: First 400 bytes read from socket: 6241D9C0: 6241D9D0: 6241D9E0: 6241D9F0: 6241DA00: 6241DA10: 6241DA20: 6241DA30: 6241DA40: 6241DA50: 3C3F78 312E3022 73696F6E 70726F70 61636869 61666522 7479206E 22207661 20203C70 3D226665 <?x ml version="1.0" ?>.<vxml version ="1.0">.. <prop erty name="cachi ng" value="safe" />. <property n ame="timeout" va lue="30s"/>. <p roperty name="fe
DB-939
6241DA60: 74636874 696D656F 75742220 76616C75 tchtimeout" valu 6241DA70: 653D2236 3073222F 3E0A2020 3C70726F e="60s"/>. <pro 6241DA80: 70657274 79206E61 6D653D22 696E7075 perty name="inpu 6241DA90: 746D6F64 65732220 76616C75 653D2264 tmodes" value="d 6241DAA0: 746D6622 2F3E0A0A 20203C76 6172206E tmf"/>.. <var n 6241DAB0: 616D653D 22736964 22206578 70723D22 ame="sid" expr=" 6241DAC0: 27313131 31312722 2F3E0A20 203C7661 '11111'"/>. <va 6241DAD0: 72206E61 6D653D22 6C632220 65787072 r name="lc" expr 6241DAE0: 3D222765 6E2D7573 27222F3E 0A20203C ="'en-us'"/>. < 6241DAF0: 76617220 6E616D65 3D226861 6E646C65 var name="handle 6241DB00: 22206578 70723D22 74727565 222F3E0A " expr="true"/>. 6241DB10: 0A20203C 63617463 68206576 656E743D . <catch event= 6241DB20: 2274656C 6570686F 6E652E64 6973636F "telephone.disco 6241DB30: 6E6E6563 74222063 6F6E643D 2268616E nnect" cond="han 6241DB40: 646C6522 3E0A2020 20203C61 73736967 dle">. <assig 6241DB50: 6E206E61 6D653D22 68616E64 6C65 n name="handle Jan 4 02:47:08 PDT: httpc_free: NULL pointer argument Jan 4 02:47:09 PDT: HTTPC URL:http://1.7.100.1/vxml/test/root.vxml, MSG_DECODE_ERROR, fd(6) Jan 4 03:47:09 PDT: WARNING:httpc_msg_retry: msg(6325CDD4):http://vvv.com/vxml/prompts/5.au
Related Commands
Command debug condition application voice debug voip ivr debug vxml
Description Displays debugging messages for only the specified VoiceXML application. Displays debugging messages for VoIP IVR interactions. Displays debugging messages for VoIP VoiceXML interactions.
DB-940
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output from the debug http client cookie command shows that a cookie is being received and stored:
Router# debug http client cookie *May 6 23:23:41.995: //38//HTTPC:/httpc_decode_msgheader: received cookie:TestCookieX=username; path=/; domain=.cisco.com URL:http://rtsp-ws.cisco.com/cookie.php *May 6 23:23:41.995: //38//HTTPC:/httpc_decode_msgheader: received cookie:TestCookieY=password; expires=Thu, 06-May-04 22:30:47 GMT; path=/; domain=.cisco.com URL:http://rtsp-ws.cisco.com/cookie.php *May 6 23:23:41.995: //38//HTTPC:/httpc_cookie_store: validating cookie:TestCookieX=username; path=/; domain=.cisco.com *May 6 23:23:41.995: //38//HTTPC:/httpc_cookie_store: store cookie:TestCookieX=username path=/ domain=.cisco.com *May 6 23:23:41.995: //38//HTTPC:/httpc_cookie_store: rtsp-7#validating cookie:TestCookieY=password; expires=Thu, 06-May-04 22:30:47 GMT; path=/; domain=.cisco.com *May 6 23:23:41.995: //38//HTTPC:/httpc_cookie_store: store cookie:TestCookieY=password path=/ domain=.cisco.com *May 6 23:23:41.995: //38//HTTPC:/httpc_process_response: TestCookieY=password path=/ domain=.cisco.com TestCookieX=username path=/ domain=.cisco.com
Related Commands
Description Configures the memory limits for the HTTP client cache. Configures the refresh time for the HTTP client cache.
DB-941
Description Enables the HTTP client to send and receive cookies. Displays cookies that are being stored by the HTTP client.
DB-942
December 2010
Syntax Description
Enable debug messaging for all supported modules in the system. (Optional) Enables display of FPD upgrade error messages. (Optional) Enables display of FPD upgrade event messages.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug hw-module all upgrade command is intended for use by Cisco Systems technical support personnel. If you attempt to use this command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. For more information about FPD upgrades on SPA interface processors (SIPs) and shared port adapters (SPAs), refer to the Cisco 7600 Series Router SIP, SSC, and SPA Software Configuration Guide.
DB-943
Examples
The following example enables FPD upgrade debug messages for all supported card types on the Cisco 7600 series router:
Router# debug hw-module all upgrade
DB-944
December 2010
Syntax Description
slot
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding Identifying Slots and Subslots for SIPs and SPAs topic in the platform-specific SPA software configuration guide.
/subslot
Secondary slot number on a SIP where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding Specifying the Interface Address on a SPA topic in the platform-specific SPA software configuration guide for subslot information.
Enables all SPA debug messages. Enables debug messages for SPA drivers. Enables debug messages related to SPA field programmable gate array (FPGA) processing. Enables debug messages related to SPA interface processing Enables debug messages related to SPA MAC driver processing. Enables debug messages related to SPA PHY driver processing. Enables debug messages related to SPA ternary content addressable memory (TCAM) processing. Enables debug messages related to Field-Programmable Device (FPD) upgrade information.
errorSpecifies that upgrade error messages are displayed. eventSpecifies that upgrade event messages are displayed.
intr
Caution
The intr option should be used only under the supervision of Cisco Systems technical support personnel and is not intended for production networks.
force-intr
Caution
The force-intr option should be used only under the supervision of Cisco Systems technical support personnel and is not intended for production networks.
DB-945
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug hw-module subslot command is intended for use by Cisco Systems technical support personnel. If you attempt to use this command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Examples
The following example enables interface debug messages for the 4-Port 10/100 Fast Ethernet SPA located in the top subslot (0) of the MSC that is installed in slot 4 of the Cisco 7304 router and shows an interface being shut down and restarted:
Router# debug hw-module subslot 4/0 if SPA 4xFE/2xGE interface debugging is on Router# conf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)# int fast 4/0/0 Router(config-if)# shut Router(config-if)# 4d01h: Interface FastEthernet4/0/0, stopping the devices 4d01h: Interface FastEthernet4/0/0, Turning off the port LED Router(config-if)# 4d01h: %LINK-5-CHANGED: Interface FastEthernet4/0/0, changed state to administratively down 4d01h: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet4/0/0, changed state to down Router(config-if)# Router(config-if)# no shut Router(config-if)# 4d01h: Interface FastEthernet4/0/0, stopping the devices 4d01h: Interface FastEthernet4/0/0, clearing the MAC address filter table 4d01h: Interface FastEthernet4/0/0, Disabling promiscuous mode 4d01h: Interface FastEthernet4/0/0, setting the MAC address to 00b0.64ff.4480 4d01h: Interface FastEthernet4/0/0, Disabling promiscuous mode
DB-946
December 2010
Interface FastEthernet4/0/0, configuring media_type = RJ45, speed = Auto Speed, = Auto Duplex, mode = auto-negotiation Interface FastEthernet4/0/0, starting the devices Interface FastEthernet4/0/0, clearing the hardware counters %LINK-3-UPDOWN: Interface FastEthernet4/0/0, changed state to up Interface FastEthernet4/0/0, Setting port LED to green %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet4/0/0, changed state to
DB-947
Syntax Description
slot
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding Identifying Slots and Subslots for SIPs and SPAs topic in the platform-specific SPA software configuration guide.
/subslot
Secondary slot number on a SPA interface processor (SIP) where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding Specifying the Interface Address on a SPA topic in the platform-specific SPA software configuration guide for subslot information.
all
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(31)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug hw-module subslot commands are intended for use by Cisco Systems technical support personnel. If you attempt to use a debug hw-module subslot command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
DB-948
December 2010
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Examples
The following example enables control plane debug messages for the SPA located in the top subslot (0) of the SIP that is installed in slot 4 of a router:
Router# debug hw-module subslot 4/0 commands
DB-949
Syntax Description
slot
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding Identifying Slots and Subslots for SIPs and SPAs topic in the platform-specific SPA software configuration guide.
/subslot
Secondary slot number on a SPA interface processor (SIP) where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding Specifying the Interface Address on a SPA topic in the platform-specific SPA software configuration guide for subslot information.
all
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(31)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug hw-module subslot commands are intended for use by Cisco Systems technical support personnel. If you attempt to use a debug hw-module subslot command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
DB-950
December 2010
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Examples
The following example enables error handling debug messages for the SPA located in the top subslot (0) of the SIP that is installed in slot 4 of a router:
Router# debug hw-module subslot 4/0 errors
DB-951
Syntax Description
slot
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding Identifying Slots and Subslots for SIPs and SPAs topic in the platform-specific SPA software configuration guide.
/subslot
Secondary slot number on a SPA interface processor (SIP) where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding Specifying the Interface Address on a SPA topic in the platform-specific SPA software configuration guide for subslot information.
all
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(31)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug hw-module subslot commands are intended for use by Cisco Systems technical support personnel. If you attempt to use a debug hw-module subslot command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
DB-952
December 2010
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Examples
The following example enables control plane event messages for the SPA located in the top subslot (0) of the SIP that is installed in slot 4 of a router:
Router# debug hw-module subslot 4/0 events
DB-953
Syntax Description
slot
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding Identifying Slots and Subslots for SIPs and SPAs topic in the platform-specific SPA software configuration guide.
/subslot
Secondary slot number on a SPA interface processor (SIP) where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding Specifying the Interface Address on a SPA topic in the platform-specific SPA software configuration guide for subslot information.
all
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(31)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug hw-module subslot commands are intended for use by Cisco Systems technical support personnel. If you attempt to use a debug hw-module subslot command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
DB-954
December 2010
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Examples
The following example enables interrupt handling debug messages for the SPA located in the top subslot (0) of the SIP that is installed in slot 4 of a router:
Router# debug hw-module subslot 4/0 interrupts
DB-955
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug hw-module subslot commands are intended for use by Cisco Systems technical support personnel. The debug hw-module subslot ipcshim command is only supported by certain shared port adapters (SPAs).
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Examples
The following example enables IPC SHIM application debug messages for all supported modules in the router:
Router# debug hw-module subslot all ipcshim
DB-956
December 2010
Syntax Description
slot
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding Identifying Slots and Subslots for SIPs and SPAs topic in the platform-specific SPA software configuration guide.
/subslot
Secondary slot number on a SPA interface processor (SIP) where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding Specifying the Interface Address on a SPA topic in the platform-specific SPA software configuration guide for subslot information.
Enable debug messaging for all supported modules in the system. Enable debug messaging for platform-provided plugin routines. Enable debug messaging for SPA OIR state machines.
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(31)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug hw-module subslot commands are intended for use by Cisco Systems technical support personnel. If you attempt to use a debug hw-module subslot command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
DB-957
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Examples
The following example shows enabling of OIR plugin debug messages for the SPA located in subslot 1 of the SIP that is installed in slot 4 of the router, and the corresponding messages during a SPA reload:
Router# debug hw-module subslot 4/1 oir plugin WARNING: This command is not intended for production use and should only be used under the supervision of Cisco Systems technical support personnel. SPA subslot 4/1: SPA specific oir handling debugging is on Router# hw-module subslot 4/1 reload Router# Mar 26 01:35:04: cwrp_handle_spa_oir_tsm_event: Mar 26 01:35:04: cwrp_handle_spa_oir_tsm_event: Router# Mar 26 01:35:09: cwrp_handle_spa_oir_tsm_event: Mar 26 01:35:10: cwrp_handle_spa_oir_tsm_event:
subslot 4/1 event=9 subslot 4/1 event=1 subslot 4/1 event=0 subslot 4/1 event=2
DB-958
December 2010
Syntax Description
slot
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding Identifying Slots and Subslots for SIPs and SPAs topic in the platform-specific SPA software configuration guide.
/subslot
Secondary slot number on a SPA interface processor (SIP) where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding Specifying the Interface Address on a SPA topic in the platform-specific SPA software configuration guide for subslot information.
all
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(31)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug hw-module subslot commands are intended for use by Cisco Systems technical support personnel. If you attempt to use a debug hw-module subslot command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
DB-959
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Examples
The following example enables periodic processing debug messages for the SPA located in the top subslot (0) of the SIP that is installed in slot 4 of a router:
Router# debug hw-module subslot 4/0 periodic
DB-960
December 2010
debug iapp
Use the debug iapp privileged EXEC command to begin debugging of IAPP operations. Use the no form of this command to stop the debug operation. [no] debug iapp {packets | event | error}
Syntax Description
Displays IAPP packets sent and received by the access point. Link test packets are not displayed Displays significant IAPP events Displays IAPP software and protocol errors
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
Related Commands
DB-961
Syntax Description
errors trace
Specifies debugging for IF-MGR EFP extension errors. Specifies debugging for IF-MGR EFP extension traces.
Command Default
Debugging is disabled.
Command Modes
Command History
Release 12.2(33)SRD1
Usage Guidelines
Before you issue the debug if-mgr efp-ext command, consider the high volume of output that debug commands usually generate and the amount of time the debugging operation may take.
Examples
The following example shows how to enable debugging for IF-MGR EFP extension errors:
Router> enable Router# debug if-mgr errors efp-ext Router#
DB-962
December 2010
debug ima
To display debugging messages for inverse multiplexing over AMT (IMA) groups and links, use the debug ima command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ima no debug ima
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows output when you enter the debug ima command while adding two ATM links to an IMA group. Notice that the group has not yet been created with the interface atm slot/imagroup-number command, so the links are not activated yet as group members. However, the individual ATM links are deactivated.
Router# debug ima IMA network interface debugging is on Router# config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface atm1/0 Router(config-if)# ima-group 1 Router(config-if)# 01:35:08:IMA shutdown atm layer of link ATM1/0 01:35:08:ima_clear_atm_layer_if ATM1/0 01:35:08:IMA link ATM1/0 removed in firmware 01:35:08:ima_release_channel:ATM1/0 released channel 0. 01:35:08:Bring up ATM1/4 that had been waiting for a free channel. 01:35:08:IMA:no shut the ATM interface. 01:35:08:IMA allocate_channel:ATM1/4 using channel 0. 01:35:08:IMA config_restart ATM1/4 01:35:08:IMA adding link 0 to Group ATM1/IMA1ATM1/0 is down waiting for IMA group 1 to be activated 01:35:08:Link 0 was added to Group ATM1/IMA1
DB-963
01:35:08:ATM1/0 is down waiting for IMA group 1 to be created. 01:35:08:IMA send AIS on link ATM1/0 01:35:08:IMA Link up/down Alarm:port 0, new status 0x10, old_status 0x1. 01:35:10:%LINK-3-UPDOWN:Interface ATM1/4, changed state to up 01:35:10:%LINK-3-UPDOWN:Interface ATM1/0, changed state to down 01:35:11:%LINEPROTO-5-UPDOWN:Line protocol on Interface ATM1/4, changed state to up 01:35:11:%LINEPROTO-5-UPDOWN:Line protocol on Interface ATM1/0, changed state to down Router(config-if)# int atm1/1 Router(config-if)# ima-group 1 Router(config-if)# 01:37:19:IMA shutdown atm layer of link ATM1/1 01:37:19:ima_clear_atm_layer_if ATM1/1 01:37:19:IMA link ATM1/1 removed in firmware 01:37:19:ima_release_channel:ATM1/1 released channel 1. 01:37:19:Bring up ATM1/5 that had been waiting for a free channel. 01:37:19:IMA:no shut the ATM interface. 01:37:19:IMA allocate_channel:ATM1/5 using channel 1. 01:37:19:IMA config_restart ATM1/5 01:37:19:IMA adding link 1 to Group ATM1/IMA1ATM1/1 is down waiting for IMA group 1 to be activated 01:37:19:Link 1 was added to Group ATM1/IMA1 01:37:19:ATM1/1 is down waiting for IMA group 1 to be created. 01:37:19:IMA send AIS on link ATM1/1 01:37:19:IMA Link up/down Alarm:port 1, new status 0x10, old_status 0x1. Router(config-if)# 01:37:21:%LINK-3-UPDOWN:Interface ATM1/5, changed state to up 01:37:21:%LINK-3-UPDOWN:Interface ATM1/1, changed state to down 01:37:22:%LINEPROTO-5-UPDOWN:Line protocol on Interface ATM1/5, changed state to up 01:37:22:%LINEPROTO-5-UPDOWN:Line protocol on Interface ATM1/1, changed state to down
Related Commands
Description Displays debugging messages for ATM errors, and reports specific problems such as encapsulation errors and errors related to OAM cells. Displays debugging messages for ATM events, and reports specific events such as PVC setup completion, changes in carrier states, and interface rates.
debug events
DB-964
December 2010
debug interface
To display interface descriptor block debugging messages, use the debug interface command in privileged EXEC mode. To disable the debugging messages, use the no form of this command. debug interface type number no debug interface type number
Syntax Description
type number
Interface type and number. In the case of an ATM interface, you get the following options once you enter the interface type and number:
vcDisplays information about the virtual circuit. [vpi/]vciSpecifies the virtual channel identifier (VCI) or virtual path identifier/virtual channel identifier (VPI/VCI) pair, if the interface to be debugged is an ATM-encapsulated interface. Valid values for vpi are 0 to 255. Valid values for vci are 1 to 65535.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(26)S.
Examples
Related Commands
Command debug interface counters exceptions debug interface counters protocol memory
Description Displays a message when a recoverable exceptional condition happens during the computation of the interface packet and data rate statistics. Displays the memory operations (create and free) of protocol counters on interfaces and debugging messages during memory operations.
DB-965
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(26)S.
Usage Guidelines
Use the debug interface counters exceptions command to debug problems where the packet counter values or rates have unexpected values. The command helps to flag interfaces whose packet counter values have decreased in number. This condition can occur if a packet is counted and then dropped. This command helps you to determine if the input and output rate statistics are adjusted to display a zero value versus an unexpected value. It is also possible for zero values to be displayed if an interface is running at or close to its maximum capacity due to interface statistics being viewed as negative values. This message is rate limited to one message per minute. If multiple interfaces are having unexpected counter statistic issues, then a message is displayed only for the first interface that experiences a problem within a minute.
Examples
The following is sample output from the debug interface counters exceptions command when backward-going counters are detected. The output is self-explanatory.
Router# debug interface counters exceptions IF-4-BACKWARD_COUNTERS: Corrected for backward rx_bytes counters (561759 -> 526385) on Multilink1 IF-4-BACKWARD_COUNTERS: Corrected for backward tx_bytes counters (288114 -> 268710) on Multilink1 IF-4-BACKWARD_COUNTERS: Corrected for backward tx_bytes counters (2220 -> 0) on Virtual-Access4
DB-966
December 2010
Related Commands
Description Displays the interface descriptor block debugging messages. Displays the memory operations (create and free) of protocol counters on interfaces and debugging messages during memory operations.
DB-967
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(26)S.
Examples
The following is sample output from the debug interface counters protocol memory command. The output is self-explanatory.
Router# debug interface counters protocol memory interface counter protocol memory operations debugging is on *Jan 11 11:34:08.154: IDB_PROTO: Ethernet0/0 created CDP *Jan 11 11:35:08.154: IDB_PROTO: Ethernet0/0 reset CDP
Related Commands
Description Displays the interface descriptor block debugging messages. Displays a message when a recoverable exceptional condition happens during the computation of the interface packet and data rate statistics.
DB-968
December 2010
Syntax Description
Command Default
Debugging is disabled.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(44)S.
Usage Guidelines
This command helps to debug interface state transition problems and includes the following interface state related message outputs:
BRIDGE_ADJbridging database and Spanning tree protocol (STP) port state adjustment CSTATE_REQcarrier state change request CSTATE_TMRcarrier timer state change LSTATE_REQline protocol state change request LSTATE_TMRline protocol timer state change ROUTE_ADJroute adjustment TRANS_ADJstate transition adjustment
The debug information can be restricted to display state transitions on an interface basis using the debug condition interface command.
Caution
Because the debug interface states command is a global debug command for all the interfaces in the router, in some cases such as with online insertion and removal (OIR) this command generates a substantial amount of output, depending on the number of interfaces hosted on the shared port adapter (SPA) or the line card. Use the debug condition interface command instead for debugging an interface state transition problem.
DB-969
Examples
The following is sample output from the debug interface states command when the shutdown command is executed on an interface. The output is self-explanatory.
Router# debug interface states interface state transitions debugging is on Router# debug condition interface fast0/0 Condition 1 set Router# config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# *Sep 1 12:24:46.294: [IDB Fa0/0 UARUYY] LSTATE_REQ: Entry *Sep 1 12:24:46.294: [IDB Fa0/0 UARUYY] LSTATE_REQ: timers not running *Sep 1 12:24:46.294: [IDB Fa0/0 UARUYY] LSTATE_REQ: Exit Router(config)# interface fast0/0 Router(config-if)# shut Router(config-if)# *Sep 1 12:24:56.294: [IDB Fa0/0 UARUYY] LSTATE_REQ: Entry *Sep 1 12:24:56.294: [IDB Fa0/0 UARUYY] LSTATE_REQ: timers not running *Sep 1 12:24:56.294: [IDB Fa0/0 UARUYY] LSTATE_REQ: Exit *Sep 1 12:24:57.162: [IDB Fa0/0 UARUYY] CSTATE_REQ: Entry, requested state: A *Sep 1 12:24:57.162: [IDB Fa0/0 UARUYY] CSTATE_REQ: starting ctimer (2000) *Sep 1 12:24:57.162: [IDB Fa0/0 AURUYY] CSTATE_REQ: state assign *Sep 1 12:24:57.162: [IDB Fa0/0 AURUYY] LSTATE_REQ: Entry *Sep 1 12:24:57.162: [IDB Fa0/0 AURUYY] LSTATE_REQ: Exit *Sep 1 12:24:57.162: [IDB Fa0/0 AURUYY] CSTATE_REQ: Exit *Sep 1 12:24:57.162: [IDB Fa0/0 AURUYY] CSTATE_REQ: Entry, requested state: A *Sep 1 12:24:57.162: [IDB Fa0/0 AURUYY] CSTATE_REQ: state assign *Sep 1 12:24:57.162: [IDB Fa0/0 AURUYY] LSTATE_REQ: Entry *Sep 1 12:24:57.162: [IDB Fa0/0 AURUYY] LSTATE_REQ: Exit *Sep 1 12:24:57.162: [IDB Fa0/0 AURUYY] CSTATE_REQ: Exit *Sep 1 12:24:57.166: [IDB Fa0/0 AURUnY] TRANS_ADJ: Entry *Sep 1 12:24:57.166: [IDB Fa0/0 AURUnn] TRANS_ADJ: propagating change to subifs *Sep 1 12:24:57.170: [IDB Fa0/0 AURUnn] TRANS_ADJ: Exit *Sep 1 12:24:57.170: [IDB Fa0/0 AURUnn] ROUTE_ADJ: Entry *Sep 1 12:24:57.170: [IDB Fa0/0 AURUnn] ROUTE_ADJ: Exit *Sep 1 12:24:57.170: [IDB Fa0/0 AURUnn] BRIDGE_ADJ: Entry *Sep 1 12:24:57.170: [IDB Fa0/0 AURUnn] BRIDGE_ADJ: Exit *Sep 1 12:24:59.162: [IDB Fa0/0 AURUnn] CSTATE_TMR: Entry *Sep 1 12:24:59.162: [IDB Fa0/0 AURUnn] CSTATE_TMR: netidb=Fa0/0, linestate: n *Sep 1 12:24:59.162: [IDB Fa0/0 AURUnn] LSTATE_REQ: Entry *Sep 1 12:24:59.162: [IDB Fa0/0 AURUnn] LSTATE_REQ: timers not running *Sep 1 12:24:59.162: [IDB Fa0/0 AURUnn] LSTATE_REQ: starting lineproto timer *Sep 1 12:24:59.162: [IDB Fa0/0 AURUnn] LSTATE_REQ: Exit *Sep 1 12:24:59.162: [IDB Fa0/0 AURUnn] CSTATE_TMR: transition detected *Sep 1 12:24:59.162: %ENTITY_ALARM-6-INFO: ASSERT INFO Fa0/0 Physical Port Administrative State Down *Sep 1 12:24:59.162: [IDB Fa0/0 AURUnn] TRANS_ADJ: Entry *Sep 1 12:24:59.162: [IDB Fa0/0 AURUnn] TRANS_ADJ: Exit *Sep 1 12:24:59.162: [IDB Fa0/0 AURUnn] CSTATE_TMR: Exit *Sep 1 12:25:00.162: [IDB Fa0/0 AURUnn] LSTATE_TMR: Entry *Sep 1 12:25:00.162: [IDB Fa0/0 AURUnn] LSTATE_TMR: not spoofing, current state: n *Sep 1 12:25:00.162: [IDB Fa0/0 AURUnn] LSTATE_TMR: informing line state transitions *Sep 1 12:25:00.162: [IDB Fa0/0 AURUnn] TRANS_ADJ: Entry *Sep 1 12:25:00.162: [IDB Fa0/0 AURUnn] TRANS_ADJ: Exit *Sep 1 12:25:00.162: [IDB Fa0/0 AURUnn] ROUTE_ADJ: Entry
DB-970
December 2010
*Sep *Sep
1 12:25:00.162: [IDB Fa0/0 AURUnn] ROUTE_ADJ: Exit 1 12:25:00.162: [IDB Fa0/0 AURUnn] LSTATE_TMR: Exit
Related Commands
Description Limits output for some debug commands on the basis of the interface, VC, or VLAN.
DB-971
Syntax Description
Displays information about vasileft interface. Displays information about vasiright interface. Identifier of the VASI interface. The range is from 1 to 256.
Command Modes
Command History
Examples
Related Commands
Description Configures a VASI virtual interface. Displays debugging information for the VASI. Displays the status of a VASI pair.
debug adjacency (vasi) Displays debugging information for the VASI adjacency.
DB-972
December 2010
Syntax Description
Command Default
Command Modes
Command History
Release 12.4(22)T
Usage Guidelines
Use this command when configuring an access control entry (ACE) to view the router-generated hash values for the ACE. This command displays the input and output for the hash-generation mechanism. The input is the ACE text and ACL name. The output is an MD5 algorithm-derived, 4-byte value.
Examples
The following example shows sample debug output displayed when configuring ACL hash-value generation.
Note
The example in this section shows sample output for a numbered access list. However, you can configure ACL hash-value generation for both numbered and named access lists, and for both standard and extended access lists.
Router# *Aug 9 00:24:31.765: %SYS-5-CONFIG_I: Configured from console by console Router# debug ip access-list hash-generation Syslog hash code generation debugging is on Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# ip access-list logging hash-generation Router(config)# access-list 101 permit tcp host 10.1.1.1 host 10.1.1.2 log Router(config)# *Aug 9 00:25:31.661: %IPACL-HASHGEN: Hash Input: 101 extended permit 6 host 20.1.1.1 host 20.1.1.2 Hash Output: 0xA363BB54 Router(config)# exit Router#
DB-973
Related Commands
Description Enables the generation of hash-values for access control entries in the system messaging logs. Displays the contents of all current access lists.
DB-974
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified to include support for ACL interface level statistics. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip access-list intstats command is useful for debugging problems associated with ACL interface level statistics. These interface level statistics are ACL statistics that are maintained per interface and per traffic direction (input/output). This means that when a packet matches an entry in an ACL, the corresponding ACL statistics are updated for the interface on which the ACL is applied and the direction (input/output) in which the ACL is applied.
Examples
The following example is sample output from the debug ip access-list intstats command:
Router# debug ip access-list intstats Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface FastEthernet 0/0 Router(config-if)# ip access-group 150 in 000042: *Mar 14 11:36:04.367 UTC: IPACL-INTSTATS: ACL swsb created 000043: *Mar 14 11:36:04.367 UTC: IPACL-INTSTATS: ACL header stats structure created 000044: *Mar 14 11:36:04.367 UTC: IPACL-INTSTATS: I/P stats table created 000045: *Mar 14 11:36:04.367 UTC: IPACL-INTSTATS: Statsid bitmap created 000046: *Mar 14 11:36:04.367 UTC: IPACL-INTSTATS: Done with static ACEs Router(config-if)# no ip access-group 150 in 000047: *Mar 14 11:36:36.575 UTC: IPACL-INTSTATS: Freeing I/P stats table 000048: *Mar 14 11:36:36.575 UTC: IPACL-INTSTATS: Succesfully removed ACL from interface 000049: *Mar 14 11:36:36.575 UTC: IPACL-INTSTATS: ACL swsb destroyed
DB-975
Related Commands
DB-976
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified to include support for turbo ACLs. This command was integrated into Cisco IOS Release 12.3(4)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip access-list turboacl command is useful for debugging problems associated with turbo ACLs. Turbo ACLs compile the ACLs into a set of lookup tables, while maintaining the first packet matching requirements. Packet headers are used to access these tables in a small, fixed, number of lookups, independent of the existing number of ACL entries.
Examples
The following is sample output from the debug ip access-list turboacl command:
Router# debug ip access-list turboacl *Aug *Aug *Aug *Aug *Aug *Aug *Aug *Aug *Aug *Aug *Aug 20 20 20 20 20 20 20 20 20 20 20 00:41:17.843 00:41:17.843 00:41:17.843 00:41:17.847 00:41:17.847 00:41:17.851 00:41:17.851 00:41:17.851 00:41:17.855 00:41:17.855 00:41:17.855 UTC:Miss at index 73, 19 UTC:Adding dynamic entry, UTC:Miss at index 21, 39 UTC:Adding dynamic entry, UTC:Miss at index 116, 42 UTC:Adding dynamic entry, UTC:Miss at index 119, 28 UTC:Adding dynamic entry, UTC:Miss at index 116, 42 UTC:Adding dynamic entry, UTC:Miss at index 92, 20
DB-977
20 20 20 20 20 20 20 20 20
00:41:17.855 UTC:Adding dynamic entry, 00:41:17.855 UTC:Miss at index 119, 28 00:41:17.855 UTC:Adding dynamic entry, 00:41:17.855 UTC:Miss at index 56, 29 00:41:17.859 UTC:Adding dynamic entry, 00:41:17.859try, update = 1 00:41:19.959 UTC:Miss at index 29, 41 00:41:19.959 UTC:Adding dynamic entry, 00:41:19.959 UTC:Miss at index 29, 38
update = 1
Field Aug 20 00:41:17.843 UTC Miss at index 73, 19 Adding dynamic entry, update = 1
Description Date and Coordinated Universal Time (UTC) the command was used to debug the turbo ACL. Location in the compiled access list tables where a new packet lookup does not match an existing entry. Action taken to add a new entry in the compiled access list tables as a result of a packet being processed.
DB-978
December 2010
Syntax Description
(Optional) Displays only error messages. (Optional) Displays only event-related messages. (Optional) Displays only packet-related messages.
Command Default
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
Router# debug ip admission consent errors IP Admission Consent Errors debugging is on Router# debug ip admission consent events IP Admission Consent Events debugging is on Router# debug ip admission consent messages IP Admission Consent Messages debugging is on Router# Router# show debugging IP IP IP IP Admission Admission Admission Admission Consent: Consent Errors debugging is on Consent Events debugging is on Consent Messages debugging is on
DB-979
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output from the debug ip admission eapoudp command shows information about network admission control using EAPoUDP. In the command output, the term posture refers to the credentials (for example, antivirus state or version of Cisco IOS software) of the host system.
Router# debug ip admission eapoudp Posture validation session created for client mac= 0001.027c.f364 ip= 10.0.0.1 Total Posture sessions= 1 Total Posture Init sessions= 1 *Apr 9 19:39:45.684: %AP-6-POSTURE_START_VALIDATION: IP=10.0.0.1| Interface=FastEthernet0/0.420 *Apr 9 19:40:42.292: %AP-6-POSTURE_STATE_CHANGE: IP=10.0.0.1| STATE=POSTURE ESTAB *Apr 9 19:40:42.292: auth_proxy_posture_parse_aaa_attributes: CiscoDefined-ACL name= #ACSACL#-IP-HealthyACL-40921e54 Apr 9 19:40:42.957: %AP-6-POSTURE_POLICY: Apply access control list (xACSACLx-IP-HealthyACL-40921e54) policy for host (10.0.0.1)
Related Commands
Description Displays IP admission control cache entries or the running admission control configuration.
DB-980
December 2010
debug ip auth-proxy
To display the authentication proxy configuration information on the router, use the debug ip auth-proxy command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip auth-proxy {detailed | ftp | function-trace | object-creation | object-deletion | telnet | timers} no debug ip auth-proxy
Syntax Description
Displays details of the TCP events during an authentication proxy process. The details are generic to all FTP, HTTP, and Telnet protocols. Displays FTP events related to the authentication proxy. Displays the authentication proxy functions. Displays additional entries to the authentication proxy cache. Displays deletion of cache entries for the authentication proxy. Displays Telnet-related authentication proxy events. Displays authentication proxy timer-related events.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The detailed keyword was added. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Note
The function-trace debugging information provides low-level software information for Cisco technical support representatives. No output examples are provided for this keyword option.
DB-981
Examples
The following examples illustrate the output of the debug ip auth-proxy command. In these examples, debugging is on for object creations, object deletions, HTTP, and TCP. In this example, the client host at 192.168.201.1 is attempting to make an HTTP connection to the web server located at 192.168.21.1. The HTTP debugging information is on for the authentication proxy. The output shows that the router is setting up an authentication proxy entry for the login request:
00:11:10: AUTH-PROXY creates info: cliaddr - 192.168.21.1, cliport - 36583 seraddr - 192.168.201.1, serport - 80 ip-srcaddr 192.168.21.1 pak-srcaddr 0.0.0.0
Following a successful login attempt, the debugging information shows the authentication proxy entries created for the client. In this example, the client is authorized for SMTP (port 25), FTP data (port 20), FTP control (port 21), and Telnet (port 23) traffic. The dynamic access control list (ACL) entries are included in the display.
00:11:25:AUTH_PROXY OBJ_CREATE:acl item 61AD60CC 00:11:25:AUTH-PROXY 00:11:25:AUTH-PROXY 00:11:25:AUTH-PROXY 00:11:25:AUTH_PROXY 00:11:25:AUTH-PROXY 00:11:25:AUTH-PROXY 00:11:25:AUTH-PROXY 00:11:25:AUTH_PROXY 00:11:25:AUTH-PROXY 00:11:25:AUTH-PROXY 00:11:25:AUTH-PROXY 00:11:25:AUTH_PROXY OBJ_CREATE:create acl wrapper 6151C7C8 -- acl item 61AD60CC Src 192.168.162.216 Port [0] Dst 192.168.162.220 Port [25] OBJ_CREATE:acl item 6151C908 OBJ_CREATE:create acl wrapper 6187A060 -- acl item 6151C908 Src 192.168.162.216 Port [0] Dst 192.168.162.220 Port [20] OBJ_CREATE:acl item 61A40B88 OBJ_CREATE:create acl wrapper 6187A0D4 -- acl item 61A40B88 Src 192.168.162.216 Port [0] Dst 192.168.162.220 Port [21] OBJ_CREATE:acl item 61879550
00:11:25:AUTH-PROXY OBJ_CREATE:create acl wrapper 61879644 -- acl item 61879550 00:11:25:AUTH-PROXY Src 192.168.162.216 Port [0] 00:11:25:AUTH-PROXY Dst 192.168.162.220 Port [23]
The next example shows the debug output following a clear ip auth-proxy cache command to clear the authentication entries from the router. The dynamic ACL entries are removed from the router.
00:12:36:AUTH-PROXY 00:12:36:AUTH-PROXY 00:12:36:AUTH-PROXY 00:12:36:AUTH-PROXY 00:12:36:AUTH-PROXY OBJ_DELETE:delete OBJ_DELETE:delete OBJ_DELETE:delete OBJ_DELETE:delete OBJ_DELETE:delete auth_proxy create acl create acl create acl create acl cache 61AD6298 wrapper 6151C7C8 wrapper 6187A060 wrapper 6187A0D4 wrapper 61879644 ----acl acl acl acl item item item item 61AD60CC 6151C908 61A40B88 61879550
The following example shows the timer information for a dynamic ACL entry. All times are expressed in milliseconds. The first laststart is the time that the ACL entry is created relative to the startup time of the router. The lastref is the time of the last packet to hit the dynamic ACL relative to the startup time of the router. The exptime is the next expected expiration time for the dynamic ACL. The delta indicates the remaining time before the dynamic ACL expires. After the timer expires, the debugging information includes a message indicating that the ACL and associated authentication proxy information for the client have been removed.
00:19:51:first laststart 1191112 00:20:51:AUTH-PROXY:delta 54220 lastref 1245332 exptime 1251112 00:21:45:AUTH-PROXY:ACL and cache are removed
The following example is sample output with the detailed keyword enabled:
DB-982
December 2010
00:37:50:AUTH-PROXY:proto_flag=5, dstport_index=1 00:37:50: SYN SEQ 245972 LEN 0 00:37:50:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 00:37:50:AUTH-PROXY:auth_proxy_half_open_count++ 1 00:37:50:AUTH-PROXY:proto_flag=5, dstport_index=1 00:37:50: ACK 1820245643 SEQ 245973 LEN 0 00:37:50:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 00:37:50:clientport 4347 state 0 00:37:50:AUTH-PROXY:incremented proxy_proc_count=1 00:37:50:AUTH-PROXY:proto_flag=5, dstport_index=1 00:37:50: ACK 1820245674 SEQ 245973 LEN 0 00:37:50:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 00:37:50:clientport 4347 state 0 00:37:57:AUTH-PROXY:proto_flag=5, dstport_index=1 00:37:57: PSH ACK 1820245674 SEQ 245973 LEN 16 00:37:57:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 00:37:57:clientport 4347 state 0 00:37:57:AUTH-PROXY:proto_flag=5, dstport_index=1 00:37:57: ACK 1820245699 SEQ 245989 LEN 0 00:37:57:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 00:37:57:clientport 4347 state 0 00:38:01:AUTH-PROXY:proto_flag=5, dstport_index=1 00:38:01: PSH ACK 1820245699 SEQ 245989 LEN 16 00:38:01:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 00:38:01:clientport 4347 state 0 00:38:01:AUTH-PROXY:Authenticating user ryan 00:38:01:AUTH-PROXY:Session state is INIT.Not updating stats 00:38:01:AUTH-PROXY:Session state is INIT.Not updating stats 00:38:01:AUTH-PROXY:Sent AAA request successfully 00:38:01:AUTH-PROXY:Sent password successfully 00:38:01:AUTH-PROXY:processing authorization data 00:38:01:AUTH-PROXY:Sending accounting start.unique-id 2 00:38:01:AUTH-PROXY:Session state is INIT.Not updating stats 00:38:01:AUTH-PROXY:Session state is INIT.Not updating stats 00:38:01:AUTH-PROXY:wait complete on watched boolean stat=0 00:38:01:AUTH-PROXY:src ip addr is 192.168.127.2, dstaddr=192.168.27.1 00:38:01: SYN ACK 2072458992 SEQ 4051022445 LEN 0 00:38:01:AUTH-PROXY:src ip addr is 192.168.127.2, dstaddr=192.168.27.1 00:38:01: PSH ACK 2072458992 SEQ 4051022446 LEN 49 00:38:02:AUTH-PROXY:src ip addr is 192.168.127.2, dstaddr=192.168.27.1 00:38:02: ACK 2072459003 SEQ 4051022495 LEN 0 00:38:02:AUTH-PROXY:src ip addr is 192.168.127.2, dstaddr=192.168.27.1 00:38:02: PSH ACK 2072459003 SEQ 4051022495 LEN 33 00:38:02:AUTH-PROXY:src ip addr is 192.168.127.2, dstaddr=192.168.27.1 00:38:02: ACK 2072459014 SEQ 4051022528 LEN 0 00:38:02:AUTH-PROXY:src ip addr is 192.168.127.2, dstaddr=192.168.27.1 00:38:02: PSH ACK 2072459014 SEQ 4051022528 LEN 26 00:38:03:AUTH-PROXY:proto_flag=5, dstport_index=1 00:38:03: ACK 1820245725 SEQ 246005 LEN 0 00:38:03:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 00:38:03:clientport 4347 state 3 7200b#
4347
4347
4347
4347
4347
4347
4347
Related Commands
DB-983
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS 12.2SX family of releases. Support in a specific 12.2SX release is dependent on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Using this command may result in considerable output if simultaneous authentications are taking place.
Examples
The following is output from the debug ip auth-proxy ezvpn command. The output displays the proxy authentication behavior of a web-based activation.
Router# debug ip auth-proxy ezvpn *Dec 20 20:25:11.006: 10.4.205.205 *Dec 20 20:25:17.150: *Dec 20 20:25:17.150: *Dec 20 20:25:17.362: *Dec 20 20:25:17.362: *Dec 20 20:25:17.362: *Dec 20 20:25:17.362: *Dec 20 20:25:17.366: *Dec 20 20:25:17.366: AUTH-PROXY: New request received by EzVPN WebIntercept from AUTH-PROXY:GET request received AUTH-PROXY:Authentication scheme is 401 AUTH-PROXY:Authorization information not present in GET request AUTH-PROXY: Allocated on credinfo for connect at 0x81EF1A84 AUTH-PROXY: Posting CONNECT request to EzVPN EZVPN(tunnel22): Received CONNECT from 10.4.205.205! EZVPN(tunnel22): Current State: CONNECT_REQUIRED EZVPN(tunnel22): Event: CONNECT
DB-984
December 2010
Related Commands
Description Specifies how the Cisco Easy VPN Client handles Xauth requests or prompts from the server.
DB-985
debug ip bgp
To display information related to processing of the Border Gateway Protocol (BGP), use the debug ip bgp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip bgp [ip-address | addpath | dampening | events | in | keepalives | out | updates | vpnv4 | mpls] no debug ip bgp [ip-address | addpath | dampening | events | in | keepalives | out | updates | vpnv4 | mpls]
Cisco 10000 Series Router
debug ip bgp [ip-address | dampening | events | in | keepalives | out | updates | vpnv4 | mpls | all | groups | import | ipv4 | ipv6] no debug ip bgp [ip-address | dampening | events | in | keepalives | out | updates | vpnv4 | mpls | all | groups | import | ipv4 | ipv6]
Syntax Description
ip-address addpath dampening events in keepalives out updates vpnv4 mpls all groups import ipv4 ipv6
(Optional) The BGP neighbor IP address. (Optional) Displays BGP additional path events. (Optional) Displays BGP dampening. (Optional) Displays BGP events. (Optional) Displays BGP inbound information. (Optional) Displays BGP keepalives. (Optional) Displays BGP outbound information. (Optional) Displays BGP updates. (Optional) Displays Virtual Private Network version 4 (VPNv4) Network Layer Reachability Information (NLRI). (Optional) Displays Multiprotocol Label Switching (MPLS) information. (Optional) Displays all address family information. (Optional) Displays BGP configuration and update groups information. (Optional) Displays BGP import routes to a VPN routing and forwarding (VRF) instance across address family information. (Optional) Displays BGP IPv4 address family information. (Optional) Displays BGP IPv6 address family information.
Command Modes
Privileged EXEC(#)
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(21)ST. The mpls keyword was added.
DB-986
December 2010
Release 12.0(22)S 12.2(13)T 12.2(17b)SXA 12.0(27)S 12.2(28)SB 12.2(33)SRA 12.2(33)SXH 12.2(33)SRE 12.2(33)XNE Cisco IOS XE Release 2.5
Modification This command was integrated into Cisco IOS Release 12.0(22)S. The mpls keyword was added. This command was integrated into Cisco IOS Release 12.2(17b)SXA. The command output was modified to show explicit-null label information. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was modified. The addpath keyword was added. This command was integrated into Cisco IOS Release 12.2(33)XNE. This command was integrated into Cisco IOS XE Release 2.5.
Usage Guidelines
Use this command with the updates and mpls keywords to display explicit-null label information. The optional arguments in, out, keepalives, updates, and events provide verbose output to the debug ip bgp command. The sequence in which the optional arguments are provided affects the behavior of the command. The non peer specific commands override the peer-specific commands.
Examples
The following is sample output from the debug ip bgp command used with vpnv4 keyword:
Router# debug ip bgp vpnv4 03:47:14:vpn:bgp_vpnv4_bnetinit:100:2:10.0.0.0/8 03:47:14:vpn:bnettable add:100:2:10.0.0.0/8 03:47:14:vpn:bestpath_hook route_tag_change for vpn2:10.0.0.0/255.0.0.0(ok) 03:47:14:vpn:bgp_vpnv4_bnetinit:100:2:10.0.0.0/8 03:47:14:vpn:bnettable add:100:2:10.0.0.0/8 03:47:14:vpn:bestpath_hook route_tag_change for vpn2:10.0.0.0/255.0.0.0(ok) 03:47:14:vpn:bgp_vpnv4_bnetinit:100:2:10.0.0.0/8 03:47:14:vpn:bnettable add:100:2:10.0.0.0/8 03:47:14:vpn:bestpath_hook route_tag_chacle ip bgp *nge for vpn2:10.0.0.0/255.0.0.0(ok)
The following example shows sample output, including the explicit-null label, from the debug ip bgp updates and the debug ip bgp mpls commands:
Router# debug ip bgp updates BGP updates debugging is on Router# debug ip bgp mpls BGP MPLS labels debugging is on
Router# 01:33:53: BGP(0): route 10.10.10.10/32 up 01:33:53: BGP(0): nettable_walker 10.10.10.10/32 route sourced locally 01:33:53: BGP: adding MPLS label to 10.10.10.10/32 01:33:53: BGP: check on 10.10.10.10/8 in LDP - ok 01:33:53: BGP: label imp-null allocated via LDP 01:33:53: BGP-IPv4: send exp-null label for 10.10.10.10/32 01:33:53: BGP-IPv4: Send prefix 10.10.10.10/32, label exp-null !explicit-null label being sent
DB-987
01:33:53: BGP(0): 10.10.10.11 send UPDATE (format) 10.10.10.10/32, next 10.10.10.12, metric 0, path , mpls label 0 !label value is 0 01:33:53: BGP(0): updgrp 1 - 10.10.10.12 enqueued 1 updates, average/maximum size (bytes) 61/61
The following example shows a sample output of the debug ip bgp command:
Router# Router# Router# Router# Router# Router# debug debug debug debug debug debug ip ip ip ip ip ip bgp bgp bgp bgp bgp bgp 209.165.200.225 209.165.200.225 updates keepalives events in out
Router# show debug IP routing: BGP debugging is on (outbound) for address family: IPv4 Unicast BGP events debugging is on BGP keepalives debugging is on BGP updates debugging is on (outbound) for address family: IPv4 Unicast
The behavior of the command changes when the arguments are provided in a different sequence
Router# Router# Router# Router# Router# Router# debug debug debug debug debug debug ip ip ip ip ip ip bgp bgp bgp bgp bgp bgp keepalives events in out 209.165.200.225 209.165.200.225 updates
Router# show debug IP routing: BGP debugging is on for neighbor 209.165.200.225 for address family: IPv4 Unicast BGP events debugging is on for neighbor 209.165.200.225 BGP keepalives debugging is on for neighbor 209.165.200.225 for address family: IPv4 Unicast BGP updates debugging is on for neighbor 209.165.200.225 for address family: IPv4 Unicast
DB-988
December 2010
Syntax Description
index-group
(Optional) Specifies that update-group debugging information for the corresponding index number will be displayed. The range of update-group index numbers is from 1 to 4294967295. (Optional) Specifies that update-group debugging information for a single peer will be displayed.
ip-address
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.3(4)T. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The output of this command displays information about update-group calculations and the addition and removal of update-group members. Information about peer-groups, peer-policy, and peer-session templates will also be displayed in the output of this command as neighbor configurations change.
Note
The output of this command can be very verbose. This command should not be deployed in a production network unless you are troubleshooting a problem. When a change to outbound policy occurs, the router automatically recalculates update-group memberships and applies the changes by triggering an outbound soft reset after a 1-minute timer expires. This behavior is designed to provide the network operator with time to change the configuration if a mistake is made. You can manually enable an outbound soft reset before the timer expires by entering the clear ip bgp ip-address soft out command.
DB-989
Note
In Cisco IOS Release 12.0(25)S, 12.3(2)T, and prior releases the update group recalculation delay timer is set to 3 minutes.
Examples
The following sample output from the debug ip bgp groups command shows that peering has been established with neighbor 10.4.9.8 and update-group calculations are occurring for this member:
Router# debug ip bgp groups 5w4d: 5w4d: 5w4d: 5w4d: BGP-DYN(0): Comparing neighbor 10.4.9.8 flags 0x0 cap 0x0 and updgrp 1 fl0 BGP-DYN(0): Created update-group(0) flags 0x0 cap 0x0 from neighbor 10.4.0 BGP-DYN(0): Adding neighbor 10.4.9.8 flags 0x0 cap 0x0, to update-group 0 %BGP-5-ADJCHANGE: neighbor 10.4.9.8 Up
The following sample output from the debug ip bgp groups command shows the recalculation of update-groups after the clear ip bgp groups command was issued:
Router# debug ip bgp groups 5w4d: 5w4d: 5w4d: 5w4d: 5w4d: 5w4d: 5w4d: 5w4d: 5w4d: 5w4d: 5w4d: 5w4d: %BGP-5-ADJCHANGE: neighbor 10.4.9.5 Down User reset BGP-DYN(0): Comparing neighbor 10.4.9.5 flags 0x0 cap 0x0 and updgrp 2 fl0 BGP-DYN(0): Update-group 2 flags 0x0 cap 0x0 policies same as 10.4.9.5 fl0 %BGP-5-ADJCHANGE: neighbor 10.4.9.8 Down User reset BGP-DYN(0): Comparing neighbor 10.4.9.8 flags 0x0 cap 0x0 and updgrp 2 fl0 BGP-DYN(0): Update-group 2 flags 0x0 cap 0x0 policies same as 10.4.9.8 fl0 %BGP-5-ADJCHANGE: neighbor 10.4.9.21 Down User reset BGP-DYN(0): Comparing neighbor 10.4.9.21 flags 0x0 cap 0x0 and updgrp 1 f0 BGP-DYN(0): Update-group 1 flags 0x0 cap 0x0 policies same as 10.4.9.21 f0 %BGP-5-ADJCHANGE: neighbor 10.4.9.5 Up %BGP-5-ADJCHANGE: neighbor 10.4.9.21 Up %BGP-5-ADJCHANGE: neighbor 10.4.9.8 Up
Description A BGP neighbor has come Up or gone Down. The IP address of the neighbor is specified in the output string. This line is displayed when a neighbor adjacency is established. The BGP dynamic update group algorithm analyzes the policies of the new neighbor and then adds the neighbor to the appropriate BGP update group.
Related Commands
Command clear ip bgp clear ip bgp update-group show ip bgp replication show ip bgp update-group
Description Resets a BGP connection or session. Clears BGP update-group member sessions. Displays BGP update-group replication statistics. Displays information about BGP update-groups.
DB-990
December 2010
Syntax Description
Displays event messages related to IPv4 prefix import. Displays messages related to IPv4 prefix import updates. (Optional) Number of access list used to filter debugging messages. The range that can be specified is from 1 to 199. (Optional) Number of expanded access lists used to filter debugging messages. The range that can be specified is from 1300 to 2699.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.3(14)T. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to display debugging information related to the BGP Support for IP Prefix Import from Global Table into a VRF Table feature. This feature provides the capability to import IPv4 unicast prefixes from the global routing table into a Virtual Private Network (VPN) routing and forwarding (VRF) instance table using an import route map.
Examples
The following example configures IPv4 prefix import debugging messages for both import events and import updates to be displayed on the console of the router:
Router# debug ip bgp import events BGP import events debugging is on Router# debug ip bgp import updates
DB-991
BGP import updates debugging is on for access list 3 00:00:50: 00:01:06: 00:01:06: 00:01:06: 00:01:06: 00:01:06: 00:01:06: 00:01:06: 00:01:06: 00:01:06: limit 2 00:01:06: 00:01:06: 00:01:06: 00:01:06: 00:01:06: %BGP-5-ADJCHANGE: neighbor 10.2.2.2 Up BGP: reevaluate IPv4 Unicast routes in VRF academic BGP: 0 routes available (limit: 1000) BGP: import IPv4 Unicast routes to VRF academic BGP(2)-VRF(academic): import pfx 100:1:10.30.1.0/24 via 10.2.2.2 BGP: accepted 8 routes (limit: 1000) BGP: reevaluate IPv4 Multicast routes in VRF multicast BGP: 0 routes available (limit: 2) BGP: import IPv4 Multicast routes to VRF multicast %BGP-4-AFIMPORT: IPv4 Multicast prefixes imported to multicast vrf reached the BGP: BGP: BGP: BGP: BGP: accepted 2 routes (limit: 2) reevaluate IPv4 Unicast routes in VRF BLUE 0 routes available (limit: 1000) import IPv4 Unicast routes to VRF BLUE accepted 3 routes (limit: 1000)
Description Number of routes imported into the VRF, and the default or user-defined prefix import limit.
BGP: reevaluate IPv4 Unicast routes in Prefix was imported during BGP convergence and is being VRF BLUE reevaluated for the next scan cycle. BGP: 0 routes available (limit: 1000) BGP: import IPv4 Unicast routes to VRF BLUE Number of routes available from import source, and the default or user-defined prefix import limit. Import map and prefix type (unicast or multicast) that is being imported into the specified VRF.
Related Commands
DB-992
December 2010
Syntax Description
detail
(Optional) Specifies that detailed debugging information about BGP dynamic subnet range neighbors will be displayed.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The output of this command displays information about the identification and creation of BGP dynamic subnet range neighbors. BGP dynamic neighbors are configured using a range of IP addresses and BGP peer groups. After a subnet range is configured for a BGP peer group, and a TCP session is initiated for an IP address in the subnet range, a new BGP neighbor is dynamically created as a member of that group. The new BGP neighbor will inherit any configuration or templates for the group.
Examples
The following output shows that the debug ip bgp range command has been entered and a BGP neighbor at 192.168.3.2 is dynamically created using the subnet range 192.168.0.0/16. This new neighbor is a member of the peer group named group192.
Router# debug ip bgp range bgprange_debug = 1, sense = 1 BGP dynamic Range debugging is on ! *Mar 26 20:05:13.251: BGP:DN: Created a new neighbor *192.168.3.2 in range 192.168.0.0/16, peer-group group192,count = 1
The following sample output from the debug ip bgp range detail command shows more detailed debugging of the addition of dynamic BGP neighbors:
Router# debug ip bgp range detail
DB-993
bgprange_debug = 1, sense = 1 BGP dynamic Range debugging is on with detail (Dynamic Range neighbors details only) ! *Mar 26 20:09:12.311: BGP:DN: ACCEPT an OPEN from 192.168.1.2 valid range 0x32123D8:192.168.0.0/16,tcb 0x32114C0 ! *Mar 26 20:09:12.331: BGP: 192.168.1.2 passive open to 192.168.1.1 *Mar 26 20:09:12.331: BGP:DN: ACCEPTED an OPEN from 192.168.1.2 valid range 0x32123D8:192.168.0.0/16,tcb 0x3494040 ! *Mar 26 20:09:12.331: BGP:DN: Created a new neighbor *192.168.1.2 in range 192.168.0.0/16, peer-group group192,count = 2
Field BGP:DN:
Description A potential dynamic BGP neighbor has been identified as opening a TCP session with an IP address in a subnet associated with a BGP peer group. BGP accepts the session and creates a new neighbor. The new neighbor becomes a member of the peer group associated with its subnet range.
Related Commands
Description Configures BGP dynamic neighbor parameters. Clears BGP peer group member sessions. Displays information about BGP peer groups.
DB-994
December 2010
Syntax Description
Displays BGP-related SSO failures. Displays debugging information for failed BGP-related interactions between the active RP and the standby RP. (Optional) Displays detailed debugging information about successful BGP-related SSO operations and successful BGP-related intereactions between the active and the standby RP.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip bgp sso command is used to display BGP-related SSO events or debugging information for BGP-related interactions between the active RP and the standby RP. This command is useful for monitoring or troubleshooting BGP sessions on a provider edge (PE) router during an RP switchover or during a planned In-Service Software Upgrade (ISSU).
Examples
The following is sample output from the debug ip bgp sso command with the events keyword. The following output indicates that the 10.34.32.154 BGP session is no longer SSO capable.
*Mar 28 02:29:43.526: BGPSSO: 10.34.32.154 reset SSO and decrement count
Tip
Use the show ip bgp vpnv4 all neighbors command to display the reason that the SSO-capable BGP session has been disabled. The following is sample output from the debug ip bgp sso command with the transactions keyword. The following output shows an SSO notification indicating that the SSO capability is pending for 602 BGP neighbors. This notification is generated as the state between the active and standby RP is being
DB-995
synchronized during the bulk synchonization phase of SSO initialization. During this phase, the Transmission Control Blocks (TCBs) must be synchronized with the TCBs on the standby RP before SSO initialization is complete.
*Mar 28 02:32:12.102: BGPSSO: tcp sso notify pending for 602 nbrs
DB-996
December 2010
Syntax Description
(Optional) Number of access list used to filter debugging messages. The range that can be specified is from 1 to 199. (Optional) Number of expanded access lists used to filter debugging messages. The range that can be specified is from 1300 to 2699. (Optional) Specifies debugging messages for inbound BGP update information. (Optional) Specifies debugging messages for outbound BGP update information. (Optional) Specifies debugging messages for BGP update events. (Optional) Specifies debugging messages for BGP update refresh.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was modified. The refresh keyword was added. This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples
The following is sample output from the debug ip bgp updates command. The output shows that the BGP session was cleared between neighbor 10.4.9.21 and the local router 10.4.9.4. There are no field description tables for this command because the debugging output from this command depends on the subsequent commands that are entered.
Router# debug ip bgp updates 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: %SYS-5-CONFIG_I: Configured from console by console BGP: 10.4.9.21 went from Idle to Active BGP: 10.4.9.21 open active, delay 7032ms BGP: 10.4.9.21 open active, local address 10.4.9.4 BGP: 10.4.9.21 went from Active to OpenSent BGP: 10.4.9.21 sending OPEN, version 4, my as: 101 BGP: 10.4.9.21 send message type 1, length (incl. header) 45 BGP: 10.4.9.21 rcv message type 1, length (excl. header) 26 BGP: 10.4.9.21 rcv OPEN, version 4
DB-997
5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d: 5w2d:
BGP: 10.4.9.21 rcv OPEN w/ OPTION parameter len: 16 BGP: 10.4.9.21 rcvd OPEN w/ optional parameter type 2 (Capability) len 6 BGP: 10.4.9.21 OPEN has CAPABILITY code: 1, length 4 BGP: 10.4.9.21 OPEN has MP_EXT CAP for afi/safi: 1/1 BGP: 10.4.9.21 rcvd OPEN w/ optional parameter type 2 (Capability) len 2 BGP: 10.4.9.21 OPEN has CAPABILITY code: 128, length 0 BGP: 10.4.9.21 OPEN has ROUTE-REFRESH capability(old) for all address-fams BGP: 10.4.9.21 rcvd OPEN w/ optional parameter type 2 (Capability) len 2 BGP: 10.4.9.21 OPEN has CAPABILITY code: 2, length 0 BGP: 10.4.9.21 OPEN has ROUTE-REFRESH capability for all address-families BGP: 10.4.9.21 went from OpenSent to OpenConfirm BGP: 10.4.9.21 went from OpenConfirm to Established %BGP-5-ADJCHANGE: neighbor 10.4.9.21 Up BGP(0): 10.4.9.21 computing updates, afi 0, neighbor version 0, table ver0 BGP(0): 10.4.9.21 update run completed, afi 0, ran for 0ms, neighbor vers1 BGP(0): 10.4.9.21 initial update completed
The following is sample output from the debug ip bgp updates out command. The output shows that the local router is sending updates with the cost community:
Router# debug ip bgp updates out *Mar 15 01:41:23.515:BGP(0):10.0.0.5 computing updates, afi 0, neighbor version 0, table version 64, starting at 0.0.0.0 *Mar 15 01:41:23.515:BGP(0):10.0.0.5 send UPDATE (format) 0.0.0.0/0, next 10.0.0.2, metric 0, path , extended community Cost:igp:1:100 *Mar 15 01:41:23.515:BGP(0):10.0.0.5 send UPDATE (format) 10.2.2.0/24, next 10.20.20.10, metric 0, path 10, extended community Cost:igp:8:22 *Mar 15 01:41:23.515:BGP(0):10.0.0.5 send UPDATE (format) 10.13.13.0/24, next 10.0.0.8, metric 0, path
The following is sample output from the debug ip bgp updates in command. The output shows that the local router is receiving updates with the cost community:
Router# debug ip bgp updates in *Jan 6 01:27:09.111:BGP(2):10.0.0.8 rcvd UPDATE w/ attr:nexthop 10.0.0.8, origin ?, localpref 100, metric 0, path 10, extended community RT:100:1 Cost:igp:10:10 Cost:igp:11:11
DB-998
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series router. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows command output on the active route processor:
Router# debug ip bgp vpnv4 checkpoint 3d18h: 3d18h: 3d18h: 3d18h: 3d18h: 3d18h: 3d18h: 3d18h: %HA-5-SYNC_NOTICE: Config sync started. vrf-nsf: vrf vpn2 tableid 1 send OK vrf-nsf: vrf tableid bulk sync complete msg send OK vrf-nsf: CF send ok vrf-nsf: CF send ok %HA-5-SYNC_NOTICE: Config sync completed. %HA-5-SYNC_NOTICE: Standby has restarted. %HA-5-MODE: Operating mode is sso, configured mode is sso.
Related Commands
Command
Description
debug ip bgp vpnv4 nsf Displays the nonstop forwarding events for the VRF table-id synchronization subsystem between the active and standby route processors.
DB-999
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series router. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows the command output on the active Route Processor:
Router# debug ip bgp vpnv4 nsf MPLS VPN NSF Processing debugging is on Router(config)# ip vrf vpn3 3d18h: vrf-nsf: vrf vpn3 tableid 2 send rpc OK Router(config-vrf)# no ip vrf vpn3 % IP addresses from all interfaces in VRF vpn3 have been removed 3d18h: vrf-nsf: rx vrf tableid delete complete msg, tid = 2, name = vpn3
The following example shows the command output on the standby Route Processor:
Router# debug ip bgp vpnv4 nsf MPLS VPN NSF Processing debugging is on 00:05:21: vrf-nsf: rx vrf tableid rpc msg, tid = 2, name = vpn3 % IP addresses from all interfaces in VRF vpn3 have been removed 00:06:22: vrf-nsf: vrf vpn3 tableid 2 , delete complete, send OK
DB-1000
December 2010
Related Commands
Description Display the events for the VRF checkpointing system between the active and standby Route Processors.
DB-1001
Syntax Description
Displays virtual routing and forwarding (VRF) nonstop forwarding (NSF) checkpoint messages and events. Displays VRF processing messages for a Carrier Supporting Carrier (CSC) VPN. Displays VRF import processing messages. Displays Border Gateway Protocol (BGP) keepalives. Displays VRF label mode processing. Displays BGP updates processing for Unicast VPNv4 address family.
Command Default
Command Modes
Command History
Modification This command was introduced. The labelmode keyword was added. This command was integrated into Cisco IOS Release 12.2(33)SRD.
Examples
The following example enables debugging of MPLS VPN label mode processing:
Router# debug ip bgp vpnv4 unicast labelmode MPLS VPN Label mode processing debugging is on Router# config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# mpls label mode all-vrfs protocol bgp-vpnv4 per-vrf % This command is an unreleased and unsupported feature Router(config)# *Oct 18 11:35:01.159: vpn: changing the label mode (Enable: per-vrf) for all-vrfs *Oct 18 11:35:01.459: vpn: label mode change, bnet walk complete. *Oct 18 11:35:01.459: BGP: VPNv4 Unicast label mode changed Router(config)#^Z Router# *Oct 18 11:35:21.995: %SYS-5-CONFIG_I: Configured from console by console
DB-1002
December 2010
Router# show debug Tag VPN: MPLS VPN Label mode processing debugging is on Router#
Related Commands
DB-1003
Syntax Description
Displays VPN routing and forwarding (VRF) processing messages for a Carrier Supporting Carrier (CSC) VPN. Displays VRF import processing messages. Displays Border Gateway Protocol (BGP) keepalives. Displays VRF label mode processing. Displays the routing topology instance. Displays BGP updates processing for the unicast VPNv6 address family.
Command Default
Command Modes
Command History
Release 12.2(33)SRD
Examples
The following example enables debugging of MPLS VPN label mode processing:
Router# debug ip bgp vpnv6 unicast labelmode MPLS VPN Label mode processing debugging is on Router# config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# mpls label mode vrf vpn1 protocol bgp-vpnv6 per-vrf % Command accepted but obsolete, unreleased or unsupported; see documentation. Router(config)# 6d03h: vpn: changing the label mode (Enable: per-vrf) for vrf vpn1, address family ipv6 6d03h: vpn: setting pervrfaggr label 18 for vrf vpn1:2001:DB8:1:2::/96 6d03h: vpn: setting pervrfaggr label 18 for vrf vpn1:2001:DB8:2::1/128 6d03h: vpn: pervrfaggr, withdraw and free local label 19 for vpn1:2001:DB8:CE1::1/128 6d03h: vpn: setting pervrfaggr label 18 for vrf vpn1:2001:DB8:CE1::1/128 6d03h: vpn: label mode change, bnet walk complete. 6d03h: BGP: VPNv6 Unicast label mode changed Router(config)# end
DB-1004
December 2010
Related Commands
DB-1005
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip casa affinities command:
Router# debug ip casa affinities 16:15:36:Adding fixed affinity: 16:15:36: 10.10.1.1:54787 -> 10.10.10.10:23 proto = 6 16:15:36:Updating fixed affinity: 16:15:36: 10.10.1.1:54787 -> 10.10.10.10:23 proto = 6 16:15:36: flags = 0x2, appl addr = 10.10.3.2, interest 16:15:36: int ip:port = 10.10.2.2:1638, sequence delta 16:15:36:Adding fixed affinity: 16:15:36: 10.10.10.10:23 -> 10.10.1.1:54787 proto = 6 16:15:36:Updating fixed affinity: 16:15:36: 10.10.10.10:23 -> 10.10.1.1:54787 proto = 6 16:15:36: flags = 0x2, appl addr = 0.0.0.0, interest = 16:15:36: int ip:port = 10.10.2.2:1638, sequence delta
= 0x5/0x100 = 0/0/0/0
0x3/0x104 = 0/0/0/0
DB-1006
December 2010
Field Adding fixed affinity Updating fixed affinity flags fwd addr interest int ip:port sequence delta
Description Adding a fixed affinity to affinity table. Modifying a fixed affinity table with information from the services manager. Bit field indicating actions to be taken on this affinity. Address to which packets will be directed. Services manager that is interested in packets for this affinity. Services manager port to which interest packets are sent. Used to adjust TCP sequence numbers for this affinity.
DB-1007
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip casa packets command:
Router# debug ip casa packets 16:15:36:Routing CASA packet - TO_MGR: 16:15:36: 10.10.1.1:55299 -> 10.10.10.10:23 proto = 6 16:15:36: Interest Addr:10.10.2.2 Port:1638 16:15:36:Routing CASA packet - FWD_PKT: 16:15:36: 10.10.1.1:55299 -> 10.10.10.10:23 proto = 6 16:15:36: Fwd Addr:10.10.3.2 16:15:36:Routing CASA packet - TO_MGR: 16:15:36: 10.10.10.10:23 -> 10.10.1.1:55299 proto = 6 16:15:36: Interest Addr:10.10.2.2 Port:1638 16:15:36:Routing CASA packet - FWD_PKT: 16:15:36: 10.10.10.10:23 -> 10.10.1.1:55299 proto = 6 16:15:36: Fwd Addr:0.0.0.0 16:15:36:Routing CASA packet - TICKLE: 16:15:36: 10.10.10.10:23 -> 10.10.1.1:55299 proto = 6 16:15:36: Interest Addr:10.10.2.2 Port:1638 Interest Mask:SYN 16:15:36: Fwd Addr:0.0.0.0 16:15:36:Routing CASA packet - FWD_PKT: 16:15:36: 10.10.1.1:55299 -> 10.10.10.10:23 proto = 6 16:15:36: Fwd Addr:10.10.3.2
DB-1008
December 2010
Table 118
Description Forwarding Agent is routing a packet to the services manager. Forwarding Agent is routing a packet to the forwarding address.
Routing CASA packet - TICKLE Forwarding Agent is signaling services manager while allowing the packet in question to take the appropriate action. Interest Addr Interest Port Fwd Addr Interest Mask Services manager address. Port on the services manager where packet is sent. Address to which packets matching the affinity are sent. Services manager that is interested in packets for this affinity.
DB-1009
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip casa wildcards command:
Router# debug ip casa wildcards 16:13:23:Updating wildcard affinity: 16:13:23: 10.10.10.10:0 -> 0.0.0.0:0 proto = 6 16:13:23: src mask = 255.255.255.255, dest mask = 0.0.0.0 16:13:23: no frag, not advertising 16:13:23: flags = 0x0, appl addr = 0.0.0.0, interest = 0x8107/0x8104 16:13:23: int ip:port = 10.10.2.2:1638, sequence delta = 0/0/0/0 16:13:23:Updating wildcard affinity: 16:13:23: 0.0.0.0:0 -> 10.10.10.10:0 proto = 6 16:13:23: src mask = 0.0.0.0, dest mask = 255.255.255.255 16:13:23: no frag, advertising 16:13:23: flags = 0x0, appl addr = 0.0.0.0, interest = 0x8107/0x8102 16:13:23 int ip:port = 10.10.2.2:1638, sequence delta = 0/0/0/0
DB-1010
December 2010
Field src mask dest mask no frag, not advertising flags fwd addr interest int ip: port sequence delta
Description Source of connection. Destination of connection. Not accepting IP fragments. Bit field indicating actions to be taken on this affinity. Address to which packets matching the affinity will be directed. Services manager that is interested in packets for this affinity. Services manager port to which interest packets are sent. Used to adjust sequence numbers for this affinity.
DB-1011
debug ip cef
To troubleshoot various Cisco Express Forwarding events, use the debug ip cef command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip cef {drops [rpf [access-list]] [access-list] | receive [access-list] | events [access-list] | interface | dialer} no debug ip cef {drops [rpf [access-list]] [access-list] | receive [access-list] | events [access-list] | interface | dialer}
Specific to Interprocess Communication (IPC) Records
debug ip cef {ipc | interface-ipc | prefix-ipc [access-list]} no debug ip cef {ipc | interface-ipc | prefix-ipc [access-list]}
Cisco 10000 Series Routers Only
debug ip cef {drops [rpf [access-list]] [access-list] | receive [access-list] | events [access-list]} no debug ip cef {drops [rpf [access-list]] [access-list] | receive [access-list] | events [access-list]}
Cisco 10000 Series Routers OnlySpecific to IPC Records
Syntax Description
Records dropped packets. (Optional) Records the result of the Reverse Path Forwarding (RPF) check for packets. (Optional) Limits debugging collection to packets that match the list. Records packets that are ultimately destined to the router and packets destined to a tunnel endpoint on the router. If the decapsulated tunnel is IP, the packets are Cisco Express Forwarding switched; otherwise the packets are process switched. Records general Cisco Express Forwarding events. Records IP Cisco Express Forwarding interface events. Records IP Cisco Express Forwarding interface events for dialer interfaces. Records information related to IPC in Cisco Express Forwarding. Possible types of events are the following:
IPC messages received out of sequence Status of resequenced messages Status of buffer space for IPC messages Transmission status of IPC messages Throttle requests sent from a line card to the Route Processor
DB-1012
December 2010
interface-ipc prefix-ipc
Records IPC updates related to interfaces. Possible reporting includes an interface coming up or going down and updates to fibhwidb and fibidb. Records updates related to IP prefix information. Possible updates include the following:
Debugging of IP routing updates in a line card Reloading of a line card with a new table Updates related to exceeding the maximum number of routes Control messages related to Forwarding Information Base (FIB) table prefixes
Defaults
Command Modes
Command History
Release 11.2GS 11.1CC 12.0(5)T 12.2(4)T 12.2(25)S 12.2(28)SB 12.2(33)SRA 12.2(33)SXH 12.4(20)T
Modification This command was introduced. Support for multiple platforms was added. The rpf keyword was added. The dialer keyword was added. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
This command gathers additional information for the handling of Cisco Express Forwarding interface, IPC, or packet events.
Note
For packet events, we recommend that you use an access control list (ACL) to limit the messages recorded.
Examples
The following is sample output from the debug ip cef rpf command for a packet that is dropped when it fails the RPF check. IP address 172.17.249.252 is the source address, and Ethernet 2/0/0 is the input interface.
Router# debug ip cef drops rpf IP CEF drops for RPF debugging is on 00:42:02:CEF-Drop:Packet from 172.17.249.252 via Ethernet2/0/0 -- unicast rpf check
DB-1013
The following is sample output for Cisco Express Forwarding packets that are not switched using information from the FIB table but are received and sent to the next switching layer:
Router# debug ip cef receive IP CEF received packets debugging is on 00:47:52:CEF-receive:Receive packet for 10.1.104.13
Field CEF-Drop:Packet from 172.17.249.252 via Ethernet2/0/0 -- unicast rpf check CEF-receive:Receive packet for 10.1.104.13
Description A packet from IP address 172.17.249.252 is dropped because it failed the RPF check. Cisco Express Forwarding has received a packet addressed to the router.
The following is sample output from the debug ip cef dialer command for a legacy dialer:
Router# debug ip cef dialer 00:19:50:CEF-Dialer (legacy):add link to 10.10.10.2 via Dialer1 through BRI0/0:1 00:19:50:CEF-Dialer:adjacency added:0x81164850 00:19:50:CEF-Dialer:adjacency found:0x81164850; fib->count:1 00:19:50:CEF-Dialer:setup loadinfo with 1 paths
The following is sample output from the debug ip cef dialer command for a dialer profile:
Router# debug ip cef dialer 00:31:44:CEF-Dialer (profile dynamic encap (not MLP)):add link to 10.10.10.2 via Dialer1 through Dialer1 00:31:44:CEF-Dialer:adjacency added:0x81164850 00:31:44:CEF-Dialer:adjacency found:0x81164850; fib->count:1
Field
Description
CEF-Dialer (legacy):add link to 10.10.10.2 via A link was added to IP address 10.10.10.2 for legacy Dialer1 through BRI0/0:1 Dialer1 through physical interface BRI0/0:1. CEF-Dialer (profile dynamic encap (not MLP)):add link to 10.10.10.2 via Dialer1 through Dialer1 A link was added to IP address 10.10.10.2 for dialer profile Dialer1 through Dialer1.
DB-1014
December 2010
Related Commands
Description Enables Cisco Express Forwarding on the RPC card. Displays entries in the FIB or displays a summary of the FIB.
DB-1015
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
This command records accounting events for nonrecursive prefixes when the ip cef accounting non-recursive command is enabled in global configuration mode.
Examples
The following is sample output from the debug ip cef accounting non-recursive command:
Router# debug ip cef accounting non-recursive 03:50:19:CEF-Acct:tmstats_binary:Beginning generation of tmstats ephemeral file (mode binary) 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF2000 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF1EA0 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF17C0 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF1D40 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF1A80 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF0740 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF08A0 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF0B60 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF0CC0 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF0F80 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF10E0
DB-1016
December 2010
03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF1240 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF13A0 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF1500 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF1920 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF0E20 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF1660 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF05E0 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF0A00 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF1BE0 03:50:19:CEF-Acct:snapshoting loadinfo 0x63FF0480 03:50:19:CEF-Acct:tmstats_binary:aggregation complete, duration 0 seconds 03:50:21:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:24:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:24:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:27:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:29:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:32:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:35:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:38:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:41:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:45:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:48:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:49:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:52:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:55:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:57:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:57:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:57:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:57:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:57:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:57:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:57:CEF-Acct:tmstats_binary:writing 45 bytes 03:50:57:CEF-Acct:tmstats_binary:tmstats file written, status 0
Field
Description
Beginning generation of tmstats ephemeral file (mode Tmstats file is being created. binary) CEF-Acct:snapshoting loadinfo 0x63FF2000 CEF-Acct:tmstats_binary:aggregation complete, duration 0 seconds CEF-Acct:tmstats_binary:writing 45 bytes Baseline counters are being written to the tmstats file for each nonrecursive prefix. Tmstats file creation is complete. Nonrecursive accounting statistics are being updated to the tmstats file.
Related Commands
Description Troubleshoots various Cisco Express Forwarding events. Enables Cisco Express Forwarding network accounting. Displays entries or a summary of the FIB table.
DB-1017
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
This command is used to troubleshoot fragmentation problems when Cisco Express Forwarding switching is enabled.
Examples
The following is sample output from the debug ip cef fragmentation command:
Router# debug ip cef fragmentation 00:59:45:CEF-FRAG:no_fixup path:network_start 0x5397CF8E datagramstart 0x5397CF80 data_start 0x397CF80 data_block 0x397CF40 mtu 1000 datagramsize 1414 data_bytes 1414 00:59:45:CEF-FRAG:send frag:datagramstart 0x397CF80 datagramsize 442 data_bytes 442 00:59:45:CEF-FRAG:send frag:datagramstart 0x38BC266 datagramsize 1006 data_bytes 1006 00:59:45:CEF-FRAG:no_fixup path:network_start 0x5397C60E datagramstart 0x5397C600 data_start 0x397C600 data_block 0x397C5C0 mtu 1000 datagramsize 1414 data_bytes 1414 00:59:45:CEF-FRAG:send frag:datagramstart 0x397C600 datagramsize 442 data_bytes 442 00:59:45:CEF-FRAG:send frag:datagramstart 0x38BC266 datagramsize 1006 data_bytes 1006
DB-1018
December 2010
Field no_fixup path network_start 0x5397CF8E datagramstart 0x5397CF80 data_start 0x397CF80 data_block 0x397C5C0 mtu 1000 datagramsize 1414 data_bytes 1414 send frag
Description A packet is being fragmented in the no_fixup path. Memory address of the IP packet. Memory address of the encapsulated IP packet. For particle systems, the memory address where data starts for the first packet particle. For particle systems, the memory address of the first packet particle data block. Maximum transmission unit of the output interface. Size of the encapsulated IP packet. For particle systems, the sum of the particle data bytes that make up the packet. Fragment is being forwarded.
Related Commands
DB-1019
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(5)T. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is not supported on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA.This command is not supported on the Cisco 7600 router. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
Use this command when changing the load sharing algorithm to display the hash table details.
Examples
The following is sample output from the debug ip cef hash command with IP Cisco Express Forwarding load algorithm tunnel information:
Router# debug ip cef hash 01:15:06:%CEF:ip cef load-sharing algorithm tunnel 0 01:15:06:%CEF:Load balancing algorithm:tunnel 01:15:06:%CEF:Load balancing unique id:1F2BA5F6 01:15:06:%CEF:Destroyed load sharing hash table 01:15:06:%CEF:Sending hash algorithm id 2, unique id 1F2BA5F6 to slot 255
DB-1020
December 2010
The following lines show IP Cisco Express Forwarding load algorithm universal information:
01:15:28:%CEF:ip cef load-sharing algorithm universal 0 01:15:28:%CEF:Load balancing algorithm:universal 01:15:28:%CEF:Load balancing unique id:062063A4 01:15:28:%CEF:Creating load sharing hash table 01:15:28:%CEF:Hash table columns for valid max_index: 01:15:28:12: 9 7 7 4 4 10 0 7 10 4 5 0 4 7 8 4 01:15:28:15: 3 10 10 4 10 4 0 7 1 7 14 6 13 13 11 13 01:15:28:16: 1 3 7 12 4 14 8 7 10 4 1 12 8 15 4 8 01:15:28:%CEF:Sending hash algorithm id 3, unique id 062063A4 to slot 255
Field ip cef load-sharing algorithm tunnel 0 Load balancing algorithm:tunnel Load balancing unique id:1F2BA5F6 Destroyed load sharing hash table Sending hash algorithm id 2, unique id 1F2BA5F6 to slot 255 Creating load sharing hash table
Description Echo of the user command. Load sharing algorithm is set to tunnel. ID field in the command is usually 0. In this instance, the router chose a pseudo random ID of 1F2BA5F6. Purge the existing hash table. Algorithm is being distributed. Hash table is being created.
Related Commands
Description Troubleshoots various Cisco Express Forwarding events. Records Cisco Express Forwarding removal of receive hash events.
DB-1021
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is not supported on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is not supported on the Cisco 7600 routers. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
Use this command to verify the removal of receive hash events when you are shutting down or deleting an interface.
Examples
The following is sample output from the debug ip cef rrhash command:
Router# debug ip cef rrhash 00:27:15:CEF:rrhash/check:found 00:27:15:CEF:rrhash/check:found 00:27:15:CEF:rrhash/check:found 00:27:15:CEF:rrhash/check:found 00:27:15:CEF:rrhash/check:found 00:27:15:CEF:rrhash/check:found 00:27:15:CEF:rrhash/check:found 00:27:15:CEF:rrhash/check:found 10.1.104.7 on down idb [ok to delete] 10.1.104.0 on down idb [ok to delete] 10.1.104.255 on down idb [ok to delete] 10.1.104.7 on down idb [ok to delete] 10.1.104.7 on down idb [ok to delete] 10.1.104.0 on down idb [ok to delete] 10.1.104.255 on down idb [ok to delete] 10.1.104.7 on down idb [ok to delete]
DB-1022
December 2010
Description Verify address is on the receive list. Found a valid address on the receive list for a shutdown interface that can be deleted.
Related Commands
Description Troubleshoots various Cisco Express Forwarding events. Records Cisco Express Forwarding removal of receive hash events.
DB-1023
Syntax Description
(Optional) Subblock types. (Optional) All subblock types. (Optional) Hardware subblock and identifier. (Optional) Software subblock and identifier. (Optional) Exernal Data Representation (XDR) message types. (Optional) All XDR message types. (Optional) Event XDR messages only. (Optional) No XDR messages. (Optional) Statistic XDR messages.
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
This command is used to record Cisco Express Forwarding subblock messages and events.
Examples
The following is sample output from the debug ip cef subblock command:
Router# debug ip cef subblock
DB-1024
December 2010
00:28:12:CEF-SB:Creating unicast RPF subblock for FastEthernet6/0 00:28:12:CEF-SB:Linked unicast RPF subblock to FastEthernet6/0. 00:28:12:CEF-SB:Encoded unit of unicast RPF data (length 16) for FastEthernet6/0 00:28:12:CEF-SB:Sent 1 data unit to slot 6 in 1 XDR message
The following is sample output from the debug ip cef subblock command:
Router# debug ip cef subblock 00:28:12:CEF-SB:Creating unicast RPF subblock for FastEthernet6/0/0 00:28:12:CEF-SB:Linked unicast RPF subblock to FastEthernet6/0/0. 00:28:12:CEF-SB:Encoded unit of unicast RPF data (length 16) for FastEthernet6/0/0 00:28:12:CEF-SB:Sent 1 data unit to slot 6 in 1 XDR message
Field
Description
Creating unicast RPF subblock for FastEthernet6/0/0 Creating an Unicast Reverse Path Forwarding (Unicast RPF) interface descriptor subblock. Linked unicast RPF subblock to FastEthernet6/0/0 Encoded unit of unicast RPF data (length 16) for FastEthernet6/0/0 Sent 1 data unit to slot 6 in 1 XDR message Linked the subblock to the specified interface. Encoded the subblock information in an XDR. Sent the XDR message to a line card through the IPC.
Related Commands
DB-1025
Syntax Description
access-list consistency-checkers
(Optional) Controls collection of consistency checker parameters from specified lists. (Optional) Sets consistency checking characteristics.
Defaults
Command Modes
Command History
Release 11.2GS 11.1CC 12.0(15)S 12.2(2)T 12.2(25)S 12.2(28)SB 12.2(33)SRA 12.2(33)SXH 12.4(20)T
Modification This command was introduced. Support was added for multiple platforms. The consistency-checkers keyword was added. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
This command is used to record Cisco Express Forwarding table events related to the Forwarding Information Base (FIB) table. Possible types of events include the following:
Routing updates that populate the FIB table Flushing of the FIB table Adding or removing of entries to the FIB table Table reloading process
DB-1026
December 2010
Examples
The following is sample output from the debug ip cef table command:
Router# debug ip cef table 01:25:46:CEF-Table:Event up, 10.1.1.1/32 (rdbs:1, flags:1000000) 01:25:46:CEF-IP:Checking dependencies of 0.0.0.0/0 01:25:47:CEF-Table:attempting to resolve 10.1.1.1/32 01:25:47:CEF-IP:resolved 10.1.1.1/32 via 10.1.104.1 to 10.1.104.1 Ethernet2/0/0 01:26:02:CEF-Table:Event up, default, 0.0.0.0/0 (rdbs:1, flags:400001) 01:26:02:CEF-IP:Prefix exists - no-op change
The following is sample output from the debug ip cef table command:
Router# debug ip cef table 01:25:46:CEF-Table:Event up, 10.1.1.1/32 (rdbs:1, flags:1000000) 01:25:46:CEF-IP:Checking dependencies of 0.0.0.0/0 01:25:47:CEF-Table:attempting to resolve 10.1.1.1/32 01:25:47:CEF-IP:resolved 10.1.1.1/32 via 10.1.104.1 to 10.1.104.1 GigabitEthernet2/0/0 01:26:02:CEF-Table:Event up, default, 0.0.0.0/0 (rdbs:1, flags:400001) 01:26:02:CEF-IP:Prefix exists - no-op change
Field CEF-Table Event up, 10.1.1.1/32 rdbs:1 flags:1000000 CEF-IP Checking dependencies of 0.0.0.0/0 attempting to resolve 10.1.1.1/32 resolved 10.1.1.1/32 via 10.1.104.1 to 10.1.104.1 Ethernet2/0/0 Event up, default, 0.0.0.0/0 Prefix exists - no-op change
Description Indicates a table event. IP prefix 10.1.1.1/32 is being added. Event is from routing descriptor block 1. Indicates the network descriptor block flags. Indicates a Cisco Express Forwarding IP event. Resolves the next hop dependencies for 0.0.0.0/0. Resolves the next hop dependencies. Next hop to IP prefix 10.1.1.1/32 is set and is added to the table. Indicates no table change is necessary for 0.0.0.0/32.
DB-1027
Related Commands
Command cef table consistency-check clear cef table clear ip cef inconsistency
Description Enables Cisco Express Forwarding consistency checker table values by type and parameter. Clears the Cisco Express Forwarding tables. Clears Cisco Express Forwarding inconsistency statistics and records found by the Cisco Express Forwarding consistency checkers. Enables the display of information about Cisco Express Forwarding events. Troubleshoots various Cisco Express Forwarding events.
show cef table consistency-check Displays Cisco Express Forwarding consistency checker table values. show ip cef inconsistency Displays Cisco Express Forwarding IP prefix inconsistencies.
DB-1028
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(14)T. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
Use the debug ip ddns update command to verify that your configurations are working properly. The following sample configurations are shown for demonstration of possible debug output that could display for each configuration.
Sample Configuration for the Client to Update A RRs and the Server to Update PTR RRs
The following scenario has a client configured for IETF DDNS updating of address (A) Resource Records (RRs) during which a Dynamic Host Configuration Protocol (DHCP) server is expected to update the pointer (PTR) RR. The DHCP client discovers the domain name system (DNS) server to update using an Start of Authority (SOA) RR lookup since the IP address to the server to update is not specified. The DHCP client is configured to include an fully qualified domain name (FQDN) DHCP option and notifies the DHCP server that it will be updating the A RRs.
!DHCP Client Configuration ip ddns update method testing ddns interface Ethernet1 ip dhcp client update dns ip ddns update testing ip address dhcp end !DHCP Server Configuration ip dhcp pool test network 10.0.0.0 255.0.0.0 update dns
DB-1029
!Debug Output Enabled Router# debug ip ddns update 00:14:39: %DHCP-6-ADDRESS_ASSIGN: Interface Ethernet1 assigned DHCP address 10.0.0.4, mask 255.0.0.0, hostname canada_reserved 00:14:39: DYNDNSUPD: Adding DNS mapping for canada_reserved.hacks <=> 10.0.0.4 00:14:39: DYNDNSUPD: Sleeping for 3 seconds waiting for interface Ethernet1 configuration to settle 00:14:42: DHCPC: Server performed PTR update 00:14:42: DDNS: Enqueuing new DDNS update 'canada_reserved.hacks' <=> 10.0.0.4 00:14:42: DDNS: Zone name for 'canada_reserved.hacks' is 'hacks' 00:14:42: DDNS: Dynamic Update 1: (sending to server 10.19.192.32) 00:14:42: DDNS: Zone = hacks 00:14:42: DDNS: Prerequisite: canada_reserved.hacks not in use 00:14:42: DDNS: Update: add canada_reserved.hacks IN A 10.0.0.4 00:14:42: DDNS: Dynamic DNS Update 1 (A) for host canada_reserved.hacks returned 0 (NOERROR) 00:14:42: DDNS: Update of 'canada_reserved.hacks' <=> 10.0.0.4 finished 00:14:42: DYNDNSUPD: Another update completed (total outstanding=0)
Sample Configuration for the Client to Update Both A and DNS RRs and the Server to Update Neither
The following scenario has the client configured for IETF DDNS updating of both A and DNS RRs and requesting that the DHCP server update neither. The DHCP client discovers the DNS server to update using an SOA RR lookup since the IP address to the server to update is not specified. The DHCP client is configured to include an FQDN DHCP option that instructs the DHCP server to not update either A or PTR RRs.
!DHCP Client Configuration ip dhcp-client update dns server none ip ddns update method testing ddns both interface Ethernet1 ip ddns update testing ip address dhcp end !DHCP Server Configuration ip dhcp pool test network 10.0.0.0 255.0.0.0 update dns !Debug Output Enabled Router# debug ip ddns update 00:15:33: %DHCP-6-ADDRESS_ASSIGN: Interface Ethernet1 assigned DHCP address 10.0.0.5, mask 255.0.0.0, hostname canada_reserved 00:15:33: DYNDNSUPD: Adding DNS mapping for canada_reserved.hacks <=> 10.0.0.5 00:15:33: DYNDNSUPD: Sleeping for 3 seconds waiting for interface Ethernet1 configuration to settle 00:15:36: DDNS: Enqueuing new DDNS update 'canada_reserved.hacks' <=> 10.0.0.5 00:15:36: DDNS: Zone name for '10.0.0.11.in-addr.arpa.' is '10.in-addr.arpa' 00:15:36: DDNS: Dynamic Update 1: (sending to server 10.19.192.32) 00:15:36: DDNS: Zone = 10.in-addr.arpa 00:15:36: DDNS: Prerequisite: 10.0.0.11.in-addr.arpa. not in use 00:15:36: DDNS: Update: add 10.0.0.11.in-addr.arpa. IN PTR canada_reserved.hacks 00:15:36: DDNS: Dynamic DNS Update 1 (PTR) for host canada_reserved.hacks returned 0 (NOERROR) 00:15:36: DDNS: Zone name for 'canada_reserved.hacks' is 'hacks' 00:15:36: DDNS: Dynamic Update 1: (sending to server 10.19.192.32) 00:15:36: DDNS: Zone = hacks
DB-1030
December 2010
DDNS: Prerequisite: canada_reserved.hacks not in use DDNS: Update: add canada_reserved.hacks IN A 10.0.0.5 DDNS: Dynamic DNS Update 1 (A) for host canada_reserved.hacks returned 0 DDNS: Update of 'canada_reserved.hacks' <=> 10.0.0.5 finished DYNDNSUPD: Another update completed (total outstanding=0)
Sample Configuration for the Client to Update A and DNS RRs and the Server to Update Neither
The following scenario has the client configured for IETF DDNS updating of both A and DNS RRs and requesting that the DHCP server update neither. The DHCP client explicitly specifies the server to update. The DHCP client is configured to include an FQDN DHCP option that instructs the DHCP server not to update either A or PTR RRs. The configuration is performed using the ip dhcp client update dns command. The DHCP server is configured to override the client request and update both A and PTR RR anyway.
!DHCP Client Configuration ip dhcp client update dns server none ip ddns update method testing ddns both interface Ethernet1 ip dhcp client update dns server none ip ddns update testing ip address dhcp end !DHCP Server Configuration ip dhcp pool test network 10.0.0.0 255.0.0.0 update dns both override !Debug Output Enabled on DHCP Client Router# debug ip ddns update 00:16:30: %DHCP-6-ADDRESS_ASSIGN: Interface Ethernet1 assigned DHCP address 10.0.0.6, mask 255.0.0.0, hostname canada_reserved 00:16:30: DYNDNSUPD: Adding DNS mapping for canada_reserved.hacks <=> 10.0.0.6 00:16:30: DYNDNSUPD: Sleeping for 3 seconds waiting for interface Ethernet1 configuration to settle 00:16:33: DHCPC: Server performed both updates
Sample Configuration for the Client to Update A and DNS RRs and the Server to Update Neither
The following scenario has the client configured for IETF DDNS updating of both A and DNS RRs and requesting the DHCP server to update neither. The DHCP client is configured to include an FQDN DHCP option which instructs the DHCP server not to update either A or PTR RRs. The DHCP server is configured to allow the client to update whatever RR it chooses.
!DHCP Client Configuration ip dhcp client update dns server non ip ddns update method testing ddns both interface Ethernet1 ip dhcp client update dns server none ip ddns update testing host 172.19.192.32 ip address dhcp end
DB-1031
!DHCP Server Configuration ip dhcp pool test network 10.0.0.0 255.0.0.0 update dns !Debug Output Enabled on DHCP Client Router# debug ip ddns update 00:17:52: %DHCP-6-ADDRESS_ASSIGN: Interface Ethernet1 assigned DHCP address 10.0.0.7, mask 255.0.0.0, hostname canada_reserved 00:17:52: DYNDNSUPD: Adding DNS mapping for canada_reserved.hacks <=> 10.0.0.6 00:17:52: DYNDNSUPD: Sleeping for 3 seconds waiting for interface Ethernet1 configuration to settle 00:17:55: DDNS: Enqueuing new DDNS update 'canada_reserved.hacks' <=> 10.0.0.7 00:17:55: DYNDNSUPD: Adding DNS mapping for canada_reserved.hacks <=> 10.0.0.7 server 10.19.192.32 00:17:55: DDNS: Enqueuing new DDNS update 'canada_reserved.hacks' <=> 10.0.0.7 server 10.19.192.32 00:17:55: DDNS: Zone name for '7.0.0.11.in-addr.arpa.' is '11.in-addr.arpa' 00:17:55: DDNS: Dynamic Update 1: (sending to server 10.19.192.32) 00:17:55: DDNS: Zone = 11.in-addr.arpa 00:17:55: DDNS: Prerequisite: 10.0.0.11.in-addr.arpa. not in use 00:17:55: DDNS: Update: add 10.0.0.11.in-addr.arpa. IN PTR canada_reserved.hacks 00:17:55: DDNS: Zone name for '10.0.0.11.in-addr.arpa.' is '10.in-addr.arpa' 00:17:55: DDNS: Using server 10.19.192.32 00:17:55: DDNS: Dynamic Update 1: (sending to server 10.19.192.32) 00:17:55: DDNS: Zone = 11.in-addr.arpa 00:17:55: DDNS: Prerequisite: 10.0.0.11.in-addr.arpa. not in use 00:17:55: DDNS: Update: add 10.0.0.11.in-addr.arpa. IN PTR canada_reserved.hacks 00:17:55: DDNS: Dynamic DNS Update 1 (PTR) for host canada_reserved.hacks returned 0 (NOERROR) 00:17:55: DDNS: Dynamic DNS Update 1 (PTR) for host canada_reserved.hacks returned 6 (YXDOMAIN) 00:17:55: DDNS: Dynamic Update 2: (sending to server 10.19.192.32) 00:17:55: DDNS: Zone = 11.in-addr.arpa 00:17:55: DDNS: Update: delete 10.0.0.11.in-addr.arpa. all PTR RRs 00:17:55: DDNS: Update: add 10.0.0.11.in-addr.arpa. IN PTR canada_reserved.hacks 00:17:55: DDNS: Dynamic DNS Update 2 (PTR) for host canada_reserved.hacks returned 0 (NOERROR) 00:17:55: DDNS: Zone name for 'canada_reserved.hacks' is 'hacks' 00:17:55: DDNS: Dynamic Update 1: (sending to server 10.19.192.32) 00:17:55: DDNS: Zone = hacks 00:17:55: DDNS: Prerequisite: canada_reserved.hacks not in use 00:17:55: DDNS: Update: add canada_reserved.hacks IN A 10.0.0.7 00:17:55: DDNS: Dynamic DNS Update 1 (A) for host canada_reserved.hacks returned 0 (NOERROR) 00:17:55: DDNS: Update of 'canada_reserved.hacks' <=> 10.0.0.7 finished 00:17:55: DYNDNSUPD: Another update completed (total outstanding=1) 00:17:55: DDNS: Zone name for 'canada_reserved.hacks' is 'hacks' 00:17:55: DDNS: Using server 10.19.192.32 00:17:55: DDNS: Dynamic Update 1: (sending to server 10.19.192.32) 00:17:55: DDNS: Zone = hacks 00:17:55: DDNS: Prerequisite: canada_reserved.hacks not in use 00:17:55: DDNS: Update: add canada_reserved.hacks IN A 10.0.0.7 00:17:55: DDNS: Dynamic DNS Update 1 (A) for host canada_reserved.hacks returned 6 (YXDOMAIN) 00:17:55: DDNS: Dynamic Update 2: (sending to server 10.19.192.32) 00:17:55: DDNS: Zone = hacks 00:17:55: DDNS: Update: delete canada_reserved.hacks all A RRs 00:17:55: DDNS: Update: add canada_reserved.hacks IN A 10.0.0.7 00:17:55: DDNS: Dynamic DNS Update 2 (A) for host canada_reserved.hacks returned 0 (NOERROR) 00:17:55: DDNS: Update of 'canada_reserved.hacks' <=> 10.0.0.7 finished 00:17:55: DYNDNSUPD: Another update completed (total outstanding=0)
DB-1032
December 2010
In the following scenario, the debug output displays the internal host table updates when the default domain name is hacks. The update method named test specifies that the internal Cisco IOS software host table should be updated. Configuring the update method as test should be used when the address on the Ethernet interface 0/0 changes. The hostname is configured for the update on this interface.
!Cisco IOS Software Configuration ip domain name hacks ip ddns update method test internal interface ethernet0/0 ip ddns update test hostname test2 ip addr dhcp !Debug Output Enabled Router# debug ip ddns update *Jun 4 03:11:10.591: %DHCP-6-ADDRESS_ASSIGN: Interface Ethernet0/0 assigned DHCP address 10.0.0.5, mask 255.0.0.0, hostname test2 *Jun 4 03:11:10.591: DYNDNSUPD: Adding DNS mapping for test2.hacks <=> 10.0.0.5 *Jun 4 03:11:10.591: DYNDNSUPD: Adding internal mapping test2.hacks <=> 10.0.0.5
Using the show hosts command displays the newly added host table entry.
Router# show hosts Default domain is hacks Name/address lookup uses domain service Name servers are 255.255.255.255 Codes: UN - unknown, EX - expired, OK - OK, ?? - revalidate temp - temporary, perm - permanent NA - Not Applicable None - Not defined Host test2.hacks Port Flags Age Type None (perm, OK) 0 IP Address(es) 10.0.0.5
Using the show hosts command confirms that the entry has been removed.
Router# show hosts Default domain is hacks Name/address lookup uses domain service Name servers are 255.255.255.255 Codes: UN - unknown, EX - expired, OK - OK, ?? - revalidate temp - temporary, perm - permanent NA - Not Applicable None - Not defined Host Port Flags Age Type Address(es)
DB-1033
In the following scenario, the debug output shows the HTTP-style DDNS updates. The sample configuration defines a new IP DDNS update method named dyndns that configures a URL to use when adding or changing an address. No URL has been defined for use when removing an address since DynDNS.org does not use such a URL for free accounts. A maximum update interval of 28 days has been configured, which specifies that updates should be sent at least every 28 days. Configuring the new dyndns update method should be used for Ethernet interface 1.
!DHCP Client Configuration ip ddns update method dyndns http add http://test:test@<s>/nic/update?system=dyndns&hostname=<h>&myip=<a> interval max 28 0 0 0 interface ethernet1 ip ddns update hostname test.dyndns.org ip ddns update dyndns host members.dyndns.org ip addr dhcp !Debugging Enabled Router# debug ip ddns update 00:04:35: %DHCP-6-ADDRESS_ASSIGN: Interface Ethernet1 assigned DHCP address 10.32.254.187, mask 255.255.255.240, hostname test.dyndns.org 00:04:35: DYNDNSUPD: Adding DNS mapping for test.dyndns.org <=> 10.32.254.187 server 63.208.196.94 00:04:35: DYNDNSUPD: Sleeping for 3 seconds waiting for interface Ethernet1 configuration to settle 00:04:38: HTTPDNS: Update add called for test.dyndns.org <=> 10.32.254.187 00:04:38: HTTPDNS: Update called for test.dyndns.org <=> 10.32.254.187 00:04:38: HTTPDNS: init 00:04:38: HTTPDNSUPD: Session ID = 0x7 00:04:38: HTTPDNSUPD: URL = 'http://test:[email protected]/nic/update?system=dyndns&hostname=test.dyndns.org&myip=10. 32.254.187' 00:04:38: HTTPDNSUPD: Sending request 00:04:40: HTTPDNSUPD: Response for update test.dyndns.org <=> 10.32.254.187 00:04:40: HTTPDNSUPD: DATA START good 10.32.254.187 00:04:40: HTTPDNSUPD: DATA END, Status is Response data received, successfully 00:04:40: HTTPDNSUPD: Call returned SUCCESS for update test.dyndns.org <=> 10.32.254.187 00:04:40: HTTPDNSUPD: Freeing response 00:04:40: DYNDNSUPD: Another update completed (outstanding=0, total=0) 00:04:40: HTTPDNSUPD: Clearing all session 7 info !28 days later, the automatic update happens. 00:05:39: DYNDNSUPD: Adding DNS mapping for test.dyndns.org <=> 10.32.254.187 server 63.208.196.94 00:05:39: HTTPDNS: Update add called for test.dyndns.org <=> 10.32.254.187 00:05:39: HTTPDNS: Update called for test.dyndns.org <=> 10.32.254.187 00:05:39: HTTPDNS: init 00:05:39: HTTPDNSUPD: Session ID = 0x8 00:05:39: HTTPDNSUPD: URL = 'http://test:[email protected]/nic/update?system=dyndns&hostname=test.dyndns.org&myip=10. 32.254.187' 00:05:39: HTTPDNSUPD: Sending request 00:05:39: HTTPDNSUPD: Response for update test.dyndns.org <=> 10.32.254.187 00:05:39: HTTPDNSUPD: DATA START nochg 10.32.254.187 00:05:39: HTTPDNSUPD: DATA END, Status is Response data received, successfully 00:05:39: HTTPDNSUPD: Call returned SUCCESS for update test.dyndns.org <=> 10.32.254.187
DB-1034
December 2010
00:05:39: HTTPDNSUPD: Freeing response 00:05:39: DYNDNSUPD: Another update completed (outstanding=0, total=0) 00:05:39: HTTPDNSUPD: Clearing all session 8 info
Description Reflects the method of update. In this case, the update method is HTTP. URL that is used to update the DNS.
Related Commands
Command debug dhcp debug ip dhcp server host (host-list) ip ddns update hostname
Description Displays debugging information about the DHCP client and monitors the status of DHCP packets. Enables DHCP server debugging. Specifies a list of hosts that will receive DDNS updates of A and PTR RRs. Enables a host to be used for DDNS updates of A and PTR RRs.
ip ddns update method Specifies a method of DDNS updates of A and PTR RRs and the maximum interval between the updates. ip dhcp client update dns ip dhcp-client update dns ip dhcp update dns ip host-list show ip ddns update show ip ddns update method show ip dhcp server pool show ip host-list update dns Enables DDNS updates of A RRs using the same hostname passed in the hostname and FQDN options by a client. Enables DDNS updates of A RRs using the same hostname passed in the hostname and FQDN options by a client. Enables DDNS updates of A and PTR RRs for most address pools. Specifies a list of hosts that will receive DDNS updates of A and PTR RRs. Displays information about the DDNS updates. Displays information about the DDNS update method. Displays DHCP server pool statistics. Displays the assigned hosts in a list. Dynamically updates a DNS with A and PTR RRs for some address pools.
DB-1035
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.3(4)T. This command was integrated into Cisco IOS Release 12.2(18)SXD. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command displays debugging messages for the DFP agent subsystem. See the following caution before using debug commands:
Caution
Because debugging output is assigned a high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network flows and fewer users. Debugging during these periods reduces the effect these commands have on other users on the system.
Examples
DB-1036
December 2010
DB-1037
Syntax Description
Reports server events, such as address assignments and database updates. Decodes DHCP receptions and transmissions. Displays database linkage information, such as parent-child relationships in a radix tree. Displays DHCP class-based information.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The class keyword was added. The class keyword was integrated into Cisco IOS Release 12.3(4)T. The output was enhanced to show the static mappings. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows a combination of DHCP server events and decoded receptions and transmissions:
Router# debug ip dhcp server events Router# debug ip dhcp server packets DHCPD:DHCPDISCOVER received from client 0b07.1134.a029 through relay 10.1.0.253. DHCPD:assigned IP address 10.1.0.3 to client 0b07.1134.a029. DHCPD:Sending DHCPOFFER to client 0b07.1134.a029 (10.1.0.3). DHCPD:unicasting BOOTREPLY for client 0b07.1134.a029 to relay 10.1.0.253. DHCPD:DHCPREQUEST received from client 0b07.1134.a029. DHCPD:Sending DHCPACK to client 0b07.1134.a029 (10.1.0.3). DHCPD:unicasting BOOTREPLY for client 0b07.1134.a029 to relay 10.1.0.253. DHCPD:checking for expired leases.
DB-1038
December 2010
DHCPD:parent pool:10.0.0.0 / 255.0.0.0 (net10) DHCPD:child pool:10.0.0.0 / 255.0.0.0 (net10) DHCPD:pool (net10) has no parent. DHCPD:child pool:10.1.0.0 / 255.255.0.0 (subnet10.1) DHCPD:parent pool:10.0.0.0 / 255.0.0.0 (net10) DHCPD:child pool:10.0.0.0 / 255.0.0.0 (net10) DHCPD:pool (net10) has no parent.
The following example shows the debug output when the configured pattern does not match:
Router# debug ip dhcp server class DHCPD:Searching for a match to 'relay-information 0106000 400020202020800060009e80b8800' in class CLASS1 DHCPD:Searching for a match to 'relay-information 0106000400020202020800060009e80b8800' in class CLASS1 DHCPD:Searching for a match to 'relay-information 0106000
The following example shows the debug output when you unconfigure a DHCP pattern in a DHCP class and then configure the pattern in the DHCP class:
Router# debug ip dhcp server class DHCPD:pattern 'relay-information 123456' removed from class CLASS1 DHCPD:Added pattern 'relay-information 010600040002020202 0800060009e80b8800' for class CLASS1
The following example shows the debug output when the configured pattern does match:
Router# debug ip dhcp server class DHCPD:Searching for a match to 'relay-information 0106000 400020202020800060009e80b8800' in class CLASS1 DHCPD:input pattern 'relay-information 010600040002020202 0800060009e80b8800' matches class CLASS1 DHCPD:input matches class CLASS1
The following example shows the debug output when static mappings are configured:
Router# debug ip dhcp server Loading abc/static_pool from 10.19.192.33 (via Ethernet0): ! [OK - 333 bytes] *May 0) *May *May *May *May *May *May *May 26 23:14:21.259: DHCPD: contacting agent tftp://10.19.192.33/abc/static_pool (attempt 26 23:14:21.467: DHCPD: agent tftp://10.19.192.33/abc/static_pool is responding. 26 23:14:21.467: DHCPD: IFS is ready. 26 23:14:21.467: DHCPD: reading bindings from tftp://10.19.192.33/abc/static_pool. 26 23:14:21.707: DHCPD: read 333 / 1024 bytes. 26 23:14:21.707: DHCPD: parsing text line *time* Apr 22 2002 11:31 AM 26 23:14:21.707: DHCPD: parsing text line 26 23:14:21.707: DHCPD: parsing text line
!IP address Type Hardware address Lease expiration. *May 26 23:14:21.707: DHCPD: parsing text line 10.9.9.1/24 id 0063.6973.636f.2d30.3036.302e.3437
DB-1039
*May 26 23:14:21.707: DHCPD: creating binding for 10.9.9.1 *May 26 23:14:21.707: DHCPD: Adding binding to radix tree (10.9.9.1) *May 26 23:14:21.707: DHCPD: Adding binding to hash tree *May 26 23:14:21.707: DHCPD: parsing text line 10.9.9.4 id 0063.7363.2d30.3036.302e.3762.2e39.3634.632d *May 26 23:14:21.711: DHCPD: creating binding for 10.9.9.4 *May 26 23:14:21.711: DHCPD: Adding binding to radix tree (10.9.9.4) *May 26 23:14:21.711: DHCPD: Adding binding to hash tree *May 26 23:14:21.711: DHCPD: parsing text line Infinite *May 26 23:14:21.711: DHCPD: parsing text line *May 26 23:14:21.711: DHCPD: parsing text line !IP address Interface-index Lease expiration VRF. *May 26 23:14:21.711: DHCPD: parsing text line *end* *May 26 23:14:21.711: DHCPD: read static bindings from tftp://10.19.192.33/smith/static_pool.
Related Commands
Command debug dhcp debug ip ddns update host (host-list) ip ddns update hostname
Description Displays debugging information about the DHCP client and monitors the status of DHCP packets. Enables debugging for DDNS updates. Specifies a list of hosts that will receive DDNS updates of A and PTR RRs. Enables a host to be used for DDNS updates of A and PTR RRs.
ip ddns update method Specifies a method of DDNS updates of A and PTR RRs and the maximum interval between the updates. ip dhcp client update dns ip dhcp-client update dns ip dhcp update dns ip host-list show ip ddns update show ip ddns update method show ip dhcp server pool show ip host-list update dns Enables DDNS updates of A RRs using the same hostname passed in the hostname and FQDN options by a client on an interface. Enables DDNS updates of A RRs using the same hostname passed in the hostname and FQDN options by a client. Enables DDNS updates of A and PTR RRs for most address pools. Specifies a list of hosts that will receive DDNS updates of A and PTR RRs. Displays information about the DDNS updates. Displays information about the DDNS update method. Displays DHCP server pool statistics. Displays the assigned hosts in a list. Dynamically updates a DNS with A and PTR RRs for some address pools.
DB-1040
December 2010
Syntax Description
Command Default
Debugging output is disabled for DHCP server and relay agent redundancy events.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command with caution. Many bindings being synchronized between the active and standby Route Processor (RP) can trigger a large amount of debugging output.
Examples
The following example displays debug messages regarding DHCP server and relay agent redundancy events. The last line (and only that line) is output when the debug ip dhcp server redundancy command is enabled. The line indicates that a binding update message has been sent to the standby for the IP address 10.0.0.2 in the pool named test.
Router# debug ip dhcp server redundancy *Mar 22 10:32:21: DHCPD: assigned IP address 10.0.0.2 to client 0063.6973.636f.2d30.3030.342e.3465.6130.2e30.3831.632d.4661.312f.302e.31. *Mar 22 10:32:21: DHCPD: lease time = 3600 *Mar 22 10:32:21: DHCPD: dhcpd_lookup_route: host = 10.0.0.2 *Mar 22 10:32:21: DHCPD: dhcpd_lookup_route: index = 0 *Mar 22 10:32:21: DHCPD: dhcpd_create_and_hash_route: host = 10.0.0.2 *Mar 22 10:32:21: DHCPD: dhcpd_create_and_hash_route index = 0 *Mar 22 10:32:21: DHCPD: dhcpd_add_route: lease = 3600 *Mar 22 10:32:21: DHCPD: dynamic sync completed for 10.0.0.2 in pool test
DB-1041
Related Commands
Description Displays debugging information about DHCP proxy client redundancy events.
DB-1042
December 2010
Syntax Description
Command Modes
Command History
Release 12.2(33)SRC
Examples
The following example shows how to enable debugging and display DHCP server SNMP debugging events:
Router# debug ip dhcp server snmp 00:18:01: DHCPD SNMP: pool 'pool1' 'high' utilization trap is ignored 00:18:18: DHCPD SNMP: pool 'pool1' 'low' utilization trap is ignored 00:20:46: DHCPD SNMP: subnet 4.1.1.0 'high' utilization trap is ignored 00:21:03: DHCPD SNMP: subnet 4.1.1.0 'low' utilization trap is ignored 00:18:01: DHCPD SNMP: subnet trap is not enabled 00:37:32: DHCPD SNMP: pool trap is not enabled 00:37:57: DHCPD SNMP: interface trap is not enabled 00:27:27: DHCPD SNMP: duplicate trap is not enabled
DB-1043
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command enables the writing of DNS name list event messages to system message logging (syslog) output. A DNS name list event can be either of the following:
The addition or removal of a DNS name list entry (a hostname pattern and action to perform on an incoming DNS query for a hostname that matches the pattern). To add or remove a DNS name list entry, use the ip dns name-list command. The removal of a DNS name list.
Note
The addition of a DNS name list is reported as an addition of a name list entry.
To display which debugging options are enabled (DNS name list, DNS view, or DNS view list), use the show debugging command. To display the syslog history statistics and buffer contents, use the show logging command. To display a particular DNS name list or all configured name lists, use the show ip dns name-list command.
DB-1044
December 2010
Examples
The following sample output from the debug ip dns name-list command shows the hostname pattern www.example.com being added to DNS name list 1 as a permit clause. Next, the hostname patterns www.example1.com and www.example2.com are added to DNS name list 2 as deny clauses and permit clauses, respectively. Finally, the hostname pattern www.example1.com is removed from DNS name list 2.
Router# debug ip dns name-list DNS Name-list debugging is on . . . Router# show debugging DNS Name-list debugging is on . . . Router# show logging . . . *May 16 14:54:44.326: DNS_NAMELIST: *May 16 14:54:44.910: DNS_NAMELIST: *May 16 14:54:45.202: DNS_NAMELIST: *May 16 19:32:20.881: DNS_NAMELIST:
adding permit 'WWW.EXAMPLE' to name-list 1 adding deny 'WWW.EXAMPLE1.COM' to name-list 2 adding permit 'WWW.EXAMPLE2.COM' to name-list 2 removing 'WWW.EXAMPLE1.COM' from name-list 2
Related Commands
Description Defines a list of pattern-matching rules in which each rule permits or denies the use of a DNS view list member to handle a DNS query based on whether the query hostname matches the specified regular expression. Displays the state of each debugging option. Displays a particular DNS name list or all configured name lists. Displays the contents of logging buffers.
DB-1045
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command enables the writing of DNS view event messages to system message logging (syslog) output. A DNS view event can be any of the following:
The addition or removal of a DNS view definition. The addition or removal of a DNS forwarding name server setting for a DNS view. The addition or removal of a DNS resolver setting for a DNS view. The enabling or disabling of logging of a syslog message each time a DNS view is used.
To display which debugging options are enabled (DNS name list, DNS view, or DNS view list), use the show debugging command. To show the syslog history statistics and buffer contents, use the show logging command.
Examples
The following sample output from the debug ip dns view command shows the default DNS view being configured:
Router# debug ip dns view DNS View debugging is on . . . Router# show debugging
DB-1046
December 2010
DNS View debugging is on . . . Router# show logging . . . DNS_VIEW: creating view view1 DNS_VIEW: Clearing logging in view default DNS_VIEW: Setting domain lookup in view default DNS_VIEW: Setting domain name to cisco.com in view default DNS_VIEW: Setting domain list example1.com in view default DNS_VIEW: Setting domain list example1.com example2.com in view default DNS_VIEW: Setting domain list example1.com example2.com example3.com in view default DNS_VIEW: Setting domain multicast to 192.0.2.10 in view default DNS_VIEW: Setting domain lookup in view default DNS_VIEW: Setting domain timeout to 7 in view default DNS_VIEW: Setting domain retry to 7 in view default DNS_VIEW: Setting domain name-server 192.0.2.204 192.0.2.205 in view default DNS_VIEW: Setting domain name-server 192.0.2.204 192.0.2.205 192.0.2.206 in view default DNS_VIEW: Setting domain name-server interface FastEthernet0/1 in view default DNS_VIEW: Setting domain round-robin to 4 in view default DNS_VIEW: Setting dns forwarding in view default DNS_VIEW: Setting dns forwarder 192.0.2.11 in view default DNS_VIEW: Setting dns forwarder 192.0.2.11 192.0.2.12 in view default DNS_VIEW: Setting dns forwarder 192.0.2.11 192.0.2.12 192.0.2.13 in view default
Related Commands
Description Enters DNS view configuration mode for the specified DNS view so that the logging setting, forwarding parameters, and resolving parameters can be configured for the view. Displays the state of each debugging option. Displays the contents of logging buffers.
DB-1047
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command enables the writing of DNS view list event messages to system message logging (syslog) output. A DNS view list event can be any of the following:
The addition or removal of a DNS view list definition. To add or remove a DNS view list definition, use the ip dns view-list command. The addition or removal of a DNS view list member (a DNS view and the relative order in which it is to be checked in the view list) to or from a DNS view list. To add or remove a DNS view list member, use the view command. The setting or clearing of a DNS view list assignment as the default view list (using the ip dns server view-group command) or to an interface (using the ip dns view-group command).
To show which debugging options are enabled (DNS name list, DNS view, or DNS view list), use the show debugging command. To show the syslog history statistics and buffer contents, use the show logging command.
Examples
The following sample output from the debug ip dns vies-list command shows the addition of the DNS view list definition named userlist5. Next, five DNS views are added as members of the DNS view list.
Router# debug ip dns view-list DNS View-list debugging is on . .
DB-1048
December 2010
. Router# show debugging DNS View-list debugging is on . . . Router# show logging *May 16 23:31:17.491: *May 16 23:31:17.711: userlist5 *May 16 23:31:18.583: userlist5 *May 16 23:31:19.851: userlist5 *May 16 23:31:21.007: userlist5 *May 16 23:31:22.199: DNS_VIEWLIST: creating view-list userlist5 DNS_VIEWLIST: adding member user1 vrf vpn101 order 10 to view-list DNS_VIEWLIST: adding member user2 vrf vpn102 order 20 to view-list DNS_VIEWLIST: adding member user3 vrf vpn103 order 30 to view-list DNS_VIEWLIST: adding member user4 vrf vpn204 order 45 to view-list DNS_VIEWLIST: adding member default order 60 to view-list userlist5
Related Commands
Command ip dns server view-group ip dns view-group ip dns view-list show debugging show logging view
Description Specifies the DNS view list to use to determine which DNS view to use handle incoming queries that arrive on an interface not configured with a DNS view list. Specifies the DNS view list to use to determine which DNS view to use to handle incoming DNS queries that arrive on a specific interface. Enters DNS view list configuration mode so that DNS views can be added to or removed from the ordered list of DNS views. Displays the state of each debugging option. Displays the contents of logging buffers. Enters DNS view list member configuration mode so that usage restrictions can be configured for the view list member.
DB-1049
debug ip drp
To display Director Response Protocol (DRP) information, use the debug ip drp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip drp no debug ip drp
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug ip drp command is used to debug the director response agent used by the Distributed Director product. The Distributed Director can be used to dynamically respond to Domain Name System (DNS) queries with the IP address of the best host based on various criteria.
Examples
The following is sample output from the debug ip drp command. This example shows the packet origination, the IP address that information is routed to, and the route metrics that were returned.
Router# debug ip drp DRP: received v1 packet from 172.69.232.8, via Ethernet0 DRP: RTQUERY for 172.69.58.94 returned internal=0, external=0
Field
Description
DRP: received v1 packet from Router received a version 1 DRP packet from the IP address shown, 172.69.232.8, via Ethernet0 via the interface shown. DRP: RTQUERY for 172.69.58.94 internal DRP packet contained two Route Query requests. The first request was for the distance to the IP address 171.69.113.50. If nonzero, the metric for the internal distance of the route that the router uses to send packets in the direction of the client. The internal distance is the distance within the autonomous system of the router. If nonzero, the metric for the Border Gateway Protocol (BGP) or external distance used to send packets to the client. The external distance is the distance outside the autonomous system of the router.
external
DB-1050
December 2010
debug ip dvmrp
Note
Support for DVMRP has been removed from 12.2SR releases beginning in Cisco IOS Release 12.2(33)SRB. This command is no longer available in Cisco IOS Release 12.2(33)SRB and subsequent 12.2SR releases. To display information on Distance Vector Multiprotocol Routing Protocol (DVMRP) packets received and sent, use the debug ip dvmrp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip dvmrp [detail [access-list] [in | out]] no debug ip dvmrp [detail [access-list] [in | out]]
Syntax Description
(Optional) Enables a more detailed level of output and displays packet contents. (Optional) Causes the debug ip dvmrp command to restrict output to one access list. (Optional) Causes the debug ip dvmrp command to output packets received in DVMRP reports. (Optional) Causes the debug ip dvmrp command to output packets sent in DVMRP reports.
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug ip dvmrp detail command with care. This command generates a substantial amount of output and can interrupt other activity on the router when it is invoked.
Examples
DB-1051
DVMRP: Send Report on Tunnel0 to 192.168.199.254 DVMRP: Radix tree walk suspension DVMRP: Send Report on Tunnel0 to 192.168.199.254
The following lines show that the router received DVMRP routing information and placed it in the mroute table:
DVMRP: Received Report on Ethernet0 from 172.19.244.10 DVMRP: Received Report on Ethernet0 from 172.19.244.11
The following lines show that the router is creating a report to send to another DVMRP router:
DVMRP: Building Report for Ethernet0 224.0.0.4 DVMRP: Send Report on Ethernet0 to 224.0.0.4
Table 130 provides a list of internet multicast addresses supported for host IP implementations.
Table 130 Internet Multicast Addresses
Description Base address (reserved) All systems on this subnet All routers on this subnet Unassigned DVMRP routers OSPFIGP all routers
The following lines show that a protocol update report has been sent to all known multicast groups. Hosts use Internet Group Management Protocol (IGMP) reports to communicate with routers and to request to join a multicast group. In this case, the router is sending an IGMP report for every known group to the host, which is running mrouted. The host then responds as though the router were a host on the LAN segment that wants to receive multicast packets for the group.
DVMRP: Sending IGMP Reports for known groups on Ethernet0
The following is sample output from the debug ip dvmrp detail command:
Router# debug ip dvmrp detail DVMRP: DVMRP: DVMRP: DVMRP: DVMRP: DVMRP: DVMRP: DVMRP: DVMRP: DVMRP: DVMRP: DVMRP: DVMRP: DVMRP: DVMRP: DVMRP: Sending IGMP Reports for known groups on Ethernet0 Advertise group 224.2.224.2 on Ethernet0 Advertise group 224.2.193.34 on Ethernet0 Advertise group 224.2.231.6 on Ethernet0 Received Report on Tunnel0 from 192.168.199.254 Origin 150.166.53.0/24, metric 13, distance 0 Origin 150.166.54.0/24, metric 13, distance 0 Origin 150.166.55.0/24, metric 13, distance 0 Origin 150.166.56.0/24, metric 13, distance 0 Origin 150.166.92.0/24, metric 12, distance 0 Origin 150.166.100.0/24, metric 12, distance 0 Origin 150.166.101.0/24, metric 12, distance 0 Origin 150.166.142.0/24, metric 8, distance 0 Origin 150.166.200.0/24, metric 12, distance 0 Origin 150.166.237.0/24, metric 12, distance 0 Origin 150.203.5.0/24, metric 8, distance 0
DB-1052
December 2010
The following lines show that this group is available to the DVMRP router. The mrouted process on the host will forward the source and multicast information for this group through the DVMRP cloud to other members.
DVMRP: Advertise group 224.2.224.2 on Ethernet0
The metric is the number of hops the route has covered, and the distance is the administrative distance.
DB-1053
debug ip eigrp
To display information on Enhanced Interior Gateway Routing Protocol (EIGRP) protocol packets, use the debug ip eigrp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip eigrp no debug ip eigrp
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command helps you analyze the packets that are sent and received on an interface. Because the debug ip eigrp command generates a substantial amount of output, only use it when traffic on the network is light.
Examples
Description Indicates that this is an IP EIGRP message. Indicates that the following address is an external destination rather than an internal destination, which would be labeled as Int.
DB-1054
December 2010
Table 131
Field M
Description Displays the computed metric, which includes the value in the SM field and the cost between this router and the neighbor. The first number is the composite metric. The next two numbers are the inverse bandwidth and the delay, respectively. Displays the metric as reported by the neighbor.
SM
DB-1055
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 15.0(1)M.
Usage Guidelines
The output of the debug ip eigrp notifications command displays EIGRP events and notifications.
Examples
The following example output shows that the NSF-aware router has received the restart notification. The NSF-aware router will now wait for end of transmission (EOT) to be sent from the restarting neighbor (NSF-capable).
Router# debug ip eigrp notifications *Oct 4 11:39:18.092:EIGRP:NSF:AS2. Rec RS update from 135.100.10.1, 00:00:00. Wait for EOT. *Oct 4 11:39:18.092:%DUAL-5-NBRCHANGE:IP-EIGRP(0) 2:Neighbor 135.100.10.1 (POS3/0) is up:peer NSF restarted
DB-1056
December 2010
debug ip error
To display IP errors, use the debug ip error command in privileged EXEC mode. To disable debugging errors, use the no form of this command. debug ip error access-list-number [detail] [dump] no debug ip error
Syntax Description
access-list-number
(Optional) The IP access list number that you can specify. If the datagram is not permitted by that access list, the related debugging output (or IP error) is suppressed. Standard, extended, and expanded access lists are supported. The range of standard and extended access lists is from 1 to 199. The range of expanded access lists is from 1300 to 2699. (Optional) Displays detailed IP error debugging information. (Hidden) Displays IP error debugging information along with raw packet data in hexadecimal and ASCII forms. This keyword can be enabled with individual access lists and also with the detail keyword.
Note
detail dump
The dump keyword is not fully supported and should be used only in collaboration with Cisco Technical Support. See the caution notes below, in the usage guidelines, for more specific information.
Defaults
Command Modes
Privileged EXEC
Usage Guidelines
This command is used for IP error debugging. The output displays IP errors which are locally detected by this router.
Caution
Enabling this command will generate output only if IP errors occur. However, if the router starts to receive many packets that contain errors, substantial output may be generated and severely affect system performance. This command should be used with caution in production networks. It should only be enabled when traffic on the IP network is low, so other activity on the system is not adversely affected. Enabling the detail and dump keywords use the highest level of system resources of the available configuration options for this command, so a high level of caution should be applied when enabling either of these keywords.
DB-1057
Caution
The dump keyword is not fully supported and should be used only in collaboration with Cisco Technical Support. Because of the risk of using significant CPU utilization, the dump keyword is hidden from the user and cannot be seen using the ? prompt. The length of the displayed packet information may exceed the actual packet length and include additional padding bytes that do not belong to the IP packet. Also note that the beginning of a packet may start at different locations in the dump output depending on the specific router, interface type, and packet header processing that may have occurred before the output is displayed.
Examples
The IP error in the above output was caused when the router attempted to forward a packet with a time-to-live (TTL) value of 0. The ip.hopcount traffic counter is incremented when a packet is dropped because of an error. This error is also displayed in the output of the show ip traffic command by the bad hop count traffic counter. Table 132 describes the significant fields shown in the display.
Table 132 debug ip error Field Descriptions
Description The packet source IP address and interface. The packet destination IP address and prefix length. This traffic counter increments when an IP packet is dropped because of an error.
The following is sample output from the debug ip error command enabled with the detail keyword:
Router# debug ip error detail IP packet errors debugging is on (detailed) 1d08h:IP:s=10.0.19.100 (Ethernet0/1), d=10.1.1.1, len 28, dispose udp.noport 1d08h: UDP src=41921, dst=33434 1d08h:IP:s=10.0.19.100 (Ethernet0/1), d=10.2.2.2, len 28, dispose ip.hopcount 1d08h: UDP src=33691, dst=33434
The detailed output includes layer 4 information in addition to the standard output. The IP error in the above output was caused when the router received a UDP packet when no application was listening to the UDP port. The udp.noport traffic counter is incremented when the router drops a UDP packet because of this error. This error is also displayed in the output of the show ip traffic command by the no port traffic counter under UDP statistics. Table 133 describes the significant fields shown in the display.
DB-1058
December 2010
Table 133
Description The IP packet source IP address and interface. The IP packet destination and prefix length. The traffic counter that is incremented when a UDP packet is dropped because of this error.
The following is sample output from the debug ip error command enabled with the detail and dump keywords:
Router# debug ip error detail dump IP packet errors debugging is on (detailed) (dump) 1d08h:IP:s=10.0.19.100 (Ethernet0/1), d=10.1.1.1, len 28, dispose udp.noport 1d08h: UDP src=37936, dst=33434 03D72360: 0001 42AD4242 ..B-BB 03D72370:0002FCA5 DC390800 4500001C 30130000 ..|%\9..E...0... 03D72380:01116159 0A001364 0A010101 9430829A ..aY...d.....0.. 03D72390:0008C0AD ..@1d08h:IP:s=10.0.19.100 (Ethernet0/1), d=10.2.2.2, len 28, dispose ip.hopcount 1d08h: UDP src=41352, dst=33434 03C01600: 0001 42AD4242 ..B-BB 03C01610:0002FCA5 DC390800 4500001C 302A0000 ..|%\9..E...0*.. 03C01620:01116040 0A001364 0A020202 A188829A ..`@...d....!... 03C01630:0008B253 ..2S
Note
The dump keyword is not fully supported and should be used only in collaboration with Cisco Technical Support. See the caution in the usage guidelines section of this command reference page for more specific information. The output from the debug ip error command, when the dump keyword is enabled, provides raw packet data in hexadecimal and ASCII forms. This addtional output is displayed in addition to the standard output. The dump keyword can be used with all of the available configuration options of this command. Table 134 describes the significant fields shown in the display.
Table 134 debug ip error detail dump Field Descriptions
Description The IP packet source IP address and interface. The IP packet destination and prefix length. The traffic counter that is incremented when a UDP packet is dropped because of this error.
Related Commands
DB-1059
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. Debugging output for NetFlow v9 data export was added. Debugging output for NetFlow for IPv6 was added. This command was integrated into Cisco IOS Release 12.2(30)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip flow export command:
Router# debug ip flow cache IP Flow cache allocation debugging is on Router# show ipv6 flow IP packet size distribution (0 total packets): 1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 512 544 576 1024 1536 2048 2560 3072 3584 4096 4608 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 IP Flow Switching Cache, 0 bytes 0 active, 0 inactive, 0 added 0 ager polls, 0 flow alloc failures Active flows timeout in 30 minutes
DB-1060
December 2010
Inactive flows timeout in 15 seconds SrcAddress InpIf DstAddress OutIf Prot SrcPrt DstPrt Packets c7200-vxr-2# 000037: 01:56:26: IPFLOW: Allocating Sub-Flow cache, without hash flags. 000038: 01:56:26: IPFLOW: Sub-Flow table enabled. 000039: 01:56:26: IPFLOW: Sub-Flow numbers are: 24 sub-flows per chunk, 0 hashflag len, 1 chunks allocated, 12 max chunks, 24 allocated records, 24 free records, 960 bytes allocated 000040: 01:56:26: IPFLOW: Sub-Flow cache removed
Related Commands
Command export destination ip flow-aggregation cache ip flow-export ipv6 flow-aggregation cache ipv6 flow export show ip cache flow aggregation show ip flow export
Description Enables the exporting of information from NetFlow aggregation caches. Enables NetFlow aggregation cache schemes. Enables the exporting of information in NetFlow cache entries. Enables NetFlow aggregation cache schemes for IPv6 configurations. Enables the exporting of information in NetFlow cache entries for IPv6 NetFlow configurations. Displays the NetFlow aggregation cache configuration. Display the statistics for NetFlow data export.
DB-1061
Syntax Description
Command Default
Command Modes
Command History
Release 12.0(1) 12.3(1) 12.3(7)T 12.2(18)S 12.2(30)S 12.2(28)SB 12.2(18)SXF 12.2(33)SRA 12.2(33)SXH 12.2SX
Modification This command was introduced. Debugging output for NetFlow v9 data export was added. This command was modified so that NetFlow v9 data is collected for both IPv4 and IPv6. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.2(30)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(18)SXF. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip flow export command:
Router# debug ip flow export IP Flow export mechanism debugging is on *Mar 6 22:56:21.627:IPFLOW:Sending export pak to 2001::FFFE/64 port 9999 *Mar 6 22:56:21.627:IPFLOW:Error sending export packet:Adjacency failure
DB-1062
December 2010
Related Commands
Command export destination ipv6 flow-aggregation cache ipv6 flow-export show ip flow export show ipv6 flow export
Description Enables the exporting of information from NetFlow aggregation caches. Enables NetFlow aggregation cache schemes for IPv6. Enables the exporting of information in NetFlow cache entries. Displays the statistics for NetFlow data export. Displays the statistics for NetFlow data export for IPv6.
show ip cache flow aggregation Displays the NetFlow accounting aggregation cache statistics.
DB-1063
debug ip ftp
To activate the debugging option to track the transactions submitted during an FTP session, use the debug ip ftp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip ftp no debug ip ftp
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug ip ftp command is useful for debugging problems associated with FTP.
Examples
DB-1064
December 2010
DB-1065
Syntax Description
Defaults
Disabled
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command was integrated into Cisco IOS Release 12.2(33)SRC. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SB
Usage Guidelines
Use this command to enable debugging messages for all HTTP processes and activity. Issuing this command is equivalent to issuing the following commands:
debug ip http authentication debug ip http ezsetup debug ip http ssi debug ip http token debug ip http transaction debug ip http url
DB-1066
December 2010
Examples
For sample output and field descriptions of this command, see the documentation of the commands listed in the Usage Guidelines section.
Related Commands
Command debug ip http authentication debug ip http ezsetup debug ip http ssi debug ip http token debug ip http transaction debug ip http url
Description Enables debugging output for all processes for HTTP server and client access. Displays the configuration changes that occur during the EZ Setup process. Displays SSI translations and SSI ECHO command execution. Displays individual tokens parsed by the HTTP server. Displays HTTP server transaction processing. Displays the URLs accessed from the router.
DB-1067
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to display the authentication method the router attempted and authentication-specific status messages.
Examples
The following is sample output from the debug ip http authentication command:
Router# debug ip http authentication Authentication for url / / level 15 privless / Authentication username = local15 priv-level = 15 auth-type = local
Description Provides information about the URL in different forms. Identifies the user. Indicates the user privilege level. Indicates the authentication method.
DB-1068
December 2010
Related Commands
Command debug ip http all debug ip http ezsetup debug ip http ssi debug ip http token debug ip http transaction debug ip http url
Description Displays authentication processes for all HTTP server processes on the system. Displays the configuration changes that occur during the EZ Setup process. Displays SSI translations and SSI ECHO command execution. Displays individual tokens parsed by the HTTP server. Displays HTTP server transaction processing. Displays the URLs accessed from the router.
DB-1069
Syntax Description
Enables debugging for all HTTP client elements. Enables debugging output for the HTTP client application interface (API). Enables debugging output for the HTTP client cache. Enables debugging output for HTTP communication errors. Enables debugging output specific to the Voice XML (VXML) applications interacting with the HTTP client. Enables debugging output of HTTP client messages. Enables debugging output specific to the HTTP client socket.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command was integrated into Cisco IOS Release 12.2(33)SRC. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SB
Usage Guidelines
Use this command to display transactional information for the HTTP client for debugging purposes.
Examples
The following example shows sample debugging output for a failed copy transfer operation when the host name resolution fails:
Router# debug ip http client all 2w4d: Cache ager called Router# copy http://www.example.com/index.html flash:index.html Destination filename [index.html]? Erase flash: before copying? [confirm] no Translating "www.example.com"
DB-1070
December 2010
% Bad IP address for host www.example.com %Error opening http://www.example.com/index.html (I/O error) Router# 2w4d: http_client_request: 2w4d: httpc_setup_request: 2w4d: http_client_process_request: 2w4d: HTTPC: Host name resolution failed for www.example.com 2w4d: http_transaction_free: 2w4d: http_transaction_free: freed httpc_transaction_t
The following example shows sample debugging output for a failed copy transfer operation when the source file is not available:
Router# copy http://example.com/hi/file.html flash:/file.html Destination filename [file.html]? %Error opening http://example.com/hi/file.html (No such file or directory) Router# 2w4d: http_client_request: 2w4d: httpc_setup_request: 2w4d: http_client_process_request: 2w4d: httpc_request:Dont have the credentials Thu, 17 Jul 2003 07:05:25 GMT http://209.168.200.225/hi/file.html ok Protocol = HTTP/1.1 Content-Type = text/html; charset=iso-8859-1 Date = Thu, 17 Jul 2003 14:24:29 GMT 2w4d: http_transaction_free: 2w4d: http_transaction_free:freed httpc_transaction_t 2w4d: http_client_abort_request: 2w4d: http_client_abort_request:Bad Transaction Id Router#
Field 2w4d:
Description In the examples shown, the string 2w4d is the timestamp configured on the system. Indicates two weeks and four days since the last system reboot.
The time-stamp format is configured using the service timestamps debug global configuration mode command.
HTTPC: or httpc
DB-1071
Table 136
Description Indicates that this HTTP client request did not supply any authentication information to the server. The authentication information consists of a username and password combination. The message is applicable to both HTTP and HTTPS.
The ok in this line indicates that there were no internal errors relating to processing this HTTP client transaction by the HTTP client. In other words, the HTTP client was able to send the request and receive some response.
Note
The ok value in this line does not indicate file availability (200: OK message or 404: File Not Found message).
Related Commands
Command copy
Description Copies a file from any supported remote location to a local file system, or from a local file system to a remote location, or from a local file system to a local file system. Configures the HTTP client connection. Configures a password for all HTTP client connections. Configures a source interface for the HTTP client. Configures a login name for all HTTP client connections. Configures the time-stamping format for debugging or system logging messages. Displays a report about HTTP client active connections.
ip http client connection ip http client password ip http client source-interface ip http client username service timestamps show ip http client connection show ip http client session-module
show ip http client history Displays the URLs accessed by the HTTP client. Displays a report about sessions that have registered with the HTTP client.
DB-1072
December 2010
Syntax Description
Command Modes
Command History
Release 12.4(20)T
Examples
The following is sample output from the debug ip http client cookie command:
Device# debug ip http client cookie ClientCookie: Receiving Set-Cookie cookie1=1 domain=172.16.0.2 path=/cwmp-1-0/testacs flags=264 expire=Mon,30-Jun-2008 05:51:27 GMT now=48686D74 ClientCookie2: Receiving Set-Cookie2 cookie1= 1 domain=172.16.0.2 path=/cwmp-1-0/ flags=256 expire=60 port=0 now=48686E1A comment= commentURL=
DB-1073
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to verify the EZ Setup actions without changing the configuration of the router. EZ Setup is a form you fill out to perform basic router configuration from most HTML browsers.
Examples
The following sample output from the debug ip http ezsetup command shows the configuration changes for the router when the EZ Setup form has been submitted:
Router# debug ip http ezsetup service timestamps debug service timestamps log service password-encryption ! hostname router-name ! enable secret router-pw line vty 0 4 password router-pw ! interface ethernet 0 ip address 172.69.52.9 255.255.255.0 no shutdown ip helper-address 172.31.2.132 ip name-server 172.31.2.132 isdn switch-type basic-5ess username Remote-name password Remote-chap interface bri 0 ip unnumbered ethernet 0
DB-1074
December 2010
encapsulation ppp no shutdown dialer map ip 192.168.254.254 speed 56 name Remote-name Remote-number isdn spid1 spid1 isdn spid2 spid2 ppp authentication chap callin dialer-group 1 ! ip classless access-list 101 deny udp any any eq snmp access-list 101 deny udp any any eq ntp access-list 101 permit ip any any dialer-list 1 list 101 ip route 0.0.0.0 0.0.0.0 192.168.254.254 ip route 192.168.254.254 255.255.255.255 bri 0 logging buffered snmp-server community public RO ip http server ip classless ip subnet-zero ! end
Related Commands
Command debug ip http all debug ip http authentication debug ip http ssi debug ip http token debug ip http transaction debug ip http url
Description Displays authentication processes for all HTTP server processes on the system. Displays authentication processes for HTTP server and client access. Displays SSI translations and SSI ECHO command execution. Displays individual tokens parsed by the HTTP server. Displays HTTP server transaction processing. Displays the URLs accessed from the router.
DB-1075
The debugging information generated by the debug ip http secure-session command The debugging information generated by the debug ip http secure-state command Debugging information for each call to the SSL driver, for use primarily by Cisco support personnel
To disable this debugging, use the no form of this command. debug ip http secure-all no debug ip http secure-all
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debugging information generated by the debug ip http secure-session command. See the debug ip http secure-session command page for example debugging output. The debugging information generated by the debug ip http secure-state command. See the debug ip http secure-state command page for example debugging output. Debugging information for each call to the SSL driver, for use primarily by Cisco support personnel
Examples
The debugging information generated by the debug ip http secure-session command The debugging information generated by the debug ip http secure-state command Debugging information for each call to the SSL driver
DB-1076
December 2010
Related Commands
Description Generates debugging information about each new secure HTTPS session when it is created. Generates debugging information each time the secure HTTPS server changes state.
DB-1077
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command generates debugging information about each new HTTPS session when it is created. When a new HTTPS session is created, debugging information is generated in the following format:
HTTPS SSL Session Established/Handshake done - Peer 10.0.0.1 state = SSL negotiation finished successfully SessionInfo: Digest=RC4-MD5 SSLVer=SSLv3 KeyEx=RSA Auth=RSA Cipher=RC4(128) Mac=MD5
The SessionInfo fields provide the following information about the session:
Digestdigest mechanism SSLVerSSL or TSL version KeyExkey exchange mechanism Authauthentication mechanism Cipherencryption algorithm MacMessage Authentication Code algorithm
Examples
The following example generates debugging information about each new HTTPS session when it is created:
DB-1078
December 2010
Related Commands
Description Enables all other debugging ip http secure-x commands and generates debugging information for each call to the HTTPS server driver. Generates debugging information each time the HTTPS server changes state.
DB-1079
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command generates debugging information each time the Secure HTTP (HTTPS) feature changes state. When the Secure HTTP (HTTPS) feature changes state, debugging information is generated in the following format:
HTTPS SSL State Change - Peer 10.0.0.1 Old State = SSLv3 read finished A, New State = SSL negotiation finished successfully
Examples
The following example generates debugging information each time the Secure HTTP (HTTPS) feature changes state:
debug ip http secure-state
Related Commands
Description Enables all other debugging ip http secure-x commands and generates debugging information for each call to the HTTPS server driver. Generates debugging information each time the HTTPS server changes state.
DB-1080
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip http ssi command:
Router# debug ip http ssi HTML: HTML: HTML: HTML: filtered command exec cmd="show users" SSI command exec SSI tag cmd = "show users" Executing CLI show users in mode exec done
The following line shows the contents of the SSI EXEC command:
HTML: filtered command exec cmd="show users"
The following line indicates the type of SSI command that was requested:
HTML: SSI command exec
The following line shows the show users argument assigned to the tag command:
HTML: SSI tag cmd = "show users"
The following line indicates that the show users command is being executed in EXEC mode:
HTML: Executing CLI show users in mode exec done
DB-1081
Related Commands
Command debug ip http all debug ip http authentication debug ip http ezsetup debug ip http token debug ip http transaction debug ip http url
Description Displays authentication processes for all HTTP server processes on the system. Displays authentication processes for HTTP server and client access. Displays the configuration changes that occur during the EZ Setup process. Displays individual tokens parsed by the HTTP server. Displays HTTP server transaction processing. Displays the URLs accessed from the router.
DB-1082
December 2010
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SB
Usage Guidelines
This command displays output for debugging purposes related to the HTTPS server and HTTPS client. HTTPS services use the Secure Socket Layer (SSL) protocol, version 3.0, for encryption.
Examples
The following is sample debugging output from the debug ip http ssl error command:
Router# Router# Router# Router# Router# 000030:00:08:01:%HTTPS:Key pair generation failed 000030:00:08:10:%HTTPS:Failed to generate self-signed cert 000030:00:08:15:%HTTPS:SSL handshake fail 000030:00:08:21:%HTTPS:SSL read fail, uninitialized hndshk ctxt 000030:00:08:25:%HTTPS:SSL write fail, uninitialized hndshk ctxt
DB-1083
Field
%HTTPS:Key pair generation failed %HTTPS:Failed to generate self-signed cert %HTTPS:SSL handshake fail %HTTPS:SSL read fail, uninitialized hndshk ctxt
Description The RSA key pair generation failed. The HTTPS server or client failed to generate a self-signed certificate. SSL connection handshake failed. A read operation failed for SSL with an unitialized handshake context
Related Commands
DB-1084
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ip http token command to display low-level HTTP server parsings. To display high-level HTTP server parsings, use the debug ip http transaction command.
Examples
The following is part of sample output from the debug ip http token command. In this example, the browser accessed the routers home page http://router-name/. The output gives the token parsed by the HTTP server and its length.
Router# debug ip http token HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: token token token token token token token token token token token token token token token token token token token len len len len len len len len len len len len len len len len len len len 3: 1: 1: 1: 4: 1: 1: 1: 1: 2: 7: 1: 1: 4: 1: 1: 1: 3: 1: 'GET' ' ' '/' ' ' 'HTTP' '/' '1' '.' '0' '\15\12' 'Referer' ':' ' ' 'http' ':' '/' '/' 'www' '.'
DB-1085
HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: . . .
token token token token token token token token token token token token token token token token token token token token token
len len len len len len len len len len len len len len len len len len len len len
3: 'thesite' 1: '.' 3: 'com' 1: '/' 2: '\15\12' 10: 'Connection' 1: ':' 1: ' ' 4: 'Keep' 1: '-' 5: 'Alive' 2: '\15\12' 4: 'User' 1: '-' 5: 'Agent' 1: ':' 1: ' ' 7: 'Mozilla' 1: '/' 1: '2' 1: '.'
Related Commands
Command debug ip http all debug ip http authentication debug ip http ezsetup debug ip http ssi debug ip http transaction debug ip http url
Description Displays authentication processes for all HTTP server processes on the system. Displays authentication processes for HTTP server and client access. Displays the configuration changes that occur during the EZ Setup process. Displays SSI translations and SSI ECHO command execution. Displays HTTP server transaction processing. Displays the URLs accessed from the router.
DB-1086
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ip http transaction command to display what the HTTP server is parsing at a high level. To display what the HTTP server is parsing at a low level, use the debug ip http token command.
Examples
The following is sample output from the debug ip http transaction command. In this example, the browser accessed the routers home page http://router-name/.
Router# debug ip http transaction HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: HTTP: parsed uri '/' client version 1.1 parsed extension Referer parsed line http://www.company.com/ parsed extension Connection parsed line Keep-Alive parsed extension User-Agent parsed line Mozilla/2.01 (X11; I; FreeBSD 2.1.0-RELEASE i386) parsed extension Host parsed line router-name parsed extension Accept parsed line image/gif, image/x-xbitmap, image/jpeg, image/ parsed extension Authorization parsed authorization type Basic received GET ''
DB-1087
Table 138
Field HTTP: parsed uri '/' HTTP: client version 1.1 HTTP: parsed extension Referer HTTP: parsed line http://www.company.com/ HTTP: received GET ''
Description Uniform resource identifier that is requested. Client HTTP version. HTTP extension. Value of HTTP extension. HTTP request method.
Related Commands
Command debug ip http all debug ip http authentication debug ip http ezsetup debug ip http token debug ip http ssi debug ip http url
Description Displays authentication processes for all HTTP server processes on the system. Displays authentication processes for HTTP server and client access. Displays the configuration changes that occur during the EZ Setup process. Displays individual tokens parsed by the HTTP server. Displays SSI translations and SSI ECHO command execution. Displays the URLs accessed from the router.
DB-1088
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ip http url command to keep track of the URLs that are accessed and to determine from which hosts the URLs are accessed.
Examples
The following is sample output from the debug ip http url command. In this example, the HTTP server accessed the URLs and /exec. The output shows the URL being requested and the IP address of the host requesting the URL.
Router# debug ip http url HTTP: processing URL '/' from host 172.31.2.141 HTTP: processing URL '/exec' from host 172.31.2.141
Related Commands
Command debug ip http all debug ip http authentication debug ip http ezsetup debug ip http ssi
Description Displays authentication processes for all HTTP server processes on the system. Displays authentication processes for HTTP server and client access. Displays the configuration changes that occur during the EZ Setup process. Displays SSI translations and SSI ECHO command execution.
DB-1089
Description Displays individual tokens parsed by the HTTP server. Displays HTTP server transaction processing.
DB-1090
December 2010
debug ip icmp
To display information on Internal Control Message Protocol (ICMP) transactions, use the debug ip icmp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip icmp no debug ip icmp
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command helps you determine whether the router is sending or receiving ICMP messages. Use it, for example, when you are troubleshooting an end-to-end connection problem.
Note
For more information about the fields in debug ip icmp command output, refer to RFC 792, Internet Control Message Protocol; Appendix I of RFC 950, Internet Standard Subnetting Procedure; and RFC 1256, ICMP Router Discovery Messages.
Examples
DB-1091
Table 139
Description Indication that this message describes an ICMP packet. The type field can be one of the following:
0Echo Reply 3Destination Unreachable 4Source Quench 5Redirect 8Echo 9Router Discovery Protocol Advertisement 10Router Discovery Protocol Solicitations 11Time Exceeded 12Parameter Problem 13Timestamp 14Timestamp Reply 15Information Request 16Information Reply 17Mask Request 18Mask Reply
DB-1092
December 2010
Table 139
Field code 1
Description This field is a code. The meaning of the code depends upon the type field value, as follows:
Echo and Echo ReplyThe code field is always zero. Destination UnreachableThe code field can have the following values: 0Network unreachable 1Host unreachable 2Protocol unreachable 3Port unreachable 4Fragmentation needed and DF bit set 5Source route failed Source QuenchThe code field is always 0. RedirectThe code field can have the following values: 0Redirect datagrams for the network 1Redirect datagrams for the host 2Redirect datagrams for the command mode of service and network 3Redirect datagrams for the command mode of service and host Router Discovery Protocol Advertisements and SolicitationsThe code field is always zero. Time ExceededThe code field can have the following values: 0Time to live exceeded in transit 1Fragment reassembly time exceeded Parameter ProblemThe code field can have the following values: 0General problem 1Option is missing 2Option missing, no room to add Timestamp and Timestamp ReplyThe code field is always zero. Information Request and Information ReplyThe code field is always zero. Mask Request and Mask ReplyThe code field is always zero.
from 10.95.192.4
Table 140 describes the significant fields shown in the second line of the display.
DB-1093
Table 140
Description Indicates that this message describes an ICMP packet. Address of the sender of the echo. Address of the receiving router. Indicates that the router received an echo reply.
Other messages that the debug ip icmp command can generate follow. When an IP router or host sends out an ICMP mask request, the following message is generated when the router sends a mask reply:
ICMP: sending mask reply (255.255.255.0) to 172.69.80.23 via Ethernet0
The following two lines are examples of the two forms of this message. The first form is generated when a mask reply comes in after the router sends out a mask request. The second form occurs when the router receives a mask reply with a nonmatching sequence and ID. Refer to Appendix I of RFC 950, Internet Standard Subnetting Procedures, for details.
ICMP: mask reply 255.255.255.0 from 172.69.80.31 ICMP: unexpected mask reply 255.255.255.0 from 172.69.80.32
The following output indicates that the router sent a redirect packet to the host at address 172.69.80.31, instructing that host to use the gateway at address 172.69.80.23 in order to reach the host at destination address 172.69.1.111:
ICMP: redirect sent to 172.69.80.31 for dest 172.69.1.111 use gw 172.69.80.23
The following message indicates that the router received a redirect packet from the host at address 172.69.80.23, instructing the router to use the gateway at address 172.69.80.28 in order to reach the host at destination address 172.69.81.34:
ICMP: redirect rcvd from 172.69.80.23 -- for 172.69.81.34 use gw 172.69.80.28
The following message is displayed when the router sends an ICMP packet to the source address (172.69.94.31 in this case), indicating that the destination address (172.69.13.33 in this case) is unreachable:
ICMP: dst (172.69.13.33) host unreachable sent to 172.69.94.31
The following message is displayed when the router receives an ICMP packet from an intermediate address (172.69.98.32 in this case), indicating that the destination address (172.69.13.33 in this case) is unreachable:
ICMP: dst (172.69.13.33) host unreachable rcv from 172.69.98.32
Depending on the code received (as Table 123 describes), any of the unreachable messages can have any of the following strings instead of the host string in the message:
net protocol port frag. needed and DF set source route failed prohibited
DB-1094
December 2010
The following message is displayed when the TTL in the IP header reaches zero and a time exceed ICMP message is sent. The fields are self-explanatory.
ICMP: time exceeded (time to live) send to 10.95.1.4 (dest was 172.69.1.111)
The following message is generated when parameters in the IP header are corrupted in some way and the parameter problem ICMP message is sent. The fields are self-explanatory.
ICMP: parameter problem sent to 128.121.1.50 (dest was 172.69.1.111)
Based on the preceding information, the remaining output can be easily understood:
ICMP: ICMP: ICMP: ICMP: ICMP: ICMP: ICMP: parameter problem rcvd 172.69.80.32 source quench rcvd 172.69.80.32 source quench sent to 128.121.1.50 (dest was 172.69.1.111) sending time stamp reply to 172.69.80.45 sending info reply to 172.69.80.12 rdp advert rcvd type 9, code 0, from 172.69.80.23 rdp solicit rcvd type 10, code 0, from 172.69.80.43
DB-1095
debug ip igmp
To display Internet Group Management Protocol (IGMP) packets received and sent, and IGMP-host related events, use the debug ip igmp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip igmp [vrf vrf-name] [group-address] no debug ip igmp [vrf vrf-name] [group-address]
Syntax Description
(Optional) Supports the multicast Virtual Private Network (VPN) routing and forwarding (VRF) instance. (Optional) Name assigned to the VRF. (Optional) Address of a particular group about which to display IGMP information.
Command Modes
Privileged EXEC
Command History
Release 10.2 12.1(3)T 12.0(23)S 12.2(13)T 12.2(14)S 12.3(2)T 12.2(18)SXD3 12.2(27)SBC 12.2SX
Modification This command was introduced. Fields were added to the output of this command to support the Source Specific Multicast (SSM) feature. The vrf keyword and vrf-name argument were added. The vrf keyword and vrf-name argument were added. This command was integrated into Cisco IOS Release 12.2(14)S. Fields were added to the output of this command to support the SSM Mapping feature. The group-address attribute was added. This command was integrated into Cisco IOS Release 12.2(18)SXD3. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command helps discover whether the IGMP processes are functioning. In general, if IGMP is not working, the router process never discovers that another host is on the network that is configured to receive multicast packets. In dense mode, this situation will result in packets being delivered intermittently (a few every 3 minutes). In sparse mode, packets will never be delivered. Use this command in conjunction with the debug ip pim and debug ip mrouting commands to observe additional multicast activity and to learn the status of the multicast routing process, or why packets are forwarded out of particular interfaces.
DB-1096
December 2010
When SSM mapping is enabled, a debug message is displayed to indicate that the router is converting an IGMP version 2 report from the group (G) into an IGMP version 3 join. After SSM mapping has generated the appropriate IGMP version 3 report, any debug output that follows is seen as if the router had received the same IGMP version 3 report directly.
Examples
The messages displayed by the debug ip igmp command show query and report activity received from other routers and multicast group addresses. The following is sample output from the debug ip igmp command when SSM is enabled. Because IGMP version 3 lite (IGMPv3lite) requires the host to send IGMP version 2 (IGMPv2) packets, IGMPv2 host reports also will be displayed in response to the router IGMPv2 queries. If SSM is disabled, the word ignored will be displayed in the debug ip igmp command output.
IGMP:Received v3-lite Report from 10.0.119.142 (Ethernet3/3), group count 1 IGMP:Received v3 Group Record from 10.0.119.142 (Ethernet3/3) for 232.10.10.10 IGMP:Update source 224.1.1.1 IGMP:Send v2 Query on Ethernet3/3 to 224.0.0.1 IGMP:Received v2 Report from 10.0.119.142 (Ethernet3/3) for 232.10.10.10 IGMP:Update source 224.1.1.1
The following is sample output from the debug ip igmp command when SSM static mapping is enabled. The following output indicates that the router is converting an IGMP version 2 join for group (G) into an IGMP version 3 join:
IGMP(0): Convert IGMPv2 report (*,232.1.2.3) to IGMPv3 with 2 source(s) using STATIC.
The following is sample output from the debug ip igmp command when SSM DNS-based mapping is enabled. The following output indicates that a DNS lookup has succeeded:
IGMP(0): Convert IGMPv2 report (*,232.1.2.3) to IGMPv3 with 2 source(s) using DNS.
The following is sample output from the debug ip igmp command when SSM DNS-based mapping is enabled and a DNS lookup has failed:
IGMP(0): DNS source lookup failed for (*, 232.1.2.3), IGMPv2 report failed
Related Commands
Description Displays MRM control packet activity. Displays changes to the mroute table. Displays PIM packets received and sent and PIM-related events.
DB-1097
Syntax Description
Displays debugging messages related to multicast groups. Displays debugging messages related to IGMP management services. Displays debugging messages related to the local router. Displays debugging messages related to the IGMP timer.
Defaults
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.3(4)T on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Examples
The following example shows debugging messages for the IGMP snooping services being displayed:
Router# debug ip igmp snooping IGMP snooping enabled
Related Commands
DB-1098
December 2010
Syntax Description
ip-address
Command Modes
Privileged EXEC
Usage Guidelines
If the IP address of an IGRP neighbor is specified, the resulting debug ip igrp events output includes messages describing updates from that neighbor and updates that the router broadcasts toward that neighbor. Messages are not generated for each route. This command is particularly useful when there are many networks in your routing table. In this case, using debug ip igrp transactions could flood the console and make the router unusable. Use debug ip igrp events instead to display summary routing information.
Examples
The following is sample output from the debug ip igrp events command:
router# debug ip igrp events
Updates sent to these two destination addresses Updates received from these source addresses
IGRP: IGRP: IGRP: IGRP: IGRP: IGRP: IGRP: IGRP: IGRP: IGRP: IGRP: IGRP:
sending update to 255.255.255.255 via Ethernet1 (160.89.33.8) Update contains 26 interior, 40 system, and 3 exterior routes. Total routes in update: 69 sending update to 255.255.255.255 via Ethernet0 (160.89.32.8) Update contains 1 interior, 0 system, and 0 exterior routes. Total routes in update: 1 received update from 160.89.32.24 on Ethernet0 Update contains 17 interior, 1 system, and 0 exterior routes. Total routes in update: 18 received update from 160.89.32.7 on Ethernet0 Update contains 5 interior, 1 system, and 0 exterior routes. Total routes in update: 6
DB-1099
S2548
This shows that the router has sent two updates to the broadcast address 255.255.255.255. The router also received two updates. Three lines of output describe each of these updates. The first line indicates whether the router sent or received the update packet, the source or destination address, and the interface through which the update was sent or received. If the update was sent, the IP address assigned to this interface is shown (in parentheses).
IGRP: sending update to 255.255.255.255 via Ethernet1 (160.89.33.8)
The second line summarizes the number and types of routes described in the update:
IGRP: Update contains 26 interior, 40 system, and 3 exterior routes.
The third line indicates the total number of routes described in the update:
IGRP: Total routes in update: 69
DB-1100
December 2010
Syntax Description
ip-address
Command Modes
Privileged EXEC
Usage Guidelines
If the IP address of an IGRP neighbor is specified, the resulting debug ip igrp transactions output includes messages describing updates from that neighbor and updates that the router broadcasts toward that neighbor. When many networks are in your routing table, the debug ip igrp transactions command can flood the console and make the router unusable. In this case, use the debug ip igrp events command instead to display summary routing information.
Examples
The following is sample output from the debug ip igrp transactions command:
Router# debug ip igrp transactions
DB-1101
240853
IGRP: received update from 160.89.80.240 on Ethernet subnet 160.89.66.0, metric 1300 (neighbor 1200) subnet 160.89.56.0, metric 8676 (neighbor 8576) subnet 160.89.48.0, metric 1200 (neighbor 1100) subnet 160.89.50.0, metric 1300 (neighbor 1200) subnet 160.89.40.0, metric 8676 (neighbor 8576) network 192.82.152.0, metric 158550 (neighbor 158450) network 192.68.151.0, metric 1115511 (neighbor 1115411) network 150.136.0.0, metric 16777215 (inaccessible) exterior network 129.140.0.0, metric 9676 (neighbor 9576) exterior network 140.222.0.0, metric 9676 (neighbor 9576) IGRP: received update from 160.89.80.28 on Ethernet subnet 160.89.95.0, metric 180671 (neighbor 180571) subnet 160.89.81.0, metric 1200 (neighbor 1100) subnet 160.89.15.0, metric 16777215 (inaccessible) IGRP: sending update to 255.255.255.255 via Ethernet0 (160.89.64.31) subnet 160.89.94.0, metric=847 IGRP: sending update to 255.255.255.255 via Serial1 (160.89.94.31) subnet 160.89.80.0, metric=16777215 subnet 160.89.64.0, metric=1100
The output shows that the router being debugged has received updates from two other routers on the network. The router at source address 160.89.80.240 sent information about ten destinations in the update; the router at source address 160.89.80.28 sent information about three destinations in its update. The router being debugged also sent updatesin both cases to the broadcast address 255.255.255.255 as the destination address. On the second line the first field refers to the type of destination information: subnet (interior), network (system), or exterior (exterior). The second field is the Internet address of the destination network. The third field is the metric stored in the routing table and the metric advertised by the neighbor sending the information. Metric... inaccessible usually means that the neighbor router has put the destination in a hold down state. The entries show that the router is sending updates that are similar, except that the numbers in parentheses are the source addresses used in the IP header. A metric of 16777215 is inaccessible. Other examples of output that the debug ip igrp transactions command can produce follow. The following entry indicates that the routing table was updated and shows the new edition number (97 in this case) to be used in the next IGRP update:
IGRP: edition is now 97
Entries such as the following occur on startup or when some event occurs such as an interface making a transition or a user manually clearing the routing table:
IGRP: broadcasting request on Ethernet0 IGRP: broadcasting request on Ethernet1
The following type of entry can result when routing updates become corrupted between sending and receiving routers:
IGRP: bad checksum from 172.69.64.43
An entry such as the following should never appear. If it does, the receiving router has a bug in the software or a problem with the hardware. In either case, contact your technical support representative.
IGRP: system 45 from 172.69.64.234, should be system 109
DB-1102
December 2010
debug ip inspect
Note
Effective with Cisco IOS Release 12.4(20)T, the debug ip inspect command is replaced by the debug policy-firewall command. See the debug policy-firewall command for more information. To display messages about Cisco IOS Firewall events, use the debug ip inspect command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip inspect {function-trace | object-creation | object-deletion | events | timers | protocol | detailed | update}
Firewall MIB Statistics Syntax
debug ip inspect mib {object-creation | object-deletion | events | retrieval | update} no debug ip inspect
Syntax Description
(Optional) Displays messages about MIB functionality. Displays messages about software functions called by the Cisco IOS Firewall. Displays messages about software objects being created by the Cisco IOS Firewall. Object creation corresponds to the beginning of Cisco IOS Firewall-inspected sessions. Displays messages about software objects being deleted by the Cisco IOS Firewall. Object deletion corresponds to the closing of Cisco IOS Firewall-inspected sessions. Displays messages about Cisco IOS Firewall software events, including information about Cisco IOS Firewall packet processing or MIB special events. Displays messages about Cisco IOS Firewall timer events such as when the Cisco IOS Firewall idle timeout is reached. Displays messages about Cisco IOS Firewall-inspected protocol events, including details about the packets of the protocol. Table 141 provides a list of protocol keywords. Displays detailed information to be displayed for all the other enabled Cisco IOS Firewall debugging. Use this form of the command in conjunction with other Cisco IOS Firewall debug commands. Displays messages of statistics requested via Simple Network Management Protocol (SNMP) or command-line interface (CLI). Displays messages about Cisco IOS Firewall software updates or updates to MIB counters.
object-deletion
events
timers protocol
detailed
retrieval update
DB-1103
Table 141
Application Protocol
Transport-layer protocols
FTP tokens (enables tracing of the FTP tokens ftp-tokens parsed) H.323 (version 1 and version 2) HTTP IMAP Microsoft NetShow POP3 RealAudio Remote procedure call (RPC) Real Time Streaming Protocol (RTSP) Session Initiation Protocol (SIP) Simple Mail Transfer Protocol (SMTP) Skinny Client Control Protocol (SCCP) Structured Query Language*Net (SQL*Net) StreamWorks TFTP UNIX r-commands (rlogin, rexec, rsh) VDOLive h323 http imap netshow pop3 realaudio rpc rtsp sip smtp skinny sqlnet streamworks tftp rcmd vdolive
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. NetShow support was added. H.323 V2 and RTSP protocol support were added. Support for the ICMP and SIP protocols was added. This command was integrated into Cisco IOS Release 12.2(15)T. Support for the skinny protocol was added.
DB-1104
December 2010
Modification This command was introduced. Support for the IMAP and POP3 protocols was added. The MIB syntax was added. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was replaced by the debug policy-firewall command.
Examples
The following is sample output from the debug ip inspect function-trace command:
Router# debug ip inspect function-trace *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: 01:16:16: CBAC FUNC: insp_inspection CBAC FUNC: insp_pre_process_sync CBAC FUNC: insp_find_tcp_host_entry addr 40.0.0.1 bucket 41 CBAC FUNC: insp_find_pregen_session CBAC FUNC: insp_get_idbsb CBAC FUNC: insp_get_idbsb CBAC FUNC: insp_get_irc_of_idb CBAC FUNC: insp_get_idbsb CBAC FUNC: insp_create_sis CBAC FUNC: insp_inc_halfopen_sis CBAC FUNC: insp_link_session_to_hash_table CBAC FUNC: insp_inspect_pak CBAC FUNC: insp_l4_inspection CBAC FUNC: insp_process_tcp_seg CBAC FUNC: insp_listen_state CBAC FUNC: insp_ensure_return_traffic CBAC FUNC: insp_add_acl_item CBAC FUNC: insp_ensure_return_traffic CBAC FUNC: insp_add_acl_item CBAC FUNC: insp_process_syn_packet CBAC FUNC: insp_find_tcp_host_entry addr 40.0.0.1 bucket 41 CBAC FUNC: insp_create_tcp_host_entry CBAC* FUNC: insp_fast_inspection CBAC* FUNC: insp_inspect_pak CBAC* FUNC: insp_l4_inspection CBAC* FUNC: insp_process_tcp_seg CBAC* FUNC: insp_synrcvd_state CBAC* FUNC: insp_fast_inspection CBAC* FUNC: insp_inspect_pak CBAC* FUNC: insp_l4_inspection CBAC* FUNC: insp_process_tcp_seg CBAC* FUNC: insp_synrcvd_state CBAC FUNC: insp_dec_halfopen_sis CBAC FUNC: insp_remove_sis_from_host_entry CBAC FUNC: insp_find_tcp_host_entry addr 40.0.0.1 bucket 41
This output shows the functions called by the Cisco IOS Firewall as a session is inspected. Entries with an asterisk (*) after the word CBAC are entries when the fast path is used; otherwise, the process path is used. The following is sample output from the debug ip inspect object-creation and debug ip inspect object-deletion commands:
Router# debug ip inspect object-creation Router# debug ip inspect object-deletion *Mar *Mar 2 01:18:30: CBAC OBJ_CREATE: create pre-gen sis 25A3574 2 01:18:30: CBAC OBJ_CREATE: create acl wrapper 25A36FC -- acl item 25A3634
DB-1105
2 2 2 2 2 2
sis 25C1CC4 pre-gen sis 25A3574 host entry 25A3574 addr 10.0.0.1 bucket 31 sis 25C1CC4 create acl wrapper 25A36FC -- acl item 25A3634 host entry 25A3574 addr 10.0.0.1
The following is sample output from the debug ip inspect object-creation, debug ip inspect object-deletion, and debug ip inspect events commands:
Router# debug ip inspect object-creation Router# debug ip inspect object-deletion Router# debug ip inspect events *Mar 2 01:18:51: CBAC OBJ_CREATE: create pre-gen sis 25A3574 *Mar 2 01:18:51: CBAC OBJ_CREATE: create acl wrapper 25A36FC -- acl item 25A3634 *Mar 2 01:18:51: CBAC Src 10.1.0.1 Port [1:65535] *Mar 2 01:18:51: CBAC Dst 10.0.0.1 Port [46406:46406] *Mar 2 01:18:51: CBAC Pre-gen sis 25A3574 created: 10.1.0.1[1:65535] 30.0.0.1[46406:46406] *Mar 2 01:18:51: CBAC OBJ_CREATE: create sis 25C1CC4 *Mar 2 01:18:51: CBAC sis 25C1CC4 initiator_addr (10.1.0.1:20) responder_addr (30.0.0.1:46406) initiator_alt_addr (40.0.0.1:20) responder_alt_addr (10.0.0.1:46406) *Mar 2 01:18:51: CBAC OBJ_DELETE: delete pre-gen sis 25A3574 *Mar 2 01:18:51: CBAC OBJ_CREATE: create host entry 25A3574 addr 10.0.0.1 bucket 31 *Mar 2 01:18:51: CBAC OBJ_DELETE: delete sis 25C1CC4 *Mar 2 01:18:51: CBAC OBJ_DELETE: delete create acl wrapper 25A36FC -- acl item 25A3634 *Mar 2 01:18:51: CBAC OBJ_DELETE: delete host entry 25A3574 addr 10.0.0.1
The following is sample output from the debug ip inspect timers command:
Router# debug ip inspect timers *Mar 2 01:19:15: *Mar 2 01:19:15: milisecs *Mar 2 01:19:15: *Mar 2 01:19:15: *Mar 2 01:19:15: *Mar 2 01:19:15: *Mar 2 01:19:15: *Mar 2 01:19:15: CBAC Timer Init Leaf: Pre-gen sis 25A3574 CBAC Timer Start: Pre-gen sis 25A3574 Timer: 25A35D8 Time: 30000 CBAC CBAC CBAC CBAC CBAC CBAC Timer Timer Timer Timer Timer Timer Init Leaf: sis 25C1CC4 Stop: Pre-gen sis 25A3574 Timer: 25A35D8 Start: sis 25C1CC4 Timer: 25C1D5C Time: 30000 milisecs Start: sis 25C1CC4 Timer: 25C1D5C Time: 3600000 milisecs Start: sis 25C1CC4 Timer: 25C1D5C Time: 5000 milisecs Stop: sis 25C1CC4 Timer: 25C1D5C
The following is sample output from the debug ip inspect tcp command:
Router# debug ip inspect tcp *Mar 2 01:20:43: CBAC* sis 25A3604 pak 2541C58 TCP P ack 4223720032 seq 4200176225(22) (10.0.0.1:46409) => (10.1.0.1:21) *Mar 2 01:20:43: CBAC* sis 25A3604 ftp L7 inspect result: PROCESS-SWITCH packet *Mar 2 01:20:43: CBAC sis 25A3604 pak 2541C58 TCP P ack 4223720032 seq 4200176225(22) (10.0.0.1:46409) => (10.1.0.1:21) *Mar 2 01:20:43: CBAC sis 25A3604 ftp L7 inspect result: PASS packet *Mar 2 01:20:43: CBAC* sis 25A3604 pak 2544374 TCP P ack 4200176247 seq 4223720032(30) (10.0.0. 1:46409) <= (10.1.0.1:21) *Mar 2 01:20:43: CBAC* sis 25A3604 ftp L7 inspect result: PASS packet *Mar 2 01:20:43: CBAC* sis 25A3604 pak 25412F8 TCP P ack 4223720062 seq 4200176247(15) (10.0.0. 1:46409) => (10.1.0.1:21) *Mar 2 01:20:43: CBAC* sis 25A3604 ftp L7 inspect result: PASS packet *Mar 2 01:20:43: CBAC sis 25C1CC4 pak 2544734 TCP S seq 4226992037(0) (10.1.0.1:20) => (10.0.0.1:46411) *Mar 2 01:20:43: CBAC* sis 25C1CC4 pak 2541E38 TCP S ack 4226992038 seq 4203405054(0) (10.1.0.1:20) <= (10.0.0.1:46411)
DB-1106
December 2010
This sample shows TCP packets being processed and lists the corresponding acknowledge (ACK) packet numbers and sequence (SEQ) numbers. The number of data bytes in the TCP packet is shown in parenthesesfor example, (22). For each packet shown, the addresses and port numbers are shown separated by a colon. For example, (10.1.0.1:21) indicates an IP address of 10.1.0.1 and a TCP port number of 21. Entries with an asterisk (*) after the word CBAC are entries when the fast path is used; otherwise, the process path is used. The following is sample output from the debug ip inspect tcp and debug ip inspect detailed commands:
Router# debug ip inspect tcp Router# debug ip inspect detailed *Mar 2 01:20:58: CBAC* Pak 2541E38 Find session for (30.0.0.1:46409) (40.0.0.1:21) tcp *Mar 2 01:20:58: P ack 4223720160 seq 4200176262(22) *Mar 2 01:20:58: CBAC* Pak 2541E38 Addr:port pairs to match: (30.0.0.1:46409) (40.0.0.1:21) *Mar 2 01:20:58: CBAC* sis 25A3604 SIS_OPEN *Mar 2 01:20:58: CBAC* Pak 2541E38 IP: s=30.0.0.1 (Ethernet0), d=40.0.0.1 (Ethernet1), len 76,proto=6 *Mar 2 01:20:58: CBAC sis 25A3604 Saving State: SIS_OPEN/ESTAB iisn 4200176160 i_rcvnxt 4223720160 i_sndnxt 4200176262 i_rcvwnd 8760 risn 4223719771 r_rcvnxt 4200176262 r_sndnxt 4223720160 r_rcvwnd 8760 *Mar 2 01:20:58: CBAC* sis 25A3604 pak 2541E38 TCP P ack 4223720160 seq 4200176262(22) (30.0.0.1:46409) => (40.0.0.1:21) *Mar 2 01:20:58: CBAC* sis 25A3604 pak 2541E38 SIS_OPEN/ESTAB TCP seq 4200176262(22) Flags: ACK 4223720160 PSH *Mar 2 01:20:58: CBAC* sis 25A3604 pak 2541E38 --> SIS_OPEN/ESTAB iisn 4200176160 i_rcvnxt 4223720160 i_sndnxt 4200176284 i_rcvwnd 8760 risn 4223719771 r_rcvnxt 4200176262 r_sndnxt 4223720160 r_rcvwnd 8760 *Mar 2 01:20:58: CBAC* sis 25A3604 L4 inspect result: PASS packet 2541E38 (30.0.0.1:46409) (40.0.0.1:21) bytes 22 ftp *Mar 2 01:20:58: CBAC sis 25A3604 Restoring State: SIS_OPEN/ESTAB iisn 4200176160 i_rcvnxt 4223 720160 i_sndnxt 4200176262 i_rcvwnd 8760 risn 4223719771 r_rcvnxt 4200176262 r_sndnxt 4223720160 r_rcvwnd 8760 *Mar 2 01:20:58: CBAC* sis 25A3604 ftp L7 inspect result: PROCESS-SWITCH packet *Mar 2 01:20:58: CBAC* sis 25A3604 ftp L7 inspect result: PROCESS-SWITCH packet *Mar 2 01:20:58: CBAC* Bump up: inspection requires the packet in the process path(30.0.0.1) (40.0.0.1) *Mar 2 01:20:58: CBAC Pak 2541E38 Find session for (30.0.0.1:46409) (40.0.0.1:21) tcp *Mar 2 01:20:58: P ack 4223720160 seq 4200176262(22) *Mar 2 01:20:58: CBAC Pak 2541E38 Addr:port pairs to match: (30.0.0.1:46409) (40.0.0.1:21) *Mar 2 01:20:58: CBAC sis 25A3604 SIS_OPEN *Mar 2 01:20:58: CBAC Pak 2541E38 IP: s=30.0.0.1 (Ethernet0), d=40.0.0.1 (Ethernet1), len 76, proto=6
The following is sample output from the debug ip inspect icmp and debug ip inspect detailed commands:
Router# debug ip inspect icmp Router# debug ip inspect detailed 1w6d:CBAC sis 81073F0C SIS_CLOSED 1w6d:CBAC Pak 80D2E9EC IP:s=192.168.133.3 (Ethernet1), d=0.0.0.0 (Ethernet0), len 98, proto=1 1w6d:CBAC ICMP:sis 81073F0C pak 80D2E9EC SIS_CLOSED ICMP packet (192.168.133.3:0) => (0.0.0.0:0) datalen 56 1w6d:CBAC ICMP:start session from 192.168.133.3 1w6d:CBAC sis 81073F0C --> SIS_OPENING (192.168.133.3:0) (0.0.0.0:0) 1w6d:CBAC sis 81073F0C L4 inspect result:PASS packet 80D2E9EC (192.168.133.3:0) (0.0.0.0:0) bytes 56 icmp
DB-1107
1w6d:CBAC sis 81073F0C SIS_OPENING 1w6d:CBAC Pak 80E72BFC IP:s=0.0.0.0 (Ethernet0), d=192.168.133.3 (Ethernet1), len 98, proto=1 1w6d:CBAC ICMP:sis 81073F0C pak 80E72BFC SIS_OPENING ICMP packet (192.168.133.3:0) <= (0.0.0.0:0) datalen 56 1w6d:CBAC sis 81073F0C --> SIS_OPEN (192.168.133.3:0) (0.0.0.0:0) 1w6d:CBAC sis 81073F0C L4 inspect result:PASS packet 80E72BFC (0.0.0.0:0) (192.168.133.3:0) bytes 56 icmp 1w6d:CBAC* sis 81073F0C SIS_OPEN 1w6d:CBAC* Pak 80D2F2C8 IP:s=192.168.133.3 (Ethernet1), d=0.0.0.0 (Ethernet0), len 98, proto=1 1w6d:CBAC* ICMP:sis 81073F0C pak 80D2F2C8 SIS_OPEN ICMP packet (192.168.133.3:0) => (0.0.0.0:0) datalen 56 1w6d:CBAC* sis 81073F0C --> SIS_OPEN (192.168.133.3:0) (0.0.0.0:0) 1w6d:CBAC* sis 81073F0C L4 inspect result:PASS packet 80D2F2C8 (192.168.133.3:0) (0.0.0.0:0) bytes 56 icmp 1w6d:CBAC* sis 81073F0C SIS_OPEN 1w6d:CBAC* Pak 80E737CC IP:s=0.0.0.0 (Ethernet0), d=192.168.133.3 (Ethernet1), len 98, proto=1 1w6d:CBAC* ICMP:sis 81073F0C pak 80E737CC SIS_OPEN ICMP packet (192.168.133.3:0) <= (0.0.0.0:0) datalen 56 1w6d:CBAC* sis 81073F0C --> SIS_OPEN (192.168.133.3:0) (0.0.0.0:0) 1w6d:CBAC* sis 81073F0C L4 inspect result:PASS packet 80E737CC (0.0.0.0:0) (192.168.133.3:0) bytes 56 icmp 1w6d:CBAC* sis 81073F0C SIS_OPEN 1w6d:CBAC* Pak 80F554F0 IP:s=192.168.133.3 (Ethernet1), d=0.0.0.0 (Ethernet0), len 98, proto=1 1w6d:CBAC* ICMP:sis 81073F0C pak 80F554F0 SIS_OPEN ICMP packet (192.168.133.3:0) => (0.0.0.0:0) datalen 56 1w6d:CBAC* sis 81073F0C --> SIS_OPEN (192.168.133.3:0) (0.0.0.0:0) 1w6d:CBAC* sis 81073F0C L4 inspect result:PASS packet 80F554F0 (192.168.133.3:0) (0.0.0.0:0) bytes 56 icmp 1w6d:CBAC* sis 81073F0C SIS_OPEN 1w6d:CBAC* Pak 80E73AC0 IP:s=0.0.0.0 (Ethernet0), d=192.168.133.3 (Ethernet1), len 98, proto=1 1w6d:CBAC* ICMP:sis 81073F0C pak 80E73AC0 SIS_OPEN ICMP packet (192.168.133.3:0) <= (0.0.0.0:0) datalen 56 1w6d:CBAC* sis 81073F0C --> SIS_OPEN (192.168.133.3:0) (0.0.0.0:0) 1w6d:CBAC* sis 81073F0C L4 inspect result:PASS packet 80E73AC0 (0.0.0.0:0) (192.168.133.3:0) bytes 56 icmp
DB-1108
December 2010
debug ip inspect ha
To display messages about Cisco IOS stateful failover high availability (HA) events, use the debug ip inspect ha command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip inspect ha [manager | packet | update] no debug ip inspect ha [manager | packet | update]
Syntax Description
(Optional) Displays detailed messages for interaction of firewall HA manager with the box-to-box high availability infrastructure. (Optional) Used to debug the processing of the first packet postfailover on the new active device. (Optional) Used to debug the periodic update messages between the active and standby. The Firewall HA sends periodical messages to update the standby of the firewall sessions state on the active.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip inspect ha command. This example shows an add session message and a delete session message received by the the active and standby devices:
Router# debug ip inspect ha Active debugs *Apr 13 17:15:20.795: *Apr 13 17:15:36.919:
FW-HA:Send add session msg for session 2C6B820 FW-HA:Send delete session msg for session 2C6B820
Standby debugs *Apr 13 17:19:00.471: FW-HA:Received add session message (10.0.0.10:56733:0)=>(11.0.0.10:23:0) *Apr 13 17:19:12.051: FW-HA:Received delete session message (10.0.0.10:56733:0)=>(11.0.0.10:23:0)
The following is sample output from the debug ip inspect ha manager command. Using the manager keyword provides a more detailed debug analysis:
Router# debug ip inspect ha manager *Apr 13 17:23:28.995: HA Message 0:flags=0x01 len=727 FW_HA_MSG_INSERT_SESSION (1) *Apr 13 17:23:28.995: ID: grp1
DB-1109
*Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr
13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13
17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995: 17:23:28.995:
attr FW_HA_ATT_INITIATOR_ADDR (1) len 4 0A 00 00 0A attr FW_HA_ATT_RESPONDER_ADDR (2) len 4 0B 00 00 0A attr FW_HA_ATT_INITIATOR_PORT (3) len 2 BF 1C attr FW_HA_ATT_RESPONDER_PORT (4) len 2 00 17 attr FW_HA_ATT_L4_PROTOCOL (5) len 4 00 00 00 01 attr FW_HA_ATT_SRC_TABLEID (6) len 1 00 attr FW_HA_ATT_DST_TABLEID (7) len 1 00 attr FW_HA_ATT_R_RCVNXT (20) len 4 79 EA E2 9A attr FW_HA_ATT_R_SNDNXT (21) len 4 6C 7D E4 04 attr FW_HA_ATT_R_RCVWND (22) len 4 00 00 10 20 attr FW_HA_ATT_R_LAST_SEQ_TO_SND (23) len 4 00 00 00 00 attr FW_HA_ATT_I_RCVNXT (24) len 4 6C 7D E4 04 attr FW_HA_ATT_I_SNDNXT (25) len 4 79 EA E2 9A attr FW_HA_ATT_I_RCVWND (26) len 4 00 00 10 20 attr FW_HA_ATT_I_LAST_SEQ_TO_SND (27) len 4 00 00 00 00 attr FW_HA_ATT_TCP_STATE (28) len 4 00 00 00 04 attr FW_HA_ATT_INITIATOR_ALT_ADDR (8) len 4 0A 00 00 0A attr FW_HA_ATT_RESPONDER_ALT_ADDR (9) len 4 0B 00 00 0A attr FW_HA_ATT_INITIATOR_ALT_PORT (10) len 2 BF 1C attr FW_HA_ATT_RESPONDER_ALT_PORT (11) len 2 00 00 attr FW_HA_ATT_L7_PROTOCOL (12) len 4 00 00 00 05 attr FW_HA_ATT_INSP_DIR (13) len 4 00 00 00 01 attr FW_HA_ATT_I_ISN (29) len 4 79 EA E2 99 attr FW_HA_ATT_R_ISN (30) len 4 6C 7D E4 03 attr FW_HA_ATT_APPL_INSP_FLAGS (15) len 2 00 10 attr FW_HA_ATT_TERM_FLAGS (16) len 1 00 attr FW_HA_ATT_IS_LOCAL_TRAFFIC (17) len 1 00 attr FW_HA_ATT_DATA_DIR (18) len 4 00 00 00 00 attr FW_HA_ATT_SESSION_LIMITING_DONE (19) len 1 00 attr FW_HA_ATT_INSPECT_RULE (14) len 256 74 65 73 74 00 00 00 00
DB-1110
December 2010
Syntax Description
packet
Displays messages for all debug packets that are inspected by the transparent firewall.
Note
Only IP packets (TCP, User Datagram Protocol [UDP], and Internet Control Management Protocol [ICMP]) are subjected to inspection by the transparent firewall.
dhcp-passthrough
Displays debug messages only for DHCP pass-through traffic that the transparent firewall forwards across the bridge. To allow a transparent firewall to forward DHCP pass-through traffic, use the ip inspect L2-transparent dhcp-passthrough command.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip inspect L2-transparent command can be used to help verify and troubleshoot transparent firewall-related configurations, such as a Telnet connection from the client to the server with inspection configured.
Examples
The following example shows how the transparent firewall debug command works in a basic transparent firewall configuration. (Note that each debug message is preceded by an asterisk (*).)
! Enable debug commands. Router# debug ip inspect L2-transparent packet INSPECT L2 firewall debugging is on Router# debug ip inspect object-creation INSPECT Object Creations debugging is on Router# debug ip inspect object-deletion INSPECT Object Deletions debugging is on ! Start the transparent firewall configuration process Router# config terminal
DB-1111
Enter configuration commands, one per line. ! Configure bridging Router(config)# Router(config)# Router(config)# Router(config)# *Mar bridge 1 protocol ieee bridge irb bridge 1 route ip interface bvi1
Router(config-if)# ip address 209.165.200.225 255.255.255.254 ! Configure inspection Router(config)# ip inspect name test tcp ! Following debugs show the memory allocated for CBAC rules. *Mar 1 00:07:21.127:CBAC OBJ_CREATE:create irc 817F04F0 (test) *Mar 1 00:07:21.127:CBAC OBJ_CREATE:create irt 818AED20 Protocol:tcp Inactivity time:0 test Router(config)# ip inspect name test icmp Router(config)# *Mar 1 00:07:39.211:CBAC OBJ_CREATE:create irt 818AEDCC Protocol:icmp Inactivity time:0 ! Configure Bridging on ethernet0 interface Router(config)# interface ethernet0 Router(config-if)# bridge-group 1 *Mar 1 00:07:49.071:%LINK-3-UPDOWN:Interface BVI1, changed state to up *Mar 1 00:07:50.071:%LINEPROTO-5-UPDOWN:Line protocol on Interface BVI1, changed state to up ! Configure inspection on ethernet0 interface Router(config-if)# ip inspect test in Router(config-if)# *Mar 1 00:07:57.543:CBAC OBJ_CREATE:create idbsb 8189CBFC (Ethernet0) ! Incremented the number of bridging interfaces configured for inspection */ *Mar 1 00:07:57.543:L2FW:Incrementing L2FW i/f count Router(config-if)# interface ethernet1 ! Configure bridging and ACL on interface ethernet1 Router(config-if)# bridge-group 1 Router(config-if)# ip access-group 101 in *Mar 1 00:08:26.711:%LINEPROTO-5-UPDOWN:Line protocol on Interface Ethernet1, changed state to up Router(config-if)# end
Related Commands
DB-1112
December 2010
debug ip ips
To enable debugging messages for Cisco IOS Intrusion Prevention System (IPS), use the debug ip ips command in privileged EXEC mode. To disable debugging messages, use the no form of this command. debug ip ips [engine] [detailed] [service-msrpc] [service-sm] no debug ip ips [engine] [detailed]
Syntax Description
(Optional) Displays debugging messages only for a specific signature engine. (Optional) Displays detailed debugging messages for the specified signature engine or for all IPS actions. (Optional) Displays debugging messages for Microsoft RPC (Remote Procedure Call) (MSRPC) actions. (Optional) Displays debugging messages for Microsoft SMB(Server Message Block) actions.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The service-msrpc and the service-sm keywords were added to support Microsoft communication protocols MSRPC and SMB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to enable debugging messages for the Cisco IOS IPS:
Router# debug ip ips
DB-1113
Syntax Description
access-list-number
(Optional) The number of an access list in the range from 1 to 99. If an access list number is specified, debugging occurs only for the routes permitted by the access list.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip mbgp dampening command:
Router# debug ip mbgp dampening BGP: charge penalty for 173.19.0.0/16 path 49 with halflife-time 15 reuse/suppress 750/2000 BGP: flapped 1 times since 00:00:00. New penalty is 1000 BGP: charge penalty for 173.19.0.0/16 path 19 49 with halflife-time 15 reuse/suppress 750/2000 BGP: flapped 1 times since 00:00:00. New penalty is 1000
DB-1114
December 2010
Syntax Description
Defaults
Logging for multiprotocol BGP-related information in BGP update messages is not enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip mbgp updates command:
Router# debug ip mbgp updates BGP: NEXT_HOP part 1 net 200.10.200.0/24, neigh 171.69.233.49, next 171.69.233.34 BGP: 171.69.233.49 send UPDATE 200.10.200.0/24, next 171.69.233.34, metric 0, path 33 34 19 49 109 65000 297 3561 6503 BGP: NEXT_HOP part 1 net 200.10.202.0/24, neigh 171.69.233.49, next 171.69.233.34 BGP: 171.69.233.49 send UPDATE 200.10.202.0/24, next 171.69.233.34, metric 0, path 33 34 19 49 109 65000 297 1239 1800 3597 BGP: NEXT_HOP part 1 net 200.10.228.0/22, neigh 171.69.233.49, next 171.69.233.34 BGP: 171.69.233.49 rcv UPDATE about 222.2.2.0/24, next hop 171.69.233.49, path 49 109 metric 0 BGP: 171.69.233.49 rcv UPDATE about 131.103.0.0/16, next hop 171.69.233.49, path 49 109 metric 0 BGP: 171.69.233.49 rcv UPDATE about 206.205.242.0/24, next hop 171.69.233.49, path 49 109 metric 0 BGP: 171.69.233.49 rcv UPDATE about 1.0.0.0/8, next hop 171.69.233.49, path 49 19 metric 0 BGP: 171.69.233.49 rcv UPDATE about 198.1.2.0/24, next hop 171.69.233.49, path 49 19 metric 0 BGP: 171.69.233.49 rcv UPDATE about 171.69.0.0/16, next hop 171.69.233.49, path 49 metric 0 BGP: 171.69.233.49 rcv UPDATE about 172.19.0.0/16, next hop 171.69.233.49, path 49 metric 0 BGP: nettable_walker 172.19.0.0/255.255.0.0 calling revise_route BGP: revise route installing 172.19.0.0/255.255.0.0 -> 171.69.233.49
DB-1115
BGP: 171.69.233.19 computing updates, neighbor version 267099, table version 267100, starting at 0.0.0.0 BGP: NEXT_HOP part 1 net 172.19.0.0/16, neigh 171.69.233.19, next 171.69.233.49 BGP: 171.69.233.19 send UPDATE 172.19.0.0/16, next 171.69.233.49, metric 0, path 33 49 BGP: 1 updates (average = 46, maximum = 46) BGP: 171.69.233.19 updates replicated for neighbors : 171.69.233.34, 171.69.233.49, 171.69.233.56 BGP: 171.69.233.19 1 updates enqueued (average=46, maximum=46) BGP: 171.69.233.19 update run completed, ran for 0ms, neighbor version 267099, start version 267100, throttled to 267100, check point net 0.0.0.0
DB-1116
December 2010
debug ip mcache
Note
Effective with Cisco IOS Release 15.0(1)M and Cisco IOS Release 12.2(33)SRE, the debug ip mcache command is not available in Cisco IOS software. To display IP multicast fast-switching events, use the debug ip mcache command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip mcache [vrf vrf-name] [hostname | group-address] no debug ip mcache [vrf vrf-name] [hostname | group-address]
Syntax Description
(Optional) Supports the Multicast Virtual Private Network (VPN) routing and forwarding (VRF) instance. (Optional) Name assigned to the VRF. (Optional) The host name. (Optional) The group address.
Command Modes
Command History
Modification This command was introduced. The vrf keyword and vrf-name argument were added. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was removed. This command was removed.
15.0(1)M 12.2(33)SRE
Usage Guidelines
Use this command when multicast fast switching appears not to be functioning.
Examples
The following is sample output from the debug ip mcache command when an IP multicast route is cleared:
Router# debug ip mcache IP multicast fast-switching debugging is on
DB-1117
Router# clear ip mroute * MRC: Build MAC header MRC: Fast-switch flag ip_mroute_replicate-1 MRC: Build MAC header MRC: Build MAC header for (172.31.60.185/32, 224.2.231.173), Ethernet0 for (172.31.60.185/32, 224.2.231.173), off -> on, caller for (172.31.191.10/32, 224.2.127.255), Ethernet0 for (172.31.60.152/32, 224.2.231.173), Ethernet0
Description Multicast route cache. Route is fast switched. Host route with 32 bits of mask. State has changed. The code function that activated the state change.
Related Commands
Command debug ip dvmrp debug ip igmp debug ip igrp transactions debug ip mrm debug ip sd
Description Displays information on DVMRP packets received and sent. Displays IGMP packets received and sent, and IGMP-host related events. Displays transaction information on IGRP routing transactions. Displays MRM control packet activity. Displays all SD announcements received.
DB-1118
December 2010
Syntax Description
event packet
Command Modes
Privileged EXEC
Usage Guidelines
Examples
The following is sample output from the debug ip mds ipc packet command:
Router# debug ip mds ipc packet MDFS ipc Router# MDFS: LC MDFS: LC MDFS: LC MDFS: LC MDFS: LC MDFS: LC packet debugging is on sending statistics message to RP with code 0 of sending statistics message to RP with code 1 of sending statistics message to RP with code 2 of sending statistics message to RP with code 3 of sending window message to RP with code 36261 of received IPC packet of size 60 sequence 36212 size size size size size 36 680 200 152 8
The following is sample output from the debug ip mds ipc event command:
Router# debug ip mds ipc event MDFS: LC received invalid sequence 21 while expecting 20
DB-1119
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Examples
The following is sample output from the debug ip mds mevent command:
Router# debug ip mds mevent MDFS mroute event debugging is on Router#clear ip mdfs for * Router# MDFS: Create (*, 239.255.255.255) MDFS: Create (192.168.1.1/32, 239.255.255.255), RPF POS2/0/0 MDFS: Add OIF for mroute (192.168.1.1/239.255.255.255) on Fddi0/0/0 MDFS: Create (*, 224.2.127.254) MDFS: Create (192.168.1.1/32, 224.2.127.254), RPF POS2/0/0 MDFS: Add OIF for mroute (192.168.1.1/224.2.127.254) on Fddi0/0/0 MDFS: Create (128.9.160.67/32, 224.2.127.254), RPF POS2/0/0
DB-1120
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
DB-1121
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Examples
The following is sample output from the debug ip mds process command:
Router# debug ip mds process MDFS process debugging is on Mar 19 16:15:47.448: MDFS: RP all linecards Mar 19 16:15:47.448: MDFS: RP all linecards Mar 19 16:15:47.628: MDFS: RP Mar 19 16:15:47.628: MDFS: RP Mar 19 16:15:48.229: MDFS: RP all linecards Mar 19 16:15:48.229: MDFS: RP all linecards Mar 19 16:15:48.229: MDFS: RP all linecards Mar 19 16:15:48.229: MDFS: RP all linecards Mar 19 16:15:48.229: MDFS: RP all linecards Mar 19 16:15:48.229: MDFS: RP all linecards Mar 19 16:15:48.233: MDFS: RP all linecards
queueing mdb message for (210.115.194.5, 224.2.127.254) to queueing midb message for (210.115.194.5, 224.2.127.254) to servicing low queue for LC in slot 0 servicing low queue for LC in slot 2 queueing mdb message for (171.68.224.10, 224.2.127.254) to queueing mdb message for (171.68.224.10, 224.2.127.254) to queueing mdb message for (171.69.67.106, 224.2.127.254) to queueing mdb message for (171.69.67.106, 224.2.127.254) to queueing mdb message for (206.14.154.181, 224.2.127.254) to queueing mdb message for (206.14.154.181, 224.2.127.254) to queueing mdb message for (210.115.194.5, 224.2.127.254) to
DB-1122
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows how to enable debugging output for IPv4 MFIB adjacency management activity:
Router# debug ip mfib adjacency
DB-1123
debug ip mfib db
To enable debugging output for IPv4 Multicast Forwarding Information Base (MFIB) route database management activity, use the debug ip mfib db command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip mfib [vrf {vrf-name | *}] db [source-address [group-address] | group-address [source-address]] no debug ip mfib [vrf {vrf-name | *}] db [source-address [group-address] | group-address [source-address]]
Syntax Description
vrf {vrf-name | *}
(Optional) Enables debugging output for IPv4 MFIB route database management activity associated with Multicast Virtual Private Network (MVPN) routing and forwarding (MVRF) instances. After specifying the optional vrf keyword, you must specify either:
vrf-nameName of an MVRF. Enables debugging output for IPv4 MFIB route database management activity associated with the MVRF specified for the vrf-name argument. *Enables debugging output for route database management activity associated with all tables (all MVRF tables and the global table).
source-address group-address
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows how to enable debugging output for IPv4 MFIB route database management activity:
Router# debug ip mfib db
DB-1124
December 2010
debug ip mfib fs
To enable debugging output for IPv4 Multicast Forwarding Information Base (MFIB) fast switching activity, use the debug ip mfib fs command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip mfib [vrf {vrf-name | *}] fs [source-address [group-address] | group-address [source-address]] no debug ip mfib [vrf {vrf-name | *}] fs [source-address [group-address] | group-address [source-address]]
Syntax Description
vrf {vrf-name | *}
(Optional) Enables debugging output for IPv4 MFIB fast switching activity associated with Multicast Virtual Private Network (MVPN) routing and forwarding (MVRF) instances. After specifying the optional vrf keyword, you must specify either:
vrf-nameName of an MVRF. Enables debugging output for IPv4 MFIB fast switching activity associated with the MVRF specified for the vrf-name argument. *Enables debugging output for IPv4 MFIB fast switching activity associated with all tables (all MVRF tables and the global table).
source-address group-address
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows how to enable debugging output for IPv4 MFIB fast switching activity:
Router# debug ip mfib fs
DB-1125
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows how to enable debugging output for events related to IPv4 MFIB system initialization:
Router# debug ip mfib init
DB-1126
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows how to enable debugging output for IPv4 MFIB interfaces:
Router# debug ip mfib interface
DB-1127
Syntax Description
vrf {vrf-name | *]
(Optional) Enables debugging output for IPv4 MFIB communication with the IPv4 MRIB associated with Multicast Virtual Private Network (MVPN) routing and forwarding (MVRF) instances. After specifying the optional vrf keyword, you must specify either:
vrf-nameName of an MVRF. Enables debugging output for IPv4 MFIB communication with the IPv4 MRIB associated with the MVRF specified for the vrf-name argument. *Enables debugging output for IPv4 MFIB communication with the IPv4 MRIB associated with all tables (all MVRF tables and the global table).
(Optional) Multicast source address. (Optional) Multicast group address. (Optional) Displays detailed debugging output for IPv4 MFIB communication with the IPv4 MRIB.
Command Modes
Command History
Modification This command was introduced. This command was modified. The detail keyword was added. This command was modified. The detail keyword was added.
Examples
The following example shows how to enable debugging output for IPv4 MFIB communication with the IPv4 MRIB:
Router# debug ip mfib mrib
DB-1128
December 2010
Syntax Description
source-address group-address
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows how to enable debugging output for IPv4 MFIB NAT events associated with all tables:
Router# debug ip mfib nat
DB-1129
Syntax Description
vrf {vrf-name | *}
(Optional) Enables debugging output for IPv4 MFIB packet forwarding activity associated with Multicast Virtual Private Network (MVPN) routing and forwarding (MVRF) instances. After specifying the optional vrf keyword, you must specify either:
*Enables debugging output for IPv4 MFIB packet forwarding activity associated with all tables (all MVRF tables and the global table). vrf-nameName of an MVRF. Enables debugging output for IPv4 MFIB packet forwarding activity associated with the MVRF specified for the vrf-name argument.
source-address group-address
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows how to enable debugging output for IPv4 MFIB packet forwarding activity:
Router# debug ip mfib pak
DB-1130
December 2010
Syntax Description
vrf {vrf-name | *}
(Optional) Enables debugging output related to the hardware platform use of IPv4 MFIB APIs associated with Multicast Virtual Private Network (MVPN) routing and forwarding (MVRF) instances. After specifying the optional vrf keyword, you must specify either:
vrf-nameName of an MVRF. Enables debugging output related to the hardware platform use of IPv4 MFIB APIs associated with the MVRF specified for the vrf-name argument. *Enables debugging output related to the hardware platform use of IPv4 MFIB APIs associated with all tables (all MVRF tables and the global table).
Enables debugging output related to the hardware platform use of IPv4 MFIB API calls. Enables debugging output related to the hardware platform use of IPv4 MFIB API callbacks. Enables debugging output related to the hardware platform use of IPv4 MFIB API errors. Enables debugging output related to the hardware platform use of IPv4 MFIB notifications. Enables debugging output related to the hardware platform use of IPv4 MFIB database transactions.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows how to enable debugging output related to the hardware platform use of IPv4 MFIB API errors:
Router# debug ip mfib platform errors
DB-1131
Syntax Description
vrf {vrf-name | *}
(Optional) Enables debugging output for IPv4 MFIB packet preservation events associated with Multicast Virtual Private Network (MVPN) routing and forwarding (MVRF) instances. After specifying the optional vrf keyword, you must specify either:
vrf-nameName of an MVRF. Enables debugging output for IPv4 MFIB packet preservation events associated with the MVRF specified for the vrf-name argument. *Enables debugging output for IPv4 MFIB packet preservation events associated with all tables (all MVRF tables and the global table).
(Optional) Enables debugging output for IPv4 MFIB packet preservation errors. (Optional) Enables debugging output for IPv4 MFIB packet preservation limits. (Optional) Enables debugging output for IPv4 MFIB packet preservation events. (Optional) Enables debugging output for IPv4 MFIB packet preservation release events. (Optional) Enables debugging output for IPv4 MFIB packet preservation database transaction events. (Optional) Multicast source address. (Optional) Multicast group address.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command was integrated into Cisco IOS Release 12.2(33)SRE.
DB-1132
December 2010
Examples
The following example shows how to enable debugging output for IPv4 MFIB packet preservation errors:
Router# debug ip mfib ppr errors
DB-1133
debug ip mfib ps
To enable debugging output for IPv4 Multicast Forwarding Information Base (MFIB) process switching activity, use the debug ip mfib ps command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip mfib [vrf {vrf-name | *}] ps [source-address [group-address] | group-address [source-address]] no debug ip mfib [vrf {vrf-name | *}] ps [source-address [group-address] | group-address [source-address]]
Syntax Description
vrf {vrf-name | *}
(Optional) Enables debugging output for IPv4 MFIB process switching activity associated with Multicast Virtual Private Network (MVPN) routing and forwarding (MVRF) instances. After specifying the optional vrf keyword, you must specify either:
vrf-nameName of an MVRF. Enables debugging output for IPv4 MFIB process switching activity associated with the MVRF specified for the vrf-name argument. *Enables debugging output for IPv4 MFIB process switching activity associated with all tables (all MVRF tables and the global table).
source-address group-address
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows how to enable debugging output for IPv4 MFIB process switching activity:
Router# debug ip mfib ps
DB-1134
December 2010
Syntax Description
vrf {vrf-name | *}
(Optional) Enables debugging output for IPv4 MFIB signal activity associated with Multicast Virtual Private Network (MVPN) routing and forwarding (MVRF) instances. After specifying the optional vrf keyword, you must specify either:
vrf-nameName of an MVRF. Enables debugging output for IPv4 MFIB signal activity associated with the MVRF specified for the vrf-name argument. *Enables debugging output for IPv4 MFIB fast signal activity associated with all tables (all MVRF tables and the global table).
source-address group-address
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows how to enable debugging output for IPv4 MFIB signal activity for the default IPv4 table:
Router# debug ip mfib signal
The following example shows how to enable debugging output for IPv4 MFIB signal activity for the group 224.0.1.40, the source 10.1.1.1, and for the VRF Mgmt-intf:
Router# debug ip mfib vrf Mgmt-intf signal 10.1.1.1 224.0.1.40
DB-1135
Syntax Description
vrf {vrf-name | *}
(Optional) Enables debugging output for IPv4 MFIB signal activity associated with Multicast Virtual Private Network (MVPN) routing and forwarding (MVRF) instances. After specifying the optional vrf keyword, you must specify either:
vrf-nameName of an MVRF. Enables debugging output for IPv4 MFIB signal activity associated with the MVRF specified for the vrf-name argument. *Enables debugging output for IPv4 MFIB fast signal activity associated with all tables (all MVRF tables and the global table).
db mrib
Enables debugging output for IPv4 MFIB database table events and operations. Enables debugging output for IPv4 MFIB Multicast Routing Information Base (MRIB) API table events and operations.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows how to enable debugging output for IPv4 MFIB database table events and operations:
Router# debug ip mfib table db
The following example shows how to enable debugging output for IPv4 MFIB MRIB API table events and operations:
Router# debug ip mfib table mrib
DB-1136
December 2010
debug ip mhbeat
To monitor the action of the heartbeat trap, use the debug ip mhbeat command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip mhbeat no debug ip mhbeat
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-1137
= = = = =
0.0.0.0 10 5 0 3
Related Commands
Description Monitors the health of multicast delivery, and alerts when the delivery fails to meet certain parameters.
DB-1138
December 2010
debug ip mobile
To display IP mobility activities, use the debug ip mobile command in privileged EXEC mode. debug ip mobile [advertise | host [access-list-number] | local-area | redundancy | udp-tunneling]
Syntax Description
(Optional) Advertisement information. (Optional) The mobile node host. (Optional) The number of an IP access list. (Optional) The local area. (Optional) Redundancy activities. (Optional) User Datagram Protocol (UDP) tunneling activities.
Defaults
Command Modes
Command History
Modification This command was introduced. The standby keyword was added. The standby keyword was replaced by the redundancy keyword. This command was enhanced to display information about foreign agent reverse tunnels and the mobile networks attached to the mobile router. The udp-tunneling keyword was added and the command was enhanced to display information about NAT traversal using UDP tunneling. This command was enhanced to include the Resource Management capability. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ip mobile redundancy command to troubleshoot redundancy problems. No per-user debugging output is shown for mobile nodes using the network access identifier (NAI) for the debug ip mobile host command. Debugging of specific mobile nodes using an IP address is possible through the access list.
Examples
The following is sample output from the debug ip mobile command when foreign agent reverse tunneling is enabled:
DB-1139
The following is sample output from the debug ip mobile advertise command:
Router# debug ip mobile advertise MobileIP: Agent advertisement sent out Ethernet1/2: type=16, len=10, seq=1, lifetime=36000, flags=0x1400(rbhFmGv-rsv-), Care-of address: 68.0.0.31 Prefix Length ext: len=1 (8 ) FA Challenge value:769C808D
Field type len seq lifetime flags Care-of address Prefix Length ext FA Challenge value
Description Type of advertisement. Length of extension (in bytes). Sequence number of this advertisement. Lifetime (in seconds). Capital letters represent bits that are set; lowercase letters represent unset bits. IP address. Number of prefix lengths advertised. This is the bits in the mask of the interface sending this advertisement. Used for roaming detection. Foreign Agent challenge value (randomly generated by the foreign agent.)
The following is sample output from the debug ip mobile host command:
Router# debug ip mobile host MobileIP: 68.0.0.31 MobileIP: MobileIP: MobileIP: MobileIP: MobileIP: MobileIP: MobileIP: HA received registration for MN 20.0.0.6 on interface Ethernet1 using COA HA 66.0.0.5 lifetime 30000 options sbdmgvT Authenticated FA 68.0.0.31 using SPI 110 (MN 20.0.0.6) Authenticated MN 20.0.0.6 using SPI 300 HA accepts registration from MN 20.0.0.6 Mobility binding for MN 20.0.0.6 updated Roam timer started for MN 20.0.0.6, lifetime 30000 MH auth ext added (SPI 300) in reply to MN 20.0.0.6 HF auth ext added (SPI 220) in reply to MN 20.0.0.6
The following is sample output from the debug ip mobile redundancy command. In this example, the active home agent receives a registration request from mobile node 20.0.0.2 and sends a binding update to peer home agent 1.0.0.2:
MobileIP:MN 20.0.0.2 - sent BindUpd to HA 1.0.0.2 HAA 20.0.0.1 MobileIP:HA standby maint started - cnt 1 MobileIP:MN 20.0.0.2 - sent BindUpd id 3780410816 cnt 0 elapsed 0 adjust -0 to HA 1.0.0.2 in grp 1.0.0.10 HAA 20.0.0.1
DB-1140
December 2010
In this example, the standby home agent receives a binding update for mobile node 20.0.0.2 sent by the active home agent:
MobileIP:MN 20.0.0.2 - HA rcv BindUpd from 1.0.0.3 HAA 20.0.0.1
The following is sample output from the debug ip mobile udp-tunneling command and displays the registration, authentication, and establishment of UDP tunneling of a mobile node (MN) with a foreign agent (FA):
Dec 31 12:34:25.707: UDP: rcvd src=10.10.10.10(434),dst=10.30.30.1(434), length=54 Dec 31 12:34:25.707: MobileIP: ParseRegExt type MHAE(32) addr 2000FEEC end 2000FF02 Dec 31 12:34:25.707: MobileIP: ParseRegExt skipping 10 to next Dec 31 12:34:25.707: MobileIP: FA rcv registration for MN 10.10.10.10 on Ethernet2/2 using COA 10.30.30.1 HA 10.10.10.100 lifetime 65535 options sbdmg-T-identification C1BC0D4FB01AC0D8 Dec 31 12:34:25.707: MobileIP: Ethernet2/2 glean 10.10.10.10 accepted Dec 31 12:34:25.707: MobileIP: Registration request byte count = 74 Dec 31 12:34:25.707: MobileIP: FA queued MN 10.10.10.10 in register table Dec 31 12:34:25.707: MobileIP: Visitor registration timer started for MN 10.10.10.10, lifetime 120 Dec 31 12:34:25.707: MobileIP: Adding UDP Tunnel req extension Dec 31 12:34:25.707: MobileIP: Authentication algorithm MD5 and 16 byte key Dec 31 12:34:25.707: MobileIP: MN 10.10.10.10 FHAE added to HA 10.10.10.100 using SPI 1000 Dec 31 12:34:25.707: MobileIP: FA forwarded registration for MN 10.10.10.10 to HA 10.10.10.100 Dec 31 12:34:25.715: UDP: rcvd src=10.10.10.100(434), dst=10.30.30.1(434), length=94 Dec 31 12:34:25.715: MobileIP: ParseRegExt type NVSE(134) addr 20010B28 end 20010B6A Dec 31 12:34:25.715: MobileIP: ParseRegExt type MN-config NVSE(14) subtype 1 (MN prefix length) prefix length (24) Dec 31 12:34:25.715: MobileIP: ParseRegExt skipping 12 to next Dec 31 12:34:25.715: MobileIP: ParseRegExt type MHAE(32) addr 20010B36 end 20010B6A Dec 31 12:34:25.715: MobileIP: ParseRegExt skipping 10 to next Dec 31 12:34:25.715: MobileIP: ParseRegExt type UDPTUNREPE(44) addr 20010B4C end 20010B6A Dec 31 12:34:25.715: Parsing UDP Tunnel Reply Extension - length 6 Dec 31 12:34:25.715: MobileIP: ParseRegExt skipping 6 to next Dec 31 12:34:25.715: MobileIP: ParseRegExt type FHAE(34) addr 20010B54 end 20010B6A Dec 31 12:34:25.715: MobileIP: ParseRegExt skipping 20 to next Dec 31 12:34:25.715: MobileIP: FA rcv accept (0) reply for MN 10.10.10.10 on Ethernet2/3 using HA 10.10.10.100 lifetime 65535 Dec 31 12:34:25.719: MobileIP: Authenticating HA 10.10.10.100 using SPI 1000 Dec 31 12:34:25.719: MobileIP: Authentication algorithm MD5 and 16 byte key Dec 31 12:34:25.719: MobileIP: Authenticated HA 10.10.10.100 using SPI 1000 and 16 byte key Dec 31 12:34:25.719: MobileIP: HA accepts UDP Tunneling Dec 31 12:34:25.719: MobileIP: Update visitor table for MN 10.10.10.10 Dec 31 12:34:25.719: MobileIP: Enabling UDP Tunneling Dec 31 12:34:25.719: MobileIP: Tunnel0 (MIPUDP/IP) created with src 10.30.30.1 dst 10.10.10.100 Dec 31 12:34:25.719: MobileIP: Setting up UDP Keep-Alive Timer for tunnel 10.30.30.1:0 10.10.10.100:0 with keep-alive 30 Dec 31 12:34:25.719: MobileIP: Starting the tunnel keep-alive timer Dec 31 12:34:25.719: MobileIP: ARP entry for MN 10.10.10.10 using 10.10.10.10 inserted on Ethernet2/2 Dec 31 12:34:25.719: MobileIP: FA route add 10.10.10.10 successful. Code = 0 Dec 31 12:34:25.719: MobileIP: MN 10.10.10.10 added to ReverseTunnelTable of Ethernet2/2 (Entries 1) Dec 31 12:34:25.719: MobileIP: FA dequeued MN 10.10.10.10 from register table Dec 31 12:34:25.719: MobileIP: MN 10.10.10.10 using 10.10.10.10 visiting on Ethernet2/2 Dec 31 12:34:25.719: MobileIP: Reply in for MN 10.10.10.10 using 10.10.10.10, accepted Dec 31 12:34:25.719: MobileIP: registration reply byte count = 84 Dec 31 12:34:25.719: MobileIP: FA forwarding reply to MN 10.10.10.10 (10.10.10.10 mac 0060.70ca.f021) Dec 31 12:34:26.095: MobileIP: agent advertisement byte count = 48
DB-1141
Dec 31 12:34:26.095: MobileIP: Agent advertisement sent out Ethernet2/2: type=16, len=10, seq=55, lifetime=65535, flags=0x1580(rbhFmG-TU), Dec 31 12:34:26.095: Care-of address: 10.30.30.1 Dec 31 12:34:26.719: MobileIP: swif coming up Tunnel0 ! Dec 31 12:34:35.719: UDP: sent src=10.30.30.1(434), dst=10.10.10.100(434) Dec 31 12:34:35.719: UDP: rcvd src=10.10.10.100(434), dst=10.30.30.1(434), length=32d0
The following is sample output from the debug ip mobile udp-tunneling command and displays the registration, authentication, and establishment of UDP tunneling of a MN with a home agent (HA):
Dec 31 12:34:26.167: MobileIP: ParseRegExt skipping 20 to next Dec 31 12:34:26.167: MobileIP: ParseRegExt type UDPTUNREQE(144) addr 2001E762 end 2001E780 Dec 31 12:34:26.167: MobileIP: Parsing UDP Tunnel Request Extension - length 6 Dec 31 12:34:26.167: MobileIP: ParseRegExt skipping 6 to next Dec 31 12:34:26.167: MobileIP: ParseRegExt type FHAE(34) addr 2001E76A end 2001E780 Dec 31 12:34:26.167: MobileIP: ParseRegExt skipping 20 to next Dec 31 12:34:26.167: MobileIP: HA 167 rcv registration for MN 10.10.10.10 on Ethernet2/1 using HomeAddr 10.10.10.10 COA 10.30.30.1 HA 10.10.10.100 lifetime 65535 options sbdmg-T-identification C1BC0D4FB01AC0D8 Dec 31 12:34:26.167: MobileIP: NAT detected SRC:10.10.10.50 COA: 10.30.30.1 Dec 31 12:34:26.167: MobileIP: UDP Tunnel Request accepted 10.10.10.50:434 Dec 31 12:34:26.167: MobileIP: Authenticating FA 10.30.30.1 using SPI 1000 Dec 31 12:34:26.167: MobileIP: Authentication algorithm MD5 and 16 byte key Dec 31 12:34:26.167: MobileIP: Authentication algorithm MD5 and truncated key Dec 31 12:34:26.167: MobileIP: Authentication algorithm MD5 and 16 byte key Dec 31 12:34:26.167: MobileIP: Authenticated FA 10.30.30.1 using SPI 1000 and 16 byte key Dec 31 12:34:26.167: MobileIP: Authenticating MN 10.10.10.10 using SPI 1000 Dec 31 12:34:26.167: MobileIP: Authentication algorithm MD5 and 16 byte key Dec 31 12:34:26.167: MobileIP: Authentication algorithm MD5 and truncated key Dec 31 12:34:26.167: MobileIP: Authentication algorithm MD5 and 16 byte key Dec 31 12:34:26.167: MobileIP: Authenticated MN 10.10.10.10 using SPI 1000 and 16 byte key Dec 31 12:34:26.167: MobileIP: Mobility binding for MN 10.10.10.10 created Dec 31 12:34:26.167: MobileIP: NAT detected for MN 10.10.10.10. Terminating tunnel on 10.10.10.50 Dec 31 12:34:26.167: MobileIP: Tunnel0 (MIPUDP/IP) created with src 10.10.10.100 dst 10.10.10.50 Dec 31 12:34:26.167: MobileIP: Setting up UDP Keep-Alive Timer for tunnel 10.10.10.100:0 10.10.10.50:0 with keep-alive 30 Dec 31 12:34:26.167: MobileIP: Starting the tunnel keep-alive timer Dec 31 12:34:26.167: MobileIP: MN 10.10.10.10 Insert route for 10.10.10.10/255.255.255.255 via gateway 10.10.10.50 on Tunnel0 Dec 31 12:34:26.167: MobileIP: MN 10.10.10.10 is now roaming Dec 31 12:34:26.171: MobileIP: Gratuitous ARPs sent for MN 10.10.10.10 MAC 0002.fca5.bc39 Dec 31 12:34:26.171: MobileIP: Mask for address is 24 Dec 31 12:34:26.171: MobileIP: HA accepts registration from MN 10.10.10.10 Dec 31 12:34:26.171: MobileIP: Dynamic and Static Network Extension Length 0 - 0 Dec 31 12:34:26.171: MobileIP: Composed mobile network extension length:0 Dec 31 12:34:26.171: MobileIP: Added prefix length vse in reply Dec 31 12:34:26.171: MobileIP: Authentication algorithm MD5 and 16 byte key Dec 31 12:34:26.171: MobileIP: MN 10.10.10.10 MHAE added to MN 10.10.10.10 using SPI 1000 Dec 31 12:34:26.171: MobileIP: Authentication algorithm MD5 and 16 byte key Dec 31 12:34:26.171: MobileIP: MN 10.10.10.10 FHAE added to FA 10.10.10.50 using SPI 1000 Dec 31 12:34:26.171: MobileIP: MN 10.10.10.10 - HA sent reply to 10.10.10.50 Dec 31 12:34:26.171: MobileIP: Authentication algorithm MD5 and 16 byte key Dec 31 12:34:26.171: MobileIP: MN 10.10.10.10 HHAE added to HA 10.10.10.3 using SPI 1000 Dec 31 12:34:26.175: MobileIP: ParseRegExt type CVSE(38) addr 2000128C end 200012AE Dec 31 12:34:26.175: MobileIP: ParseRegExt type HA red. version CVSE(6) Dec 31 12:34:26.175: MobileIP: ParseRegExt skipping 8 to next Dec 31 12:34:26.175: MobileIP: ParseRegExt type HHAE(35) addr 20001298 end 200012AE Dec 31 12:34:26.175: MobileIP: ParseRegExt skipping 20 to next Dec 31 12:34:26.175: MobileIP: Authenticating HA 10.10.10.3 using SPI 1000 Dec 31 12:34:26.175: MobileIP: Authentication algorithm MD5 and 16 byte key Dec 31 12:34:26.175: MobileIP: Authentication algorithm MD5 and truncated key
DB-1142
December 2010
Dec 31 12:34:26.175: MobileIP: Authentication algorithm MD5 and 16 byte key Dec 31 12:34:26.175: MobileIP: Authenticated HA 10.10.10.3 using SPI 1000 and 16 byte key Dec 31 12:34:27.167: MobileIP: swif coming up Tunnel0d0
DB-1143
Syntax Description
Defaults
No default values.
Command Modes
EXEC mode
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip mobile advertise command. Table 144 describes significant fields shown in the display.
Router# debug ip mobile advertise MobileIP: Agent advertisement sent out Ethernet1/2: type=16, len=10, seq=1, lifetime=36000, flags=0x1400(rbhFmGv-rsv-), Care-of address: 14.0.0.31 Prefix Length ext: len=1 (8 )
Table 144
Description Type of advertisement. Length of extension in bytes. Sequence number of this advertisement. Lifetime in seconds. Capital letters represent bits that are set, lower case letters represent unset bits.
DB-1144
December 2010
Table 144
Description IP address. Number of prefix lengths advertised. This is the bits in the mask of the interface sending this advertisement. Used for roaming detection.
DB-1145
Syntax Description
Command Modes
Command History
Release 12.4(24)T
Examples
The following sample output from the debug ip mobile dyn-pbr command:
Router# debug ip mobile dyn-pbr *Jan 12 19:50:16.271: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel2, changed state to up *Jan 12 19:50:16.271: Looking for path WIFI in rmap MPATH_2 10 *Jan 12 19:50:16.271: Found link_type WIFI, ACL template is VIDEO *Jan 12 19:50:16.271: Set int for link_type WIFI to Tunnel2 *Jan 12 19:50:16.271: MIP-PBR: ACL handle VIDEO-to-192.0.2.0/24 created *Jan 12 19:50:16.271: MIP-PBR: Retrieving ACL for VIDEO-to-192.0.2.0/24 *Jan 12 19:50:16.271: template->tos_value = 16 *Jan 12 19:50:16.271: Creating new rmap entry_hdl 104835472 *Jan 12 19:50:16.271: new dyn rmap info added to map_entry->dyn_rmaps *Jan 12 19:50:16.271: map_entry->dyn_rmaps = *Jan 12 19:50:16.271: 104835472, VIDEO-to-192.0.2.0/24 *Jan 12 19:50:16.271: MIP-PBR: added route-map entry for VIDEO-to-192.0.2.0/24 via Tunnel2 *Jan 12 19:50:16.271: MIP-PBR: Dyn route-map entry added OK on HA *Jan 12 19:50:16.271: MIP-PBR: ACL handle VIDEO-to-192.0.2.32/20 created *Jan 12 19:50:16.271: MIP-PBR: Retrieving ACL for VIDEO-to-192.0.2.32/20 *Jan 12 19:50:16.271: template->tos_value = 16 *Jan 12 19:50:16.271: Creating new rmap entry_hdl 84396264 *Jan 12 19:50:16.271: new dyn rmap info added to map_entry->dyn_rmaps *Jan 12 19:50:16.271: map_entry->dyn_rmaps = *Jan 12 19:50:16.271: 104835472, VIDEO-to-192.0.2.0/24 *Jan 12 19:50:16.271: 84396264, VIDEO-to-192.0.2.32/20 *Jan 12 19:50:16.271: MIP-PBR: added route-map entry for VIDEO-to-192.0.2.32/20 via Tunnel2 *Jan 12 19:50:16.271: MIP-PBR: Dyn route-map entry added for home address 192.0.2.32 on HA *Jan 12 19:50:16.271: Looking for path WIFI in rmap MPATH_2 20 *Jan 12 19:50:16.271: Looking for path WIFI in rmap MPATH_2 30 *Jan 12 19:50:16.271: MIP-PBR: MIP-01/12/09-19:46:39.495-1-MP-HA assoc with Ethernet2/0 *Jan 12 19:50:16.271: *Jan 12 19:50:16.271: *Jan 12 19:50:16.271:
DB-1146
December 2010
Looking for path WIFI in rmap MPATH_1 10 *Jan 12 19:50:16.271: Found link_type WIFI, ACL template is VIDEO *Jan 12 19:50:16.271: Set int for link_type WIFI to Tunnel2 *Jan 12 19:50:16.271: MIP-PBR: Using existing dyn acl hdl VIDEO-to-192.0.2.0/24 *Jan 12 19:50:16.271: MIP-PBR: After api bind, ACL VIDEO-to-192.0.2.0/24, user_count 3 *Jan 12 19:50:16.271: MIP-PBR: current map_entry->dyn_rmaps = 0 *Jan 12 19:50:16.271: MIP-PBR: found rmap_info = VIDEO-to-192.0.2.0/24 *Jan 12 19:50:16.271: MIP-PBR: Using existing dyn rmap entry 104835472 *Jan 12 19:50:16.271: MIP-PBR: added route-map entry for VIDEO-to-192.0.2.0/24 via Tunnel2 *Jan 12 19:50:16.271: MIP-PBR: Dyn route-map entry added OK on HA *Jan 12 19:50:16.271: MIP-PBR: Using existing dyn acl hdl VIDEO-to-192.0.2.32/20 *Jan 12 19:50:16.271: MIP-PBR: After api bind, ACL VIDEO-to-192.0.2.32/20, user_count 3 *Jan 12 19:50:16.271: MIP-PBR: current map_entry->dyn_rmaps = 63A5320 *Jan 12 19:50:16.271: MIP-PBR: found rmap_info = VIDEO-to-192.0.2.32/20 *Jan 12 19:50:16.271: MIP-PBR: Using existing dyn rmap entry 84396264 *Jan 12 19:50:16.271: MIP-PBR: added route-map entry for VIDEO-to-192.0.2.32/20 via Tunnel2 *Jan 12 19:50:16.271: MIP-PBR: Dyn route-map entry added for home address 192.0.2.32 on HA *Jan 12 19:50:16.271: Looking for path WIFI in rmap MPATH_1 20 *Jan 12 19:50:16.271: Looking for path WIFI in rmap MPATH_1 30 *Jan 12 19:50:16.271: MIP-PBR: MIP-01/12/09-19:46:39.495-1-MP-HA assoc with Ethernet2/0 *Jan 12 19:50:16.271: *Jan 12 19:50:16.271: *Jan 12 19:50:16.271: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel3, changed state to up *Jan 12 19:50:16.271: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel4, changed state to up *Jan 12 19:50:16.271: Looking for path UMTS in rmap MPATH_2 10 *Jan 12 19:50:16.271: Looking for path UMTS in rmap MPATH_2 20 *Jan 12 19:50:16.271: Found link_type UMTS, ACL template is VOICE *Jan 12 19:50:16.271: Set int for link_type UMTS to Tunnel4 *Jan 12 19:50:16.271: MIP-PBR: ACL handle VOICE-to-192.0.2.0/24 created *Jan 12 19:50:16.271: MIP-PBR: Using existing dyn acl hdl VOICE-to-192.0.2.0/24 *Jan 12 19:50:16.271: MIP-PBR: After api bind, ACL VOICE-to-192.0.2.0/24, user_count 3 *Jan 12 19:50:16.271: MIP-PBR: current map_entry->dyn_rmaps = 0 *Jan 12 19:50:16.271: MIP-PBR: found rmap_info = VOICE-to-192.0.2.0/24 *Jan 12 19:50:16.271: MIP-PBR: Using existing dyn rmap entry 84365440 *Jan 12 19:50:16.271: MIP-PBR: added route-map entry for VOICE-to-192.0.2.0/24 via Tunnel4 *Jan 12 19:50:16.271: MIP-PBR: Dyn route-map entry added OK on HA *Jan 12 19:50:16.271: MIP-PBR: Using existing dyn acl hdl VOICE-to-192.0.2.32/20 *Jan 12 19:50:16.271: MIP-PBR: After api bind, ACL VOICE-to-192.0.2.32/20, user_count 3 *Jan 12 19:50:16.271: MIP-PBR: current map_entry->dyn_rmaps = 63A4390 *Jan 12 19:50:16.271: MIP-PBR: found rmap_info = VOICE-to-192.0.2.32/20 *Jan 12 19:50:16.271: MIP-PBR: Using existing dyn rmap entry 99337152 *Jan 12 19:50:16.271: MIP-PBR: added route-map entry for VOICE-to-192.0.2.32/20 via Tunnel4
DB-1147
*Jan 12 19:50:16.271: MIP-PBR: Dyn route-map entry added for home address 192.0.2.32 on HA *Jan 12 19:50:16.271: Looking for path UMTS in rmap MPATH_1 30 *Jan 12 19:50:16.271: MIP-PBR: MIP-01/12/09-19:46:39.495-1-MP-HA assoc with Ethernet2/0 *Jan 12 19:50:16.271: *Jan 12 19:50:16.271: *Jan 12 19:50:16.291: DELETING dyn_rmaps for reg_ptr 6436320: *Jan 12 19:50:16.291: Looking at reg_info: Tunnel2 MPATH_1 10 *Jan 12 19:50:16.291: Looking at reg_info: Tunnel2 MPATH_2 10 *Jan 12 19:50:16.291: Looking at reg_info: Tunnel2 MPATH_1 10 *Jan 12 19:50:16.291: Looking at reg_info: Tunnel2 MPATH_2 10 *Jan 12 19:50:16.291: Looking at reg_info: Tunnel4 MPATH_1 20 *Jan 12 19:50:16.291: Looking at reg_info: Tunnel4 MPATH_2 20 *Jan 12 19:50:16.291: Looking at reg_info: Tunnel4 MPATH_1 20 *Jan 12 19:50:16.291: Looking at reg_info: Tunnel4 MPATH_2 20 *Jan 12 19:50:16.291: Looking at reg_info: Tunnel2 MPATH_1 10 *Jan 12 19:50:16.291: Looking at reg_info: Tunnel2 MPATH_2 10 *Jan 12 19:50:16.291: Looking at reg_info: Tunnel2 MPATH_1 10 *Jan 12 19:50:16.291: Looking at reg_info: Tunnel2 MPATH_2 10
DB-1148
December 2010
Syntax Description
(Optional) The mobile node host. (Optional) Mobile host identified by NAI.
Defaults
No default values.
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip mobile host command:
Router# debug ip mobile host MobileIP: 14.0.0.31 MobileIP: MobileIP: MobileIP: MobileIP: MobileIP: MobileIP: MobileIP: HA received registration for MN 10.0.0.6 on interface Ethernet1 using COA HA 15.0.0.5 lifetime 30000 options sbdmgvT Authenticated FA 15.0.0.31 using SPI 110 (MN 20.0.0.6) Authenticated MN 11.0.0.6 using SPI 300 HA accepts registration from MN 11.0.0.6 Mobility binding for MN 11.0.0.6 updated Roam timer started for MN 11.0.0.6, lifetime 30000 MH auth ext added (SPI 300) in reply to MN 11.0.0.6 HF auth ext added (SPI 220) in reply to MN 11.0.0.6
DB-1149
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is useful for customers deploying mobile networks functionality that need to monitor and debug mobile router information via the Simple Network Management Protocol (SNMP). Set operations (performed from a Network Management System) are supported for mobile network services. While setting the values for MIBs, a set operation may fail. The debug ip mobile mib command allows error messages explaining the failure to be displayed on the console of the home agent .
Examples
The following mobile networks deployment MIB debug messages are displayed only on certain conditions or when a certain condition fails.
Router# debug ip mobile mib ! Mobile router is not enabled MIPMIB: Mobile Router is not enabled ! Care-of-interface can be set as transmit-only only if its a Serial interface MIPMIB: Serial interfaces can only be set as transmit-only ! The Care of address can be configured only if foreign agent is running MIPMIB: FA cannot be started ! Check if home agent is active MIPMIB: HA is not enabled ! For mobile router configuration, host configuration must have been done already MIPMIB: MN <address> is not configured
DB-1150
December 2010
! Mobile Network does not match the existing mobile network MIPMIB: Conflict with existing mobile networks <name> ! Mobile router present MIPMIB: MR <address> is not configured ! Static mobile networks can be configured only for single member mobilenetgroups MIPMIB: MR is part of group <name>, network cannot be configured ! If a binding exists for this mobile router, then delete the route for this unconfigured ! mobile network MIBMIB: Delete static mobile net for MR ! Check if its a dynamically registered mobile network nMIPMIB: Mobile network <address mask> is dynamically registered, cannot be removed ! Check if the mobile network has already been configured for another group nMIPMIB: Mobile network already configured for MR ! Check if the network has been dynamically registered nMIPMIB: Deleted dynamic mobnet <address mask> for MR <name> ! Check if the redundancy group exists MIPMIB: Redundancy group <name> does not exist ! CCOA configuration, use primary interface address as the CCoA MIPMIB: No IP address on this interface ! CCOA configuration, CCoA address shouldn't be the same as the Home Address nMIPMIB: Collocated CoA is the same as the Home Address, registrations will fail
DB-1151
Syntax Description
Defaults
No default values.
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip mobile redundancy command:
Router# debug ip mobile redundancy 00:19:21: MobileIP: Adding MN service flags to bindupdate 00:19:21: MobileIP: Adding MN service flags 0 init registration flags 1 00:19:21: MobileIP: Adding a hared version cvse - bindupdate 00:19:21: MobileIP: HARelayBindUpdate version number 2MobileIP: MN 14.0.0.20 - sent BindUpd to HA 11.0.0.3 HAA 11.0.0.4 00:19:21: MobileIP: HA standby maint started - cnt 1 00:19:21: MobileIP: MN 14.0.0.20 - HA rcv BindUpdAck accept from 11.0.0.3 HAA 11.0.0.4 00:19:22: MobileIP: HA standby maint started - cnt 1
DB-1152
December 2010
Syntax Description
detail
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was enhanced to display information about the addition and deletion of mobile networks. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The mobile router operations can be debugged. The following conditions trigger debugging messages:
Agent discovery Registration Mobile router state change Routes and tunnels created or deleted Roaming information
Debugging messages are prefixed with MobRtr and detail messages are prefixed with MobRtrX.
Examples
The following is sample output from the debug ip mobile router command:
Router# debug ip mobile router MobileRouter: New FA 27.0.0.12 coa 27.0.0.12 int Ethernet0/1 MAC 0050.50c1.c855 2w2d: MobileRouter: Register reason: isolated 2w2d: MobileRouter: Snd reg request agent 27.0.0.12 coa 27.0.0.12 home 9.0.0.1 ha 29.0.0.4 lifetime 36000 int Ethernet0/1 flag sbdmgvt cnt 0 id B496B69C.55E77974 2w2d: MobileRouter: Status Isolated -> Pending
DB-1153
The following is sample output from the debug ip mobile router detail command:
Router# debug ip mobile router detail 1d09h: MobRtr: New agent 20.0.0.2 coa 30.0.0.2 int Ethernet3/1 MAC 00b0.8e35.a055 1d09h: MobRtr: Register reason: left home 1d09h: MobRtrX: Extsize 18 add 1 delete 0 1d09h: MobRtrX: Add network 20.0.0.0/8 MobileIP: MH auth ext added (SPI 100) to HA 100.0.0.3 1d09h: MobRtr: Register to fa 20.0.0.2 coa 30.0.0.2 home 100.0.0.1 ha 100.0.0.3 life 120 int Ethernet3/1 flag sbdmgvt cnt 0 id BE804340.447F50A4 1d09h: MobRtr: Status Isolated -> Pending 1d09h: MobRtr: MN rcv accept (0) reply on Ethernet3/1 from 20.0.0.2 lifetime 120 MobileIP: MN 100.0.0.3 - authenticating HA 100.0.0.3 using SPI 100 MobileIP: MN 100.0.0.3 - authenticated HA 100.0.0.3 using SPI 100 1d09h: MobRtr: Status Pending -> Registered 1d09h: MobRtr: Add default gateway 20.0.0.2 (Ethernet3/1) 1d09h: MobRtr: Add default route via 20.0.0.2 (Ethernet3/1)
Related Commands
DB-1154
December 2010
debug ip mpacket
Note
Effective with Cisco IOS Release 15.0(1)M and Cisco IOS Release 12.2(33)SRE, the debug ip mpacket command is replaced by the debug ip mfib ps command and the debug ip mcache command with the fastswitch keyword is replaced by the debug ip mfib pak command. See the debug ip mfib ps and debug ip mfib pak commands for more information. To display IP multicast packets received and sent, use the debug ip mpacket command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip mpacket [vrf vrf-name] [detail | fastswitch] [access-list] [group] no debug ip mpacket [vrf vrf-name] [detail | fastswitch] [access-list] [group]
Syntax Description
(Optional) Supports the Multicast Virtual Private Network (VPN) routing and forwarding (VRF) instance. (Optional) Name assigned to the VRF. (Optional) Displays IP header information and MAC address information. (Optional) Displays IP packet information in the fast path. (Optional) The access list number. (Optional) The group name or address.
Defaults
The debug ip mpacket command displays all IP multicast packets switched at the process level.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified. The fastswitch keyword was added. This command was modified. The vrf keyword and vrf-name argument were added. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was replaced. This command was replaced.
15.0(1)M 12.2(33)SRE
DB-1155
Usage Guidelines
This command displays information for multicast IP packets that are forwarded from this router. Use the access-list or group argument to limit the display to multicast packets from sources described by the access list or a specific multicast group. Use this command with the debug ip packet command to display additional packet information.
Note
The debug ip mpacket command generates many messages. Use this command with care so that performance on the network is not affected by the debug message traffic.
Examples
Description IP packet. Source address of the packet. Name of the interface that received the packet. Multicast group address that is the destination for this packet. Outgoing interface for the packet. Number of bytes in the packet. This value will vary depending on the application and the media. Packet has been forwarded.
Related Commands
Command debug ip dvmrp debug ip igmp debug ip mrm debug ip packet debug ip sd
Description Displays information on DVMRP packets received and sent. Displays IGMP packets received and sent, and IGMP host-related events. Displays MRM control packet activity. Displays general IP debugging information and IPSO security transactions. Displays all SD announcements received.
DB-1156
December 2010
debug ip mrib
To enable debugging output for IPv4 Multicast Routing Information Base (MRIB) activity, use the debug ip mrib command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip mrib [vrf vrf-name] {client | io | issu | proxy | route | table | trans} no debug ip mrib [vrf vrf-name] {client | io | issu | proxy | route | table | trans}
Syntax Description
vrf vrf-name
(Optional) Enables debugging output for IPv4 MRIB activity associated with the Multicast Virtual Private Network (MVPN) routing and forwarding (MVRF) instance specified for the vrf-name argument. Enables debugging output for IPv4 MRIB client management activity. Enables debugging output for IPv4 MRIB input/output (I/O) events. Enables debugging output for IPv4 MRIB events associated with In-Service Software Upgrades (ISSUs). Enables debugging output related to IPv4 MRIB proxy activity between the Route Processor (RP) and line cards. Enables debugging output for IPv4 MRIB activity pertaining to routing entries. Enables debugging output for IPv4 MRIB table management activity. Enables debugging output for activity related to IPv4 Protocol Independent Multicast (PIM) to MRIB translation.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.0(1)M. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples
The following example shows how to enable debugging output for IPv4 MRIB client management activity:
Router# debug ip mrib client
DB-1157
debug ip mrm
To display Multicast Routing Monitor (MRM) control packet activity, use the debug ip mrm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip mrm no debug ip mrm
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip mrm command on the different devices:
On Manager
*Feb 28 16:25:44.009: MRM: Send Beacon for group 239.1.1.1, holdtime 86100 seconds *Feb 28 16:26:01.095: MRM: Receive Status Report from 10.1.4.2 on Ethernet0 *Feb 28 16:26:01.099: MRM: Send Status Report Ack to 10.1.4.2 for group 239.1.1.1
On Test-Sender
MRM: Receive Test-Sender Request/Local trigger from 1.1.1.1 on Ethernet0 MRM: Send TS request Ack to 1.1.1.1 for group 239.1.2.3 MRM: Send test packet src:2.2.2.2 dst:239.1.2.3 manager:1.1.1.1
On Test-Receiver
MRM: MRM: MRM: MRM: MRM: Receive Test-Receiver Request/Monitor from 1.1.1.1 on Ethernet0 Send TR request Ack to 1.1.1.1 for group 239.1.2.3 Receive Beacon from 1.1.1.1 on Ethernet0 Send Status Report to 1.1.1.1 for group 239.1.2.3 Receive Status Report Ack from 1.1.1.1 on Ethernet0
DB-1158
December 2010
debug ip mrouting
To display information about activity in the multicast route (mroute) table, use the debug ip mrouting command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip mrouting [vrf vrf-name] [rpf-events | timers] [group-address] no debug ip mrouting [vrf vrf-name] [rpf-events | timers] [group-address]
Command Syntax in Cisco IOS 12.2(33)SXH and Subsequent 12.2SX Releases
debug ip mrouting [vrf vrf-name] [high-availability | rpf-events [group-address] | timers group-address] no debug ip mrouting [vrf vrf-name] [high-availability | rpf-events [group-address] | timers group-address]
Syntax Description
vrf vrf-name
(Optional) Displays debugging information related to mroute activity associated with the Multicast Virtual Private Network (MVPN) routing and forwarding (MVRF) instance specified for the vrf-name argument. (Optional) Displays high availability (HA) events associated with supervisor engine switchovers on Catalyst 6500 series switches, in Cisco IOS Release 12.2(33)SXH and subsequent 12.2SX releases. (Optional) Displays Reverse Path Forwarding (RPF) events associated with mroutes in the mroute table. (Optional) Displays timer-related events associated with mroutes in the mroute table. (Optional) IP address or Domain Name System (DNS) name of a multicast group. Entering a multicast group address restricts the output to only display mroute activity associated with the multicast group address specified for the optional group-address argument.
high-availability
Command Modes
Command History
Modification This command was introduced. The rpf-events keyword was added. The timers keyword, vrf keyword, and vrf-name argument were added. The timers keyword, vrf keyword, and vrf-name argument were added. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. The high-availability keyword was added in support of the PIM Triggered Joins feature.
DB-1159
Usage Guidelines
This command indicates when the router has made changes to the mroute table. Use the debug ip pim and debug ip mrouting commands consecutively to obtain additional multicast routing information. In addition, use the debug ip igmp command to learn why an mroute message is being displayed. This command generates a substantial amount of output. Use the optional group-address argument to limit the output to a single multicast group. In Cisco IOS 12.2(33)SXH and subsequent 12.2SX releases, the high-availability keyword was added in support of the PIM Triggered Joins feature to monitor HA events in the event of a supervisor engine switchover on a Catalyst 6500 series switch. The PIM Triggered Joins feature is an HA multicast enhancement that improves the reconvergence of mroutes after a supervisor engine switchover on a Catalyst 6500 series switch. After a service engine switchover, all instances of PIM running on the newly active supervisor engine will modify the value of the Generation ID (GenID) that is included in PIM hello messages sent to adjacent PIM neighbors. When an adjacent PIM neighbor receives a PIM hello message on an interface with a new GenID, the PIM neighbor will interpret the modified GenID as an indication that all mroutes states on that interface have been lost. A modified GenID, thus, is utilized as a mechanism to alert all adjacent PIM neighbors that PIM forwarding on that interface has been lost, which then triggers adjacent PIM neighbors to send PIM joins for all (*, G) and (S, G) mroute states that use that interface as an RPF interface.
Examples
The following lines show that multicast IP routes were deleted from the routing table:
MRT: Delete (10.0.0.0/8, 224.2.0.1) MRT: Delete (10.4.0.0/16, 224.2.0.1) MRT: Delete (10.6.0.0/16, 224.2.0.1)
The (*, G) entries are generally created by receipt of an Internet Group Management Protocol (IGMP) host report from a group member on the directly connected LAN or by a Protocol Independent Multicast (PIM) join message (in sparse mode) that this router receives from a router that is sending joins toward the Route Processor (RP). This router will in turn send a join toward the RP that creates the shared tree (or RP tree).
MRT: Create (*, 224.2.0.1), if_input NULL
The following lines are an example of creating an (S, G) entry that shows that an IP multicast packet (mpacket) was received on Ethernet interface 0. The second line shows a route being created for a source that is on a directly connected LAN. The RPF means Reverse Path Forwarding, whereby the router looks up the source address of the multicast packet in the unicast routing table and determines which interface will be used to send a packet to that source.
DB-1160
December 2010
MRT: Create (224.69.15.0/24, 225.2.2.4), if_input Ethernet0, RPF nbr 224.69.61.15 MRT: Create (224.69.39.0/24, 225.2.2.4), if_input Ethernet1, RPF nbr 0.0.0.0
The following lines show that multicast IP routes were added to the routing table. Note the 224.0.0.0 as the RPF, which means the route was created by a source that is directly connected to this router.
MRT: Create (10.9.0.0/16, 224.2.0.1), if_input Ethernet1, RPF nbr 224.0.0.0 MRT: Create (10.16.0.0/16, 224.2.0.1), if_input Ethernet1, RPF nbr 224.0.0.0
If the source is not directly connected, the neighbor address shown in these lines will be the address of the router that forwarded the packet to this router. The shortest path tree state maintained in routers consists of source (S), multicast address (G), outgoing interface (OIF), and incoming interface (IIF). The forwarding information is referred to as the multicast forwarding entry for (S, G). An entry for a shared tree can match packets from any source for its associated group if the packets come through the proper incoming interface as determined by the RPF lookup. Such an entry is denoted as (*, G). A (*, G) entry keeps the same information a (S, G) entry keeps, except that it saves the rendezvous point address in place of the source address in sparse mode or as 24.0.0.0 in dense mode. Table 146 describes the significant fields shown in the display.
Table 146 debug ip mrouting Field Descriptions
Related Commands
Command debug ip dvmrp debug ip igmp debug ip packet debug ip pim debug ip sd
Description Displays information on DVMRP packets received and sent. Displays IGMP packets received and sent, and IGMP host-related events. Displays general IP debugging information and IPSO security transactions. Displays all PIM announcements received. Displays all SD announcements received.
DB-1161
Syntax Description.
vrf vrf-name
(Optional) Logs per interface mroute state limiter and bandwidth-based multicast CAC policy events related to multicast groups associated with the Multicast Virtual Private Network (VPN) routing and forwarding (MVRF) instance specified for the vrf-name argument. (Optional) Multicast group address or group name for which to log per interface mroute state limiter and bandwidth-based multicast CAC policy events.
group-address
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command was integrated into Cisco IOS Release 12.2(33)SXI.
Usage Guidelines
This command may generate a substantial amount of output. Use the optional group-address argument to restrict the output to display only per interface mroute state limiter and bandwidth-based multicast CAC policy events related to a particular multicast group.
Examples
The following output is from the debug ip mrouting limits command. The output displays the following events:
An mroute state being created and the corresponding per interface mroute state limiter counter being increased by the default cost of 1 on incoming Ethernet interface 1/0. An mroute olist member being removed from the olist and the corresponding per interface mroute limiter being decreased by the default cost of 1 on outgoing Ethernet interface 1/0. An mroute being denied by the per interface mroute state limiter because the maximum number of mroute states has been reached. An mroute state being created and the corresponding per interface mroute state limiter counter being increased by the cost of 2 on incoming Ethernet interface 1/0. An mroute olist member being removed from the olist and the corresponding per interface mroute limiter being decreased by a cost of 2 on outgoing Ethernet interface 1/0.
DB-1162
December 2010
Router# debug ip mrouting limits MRL(0): incr-ed acl rpf-list to (13 < max 32), [n:0,p:0], (main) GigabitEthernet0/0, (10.41.0.41, 225.30.200.60) MRL(0): decr-ed acl out-list to (10 < max 32), [n:0,p:0], (main) GigabitEthernet0/0, (*, 225.40.202.60) MRL(0): Add mroute (10.43.0.43, 225.30.200.60) denied for GigabitEthernet0/2, acl std-list, (16 = max 16) MRL(0): incr-ed limit-acl `rpf-list' to (12 < max 32), cost-acl 'cost-list' cost 2, [n:0,p:0], (main) GigabitEthernet0/0, (10.41.0.41, 225.30.200.60) MRL(0): decr-ed limit-acl `out-list' to (8 < max 32), cost-acl 'cost-list'' cost 2, [n:0,p:0], (main) GigabitEthernet0/0, (*, 225.40.202.60)
Related Commands
Description Configures per interface mroute state limiters. Applies costs to per interface mroutes state limiters.
clear ip multicast limit Resets the exceeded counter for per interface mroute state limiters.
show ip multicast limit Displays statistics about configured per interface mroute state limiters.
DB-1163
debug ip msdp
To debug Multicast Source Discovery Protocol (MSDP) activity, use the debug ip msdp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip msdp [vrf vrf-name] [peer-address | name] [detail] [routes] no debug ip msdp [vrf vrf-name] [peer-address | name] [detail] [routes]
Syntax Description
(Optional) Supports the Multicast Virtual Private Network (VPN) routing and forwarding (VRF) instance. (Optional) Name assigned to the VRF. (Optional) The peer for which debug events are logged. (Optional) Provides more detailed debugging information. (Optional) Displays the contents of Source-Active messages.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The vrf keyword and vrf-name argument were added. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
Received 1388-byte message from peer SA TLV, len: 1388, ec: 115, RP: 172.31.3.92 Peer RPF check passed for 172.31.3.92, used EMBGP peer Forward 1388-byte SA to peer Received 1028-byte message from peer SA TLV, len: 1028, ec: 85, RP: 172.31.3.92 Peer RPF check passed for 172.31.3.92, used EMBGP peer Forward 1028-byte SA to peer Received 1388-byte message from peer SA TLV, len: 1388, ec: 115, RP: 172.31.3.111 Peer RPF check passed for 172.31.3.111, used EMBGP peer Forward 1388-byte SA to peer
DB-1164
December 2010
MSDP: MSDP: MSDP: MSDP: MSDP: MSDP: MSDP: MSDP: MSDP: MSDP: MSDP: MSDP:
224.150.44.250: 224.150.44.250: 224.150.44.250: 224.150.44.254: 224.150.44.254: 224.150.44.254: 224.150.44.254: 224.150.44.250: 224.150.44.254: 224.150.44.254: 224.150.44.254: 224.150.44.250:
Received 56-byte message from peer SA TLV, len: 56, ec: 4, RP: 205.167.76.241 Peer RPF check passed for 205.167.76.241, used EMBGP peer Forward 56-byte SA to peer Received 116-byte message from peer SA TLV, len: 116, ec: 9, RP: 172.31.3.111 Peer RPF check passed for 172.31.3.111, used EMBGP peer Forward 116-byte SA to peer Received 32-byte message from peer SA TLV, len: 32, ec: 2, RP: 172.31.3.78 Peer RPF check passed for 172.31.3.78, used EMBGP peer Forward 32-byte SA to peer
Description Protocol being debugged. IP address of the MSDP peer. MSDP event.
DB-1165
Syntax Description
vrf vrf-name
(Optional) Supports the Multicast Virtual Private Network (VPN) routing and forwarding (VRF) instance. (Optional) Name assigned to the VRF.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The vrf keyword and vrf-name argument were added. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-1166
December 2010
Syntax Description
Displays all multicast hardware switching debugging information, including errors, events, and packets for the specified group. Specifies the selected group. Specifies the source or group I.D. address. Displays error messages related to multicast hardware switching. Displays the run-time sequence of events for multicast hardware switching. Displays the run-time sequence of ha-errors for multicast hardware switching. Displays the run-time sequence of ha-events for multicast hardware switching.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug ip multicast hardware-switching command using the error keyword:
Router# debug ip multicast hardware-switching error 232.0.1.4 PE1-7600#debug ip multicast hardware-switching error 232.0.1.4 CMFIB-RP IPv4 error debugging enabled for group 232.0.1.4 PE1-7600#
DB-1167
The following example shows output from the debug ip multicast hardware-switching command using the event keyword:
Router# debug ip multicast hardware-switching event 232.0.1.4 CMFIB-RP IPv4 event debugging enabled for group 232.0.1.4 Router#
The following example shows output from the debug ip multicast hardware-switching command using the ha-event keyword:
Router# debug ip multicast hardware-switching ha-event 232.0.1.4 CMFIB-RP IPv4 ha event debugging enabled for group 232.0.1.4 PE1-7600# Router# Router#
The following example shows output from the debug ip multicast hardware-switching command using the ha-error keyword:
Router# debug ip multicast hardware-switching ha-error 232.0.1.4 CMFIB-RP IPv4 ha error debugging enabled for group 232.0.1.4 Router#
Related Commands
Description Downloads the interface and mask entry for IPv6 multicast packet.
DB-1168
December 2010
Syntax Description
default-vrf
(Optional) Restricts the logging of IP multicast events associated with Multicast Virtual Private Network routing and forwarding (MVRF) instances to events associated with the default MVRF. (Optional) Restricts the logging of IP multicast events associated with MVRFs to events associated with the MVRF specified for the vrf-name argument. (Optional) Restricts the output for multicast groups to events associated with the multicast group specified for the group-address argument. (Optional) Logs events that may occur frequently during normal operation, but that may be useful for tracking in short intervals.
vrf vrf-name
Command Default
IP multicast events related to all multicast groups and all MVRFs are displayed. Logging events enabled with the verbose keyword are not displayed.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRE. This command was integrated into Cisco IOS XE Release 2.6. This command was integrated into Cisco IOS Release 15.0(1)S.
Usage Guidelines
Use this command to display IP multicast redundancy events. This command logs events that are important in verifying nonstop forwarding (NSF) with stateful switchover (SSO) for IP multicast. The classes of events logged by the debug ip multicast redundancy command include stateful switchover events during a Route Processor (RP) switchover and dynamic synchronization events that occur during steady state operation. Use the optional verbose keyword to log events that may occur frequently during normal operation, but that may be useful for tracking in short intervals.
DB-1169
Examples
The following sample output from the debug ip multicast redundancy command shows the initial logging messages that display when the system detects an RP switchover:
00:10:33: %REDUNDANCY-3-SWITCHOVER: RP switchover (PEER_DOWN_INTERRUPT) 00:10:33: %REDUNDANCY-5-PEER_MONITOR_EVENT: Standby received a switchover (raw-event=PEER_DOWN_INTERRUPT(11)) *Aug 7 02:31:28.051: MCAST-HA: Received cf status CHKPT_STATUS_PEER_NOT_READY *Aug 7 02:31:28.063: MCAST-HA: Received cf status CHKPT_STATUS_PEER_NOT_READY *Aug 7 02:31:28.063: MCAST-HA-RF: Status event: status=RF_STATUS_PEER_COMM Op=0 RFState=STANDBY HOT *Aug 7 02:31:28.063: MCAST-HA-RF: Status event: status=RF_STATUS_OPER_REDUNDANCY_MODE_CHANGE Op=0 RFState=STANDBY HOT *Aug 7 02:31:28.063: MCAST-HA-RF: Status event: status=RF_STATUS_REDUNDANCY_MODE_CHANGE Op=0 RFState=STANDBY HOT *Aug 7 02:31:28.063: MCAST-HA-RF: Status event: status=RF_STATUS_PEER_PRESENCE Op=0 RFState=STANDBY HOT *Aug 7 02:31:28.063: MCAST-HA-RF: Status event: status=RF_STATUS_MAINTENANCE_ENABLE Op=0 RFState=ACTIVE-FAST *Aug 7 02:31:28.063: MCAST-HA-RF: Progression event: RF_Event=RF_PROG_ACTIVE_FAST RFState=ACTIVE-FAST *Aug 7 02:31:28.091: MCAST-HA-RF: Progression event: RF_Event=RF_PROG_ACTIVE_DRAIN RFState=ACTIVE-DRAIN *Aug 7 02:31:28.091: MCAST-HA-RF: Progression event: RF_Event=RF_PROG_ACTIVE_PRECONFIG RFState=ACTIVE_PRECONFIG *Aug 7 02:31:28.091: MCAST-HA-RF: Progression event: RF_Event=RF_PROG_ACTIVE_POSTCONFIG RFState=ACTIVE_POSTCONFIG *Aug 7 02:31:28.103: MCAST-HA: Received cf status CHKPT_STATUS_IPC_FLOW_ON *Aug 7 02:31:28.103: MCAST-HA-RF: Progression event: RF_Event=RF_PROG_ACTIVE RFState=ACTIVE
The following is sample output from the debug ip multicast redundancy command. As interfaces come up on the new active RP, unicast convergence occurs in parallel with a multicast route refresh from Protocol Independent Multicast (PIM) neighbors. Unicast convergence is followed by Reverse Path Forwarding (RPF) adjustments to the refreshed mroute information.
*Aug 7 02:31:28.107: MCAST-HA: handling for MVRF IPv4 default *Aug 7 02:31:28.107: MCAST-HA: handling for MVRF blue *Aug 7 02:31:28.107: MCAST-HA: handling for MVRF green *Aug 7 02:31:28.107: MCAST-HA: handling for MVRF red *Aug 7 02:31:28.107: MCAST-HA: handling for all MVRFs *Aug 7 02:31:28.111: MCAST-HA: handling. *Aug 7 02:31:28.111: MCAST-HA: Triggering RPF updates *Aug 7 02:31:28.111: MCAST-HA: handling. *Aug 7 02:31:28.111: MCAST-HA: RPF updates *Aug 7 02:31:28.111: MCAST-HA: handling. *Aug 7 02:31:28.111: MCAST-HA: RPF updates *Aug 7 02:31:28.111: MCAST-HA: handling. *Aug 7 02:31:28.111: MCAST-HA: RPF updates Triggering unicast convergence notification process Triggering unicast convergence notification process Triggering unicast convergence notification process Triggering unicast convergence notification process Triggering unicast convergence notification process Beginning unicast convergence notification process Unicast convergence completed for MVRF IPv4 default: Beginning unicast convergence notification process Unicast convergence completed for MVRF blue: Triggering
Beginning unicast convergence notification process Unicast convergence completed for MVRF green: Triggering
Beginning unicast convergence notification process Unicast convergence completed for MVRF red: Triggering
DB-1170
December 2010
*Aug 7 02:31:28.111: MCAST-HA: Unicast convergence notification has been received for the only unconverged VRF. Stopping the unicast routing convergence failsafe timer. *Aug 7 02:31:28.111: MCAST-HA: Beginning unicast convergence notification process handling. *Aug 7 02:31:28.111: MCAST-HA: Unicast convergence notification received for the wildcard tableid (all VRFs). Triggering RPF updates for all MVRFs and stopping the unicast IGP convergence failsafe timer. 00:10:34: %PIM-5-DRCHG: DR change from neighbor 0.0.0.0 to 172.16.1.1 on interface Loopback0 00:10:34: %PIM-5-DRCHG: DR change from neighbor 0.0.0.0 to 172.31.10.1 on interface Loopback1 00:10:35: %PIM-5-DRCHG: VRF green: DR change from neighbor 0.0.0.0 to 172.16.1.1 on interface Tunnel1 00:10:35: %PIM-5-DRCHG: VRF red: DR change from neighbor 0.0.0.0 to 172.16.1.1 on interface Tunnel2 00:10:35: %LINK-3-UPDOWN: Interface Null0, changed state to up 00:10:35: %LINK-3-UPDOWN: Interface Loopback0, changed state to up 00:10:35: %LINK-3-UPDOWN: Interface Loopback1, changed state to up 00:10:35: %LINK-3-UPDOWN: Interface Tunnel0, changed state to up 00:10:35: %LINK-3-UPDOWN: Interface Tunnel1, changed state to up 00:10:35: %LINK-3-UPDOWN: Interface Tunnel2, changed state to up 00:10:35: %LINK-5-CHANGED: Interface Ethernet0/0, changed state to administratively down 00:10:35: %LINK-5-CHANGED: Interface Ethernet0/1, changed state to administratively down 00:10:35: %LINK-5-CHANGED: Interface Ethernet0/2, changed state to administratively down 00:10:35: %LINK-5-CHANGED: Interface Ethernet0/3, changed state to administratively down 00:10:35: %LINK-5-CHANGED: Interface Ethernet1/0, changed state to administratively down 00:10:35: %LINK-5-CHANGED: Interface Ethernet1/1, changed state to administratively down 00:10:35: %LINK-5-CHANGED: Interface Ethernet1/2, changed state to administratively down 00:10:35: %LINK-5-CHANGED: Interface Ethernet1/3, changed state to administratively down 00:10:36: %LINEPROTO-5-UPDOWN: Line protocol on Interface Null0, changed state to up 00:10:36: %LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback0, changed state to up 00:10:36: %LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback1, changed state to up 00:10:36: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel0, changed state to up 00:10:36: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel1, changed state to up 00:10:36: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel2, changed state to up 00:10:38: %PIM-5-DRCHG: VRF blue: DR change from neighbor 0.0.0.0 to 172.16.1.1 on interface Tunnel0
The following is sample output from the debug ip multicast redundancy command. After the processing of unicast and multicast route convergence, time is allowed for Internet Group Management Protocol (IGMP) reporting. Following IGMP reporting, the control plane then sends out requests for the Multicast Forwarding Information Base (MFIB) replay of data driven events (DDEs) to retrigger multicast route information that cannot be obtained from PIM neighbors or directly connected hosts. After this processing completes, the control plane waits for the NSF hold-off time period to terminate. The refreshed multicast control plane information is then downloaded to the forwarding plane; once the download is completed, the stale multicast forwarding plane information is subsequently flushed.
*Aug 7 02:31:43.651: MCAST-HA: IGMP response timer expired. Ready for DDE replay for MVRF red *Aug 7 02:31:43.651: MCAST-HA: Sending DDE replay request for MVRF red. *Aug 7 02:31:43.651: MCAST-HA: MFIB DDE replay completed for mvrf red *Aug 7 02:31:43.651: MCAST-HA: No NSF Holdoff extension requested for mvrf red at completion of DDE replay. *Aug 7 02:31:43.651: MCAST-HA: Terminating multicast NSF holdoff for MVRF red *Aug 7 02:31:43.651: MCAST-HA: Still awaiting MFIB DDE replay for mvrf green DDE replay: NOT COMPLETED, MRIB update: NOT PENDING *Aug 7 02:31:43.651: MCAST-HA: IGMP response timer expired. Ready for DDE replay for MVRF green *Aug 7 02:31:43.651: MCAST-HA: Sending DDE replay request for MVRF green. *Aug 7 02:31:43.651: MCAST-HA: MFIB DDE replay completed for mvrf green
DB-1171
*Aug 7 02:31:43.651: MCAST-HA: No NSF Holdoff extension requested for mvrf green at completion of DDE replay. *Aug 7 02:31:43.651: MCAST-HA: Terminating multicast NSF holdoff for MVRF green *Aug 7 02:31:43.651: MCAST-HA: Still awaiting MFIB DDE replay for mvrf blue DDE replay: NOT COMPLETED, MRIB update: NOT PENDING *Aug 7 02:31:43.651: MCAST-HA: IGMP response timer expired. Ready for DDE replay for MVRF blue *Aug 7 02:31:43.651: MCAST-HA: Sending DDE replay request for MVRF blue. *Aug 7 02:31:43.651: MCAST-HA: MFIB DDE replay completed for mvrf blue *Aug 7 02:31:43.651: MCAST-HA: No NSF Holdoff extension requested for mvrf blue at completion of DDE replay. *Aug 7 02:31:43.651: MCAST-HA: Terminating multicast NSF holdoff for MVRF blue *Aug 7 02:31:43.651: MCAST-HA: Still awaiting MFIB DDE replay for mvrf IPv4 default DDE replay: NOT COMPLETED, MRIB update: NOT PENDING *Aug 7 02:31:43.651: MCAST-HA: IGMP response timer expired. Ready for DDE replay for MVRF IPv4 default *Aug 7 02:31:43.651: MCAST-HA: Sending DDE replay request for MVRF IPv4 default. *Aug 7 02:31:43.651: MCAST-HA: MFIB DDE replay completed for mvrf IPv4 default *Aug 7 02:31:43.651: MCAST-HA: No NSF Holdoff extension requested for mvrf IPv4 default at completion of DDE replay. *Aug 7 02:31:43.651: MCAST-HA: Terminating multicast NSF holdoff for MVRF IPv4 default *Aug 7 02:31:43.651: MCAST-HA: MFIB DDE replay completed for all MVRFs. *Aug 7 02:31:43.651: MCAST-HA: Stopping the MFIB DDE replay failsafe timer. *Aug 7 02:32:13.651: MCAST-HA: IPv4 default *Aug 7 02:32:13.651: MCAST-HA: blue *Aug 7 02:32:13.651: MCAST-HA: green *Aug 7 02:32:13.651: MCAST-HA: *Aug 7 02:32:14.151: MCAST-HA: complete for MVRF IPv4 default. *Aug 7 02:32:14.151: MCAST-HA: complete for MVRF blue. *Aug 7 02:32:14.151: MCAST-HA: complete for MVRF green. *Aug 7 02:32:14.151: MCAST-HA: complete for MVRF red. *Aug 7 02:32:14.151: MCAST-HA: Flush timer expired. Starting final RPF check for MVRF Flush timer expired. Starting final RPF check for MVRF Flush timer expired. Starting final RPF check for MVRF Flush timer expired. Starting final RPF check for MVRF red Flushing stale mcast state. RP failover processing Flushing stale mcast state. RP failover processing Flushing stale mcast state. RP failover processing Flushing stale mcast state. RP failover processing RP failover processing complete for all MVRFs.
The following is sample output from the debug ip multicast redundancy command. This output shows the events related to the reloading of the standby RP, in particular, ISSU negotiation between the active and standby RP and synchronization of dynamic multicast forwarding information from the active RP to the standby RP. Synchronization events are also logged in steady state for events that occur that affect dynamic group-to-RP mapping information or dynamic tunnel state.
00:11:50: %HA-6-MODE: Operating RP redundancy mode is SSO *Aug 7 02:32:45.435: MCAST-HA-RF: Status event: status=RF_STATUS_OPER_REDUNDANCY_MODE_CHANGE Op=7 RFState=ACTIVE *Aug 7 02:32:45.435: MCAST-HA-RF: Status event: status=RF_STATUS_REDUNDANCY_MODE_CHANGE Op=7 RFState=ACTIVE *Aug 7 02:32:45.435: MCAST-HA-RF: Status event: status=RF_STATUS_PEER_PRESENCE Op=1 RFState=ACTIVE *Aug 7 02:32:45.463: MCAST-HA-RF: Status event: status=RF_STATUS_PEER_COMM Op=1 RFState=ACTIVE *Aug 7 02:32:45.563: MCAST-HA-RF: Progression event: RF_Event=RF_PROG_ISSU_NEGOTIATION RFState=ACTIVE *Aug 7 02:32:46.039: MCAST-HA-RF: Progression event: RF_Event=RF_PROG_PLATFORM_SYNC RFState=ACTIVE *Aug 7 02:32:46.979: MCAST-HA: Received cf status CHKPT_STATUS_PEER_READY *Aug 7 02:32:46.979: MCAST-ISSU Handling communication up transition for PIM HA transport type 0, RF comm = TRUE, renegotiation NOT PENDING
DB-1172
December 2010
*Aug 7 02:32:46.979: MCAST-HA: Received cf status CHKPT_STATUS_IPC_FLOW_ON *Aug 7 02:32:47.043: MCAST-HA-RF: Progression event: RF_Event=RF_PROG_STANDBY_ISSU_NEGOTIATION_LATE RFState=ACTIVE *Aug 7 02:32:50.943: MCAST-HA-RF: Progression event: RF_Event=RF_PROG_STANDBY_CONFIG RFState=ACTIVE *Aug 7 02:32:50.947: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.947: MCAST-HA-RF: Started PIM ISSU negotiation on the primary RP. *Aug 7 02:32:50.947: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.947: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.951: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.951: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.951: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.951: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.955: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.955: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.955: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.955: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.959: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.959: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.959: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.959: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.959: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.963: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.963: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.963: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.963: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.967: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.967: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.967: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.967: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.967: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.971: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.971: MCAST-ISSU Negotiation message sent from primary, rc = 0 *Aug 7 02:32:50.971: MCAST-ISSU Negotiation completed for PIM Checkpoint Facility client, negotiation rc = 4, negotiation result = COMPATIBLE *Aug 7 02:32:59.927: MCAST-HA-RF: Progression event: RF_Event=RF_PROG_STANDBY_FILESYS RFState=ACTIVE *Aug 7 02:32:59.963: MCAST-HA-RF: Progression event: RF_Event=RF_PROG_STANDBY_BULK RFState=ACTIVE *Aug 7 02:32:59.963: MCAST-HA-RF: Starting Bulk Sync. *Aug 7 02:32:59.963: MCAST-HA: Successfully created the bulk sync process *Aug 7 02:32:59.963: MCAST-HA: Starting Bulk sync *Aug 7 02:32:59.963: MCAST HA Executing RP mapping bulk sync. *Aug 7 02:32:59.963: MCAST HA Executing Bidir RP route bulk sync. *Aug 7 02:32:59.963: MCAST HA Executing BSR cache bulk sync. *Aug 7 02:32:59.963: MCAST-HA BSR cache sync request received for mvrf IPv4 default *Aug 7 02:32:59.963: MCAST-HA: Creating Bootstrap cache sync request chunk size=112 max=585 align=8 *Aug 7 02:32:59.963: MCAST-HA: Allocating Bootstrap cache sync request sync request *Aug 7 02:32:59.963: MCAST-HA Formatting BSR cache sync message: search for mvrf IPv4 default result is 0 mvrf at 0x4A21680 *Aug 7 02:32:59.971: MCAST-HA BSR cache sync request received for mvrf blue *Aug 7 02:32:59.971: MCAST-HA: Allocating Bootstrap cache sync request sync request *Aug 7 02:32:59.971: MCAST-HA Formatting BSR cache sync message: search for mvrf blue result is 0 mvrf at 0x50EE660 *Aug 7 02:32:59.983: MCAST-HA BSR cache sync request received for mvrf green *Aug 7 02:32:59.983: MCAST-HA: Allocating Bootstrap cache sync request sync request *Aug 7 02:32:59.983: MCAST-HA Formatting BSR cache sync message: search for mvrf green result is 0 mvrf at 0x5103300 *Aug 7 02:32:59.991: MCAST-HA BSR cache sync request received for mvrf red *Aug 7 02:32:59.991: MCAST-HA: Allocating Bootstrap cache sync request sync request *Aug 7 02:32:59.991: MCAST-HA Formatting BSR cache sync message: search for mvrf red result is 0 mvrf at 0x5135FE0 *Aug 7 02:33:00.003: MCAST HA Executing AutoRP discovery IDB bulk sync.
DB-1173
*Aug 7 02:33:00.003: MCAST-HA AutoRP discovery IDB sync request received for mvrf IPv4 default *Aug 7 02:33:00.003: MCAST-HA: Creating Autorp discovery IDB sync request chunk size=112 max=585 align=8 *Aug 7 02:33:00.003: MCAST-HA: Allocating Autorp discovery IDB sync request sync request *Aug 7 02:33:00.003: MCAST-HA Formatting AutoRP discovery IDB sync message: search for mvrf IPv4 default result is 0 mvrf at 0x4A21680 *Aug 7 02:33:00.011: MCAST-HA AutoRP discovery IDB sync request received for mvrf blue *Aug 7 02:33:00.011: MCAST-HA: Allocating Autorp discovery IDB sync request sync request *Aug 7 02:33:00.011: MCAST-HA Formatting AutoRP discovery IDB sync message: search for mvrf blue result is 0 mvrf at 0x50EE660 *Aug 7 02:33:00.023: MCAST-HA AutoRP discovery IDB sync request received for mvrf green *Aug 7 02:33:00.023: MCAST-HA: Allocating Autorp discovery IDB sync request sync request *Aug 7 02:33:00.023: MCAST-HA Formatting AutoRP discovery IDB sync message: search for mvrf green result is 0 mvrf at 0x5103300 *Aug 7 02:33:00.031: MCAST-HA AutoRP discovery IDB sync request received for mvrf red *Aug 7 02:33:00.031: MCAST-HA: Allocating Autorp discovery IDB sync request sync request *Aug 7 02:33:00.031: MCAST-HA Formatting AutoRP discovery IDB sync message: search for mvrf red result is 0 mvrf at 0x5135FE0 *Aug 7 02:33:00.043: MCAST HA Executing dummy bulk sync function. *Aug 7 02:33:00.043: MCAST HA Executing dummy bulk sync function. *Aug 7 02:33:00.043: MCAST HA Executing dummy bulk sync function. *Aug 7 02:33:00.043: MCAST HA Executing MDT tunnel bulk sync. *Aug 7 02:33:00.043: MCAST-HA MDT tunnel sync request received for mvrf blue *Aug 7 02:33:00.043: MCAST-HA: Creating MDT tunnel sync request chunk size=112 max=585 align=8 *Aug 7 02:33:00.043: MCAST-HA: Allocating MDT tunnel sync request sync request *Aug 7 02:33:00.043: MCAST-HA Formatting MDT tunnel sync message: search for mvrf blue result is 0 mvrf at 0x50EE660 *Aug 7 02:33:00.051: MCAST-HA MDT tunnel sync request received for mvrf green *Aug 7 02:33:00.051: MCAST-HA: Allocating MDT tunnel sync request sync request *Aug 7 02:33:00.051: MCAST-HA Formatting MDT tunnel sync message: search for mvrf green result is 0 mvrf at 0x5103300 *Aug 7 02:33:00.063: MCAST-HA MDT tunnel sync request received for mvrf red *Aug 7 02:33:00.063: MCAST-HA: Allocating MDT tunnel sync request sync request *Aug 7 02:33:00.063: MCAST-HA Formatting MDT tunnel sync message: search for mvrf red result is 0 mvrf at 0x5135FE0 *Aug 7 02:33:00.071: MCAST HA Executing Bidir RP DF bulk sync. *Aug 7 02:33:00.071: MCAST HA Executing register tunnel bulk sync. *Aug 7 02:33:00.071: MCAST-HA: Completed enqueuing of bulk sync messages. *Aug 7 02:33:00.071: MCAST-HA: Bulk sync message queue has drained. *Aug 7 02:33:00.071: MCAST-HA: Received acknowledgement from standby for all bulk sync messages. *Aug 7 02:33:00.071: MCAST-HA Creating bulk sync completion message for peer. *Aug 7 02:33:00.071: MCAST-HA: Primary has notified standby of bulk sync completion. Waiting for final bulk sync ACK from stby. *Aug 7 02:33:00.075: MCAST-HA: Received cf status CHKPT_STATUS_SEND_OK *Aug 7 02:33:00.075: MCAST-HA: Sent message type is 2 *Aug 7 02:33:00.075: MCAST-HA Searching for sync request corresponding to the successfully received message. *Aug 7 02:33:00.075: MCAST-HA Transmission from primary and reception by standby confirmed for sync type 2. Cleanup is complete. *Aug 7 02:33:00.075: MCAST-HA: Received cf status CHKPT_STATUS_SEND_OK *Aug 7 02:33:00.075: MCAST-HA: Sent message type is 2 *Aug 7 02:33:00.075: MCAST-HA Searching for sync request corresponding to the successfully received message. *Aug 7 02:33:00.075: MCAST-HA Transmission from primary and reception by standby confirmed for sync type 2. Cleanup is complete. *Aug 7 02:33:00.075: MCAST-HA: Received cf status CHKPT_STATUS_SEND_OK *Aug 7 02:33:00.075: MCAST-HA: Sent message type is 2
DB-1174
December 2010
*Aug 7 02:33:00.075: MCAST-HA Searching for sync request corresponding to the successfully received message. *Aug 7 02:33:00.075: MCAST-HA Transmission from primary and reception by standby confirmed for sync type 2. Cleanup is complete. *Aug 7 02:33:00.087: MCAST-HA: Received cf status CHKPT_STATUS_SEND_OK *Aug 7 02:33:00.087: MCAST-HA: Sent message type is 2 *Aug 7 02:33:00.087: MCAST-HA Searching for sync request corresponding to the successfully received message. *Aug 7 02:33:00.087: MCAST-HA Transmission from primary and reception by standby confirmed for sync type 2. Cleanup is complete. *Aug 7 02:33:00.087: MCAST-HA: Received cf status CHKPT_STATUS_SEND_OK *Aug 7 02:33:00.087: MCAST-HA: Sent message type is 3 *Aug 7 02:33:00.087: MCAST-HA Searching for sync request corresponding to the successfully received message. *Aug 7 02:33:00.087: MCAST-HA Transmission from primary and reception by standby confirmed for sync type 3. Cleanup is complete. *Aug 7 02:33:00.087: MCAST-HA: Received cf status CHKPT_STATUS_SEND_OK *Aug 7 02:33:00.087: MCAST-HA: Sent message type is 3 *Aug 7 02:33:00.087: MCAST-HA Searching for sync request corresponding to the successfully received message. *Aug 7 02:33:00.087: MCAST-HA Transmission from primary and reception by standby confirmed for sync type 3. Cleanup is complete. *Aug 7 02:33:00.087: MCAST-HA: Received cf status CHKPT_STATUS_SEND_OK *Aug 7 02:33:00.087: MCAST-HA: Sent message type is 3 *Aug 7 02:33:00.087: MCAST-HA Searching for sync request corresponding to the successfully received message. *Aug 7 02:33:00.087: MCAST-HA Transmission from primary and reception by standby confirmed for sync type 3. Cleanup is complete. *Aug 7 02:33:00.087: MCAST-HA: Received cf status CHKPT_STATUS_SEND_OK *Aug 7 02:33:00.087: MCAST-HA: Sent message type is 3 *Aug 7 02:33:00.087: MCAST-HA Searching for sync request corresponding to the successfully received message. *Aug 7 02:33:00.087: MCAST-HA Transmission from primary and reception by standby confirmed for sync type 3. Cleanup is complete. *Aug 7 02:33:00.087: MCAST-HA: Received cf status CHKPT_STATUS_SEND_OK *Aug 7 02:33:00.087: MCAST-HA: Sent message type is 8 *Aug 7 02:33:00.087: MCAST-HA Searching for sync request corresponding to the successfully received message. *Aug 7 02:33:00.087: MCAST-HA Transmission from primary and reception by standby confirmed for sync type 8. Cleanup is complete. *Aug 7 02:33:00.087: MCAST-HA: Received cf status CHKPT_STATUS_SEND_OK *Aug 7 02:33:00.087: MCAST-HA: Sent message type is 8 *Aug 7 02:33:00.087: MCAST-HA Searching for sync request corresponding to the successfully received message. *Aug 7 02:33:00.087: MCAST-HA Transmission from primary and reception by standby confirmed for sync type 8. Cleanup is complete. *Aug 7 02:33:00.087: MCAST-HA: Received cf status CHKPT_STATUS_SEND_OK *Aug 7 02:33:00.087: MCAST-HA: Sent message type is 8 *Aug 7 02:33:00.087: MCAST-HA Searching for sync request corresponding to the successfully received message. *Aug 7 02:33:00.087: MCAST-HA Transmission from primary and reception by standby confirmed for sync type 8. Cleanup is complete. *Aug 7 02:33:00.087: MCAST-HA: Received cf status CHKPT_STATUS_SEND_OK *Aug 7 02:33:00.087: MCAST-HA: Sent message type is 11 *Aug 7 02:33:00.087: MCAST-HA Process: Primary RP received standby ACK for reception of bulk sync completion message. *Aug 7 02:33:00.087: MCAST-HA Notifying RF to continue progression. *Aug 7 02:33:00.087: MCAST-HA: Wakeup received for bulk sync completion. major = 4, minor = 2. *Aug 7 02:33:00.091: MCAST-HA Process: Primary RP received bulk sync completion confirmation from standby. *Aug 7 02:33:00.091: MCAST-HA RF notification previously sent. *Aug 7 02:33:00.455: MCAST-HA-RF: Progression event: RF_Event=RF_PROG_STANDBY_HOT RFState=ACTIVE
DB-1175
00:12:05: %HA_CONFIG_SYNC-6-BULK_CFGSYNC_SUCCEED: Bulk Sync succeeded 00:12:05: %HA-6-STANDBY_READY: Standby RP in slot 7 is operational in SSO 00:12:05: %RF-5-RF_TERMINAL_STATE: Terminal state reached for (SSO)
mode
DB-1176
December 2010
Syntax Description
Command Modes
Command History
Release 15.0(1)M
Usage Guidelines
Examples
The following example shows how to enable debugging output for IP multicast RPF tracked events:
Router# debug ip multicast rpf tracked
Related Commands
DB-1177
Syntax Description
Command Modes
Command History
Release
Modification
Usage Guidelines
Use this command when IP multicast stream topology creation, IP multicast stream topology deletion, or IP multicast stream ACL matching appears not to be functioning.
Examples
The following example shows how to enable debugging output for IP multicast stream topology creation events, IP multicast stream topology deletion events, and IP multicast stream ACL matching events:
Router# debug ip multicast topology
Related Commands
Command
Description
ip multicast rpf select topology Associates a multicast topology with a multicast group with a specific mroute entry. ip multicast topology show ip multicast topology Configures topology selection for multicast streams. Displays IP multicast topology information.
DB-1178
December 2010
debug ip nat
To display information about IP packets translated by the IP Network Address Translation (NAT) feature, use the debug ip nat command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip nat [access-list | cce | detailed | h323 | error | fragment | generic | ipsec | multipart | nvi | piggy-back | port | pptp | route | sbc | sip | skinny | tcp-alg | vrf | wlan-nat] no debug ip nat [access-list | cce | detailed | h323 | error | fragment | generic | ipsec | multipart | nvi | piggy-back | port | pptp | route | sbc | sip | skinny | tcp-alg | vrf | wlan-nat]
Syntax Description
(Optional) Standard IP access list number. If the datagram is not permitted by the specified access list, the related debugging output is suppressed. (Optional) Displays debug information for all Common Classification Engine (CCE) events. (Optional) Displays debugging information in a detailed format. (Optional) Displays H.225, H.245, and H.323 protocol information. (Optional) Displays debug information for error conditions in NAT-Application Layer Gateway (ALG) segmentation with Layer 4 forwarding. (Optional) Displays fragment events. (Optional) Displays generic ALG handler events. (Optional) Displays IPsec packet information. (Optional) Displays multipart processing information. (Optional) Displays NAT Virtual Interface (NVI) events. (Optional) Displays piggyback support events. (Optional) Displays port information. (Optional) Displays Point-to-Point Tunneling Protocol (PPTP) information. (Optional) Displays route information. (Optional) Displays NAT Session Initiation Protocol (SIP) Session Border Controller (SBC) events. (Optional) Displays SIP information. (Optional) Displays skinny protocol debug information. (Optional) Displays debug information for NAT-ALG segmentation with Layer 4 forwarding. (Optional) Displays VPN routing and forwarding (VRF) traffic-related information. (Optional) Displays Wireless LAN (WLAN) information.
fragment generic ipsec multipart nvi piggy-back port pptp route sbc sip skinny tcp-alg vrf wlan-nat
Command Modes
DB-1179
Command History
Release 11.2 12.1(5)T 12.2(8)T 12.2(13)T 12.3(2)XE 12.3(7)T 12.3(11)T 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was modified. The h323 keyword was added. This command was modified. The sip keyword was added. This command was modified. The ipsec and vrf keywords were added. This command was modified. The wlan-nat keyword was added. This command was modified. The wlan-nat keyword was implemented in Cisco IOS Release 12.3(7)T. This command was modified. The output of the h323 keyword was expanded to include H.245 tunneling. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was modified. The multipart keyword was added. This command was modified. The cce keyword was removed and the tcp-alg keyword was added.
15.0(1)M 15.1(3)T
Usage Guidelines
The NAT feature reduces the need for unique, registered IP addresses. It can also save private network administrators from needing to renumber the hosts and routers that do not conform to global IP addressing. Use the debug ip nat command to verify the operation of the NAT feature by displaying information about each packet that the router translates. The debug ip nat detailed command generates a description of each packet considered for translation. This command also displays information about certain errors or exception conditions, such as the failure to allocate a global address. To display messages related to the processing of H.225 signaling and H.245 messages, use the debug ip nat h323 command. To display messages related to the processing of SIP messages, use the debug ip nat sip command. To display messages related to the processing of VRF messages, use the debug ip nat vrf command. To display messages related to the processing of SIP multipart messages, use the debug ip nat sip command.
Caution
Because the debug ip nat command generates a substantial amount of output, use it only when traffic on the IP network is low, so that the other activity on the system is not adversely affected.
Examples
The following is sample output from the debug ip nat command. In this example, the first two lines show the Domain Name System (DNS) request and reply debugging output. The remaining lines show debugging output from a Telnet connection from a host on the inside of the network to a host on the outside of the network. All Telnet packets, except for the first packet, were translated in the fast path, as indicated by the asterisk (*).
Router# debug ip nat NAT: s=192.0.2.1->203.0.112.1, d=203.0.112.254 [6825] NAT: s=203.0.112.254, d=203.0.112.1->192.0.2.1 [21852] NAT: s=192.0.2.1->203.0.112.1, d=203.0.112.200 [6826] NAT*: s=203.0.112.200, d=203.0.112.1->192.0.2.1 [23311] NAT*: s=192.0.2.1->203.0.112.1, d=203.0.112.200 [6827] NAT*: s=192.0.2.1->203.0.112.1, d=203.0.112.200 [6828]
DB-1180
December 2010
Field NAT
Description Indicates that the packet is being translated by NAT. An asterisk (*) indicates that the translation is occurring in the fast path. The first packet in a conversation always goes through the slow path (that is, it is process switched). The remaining packets go through the fast path if a cache entry exists. Source address of the packet and how it is being translated. Destination address of the packet. IP identification number of the packet. Might be useful in the debugging process to correlate with other packet traces from protocol analyzers.
The following is sample output from the debug ip nat detailed command. In this example, the first two lines show the debugging output produced by a DNS request and reply. The remaining lines show the debugging output from a Telnet connection from a host on the inside of the network to a host on the outside of the network. In this example, the inside host 192.168.1.95 was assigned the global address 172.31.233.193. The output fields are self-explanatory.
Router# debug ip nat detailed NAT: i: udp (192.168.1.95, 1493) -> (172.31.2.132, NAT: o: udp (172.31.2.132, 53) -> (172.31.233.193, NAT*: i: tcp (192.168.1.95, 1135) -> (172.31.2.75, NAT*: o: tcp (172.31.2.75, 23) -> (172.31.233.193, NAT*: i: tcp (192.168.1.95, 1135) -> (172.31.2.75, NAT*: i: tcp (192.168.1.95, 1135) -> (172.31.2.75, NAT*: o: tcp (172.31.2.75, 23) -> (172.31.233.193, NAT*: o: tcp (172.31.2.75, 23) -> (172.31.233.193, 53) [22399] 1493) [63671] 23) [22400] 1135) [22002] 23) [22401] 23) [22402] 1135) [22060] 1135) [22071]
The following is sample output from the debug ip nat h323 command. In this example, an H.323 call is established between two hosts, one host on the inside and the other host on the outside of the network. The debugging output displays the H.323 message names that NAT recognizes and the embedded IP addresses contained in those messages.
Router# debug ip nat h323 NAT:H225:[0] NAT:H225:[0] NAT:H225:[0] NAT:H225:[0] NAT:H225:[0] NAT:H245:[0] number 1 NAT:H245:[0] NAT:H245:[0] NAT:H225:[0] NAT:H245:[0] number 1 NAT:H245:[0] NAT:H245:[0] processing a Setup message found Setup sourceCallSignalling fix transportAddress addr=192.168.122.50 port=11140 found Setup fastStart Setup fastStart PDU length:18 processing OpenLogicalChannel message, forward channel found OLC forward mediaControlChannel fix TransportAddress addr=192.168.122.50 port=16517 Setup fastStart PDU length:29 Processing OpenLogicalChannel message, forward channel found OLC reverse mediaChannel fix Transportaddress addr=192.168.122.50 port=16516
DB-1181
NAT:H245:[0] found OLC reverse mediaControlChannel NAT:H245:[0] fix TransportAddress addr=192.168.122.50 port=16517 NAT:H225:[1] processing an Alerting message NAT:H225:[1] found Alerting fastStart NAT:H225:[1] Alerting fastStart PDU length:25 NAT:H245:[1] processing OpenLogicalChannel message, forward channel number 1 NAT:H323:[0] received pak, payload_len=46 NAT:H323:[0] processed up to new_payload_len 4 NAT:H323:[0] expecting data len=42--payload_len left 42 NAT:H323:[0] try to process tpkt with len 42, payload_len left 42 NAT:H225:processing a Facility message NAT:H225:pdu_len :31 msg_IE:28 NAT:H323:choice-value:9 NAT:H225:[0] found h245Tunneling NAT:H225:[0] found h245Control NAT:H225:[0] h245control PDU length:20 NAT:H245:[0] processing OpenLogicalChannel message, forward channel number 2 NAT:H245:[0] found OLC forward mediaControlChannel NAT:H245:[0] fix TransportAddress addr=192.168.122.50 port=51001 NAT:H245:[0] TransportAddress addr changed 192.168.122.50->172.31.122.129 NAT:H245:[0] message changed, encoding back NAT:H245:exit process tpkt with new_len 20 NAT:H225:message changed, encoding back NAT:H323:[0] processed up to new_payload_len 46 NAT:H323:[0] new pak payload len is 46
Description Indicates that the packet is being translated by NAT. Protocol of the packet. Indicates that the packet is moving from a host outside the network to one host inside the network. Indicates that the packet is moving from a host inside the network to one host outside the network.
The following is sample output from the debug ip nat ipsec command. The output fields are self-explanatory.
Router# debug ip nat ipsec 5d21h:NAT:new IKE going In->Out, source addr 192.168.122.35, destination addr 192.168.22.20, initiator cookie 0x9C42065D 5d21h:NAT:IPSec:created In->Out ESP translation IL=192.168.122.35 SPI=0xAAE32A0A, IG=192.168.22.40, OL=192.168.22.20, OG=192.168.22.20 5d21h:NAT:IPSec:created Out->In ESP translation OG=192.168.22.20 SPI=0xA64B5BB6, OL=192.168.22.20, IG=192.168.22.40, IL=192.168.122.35
DB-1182
December 2010
5d21h:NAT:new IKE going In->Out, source addr 192.168.122.20, destination addr 192.168.22.20, initiator cookie 0xC91738FF 5d21h:NAT:IPSec:created In->Out ESP translation IL=192.168.122.20 SPI=0x3E2E1B92, IG=192.168.22.40, OL=192.168.22.20, OG=192.168.22.20 5d21h:NAT:IPSec:Inside host (IL=192.168.122.20) trying to open an ESP connection to Outside host (OG=192.168.22.20), wait for Out->In reply 5d21h:NAT:IPSec:created Out->In ESP translation OG=192.168.22.20 SPI=0x1B201366, OL=192.168.22.20, IG=192.168.22.40, IL=192.168.122.20
The following is sample output from the debug ip nat sip command. In this example, one IP phone registers with a Cisco SIP proxy and then calls another IP phone. The debugging output displays the SIP messages that NAT recognizes and the embedded IP addresses contained in those messages.
Router# debug ip nat sip NAT:SIP:[0] processing REGISTER message NAT:SIP:[0] translated embedded address 192.168.122.3->10.1.1.1 NAT:SIP:[0] translated embedded address 192.168.122.3->10.1.1.1 NAT:SIP:[0] message body found NAT:SIP:[0] found address/port in SDP body:192.168.122.20 20332 NAT:SIP:[1] processing SIP/2.0 100 Trying reply message NAT:SIP:[1] translated embedded address 10.1.1.1->192.168.122.3 NAT:SIP:[1] processing SIP/2.0 200 OK reply message NAT:SIP:[1] translated embedded address 10.1.1.1->192.168.122.3 NAT:SIP:[1] translated embedded address 10.1.1.1->192.168.122.3 NAT:SIP:[1] processing INVITE message NAT:SIP:[1] translated embedded address 10.1.1.1->192.168.122.3 NAT:SIP:[1] message body found NAT:SIP:[1] found address/port in SDP body:192.168.22.20
Description Indicates that the packet is being translated by NAT. Protocol of the packet. Indicates that the packet is moving from a host outside the network to one host inside the network. Indicates that the packet is moving from a host inside the network to one host outside the network.
The following is sample output from the debug ip nat tcp-alg command:
Router# debug ip nat tcp-alg *Oct *Oct 6 04:56:13.411: 6 04:56:13.411: NAT-L4F:setting ALG_NEEDED flag in subblock NAT-L4F : Still in the spoofing mode, tcpflags = 0x4
DB-1183
*Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct
6 04:56:13.411: 6 04:56:13.427:
6 04:56:23.807: NAT-L4F:setting ALG_NEEDED flag in subblock 6 04:56:23.807: NAT-L4F: Policy check successful 6 04:56:23.807: NAT-L4F: received fd1: 1073741825 and tcp flags = 0x2, payload_len = 0 6 04:56:23.811: NAT-L4F:setting ALG_NEEDED flag in subblock 6 04:56:23.811: NAT-L4F: received fd2: 1073741826 and tcp flags = 0x12,payload_len = 0 6 04:56:23.811: NAT-L4F:setting ALG_NEEDED flag in subblock 6 04:56:23.811: NAT-L4F: Received final ACK from fd1 : 1073741825 and tcp flags = 0x10 6 04:56:23.811: NAT-L4F:Transistioning to proxy: rc 0 error 0 6 04:56:23.811: NAT-ALG: H.225/H.245 ASN encode/decode library initialized 6 04:56:23.811: NAT-L4F: Successfully proxied this flow 6 04:56:23.811: NAT-L4F:setting ALG_NEEDED flag in subblock 6 04:56:23.811: NAT-ALG: lookup=0 l7_bytes_recd=12 appl_type=5 6 04:56:23.811: NAT-ALG: Skinny l7_msg_size = 12 6 04:56:23.811: NAT-ALG: after state machine: 6 04:56:23.811: NAT-ALG: remaining_hdr_sz=0 6 04:56:23.811: NAT-ALG: remaining_payl_sz=0 6 04:56:23.811: NAT-ALG: tcp_alg_state=0 6 04:56:23.811: NAT-ALG: complete_msg_len=12 6 04:56:23.811: l4f_send returns 12 bytes 6 04:56:23.811: Complete buffer written to proxy 6 04:56:23.811: NAT-L4F:NO DATA to read 6 04:56:23.815: NAT-L4F:setting ALG_NEEDED flag in subblock 6 04:56:24.027: NAT-L4F:setting ALG_NEEDED flag in subblock 6 04:56:24.027: NAT-ALG: lookup=0 l7_bytes_recd=56 appl_type=5 6 04:56:24.027: NAT-ALG: Skinny l7_msg_size = 56 6 04:56:24.027: NAT-ALG: after state machine: 6 04:56:24.027: NAT-ALG: remaining_hdr_sz=0 6 04:56:24.027: NAT-ALG: remaining_payl_sz=0 6 04:56:24.027: NAT-ALG: tcp_alg_state=0 6 04:56:24.027: NAT-ALG: complete_msg_len=56 6 04:56:24.027: l4f_send returns 56 bytes 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 04:56:24.027: 04:56:24.027: 04:56:24.035: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: Complete buffer written to proxy NAT-L4F:NO DATA to read NAT-L4F:setting ALG_NEEDED flag in subblock NAT-L4F:setting ALG_NEEDED flag in subblock NAT-ALG: lookup=0 l7_bytes_recd=16 appl_type=5 NAT-ALG: Skinny l7_msg_size = 16 NAT-ALG: after state machine: NAT-ALG: remaining_hdr_sz=0 NAT-ALG: remaining_payl_sz=0 NAT-ALG: tcp_alg_state=0 NAT-ALG: complete_msg_len=16 l4f_send returns 16 bytes Complete buffer written to proxy NAT-L4F:NO DATA to read NAT-L4F:setting ALG_NEEDED flag in subblock NAT-ALG: lookup=1 l7_bytes_recd=116 appl_type=5 NAT-ALG: Skinny l7_msg_size = 116 NAT-ALG: after state machine: NAT-ALG: remaining_hdr_sz=0 NAT-ALG: remaining_payl_sz=0 NAT-ALG: tcp_alg_state=0 NAT-ALG: complete_msg_len=116 l4f_send returns 116 bytes Complete buffer written to proxy NAT-L4F:NO DATA to read NAT-L4F:setting ALG_NEEDED flag in subblock
DB-1184
December 2010
*Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct *Oct
6 6 6 6 6 6 6 6 6 6 6 6 6 6
04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.239: 04:56:24.243: 04:56:24.243: 04:56:24.243: 04:56:24.243:
NAT-ALG: lookup=0 l7_bytes_recd=32 appl_type=5 NAT-ALG: Skinny l7_msg_size = 32 NAT-ALG: after state machine: NAT-ALG: remaining_hdr_sz=0 NAT-ALG: remaining_payl_sz=0 NAT-ALG: tcp_alg_state=0 NAT-ALG: complete_msg_len=32 l4f_send returns 32 bytes Complete buffer written to proxy NAT-L4F:NO DATA to read NAT-L4F:setting ALG_NEEDED flag in subblock NAT-L4F:read RST, aborting NAT-L4F:Buffer list is empty NAT-L4F : Close notify from L4F
Description Indicates that the packet is being processed by the NAT-ALG interface with Layer 4 forwarding. Indicates that the packet is being processed by NAT-ALG.
The following is sample output from the debug ip nat vrf command:
Router# debug ip nat vrf 6d00h:NAT:address not stolen for 192.168.121.113, proto 1 port 7224 6d00h:NAT:creating portlist proto 1 globaladdr 10.1.1.10 6d00h:NAT:Allocated Port for 192.168.121.113 -> 10.1.1.10:wanted 7224 got 7224 6d00h:NAT:i:icmp (192.168.121.113, 7224) -> (172.28.88.2, 7224) [2460] 6d00h:NAT:s=192.168.121.113->10.1.1.10, d=172.28.88.2 [2460] vrf=> shop 6d00h:NAT*:o:icmp (172.28.88.2, 7224) -> (10.1.1.10, 7224) [2460] vrf=> shop 6d00h:NAT*:s=172.28.88.2, d=10.1.1.10->192.168.121.113 [2460] vrf=> shop 6d00h:NAT:Allocated Port for 192.168.121.113 -> 10.1.1.10:wanted 7225 got 7225 6d00h:NAT:i:icmp (192.168.121.113, 7225) -> (172.28.88.2, 7225) [2461] 6d00h:NAT:s=192.168.121.113->10.1.1.10, d=172.28.88.2 [2461] vrf=> shop 6d00h:NAT*:o:icmp (172.28.88.2, 7225) -> (10.1.1.10, 7225) [2461] vrf=> shop 6d00h:NAT*:s=172.28.88.2, d=10.1.1.10->192.168.121.113 [2461] vrf=> shop 6d00h:NAT:Allocated Port for 192.168.121.113 -> 10.1.1.10:wanted 7226 got 7226 6d00h:NAT:i:icmp (192.168.121.113, 7226) -> (172.28.88.2, 7226) [2462] 6d00h:NAT:s=192.168.121.113->10.1.1.10, d=172.28.88.2 [2462] vrf=> shop
Description Indicates that the packet is being translated by NAT. Source address of the packet and how it is being translated. Destination address of the packet. IP identification number of the packet. Indicates that NAT is applied to a particular VPN.
DB-1185
The following is sample output from the debug ip nat wlan-nat command:
Router# debug ip nat wlan-nat WLAN-NAT: WLAN-NAT: WLAN-NAT: WLAN-NAT: Creating secure ARP entry (10.1.1.1,0010.7bc2.9ff6) Triggered Acct Start for (209.165.201.1,0010.7bc2.9ff6) Extracting addr:209.165.201.1,input_idb:Ethernet1/2 from pak Saving address:209.165.201.1,input_idb:Ethernet1/2 in pak
After the WLAN-entry times out, the following debugs will be seen:
WLAN-NAT: Removing secure arp entry (10.1.1.1,0010.7bc2.9ff6) WLAN-NAT: triggered Acct Stop for (209.165.201.1,0010.7bc2.9ff6)
Description Indicates that a wireless LAN is being translated. Indicates that the packet is being translated using NAT.
Related Commands
Command clear ip nat translation ip nat ip nat inside destination ip nat inside source ip nat outside source ip nat pool ip nat service show ip nat statistics show ip nat translations
Description Clears dynamic NAT translations from the translation table. Designates that traffic originating from or destined for an interface is subject to NAT. Enables NAT of the inside destination address. Enables NAT of the inside source address. Enables NAT of the outside source address. Defines a pool of IP addresses for NAT. Enables a port other than the default port. Displays NAT statistics. Displays active NAT translations.
DB-1186
December 2010
Syntax Description
Command Modes
Command History
Release 15.0(1)M
Modification This command was integrated into Cisco IOS Release 15.0(1)M.
Examples
The following is sample output from the debug ip ospf adj command:
Router# debug ip ospf adj Jan 31 00:13:05.175: OSPF: Drop packet on Serial2/0 from 10.1.1.1 with TTL: 1 Mar 27 23:15:03.175: OSPF Drop packet on OSPF_VL0 from 10.1.1.100 with TTL: 253
Information in the output includes the day and time the packet was dropped, protocol name, interface on which the packet was dropped, neighbor address, and TTL hop count.
Related Commands
Description Displays information on OSPF-related events, such as adjacencies, flooding information, designated router selection, and SPF calculation.
DB-1187
Syntax Description
access-list-number
(Optional) Number of the standard or expanded IP access list to apply to the debug output. Standard IP access lists are in the range 1 to 99. Expanded IP access lists are in the range 1300 to 1999.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(18)SXD. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command if you need to see when the timers will expire per LSA. Use an access list if you want to limit the output.
Examples
The following is sample output from the debug ip ospf database-timer rate-limit command for an example configuration that includes the timers throttle lsa all 100 10000 45000 command. Comments are inserted to explain the preceding output.
Router# debug ip ospf database-timer rate-limit OSPF rate limit timer events debugging is on *Mar 12 20:18:20.383:OSPF:Starting rate limit timer for 10.10.24.4 10.10.24.4 1 with 100ms delay
The interface is shut down, which causes OSPF to generate a new router LSA. The system starts a timer for 100 milliseconds.
*Mar 12 20:18:20.495:OSPF:Rate limit timer is expired for 10.10.24.4 10.10.24.4 1
DB-1188
December 2010
The rate limit timer is expired after 100 milliseconds (a small delta is added to the timer).
*Mar 12 20:18:20.495:OSPF:For next LSA generation - wait :10000ms next: 20000ms *Mar 12 20:18:20.495:OSPF:Build router LSA for area 24, router ID 10.10.24.4, seq 0x80000003
The system will generate update a router LSA after the timer expires.
DB-1189
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug ip ospf events command:
Router# debug ip ospf events OSPF:hello with invalid timers on interface Ethernet0 hello interval received 10 configured 10 net mask received 255.255.255.0 configured 255.255.255.0 dead interval received 40 configured 30
The debug ip ospf events output shown might appear if any of the following situations occurs:
The IP subnet masks for routers on the same network do not match. The OSPF hello interval for the router does not match that configured for a neighbor. The OSPF dead interval for the router does not match that configured for a neighbor.
If a router configured for OSPF routing is not seeing an OSPF neighbor on an attached network, perform the following tasks:
Make sure that both routers have been configured with the same IP mask, OSPF hello interval, and OSPF dead interval. Make sure that both neighbors are part of the same area type.
In the following example line, the neighbor and this router are not part of a stub area (that is, one is a part of a transit area and the other is a part of a stub area, as explained in RFC 1247):
OSPF: hello packet with mismatched E bit
Related Commands
DB-1190
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, information about traffic engineering advertisements is printed in OSPF LSA messages:
Router# debug ip ospf mpls traffic-eng advertisements OSPF:IGP delete router node 10.106.0.6 fragment 0 with 0 links TE Router ID 10.106.0.6 OSPF:IGP update router node 10.110.0.10 fragment 0 with 0 links TE Router ID 10.110.0.10 OSPF:MPLS announce router node 10.106.0.6 fragment 0 with 1 links Link connected to Point-to-Point network Link ID :10.110.0.10 Interface Address :10.1.0.6 Neighbor Address :10.1.0.10 Admin Metric :10 Maximum bandwidth :1250000 Maximum reservable bandwidth :625000 Number of Priority :8 Priority 0 :625000 Priority 1 :625000 Priority 2 :625000 Priority 3 :625000 Priority 4 :625000 Priority 5 :625000
DB-1191
Priority 7 :625000
Field Link ID Interface Address Neighbor Address Admin Metric Maximum bandwidth Number of Priority Priority Affinity Bit
Description Index of the link being described. Address of the interface. Address of the neighbor. Administrative weight associated with this link. Bandwidth capacity of the link (kbps). Number of priority levels for which bandwidth is advertised. Bandwidth available at indicated priority level. Attribute flags of the link that are being flooded.
DB-1192
December 2010
Syntax Description
detail
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. Support for the Cisco 7304 router was added. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ip ospf nsf command to diagnose problems with OSPF link-state database (LSDB) resynchronization and NSF operations.
Examples
The following example shows that OSPF NSF events debugging is enabled:
Router# debug ip ospf nsf
Related Commands
Description Configures NSF operations for OSPF. Displays general information about OSPF routing processes. Displays OSPF-neighbor information on a per-interface basis.
DB-1193
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug ip ospf packet command:
Router# debug ip ospf packet OSPF: rcv. v:2 t:1 l:48 rid:200.0.0.117 aid:0.0.0.0 chk:6AB2 aut:0 auk:
The debug ip ospf packet command produces one set of information for each packet received. The output varies slightly depending on which authentication is used. The following is sample output from the debug ip ospf packet command when message digest algorithm 5 (MD5) authentication is used.
Router# debug ip ospf packet OSPF: rcv. v:2 t:1 l:48 rid:200.0.0.116 aid:0.0.0.0 chk:0 aut:2 keyid:1 seq:0x0
Field v: t:
Description OSPF version. OSPF packet type. Possible packet types follow:
1Hello 2Data description 3Link state request 4Link state update 5Link state acknowledgment
OSPF packet length in bytes. OSPF router ID. OSPF area ID. OSPF checksum.
DB-1194
December 2010
Table 155
Field aut:
keyid: seq:
Related Commands
Description Displays information on OSPF-related events, such as adjacencies, flooding information, designated router selection, and SPF calculation.
DB-1195
Syntax Description
(Optional) Displays debugging information for OSPF Version 2 routes in the local RIB. (Optional) Displays debugging information about redistributed OSPF Version 2 routes. (Optional) Displays debugging information for OSPF Version 2 routes in the global RIB. (Optional) Number of an access list. This is a decimal number from 1 to 199 or from 1300 to 2699. (Optional) Displays more detailed debug information.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRC. This command was integrated into the Cisco IOS 12.2(33)SB release. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You can use the output from the debug ip ospf rib command to learn about the function of the local RIB and the interaction between the route redistribution process and the global RIB. For example, you can learn why the routes that OSPF placed in the global RIB are not the same ones that you anticipated. A Cisco Technical Assistance Center representative may ask you to turn on debugging using the debug ip ospf rib command as part of troubleshooting a problem. To monitor updates from the OSPF database to the OSPF local RIB, use the local keyword, and to monitor updates from the OSPF database to the OSPF global RIB, use the global keyword. It is highly recommended that you limit the debugging output to information specific to the IP prefix that is associated with a specific access list by entering the access-list-number argument.
DB-1196
December 2010
Examples
The following is sample output from the debug ip ospf rib command with the access-list-number argument used in order to limit the debugging output to information specific to the IP prefix that is associated with the specific access list 1:
Router# show running-config | include access-list 1 access-list 112 permit 10.1.1.0 0.0.0.255 ! access-list 1 is configured Router# debug ip ospf rib local detail 1 *May 31 21:28:17.331: OSPF-RIB-LOCAL: Delete intra-area connected route 192.168.130.2/255.255.255.0, area 1, dist 10, for interface Ethernet0/0.1 *May 31 21:28:17.331: OSPF-RIB-LOCAL: Local RIB process OSPF-1 Router clear *May 31 21:28:17.331: OSPF-RIB-LOCAL: Add intra-area connected route 192.168.130.2/255.255.255.0, area 1, dist 10, for interface Ethernet0/0.1 . . .
Related Commands
Description Displays information on OSPF-related events, such as adjacencies, flooding information, designated router selection, and SPF calculation.
DB-1197
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip ospf spf statistic command displays the SPF calculation times in milliseconds, the node count, and a time stamp.
Examples
The following is sample output from the debug ip ospf spf statistic command:
Router# debug ip ospf spf statistic 00:05:59:OSPF:Begin SPF at 359.216ms, process time 60ms 00:05:59:spf_time 00:05:59.216, wait_interval 0s 00:05:59:OSPF:End SPF at 359.216ms, Total elapsed time 0ms 00:05:59:Intra: 0ms, Inter: 0ms, External: 0ms 00:05:59:R: 4, N: 2, Stubs: 1 00:05:59:SN: 1, SA: 0, X5: 1, X7: 0 00:05:59:SPF suspends: 0 intra, 1 total
Description Absolute time in milliseconds when SPF is started. Cumulative time since the process has been created. Last time SPF was run or an event has happened to run SPF.
DB-1198
December 2010
Table 156
Field wait_interval End SPF at Total elapsed time Intra: Inter: External: R: N: Stubs: SN: SA: X5: X7: SPF suspends: intra total
Description Time waited to run SPF. Absolute time in milliseconds when SPF had ended. Total time take to run SPF. Time taken to process intra-area link-state advertisements (LSAs). Time taken to process interarea LSAs. Time taken to process external LSAs. Number of router LSAs. Number of network LSAs. Number of stub links. Number of summary network LSAs. Number of summary LSAs describing autonomous system boundary routers (ASBRs). Number of external type 5 LSAs. Number of external type 7 LSAs. Number of times process is suspended during intra-area SPF run. Total number of times process is suspended during SPF run.
DB-1199
debug ip packet
To display general IP debugging information and IP security option (IPSO) security transactions, use the debug ip packet command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip packet [access-list-number] [detail] [dump] no debug ip packet [access-list-number]
Syntax Description
access-list-number
(Optional) The IP access list number that you can specify. If the datagram is not permitted by that access list, the related debugging output is suppressed. Standard, extended, and expanded access lists are supported. The range of standard and extended access lists is from 1 to 199. The range of expanded access lists is from 1300 to 2699. (Optional) Displays detailed IP packet debugging information. This information includes the packet types and codes as well as source and destination port numbers. (Hidden) Displays IP packet debugging information along with raw packet data in hexadecimal and ASCII forms. This keyword can be enabled with individual access lists and also with the detail keyword.
Note
detail
dump
The dump keyword is not fully supported and should be used only in collaboration with Cisco Technical Support. See the caution notes below, in the usage guidelines, for more specific information.
Command Modes
Privileged EXEC
Usage Guidelines
If a communication session is closing when it should not be, an end-to-end connection problem can be the cause. The debug ip packet command is useful for analyzing the messages traveling between the local and remote hosts. IP packet debugging captures the packets that are process switched including received, generated and forwarded packets. IP packets that are switched in the fast path are not captured. IPSO security transactions include messages that describe the cause of failure each time a datagram fails a security test in the system. This information is also sent to the sending host when the router configuration allows it.
Caution
Because the debug ip packet command generates a substantial amount of output and uses a substantial amount of system resources, this command should be used with caution in production networks. It should only be enabled when traffic on the IP network is low, so other activity on the system is not adversely affected. Enabling the detail and dump keywords use the highest level of system resources of the available configuration options for this command, so a high level of caution should be applied when enabling either of these keywords.
DB-1200
December 2010
Caution
The dump keyword is not fully supported and should be used only in collaboration with Cisco Technical Support. Because of the risk of using significant CPU utilization, the dump keyword is hidden from the user and cannot be seen using the ? prompt. The length of the displayed packet information may exceed the actual packet length and include additional padding bytes that do not belong to the IP packet. Also note that the beginning of a packet may start at different locations in the dump output depending on the specific router, interface type, and packet header processing that may have occurred before the output is displayed.
Examples
The output shows two types of messages that the debug ip packet command can produce; the first line of output describes an IP packet that the router forwards, and the third line of output describes a packet that is destined for the router. In the third line of output, rcvd 2 indicates that the router decided to receive the packet. Table 157 describes the significant fields shown in the display.
Table 157 debug ip packet Field Descriptions
Description Indicates that this is an IP packet. Indicates the source address of the packet and the name of the interface that received the packet. Indicates the destination address of the packet and the name of the interface (in this case, S2) through which the packet is being sent out on the network. Indicates the address of the next-hop gateway. Indicates that the router is forwarding the packet. If a filter denies a packet, access denied replaces forward, as shown in the last line of output.
g=172.69.16.2 forward
The following is sample output from the debug ip packet command enabled with the detail keyword:
Router# debug ip packet detail IP packet debugging is on (detailed) 001556: 19:59:30: CEF: Try to CEF switch 10.4.9.151 from FastEthernet0/0
DB-1201
001557: 001558: 001559: 001560: 001561: 001562: 001563: 001564: 001565: 001566:
19:59:30: 19:59:30: 20:00:09: 20:00:09: 20:00:09: 20:00:14: 20:00:14: 20:00:14: 20:00:14: 20:00:14:
IP: s=10.4.9.6 (FastEthernet0/0), d=10.4.9.151 (FastEthernet03 TCP src=179, dst=11001, seq=3736598846, ack=2885081910, wH CEF: Try to CEF switch 10.4.9.151 from FastEthernet0/0 IP: s=10.4.9.4 (FastEthernet0/0), d=10.4.9.151 (FastEthernet03 TCP src=179, dst=11000, seq=163035693, ack=2948141027, wiH CEF: Try to CEF switch 10.4.9.151 from FastEthernet0/0 IP: s=10.4.9.6 (FastEthernet0/0), d=10.4.9.151 (FastEthernet03 ICMP type=8, code=0 IP: s=10.4.9.151 (local), d=10.4.9.6 (FastEthernet0/0), len 1g ICMP type=0, code=0
The format of the output with detail keyword provides additional information, such as the packet type, code, some field values, and source and destination port numbers. Table 158 describes the significant fields shown in the display.
Table 158 debug ip packet detail Field Descriptions
Description Indicates that the IP packet is being processed by CEF. Indicates that this is an IP packet. Indicates the source address of the packet and the name of the interface that received the packet.
d=10.4.9.151 (FastEthernet03) Indicates the destination address of the packet and the name of the interface through which the packet is being sent out on the network. TCP src= dst= seq= ack= ICMP type= code= Indicates the source TCP port number. Indicates the destination TCP port number. Value from the TCP packet sequence number field. Value from the TCP packet acknowledgement field. Indicates ICMP packet type. Indicates ICMP return code.
The following is sample output from the debug ip packet command enabled with the dump keyword:
Router# debug ip packet dump IP packet debugging is on (detailed) (dump) 21:02:42: 07003A00: 07003A10: 07003A20: 07003A30: 07003A40: 07003A50: 07003A60: 07003A70: 21:02:42: 07003A00: 07003A10: 07003A20: 07003A30: 07003A40: 07003A50: 07003A60: IP: s=10.4.9.6 (FastEthernet0/0), d=10.4.9.4 (FastEthernet0/0), len 13 0005 00509C08 ...P.. 0007855B 4DC00800 45000064 001E0000 ...[[email protected].... FE019669 0A040906 0A040904 0800CF7C ~..i..........O| 0D052678 00000000 0A0B7145 ABCDABCD ..&x......qE+M+M ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M IP: s=10.4.9.4 (local), d=10.4.9.6 (FastEthernet0/0), len 100, sending 0005 00509C08 ...P.. 0007855B 4DC00800 45000064 001E0000 ...[[email protected].... FF019569 0A040904 0A040906 0000D77C ...i..........W| 0D052678 00000000 0A0B7145 ABCDABCD ..&x......qE+M+M ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M
DB-1202
December 2010
07003A70: 21:02:42: 21:02:42: 07003380: 07003390: 070033A0: 070033B0: 070033C0: 070033D0: 070033E0: 070033F0:
ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M CEF: Try to CEF switch 10.4.9.4 from FastEthernet0/0 IP: s=10.4.9.6 (FastEthernet0/0), d=10.4.9.4 (FastEthernet0/0), len 13 0005 00509C08 ...P.. 0007855B 4DC00800 45000064 001F0000 ...[[email protected].... FE019668 0A040906 0A040904 0800CF77 ~..h..........Ow 0D062678 00000000 0A0B7149 ABCDABCD ..&x......qI+M+M ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M
Note
The dump keyword is not fully supported and should be used only in collaboration with Cisco Technical Support. See the caution in the usage guidelines section of this command reference page for more specific information. The output from the debug ip packet command, when the dump keyword is enabled, provides raw packet data in hexadecimal and ASCII forms. This addtional output is displayed in addition to the standard output. The dump keyword can be used with all of the available configuration options of this command. Table 159 describes the significant fields shown in the display.
Table 159 debug ip packet dump Field Descriptions
Description Indicates that this is an IP packet. Indicates the source address of the packet and the name of the interface that received the packet. Indicates destination address and length of the packet and the name of the interface through which the packet is being sent out on the network. Indicates that the router is sending the packet.
The calculation on whether to send a security error message can be somewhat confusing. It depends upon both the security label in the datagram and the label of the incoming interface. First, the label contained in the datagram is examined for anything obviously wrong. If nothing is wrong, assume the datagram to be correct. If something is wrong, the datagram is treated as unclassified genser. Then the label is compared with the interface range, and the appropriate action is taken, as Table 160 describes.
DB-1203
Table 160
Security Actions
Action Taken No Response No Response No Response No Response Accept Send Error No Response Send Error Send Error
In range
Too high
The security code can only generate a few types of Internet Control Message Protocol (ICMP) error messages. The only possible error messages and their meanings follow:
ICMP Parameter problem, code 0Error at pointer ICMP Parameter problem, code 1Missing option ICMP Parameter problem, code 2See Note that follows ICMP Unreachable, code 10Administratively prohibited
Note
The message ICMP Parameter problem, code 2 identifies a specific error that occurs in the processing of a datagram. This message indicates that the router received a datagram containing a maximum length IP header but no security option. After being processed and routed to another interface, it is discovered that the outgoing interface is marked with add a security label. Because the IP header is already full, the system cannot add a label and must drop the datagram and return an error message. When an IP packet is rejected due to an IP security failure, an audit message is sent via Department of Defense Intelligence Information System Network Security for Information Exchange (DNSIX) Network Address Translation (NAT). Also, any debug ip packet output is appended to include a description of the reason for rejection. This description can be any of the following:
No basic No basic, no response Reserved class Reserved class, no response Class too low, no response Class too high Class too high, bad authorities, no response Unrecognized class Unrecognized class, no response Multiple basic
DB-1204
December 2010
Multiple basic, no response Authority too low, no response Authority too high Compartment bits not dominated by maximum sensitivity level Compartment bits do not dominate minimum sensitivity level Security failure: extended security disallowed NLESO source appeared twice ESO source not found Postroute, failed xfc out No room to add IPSO
DB-1205
Support for the PGM Host feature has been removed. Use of this command is not recommended. To display debug messages for the Pragmatic General Multicast (PGM) Host feature, use the debug ip pgm host command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip pgm host [data | nak | spm] no debug ip pgm host [data | nak | spm]
Syntax Description
data nak
(Optional) Enables debugging for PGM sent (ODATA) and re-sent (RDATA) data packets. (Optional) Enables debugging for PGM negative acknowledgment (NAK) data packets, NAK confirmation (NCF) data packets, and Null NAK (NNAK) data packets. (Optional) Enables debugging for PGM source path messages (SPMs).
spm
Defaults
Debugging for PGM Host is not enabled. If the debug ip pgm host command is used with no additional keywords, debugging is enabled for all PGM Host message types.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip pgm host command:
Router# debug ip pgm host Host SPM debugging is on Host NAK/NCF debugging is on Host ODATA/RDATA debugging is on
The following is sample output from the debug ip pgm host command when the data keyword is used:
Router# debug ip pgm host data
DB-1206
December 2010
02:50:23:PGM Host:Received ODATA from 10.0.30.2 to 224.3.3.3 (74 bytes) 02:50:23: ODATA TSI 00000A001E02-0401 data-dport BBBB csum 9317 tlen 74 02:50:23: tsqn 31 dsqn 39
The following example shows output of the debug ip pgm host command when the nak keyword is used. In the following example, the host sends a NAK to the source for a missing packet and the source returns an NCF to the host followed by an RDATA data packet.
Router# debug ip pgm host nak 02:50:24:PGM Host:Sending NAK from 10.0.32.2 to 10.0.32.1 (36 bytes) 02:50:24: NAK TSI 00000A001E02-0401 data-dport BBBB csum 04EC tlen 36 02:50:24: dsqn 38 data source 10.0.30.2 group 224.3.3.3 02:50:24:PGM Host:Received NCF from 10.0.30.2 to 224.3.3.3 (36 bytes) 02:50:24: NCF TSI 00000A001E02-0401 data-dport BBBB csum 02EC tlen 36 02:50:24: dsqn 38 data source 10.0.30.2 group 224.3.3.3 02:50:24:PGM Host:Received RDATA from 10.0.30.2 to 224.3.3.3 (74 bytes) 02:50:24: RDATA TSI 00000A001E02-0401 data-dport BBBB csum 9218 tlen 74 02:50:24: tsqn 31 dsqn 38
The following is sample output from the debug ip pgm host command with the spm keyword is used:
Router# debug ip pgm host spm 02:49:39:PGM Host:Received SPM from 10.0.30.2 to 224.3.3.3 (36 bytes) 02:49:39: SPM TSI 00000A001E02-0401 data-dport BBBB csum EA08 tlen 36 02:49:39: dsqn 980 tsqn 31 lsqn 31 NLA 10.0.32.1
Related Commands
Command clear ip pgm host ip pgm host show ip pgm host defaults show ip pgm host sessions show ip pgm host traffic
Description Resets PGM Host connections to their default values and clears traffic statistics. Enables the PGM Host feature. Displays the default values for PGM Host traffic. Displays open PGM Host traffic sessions. Displays PGM Host traffic statistics.
DB-1207
Syntax Description
(Optional) Enables debugging for Source Path Messages (SPMs). (Optional) Enables debugging for negative acknowledgments (NAKs), NAK confirmations (NCFs), and Null NAKs (NNAKs). (Optional) Enables debugging for Retransmissions (RDATA).
Defaults
Debugging for PGM is not enabled. If the debug ip pgm router command is used with no additional keywords, debugging is enabled for all PGM message types.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following shows sample output from the debug ip pgm router command:
Router# debug ip pgm router SPM debugging is on NAK/NNAK/NCF debugging is on RDATA debugging is on
The following shows sample output from the debug ip pgm router command when the spm keyword is used:
Router# debug ip pgm router spm PGM: Received SPM on Ethernet1/0/5 from 10.7.0.200 to 227.7.7.7 (52 bytes) SPM TSI 0A0700C85555-1000 data-dport 1001 csum CCCC tlen 52 dsqn 3758096779 tsqn 1954 isqn 1979 lsqn 1990 NLA 10.7.0.200 SPM from source/RPF-neighbour 10.7.0.200 for 10.7.0.200 (SPT) Forwarded SPM from 10.7.0.200 to 227.7.7.7
DB-1208
December 2010
P N O
P indicates that this is a parity packet. N indicates that options are network significant. O indicates that options are present.
The following shows sample output from the debug ip pgm router command when the nak keyword is used:
Router# debug ip pgm router nak PGM: Received NAK on Ethernet1/0/0 from 10.1.0.4 to 10.1.0.2 (36 bytes) NAK TSI 0A0700C85555-1000 data-dport 1001 csum CCCC tlen 36 dsqn 1990 data source 10.7.0.200 group 227.7.7.7 NAK unicast routed to RPF neighbour 10.4.0.1 Forwarding NAK from 10.1.0.4 to 10.4.0.1 for 10.7.0.200 PGM: Received NCF on Ethernet1/0/5 from 10.7.0.200 to 227.7.7.7 (36 bytes) NCF TSI 0A0700C85555-1000 data-dport 1001 csum CACC tlen 36 dsqn 1990 data source 10.7.0.200 group 227.7.7.7 NAK retx canceled for TSI 0A0700C85555-1000 dsqn 1990 NAK elimination started for TSI 0A0700C85555-1000 dsqn 1990 PGM: Received NCF on Ethernet1/0/5 from 10.7.0.200 to 227.7.7.7 (36 bytes) NCF TSI 0A0700C85555-1000 data-dport 1001 csum CACC tlen 36 dsqn 1991 data source 10.7.0.200 group 227.7.7.7 No NAK retx outstanding for TSI 0A0700C85555-1000 dsqn 1991 NAK anticipated for TSI 0A0700C85555-1000 dsqn 1991
The following example shows output of the debug ip pgm router command with the data keyword. The debugging message is for an RDATA packet for which the router has only anticipated state, sqn 1991. Because it did not actually get a NAK, this RDATA is not forwarded by the PGM router.
Router# debug ip pgm router data PGM: Received RDATA on Ethernet1/0/5 from 10.7.0.200 to 227.7.7.7 (70 bytes) RDATA TSI 0A0700C85555-1000 data-dport 1001 csum CCCC tlen 32 tsqn 1954 dsqn 1990 Marking Ethernet1/0/0 for forwarding Marking Serial5/0 for skipping Forwarded RDATA from 10.7.0.200 to 227.7.7.7 Debug message for RDATA packet corresponding to a NAK for sqn 1990. Since the NAK was received on Ethernet1/0/0, RDATA is forwarded out only that interface and another interface in the multicast olist Serial5/0 is skipped. PGM: Received RDATA on Ethernet1/0/5 from 10.7.0.200 to 227.7.7.7 (70 bytes) RDATA TSI 0A0700C85555-1000 data-dport 1001 csum CCCC tlen 32 tsqn 1954 dsqn 1991 Eliminated RDATA (null oif) from 10.7.0.200 to 227.7.7.7
DB-1209
Related Commands
Description Enables the PGM Router Assist feature for the interface. Displays PGM traffic statistics and TSI state.
DB-1210
December 2010
debug ip pim
To display Protocol Independent Multicast (PIM) packets received and sent, and to display PIM-related events, use the debug ip pim command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip pim [vrf vrf-name] [group | df [rp-address]] [hello] no debug ip pim [vrf vrf-name] [group | df [rp-address]] [hello]
Syntax Description
(Optional) Supports the multicast Virtual Private Network (VPN) routing and forwarding (VRF) instance. (Optional) Name assigned to the VRF. (Optional) The group name or address to monitor the packet activity of a single group. (Optional) When bidirectional PIM is used, displays all designated forwarder (DF) election messages. (Optional) The rendezvous point IP address. (Optional) Enables you to send PIM hello messages to be sent every few milliseconds.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The df keyword was added. The vrf keyword, vrf-name argument, and hello keyword were added. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
PIM uses Internet Group Management Protocol (IGMP) packets to communicate with routers and advertise reachability information. Use this command with the debug ip igmp and debug ip mrouting commands to display additional multicast routing information.
DB-1211
Examples
The following lines appear periodically when PIM is running in sparse mode and indicate to this router the multicast groups and multicast sources in which other routers are interested:
PIM: Received Join/Prune on Ethernet1 from 172.16.37.33 PIM: Received Join/Prune on Ethernet1 from 172.16.37.33
The following lines appear when a rendezvous point (RP) message is received and the RP timer is reset. The expiration timer sets a checkpoint to make sure the RP still exists. Otherwise, a new RP must be discovered.
PIM: Received RP-Reachable on Ethernet1 from 172.16.20.31 PIM: Update RP expiration timer for 224.2.0.1 PIM: Forward RP-reachability packet for 224.2.0.1 on Tunnel0
The prune message in the following line states that this router is not interested in the Source-Active (SA) information. This message tells an upstream router to stop forwarding multicast packets from this source.
PIM: Prune-list (10.221.196.51/32, 224.2.0.1)
In the following line, a second router on the network wants to override the prune message that the upstream router just received. The timer is set at a random value so that if additional routers on the network still want to receive multicast packets for the group, only one will actually send the message. The other routers will receive the join message and then suppress sending their own message.
PIM: Set join delay timer to 2 seconds for (10.221.0.0/16, 224.2.0.1) on Ethernet1
In the following line, a join message is sent toward the RP for all sources:
PIM: Join-list: (*, 224.2.0.1) RP 172.16.20.31
DB-1212
December 2010
In the following lines, the interface is being added to the outgoing interface (OIF) of the (*, G) and (S, G) multicast route (mroute) table entry so that packets from the source will be forwarded out that particular interface:
PIM: Add Tunnel0 to (*, 224.2.0.1), Forward state PIM: Add Tunnel0 to (10.0.0.0/8, 224.2.0.1), Forward state
The following line appears in sparse mode only. There are two trees on which data may be received: the RP tree and the source tree. In dense mode there is no RP. After the source and the receiver have discovered one another at the RP, the first-hop router for the receiver will usually join to the source tree rather than the RP tree.
PIM: Prune-list (172.16.84.16/28, 224.2.0.1) RP-bit set RP 172.16.84.16
The send prune message in the next line shows that a router is sending a message to a second router saying that the first router should no longer receive multicast packets for the (S, G). The RP at the end of the message indicates that the router is pruning the RP tree and is most likely joining the source tree, although the router may not have downstream members for the group or downstream routers with members of the group. The output shows the specific sources from which this router no longer wants to receive multicast messages.
PIM: Send Prune on Ethernet1 to 172.16.37.6 for (172.16.84.16/28, 224.2.0.1), RP
The following lines indicate that a prune message is sent toward the RP so that the router can join the source tree rather than the RP tree:
PIM: For RP, Prune-list: 10.9.0.0/16 PIM: For RP, Prune-list: 10.16.0.0/16 PIM: For RP, Prune-list: 10.49.0.0/16
In the following line, a periodic message is sent toward the RP. The default period is once per minute. Prune and join messages are sent toward the RP or source rather than directly to the RP or source. It is the responsibility of the next hop router to take proper action with this message, such as continuing to forward it to the next router in the tree.
PIM: Send periodic Join/Prune to RP via 172.16.37.6 (Ethernet1)
Related Commands
Command debug ip dvmrp debug ip igmp debug ip igrp transactions debug ip mrouting debug ip sd
Description Displays information on DVMRP packets received and sent. Displays IGMP packets received and sent, and displays IGMP host-related events. Displays transaction information on IGRP routing transactions. Displays changes to the IP multicast routing table. Displays all SD announcements received.
DB-1213
Syntax Description
Command Modes
Privileged EXEC
Examples
The following sample output shows a new group being created and the router toward the rendezvous point (RP) opening a new virtual circuit (VC). Because there are now two groups on this router, there are two VCs open, as reflected by the current count. The following is sample output from the debug ip pim atm command:
Router# debug ip pim atm Jan Jan Jan Jan 28 28 28 28 19:05:51: 19:05:51: 19:05:51: 19:06:35: PIM-ATM: PIM-ATM: PIM-ATM: PIM-ATM: Max VCs 200, current count 1 Send SETUP on ATM2/0 for 239.254.254.253/171.69.214.43 Received CONNECT on ATM2/0 for 239.254.254.253, vcd 19 Max VCs 200, current count 2
Description Current date and time (in hours:minutes:seconds). Indicates what PIM is doing to set up or monitor an ATM connection (vc). Current number of open virtual circuits.
DB-1214
December 2010
Syntax Description
vrf vrf-name
(Optional) Supports the Multicast Virtual Private Network (VPN) routing and forwarding (VRF) instance. (Optional) Name assigned to the VRF.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The vrf keyword and vrf-name argument were added. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip pim auto-rp command:
Router# debug ip pim auto-rp Auto-RP: Auto-RP: Auto-RP: Auto-RP: Auto-RP: Auto-RP: Auto-RP: Auto-RP: Auto-RP: Auto-RP: Received RP-announce, from 172.16.214.66, RP_cnt 1, holdtime 180 secs update (192.168.248.0/24, RP:172.16.214.66) Build RP-Discovery packet Build mapping (192.168.248.0/24, RP:172.16.214.66), Build mapping (192.168.250.0/24, RP:172.16.214.26). Build mapping (192.168.254.0/24, RP:172.16.214.2). Send RP-discovery packet (3 RP entries) Build RP-Announce packet for 172.16.214.2 Build announce entry for (192.168.254.0/24) Send RP-Announce packet, IP source 172.16.214.2, ttl 8
DB-1215
The first two lines show a packet received from 172.16.214.66 announcing that it is the RP for the groups in 192.168.248.0/24. This announcement contains one RP address and is valid for 180 seconds. The RP-mapping agent then updates its mapping database to include the new information.
Auto-RP: Received RP-announce, from 172.16.214.66, RP_cnt 1, holdtime 180 secs Auto-RP: update (192.168.248.0/24, RP:172.16.214.66)
In the next five lines, the router creates an RP-discovery packet containing three RP mapping entries. The packet is sent to the well-known CISCO-RP-DISCOVERY group address (224.0.1.40).
Auto-RP: Build RP-Discovery packet Auto-RP: Build mapping (192.168.248.0/24, RP:172.16.214.66), Auto-RP: Build mapping (192.168.250.0/24, RP:172.16.214.26). Auto-RP: Build mapping (192.168.254.0/24, RP:172.16.214.2). Auto-RP: Send RP-discovery packet (3 RP entries)
The final three lines show the router announcing that it intends to be an RP for the groups in 192.168.254.0/24. Only routers inside the scope ttl 8 receive the advertisement and use the RP for these groups.
Auto-RP: Build RP-Announce packet for 172.16.214.2 Auto-RP: Build announce entry for (192.168.254.0/24) Auto-RP: Send RP-Announce packet, IP source 172.16.214.2, ttl 8
The following is sample output from the debug ip pim auto-rp command when a router receives an update. In this example, the packet contains three group-to-RP mappings, which are valid for 180 seconds. The RP-mapping agent then updates its mapping database to include the new information.
Router# debug ip pim auto-rp Auto-RP: Received RP-discovery, from 172.16.214.17, RP_cnt 3, holdtime 180 secs Auto-RP: update (192.168.248.0/24, RP:172.16.214.66) Auto-RP: update (192.168.250.0/24, RP:172.16.214.26) Auto-RP: update (192.168.254.0/24, RP:172.16.214.2
DB-1216
December 2010
debug ip policy
To display IP policy routing packet activity, use the debug ip policy command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip policy [access-list-name] no debug ip policy [access-list-name]
Syntax Description
access-list-name
(Optional) The name of the access list. Displays packets permitted by the access list that are policy routed in process level, Cisco Express Forwarding (CEF), and distributed CEF (DCEF) with NetFlow enabled or disabled. If no access list is specified, information about all policy-matched and policy-routed packets is displayed.
Command Modes
Privileged EXEC
Command History
Command This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
After you configure IP policy routing with the ip policy and route-map commands, use the debug ip policy command to ensure that the IP policy is configured correctly. Policy routing looks at various parts of the packet and then routes the packet based on certain user-defined attributes in the packet. The debug ip policy command helps you determine what policy routing is following. It displays information about whether a packet matches the criteria, and if so, the resulting routing information for the packet.
Caution
Because the debug ip policy command generates a substantial amount of output, use it only when traffic on the IP network is low, so other activity on the system is not adversely affected.
Examples
DB-1217
Description IP source address and interface of the packet being routed. IP destination address of the packet being routed. Length of the packet. IP gateway address of the packet being routed.
DB-1218
December 2010
debug ip rbscp
To display general error messages about access list-based Rate-Based Satellite Control Protocol (RBSCP), use the debug ip rbscp command in privileged EXEC mode. To disable debug output, use the no form of this command. debug ip rbscp no debug ip rbscp
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Examples
The following is sample output from the debug ip rbscp command. The hexadecminal number is the sequence number to keep track of the flow.
Router# debug ip rbscp *May 11 02:17:01.407: RBSCP process: 0x662852D0 passed access list
Related Commands
Description Displays information about TCP ACK splitting done in conjunction with RBSCP. Configures the TCP ACK splitting feature of RBSCP on an outgoing interface for packets that are permitted by a specified access list.
DB-1219
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Examples
The following is sample output from the debug ip rbscp ack-split command when the packets match the access list applied to RBSCP. The output includes the source and destination IP addresses and port numbers, the hexadecimal sequence number, and the cumulative ACK that acknowledges bytes up to that number.
Router# debug ip rbscp ack-split *May 11 02:17:01.407: FastEthernet1/1 *May 11 02:17:01.407: 2336109115 *May 11 02:17:01.407: *May 11 02:17:01.407: *May 11 02:17:01.407: *May 11 02:17:01.407: *May 11 02:17:01.415: *May 11 02:17:01.415: FastEthernet1/1 RBSCP ACK split: 0x662852D0, input FastEthernet1/0 -> output RBSCP ACK split: rcvd src 1.1.1.1:38481 -> dst 3.3.3.1:21, cumack RBSCP RBSCP RBSCP RBSCP RBSCP RBSCP ACK split: generated 0x65FC0874 cumack 2336109112 ACK split: generated 0x66762A78 cumack 2336109113 ACK split: generated 0x6676442C cumack 2336109114 ACK split: releasing original ACK 2336109115 process: 0x662852D0 passed access list ACK split: 0x662852D0, input FastEthernet1/0 -> output
DB-1220
December 2010
*May 11 02:17:01.415: 4024420742 *May 11 02:17:01.415: *May 11 02:17:01.415: *May 11 02:17:01.415: *May 11 02:17:01.415: *May 11 02:17:01.419: *May 11 02:17:01.419: FastEthernet1/1
RBSCP ACK split: rcvd src 1.1.1.1:36022 -> dst 3.3.3.1:20240, cumack RBSCP RBSCP RBSCP RBSCP RBSCP RBSCP ACK split: generated 0x65FC1E7C cumack 4024420739 ACK split: generated 0x65FC2980 cumack 4024420740 ACK split: generated 0x65FC3484 cumack 4024420741 ACK split: releasing original ACK 4024420742 process: 0x662852D0 passed access list ACK split: 0x662852D0, input FastEthernet1/0 -> output
Related Commands
Description Displays general error messages about access list-based RBSCP. Configures the TCP ACK splitting feature of RBSCP on an outgoing interface for packets that are permitted by a specified access list.
DB-1221
debug ip rgmp
To log debugging messages sent by a Router-Port Group Management Protocol (RGMP)-enabled router, use the debug ip rgmp command in privileged EXEC mode. To disable debugging outut, use the no form of this command. debug ip rgmp [group-name | group-address] no debug ip rgmp
Syntax Description
group-name group-address
(Optional) The name of a specific IP multicast group. (Optional) The IP address of a specific IP multicast group.
Defaults
Debugging for RGMP is not enabled. If the debug ip rgmp command is used without arguments, debugging is enabled for all RGMP message types.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The command was integrated into Cisco IOS Release 12.1(1)E. The command was integrated into Cisco IOS Release 12.1(5)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following shows sample output from the debug ip rgmp command:
Router# debug ip rgmp RGMP: Sending a Hello packet on Ethernet1/0 RGMP: Sending a Join packet on Ethernet1/0 for group 224.1.2.3 RGMP: Sending a Leave packet on Ethernet1/0 for group 224.1.2.3 RGMP: Sending a Bye packet on Ethernet1/0
Related Commands
Description Enables the RGMP on IEEE 802.3 Ethernet interfaces. Displays multicast-related information about an interface.
DB-1222
December 2010
debug ip rip
To display information on Routing Information Protocol (RIP) routing transactions, use the debug ip rip command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip rip no debug ip rip
Syntax Description
Command Modes
Privileged EXEC
Examples
Updates received from this source address Updates sent to these two destination addresses
RIP: received update from 10.89.80.28 on Ethernet0 10.89.95.0 in 1 hops 10.89.81.0 in 1 hops 10.89.66.0 in 2 hops 172.31.0.0 in 16 hops (inaccessible) 0.0.0.0 in 7 hop RIP: sending update to 255.255.255.255 via Ethernet0 (10.89.64.31) subnet 10.89.94.0, metric 1 172.31.0.0 in 16 hops (inaccessible) RIP: sending update to 255.255.255.255 via Serial1 (10.89.94.31) subnet 10.89.64.0, metric 1 subnet 10.89.66.0, metric 3 172.31.0.0 in 16 hops (inaccessible) default 0.0.0.0, metric 8
The output shows that the router being debugged has received updates from one router at source address 160.89.80.28. That router sent information about five destinations in the routing table update. Notice that the fourth destination address in the update131.108.0.0is inaccessible because it is more than 15 hops away from the router sending the update. The router being debugged also sent updates, in both cases to broadcast address 255.255.255.255 as the destination. The second line is an example of a routing table update. It shows how many hops a given Internet address is from the router. The entries show that the router is sending updates that are similar, except that the number in parentheses is the source address encapsulated into the IP header. Examples of additional output that the debug ip rip command can generate follow. Entries such as the following appear at startup or when an event occurs such as an interface making a transition or a user manually clearing the routing table:
RIP: broadcasting general request on Ethernet0 RIP: broadcasting general request on Ethernet1
DB-1223
S2550
An entry such as the following is most likely caused by a malformed packet from the sender:
RIP: bad version 128 from 160.89.80.43
DB-1224
December 2010
debug ip routing
To display information on Routing Information Protocol (RIP) routing table updates and route cache updates, use the debug ip routing command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip routing no debug ip routing
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification Support for Interior Gateway Routing Protocol (IGRP) was removed. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-1225
new metric [100/10816] RT: delete route to 172.26.219.0 via 172.24.76.30, igrp metric [100/10816] RT: no routes to 172.26.219.0, entering holddown IP: cache invalidation from 0x115248 0x1378A, new version 5741
In the following lines, a newly created entry has been added to the IP routing table. The metric change indicates that this entry existed previously, but its metric changed and the change was reported by means of IGRP. The metric could also be reported via RIP, OSPF, or another IP routing protocol. The numbers inside the brackets report the administrative distance and the actual metric.
RT: add 172.25.168.0 255.255.255.0 via 172.24.76.30, igrp metric [100/3020] RT: metric change to 172.25.168.0 via 172.24.76.30, igrp metric [100/3020] new metric [100/2930] IP: cache invalidation from 0x115248 0x1378A, new version 5736
Cache invalidation means that the fast-switching cache was invalidated due to a routing table change. New version is the version number of the routing table. When the routing table changes, this number is incriminated. The hexadecimal numbers are internal numbers that vary from version to version and software load to software load. In the following output, the holddown and cache invalidation lines are displayed. Most of the distance vector routing protocols use holddown to avoid typical problems like counting to infinity and routing loops. If you look at the output of the show ip protocols command you will see the timer values for holddown and cache invalidation. Cache invalidation corresponds to came out of holddown. Delete route is triggered when a better path appears. It removes the old inferior path.
RT: RT: IP: RT: delete route to 172.26.219.0 via 172.24.76.30, igrp metric [100/10816] no routes to 172.26.219.0, entering holddown cache invalidation from 0x115248 0x1378A, new version 5737 172.26.219.0 came out of holddown
DB-1226
December 2010
Syntax Description
Command Modes
Command History
Release 12.2(33)SRC
Examples
The following is sample output from the debug ip routing static command:
Router# debug ip routing static bfd *Dec 18 19:01:48.416: IP-ST-BFD(default): queued Config BFD neighbor command: intf Ethernet1/1, gw 20.1.1.1 *Dec 18 19:01:48.416: IP-ST: Entering ipstatic_bfd_neighbor_add RtrB(config)# RtrB(config)#ip route 88.2.0.0 255.255.0.0 Ethernet1/1 20.1.1.1 RtrB(config)# *Dec 18 19:02:06.348: IP-ST: head_gwif: NULL *Dec 18 19:02:06.348: IP-ST: Inserted to GWIF tree (head): 88.2.0.0/16 Et1/1 20.1.1.1 *Dec 18 19:02:16.852: RT: updating static 88.2.0.0/16 (0x0) via 20.1.1.1 Et1/1 *Dec 18 19:02:16.856: RT: add 88.2.0.0/16 via 20.1.1.1, static metric [1/0] RtrB(config)#end RtrB#
DB-1227
debug ip rsvp
Caution
Use this command with a small number of tunnels or Resource Reservation Protocol (RSVP) reservations. Too much data can overload the CPU. To display debug messages for RSVP categories, use the debug ip rsvp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip rsvp [all | api | authentication | cli | data-pkts | database | detail | dump-messages | errors | events | fast-reroute | filter [acl | vrf {* | vrf-name [acl]]} | function | handles | hello | messages | msg-mgr | path | policy | proxy | rate-limit | reliable-msg | resv | routing | sbm | signalling | snmp | summary-refresh | svc | timeouts | timer | traffic-control | wfq] no debug ip rsvp
Syntax Description
all api authentication cli data-pkts database detail dump-messages errors events fast-reroute filter acl vrf * vrf vrf-name acl function handles hello messages msg-mgr path policy proxy rate-limit
(Optional) RSVP messages for all categories. (Optional) RSVP application programming interface (API) events. (Optional) RSVP authentication. (Optional) RSVP command-line interface (CLI). (Optional) RSVP data processing. (Optional) RSVP database debugging. (Optional) RSVP packet content. (Optional) Dump RSVP message content. (Optional) Informational debugging messages and messages about irregular events. (Optional) RSVP process events. (Optional) RSVP fast-reroute support for label-switched paths (LSPs). (Optional) RSVP debug message filter. (Optional) Number (1 to 199) of the access control list (ACL). (Optional) A virtual routing and forwarding (VFR) instance. * = A wildcard to display all VRFs. (Optional) A VFR instance. vrf-name = The name of a VRF. (Optional) Number (1 to 199) of the ACL for the VRF. (Optional) RSVP function names. (Optional) RSVP database handles event. (Optional) RSVP hello events. (Optional) Brief information about all RSVP messages that are sent and received via IP debugging. (Optional) RSVP message-manager events. (Optional) RSVP PATH messages. (Optional) RSVP policy information. (Optional) Proxy API trace. (Optional) RSVP rate-limiting events.
DB-1228
December 2010
reliable-msg resv routing sbm signalling snmp sso summary-refresh svc timeouts timer traffic-control wfq
(Optional) RSVP reliable messages events. (Optional) RSVP RESV messages. (Optional) RSVP routing messages. (Optional) RSVP subnet bandwidth manager (SBM) messages. (Optional) RSVP signalling (PATH and RESV) messages. (Optional) RSVP Simple Network Management Protocol (SNMP) events. (Optional) RSVP stateful switchover (SSO) events. (Optional) RSVP summary refresh and bundle messages events. (Optional) Switched virtual circuit (SVC) events. (Optional) RSVP refresh timeouts. (Optional) RSVP timer events. (Optional) RSVP traffic control events. (Optional) RSVP weighted fair queueing (WFQ) events.
Command Modes
Command History
Release 12.0(5)T 12.2(13)T 12.0(23)S 12.0(24)S 12.2(33)SRA 12.2(31)SB2 12.2(33)SXH 12.4(20)T 15.0(1)M 12.2(33)SRE
Modification This command was introduced. The dump-messages, msg-mgr, proxy, rate-limit, reliable-msg, and summary-refresh keywords were added. The timeouts keyword was added. The hello keyword was added. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command was integrated into Cisco IOS Release 12.2(33)SXH. The command output was modified to display RSVP source address and interface information. This command was modified. The optional vrf and * keywords and vrf-name argument were added. This command was modified. For point-to-multipoint traffic engineering tunnels, the output displays the destination address of the sub-label switched path (LSP).
Examples
The following output appears in source-address: source-address format after you configure a source address and enable the debug ip rsvp cli command:
Router# debug ip rsvp cli RSVP cli debugging is on *Sep 11 06:33:27.203: RSVP: RSVP source-address is enabled on interface Ethernet1/0. source-address: 10.1.3.13
DB-1229
The following output appears in source-interface::address: source-interface::address format after you configure a source interface address and enable the debug ip rsvp cli command:
*Sep 11 06:33:27.203: RSVP: RSVP source-interface is enabled on interface Ethernet1/0. source-interface::address: Loopback0::10.1.1.1
The following output appears when you enable the debug ip rsvp path command and configure a source address in the HOP object of PATH, PATHTEAR, or PATHERROR messages:
*Sep 12 08:56:46.267: RSVP: 10.1.1.1_200->10.4.4.4_100[0.0.0.0]: building hop object with src addr: 10.2.3.23
The following commands show how to enable debugging for RSVP signaling and messages:
Router# debug ip rsvp signalling RSVP signalling messages (Summary) debugging is on Router# debug ip rsvp messages RSVP messages (sent/received via IP) debugging is on
The following output displays RSVP signaling-related events that include sending and receiving PATH and RESV messages, admitting new reservations, establishing sessions, sending and receiving acknowledgments (ACKs), and sending and receiving summary refresh messages:
01:14:56:RSVP 10.20.1.1_19->10.75.1.1_100[10.20.1.1]:Received Path message from 10.20.1.1 (on sender host) 01:14:56:RSVP:new path message passed parsing, continue... 01:14:56:RSVP 10.20.1.1_19->10.75.1.1_100[10.20.1.1]:Refresh Path psb = 61646BB0 refresh interval = 0mSec 01:14:56:RSVP 10.20.1.1_19->10.75.1.1_100[10.20.1.1]:Sending Path message to 10.4.4.2 01:14:56:RSVP session 10.75.1.1_100[10.20.1.1]:Path sent by IP to 10.4.4.2 length=216 checksum=B1E4 TOS=0xC0 prerouted=YES router_alert=YES udp=NO (Ethernet1) 01:14:56:RSVP:Resv received from IP layer (IP HDR 10.4.4.2->10.4.4.1) 01:14:56:RSVP session 10.75.1.1_100[10.20.1.1]:Received RESV for 10.75.1.1 (Ethernet1) from 10.4.4.2 01:14:56:RSVP 10.20.1.1_19->10.75.1.1_100[10.20.1.1]:reservation not found--new one 01:14:56:RSVP-RESV:Admitting new reservation:6165D0E4 01:14:56:RSVP 10.20.1.1_19->10.75.1.1_100[10.20.1.1]:RSVP bandwidth is available 01:14:56:RSVP-RESV:reservation was installed:6165D0E4 01:14:57:RSVP:Sending Unknown message to 10.4.4.2 01:14:57:RSVP:Ack sent by IP to 10.4.4.2 length=20 checksum=34A7 TOS=0x00 prerouted=NO router_alert=NO udp=NO (Ethernet1) 01:14:57:RSVP 10.20.1.1_19->10.75.1.1_100[10.20.1.1]:Refresh Path psb = 61646BB0 refresh interval = 937mSec 01:14:58:%LINK-3-UPDOWN:Interface Tunnel100, changed state to up 01:14:59:%LINEPROTO-5-UPDOWN:Line protocol on Interface Tunnel100, changed state to up 01:15:26:RSVP 10.20.1.1_19->10.75.1.1_100[10.20.1.1]:Refresh Path psb = 61646BB0 refresh interval = 30000mSec 01:15:26:RSVP 10.20.1.1_19->10.75.1.1_100[10.20.1.1]:Sending Path message to 10.4.4.2 01:15:26:RSVP session 10.75.1.1_100[10.20.1.1]:Path sent by IP to 10.4.4.2 length=216 checksum=B1E4 TOS=0xC0 prerouted=YES router_alert=YES udp=NO (Ethernet1) 01:15:26:RSVP:Resv received from IP layer (IP HDR 10.4.4.2->10.4.4.1) 01:15:26:RSVP session 10.75.1.1_100[10.20.1.1]:Received RESV for 10.75.1.1 (Ethernet1) from 10.4.4.2 01:15:26:RSVP 10.20.1.1_19->10.75.1.1_100[10.20.1.1]:reservation found--processing possible change:6165D0E4 01:15:26:RSVP 10.20.1.1_19->10.75.1.1_100[10.20.1.1]:No change in reservation 01:15:27:RSVP:Sending Ack message to 10.4.4.2
DB-1230
December 2010
01:15:27:RSVP:Ack sent by IP to 10.4.4.2 length=20 checksum=34A7 TOS=0x00 prerouted=NO router_alert=NO udp=NO (Ethernet1) 01:15:56:RSVP:Sending Srefresh message to 10.4.4.2 01:15:56:RSVP:Srefresh sent by IP to 10.4.4.2 length=32 checksum=CA0D TOS=0x00 prerouted=NO router_alert=NO udp=NO (Ethernet1) 01:15:56:RSVP:Ack received from IP layer (IP HDR 10.4.4.2->10.4.4.1) 01:15:56:RSVP:Srefresh received from IP layer (IP HDR 10.4.4.2->10.4.4.1) 01:15:56:RSVP-RESV:Resv state is being refreshed for 0x91 01:15:56:RSVP:Sending Ack message to 10.4.4.2 01:15:56:RSVP:Ack sent by IP to 10.4.4.2 length=20 checksum=34A5 TOS=0x00 prerouted=NO router_alert=NO udp=NO (Ethernet1) 01:16:26:RSVP:Sending Srefresh message to 10.4.4.2 01:16:26:RSVP:Srefresh sent by IP to 10.4.4.2 length=32 checksum=CA0C TOS=0x00 prerouted=NO router_alert=NO udp=NO (Ethernet1) 01:16:26:RSVP:Ack received from IP layer (IP HDR 10.4.4.2->10.4.4.1) 01:16:26:RSVP:Srefresh received from IP layer (IP HDR 10.4.4.2->10.4.4.1) 01:16:26:RSVP-RESV:Resv state is being refreshed for 0x91 01:16:26:RSVP:Sending Ack message to 10.4.4.2 01:16:26:RSVP:Ack sent by IP to 10.4.4.2 length=20 checksum=34A3 TOS=0x00 prerouted=NO router_alert=NO udp=NO (Ethernet1)
Related Commands
DB-1231
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS XE Release 2.6.
Usage Guidelines
This command displays information about RSVP aggregation sessions. RSVP aggregation maintains a Finite State Machine (FSM) for each aggregate session. The RSVP code uses the FSM to maintain aggregate states and transition between the states of an aggregate. For example, after the aggregator sends out the aggregate PATH message, a new state will be entered for the aggregate session (RESV_WAIT) to reflect that an aggregate RESV message is expected. If an aggregate RESV message is received, the session enters the ESTABLISHED state. If an aggregate RESV is not received within a timeout, the aggregate session is cleaned and the process starts again. Each aggregate reservation can be in one of the following states:
PATH_WAITValid at the deaggregator only. The aggregate reservation at the deaggregator enters this state after the deaggregator has sent a PATHERROR message requesting a new aggregate needed. RESV_WAITValid at the aggregator only. The aggregate reservation at the aggregator enters this state after the aggregator has sent a PATH message for the aggregate reservation. RESVCONF_WAITValid at the deaggregator only. The aggregate reservation at the deaggregator enters this state after the deaggregator has sent a RESV message for the aggregate reservation. ESTABLISHEDValid at both the aggregator and the deaggregator. The aggregator enters this state after a RESVCONF message has been sent. The deaggregator enters this state after it receives a RESVCONF message for the aggregate reservation. SHUT_DELAYValid at both the aggregator and the deaggregator. The aggregator and the deaggregator enter this state after the last end-to-end (E2E) reservation has been removed.
There are timers associated with the PATH_WAIT, RESV_WAIT, RESVCONF_WAIT, and SHUT_DELAY states. For example, if an event that is needed to move the FSM out of the PATH_WAIT, RESV_WAIT, or RESVCONF_WAIT state does not occur, (that is, an aggregate PATH message is not received when in the PATH_WAIT state), the timer expires and the aggregate is cleared.
DB-1232
December 2010
In the successful scenario, the aggregate stays in the ESTABLISHED state as long as some E2E flows are aggregated. Both the aggregator and the deaggregator stay in the SHUT_DELAY state until the timer expires or an aggregate RESVTEAR or PATHTEAR message is received.
Examples
The following example shows output from the debug ip rsvp aggregation command taken at an aggregator:
Router# debug ip rsvp aggregation RSVP aggregation debugging is on *Jan 25 18:40:03.385: RSVP-AGG-3175: 10.3.3.3->10.4.4.4_46[A][4AB8208]: event=NEW_AGG_NEEDED, current state=START *Jan 25 18:40:03.385: RSVP-AGG-3175: 10.3.3.3->10.4.4.4_46[A][4AB8208]: triggered Aggregate Path to 10.4.4.4 *Jan 25 18:40:03.385: RSVP-AGG-3175: 10.3.3.3->10.4.4.4_46[A][4AB8208]: new state=RESV_WAIT *Jan 25 18:40:03.441: RSVP-AGG-3175: 10.3.3.3->10.4.4.4_46[A][4AB8208]: event=AGG_RESV_STATE_CREATED, current state=RESV_WAIT *Jan 25 18:40:03.441: RSVP-AGG-3175: 10.3.3.3->10.4.4.4_46[A][4AB8208]: new state=ESTABLISHED *Jan 25 18:40:03.465: RSVP-AGG-3175: 10.3.3.3->10.4.4.4_46[A][4AB8208]: event=E2E_RESV_STATE_CREATED, current state=ESTABLISHED *Jan 25 18:40:03.465: RSVP-AGG-3175: 10.3.3.3->10.4.4.4_46[A][4AB8208]: event=E2E_RESV_STATE_ADMITTED, current state=ESTABLISHED
Related Commands
DB-1233
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
After you enable RSVP authentication, RSVP logs system error events whenever an authentication check fails. These events are logged instead of just being displayed when debugging is enabled because they may indicate potential security attacks. The events are generated when:
RSVP receives a message that does not contain the correct cryptographic signature. This could be due to misconfiguration of the authentication key or algorithm on one or more RSVP neighbors, but it may also indicate an (unsuccessful) attack. RSVP receives a message with the correct cryptographic signature, but with a duplicate authentication sequence number. This may indicate an (unsuccessful) message replay attack. RSVP receives a message with the correct cryptographic signature, but with an authentication sequence number that is outside the receive window. This could be due to a reordered burst of valid RSVP messages, but it may also indicate an (unsuccessful) message replay attack. Failed challenges result from timeouts or bad challenge responses.
Examples
The following example shows output from the debug ip rsvp authentication command in which the authentication type (digest) and the sequence number have been validated:
Router# debug ip rsvp authentication RSVP authentication debugging is on
DB-1234
December 2010
Router# show debugging *Jan 30 08:10:46.335:RSVP_AUTH:Resv integrity digest from 192.168.101.2 valid *Jan 30 08:10:46.335:RSVP_AUTH:Resv integrity sequence number 13971113505298841601 from 192.168.101.2 valid *Jan 30 08:10:46.335:RSVP_AUTH:Resv from 192.168.101.2 passed all authentication checks
Note
Cisco routers using RSVP authentication on Cisco IOS software ideally should have clocks that can be accurately restored to the correct time when the routers boot. This capability is available on certain Cisco routers that have clocks with battery backup. For those platforms that do not have battery backup, consider configuring the router to keep its clock synchronized with a Network Time Protocol (NTP) time server. Otherwise, if two adjacent routers have been operating with RSVP authentication enabled and one of them reboots such that its clock goes backward in time, it is possible (but unlikely) the router that did not reboot will log RSVP authentication sequence number errors.
Related Commands
DB-1235
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows the detailed debug information about RSVP and SBM that is available when you enable debug mode through the debug ip rsvp detail command:
Router# debug ip rsvp detail RSVP debugging is on router2#u *Dec 31 16:44:29.651: RSVP: send I_AM_DSBM message from 145.2.2.150 *Dec 31 16:44:29.651: RSVP: IP to 224.0.0.17 length=88 checksum=43AF (Ethernet2) *Dec 31 16:44:29.651: RSVP: version:1 flags:0000 type:I_AM_DSBM cksum:43AF ttl:254 reserved:0 length:88 *Dec 31 16:44:29.651: DSBM_IP_ADDR type 1 length 8 : 91020296 *Dec 31 16:44:29.651: HOP_L2 type 1 length 12: 00E01ECE *Dec 31 16:44:29.651: : 0F760000 *Dec 31 16:44:29.651: SBM_PRIORITY type 1 length 8 : 00000064 *Dec 31 16:44:29.651: DSBM_TIMERS type 1 length 8 : 00000F05 *Dec 31 16:44:29.651: SBM_INFO type 1 length 44: 00000000 *Dec 31 16:44:29.651: : 00240C02 00000007 *Dec 31 16:44:29.651: : 01000006 7F000005 *Dec 31 16:44:29.651: : 00000000 00000000 *Dec 31 16:44:29.655: : 00000000 00000000 *Dec 31 16:44:29.655: : 00000000
DB-1236
December 2010
Related Commands
Command debug ip rsvp debug ip rsvp detail sbm ip rsvp dsbm-candidate show ip rsvp sbm
Description Displays information about SBM message processing, the DSBM election process, and RSVP message processing. Displays detailed information about the contents of SMB messages only, and SBM and DSBM state transitions. Configures an interface as a DSBM candidate. Displays information about SBM configured for a specific RSVP-enabled interface or all RSVP-enabled interfaces on the router.
DB-1237
Use this command with a small number of tunnels or Resource Reservation Protocol (RSVP) reservations. Too much data can overload the console. To display debugging messages for all RSVP events, use the debug ip rsvp dump-messages command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip rsvp dump-messages [hex | path | resv | sbm | signalling] no debug ip rsvp dump-messages
Syntax Description
(Optional) Hex dump of packet contents. (Optional) Contents of Path messages. (Optional) Contents of Resv messages. (Optional) Contents of SBM messages. (Optional) Contents of all signaling (Path and Resv) messages.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(24)S.
Examples
The following command shows how to enable debugging for RSVP events:
Router# debug ip rsvp dump-messages RSVP message dump debugging is on
In the following display, notice that a Path message is transmitted and an ACK_DESIRED flag is set for ID: 0x26 Epoch: 0x76798A. In response, a Resv message is sent and an acknowledgment (ACK) is issued for ID: 0x26 Epoch: 0x76798A indicating the RSVP state is established on the neighboring router:
00:37:15:RSVP:version:1 flags:0000 type:PROXY_PATH cksum:0000 ttl:255 reserved:0 length:212 00:37:15: SESSION type 7 length 16: 00:37:15: Destination 140.75.1.1, TunnelId 100, Source 140.20.1.1, Protocol 0, Flags 0000 00:37:15: HOP type 1 length 12: 00:37:15: Neighbor 140.20.1.1, LIH 0x00000000 00:37:15: TIME_VALUES type 1 length 8 :
DB-1238
December 2010
00:37:15: Refresh period is 30000 msecs 00:37:15: SENDER_TEMPLATE type 7 length 12: 00:37:15: Source 140.20.1.1, tunnel_id 9 00:37:15: SENDER_TSPEC type 2 length 36: 00:37:15: version=0, length in words=7 00:37:15: Token bucket fragment (service_id=1, length=6 words 00:37:15: parameter id=127, flags=0, parameter length=5 00:37:15: average rate=1250 bytes/sec, burst depth=1000 bytes 00:37:15: peak rate =1250 bytes/sec 00:37:15: min unit=0 bytes, max pkt size=4294967295 bytes 00:37:15: ADSPEC type 2 length 48: 00:37:15: version=0 length in words=10 00:37:15: General Parameters break bit=0 service length=8 00:37:15: IS Hops:0 00:37:15: Minimum Path Bandwidth (bytes/sec):2147483647 00:37:15: Path Latency (microseconds):0 00:37:15: Path MTU:-1 00:37:15: Controlled Load Service break bit=0 service length=0 00:37:15: LABEL_REQUEST type 1 length 8 : 00:37:15: Layer 3 protocol ID:2048 00:37:15: EXPLICIT_ROUTE type 1 length 36: 00:37:15: (#1) Strict IPv4 Prefix, 8 bytes, 140.20.1.1/32 00:37:15: (#2) Strict IPv4 Prefix, 8 bytes, 140.4.4.2/32 00:37:15: (#3) Strict IPv4 Prefix, 8 bytes, 140.70.1.1/32 00:37:15: (#4) Strict IPv4 Prefix, 8 bytes, 140.70.1.2/32 00:37:15: SESSION_ATTRIBUTE type 7 length 28: 00:37:15: Session name:tagsw4500-21_t100 00:37:15: Setup priority:7, reservation priority:7 00:37:15: Status:May-Reroute 00:37:15: 00:37:15:RSVP:version:1 flags:0001 type:Path cksum:D61E ttl:255 reserved:0 length:216 00:37:15: MESSAGE_ID type 1 length 12: 00:37:15: ID:0x26 Epoch:0x76798A 00:37:15: Flags:ACK_DESIRED 00:37:15: SESSION type 7 length 16: 00:37:15: Destination 140.75.1.1, TunnelId 100, Source 140.20.1.1, Protocol 0, Flags 0000 00:37:15: HOP type 1 length 12: 00:37:15: Neighbor 140.4.4.1, LIH 0x10000401 00:37:15: TIME_VALUES type 1 length 8 : 00:37:15: Refresh period is 30000 msecs 00:37:15: EXPLICIT_ROUTE type 1 length 28: 00:37:15: (#1) Strict IPv4 Prefix, 8 bytes, 140.4.4.2/32 00:37:15: (#2) Strict IPv4 Prefix, 8 bytes, 140.70.1.1/32 00:37:15: (#3) Strict IPv4 Prefix, 8 bytes, 140.70.1.2/32 00:37:15: LABEL_REQUEST type 1 length 8 : 00:37:15: Layer 3 protocol ID:2048 00:37:15: SESSION_ATTRIBUTE type 7 length 28: 00:37:15: Session name:tagsw4500-21_t100 00:37:15: Setup priority:7, reservation priority:7 00:37:15: Status:May-Reroute 00:37:15: SENDER_TEMPLATE type 7 length 12: 00:37:15: Source 140.20.1.1, tunnel_id 9 00:37:15: SENDER_TSPEC type 2 length 36: 00:37:15: version=0, length in words=7 00:37:15: Token bucket fragment (service_id=1, length=6 words 00:37:15: parameter id=127, flags=0, parameter length=5 00:37:15: average rate=1250 bytes/sec, burst depth=1000 bytes 00:37:15: peak rate =1250 bytes/sec 00:37:15: min unit=0 bytes, max pkt size=4294967295 bytes 00:37:15: ADSPEC type 2 length 48: 00:37:15: version=0 length in words=10 00:37:15: General Parameters break bit=0 service length=8 00:37:15: IS Hops:1
DB-1239
00:37:15: Minimum Path Bandwidth (bytes/sec):1250000 00:37:15: Path Latency (microseconds):0 00:37:15: Path MTU:1500 00:37:15: Controlled Load Service break bit=0 service length=0 00:37:15: 00:37:15:RSVP:version:1 flags:0001 type:Resv cksum:DADF ttl:255 reserved:0 length:132 00:37:15: MESSAGE_ID_ACK type 1 length 12: 00:37:15: Type:ACK 00:37:15: ID:0x26 Epoch:0x76798A 00:37:15: Flags:None 00:37:15: MESSAGE_ID type 1 length 12: 00:37:15: ID:0x43 Epoch:0xE1A1B7 00:37:15: Flags:ACK_DESIRED 00:37:15: SESSION type 7 length 16: 00:37:15: Destination 140.75.1.1, TunnelId 100, Source 140.20.1.1, Protocol 0, Flags 0000 00:37:15: HOP type 1 length 12: 00:37:15: Neighbor 140.4.4.2, LIH 0x10000401 00:37:15: TIME_VALUES type 1 length 8 : 00:37:15: Refresh period is 30000 msecs 00:37:15: STYLE type 1 length 8 : 00:37:15: Shared-Explicit (SE) 00:37:15: FLOWSPEC type 2 length 36: 00:37:15: version = 0 length in words = 7 00:37:15: service id = 5, service length = 6 00:37:15: tspec parameter id = 127, flags = 0, length = 5 00:37:15: average rate = 1250 bytes/sec, burst depth = 1000 bytes 00:37:15: peak rate = 1250 bytes/sec 00:37:15: min unit = 0 bytes, max pkt size = 0 bytes 00:37:15: FILTER_SPEC type 7 length 12: 00:37:15: Source 140.20.1.1, tunnel_id 9 00:37:15: LABEL type 1 length 8 : 00:37:15: Labels:16 00:37:15: 00:37:15:RSVP:version:1 flags:0001 type:Ack cksum:34F5 ttl:255 reserved:0 length:20 00:37:15: MESSAGE_ID_ACK type 1 length 12: 00:37:15: Type:ACK 00:37:15: ID:0x43 Epoch:0xE1A1B7 00:37:15: Flags:None 00:37:15: 00:37:17:%LINK-3-UPDOWN:Interface Tunnel100, changed state to up 00:37:18:%LINEPROTO-5-UPDOWN:Line protocol on Interface Tunnel100, changed state to up
Related Commands
DB-1240
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(29)S. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ip rsvp errors command to display informational messages and messages about irregular events such as an incomplete setup or breakdown of an RSVP session. Informational messages do not necessarily indicate problems. It is useful to use this command if something has gone wrong, but you do not know what. If you enter a different debug command, such as debug ip rsvp signalling, all the signalling errors and the normal signalling events are displayed. You do not have to also enter the debug ip rsvp errors command. If there are many active RSVP sessions, enter the following configuration command to activate ACL filtering so that you will view only relevant debugging messages.
Router(config)# access-list number permit udp src_ip src_port dst_ip dst_port
Where
numberAccess list number, from 100 to 199 src_ipThe tunnel headend src_portThe link-state packet (LSP) ID dst_ipThe tunnel tailend dst_portThe tunnel ID, where the tunnel ID is the tunnel interface number
DB-1241
In the following example, debugging is allowed only when the session is initiated from 192.168.1.4 toward 192.168.1.8, for Tunnel8 on the headend.
Note
This ACL will capture both PATH and RESV messages for the session from 192.168.1.4 to 192.168.1.8, but not any tunnels originating from 1.8 going to 1.4. You can also specify the LSP ID, but that is less useful because it changes all the time, and the combination of the head, tail, and tunnel ID is generally enough to limit the output to what you want.
Router(config)# access-list 101 permit udp host 192.168.1.4 host 192.168.1.8 eq 8 Router# debug ip rsvp filter
Examples
The following is sample output from the debug ip rsvp errors command:
Router# debug ip rsvp errors *May 21 08:54:31.918: RSVP: 5.1.1.1_68->7.1.1.1_3[5.1.1.1]: Problem parsing PATH message: MISFORMATTED object (13) C-Type (2)
DB-1242
December 2010
Syntax Description
(Optional) Indicates whether clients are enabled or disabled. (Optional) Indicates whether detailed output is enabled or disabled. (Optional) Indicates whether messages are enabled or disabled. (Optional) Indicates whether statistics are enabled or disabled.
Command Default
Debugging activity for the Hello instance or communication with a neighbor does not occur.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)SXD1. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
When you enter the debug ip rsvp hello command, Resource Reservation Protocol (RSVP) signaling messages are shown, but RSVP hello messages are excluded because of the large number of hello messages that are sent.
Examples
Following is sample output from the debug ip rsvp hello command. The first portion of the output is for serial interface 2/0 when Hello is created.
Router# debug ip rsvp hello 00:22:03: RSVP-HELLO: rsvp_hello_inst_init: Initializing ACTIVE hello inst 10.0.0.2->10.0.0.3 00:22:03: RSVP-HELLO: rsvp_hello_create_instance_from_psb: Next hop Se2/0 is adjacent 00:22:03: RSVP-HELLO: rsvp_hello_create_instance_from_psb: Create hello instance for 10.0.0.2->10.0.0.3 on Se2/0 (psb=61BC5F60) 00:22:03: RSVP-HELLO: rsvp_hello_find_instance: psb_cnt=2 for hello inst 10.0.0.2->10.0.0.3 00:22:03: RSVP-HELLO: rsvp_hello_incoming_message: Neighbor 10.0.0.3 state changed to UP 00:22:05: %LINK-3-UPDOWN: Interface Tunnel1, changed state to up 00:22:06: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel1, changed state to up
DB-1243
Following is sample output from the debug ip rsvp hello stats command:
Router(config)# debug ip rsvp hello stats Router# 00:32:28: RSVP-HELLO: rsvp_hello_stats_init: Hello stats is being configured
Related Commands
Command ip rsvp signalling hello (configuration) ip rsvp signalling hello dscp ip rsvp signalling hello (interface) ip rsvp signalling hello refresh interval ip rsvp signalling hello refresh misses
Description Enables Hello globally on the router. Sets the DSCP value that is in the IP header of the Hello message sent out from an interface. Enables Hello on an interface where you need Fast Reroute protection. Configures the Hello request interval. Specifies how many Hello acknowledgments a node can miss in a row before the node considers that communication with its neighbor is down. Enables Hello statistics on the router.
DB-1244
December 2010
Syntax Description
Displays debugging output for all RSVP-TE HA categories except for the dumping of messages. Displays information about read and write operations to and from the checkpointed database during the RSVP-TE HA activities. Displays errors encountered by RSVP-TE during HA activities. Displays significant RSVP-TE stateful switchover (SSO) events during RSVP-TE HA activities, such as:
RSVP-TE process events RSVP-TE Route Processor (RP) state (active, standby, and recovery) changes Recovery period beginning and end Redundant Facility (RF) events handled by RSVP-TE
Displays significant events for the RSVP-TE checkpointed database finite state machine (fsm) during the RSVP-TE HA activities. Displays information about RSVP-TE In-Service Software Upgrade (ISSU) activity. Displays information about Checkpointing Facility (CF) messages sent by RSVP-TE between the active RP and the standby RP.
Command Default
Command Modes
Command History
Modification This command was introduced. Support for ISSU was added. This command was integrated into Cisco IOS Release 12.2(33)SXH.
DB-1245
Usage Guidelines
This command displays information about RSVP-TE activities, before and after SSO, that improve the availability of network resources and services.
Examples
The following example is sample output from the debug ip rsvp high-availability all command, which turns on debugging for IP RSVP-TE HA events, messages, database, errors, fsm, and ISSU:
Router# debug ip rsvp high-availability all RSVP HA all debugging is on Router# show debug <---- This command displays the debugging that is enabled.
This sample debugging output is displayed as an SSO recovery begins on the standby router in the process of the standby router becoming active.
Note
The prefix in the debug output is composed of label switched path (LSP) 5-tuples in the following format: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]. The 10.0.0.3 represents the source address, the 61 represents the LSP ID, the 10.0.0.9 represents the tunnel destination (tunnel tail), the10 represents the tunnel ID, and the [10.0.0.3] represents the extended tunnel ID.
*May 12 19:46:14.267: RSVP-HA: session 65.39.97.4_18698[0.0.0.0]:rsvp_ha_read_lsp_head_info: Read LSP Head info: tun_id: 10 *May 12 19:46:14.267: RSVP-HA: session 10.0.0.1_10[0.0.0.0]: rsvp_ha_db_entry_find: lsp_head entry found *May 12 19:46:14.267: rsvp_ha_read_lsp_head_info: entry found *May 12 19:46:14.267: RSVP-HA:rsvp_ha_read_lsp_head_info: Read LSP Head info: tun_id: 10 *May 12 19:46:14.267: RSVP-HA: session 10.221.123.48_10[0.0.0.0]: rsvp_ha_db_entry_find: lsp_head entry found *May 12 19:46:14.267: rsvp_ha_read_lsp_head_info: entry found *May 12 19:46:15.995: %SYS-5-CONFIG_I: Configured from console by console *May 12 19:46:20.803: RSVP-HA: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_db_entry_find: lsp entry found *May 12 19:46:20.803: rsvp_ha_read_generic_info: lsp entry found *May 12 19:46:20.807: RSVP-HA: session 10.0.0.9_10[0.0.0.0]:rsvp_ha_write_generic_info: Writing lsp_head info *May 12 19:46:20.807: RSVP-HA: session 10.0.0.9_10[0.0.0.0]: rsvp_ha_db_entry_find: lsp_head entry not found *May 12 19:46:20.807: RSVP-HA: session 10.0.0.9_10[0.0.0.0]: rsvp_ha_handle_wr_entry_not_found: entry not found, type =lsp_head, action: Add *May 12 19:46:20.807: RSVP-HA: session 10.0.0.9_10[0.0.0.0]: rsvp_ha_db_entry_create: Created lsp_head entry *May 12 19:46:20.807: RSVP-HA: session 10.0.0.9_10[0.0.0.0]:rsvp_ha_set_entry_state: None -> Send-Pending *May 12 19:46:20.807: RSVP-HA: session 10.0.0.9_10[0.0.0.0]: rsvp_ha_db_wavl_entry_insert: Inserted entry into lsp_head Write DB, Send_Pending tree *May 12 19:46:20.807: RSVP-HA: session 10.0.0.9_10[0.0.0.0]:rsvp_ha_fsm_wr_event_add_entry: add lsp_head entry to Write DB *May 12 19:46:20.807: RSVP-HA: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_write_generic_info: Writing lsp info
DB-1246
December 2010
*May 12 19:46:20.807: RSVP-HA: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_db_entry_find: lsp entry not found *May 12 19:46:20.807: RSVP-HA: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_handle_wr_entry_not_found: entry not found, type =lsp, action: Add *May 12 19:46:20.807: RSVP-HA: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_db_entry_create: Created lsp entry *May 12 19:46:20.807: RSVP-HA:10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_set_entry_state: None -> Send-Pending *May 12 19:46:20.807: RSVP-HA: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_db_wavl_entry_insert: Inserted entry into lsp Write DB, Send_Pending tree *May 12 19:46:20.807: RSVP-HA: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_fsm_wr_event_add_entry: add lsp entry to Write DB *May 12 19:46:20.807: rsvp_ha_rd_remove_lsp_head_info: Event RD: remove lsp_head_info *May 12 19:46:20.807: RSVP-HA: session 10.27.90.140_10[0.0.0.0]: rsvp_ha_db_entry_find: lsp_head entry found *May 12 19:46:20.807: RSVP-HA: session 10.0.0.9_10[0.0.0.0]: rsvp_ha_db_wavl_entry_remove: Removed entry from lsp_head Read DB, Checkpointed tree *May 12 19:46:20.807: RSVP-HA: session 10.0.0.9_10[0.0.0.0]: rsvp_ha_db_entry_free: Freeing lsp_head entry *May 12 19:46:20.807: RSVP-HA: session 10.0.0.9_10[0.0.0.0]:rsvp_ha_set_entry_state: Checkpointed -> None . . .
The following example shows how to turn debugging off for this command:
Router# no debug ip rsvp high-availability all RSVP HA all debugging is off
Related Commands
Description Displays debugging output for RSVP signalling when the graceful restart feature is configured. Displays debugging output for MPLS traffic engineering HA activities during the graceful switchover from an active RP to a redundant standby RP.
DB-1247
Syntax Description
Command Modes
Command History
Release 12.2(33)SRE
Modification This command was introduced. For P2MP traffic engineering tunnels, the output displays the status of the sublabel switched paths (sub-LSPs).
Usage Guidelines
If the P2MP tunnel is not up, issue this command and the debug ip rsvp signalling command and examine the output to determine if there is a problem with the configuration. Use this command with a small number of tunnels or RSVP reservations or use the RSVP debug message filter to limit the amount of data. Too much data can overload the CPU.
Examples
DB-1248
December 2010
Related Commands
Command debug ip rsvp signalling show ip rsvp reservation show ip rsvp sender
Description Displays RSVP signalling (PATH and RESV) messages. Displays RSVP PATH-related receiver information currently in the database. Displays RSVP RESV-related receiver information currently in the database.
DB-1249
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You might find it useful to enable the debug cops command when you are using the debug ip rsvp policy command. Together, these commands generate a complete record of the policy process.
Examples
The following example uses only the debug ip rsvp policy command:
Router-1# debug ip rsvp policy RSVP_POLICY debugging is on 02:02:14:RSVP-POLICY:Creating outbound policy IDB entry for Ethernet2/0 (61E6AB38) 02:02:14:RSVP-COPS:COPS query for Path message, 10.31.0.1_44->10.33.0.1_44 02:02:14:RSVP-POLICY:Building incoming Path context 02:02:14:RSVP-POLICY:Building outgoing Path context on Ethernet2/0 02:02:14:RSVP-POLICY:Build REQ message of 216 bytes 02:02:14:RSVP-POLICY:Message sent to PDP 02:02:14:RSVP-COPS:COPS engine called us with reason2, handle 6202A658 02:02:14:RSVP-COPS:Received decision message 02:02:14:RSVP-POLICY:Received decision for Path message 02:02:14:RSVP-POLICY:Accept incoming message 02:02:14:RSVP-POLICY:Send outgoing message to Ethernet2/0 02:02:14:RSVP-POLICY:Replacement policy object for path-in context 02:02:14:RSVP-POLICY:Replacement TSPEC object for path-in context
DB-1250
December 2010
02:02:14:RSVP-COPS:COPS report for Path message, 10.31.0.1_44->10.33.0.1_44 02:02:14:RSVP-POLICY:Report sent to PDP 02:02:14:RSVP-COPS:COPS report for Path message, 10.31.0.1_44->10.33.0.1_44
The following example uses both the debug ip rsvp policy and the debug cops commands:
Router-1# debug ip rsvp policy RSVP_POLICY debugging is on Router-1# debug cops COPS debugging is on 02:15:14:RSVP-POLICY:Creating outbound policy IDB entry for Ethernet2/0 (61E6AB38) 02:15:14:RSVP-COPS:COPS query for Path message, 10.31.0.1_44->10.33.0.1_44 02:15:14:RSVP-POLICY:Building incoming Path context 02:15:14:RSVP-POLICY:Building outgoing Path context on Ethernet2/0 02:15:14:RSVP-POLICY:Build REQ message of 216 bytes 02:15:14:COPS:** SENDING MESSAGE ** COPS HEADER:Version 1, Flags 0, Opcode 1 (REQ), Client-type:1, Length:216 HANDLE (1/1) object. Length:8. 00 00 22 01 CONTEXT (2/1) object. Length:8. R-type:5. M-type:1 IN_IF (3/1) object. Length:12. Address:10.1.2.1. If_index:4 OUT_IF (4/1) object. Length:12. Address:10.33.0.1. If_index:3 CLIENT SI (9/1) object. Length:168. CSI data: 02:15:14: SESSION type 1 length 12: 02:15:14: Destination 10.33.0.1, Protocol_Id 17, Don't Police , DstPort 44 02:15:14: HOP type 1 length 12:0A010201 02:15:14: :00000000 02:15:14: TIME_VALUES type 1 length 8 :00007530 02:15:14: SENDER_TEMPLATE type 1 length 12: 02:15:14: Source 10.31.0.1, udp_source_port 44 02:15:14: SENDER_TSPEC type 2 length 36: 02:15:14: version=0, length in words=7 02:15:14: Token bucket fragment (service_id=1, length=6 words 02:15:14: parameter id=127, flags=0, parameter length=5 02:15:14: average rate=1250 bytes/sec, burst depth=10000 bytes 02:15:14: peak rate =1250000 bytes/sec 02:15:14: min unit=0 bytes, max unit=1514 bytes 02:15:14: ADSPEC type 2 length 84: 02:15:14: version=0 length in words=19 02:15:14: General Parameters break bit=0 service length=8 02:15:14: IS Hops:1 02:15:14: Minimum Path Bandwidth (bytes/sec):1250000 02:15:14: Path Latency (microseconds):0 02:15:14: Path MTU:1500 02:15:14: Guaranteed Service break bit=0 service length=8 02:15:14: Path Delay (microseconds):192000 02:15:14: Path Jitter (microseconds):1200 02:15:14: Path delay since shaping (microseconds):192000 02:15:14: Path Jitter since shaping (microseconds):1200 02:15:14: Controlled Load Service break bit=0 service length=0 02:15:14:COPS:Sent 216 bytes on socket, 02:15:14:RSVP-POLICY:Message sent to PDP 02:15:14:COPS:Message event! 02:15:14:COPS:State of TCP is 4 02:15:14:In read function 02:15:14:COPS:Read block of 96 bytes, num=104 (len=104) 02:15:14:COPS:** RECEIVED MESSAGE ** COPS HEADER:Version 1, Flags 1, Opcode 2 (DEC), Client-type:1, Length:104 HANDLE (1/1) object. Length:8. 00 00 22 01 CONTEXT (2/1) object. Length:8. R-type:1. M-type:1 DECISION (6/1) object. Length:8. COMMAND cmd:1, flags:0
DB-1251
DECISION (6/3) object. Length:56. REPLACEMENT 00 10 0E 01 61 62 63 64 65 66 67 68 69 6A 6B 6C 00 24 0C 02 00 00 00 07 01 00 00 06 7F 00 00 05 44 9C 40 00 46 1C 40 00 49 98 96 80 00 00 00 C8 00 00 01 C8 CONTEXT (2/1) object. Length:8. R-type:4. M-type:1 DECISION (6/1) object. Length:8. COMMAND cmd:1, flags:0 02:15:14:Notifying client (callback code 2) 02:15:14:RSVP-COPS:COPS engine called us with reason2, handle 6202A104 02:15:14:RSVP-COPS:Received decision message 02:15:14:RSVP-POLICY:Received decision for Path message 02:15:14:RSVP-POLICY:Accept incoming message 02:15:14:RSVP-POLICY:Send outgoing message to Ethernet2/0 02:15:14:RSVP-POLICY:Replacement policy object for path-in context 02:15:14:RSVP-POLICY:Replacement TSPEC object for path-in context 02:15:14:RSVP-COPS:COPS report for Path message, 10.31.0.1_44->10.33.0.1_44 02:15:14:COPS:** SENDING MESSAGE ** COPS HEADER:Version 1, Flags 1, Opcode 3 (RPT), Client-type:1, Length:24 HANDLE (1/1) object. Length:8. 00 00 22 01 REPORT (12/1) object. Length:8. REPORT type COMMIT (1) 02:15:14:COPS:Sent 24 bytes on socket, 02:15:14:RSVP-POLICY:Report sent to PDP 02:15:14:Timer for connection entry is zero 02:15:14:RSVP-COPS:COPS report for Path message, 10.31.0.1_44->10.33.0.1_44
Related Commands
DB-1252
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(24)S. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following command shows how to enable debugging for RSVP rate-limiting and message manager events:
Router# debug ip rsvp rate-limit RSVP rate-limit debugging is on Router# debug ip rsvp msg-mgr RSVP msg-mgr debugging is on
In the following display, RSVP process information including messages, timers, neighbors IP addresses, and message IDs, appear:
01:00:19:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_message 01:00:19:RSVP-MSG-MGR (140.4.4.2):Starting timer msg-pacing interval 20 01:00:19:RSVP-MSG-MGR (140.4.4.2):Enqueue element 27000405 of type 3 on msg-pacing TAIL 01:00:19:RSVP-RATE-LIMIT:rsvp_msg_pacing_timer - timer expired 01:00:19:RSVP-MSG-MGR (140.4.4.2):Dequeueing element 27000405 of type 3 from msg-pacing 01:00:19:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_qe:sending psb (qe 27000405) 01:00:21:%LINK-3-UPDOWN:Interface Tunnel100, changed state to up 01:00:22:%LINEPROTO-5-UPDOWN:Line protocol on Interface Tunnel100, changed state to up 01:01:03:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_message 01:01:03:RSVP-MSG-MGR (140.4.4.2):Starting timer msg-pacing interval 20 01:01:03:RSVP-MSG-MGR (140.4.4.2):Enqueue element 27000405 of type 3 on msg-pacing TAIL
DB-1253
01:01:03:RSVP-RATE-LIMIT:rsvp_msg_pacing_timer - timer expired 01:01:03:RSVP-MSG-MGR (140.4.4.2):Dequeueing element 27000405 of type 3 from msg-pacing 01:01:03:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_qe:sending psb (qe 27000405) 01:01:42:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_message 01:01:42:RSVP-MSG-MGR (140.4.4.2):Starting timer msg-pacing interval 20 01:01:42:RSVP-MSG-MGR (140.4.4.2):Enqueue element 27000405 of type 3 on msg-pacing TAIL 01:01:42:RSVP-RATE-LIMIT:rsvp_msg_pacing_timer - timer expired 01:01:42:RSVP-MSG-MGR (140.4.4.2):Dequeueing element 27000405 of type 3 from msg-pacing 01:01:42:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_qe:sending psb (qe 27000405) 01:02:09:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_message 01:02:09:RSVP-MSG-MGR (140.4.4.2):Starting timer msg-pacing interval 20 01:02:09:RSVP-MSG-MGR (140.4.4.2):Enqueue element 27000405 of type 3 on msg-pacing TAIL 01:02:09:RSVP-RATE-LIMIT:rsvp_msg_pacing_timer - timer expired 01:02:09:RSVP-MSG-MGR (140.4.4.2):Dequeueing element 27000405 of type 3 from msg-pacing 01:02:09:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_qe:sending psb (qe 27000405)
Related Commands
Description Controls the transmission rate for RSVP messages sent to a neighboring router during a specified interval. Displays active debug output.
DB-1254
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(24)S. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following command shows how to enable debugging for RSVP reliable messages events:
Router# debug ip rsvp reliable-msg RSVP reliable-msg debugging is on
In the following display, message IDs, acknowledgments (ACKs), and message processes including retransmissions, appear:
01:07:37:RSVP-RMSG:Inserted msg id(0x46, 0x48000403) on local msgid db 01:07:37:RSVP-RMSG:rsvp_rmsg_process_acks, Handle:000C1701 neighbor:140.4.4.2 01:07:37:RSVP-RMSG:max_ids:1 q_sz:1 msg_sz:1500 ids_len:1432 num_objs:0 obj_len:0 nbr:140.4.4.2 01:07:39:%LINK-3-UPDOWN:Interface Tunnel100, changed state to up 01:07:40:%LINEPROTO-5-UPDOWN:Line protocol on Interface Tunnel100, changed state to up 01:08:07:RSVP-RMSG:rsvp_rmsg_process_acks, Handle:000C1701 neighbor:140.4.4.2 01:08:07:RSVP-RMSG:max_ids:1 q_sz:1 msg_sz:1500 ids_len:1432 num_objs:0 obj_len:0 nbr:140.4.4.2 01:08:37:RSVP-RMSG:max_ids:1 q_sz:1 msg_sz:1500 ids_len:1424 num_objs:1 obj_len:8 nbr:140.4.4.2 01:08:37:RSVP-RMSG:rsvp_rmsg_process_immediate_tmb, Handle:2D000404 neighbor:140.4.4.2 01:08:37:RSVP-RMSG:Inserted msg id(0x47, 0x2D000404) on local msgid db 01:08:37:RSVP-RMSG:current queue:immed next_queue:rxmt-1 (qe 2D000404s) 01:08:37:RSVP-RMSG:rsvp_rmsg_process_acks, Handle:000C1701 neighbor:140.4.4.2
DB-1255
01:08:37:RSVP-RMSG:max_ids:1 q_sz:1 msg_sz:1500 ids_len:1432 num_objs:0 obj_len:0 nbr:140.4.4.2 01:08:38:RSVP-RMSG:rsvp_rmsg_process_rxmt_tmb, Handle:2D000404 neighbor:140.4.4.2 01:08:38:RSVP-RMSG:An ack was received for tmb 2D000404 on neighbor 140.4.4.2 01:09:07:RSVP-RMSG:max_ids:1 q_sz:1 msg_sz:1500 ids_len:1424 num_objs:1 obj_len:8 nbr:140.4.4.2 01:09:07:RSVP-RMSG:rsvp_rmsg_process_immediate_tmb, Handle:2E000404 neighbor:140.4.4.2 01:09:07:RSVP-RMSG:Inserted msg id(0x48, 0x2E000404) on local msgid db 01:09:07:RSVP-RMSG:current queue:immed next_queue:rxmt-1 (qe 2E000404s) 01:09:07:RSVP-RMSG:rsvp_rmsg_process_acks, Handle:000C1701 neighbor:140.4.4.2 01:09:07:RSVP-RMSG:max_ids:1 q_sz:1 msg_sz:1500 ids_len:1432 num_objs:0 obj_len:0 nbr:140.4.4.2 01:09:08:RSVP-RMSG:rsvp_rmsg_process_rxmt_tmb, Handle:2E000404 neighbor:140.4.4.2 01:09:08:RSVP-RMSG:An ack was received for tmb 2E000404 on neighbor 140.4.4.2 01:09:37:RSVP-RMSG:max_ids:1 q_sz:1 msg_sz:1500 ids_len:1424 num_objs:1 obj_len:8 nbr:140.4.4.2 01:09:37:RSVP-RMSG:rsvp_rmsg_process_immediate_tmb, Handle:2F000404 neighbor:140.4.4.2 01:09:37:RSVP-RMSG:Inserted msg id(0x49, 0x2F000404) on local msgid db 01:09:37:RSVP-RMSG:current queue:immed next_queue:rxmt-1 (qe 2F000404s) 01:09:37:RSVP-RMSG:rsvp_rmsg_process_acks, Handle:000C1701 neighbor:140.4.4.2 01:09:37:RSVP-RMSG:max_ids:1 q_sz:1 msg_sz:1500 ids_len:1432 num_objs:0 obj_len:0 nbr:140.4.4.2 01:09:38:RSVP-RMSG:rsvp_rmsg_process_rxmt_tmb, Handle:2F000404 neighbor:140.4.4.2 01:09:38:RSVP-RMSG:An ack was received for tmb 2F000404 on neighbor 140.4.4.2
Related Commands
DB-1256
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip rsvp sbm command provides information about messages received, minimal detail about the content of these messages, and information about state transitions.
Examples
The following example shows the detailed debug information about SBM and the SBM and DSBM state transitions that is available when you enable debug mode through the debug ip rsvp sbm command:
Router# debug ip rsvp sbm RSVP debugging is on router2# *Dec 31 16:45:34.659: RSVP: send I_AM_DSBM message from 145.2.2.150 *Dec 31 16:45:34.659: RSVP: IP to 224.0.0.17 length=88 checksum=9385 (Ethernet2) *Dec 31 16:45:34.659: RSVP: version:1 flags:0000 type:I_AM_DSBM cksum:9385 ttl:254 reserved:0 length:88 *Dec 31 16:45:34.659: DSBM_IP_ADDR type 1 length 8 : 91020296 *Dec 31 16:45:34.659: HOP_L2 type 1 length 12: 00E01ECE *Dec 31 16:45:34.659: : 0F760000 *Dec 31 16:45:34.659: SBM_PRIORITY type 1 length 8 : 0029B064 *Dec 31 16:45:34.659: DSBM_TIMERS type 1 length 8 : 00000F05 *Dec 31 16:45:34.659: SBM_INFO type 1 length 44: 00000000 *Dec 31 16:45:34.659: : 00240C02 00000007 *Dec 31 16:45:34.659: : 01000006 7F000005 *Dec 31 16:45:34.659: : 00000000 00000000
DB-1257
Related Commands
Description Displays information about SBM message processing, the DSBM election process, and RSVP message processing. Displays detailed information about RSVP and SBM. Configures an interface as a DSBM candidate.
DB-1258
December 2010
Syntax Description
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command displays debugging output from RSVP signaling during and after the Route Processor (RP) stateful switchover when system control and routing protocol execution is transferred from the active RP to the redundant standby RP. The SSO process occurs when the active router becomes unavailable, so that no interruption of network services occurs. The command displays information about the activities that RSVP performs when you configure a graceful restart, such as:
Writing checkpointing information into the write database when a new traffic engineering (TE) label switched path (LSP) is signaled on the active RP Recovering the LSP checkpointed information from the read database after SSO Displaying information about LSPs not recovered
Examples
The following is sample output from the debug ip rsvp sso command that was displayed during a successful SSO on the standby router as it became active:
Router# debug ip rsvp sso RSVP sso debugging is on Router#
DB-1259
Note
The prefix in the debug output is composed of LSP 5-tuples in the following format: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]. The 10.0.0.3 represents the source address, the 61 represents the LSP ID, the 10.0.0.9 represents the tunnel destination (tunnel tail), the10 represents the tunnel ID, and the [10.0.0.3] represents the extended tunnel ID.
*May 12 20:12:38.175: RSVP-HA: begin recovery, send msg to RSVP *May 12 20:12:38.175: RSVP: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: event: new Path received during RSVP or IGP recovery period *May 12 20:12:38.175: RSVP: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_sb_event_new_path_received: lsp_info found, attempt to recover lsp *May 12 20:12:38.175: RSVP: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: set psb_is_recovering flag *May 12 20:12:38.179: RSVP: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]:rsvp_ha_sb_set_path_info: Recovering: Set next_hop and next_idb in psb *May 12 20:12:38.179: RSVP: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]:rsvp_ha_mark_lsp_if_recoverable: LSP is recoverable (ERO expansion. not needed) *May 12 20:12:38.179: RSVP-HA: rsvp_ha_sb_handle_recovery_start: Recovery period start: set GR recovery time. *May 12 20:12:38.179: RSVP_HA: checkpoint hello_globals_info *May 12 20:12:38.179: RSVP-HELLO: rsvp_ha_update_all_gr_hi: Updating all GR HIs with new src_instance *May 12 20:12:38.183: RSVP: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: prevent populating output; LSP is recovering *May 12 20:12:38.187: RSVP: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: prevent populating output; LSP is recovering *May 12 20:12:38.939: RSVP: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_sb_event_new_resv_received: event: Resv for LSP received during recovery period *May 12 20:12:38.943: RSVP: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_event_lsp_create_head: psb found *May 12 20:12:38.943: RSVP: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_event_lsp_create_head: event: LSP created at head-end, try to checkpoint it *May 12 20:12:38.943: RSVP: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: LSP was checkpointed *May 12 20:12:38.943: RSVP-HA: 10.0.0.3_61->10.0.0.9_10[10.0.0.3]: rsvp_ha_sb_event_lsp_head_recovered: event: LSP head was recovered *May 12 20:12:38.943: RSVP-HA: recovery period over, send msg to RSVP *May 12 20:12:38.947: RSVP-HA: rsvp_ha_sb_handle_recovery_end: Deleting state for LSPs not recovered Router#
The following example shows how to turn debugging off for this command:
Router# no debug ip rsvp sso RSVP sso debugging is off
Related Commands
Description Displays debugging output for RSVP-TE HA activities that improve the accessibility of network resources. Displays debugging output for MPLS traffic engineering HA activities during the graceful switchover from an active RP to a redundant standby RP.
DB-1260
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(24)S. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following command shows how to enable debugging for RSVP summary-refresh messages events:
Router# debug ip rsvp summary-refresh RSVP summary-refresh debugging is on
In the following output, the IP addresses, the interfaces, the types of RSVP messages (Path and Resv), message IDs, and epoch identifiers (for routers) for which RSVP summary-refresh events occur are shown:
01:11:00:RSVP-SREFRESH:Incoming message from nbr 140.4.4.2 with epoch:0xE1A1B7 msgid:0x84 on Ethernet1 01:11:00:RSVP-SREFRESH 140.20.1.1_18->140.75.1.1_100[140.20.1.1]:Created msgid 0x84 for nbr 140.4.4.2 01:11:02:%LINK-3-UPDOWN:Interface Tunnel100, changed state to up 01:11:03:%LINEPROTO-5-UPDOWN:Line protocol on Interface Tunnel100, changed state to up 01:11:30:RSVP-SREFRESH:140.20.1.1_18->140.75.1.1_100[140.20.1.1]:Path, ID:0x4C :Start using Srefresh to 140.4.4.2 01:11:31:RSVP-SREFRESH:Incoming message from nbr 140.4.4.2 with epoch:0xE1A1B7 msgid:0x84 on Ethernet1 01:11:31:RSVP-SREFRESH:State exists for nbr:140.4.4.2 epoch:0xE1A1B7 msgid:0x84 01:12:00:RSVP-SREFRESH:Preparing to Send Srefresh(es) to 140.4.4.2, 1 IDs Total 01:12:00:RSVP-SREFRESH:Sending 1 IDs in this Srefresh 01:12:00:RSVP-SREFRESH:140.20.1.1_18->140.75.1.1_100[140.20.1.1]:Path, ID:0x4C
DB-1261
01:12:01:RSVP-SREFRESH:Incoming message from nbr 140.4.4.2 with epoch:0xE1A1B7 msgid:0x86 on Ethernet1 01:12:01:RSVP-SREFRESH:Rec'd 1 IDs in Srefresh from 140.4.4.2 (on Ethernet1), epoch:0xE1A1B7 msgid:0x86 01:12:01:RSVP-SREFRESH:140.20.1.1_18->140.75.1.1_100[140.20.1.1]:Resv, ID:0x84 01:12:30:RSVP-SREFRESH:Preparing to Send Srefresh(es) to 140.4.4.2, 1 IDs Total 01:12:30:RSVP-SREFRESH:Sending 1 IDs in this Srefresh 01:12:30:RSVP-SREFRESH:140.20.1.1_18->140.75.1.1_100[140.20.1.1]:Path, ID:0x4C 01:12:31:RSVP-SREFRESH:Incoming message from nbr 140.4.4.2 with epoch:0xE1A1B7 msgid:0x88 on Ethernet1 01:12:31:RSVP-SREFRESH:Rec'd 1 IDs in Srefresh from 140.4.4.2 (on Ethernet1), epoch:0xE1A1B7 msgid:0x88 01:12:31:RSVP-SREFRESH:140.20.1.1_18->140.75.1.1_100[140.20.1.1]:Resv, ID:0x84 01:13:00:RSVP-SREFRESH:Preparing to Send Srefresh(es) to 140.4.4.2, 1 IDs Total 01:13:00:RSVP-SREFRESH:Sending 1 IDs in this Srefresh 01:13:00:RSVP-SREFRESH:140.20.1.1_18->140.75.1.1_100[140.20.1.1]:Path, ID:0x4C 01:13:01:RSVP-SREFRESH:Incoming message from nbr 140.4.4.2 with epoch:0xE1A1B7 msgid:0x8A on Ethernet1 01:13:01:RSVP-SREFRESH:Rec'd 1 IDs in Srefresh from 140.4.4.2 (on Ethernet1), epoch:0xE1A1B7 msgid:0x8A 01:13:01:RSVP-SREFRESH:140.20.1.1_18->140.75.1.1_100[140.20.1.1]:Resv, ID:0x84
Note
In the preceding output, notice the message IDs that correspond to Path or Resv state being refreshed. Because the entire message does not have to be transmitted, there is less data and network performance is improved.
Related Commands
DB-1262
December 2010
Syntax Description
Command Modes
Command History
Release 12.0 12.2(15)T 12.0(24)S 12.2(14)S 12.2(18)SXF2 12.2(33)SRA Cisco IOS XE Release 2.6
Modification This command was introduced. This command was modified. The command output was modified to include compression-related events. This command was integrated into Cisco IOS Release 12.0(24)S. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(18)SXF2. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS XE Release 2.6.
Usage Guidelines
Examples
The following example from the debug ip rsvp traffic-control command shows that compression was successfully predicted:
Router# debug ip rsvp traffic-control RSVP debugging is on Router# show debugging 00:44:49: 00:44:49: 00:44:49: 00:44:49: 00:44:49: 00:44:49: 00:44:49: 00:44:49: 00:44:49: 00:44:49: 00:44:49: 00:44:49: RSVP-TC: RSVP-TC: RSVP-TC: RSVP-TC: RSVP-TC: RSVP-TC: RSVP-TC: RSVP-TC: RSVP-TC: RSVP-TC: RSVP-TC: RSVP-TC: Attempting to install QoS for rsb 62CC66F0 Adding new tcsb 02000406 for rsb 62CC66F0 Assigning WFQ QoS (on FR VC 101) to tcsb 02000406 Predicted compression for TCSB 2000406: method = rtp context ID = 2 factor = 82 percent bytes-saved = 36 bytes Bandwidth check: requested bw=65600 old bw=0 RSVP bandwidth is available Consulting policy for tcsb 02000406 Policy granted QoS for tcsb 02000406
DB-1263
RSVP-TC: Requesting QoS for tcsb 02000406 RSVP-TC: ( r = 8200 bytes/s M = 164 bytes RSVP-TC: b = 328 bytes m = 164 bytes ) RSVP-TC: p = 10000 bytes/s Service Level = priority RSVP-WFQ: Update for tcsb 02000406 on FR PVC dlci 101 on Se3/0 RSVP-WFQ: Admitted 66 kbps of bandwidth RSVP-WFQ: Allocated PRIORITY queue 24 RSVP-TC: Allocation succeeded for tcsb 02000406
The following example from the debug ip rsvp traffic-control command shows that compression was unsuccessfully predicted because no compression context IDs were available:
Router# debug ip rsvp traffic-control RSVP debugging is on Router# show debugging 00:10:16:RSVP-TC:Attempting to install QoS for rsb 62CED62C 00:10:16:RSVP-TC:Adding new tcsb 01000421 for rsb 62CED62C 00:10:16:RSVP-TC:Assigning WFQ QoS (on FR VC 101) to tcsb 01000421 00:10:16:RSVP-TC:sender's flow is not rtp compressible for TCSB 1000421 00:10:16: reason: no contexts available 00:10:16:RSVP-TC:sender's flow is not udp compressible for TCSB 1000421 00:10:16: reason: no contexts available 00:10:16:RSVP-TC:Bandwidth check:requested bw=80000 old bw=0 00:10:16:RSVP-TC:RSVP bandwidth is available 00:10:16:RSVP-TC:Consulting policy for tcsb 01000421 00:10:16:RSVP-TC:Policy granted QoS for tcsb 01000421 00:10:16:RSVP-TC:Requesting QoS for tcsb 01000421 00:10:16:RSVP-TC: ( r = 10000 bytes/s M = 200 bytes 00:10:16:RSVP-TC: b = 400 bytes m = 200 bytes ) 00:10:16:RSVP-TC: p = 10000 bytes/s Service Level = priority 00:10:16:RSVP-WFQ:Update for tcsb 01000421 on FR PVC dlci 101 on Se3/0 00:10:16:RSVP-WFQ:Admitted 80 kbps of bandwidth 00:10:16:RSVP-WFQ:Allocated PRIORITY queue 24 00:10:16:RSVP-TC:Allocation succeeded for tcsb 01000421
Related Commands
DB-1264
December 2010
Syntax Description
Command Modes
Command History
Release 12.1(3)T 12.0(24)S 12.2(14)S 12.2(18)SXF2 12.2(33)SRA Cisco IOS XE Release 2.6
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(24)S. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(18)SXF2. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS XE Release 2.6.
Examples
The following is sample output from the debug ip rsvp wfq command:
Router# debug ip rsvp wfq RSVP debugging is on Router# show debugging IP RSVP debugging is on IP RSVP debugging (Traffic Control events) is on IP RSVP debugging (WFQ events) is on Router# 03:03:23:RSVP-TC:Attempting to install QoS for rsb 6268A538 03:03:23:RSVP-TC:Adding new tcsb 00001A01 for rsb 6268A538 03:03:23:RSVP-TC:Assigning WFQ QoS to tcsb 00001A01 03:03:23:RSVP-TC:Consulting policy for tcsb 00001A01 03:03:23:RSVP-TC:Policy granted QoS for tcsb 00001A01 03:03:23:RSVP-TC:Requesting QoS for tcsb 00001A01 03:03:23:RSVP-TC: ( r = 12500 bytes/s M = 1514 bytes 03:03:23:RSVP-TC: b = 1000 bytes m = 0 bytes ) 03:03:23:RSVP-TC: p = 12500 bytes/s Service Level = non-priority
DB-1265
03:03:23:RSVP-WFQ:Requesting a RESERVED queue on Et0/1 for tcsb 00001A01 03:03:23:RSVP-WFQ:Queue 265 allocated for tcsb 00001A01 03:03:23:RSVP-TC:Allocation succeeded for tcsb 00001A01 Router# Router# no debug ip rsvp wfq RSVP debugging is off
Related Commands
DB-1266
December 2010
Syntax Description
Command Modes
Examples
The following is sample output from the debug ip rtp header-compression command:
Router# debug ip rtp header-compression RHC RHC RHC RHC RHC RHC RHC RHC BRI0: BRI0: BRI0: BRI0: BRI0: BRI0: BRI0: BRI0: rcv compressed rtp context0: expected rcv compressed rtp context0: expected rcv compressed rtp context0: expected rcv compressed rtp context0: expected packet sequence packet sequence packet sequence packet sequence
Description Compression state for a connection 0. RTP header compression link sequence (expected). RTP header compression link sequence (actually received).
Related Commands
DB-1267
Syntax Description
Command Modes
Examples
The following is sample output from the debug ip rtp packets command:
Router# debug ip rtp packets RTP packet dump: IP: source: 171.68.8.10, destination: 224.2.197.169, id: 0x249B, ttl: 9, TOS: 0 prot: 17, UDP: source port: 1034, destination port: 27404, checksum: 0xB429,len: 152 RTP: version: 2, padding: 0, extension: 0, marker: 0, payload: 3, ssrc 2369713968, sequence: 2468, timestamp: 85187180, csrc count: 0
Related Commands
DB-1268
December 2010
debug ip scp
To troubleshoot secure copy (SCP) authentication problems, use the debug ip scp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip scp no debug ip scp
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(21)S. This command was integrated into Cisco IOS Release 12.2(22)S. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(18)SXD. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example is output from the debug ip scp command. In this example, a copy of the file scptest.cfg from a UNIX host running configuration of the router was successful.
Router# debug ip scp 4d06h:SCP:[22 4d06h:SCP:[22 4d06h:SCP:[22 4d06h:SCP:[22 4d06h:SCP:[22 4d06h:SCP:[22 4d06h:SCP:[22 -> <-> <<-> <10.11.29.252:1018] 10.11.29.252:1018] 10.11.29.252:1018] 10.11.29.252:1018] 10.11.29.252:1018] 10.11.29.252:1018] 10.11.29.252:1018] send recv send recv recv send recv <OK> C0644 20 scptest.cfg <OK> 20 bytes <OK> <OK> <EOF>
The following example is also output from the debug ip scp command, but in this example, the user has privilege 0 and is therefore denied:
Router# debug ip scp 4d06h:SCP:[22 -> 10.11.29.252:1018] send Privilege denied.
Related Commands
DB-1269
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
In a live system, the debugging messages for performance, state, signal, and warnings are the most useful. These show any association or destination address failures and can be used to monitor the stability of any established associations.
Caution
The debug ip sctp api command should not be used in a live system that has any significant amount of traffic running because it can generate a lot of traffic, which can cause associations to fail.
Examples
The following example shows SCTP calls to the API that are being executed and the parameters associated with these calls:
Router# debug ip sctp api *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar 1 1 1 1 1 1 1 1 1 1 00:31:14.211: 00:31:14.211: 00:31:14.211: 00:31:14.211: 00:31:14.211: 00:31:14.211: 00:31:14.211: 00:31:14.211: 00:31:14.211: 00:31:14.211: SCTP: sctp_send: Assoc ID: 1 SCTP: stream num: 10 SCTP: bptr: 62EE332C, dptr: 4F7B598 SCTP: datalen: 100 SCTP: context: 1 SCTP: lifetime: 0 SCTP: unorder flag: FALSE SCTP: bundle flag: TRUE SCTP: sctp_send successful return SCTP: sctp_receive: Assoc ID: 1
DB-1270
December 2010
1 1 1 1 1 1
max data len: 100 sctp_receive successful return Process Send Request sctp_receive: Assoc ID: 0 max data len: 100 sctp_receive successful return
Field Assoc ID stream num bptr, dptr datalen context lifetime unorder flag bundle flag max data len
Description Association identifier. SCTP stream number. Address of the buffer that contains the data, and address of the start of the data. Length of the data that the application is sending (the datagram). A value that is meaningful to the application. Returned with the datagram if the datagram ever needs to be retrieved. Not used. Specifies that the datagram should be sent as unordered data. Indicates whether the application wants the datagram to be delayed slightly, trying to bundle it with other data being sent. Maximum length of data that can be receivedthe size of the receive buffer.
Related Commands
Command clear ip sctp statistics debug ip sctp congestion show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1271
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
In a live system, the debugging messages for performance, state, signal, and warnings are the most useful. These show any association or destination address failures and can be used to monitor the stability of any established associations. Debug commands other than those for performance, state, signal, and warnings can generate a great deal of output and therefore can cause associations to fail. These commands should be used only in test environments or when there are very low amounts of traffic.
Examples
DB-1272
December 2010
SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP:
Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc
0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0:
Bundle for 10.5.0.4, rem rwnd 12800, cwnd 19500, outstand 1200 Bundled 12 chunks, remote rwnd 11600, outstand 2400 Bundling data, next chunk dataLen (100) > remaining mtu size Bundle for 10.5.0.4, rem rwnd 11600, cwnd 19500, outstand 2400 Bundled 12 chunks, remote rwnd 10400, outstand 3600 Bundling data, next chunk dataLen (100) > remaining mtu size Bundle for 10.5.0.4, rem rwnd 10400, cwnd 19500, outstand 3600 Bundled 4 chunks, remote rwnd 10000, outstand 4000 No additional chunks waiting. Data chunks rcvd, local rwnd 7800 Data chunks rcvd, local rwnd 7000 Add Sack, local a_rwnd 7000 Chunk A22F3B45 ack'd, dest 10.5.0.4, outstanding 3900 Chunk A22F3B46 ack'd, dest 10.5.0.4, outstanding 3800 Chunk A22F3B47 ack'd, dest 10.5.0.4, outstanding 3700 Chunk A22F3B48 ack'd, dest 10.5.0.4, outstanding 3600 Chunk A22F3B49 ack'd, dest 10.5.0.4, outstanding 3500 Chunk A22F3B4A ack'd, dest 10.5.0.4, outstanding 3400 Chunk A22F3B4B ack'd, dest 10.5.0.4, outstanding 3300 Chunk A22F3B4C ack'd, dest 10.5.0.4, outstanding 3200 Chunk A22F3B4D ack'd, dest 10.5.0.4, outstanding 3100 Chunk A22F3B4E ack'd, dest 10.5.0.4, outstanding 3000 Chunk A22F3B4F ack'd, dest 10.5.0.4, outstanding 2900 Chunk A22F3B50 ack'd, dest 10.5.0.4, outstanding 2800 Chunk A22F3B51 ack'd, dest 10.5.0.4, outstanding 2700 Chunk A22F3B52 ack'd, dest 10.5.0.4, outstanding 2600 Chunk A22F3B53 ack'd, dest 10.5.0.4, outstanding 2500 Chunk A22F3B54 ack'd, dest 10.5.0.4, outstanding 2400 Chunk A22F3B55 ack'd, dest 10.5.0.4, outstanding 2300 Chunk A22F3B56 ack'd, dest 10.5.0.4, outstanding 2200
Description Congestion window values for destination address. Receiver window values as defined in RFC 2960. Number of bytes outstanding.
Related Commands
Command clear ip sctp statistics show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1273
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
All initialization chunks are shown, including the INIT, INIT_ACK, COOKIE_ECHO, and COOKIE_ACK chunks. This debug command can be used to see the chunks associated with any initialization sequence but does not display data chunks sent once the association is established. Therefore, it is safe to use in a live system that has traffic flowing when you have trouble with associations failing and being reestablished.
Examples
SCTP: Assoc 0: Send Init SCTP: INIT_CHUNK, len 42 SCTP: Initiate Tag: B4A10C4D, Initial TSN: B4A10C4D, rwnd 9000 SCTP: Streams Inbound: 13, Outbound: 13 SCTP: IP Addr: 10.1.0.2 SCTP: IP Addr: 10.2.0.2 SCTP: Supported addr types: 5
DB-1274
December 2010
*Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
00:53:13.307: 00:53:13.307: 00:53:13.307: 00:53:13.307: 00:53:13.307: 00:53:13.307: 00:53:13.307: 00:53:13.307: 00:53:13.307: 00:53:13.307: 00:53:13.307: 00:53:13.307: 00:53:13.307: 00:53:13.307: 00:53:13.311: 00:53:13.311: 00:53:13.311: 00:53:13.311: 00:53:13.311: 00:53:13.311: 00:53:13.311: 00:53:13.311: 00:53:13.311: 00:53:13.311: 00:53:13.311: 00:53:13.311:
SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP:
Process Init INIT_CHUNK, len 42 Initiate Tag: 3C2D8327, Initial TSN: 3C2D8327, rwnd 18000 Streams Inbound: 13, Outbound: 13 IP Addr: 10.5.0.4 IP Addr: 10.6.0.4 Supported addr types: 5 Assoc 0: Send InitAck INIT_ACK_CHUNK, len 124 Initiate Tag: B4A10C4D, Initial TSN: B4A10C4D, rwnd 9000 Streams Inbound: 13, Outbound: 13 Responder cookie len 88 IP Addr: 10.1.0.2 IP Addr: 10.2.0.2 Assoc 0: Process Cookie COOKIE_ECHO_CHUNK, len 88 Assoc 0: dest addr list: addr 10.5.0.4 addr 10.6.0.4
SCTP: Instance 0 dest addr list: SCTP: addr 10.5.0.4 SCTP: addr 10.6.0.4 SCTP: Assoc 0: Send CookieAck SCTP: COOKIE_ACK_CHUNK
Description Initiation chunk identifier. Initial transmission sequence number. Receiver window values.
Related Commands
Command clear ip sctp statistics debug ip sctp congestion show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1275
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
More than one IP address parameter can be included in an initialization (INIT) chunk when the INIT sender is multihomed. Datagrams should be sent to the primary destination addresses unless the network is experiencing problems, in which case the datagrams should be sent to secondary addresses.
Caution
The debug ip sctp multihome command generates one debug line for each datagram sent or received. It should be used with extreme caution in a live network.
Examples
The following example shows source and destination for multihomed addresses:
Router# debug ip sctp multihome SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 Assoc 0: Send Data to dest 10.5.0.4 Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len 1404 476 8787, len 28 8787, 8787, 8787, 8787, 28 28 1404 1404 len len len len 1404 1404 1404 476
DB-1276
December 2010
SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP:
Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 Assoc 0: Send Data to dest 10.5.0.4 Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 Rcvd s=10.6.0.4 8787, d=10.2.0.2 8787, len Sent: Assoc 0: s=10.2.0.2 8787, d=10.6.0.4 Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len Rcvd s=10.5.0.4 8787, d=10.1.0.2 8787, len
8787, len 28 1404 476 8787, len 28 8787, 8787, 8787, 8787, 44 8787, 28 28 1404 1404 8787, 1404 476 len len len len 1404 1404 1404 476
len 44
len 28
Field s d
Related Commands
Command clear ip sctp statistics debug ip sctp congestion show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1277
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
In a live system, the debugging messages for performance, state, signal, and warnings are the most useful. These show any association or destination address failures and can be used to monitor the stability of any established associations. Once enabled, the debug ip sctp performance command displays the average number of chunks and datagrams being sent and received per second once every 10 seconds. Note that the averages are cumulative since the last time the statistics were cleared using the clear ip sctp statistics command and may not accurately reflect the number of datagrams and chunks currently being sent and received at that particular moment.
Examples
DB-1278
December 2010
Table 170
Description Datagram sent to or received from the network. Includes data chunks and control chunks sent or received. Data chunks sent or received. Upper-layer protocol (ULP) datagrams, which are datagrams sent to or received from the ULP or application.
Related Commands
Command clear ip sctp statistics debug ip sctp congestion show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1279
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip sctp rcvchunks command shows the following information about received chunks:
Whether the chunk is for a new datagram or is part of a datagram that is being reassembled Whether the datagram is complete after receiving this chunk If the datagram is complete, whether the datagram is in sequence within the specified stream and can be delivered to the upper-layer protocol (ULP) The selective acknowledgments (SACKs) that are returned to the remote SCTP peer The cumulative transmission sequence number (Cum TSN) that was acknowledged and the number of fragments included Whether the datagram is received by the ULP
Caution
The debug ip sctp rcvchunks command generates multiple debug lines for each chunk received. It should be used with extreme caution in a live network.
Examples
In the following example, a segmented datagram is received in two chunks for stream 0 and sequence number 0. The length of the first chunk is 1452 bytes, and the second is 1 byte. The first chunk indicates that it is for a new datagram, but the second chunk indicates that it is part of an existing datagram that is already being reassembled. When the first chunk is processed, it is noted to be in sequence, but is not
DB-1280
December 2010
complete and so cannot be delivered yet. When the second chunk is received, the datagram is both in sequence and complete. The application receives the datagram, and a SACK is shown to acknowledge that both chunks were received with no missing chunks indicated (that is, with no fragments).
Router# debug ip sctp rcvchunks SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc 0: 0: 0: 0: 0: 0: 0: 0: New chunk (0/0/1452/2C33D822) for new dgram (0) dgram (0) is in seq Add Sack Chunk, CumTSN=2C33D822, numFrags=0 New chunk (0/0/1/2C33D823) for existing dgram (0) dgram (0) is complete ApplRecv chunk 0/0/1452/2C33D822 ApplRecv chunk 0/0/1/2C33D823 Add Sack Chunk, CumTSN=2C33D823, numFrags=0
Description Stream number / datagram sequence number / chunk length, in bytes / chunk transmission sequence number. Selective acknowledgment chunk. Application has received the chunk. Cumulative transmission sequence number that is being acknowledged. Number of fragments, or missing chunks.
Related Commands
Command clear ip sctp statistics debug ip sctp congestion show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1281
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip sctp rto command shows adjustments that are made to the retransmission timeout value (shown as retrans in the command output) because of either retransmission of data chunks or unacknowledged heartbeats.
Caution
The debug ip sctp rto command can generate a great deal of output. It should be used with extreme caution in a live network.
Examples
In the following example, there is only one destination address available. Each time the chunk needs to be retransmitted, the RTO value is doubled.
Router# debug ip sctp rto SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: destaddr destaddr destaddr destaddr destaddr destaddr destaddr destaddr destaddr destaddr 10.5.0.4, 10.5.0.4, 10.5.0.4, 10.5.0.4, 10.5.0.4, 10.5.0.4, 10.5.0.4, 10.5.0.4, 10.5.0.4, 10.5.0.4, retrans timeout on chunk rto backoff 2000 ms retrans timeout on chunk rto backoff 4000 ms retrans timeout on chunk rto backoff 8000 ms retrans timeout on chunk rto backoff 16000 ms retrans timeout on chunk rto backoff 32000 ms 942BAC55 942BAC55 942BAC55 942BAC55 942BAC55
DB-1282
December 2010
Related Commands
Command clear ip sctp statistics debug ip sctp congestion show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1283
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip sctp segments command provides the short form of the output about datagrams. For the verbose form, use the debug ip sctp segmentv command.
Caution
The debug ip sctp segments command generates several lines of output for each datagram sent or received. It should be used with extreme caution in a live network.
Examples
The following output shows an example in which an association is established, a few heartbeats are sent, the remote endpoint fails, and the association is restarted.
Router# debug ip sctp segments SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: Sent: Recv: Sent: Recv: Sent: Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 8787, len 56 INIT_CHUNK, Tag: 3C72A02A, TSN: 3C72A02A Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 56 INIT_CHUNK, Tag: 13E5AD6C, TSN: 13E5AD6C Assoc NULL: s=10.1.0.2 8787, d=10.5.0.4 8787, len 136 INIT_ACK_CHUNK, Tag: 3C72A02A, TSN: 3C72A02A Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 100 COOKIE_ECHO_CHUNK, len 88 Assoc NULL: s=10.1.0.2 8787, d=10.5.0.4 8787, len 16 COOKIE_ACK_CHUNK Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 8787, len 52 HEARTBEAT_CHUNK
DB-1284
December 2010
SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP:
Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 8787, len 52 HEARTBEAT_CHUNK Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 8787, len 52 HEARTBEAT_CHUNK Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 56 INIT_CHUNK, Tag: 4F2D8235, TSN: 4F2D8235 Assoc NULL: s=10.1.0.2 8787, d=10.5.0.4 8787, len 136 INIT_ACK_CHUNK, Tag: 7DD7E424, TSN: 7DD7E424 Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 100 COOKIE_ECHO_CHUNK, len 88 Assoc NULL: s=10.1.0.2 8787, d=10.5.0.4 8787, len 16 COOKIE_ACK_CHUNK Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 144 SACK_CHUNK, TSN ack: 7DD7E423, rwnd 18000, num frags 0 DATA_CHUNK, 4/0/100/4F2D8235 Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 8787, len 28 SACK_CHUNK, TSN ack: 4F2D8235, rwnd 8900, num frags 0 Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 8787, len 128 DATA_CHUNK, 4/0/100/7DD7E424 Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 28 SACK_CHUNK, TSN ack: 7DD7E424, rwnd 17900, num frags 0 Assoc 0: s=10.6.0.4 8787, d=10.2.0.2 8787, len 44 HEARTBEAT_CHUNK Assoc 0: s=10.2.0.2 8787, d=10.6.0.4 8787, len 44 HEARTBEAT_ACK_CHUNK Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 128 DATA_CHUNK, 7/0/100/4F2D8236 Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 8787, len 144 SACK_CHUNK, TSN ack: 4F2D8236, rwnd 9000, num frags 0 DATA_CHUNK, 7/0/100/7DD7E425 Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 28 SACK_CHUNK, TSN ack: 7DD7E424, rwnd 18000, num frags 0 Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 28 SACK_CHUNK, TSN ack: 7DD7E425, rwnd 17900, num frags 0 Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 128 DATA_CHUNK, 4/1/100/4F2D8237
Description Source address and port. Destination address and port. Length of chunk, in bytes. The identifier for an initialization chunk. Transmission sequence number. Receiver window value. Number of fragments received. (Data chunks) Stream number / datagram sequence number / chunk length, in bytes / chunk transmission sequence number.
DB-1285
Related Commands
Command clear ip sctp statistics debug ip sctp congestion debug ip sctp segmentv
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows every datagram that is sent or received and the chunks that are contained in each. This is the verbose form of the output, and it shows detailed information for each chunk type. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
DB-1286
December 2010
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip sctp segmentv command provides the verbose form of the output for datagrams. For the simple form, use the debug ip sctp segments command.
Caution
The debug ip sctp segmentv command generates multiple lines of output for each datagram sent and received. It should be used with extreme caution in a live network.
Examples
The following output shows an example in which an association is established, a few heartbeats are sent, the remote endpoint fails, and the association is restarted:
Router# debug ip sctp segmentv SCTP: Sent: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: Recv: SCTP: SCTP: SCTP: SCTP: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 8787, len 56, ver tag 0 INIT_CHUNK, len 42 Initiate Tag: B131ED6A, Initial TSN: B131ED6A, rwnd 9000 Streams Inbound: 13, Outbound: 13 IP Addr: 10.1.0.2 IP Addr: 10.2.0.2 Supported addr types: 5 Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 56, ver tag 0 INIT_CHUNK, len 42 Initiate Tag: 5516B2F3, Initial TSN: 5516B2F3, rwnd 18000 Streams Inbound: 13, Outbound: 13 IP Addr: 10.5.0.4
DB-1287
SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP:
Sent:
Sent:
Sent:
IP Addr: 10.6.0.4 Supported addr types: 5 Assoc NULL: s=10.1.0.2 8787, d=10.5.0.4 8787, len 136, ver tag 5516B2F3 INIT_ACK_CHUNK, len 124 Initiate Tag: B131ED6A, Initial TSN: B131ED6A, rwnd 9000 Streams Inbound: 13, Outbound: 13 Responder cookie len 88 IP Addr: 10.1.0.2 IP Addr: 10.2.0.2 Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 100, ver tag B131ED6A COOKIE_ECHO_CHUNK, len 88 Assoc NULL: s=10.1.0.2 8787, d=10.5.0.4 8787, len 16, ver tag 5516B2F3 COOKIE_ACK_CHUNK Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 144, ver tag B131ED6A SACK_CHUNK, len 16 TSN ack: (0xB131ED69) Rcv win credit: 18000 Num frags: 0 DATA_CHUNK, flags 3, chunkLen 116 DATA_CHUNK, 0/0/100/5516B2F3 Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 8787, len 28, ver tag 5516B2F3 SACK_CHUNK, len 16 TSN ack: (0x5516B2F3) Rcv win credit: 8900 Num frags: 0 Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 8787, len 128, ver tag 5516B2F3 DATA_CHUNK, flags 3, chunkLen 116 DATA_CHUNK, 0/0/100/B131ED6A Assoc 0: s=10.6.0.4 8787, d=10.2.0.2 8787, len 44, ver tag B131ED6A HEARTBEAT_CHUNK Assoc 0: s=10.2.0.2 8787, d=10.6.0.4 8787, len 44, ver tag 5516B2F3 HEARTBEAT_ACK_CHUNK Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 28, ver tag B131ED6A SACK_CHUNK, len 16
Field s d len ver tag Tag TSN rwnd Rcv win credit Num frags 0/0/100/5516B2F3
Description Source address and port. Destination address and port. Length of chunk, in bytes. Verification identifier. The identifier for an initialization chunk. Transmission sequence number. Receive window value. Receive window value. Same as rwnd. Number of fragments received. (Data chunks) Stream number / datagram sequence number / chunk length, in bytes / chunk transmission sequence number.
DB-1288
December 2010
Related Commands
Command clear ip sctp statistics debug ip sctp congestion debug ip sctp segments show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows short diagnostics for every datagram that is sent or received with SCTP. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1289
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip sctp signal command can be used to see if the current associations are stable or not. Because it generates output only on state transitions, it is safe to use in a live environment. It still should be used with caution, however, depending on the number of associations being handled by the system and the stability of the network. The debug ip sctp state command is often used at the same time as the debug ip sctp signal command. Using the two commands together gives good insight into the stability of associations.
Examples
In the following example, a new association is requested and established. The peer then restarts the association and notes that the association failed and is being reestablished. The local peer then indicates that the association has failed because it has tried to retransmit the specified chunk more than the maximum number of times without success. As a result, the association fails (because of communication loss) and is terminated. The ULP requests that the association be attempted again, and this attempt succeeds. A shutdown is then received from the remote peer, and the local peer enters the shutdown acknowledge sent state, which is followed by the association being terminated. Again, another association attempt is made and succeeds.
Router# debug ip sctp signal Router# debug ip sctp state <new assoc attempt> 00:20:08: SCTP: Assoc 0: 00:20:15: SCTP: Assoc 0:
DB-1290
December 2010
00:20:15: SCTP: Assoc 00:21:03: SCTP: Assoc 00:21:03: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc <new assoc attempt> 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc <new assoc attempt> 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc
0: 0: 0: 0: 0: 0: 0:
Sent ASSOC_UP signal for CONFIGD_ASSOC Restart rcvd from peer Sent ASSOC_RESTART signal chunk 62EA7F40 retransmitted more than max times, failing assoc Sent ASSOC_FAILED signal, reason: SCTP_COMM_LOST Sent ASSOC_TERMINATE signal state ESTABLISHED -> CLOSED
0: state CLOSED -> COOKIE_WAIT 0: state COOKIE_WAIT -> COOKIE_ECHOED 0: state COOKIE_ECHOED -> ESTABLISHED 0: Sent ASSOC_UP signal for CONFIGD_ASSOC 0: Sent TERMINATE_PENDING signal 0: state ESTABLISHED -> SHUTDOWN_ACKSENT 0: Sent ASSOC_TERMINATE signal 0: state SHUTDOWN_ACKSENT -> CLOSED 0: state CLOSED -> COOKIE_WAIT 0: state COOKIE_WAIT -> COOKIE_ECHOED 0: state COOKIE_ECHOED -> ESTABLISHED 0: Sent ASSOC_UP signal for CONFIGD_ASSOC
Related Commands
Command clear ip sctp statistics debug ip sctp congestion debug ip sctp state show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows SCTP state transitions. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1291
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Application send requests from the local SCTP peer Chunks being bundled and sent to the remote peer Processing of the selective acknowledgments (SACKs) from the remote peer, indicating which chunks were successfully received Chunks that are marked for retransmission
Caution
The debug ip sctp sndchunks command generates large amounts of data if there is any significant amount of traffic flowing. It should be used with extreme caution in live networks.
Examples
The following example shows output for the debug ip sctp sndchunks command for a case in which data chunks are being sent, with some of them marked for retransmission:
Router# debug ip sctp sndchunks SCTP: SCTP: SCTP: SCTP: SCTP: Assoc Assoc Assoc Assoc Assoc 0: 0: 0: 0: 0: ApplSend, chunk: 0/10412/100/A23134F8 to 10.5.0.4 ApplSend, chunk: 5/10443/100/A23134F9 to 10.5.0.4 ApplSend, chunk: 5/10448/100/A231355C to 10.5.0.4 Set oldest chunk for dest 10.5.0.4 to TSN A23134F8 Bundling data, added 0/10412/100/A23134F8, outstanding 100
DB-1292
December 2010
SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP:
Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc Assoc
0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0:
Bundling data, added 5/10443/100/A23134F9, outstanding 200 Bundling data, added 4/10545/100/A23134FA, outstanding 300 Bundling data, added 10/10371/100/A23134FB, outstanding 400 Bundling data, added 11/10382/100/A23134FC, outstanding 500 Process Sack Chunk, CumTSN=A231350F, numFrags=0 Reset oldest chunk on addr 10.5.0.4 to A2313510 Process Sack Chunk, CumTSN=A2313527, numFrags=0 Reset oldest chunk on addr 10.5.0.4 to A2313528 Process Sack Chunk, CumTSN=A231353F, numFrags=0 Reset oldest chunk on addr 10.5.0.4 to A2313540 Process Sack Chunk, CumTSN=A2313557, numFrags=0 Reset oldest chunk on addr 10.5.0.4 to A2313558 ApplSend, chunk: 10/10385/100/A23135BE to 10.5.0.4 ApplSend, chunk: 8/10230/100/A23135BF to 10.5.0.4 ApplSend, chunk: 5/10459/100/A23135C0 to 10.5.0.4 ApplSend, chunk: 4/10558/100/A23135C1 to 10.5.0.4 Set oldest chunk for dest 10.5.0.4 to TSN A231355D Bundling data, added 5/10449/100/A231355D, outstanding 100 Bundling data, added 3/10490/100/A231355E, outstanding 200 Process Sack Chunk, CumTSN=A23135A4, numFrags=0 Reset oldest chunk on addr 10.5.0.4 to A23135A5 Process Sack Chunk, CumTSN=A23135BC, numFrags=0 Reset oldest chunk on addr 10.5.0.4 to A23135BD Process Sack Chunk, CumTSN=A23135C1, numFrags=0 ApplSend, chunk: 5/10460/100/A23135C2 to 10.5.0.4 ApplSend, chunk: 5/10461/100/A23135C3 to 10.5.0.4 ApplSend, chunk: 11/10403/100/A2313626 to 10.5.0.4 Set oldest chunk for dest 10.5.0.4 to TSN A23135C2 Bundling data, added 5/10460/100/A23135C2, outstanding 100 Bundling data, added 5/10461/100/A23135C3, outstanding 200 Bundling data, added 5/10462/100/A23135C4, outstanding 300 Bundling data, added 4/10559/100/A23135C5, outstanding 400 Bundling data, added 4/10560/100/A23135C6, outstanding 500 Bundled 12 chunk(s) in next dgram to 10.5.0.4 Bundling data, added 1/10418/100/A2313622, outstanding 9700 Bundling data, added 3/10502/100/A2313623, outstanding 9800 Bundling data, added 7/10482/100/A2313624, outstanding 9900 Bundling data, added 3/10503/100/A2313625, outstanding 10000 Bundling data, added 11/10403/100/A2313626, outstanding 10100 Bundled 5 chunk(s) in next dgram to 10.5.0.4 Mark chunk A23135C2 for retrans Mark chunk A23135C3 for retrans Mark chunk A23135C4 for retrans Mark chunk A23135C5 for retrans Mark chunk A23135C6 for retrans Mark chunk A23135C7 for retrans Mark chunk A23135C8 for retrans Mark chunk A23135C9 for retrans Mark chunk A23135CA for retrans Bundled 6 chunk(s) in next dgram to 10.6.0.4 Mark chunk A23135C2 for retrans Mark chunk A23135C3 for retrans Mark chunk A23135C4 for retrans
DB-1293
Description Stream number / datagram sequence number / chunk length, in bytes / chunk transmission sequence number. Number of bytes outstanding to the specified destination address. Cumulative transmission sequence number (TSN). Number of fragments sent.
Related Commands
Command clear ip sctp statistics debug ip sctp congestion show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1294
December 2010
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip sctp state command can be used to see if the current associations are stable or not. Because it generates output only on state transitions, it is safe to use in a live environment. It still should be used with caution, however, depending on the number of associations being handled by the system and the stability of the network. The debug ip sctp state command is often used at the same time as the debug ip sctp signal command. Using the two commands together gives good insight into the stability of associations.
Examples
In the following example, a new association is requested and established. The peer then restarts the association and notes that the association failed and is being reestablished. The local peer then indicates that the association has failed because it has tried to retransmit the specified chunk more than the maximum number of times without success. As a result, the association fails (because of communication loss) and is terminated. The upper-layer protocol (ULP) requests that the association be attempted again, and this attempt succeeds. A shutdown is then received from the remote peer, and the local peer enters the shutdown acknowledge sent state, which is followed by the association being terminated. Again, another association attempt is made and succeeds.
Router# debug ip sctp signal Router# debug ip sctp state <new assoc attempt> 00:20:08: SCTP: Assoc 0: 00:20:15: SCTP: Assoc 0:
DB-1295
00:20:15: SCTP: Assoc 00:21:03: SCTP: Assoc 00:21:03: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc <new assoc attempt> 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc <new assoc attempt> 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc 00:21:04: SCTP: Assoc
0: 0: 0: 0: 0: 0: 0:
Sent ASSOC_UP signal for CONFIGD_ASSOC Restart rcvd from peer Sent ASSOC_RESTART signal chunk 62EA7F40 retransmitted more than max times, failing assoc Sent ASSOC_FAILED signal, reason: SCTP_COMM_LOST Sent ASSOC_TERMINATE signal state ESTABLISHED -> CLOSED
0: state CLOSED -> COOKIE_WAIT 0: state COOKIE_WAIT -> COOKIE_ECHOED 0: state COOKIE_ECHOED -> ESTABLISHED 0: Sent ASSOC_UP signal for CONFIGD_ASSOC 0: Sent TERMINATE_PENDING signal 0: state ESTABLISHED -> SHUTDOWN_ACKSENT 0: Sent ASSOC_TERMINATE signal 0: state SHUTDOWN_ACKSENT -> CLOSED 0: state CLOSED -> COOKIE_WAIT 0: state COOKIE_WAIT -> COOKIE_ECHOED 0: state COOKIE_ECHOED -> ESTABLISHED 0: Sent ASSOC_UP signal for CONFIGD_ASSOC
Field CLOSED -> COOKIE_WAIT COOKIE_WAIT -> COOKIE_ECHOED COOKIE_ECHOED -> ESTABLISHED ESTABLISHED -> SHUTDOWN_ACKSENT SHUTDOWN_ACKSENT -> CLOSED
Description SCTP endpoint sends initialization chunk and moves to the COOKIE_WAIT state to wait for acknowledgment and a state cookie from the remote endpoint. SCTP endpoint returns the state cookie to the remote endpoint and enters COOKIE_ECHOED state. SCTP endpoint enters ESTABLISHED state after receiving acknowledgment that the state cookie has been received by the remote endpoint. SCTP endpoint enters SHUTDOWN_ACKSENT state after receiving a shutdown message and sending a shutdown acknowledgment to the remote endpoint. SCTP endpoint enters CLOSED state.
DB-1296
December 2010
Related Commands
Command clear ip sctp statistics debug ip sctp congestion debug ip sctp signal show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows signals that are sent from SCTP to the application or ULP. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1297
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Many SCTP timers should not be restarted after they have been started once. For these timers, the first call succeeds in starting the timer, and subsequent calls do nothing until the timer either expires or is stopped. For example, the retransmission timer is started when the first chunk is sent, but then is not started again for subsequent chunks when there is outstanding data.
Caution
The debug ip sctp timer command generates a significant amount of output. It should be used with extreme caution in a live network.
Examples
The following example shows the starting and stopping of various SCTP timers:
Router# debug ip sctp timer SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: Assoc Timer Assoc Timer Assoc Assoc Assoc Timer Assoc Timer 0: Starting CUMSACK timer already started, not restarting 0: Starting CUMSACK timer already started, not restarting 0: Timer BUNDLE triggered 0: Starting RETRANS timer for destaddr 10.5.0.4 0: Starting RETRANS timer for destaddr 10.5.0.4 already started, not restarting 0: Starting RETRANS timer for destaddr 10.5.0.4 already started, not restarting
DB-1298
December 2010
SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP:
Assoc Timer Assoc Assoc Assoc Assoc Timer Assoc Timer Assoc Timer Assoc Timer Assoc Timer Assoc Assoc Assoc Timer
0: Starting RETRANS timer for destaddr already started, not restarting 0: Stopping RETRANS timer for destaddr 0: Starting RETRANS timer for destaddr 0: Stopping RETRANS timer for destaddr 0: Starting CUMSACK timer already started, not restarting 0: Starting CUMSACK timer already started, not restarting 0: Starting CUMSACK timer already started, not restarting 0: Starting CUMSACK timer already started, not restarting 0: Starting CUMSACK timer already started, not restarting 0: Stopping CUMSACK timer 0: Starting CUMSACK timer 0: Starting CUMSACK timer already started, not restarting
Related Commands
Command clear ip sctp statistics debug ip sctp congestion show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1299
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
In a live system, the debugging messages for performance, state, signal, and warnings are the most useful. They show any association or destination address failures and can be used to monitor the stability of established associations. The debug ip sctp warnings command displays information on any unusual situation that is encountered. These situations may or may not indicate problems, depending on the particulars of the situation.
Examples
The following example shows some events and conditions that are flagged as warnings:
Router# debug ip sctp warnings SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: SCTP: Assoc 0: No cookie in InitAck, discarding Assoc 0: Incoming INIT_ACK: inbound streams reqd 15, allowed 13 Assoc 0: Incoming INIT_ACK request: outbound streams req'd 13, allowed 1 Assoc 0: Remote verification tag in init ack is zero, discarding Remote verification tag in init is zero, discarding Assoc 0: Rwnd less than min allowed (1500) in incoming INITACK, rcvd 0 Assoc 0: Rwnd less than min allowed (1500) in incoming INITACK, rcvd 1499 Rwnd in INIT too small (0), discarding Rwnd in INIT too small (1499), discarding Unknown INIT param 16537 (0x4099), length 8 Assoc 0: Unknown INITACK param 153 (0x99), length 8 Assoc 0: No cookie in InitAck, discarding Assoc 0: No cookie in InitAck, discarding
DB-1300
December 2010
SCTP: Processing INIT, invalid param len 0, discarding... SCTP: Assoc 0: Processing INITACK, invalid param len 0, discarding...
Related Commands
Command clear ip sctp statistics debug ip sctp congestion show ip sctp association parameters show ip sctp association statistics show ip sctp errors show ip sctp instances show ip sctp statistics show iua as show iua asp
Description Empties the buffer that holds SCTP statistics. Shows a list of all current SCTP associations. Shows the parameters configured for the association defined by the association identifier. Shows the current statistics for the association defined by the association identifier. Shows error counts logged by SCTP. Shows all currently defined SCTP instances. Shows overall statistics counts for SCTP. Shows information about the current condition of an application server. Shows information about the current condition of an application server process.
DB-1301
debug ip sd
To display all session directory (SD) announcements received, use the debug ip sd command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip sd no debug ip sd
Syntax Description
Command Modes
Usage Guidelines
This command shows session directory announcements for multicast IP. Use it to observe multicast activity.
Examples
Description Session directory event. Address sending the SD announcement. Interface receiving the announcement. Size of the announcement event. Session name being advertised. Information providing a descriptive name for the session. Origin of the session, either an IP address or a name.
DB-1302
December 2010
Table 177
Field c= m=
Description Connect description showing address and number of hops. Media description that includes media type, port number, and ID.
Related Commands
Command debug ip dvmrp debug ip igmp debug ip mbgp dampening debug ip mrouting debug ip pim
Description Displays information on DVMRP packets received and sent. Displays IGMP packets received and sent, and IGMP host-related events. Logs route flap dampening activity related to MBGP. Displays changes to the IP multicast routing table. Displays PIM packets received and sent, and PIM-related events.
DB-1303
debug ip sdee
To enable debugging messages for Security Device Event Exchange (SDEE) notification events, use the debug ip sdee command in privileged EXEC mode. To disable SDEE debugging messages, use the no form of this command. debug ip sdee [alerts] [detail] [messages] [requests] [subscriptions] no debug ip sdee [alerts] [detail] [messages] [requests] [subscriptions]
Syntax Description
Displays new alerts that are reported to SDEE from IPS. Displays detailed SDEE messages. Displays error and status messages that are reported to SDEE from IPS. Displays SDEE client requests. Displays SDEE client subscription requests.
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample SDEE debug output. In this example, you can see which messages correspond to SDEE alerts, requests, and subscriptions.
Router# debug ip sdee alerts requests subscriptions 5d00h:SDEE:got request from client at 10.0.0.2 5d00h:SDEE:reported 13 events for client at 10.0.0.2 5d00h:SDEE:GET request for client 10.0.0.2 subscription IDS1720:0 5d00h:SDEE:reported 50 events for client 10.0.0.2 subscription IDS1720:0 5d00h: SDEE alert:sigid 2004 name ICMP Echo Req from 10.0.0.2 time 1021174067 5d00h: SDEE alert:sigid 2004 name ICMP Echo Req from 10.0.0.2 time 1021174071 5d00h: SDEE alert:sigid 2004 name ICMP Echo Req from 10.0.0.2 time 1021174072 5d00h: SDEE alert:sigid 2004 name ICMP Echo Req from 10.0.0.2 time 1021175127 5d00h:SDEE:missed events for IDS1720:0
Related Commands
Description Specifies the method of event notification. Sets the maximum number of SDEE events that can be stored in the event buffer. Sets the maximum number of SDEE subscriptions that can be open simultaneously.
DB-1304
December 2010
debug ip security
To display IP security option processing, use the debug ip security command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip security no debug ip security
Syntax Description
Command Modes
Usage Guidelines
The debug ip security command displays information for both basic and extended IP security options. For interfaces where ip security is configured, each IP packet processed for that interface results in debugging output regardless of whether the packet contains IP security options. IP packets processed for other interfaces that also contain IP security information also trigger debugging output. Some additional IP security debugging information is also controlled by the debug ip packet command in privileged EXEC mode.
Caution
Because the debug ip security command generates a substantial amount of output for every IP packet processed, use it only when traffic on the IP network is low, so other activity on the system is not adversely affected.
Examples
DB-1305
Description Indicates the number of basic security options found in the packet. Provides information on the security configuration for the incoming interface. Provides information on the security classification of the incoming packet. Indicates the source IP address. Indicates the destination IP address.
The following line indicates that the packet was locally generated, and it has been classified with the internally significant security level insert (0xff) and authority information of 0x0:
idb: NULL pak: insert (0xff) 0x0
The following line indicates that the packet was received via an interface with dedicated IP security configured. Specifically, the interface is configured at security level secret and with authority information of 0x0. The packet itself was classified at level secret (0x5a) and authority information of 0x10.
idb: secret (0x6) 0x10 to secret (0x6) 0x10, no implicit def secret (0x6) 0x10 pak: secret (0x5A) 0x10
DB-1306
December 2010
Syntax Description
(Optional) Identification number of the operation for which debugging output is to be enabled. (Optional) Enables IP SLAs Event Publisher application programming interface (API) debug messages. (Optional) Enables IP SLAs Event Publisher debug messages.
Command Modes
Command History
Modification This command was introduced. This command replaces the debug ip sla monitor error command. This command was integrated into Cisco IOS Release 12.0(32)SY. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command replaces the debug rtr error command. This command was integrated into Cisco IOS Release 12.2(33)SB. This command replaces the debug ip sla monitor error command. This command was integrated into Cisco IOS Release 12.2(33)SXI. This command replaces the debug ip sla monitor error command. This command was modified. The ep-api and event-publisher keywords were added. This command was modified. The ep-api and event-publisher keywords were added.
Usage Guidelines
The debug ip sla error operation-number command displays run-time errors. When an operation number other than 0 is specified, all run-time errors for that operation are displayed when the operation is active. When the operation number is 0, all run-time errors relating to the IP SLAs scheduler process are displayed. When no operation number is specified, all run-time errors for all active operations configured on the router are displayed.
Note
Use the debug ip sla error command before using the debug ip sla trace command because the debug ip sla error command generates a lesser amount of debugging output.
DB-1307
The debug ip sla error command is supported in IPv4 networks. This command can also be used to enable debugging output for an IP SLAs operation that supports IPv6 addresses.
Examples
The following is sample output from the debug ip sla error command. The output indicates failure because the target is not there or because the responder is not enabled on the target.
Router# debug ip sla error May May May May May May May May May May May 5 5 5 5 5 5 5 5 5 5 5 05:00:35.483: 05:01:35.003: 05:02:34.527: 05:03:34.039: 05:04:33.563: 05:05:33.099: 05:06:32.596: 05:07:32.119: 05:08:31.643: 05:09:31.167: 05:10:30.683: control control control control control control control control control control control message message message message message message message message message message message failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1
Related Commands
DB-1308
December 2010
Syntax Description
operation-number
(Optional) Number of the Ethernet operation for which the debugging output will be displayed.
Command Default
Debugging activity for a Cisco IOS IP SLAs Ethernet operation does not occur.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SB. This command was integrated into Cisco IOS Release 12.4(20)T. This command was integrated into Cisco IOS Release 12.2(33)SXI.
Examples
The following is sample output from the debug ip sla ethernet-monitor command:
Router# debug ip sla ethernet-monitor 00:00:15: IP SLAs Auto Ethernet(0):vlan = 2, domain = DOMAIN_OPERATOR_L3_1, mpid = 6322 from CFM 00:00:15: IP SLAs Auto Ethernet(0):saaHandleEventFromCFM::Received Event from CFM 00:00:15: IP SLAs Auto Ethernet(0):Event::ECFM_SAA_EV_MEP_ADD 00:00:15: IP SLAs Auto Ethernet(0):1 auto-probes found for domain = DOMAIN_OPERATOR_L3_1 and vlan = 2 00:00:15: IP SLAs Auto Ethernet(0):autoProbe probe_id = 1 00:00:15: IP SLAs Auto Ethernet(0):0 Probes already running in auto-probe = 1 00:00:15: IP SLAs Auto Ethernet(1):starting probe with freq = 20 sec 00:00:15: IP SLAs Auto Ethernet(1):starting probe 100001
Related Commands
Description Begins configuration for an IP SLAs operation and enters IP SLA configuration mode. Begins configuration for an IP SLAs auto Ethernet operation and enters IP SLA Ethernet monitor configuration mode.
DB-1309
Effective with Cisco IOS Release 12.4(4)T, 12.2(33)SB, and 12.2(33)SXI, the debug ip sla monitor error command is replaced by the debug ip sla error command. See the debug ip sla error command for more information. To enable debugging output of Cisco IOS IP Service Level Agreements (SLAs) operation run-time errors, use the debug ip sla monitor error command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip sla monitor error [operation-number] no debug ip sla monitor error [operation-number]
Syntax Description
operation-number
(Optional) Identification number of the operation for which debugging output is to be enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command replaces the debug rtr error command. This command was replaced by the debug ip sla error command. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was replaced by the debug ip sla error command. This command was replaced by the debug ip sla error command.
Usage Guidelines
The debug ip sla monitor error command displays run-time errors. When an operation number other than 0 is specified, all run-time errors for that operation are displayed when the operation is active. When the operation number is 0, all run-time errors relating to the IP SLAs scheduler process are displayed. When no operation number is specified, all run-time errors for all active operations configured on the router are displayed.
Note
Use the debug ip sla monitor error command before using the debug ip sla monitor trace command because the debug ip sla monitor error command generates a lesser amount of debugging output.
DB-1310
December 2010
Examples
The following is sample output from the debug ip sla monitor error command. The output indicates failure because the target is not there or because the responder is not enabled on the target. All debugging output for IP SLAs (including the output from the debug ip sla monitor trace command) has the format shown in Table 179.
Router# debug ip sla monitor error May May May May May May May May May May May 5 5 5 5 5 5 5 5 5 5 5 05:00:35.483: 05:01:35.003: 05:02:34.527: 05:03:34.039: 05:04:33.563: 05:05:33.099: 05:06:32.596: 05:07:32.119: 05:08:31.643: 05:09:31.167: 05:10:30.683: control control control control control control control control control control control message message message message message message message message message message message failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1
Field IP SLA Monitor 1 Error Return Code LU0 IP SLA Monitor Probe 1 in echoTarget on call luReceive LuApiReturnCode of InvalidHandle - invalid host name or API handle
Description Number of the operation generating the message. Message identifier indicating the error type (or error itself). Name of the process generating the message. Supplemental messages that pertain to the message identifier.
Related Commands
DB-1311
Effective with Cisco IOS Release 12.2(33)SB, the debug ip sla monitor mpls-lsp-monitor command is replaced by the debug ip sla mpls-lsp-monitor command. See the debug ip sla mpls-lsp-monitor command for more information. To enable debugging output for the IP Service Level Agreements (SLAs) label switched path (LSP) Health Monitor, use the debug ip sla monitor mpls-lsp-monitor command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip sla monitor mpls-lsp-monitor [operation-number] no debug ip sla monitor mpls-lsp-monitor [operation-number]
Syntax Description
operation-number
(Optional) Number of the LSP Health Monitor operation for which the debugging output will be displayed.
Command Default
Debugging is disabled.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was replaced by the debug ip sla mpls-lsp-monitor command.
Examples
The following is sample output from the debug ip sla monitor mpls-lsp-monitor command:
Router# debug ip sla monitor mpls-lsp-monitor IP SLA Monitor MPLSLM debugging for all entries is on *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Next hop 10.10.10.8 added in AddQ *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Next hop 10.10.10.8 added in AddQ *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Next hop 10.10.10.8 added in AddQ *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Adding vrf red into tree entry 10.10.10.8 *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Adding Probe 100005 *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Adding ProbeID 100005 to tree entry 10.10.10.8 (1) *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Adding vrf blue into tree entry 10.10.10.8 *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Duplicate in AddQ 10.10.10.8 *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Adding vrf green into tree entry 10.10.10.8 *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Duplicate in AddQ 10.10.10.8 *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Added Probe(s) 100005 will be scheduled after 26 secs over schedule period 60
DB-1312
December 2010
Related Commands
Description Begins configuration for an IP SLAs LSP Health Monitor operation and enters auto IP SLA MPLS configuration mode.
DB-1313
Syntax Description:
(Optional) Identification number of the operation for which debugging output is to be enabled. (Optional) Enables IP SLAs Event Publisher API debugging output. (Optional) Enables IP SLAs Event Publisher debugging output.
Command Modes
Command History
Modification This command was introduced. This command replaces the debug ip sla monitor trace command. This command was integrated into Cisco IOS Release 12.0(32)SY. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command replaces the debug rtr trace command. This command was integrated into Cisco IOS Release 12.2(33)SB. This command replaces the debug ip sla monitor trace command. This command was integrated into Cisco IOS Release 12.2(33)SXI. This command replaces the debug ip sla monitor trace command. This command was modified. The ap-api and event-publisher keywords were added. This command was modified. The ep-api and event-publisher keywords were added.
Usage Guidelines
The debug ip sla trace operation-number command traces the execution of an IP SLAs operation. When an operation number other than 0 is specified, execution for that operation is traced. When the operation number is 0, the IP SLAs scheduler process is traced. When no operation number is specified, all active operations are traced. The debug ip sla trace command also enables the debug ip sla error command for the specified operation. However, the no debug ip sla trace command does not disable the debug ip sla error command. You must manually disable the command by using the no debug ip sla error command. All debugging output (including debug ip sla error command output) has the format shown in the debug ip sla error command output example.
DB-1314
December 2010
Note
The debug ip sla trace command can generate a large number of debug messages. First use the debug ip sla error command, and then use the debug ip sla trace on a per-operation basis.
Examples
The following is sample output from the debug ip sla trace command. In this example, an operation is traced through a single operation attempt: the setup of a connection to the target, and the attempt at an echo to calculate UDP packet response time.
Router# debug ip sla trace May 5 05:25:08.584:rtt hash insert :3.0.0.3 3383 May 5 05:25:08.584:source=3.0.0.3(3383) dest-ip=5.0.0.1(9) May 5 05:25:08.588:sending control msg: May 5 05:25:08.588: Ver:1 ID:51 Len:52 May 5 05:25:08.592:cmd:command:RTT_CMD_UDP_PORT_ENABLE, ip:5.0.0.1, port:9, duration:5000 May 5 05:25:08.607:receiving reply May 5 05:25:08.607: Ver:1 ID:51 Len:8 May 5 05:25:08.623:local delta:8 May 5 05:25:08.627:delta from responder:1 May 5 05:25:08.627:received <16> bytes and responseTime = 3 (ms) May 5 05:25:08.631:rtt hash remove:3.0.0.3 3383IP SLA Monitor 1:Starting An Echo Operation - IP SLA Monitor Probe 1 May 5 05:26:08.104:rtt hash insert :3.0.0.3 2974 May 5 05:26:08.104:source=3.0.0.3(2974) dest-ip=5.0.0.1(9) May 5 05:26:08.108:sending control msg: May 5 05:26:08.108: Ver:1 ID:52 Len:52 May 5 05:26:08.112:cmd:command:RTT_CMD_UDP_PORT_ENABLE, ip:5.0.0.1, port:9, duration:5000 May 5 05:26:08.127:receiving reply May 5 05:26:08.127: Ver:1 ID:52 Len:8 May 5 05:26:08.143:local delta:8 May 5 05:26:08.147:delta from responder:1 May 5 05:26:08.147:received <16> bytes and responseTime = 3 (ms) May 5 05:26:08.151:rtt hash remove:3.0.0.3 2974IP SLA Monitor 1:Starting An Echo Operation - IP SLA Monitor Probe 1
Related Commands
DB-1315
Effective with Cisco IOS Release 15.1(1)S, the debug ip sla mpls-lsp-monitor command was replaced by the debug ip sla trace mpls-lsp-monitor command. See the debug ip sla trace mpls-lsp-monitor command for more information. To enable debugging output for the IP Service Level Agreements (SLAs) label switched path (LSP) Health Monitor, use the debug ip sla mpls-lsp-monitor command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip sla mpls-lsp-monitor [operation-number] no debug ip sla mpls-lsp-monitor [operation-number]
Syntax Description
operation-number
(Optional) Number of the LSP Health Monitor operation for which the debugging output will be displayed.
Command Default
Debugging is disabled.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(32)SY. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command replaces the debug rtr mpls-lsp-monitor command. This command was integrated into Cisco IOS Release 12.2(33)SB. This command replaces the debug ip sla monitor mpls-lsp-monitor command. This command was replaced by the debug ip sla trace mpls-lsp-monitor command.
Examples
The following is sample output from the debug ip sla mpls-lsp-monitor command:
Router# debug ip sla mpls-lsp-monitor IP SLAs *Aug 19 *Aug 19 *Aug 19 *Aug 19 *Aug 19 *Aug 19 *Aug 19 *Aug 19 MPLSLM 19:59: 19:59: 19:59: 19:59: 19:59: 19:59: 19:59: 19:59: debugging for all entries is on IP SLAs MPLSLM(1):Next hop 10.10.10.8 added in AddQ IP SLAs MPLSLM(1):Next hop 10.10.10.8 added in AddQ IP SLAs MPLSLM(1):Next hop 10.10.10.8 added in AddQ IP SLAs MPLSLM(1):Adding vrf red into tree entry 10.10.10.8 IP SLAs MPLSLM(1):Adding Probe 100005 IP SLAs MPLSLM(1):Adding ProbeID 100005 to tree entry 10.10.10.8 (1) IP SLAs MPLSLM(1):Adding vrf blue into tree entry 10.10.10.8 IP SLAs MPLSLM(1):Duplicate in AddQ 10.10.10.8
DB-1316
December 2010
19 19:59: IP SLAs MPLSLM(1):Adding vrf green into tree entry 10.10.10.8 19 19:59: IP SLAs MPLSLM(1):Duplicate in AddQ 10.10.10.8 19 19:59: IP SLAs MPLSLM(1):Added Probe(s) 100005 will be scheduled after 26 secs schedule period 60
Related Commands
DB-1317
Syntax Description:
(Optional) Identification number of the operation for which debugging output is to be enabled. (Optional) Enables IP SLAs Event Publisher API debugging output. (Optional) Enables IP SLAs Event Publisher debugging output.
Command Modes
Command History
Modification This command was introduced. This command replaces the debug ip sla monitor trace command. This command was integrated into Cisco IOS Release 12.0(32)SY. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command replaces the debug rtr trace command. This command was integrated into Cisco IOS Release 12.2(33)SB. This command replaces the debug ip sla monitor trace command. This command was integrated into Cisco IOS Release 12.2(33)SXI. This command replaces the debug ip sla monitor trace command. This command was modified. The ap-api and event-publisher keywords were added.
Usage Guidelines
The debug ip sla trace operation-number command traces the execution of an IP SLAs operation. When an operation number other than 0 is specified, execution for that operation is traced. When the operation number is 0, the IP SLAs scheduler process is traced. When no operation number is specified, all active operations are traced. The debug ip sla trace command also enables the debug ip sla error command for the specified operation. However, the no debug ip sla trace command does not disable the debug ip sla error command. You must manually disable the command by using the no debug ip sla error command. All debugging output (including debug ip sla error command output) has the format shown in the debug ip sla error command output example.
DB-1318
December 2010
Note
The debug ip sla trace command can generate a large number of debug messages. First use the debug ip sla error command, and then use the debug ip sla trace on a per-operation basis.
Examples
The following is sample output from the debug ip sla trace command. In this example, an operation is traced through a single operation attempt: the setup of a connection to the target, and the attempt at an echo to calculate UDP packet response time.
Router# debug ip sla trace Router# IP SLA Monitor 1:Starting An Echo Operation - IP SLA Monitor Probe 1 May 5 05:25:08.584:rtt hash insert :3.0.0.3 3383 May 5 05:25:08.584:source=3.0.0.3(3383) dest-ip=5.0.0.1(9) May 5 05:25:08.588:sending control msg: May 5 05:25:08.588: Ver:1 ID:51 Len:52 May 5 05:25:08.592:cmd:command:RTT_CMD_UDP_PORT_ENABLE, ip:5.0.0.1, port:9, duration:5000 May 5 05:25:08.607:receiving reply May 5 05:25:08.607: Ver:1 ID:51 Len:8 May 5 05:25:08.623:local delta:8 May 5 05:25:08.627:delta from responder:1 May 5 05:25:08.627:received <16> bytes and responseTime = 3 (ms) May 5 05:25:08.631:rtt hash remove:3.0.0.3 3383IP SLA Monitor 1:Starting An Echo Operation - IP SLA Monitor Probe 1 May 5 05:26:08.104:rtt hash insert :3.0.0.3 2974 May 5 05:26:08.104:source=3.0.0.3(2974) dest-ip=5.0.0.1(9) May 5 05:26:08.108:sending control msg: May 5 05:26:08.108: Ver:1 ID:52 Len:52 May 5 05:26:08.112:cmd:command:RTT_CMD_UDP_PORT_ENABLE, ip:5.0.0.1, port:9, duration:5000 May 5 05:26:08.127:receiving reply May 5 05:26:08.127: Ver:1 ID:52 Len:8 May 5 05:26:08.143:local delta:8 May 5 05:26:08.147:delta from responder:1 May 5 05:26:08.147:received <16> bytes and responseTime = 3 (ms) May 5 05:26:08.151:rtt hash remove:3.0.0.3 2974IP SLA Monitor 1:Starting An Echo Operation - IP SLA Monitor Probe 1
Related Commands
DB-1319
Syntax Description
operation-number
(Optional) Number of the LSP Health Monitor operation for which the debugging output will be displayed. The range is 0 to 2147483647.
Command Default
Command Modes
Command History
Release 15.1(1)S
Modification This command was introduced. This command replaces the debug ip sla mpls-lsp-monitor command.
Usage Guidelines
For Cisco IP SLAs Engine 3.0 in Cisco IOS Release 15.1(1)S, this command replaces the debug ip sla mpls-lsp-monitor command. To determine the IP SLAs engine version, IP SLAs Engine 2.0 or 3.0, running on your Cisco router, use the show ip application command in privileged EXEC mode, as shown in the following example:
Router# show ip sla application IP Service Level Agreements Version: Round Trip Time MIB 2.2.0, Infrastructure Engine-III
The debug ip sla trace mpls-lsp-monitor command traces the execution of IP SLAs LSP Health Monitor operations. When an operation number other than 0 is specified, execution for that operation is traced. When the operation number is 0, the IP SLAs scheduler process is traced. When no operation number is specified, all active LSP Health Monitor operations are traced. This command also enables the debug ip sla error command for the specified operation. However, the no debug ip sla trace mpls-lsp-monitor command does not disable the debug ip sla error command. You must manually disable the command by using the no debug ip sla error command. The debug ip sla trace mpls-lsp-monitor command can generate a large number of debug messages. To help reduce the number of debug messages, first use the debug ip sla error command and then use the debug ip sla trace mpls-lsp-monitor command on a per-operation basis.
Examples
The following is sample output from the debug ip sla trace mpls-lsp-monitor command:
Router# debug ip sla trace mpls-lsp-monitor
DB-1320
December 2010
IP SLA Monitor MPLSLM debugging for all entries is on *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Next hop 10.10.10.8 added in AddQ *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Next hop 10.10.10.8 added in AddQ *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Next hop 10.10.10.8 added in AddQ *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Adding vrf red into tree entry 10.10.10.8 *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Adding Probe 100005 *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Adding ProbeID 100005 to tree entry 10.10.10.8 (1) *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Adding vrf blue into tree entry 10.10.10.8 *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Duplicate in AddQ 10.10.10.8 *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Adding vrf green into tree entry 10.10.10.8 *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Duplicate in AddQ 10.10.10.8 *Aug 19 19:59: IP SLA Monitor MPLSLM(1):Added Probe(s) 100005 will be scheduled after 26 secs over schedule period 60
Related Commands
Description Enables debugging output of Cisco IOS IP SLAs operation run-time errors. Enables debugging output for Cisco IOS IP SLAs LSP Health Monitor operations in IP SLAs Engine 2.0. Displays global information about Cisco IOS IP SLAs.
DB-1321
debug ip slb
To display debugging messages for the Cisco IOS Server Load Balancing (SLB) feature, use the debug ip slb command in user EXEC or privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip slb {all | asn [msid] | conns [acl-number] | dfp | firewallfarm | fragments | gtp | icmp | kal-ap | natpool | probe | reals | replication | route | sessions [asn | gtp | ipmobile | radius] | sticky gtp imsi | vservers} no debug ip slb {all | asn [msid] | conns [acl-number] | dfp | firewallfarm | fragments | gtp | icmp | kal-ap | natpool | probe | reals | replication | route | sessions [asn | gtp | ipmobile | radius] | sticky gtp imsi | vservers}
Syntax Description
Displays all debugging messages for Cisco IOS SLB. Displays debugging messages related to Access Service Network (ASN) load balancing. (Optional) Displays debugging messages related to the ASN Mobile Station ID (MSID) sticky database. Displays debugging messages for all connections being handled by IOS SLB, including Wireless Session Protocol (WSP) events and states. The optional acl-number argument references an IP access control list (ACL). This argument limits the information displayed based on the client IP address, real server IP address, or virtual server IP address:
For simple ACLs, IOS SLB checks the client IP address. For extended ACLs, IOS SLB checks the client real and virtual IP addresses.
For more information about ACLs, refer to the Configuring IP Services chapter of the Cisco IOS IP Configuration Guide, Release 12.2. dfp Displays debugging messages for Dynamic Feedback Protocol (DFP).
To display debugging messages for the DFP agent subsystem, use the debug ip dfp agent command. To display debugging messages for the general packet radio service (GPRS) DFP weight calculation, use the debug gprs dfp command.
Displays debugging messages related to firewall load balancing. Displays debugging messages related to the IOS SLB fragment database. Displays all GPRS Tunneling Protocol (GTP)-related packet handler, gateway GPRS support node (GGSN), serving GPRS support node (SGSN), and Network Service Access Point Identifier (NSAPI) debugging messages for IOS SLB. Displays all Internet Control Message Protocol debugging messages for IOS SLB. Displays all KeepAlive Application Protocol (KAL-AP) debugging messages for IOS SLB. Displays debugging messages related to the IOS SLB client Network Address Translation (NAT) pool.
DB-1322
December 2010
Displays debugging messages related to probes. Displays debugging messages for all real servers defined to IOS SLB. Displays debugging messages related to IOS SLB stateful backup virtual server. Displays debugging messages for all routing handled by the IOS SLB RADIUS framed-IP sticky database. Displays debugging messages for all sessions being handled by IOS SLB.
The optional asn keyword enables users to limit the information displayed to only ASN sessions. The optional gtp keyword enables users to limit the information displayed to only GTP sessions. The optional ipmobile keyword enables users to limit the information displayed to only Mobile IP sessions. The optional radius keyword enables users to limit the information displayed to only RADIUS sessions.
Displays all debugging messages related to the IOS SLB GTP International Mobile Subscriber ID (IMSI) sticky database. Displays debugging messages for all virtual servers defined to IOS SLB.
Command Modes
Command History
Release 12.0(7)XE 12.1(5)T 12.2 12.1(2)E 12.1(3a)E 12.1(7)E 12.1(9)E 12.1(11b)E 12.2(14)S 12.1(13)E3 12.2(14)ZA2 12.2(18)SXE 12.2SX
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(5)T. This command was integrated into Cisco IOS Release 12.2. The natpool and replication keywords were added. The firewallfarm keyword was added. The vservers keyword was added. The sessions keyword was added. The route keyword, the acl-number argument, and the radius option on the sessions keyword were added. This command was integrated into Cisco IOS Release 12.2(14)S. The gtp keyword and the gtp option on the sessions keyword were added. The ipmobile keyword was added. The sticky gtp imsi keywords were added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. The kal-ap keyword was added. The asn keyword and the asn option on the sessions keyword were added. The msid option on the asn keyword was added.
DB-1323
Usage Guidelines
This command displays debugging messages for IOS SLB. See the following caution before using debug commands:
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network flows and fewer users. Debugging during these periods reduces the effect these commands have on other users on the system.
Examples
The following example configures a debugging session to check all IP IOS SLB parameters:
Router# debug ip slb all SLB All debugging is on Router#
The following example configures debugging to check IP IOS SLB replication used with stateful backup and displays the output from the send or transmit virtual server:
Router# debug ip slb replication *Mar 2 08:02:38.019: SLB Replicate: (send) update vs: VS1 update_count 42
The following example shows Cisco IOS SLB DFP debug output:
Router# debug ip slb dfp SLB DFP debugging is on router# 022048 SLB DFP Queue to main queue - type 2 for Agent 161.44.2.3458229 022048 SLB DFP select_rc = -1 readset = 0 022048 SLB DFP Sleeping... 022049 SLB DFP readset = 0 022049 SLB DFP select_rc = -1 readset = 0 022049 SLB DFP Processing Q event for Agent 161.44.2.3458229 - OPEN 022049 SLB DFP Queue to conn_proc_q - type 2 for Agent 161.44.2.3458229 022049 SLB DFP readset = 0 022049 SLB DFP Set SLB_DFP_SIDE_QUEUE 022049 SLB DFP Processing Conn Q event for Agent 161.44.2.3458229 - OPEN 022049 SLB DFP Open to Agent 161.44.2.3458229 succeeded, socket = 0 022049 SLB DFP Agent 161.44.2.3458229 start connect 022049 SLB DFP Connect to Agent 161.44.2.3458229 successful - socket 0 022049 022049 022049 022049 022049 022050 022050 022050 022050 022050 SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB DFP DFP DFP DFP DFP DFP DFP DFP DFP DFP Queue to main queue - type 6 for Agent 161.44.2.3458229 Processing Conn Q unknown MAJOR 80 Reset SLB_DFP_SIDE_QUEUE select_rc = -1 readset = 0 Sleeping... readset = 1 select_rc = 1 readset = 1 Agent 161.44.2.3458229 fd = 0 readset = 1 Message length 44 from Agent 161.44.2.3458229 Agent 161.44.2.3458229 setting Host 17.17.17.17, Bind ID 1 Weight 1
DB-1324
December 2010
022050 SLB DFP Agent 161.44.2.3458229 setting Host 34.34.34.34, Bind ID 2 Weight 2 022050 SLB DFP Agent 161.44.2.3458229 setting Host 51.51.51.51, Bind ID 3 Weight 3 022050 SLB DFP Processing Q event for Agent 161.44.2.3458229 - WAKEUP 022050 022050 022050 022050 022050 022050 022050 022050 022050 022115 022115 022115 022116 022116 022116 022116 022116 022116 022116 022116 022116 022116 022116 022116 022116 SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB DFP DFP DFP DFP DFP DFP DFP DFP DFP readset = select_rc Agent 161.44.2.3458229 Message length 64 from Agent 161.44.2.3458229 Agent 161.44.2.3458229 Agent 161.44.2.3458229 Agent 161.44.2.3458229 readset = 1 = 1 readset = 1 fd = 0 readset = 1 Agent 161.44.2.3458229 setting Host 17.17.17.17, setting Host 68.68.68.68, setting Host 85.85.85.85, setting Host 17.17.17.17, 1
ID ID ID ID
DFP Queue to main queue - type 5 for Agent 161.44.2.3458229 DFP select_rc = -1 readset = 0 DFP Sleeping... DFP readset = 1 DFP select_rc = -1 readset = 0 DFP Processing Q event for Agent 161.44.2.3458229 - DELETE DFP DFP DFP DFP DFP DFP DFP DFP DFP DFP Queue to conn_proc_q - type 5 for Agent 161.44.2.3458229 readset = 1 Set SLB_DFP_SIDE_QUEUE Processing Conn Q event for Agent 161.44.2.3458229 - DELETE Connection to Agent 161.44.2.3458229 closed Agent 161.44.2.3458229 deleted Processing Conn Q unknown MAJOR 80 Reset SLB_DFP_SIDE_QUEUE Set SLB_DFP_SIDE_QUEUE Reset SLB_DFP_SIDE_QUEUE
DB-1325
debug ip snat
To display information about IP packets translated by the IP stateful network address translation (SNAT) feature, use the debug ip snat command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip snat [detailed] no debug ip snat [detailed]
Syntax Description
detailed
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The SNAT feature allows two or more network address translators to function as a translation group. One member of the translation group handles traffic requiring translation of IP address information. It informs the backup translator of active flows as they occur. The backup translator can then use information from the active translator to prepare duplicate translation table entries enabling the backup translator to become the active translator in the event of a critical failure. Traffic continues to flow without interruption because the same network address translations are used and the state of those translations has been previously defined.
Caution
Because the debug ip snat command generates a significant amount of output, use it only when traffic on the IP network is low, so other activity on the system is not adversely affected.
Examples
DB-1326
December 2010
2w6d:SNAT (readfromnet):Enqueuing SYNC Message msg to readQ 2w6d:SNAT (Receive):Processed SYNC Message from Router-Id:0 for Router-Id:200's entry/entries 2w6d:SNAT (readfromnet):Enqueuing DUMP-REQUEST Message msg to readQ try/entries 2w6d:SNAT(sense):Send SYNC message 2w6d:SNAT (Send):Enqueuing SYNC Message for Router-Id 100 2w6d:SNAT(write2net):192.168.123.2 <---> 192.168.123.3 send message 2w6d:SNAT(write2net):ver 2, id 100, opcode 1, len 68 2w6d:SNAT (readfromnet):Enqueuing SYNC Message msg to readQ 2w6d:SNAT (Receive):Processed SYNC Message from Router-Id:200 for Router-Id:200's entry/entries
Description Indicates that the packet is being translated by the SNAT feature. Requests for entries after the SNAT router is active.
DB-1327
debug ip socket
To display all state change information for all sockets, use the debug ip socket command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip socket no debug ip socket
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Use this command to collect information on the socket interface. To get more complete information on a socket/TCP port pair, use this command in conjunction with the debug ip tcp transactions command. Because the socket debugging information is state-change oriented, you will not see the debugging message on a per-packet basis. However, if the connections normally have very short lives (few packet exchanges during the life cycle of a connection), then socket debugging could become expensive because of the state changes involved during connection setup and teardown.
Examples
The following is sample output from the debug ip socket output from a server process:
Router# debug ip socket Added socket 0x60B86228 to process 40 SOCKET: set TCP property TCP_PID, socket 0x60B86228, TCB 0x60B85E38 Accepted new socket fd 1, TCB 0x60B85E38 Added socket 0x60B86798 to process 40 SOCKET: set TCP property TCP_PID, socket 0x60B86798, TCB 0x60B877C0 SOCKET: set TCP property TCP_BIT_NOTIFY, socket 0x60B86798, TCB 0x60B877C0 SOCKET: created new socket to TCP, fd 2, TCB 0x60B877C0 SOCKET: bound socket fd 2 to TCB 0x60B877C0 SOCKET: set TCP property TCP_WINDOW_SIZE, socket 0x60B86798, TCB 0x60B877C0 SOCKET: listen on socket fd 2, TCB 0x60B877C0 SOCKET: closing socket 0x60B86228, TCB 0x60B85E38 SOCKET: socket event process: socket 0x60B86228, TCB new state --> FINWAIT1 socket state: SS_ISCONNECTED SS_CANTSENDMORE SS_ISDISCONNECTING SOCKET: Removed socket 0x60B86228 from process 40 socket list
The following is sample output from the debug ip socket command from a client process:
Router# debug ip socket Added socket 0x60B70220 to process 2 SOCKET: set TCP property TCP_PID, socket 0x60B70220, TCB 0x60B6CFDC SOCKET: set TCP property TCP_BIT_NOTIFY, socket 0x60B70220, TCB 0x60B6CFDC SOCKET: created new socket to TCP, fd 0, TCB 0x60B6CFDC SOCKET: socket event process: socket 0x60B70220, TCB new state --> SYNSENT socket state: SS_ISCONNECTING SOCKET: socket event process: socket 0x60B70220, TCB new state --> ESTAB socket state: SS_ISCONNECTING SOCKET: closing socket 0x60B70220, TCB 0x60B6CFDC
DB-1328
December 2010
SOCKET: socket event process: socket 0x60B70220, TCB new state --> FINWAIT1 socket state: SS_ISCONNECTED SS_CANTSENDMORE SS_ISDISCONNECTING SOCKET: Removed socket 0x60B70220 from process 2 socket list
Field Added socket 0x60B86228 process 40 SOCKET set TCP property TCP_PID set TCP property TCP_BIT_NOTIFY created new socket to TCP, fd 2 bound socket fd 2 to TCB listen on socket fd 2 closing socket socket event process TCB new state --> FINWAIT1
Description New socket is opened for process 40. Indicates that this is a SOCKET transaction. Sets the process ID to the TCP associated with the socket. Sets the method for how the socket wants to be notified for an event. Opened a new socket referenced by file descriptor 2 to TCP. Bound the socket referenced by file descriptor 2 to TCP. Indicates which file descriptor the application is listening to. Indicates that the socket is being closed. Processed a state change event occurred in the transport layer. TCP state machine changed to FINWAIT1. (See the debug ip tcp transaction command for more information on TCP state machines.)
DB-1329
Table 181
Description New SOCKET state flags after the transport event processing. This socket is still connected, but disconnecting is in progress, and it will not send more data to peer. Possible SOCKET state flags follow:
SS_NOFDREF No file descriptor reference for this socket. SS_ISCONNECTING Socket connecting is in progress. SS_ISBOUND Socket is bound to TCP. SS_ISCONNECTED Socket is connected to peer. SS_ISDISCONNECTING Socket disconnecting is in progress. SS_CANTSENDMORE Cant send more data to peer. SS_CANTRCVMORE Cant receive more data from peer. SS_ISDISCONNECTED Socket is disconnected. Connection is fully closed.
Connection is closed, and the socket is removed from the process socket list.
Related Commands
Description Displays information on significant TCP transactions such as state changes, retransmissions, and duplicate packets.
DB-1330
December 2010
debug ip ssh
To display debugging messages for Secure Shell (SSH), use the debug ip ssh command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip ssh [detail | packet] no debug ip ssh
Syntax Description
detail packet
(Optional) Specifies SSH protocol, channel requests and information state changes. (Optional) Specifies information regarding the SSH packet.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1T. The detail and packet keywords were added. This command was implemented on the Cisco ASR 1000 series routers.
Usage Guidelines
Use the debug ip ssh command to ensure normal operation of the SSH server.
Examples
DB-1331
00:04:22: 00:04:22: 00:04:22: 00:04:22: 00:04:22: 00:04:22: 00:04:22: 00:04:22: 00:04:22: 00:04:22: 00:04:22: 00:04:22: 00:04:24: 00:04:24: 00:04:24: 00:04:24: 00:04:24: 00:04:24: 00:04:24: 00:04:38:
SSH0: sent protocol version id SSH-1.99-Cisco-1.25 SSH0: protocol version id is - SSH-1.99-Cisco-1.25 SSH2 0: SSH2_MSG_KEXINIT sent SSH2 0: SSH2_MSG_KEXINIT received SSH2:kex: client->server enc:aes128-cbc mac:hmac-sha1 SSH2:kex: server->client enc:aes128-cbc mac:hmac-sha1 SSH2 0: expecting SSH2_MSG_KEXDH_INIT SSH2 0: SSH2_MSG_KEXDH_INIT received SSH2: kex_derive_keys complete SSH2 0: SSH2_MSG_NEWKEYS sent SSH2 0: waiting for SSH2_MSG_NEWKEYS SSH2 0: SSH2_MSG_NEWKEYS received SSH2 0: authentication successful for lab SSH2 0: channel open request SSH2 0: pty-req request SSH2 0: setting TTY - requested: height 24, width 80; set: height 24, width 80 SSH2 0: shell request SSH2 0: shell message received SSH2 0: starting shell for vty SSH0: Session terminated normally
0 0 0 0 0
0 0 0
20
DB-1332
December 2010
debug ip subscriber
To enable Intelligent Service Gateway (ISG) IP subscriber session debugging, use the debug ip subscriber command in privileged EXEC mode. To disable debugging, use the no form of this command. debug ip subscriber {all | error | event | fsm | packet} no debug ip subscriber {all | error | event | fsm | packet}
Syntax Description
Displays all debugging messages related to IP subscriber sessions. Displays debugging messages about IP subscriber session errors. Displays debugging messages about IP subscriber session events. Displays debugging messages related to session state changes for IP subscriber sessions. Displays debugging messages related to IP subscriber session packets.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example show sample output for the debug ip subscriber command:
Router# debug ip subscriber packet Packet debugs: 1d07h: IPSUB_DP: code = 0 1d07h: IPSUB_DP: 1d07h: IPSUB_DP: 1d07h: IPSUB_DP: 1d07h: IPSUB_DP: Router# 1d07h: IPSUB_DP: 1d07h: IPSUB_DP: 1d07h: IPSUB_DP: [Et0/0:I:CEF:0000.0000.0002] Rx driver forwarded packet via les, return [Et0/0:I:PROC:0000.0000.0002] Packet classified, results = 0x18 [ms1:I:PROC:0000.0000.0002] Rx driver forwarded the packet [ms1:I:PROC:0000.0000.0002] Packet classified, results = 0x42 [ms1:O:PROC:RED:50.0.0.3] Packet classified, results = 0x14 [ms1:O:PROC:RED:50.0.0.3] Subscriber features executed, return code = 0 [ms1:O:PROC:RED:50.0.0.3] Tx driver forwarding the packet [Et0/0:O:PROC:RED:50.0.0.3] Packet classified, results = 0x14
Related Commands
DB-1333
Syntax Description
Command Modes
Command History
Release 12.2(33)SRC
Examples
The following example shows that the debug ip subscriber redundancy command is turned on:
Router# debug ip subscriber redundancy IP subscriber redundancy debugging is on.
Related Commands
Description Disconnects and removes all ISG IP subscriber sessions associated with a specific interface on a Cisco 7600 router.
clear ip subscriber slot Disconnects and removes all ISG IP subscriber sessions associated with a specific hardware slot on a Cisco 7600 router. show ip subscriber interface show ip subscriber redundancy show debugging Displays information about an ISG IP subscriber interface on a Cisco 7600 router. Displays information about ISG IP subscriber sessions on a Cisco 7600 router. Displays information about the types of debugging that are enabled for your router.
DB-1334
December 2010
Syntax Description
Command Default
Command Modes
Command History
Release 15.1(2)T
Usage Guidelines
The debug ip tcp congestion command can be used to debug a performance problem on a TCP/IP network that you have isolated above the data-link layer. It also displays information related to variation in TCPs send window, congestion window, and congestion threshold window.
Examples
The following is sample output from the debug ip tcp congestion command:
Router# debug ip tcp congestion *May 20 *May 22 *May 22 *May 22 *May 22 *May 22 *May 22 *May 22 *May 22 . . . *May 20 *May 20 changes *May 20 22:49:49.091: 05:21:47.281: 05:21:47.281: 05:21:47.285: 05:21:47.285: 05:21:47.285: 05:21:47.285: 05:21:47.285: 05:21:47.285: Setting New Reno as congestion control algorithm Advance cwnd by 12 TCP85FD0C10: sndcwnd: 1472 Advance cwnd by 3 TCP85FD0C10: sndcwnd: 1475 Advance cwnd by 3 TCP85FD0C10: sndcwnd: 1478 Advance cwnd by 9 TCP85FD0C10: sndcwnd: 1487
22:50:32.559: [New Reno] sndcwnd: 8388480 ssthresh: 65535 snd_mark: 232322 22:50:32.559: 10.168.10.10:42416 <---> 10.168.30.11:49100 congestion window 22:50:32.559: cwnd from 8388480 to 2514841, ssthresh from 65535 to 2514841
DB-1335
For IOS TCP, New Reno is the default congestion control algorithm. However, an application can also use Binary Increase Congestion Control (BIC) as the congestion algorithm. The following is sample output from the debug ip tcp congestion command using the BIC congestion algorithm:
Router# debug ip tcp congestion *May 22 05:21:42.281: *May 22 05:21:47.281: *May 22 05:21:47.281: *May 22 05:21:47.285: *May 22 05:21:47.285: *May 22 05:21:47.285: *May 22 05:21:47.285: *May 22 05:21:47.285: *May 22 05:21:47.285: . . . . . . *May 20 22:50:32.559: last_cwnd: 8388480 *May 20 22:50:32.559: changes *May 20 22:50:32.559: *May 20 22:50:32.559: Setting BIC as congestion control algorithm Advance cwnd by 12 TCP85FD0C10: sndcwnd: 1472 Advance cwnd by 3 TCP85FD0C10: sndcwnd: 1475 Advance cwnd by 3 TCP85FD0C10: sndcwnd: 1478 Advance cwnd by 9 TCP85FD0C10: sndcwnd: 1487
[BIC] sndcwnd: 8388480 ssthresh: 65535 bic_last_max_cwnd: 0 10.168.10.10:42416 <---> 10.168.30.11:49100 congestion window cwnd from 8388480 to 2514841, ssthresh from 65535 to 2514841 bic_last_max_cwnd changes from 0 to 8388480
Field
Description
Setting New Reno as congestion control TCP is using New Reno as the congestion control algorithm. algorithm TCP85FD0C10 Advance cwnd sndcwnd [New Reno] ssthresh: snd_mark 10.168.10.10:42416: 10.168.30.11.49100: congestion window changes TCP's control block identifier. Increase in TCPs congestion window. TCP's send congestion window. Values reflected are those of TCPs New Reno congestion control. TCPs slow start threshold. New value of one of New Renos parameters. Local address and port number for the TCP connection. Foreign address and port number for the TCP connection. Change in TCPs send congestion window.
Related Commands
DB-1336
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The TCP driver is the process that the router software uses to send packet data over a TCP connection. Remote source-route bridging (RSRB), serial tunneling (STUN), and X.25 switching currently use the TCP driver. Using the debug ip tcp driver command together with the debug ip tcp driver-pak command provides the most verbose debugging output concerning TCP driver activity.
Examples
The following is sample output from the debug ip tcp driver command:
Router# debug ip tcp driver TCPDRV359CD8: TCPDRV359CD8: TCPDRV359CD8: TCPDRV359CD8: Active open 172.21.80.26:0 --> 172.21.80.25:1996 OK, lport 36628 enable tcp timeouts 172.21.80.26:36628 --> 172.21.80.25:1996 Abort 172.21.80.26:36628 --> 172.21.80.25:1996 DoClose tcp abort
Description Unique identifier for this instance of TCP driver activity. Indication that the router at IP address 172.21.80.26 has initiated a connection to another router. TCP port number the initiator of the connection uses to indicate that any port number can be used to set up a connection. IP address of the remote router to which the connection has been initiated. TCP port number that the initiator of the connection is requesting that the remote router use for the connection. (1996 is a private TCP port number reserved in this implementation for RSRB.)
DB-1337
Table 183
Field OK,
Description Indication that the connection has been established. If the connection has not been established, this field and the following field do not appear in this line of output. TCP port number that has actually been assigned for the initiator to use for this connection.
lport 36628
The following line indicates that the TCP driver user (RSRB, in this case) will allow TCP to drop the connection if excessive retransmissions occur:
TCPDRV359CD8: enable tcp timeouts
The following line indicates that the TCP driver user (in this case, RSRB) at IP address 172.21.80.26 (and using TCP port number 36628) is requesting that the connection to IP address 172.21.80.25 using TCP port number 1996 be aborted:
TCPDRV359CD8: 172.21.80.26:36628 --> 172.21.80.25:1996 Abort
The following line indicates that this connection was in fact closed because of an abnormal termination:
TCPDRV359CD8: 172.21.80.26:36628 --> 172.21.80.25:1996 DoClose tcp abort
DB-1338
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command turns on a verbose debugging by logging at least one debugging message for every packet sent or received on the TCP driver connection. The TCP driver is the process that the router software uses to send packet data over a TCP connection. Remote source-rate bridging (RSRB), serial tunneling (STUN), and X.25 switching currently use the TCP driver. To observe the context within which certain debug ip tcp driver-pak messages occur, turn on this command in conjunction with the debug ip tcp driver command.
Caution
Because the debug ip tcp driver-pak command generates so many messages, use it only on lightly loaded systems. This command not only places a substantial load on the system processor, it also may change the symptoms of any unexpected behavior that occurs.
Examples
The following is sample output from the debug ip tcp driver-pak command:
Router# debug ip tcp driver-pak TCPDRV359CD8: TCPDRV359CD8: TCPDRV359CD8: TCPDRV359CD8: TCPDRV359CD8: TCPDRV359CD8: TCPDRV359CD8: send 2E8CD8 (len 26) queued output pak 2E8CD8 (len 26) (26) readf 42 bytes (Thresh 16) readf 26 bytes (Thresh 16) readf 10 bytes (Thresh 10) send 327E40 (len 4502) queued output pak 327E40 (len 4502) (4502)
Description Unique identifier for this instance of TCP driver activity. Indicates that this event involves the TCP driver sending data. Address in memory of the data the TCP driver is sending.
DB-1339
Table 184
Description Length of the data (in bytes). Indicates that the TCP driver user process (in this case, RSRB) has transferred the data to the TCP driver to send.
The following line indicates that the TCP driver has sent the data that it had received from the TCP driver user, as shown in the previous line of output. The last field in the line (26) indicates that the 26 bytes of data were sent out as a single unit.
TCPDRV359CD8: output pak 2E8CD8 (len 26) (26)
The following line indicates that the TCP driver has received 42 bytes of data from the remote IP address. The TCP driver user (in this case, remote source-route bridging) has established an input threshold of 16 bytes for this connection. (The input threshold instructs the TCP driver to transfer data to the TCP driver user only when at least 16 bytes are present.)
TCPDRV359CD8: readf 42 bytes (Thresh 16)
DB-1340
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS XE Release 2.1.
Examples
The following example shows the messages that verify that the end hosts are connected and configured for ECN:
Router# debug ip tcp ecn ! TCP ECN debugging is on ! Router# telnet 10.1.25.31 Trying 10.1.25.31 ... ! 01:43:19: 10.1.25.35:11000 <---> 10.1.25.31:23 out ECN-setup SYN 01:43:21: 10.1.25.35:11000 <---> 10.1.25.31:23 congestion window changes 01:43:21: cwnd from 1460 to 1460, ssthresh from 65535 to 2920 01:43:21: 10.1.25.35:11000 <---> 10.1.25.31:23 in non-ECN-setup SYN-ACK
Before a TCP connection can use ECN, a host sends an ECN-setup SYN (synchronization) packet to a remote end that contains an ECE and CWR bit set in the header. This indicates to the remote end that the sending TCP is ECN-capable, rather than an indication of congestion. The remote end sends an ECN-setup SYN-ACK (acknowledgment) packet to the sending host. In the example above, the out ECN-setup SYN text means that a SYN packet with the ECE and CWR bit set was sent to the remote end. The in non-ECN-setup SYN-ACK text means that the remote end did not favorably acknowledge the ECN request and that therefore the session is ECN capable.
DB-1341
The following debug output shows that ECN capabilities are enabled at both ends. In response to the ECN-setup SYN, the other end favorably replied with an ECN-setup SYN-ACK message. This connection is now ECN capable for the rest of the session.
Router# telnet 10.10.10.10 Trying 10.10.10.10 ... Open Password required, but none set ! 1d20h: 10.1.25.34:11003 <---> 10.1.25.35:23 1d20h: 10.1.25.34:11003 <---> 10.1.25.35:23
Use the show tcp tcb command to display the end-host connections.
Related Commands
Description Enables TCP ECN. Displays the status of local and remote end hosts.
DB-1342
December 2010
debug ip tcp ha
To display TCP high availabilty (HA) events or debugging information for TCP stack interactions between the active Route Processor (RP) and the standby RP, use the debug ip tcp ha command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip tcp ha {events | transactions} [detail] no debug ip tcp ha {events | transactions} [detail]
Syntax Description
Displays TCP HA failures. Displays failed TCP stack interactions between the active RP and standby RP. (Optional) Displays detailed debugging information about successful TCP HA operations and useful informational messages or about successful TCP stack interactions between the active and standby RP.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ip tcp ha command is used to display TCP stateful switchover (SSO) events or debugging information for TCP stack interactions between the active RP and the standby RP. This is command is useful for troubleshooting SSO-aware TCP connections. Use the debug ip tcp ha command with the transactions keyword to display failed TCP stack interactions between the active RP and standby RP. This form of the command displays failed TCP HA messages, RF redundancy-related client-application transactions, IPC client-application transactions, and In-Service Software Upgrade (ISSU) transactions. Use the debug ip tcp ha command with the transactions and detail keywords to display successful TCP stack interactions between the active and standby RP. This form of the command displays successful TCP HA messages, RF redundancy-related client-application transactions, IPC client-application transactions, and ISSU transactions. Use the debug ip tcp ha command with the events keyword to display TCP HA failures. This form of the command displays TCP HA failed encode or decode messages, system resources failures (such as memory allocation failures in the context of TCP HA), failed state changes, and failures that occur when SSO is enabled or disabled. Use the debug ip tcp ha command with the events and detail keywords to display successful TCP HA operations and useful informational messages. This form of the command displays successful TCP encode or decode messages, state changes, and operations that occur when SSO is enabled or disabled.
DB-1343
Examples
The following is sample output from the debug ip tcp ha command with the transactions and detail keywords. The following output shows packet flow from the active to the standby RP for an established TCP SSO connection:
*Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb 19 19 19 19 19 19 19 19 19 19 23:28:23.324: 23:28:23.324: 23:28:23.324: 23:28:23.932: 23:28:23.932: 23:28:24.544: 23:28:42.976: 23:28:42.976: 23:28:43.172: 23:28:43.172: TCPHA: TCPHA: TCPHA: TCPHA: TCPHA: TCPHA: TCPHA: TCPHA: TCPHA: TCPHA: Sending Sending Sending Sending Sending Sending Recd Recd Recd Recd IPC IPC IPC IPC pkt msg, conn_id = 39, seq no = 2727115707 pkt msg, conn_id = 396, seq no = 2959469308 pkt msg, conn_id = 41, seq no = 1270243395 pkt msg, conn_id = 42, seq no = 974255741 pkt msg, conn_id = 475, seq no = 3059612402 dummy pkt to standby; cid=109, size=19 msg msg msg msg len len len len 24, 24, 79, 79, type 3 type 3 type 2 type
DB-1344
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug ip tcp intercept command:
Router# debug ip tcp intercept
The router sends more retransmissions trying to establish connections with the apparent clients:
INTERCEPT: retransmit 4 (172.19.160.17:61774) <- (10.1.1.30:23) SYNRCVD INTERCEPT: retransmit 4 (172.19.160.17:62030) <- (10.1.1.30:23) SYNRCVD INTERCEPT: retransmit 2 (171.69.232.23:1048) <- (10.1.1.30:23) SYNRCVD
The router establishes the connection with the third client and resends to the server:
INTERCEPT: 1st half of connection is established (171.69.232.23:1048) => (10.1.1.30:23) INTERCEPT: (171.69.232.23:1048) SYN -> 10.1.1.30:23 INTERCEPT: retransmit 2 (171.69.232.23:1048) -> (10.1.1.30:23) SYNSENT
DB-1345
The router resends to the first two apparent clients, times out, and sends resets:
INTERCEPT: INTERCEPT: INTERCEPT: INTERCEPT: INTERCEPT: INTERCEPT: INTERCEPT: INTERCEPT: retransmit 8 (172.19.160.17:61774) <- (10.1.1.30:23) SYNRCVD retransmit 8 (172.19.160.17:62030) <- (10.1.1.30:23) SYNRCVD retransmit 16 (172.19.160.17:61774) <- (10.1.1.30:23) SYNRCVD retransmit 16 (172.19.160.17:62030) <- (10.1.1.30:23) SYNRCVD retransmitting too long (172.19.160.17:61774) => (10.1.1.30:23) SYNRCVD 172.19.160.17:61774 <- RST (10.1.1.30:23) retransmitting too long (172.19.160.17:62030) => (10.1.1.30:23) SYNRCVD 172.19.160.17:62030 <- RST (10.1.1.30:23)
DB-1346
December 2010
Syntax Description
line-number address ip-address aux line-number console line-number in out port port-number tty line-number vty line-number slot/port slot/subslot/port
(Optional) Line number. Valid range is 0 to 710. (Optional) Specifies the source or destination IP address. (Optional) Specifies the auxiliary line. (Optional) Specifies the primary terminal line. (Optional) Specifies the incoming segments. (Optional) Specifies the outgoing segments. (Optional) Specifies the source or destination port number. (Optional) Specifies the terminal controller. (Optional) Specifies the virtual terminal. (Optional) Specifies the slot and port for modems. The slash mark is required. (Optional) Specifies the slot, subslot, and port for modems. The slash mark is required.
Command Default
If no optional arguments or keywords are entered, this command displays all TCP packet debug messages.
Command Modes
Command History
Release 11.1
Examples
The following is sample output from the debug ip tcp packet command:
Router# debug ip tcp packet tcp0: I LISTEN 172.16.0.0:49620 172.16.0.1:80 seq 2116160325 OPTS 4 SYN WIN 1024 tcp0: O SYNRCVD 172.16.0.34:49620 172.16.0.1:80 seq 3992162775 OPTS 4 ACK 2116160325 SYN WIN 4128 tcp0: I SYNRCVD 172.16.0.34:49620 172.16.0.1:80 seq 2116160326 RST WIN 0
DB-1347
Related Commands
Command debug ip packet detail debug ip tcp driver debug ip tcp transactions
Description Displays general IP debugging information and IP security option security transactions. Displays information on TCP driver events; for example, connections opening or closing, or packets being dropped because of full queues. Displays information on significant TCP transactions such as state changes, retransmissions, and duplicate packets.
DB-1348
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The command output was enhanced to account for the following conditions: TCP entering Fast Recovery mode, duplicate acknowledgments being received during Fast Recovery mode, and partial acknowledgments being received. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2(31)SB2 12.2SX
Usage Guidelines
This command is particularly useful for debugging a performance problem on a TCP/IP network that you have isolated above the data-link layer. The debug ip tcp transactions command displays output for packets that the router sends and receives, but does not display output for packets that it forwards.
Examples
The following is sample output from the debug ip tcp transactions command:
Router# debug ip tcp transactions TCP: sending SYN, seq 168108, ack 88655553 TCP0: Connection to 10.9.0.13:22530, advertising MSS 966 TCP0: state was LISTEN -> SYNRCVD [23 -> 10.9.0.13(22530)] TCP0: state was SYNSENT -> SYNRCVD [23 -> 10.9.0.13(22530)] TCP0: Connection to 10.9.0.13:22530, received MSS 956 TCP0: restart retransmission in 5996 TCP0: state was SYNRCVD -> ESTAB [23 -> 10.9.0.13(22530)] TCP2: restart retransmission in 10689 TCP2: restart retransmission in 10641 TCP2: restart retransmission in 10633 TCP2: restart retransmission in 13384 -> 10.0.0.13(16151)] TCP0: restart retransmission in 5996 [23 -> 10.0.0.13(16151)]
DB-1349
The following line from the debug ip tcp transactions command output shows that TCP has entered Fast Recovery mode:
fast re-transmit - sndcwnd - 512, snd_last - 33884268765
The following lines from the debug ip tcp transactions command output show that a duplicate acknowledgment is received when in Fast Recovery mode (first line) and a partial acknowledgment has been received (second line):
TCP0:ignoring second congestion in same window sndcwn - 512, snd_1st - 33884268765 TCP0:partial ACK received sndcwnd:338842495
Field TCP sending SYN seq 168108 ack 88655553 TCP0 Connection to 10.9.0.13:22530 advertising MSS 966
Description Indicates that this is a TCP transaction. Indicates that a synchronize packet is being sent. Indicates the sequence number of the data being sent. Indicates the sequence number of the data being acknowledged. Indicates the TTY number (0, in this case) with which this TCP connection is associated. Indicates the remote address with which a connection has been established. Indicates the maximum segment size that this side of the TCP connection is offering to the other side.
DB-1350
December 2010
Table 185
Description Indicates that the TCP state machine changed state from LISTEN to SYNRCVD. Possible TCP states that can follow are:
CLOSEDConnection closed. CLOSEWAITReceived a FIN segment. CLOSINGReceived a FIN/ACK segment. ESTABConnection established. FINWAIT 1Sent a FIN segment to start closing the connection. FINWAIT 2Waiting for a FIN segment. LASTACKSent a FIN segment in response to a received FIN segment. LISTENListening for a connection request. SYNRCVDReceived a SYN segment and responded. SYNSENTSent a SYN segment to start connection negotiation. TIMEWAITWaiting for the network to clear segments for this connection before the network no longer recognizes the connection as valid. This must occur before a new connection can be set up. The first field (23) indicates the local TCP port. The second field (10.9.0.13) indicates the destination IP address. The third field (22530) indicates the destination TCP port.
Indicates the number of milliseconds until the next retransmission takes place. Indicates the size of the send congestion window. Indicates the size of the last window.
DB-1351
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(25)S. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug ip traffic-export events command:
Router# debug ip traffic-export events RITE:exported RITE:exported RITE:exported RITE:exported RITE:exported RITE:exported RITE:exported RITE:exported RITE:exported RITE:exported RITE:exported RITE:exported RITE:exported RITE:exported RITE:exported RITE:exported input input input input input input input input input input input input input input input input packet packet packet packet packet packet packet packet packet packet packet packet packet packet packet packet # # # # # # # # # # # # # # # # 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562
Related Commands
Description Creates or edits an IP traffic export profile and enables the profile on an ingress interface.
DB-1352
December 2010
debug ip trigger-authentication
To display information related to automated double authentication, use the debug ip trigger-authentication command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip trigger-authentication [verbose] no debug ip trigger-authentication [verbose]
Syntax Description
verbose
(Optional) Specifies that the complete debugging output be displayed, including information about packets that are blocked before authentication is complete.
Command Modes
Usage Guidelines
Use this command when troubleshooting automated double authentication. This command displays information about the remote host table. Whenever entries are added, updated, or removed, a new debugging message is displayed. What is the remote host table? Whenever a remote user needs to be user-authenticated in the second stage of automated double authentication, the local device sends a User Datagram Protocol (UDP) packet to the host of the remote user. Whenever such a UDP packet is sent, the host IP address of the user is added to a table. If additional UDP packets are sent to the same remote host, a new table entry is not created; instead, the existing entry is updated with a new time stamp. This remote host table contains a cumulative list of host entries; entries are deleted after a timeout period or after you manually clear the table by using the clear ip trigger-authentication command. If you include the verbose keyword, the debugging output also includes information about packet activity.
Examples
The following is sample output from the debug ip trigger-authentication command. In this example, the local device at 172.21.127.186 sends a UDP packet to the remote host at 172.21.127.114. The UDP packet is sent to request the remote users username and password (or PIN). (The output says New entry added.) After a timeout period, the local device has not received a valid response from the remote host, so the local device sends another UDP packet. (The output says Time stamp updated.) Then the remote user is authenticated, and after a length of time (the timeout period) the entry is removed from the remote host table. (The output says remove obsolete entry.)
myfirewall# debug ip trigger-authentication TRIGGER_AUTH: UDP sent from 172.21.127.186 to 172.21.127.114, qdata=7C2504 New entry added, timestamp=2940514234 TRIGGER_AUTH: UDP sent from 172.21.127.186 to 172.21.127.114, qdata=7C2504 Time stamp updated, timestamp=2940514307 TRIGGER_AUTH: remove obsolete entry, remote host=172.21.127.114
DB-1353
The following is sample output from the debug ip trigger-authentication verbose command. In this example, messages about packet activity are included because of the use of the verbose keyword. You can see many packets that are being blocked at the interface because the user has not yet been double authenticated. These packets will be permitted through the interface only after the user has been double authenticated. (You can see packets being blocked when the output says packet enqueued and then packet ignored.)
TRIGGER_AUTH: packet enqueued, qdata=69FEEC remote host=172.21.127.113, local host=172.21.127.186 (if: 0.0.0.0) TRIGGER_AUTH: UDP sent from 172.21.127.186 to 172.21.127.113, qdata=69FEEC Time stamp updated TRIGGER_AUTH: packet enqueued, qdata=69FEEC remote host=172.21.127.113, local host=172.21.127.186 (if: 0.0.0.0) TRIGGER_AUTH: packet ignored, qdata=69FEEC TRIGGER_AUTH: packet enqueued, qdata=69FEEC remote host=172.21.127.113, local host=172.21.127.186 (if: 0.0.0.0) TRIGGER_AUTH: packet ignored, qdata=69FEEC TRIGGER_AUTH: packet enqueued, qdata=69FEEC remote host=172.21.127.113, local host=172.21.127.186 (if: 0.0.0.0) TRIGGER_AUTH: UDP sent from 172.21.127.186 to 172.21.127.113, qdata=69FEEC Time stamp updated TRIGGER_AUTH: packet enqueued, qdata=69FEEC remote host=172.21.127.113, local host=172.21.127.186 (if: 0.0.0.0) TRIGGER_AUTH: packet ignored, qdata=69FEEC TRIGGER_AUTH: packet enqueued, qdata=69FEEC remote host=172.21.127.113, local host=172.21.127.186 (if: 0.0.0.0) TRIGGER_AUTH: packet ignored, qdata=69FEEC
DB-1354
December 2010
debug ip trm
To enable debug information of the Trend Registration Module (TRM), use the debug ip trm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip trm [detailed | timers] no debug ip trm [detailed | timers]
Syntax Description
detailed timers
(Optional) The system prints detailed information about the TRM. If not specified, the system displays basic status information. (Optional) The system prints information about timer events on the TRM. If not specified, the system displays basic status information.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
Use the debug ip trm to enable debug information of the TRM, which handles the registration between the system and the Trend Router Provisioning Server (TRPS).
Examples
The following is sample output from the debug ip trm detailed command:
Router# debug ip trm detailed TRM: Sending Reg Req to TRPS. Requesting AV Key = No Modify Trend Global Parameter map
The following is sample output from the debug ip trm timers command:
Router# debug ip trm timers TRM: Wait timer for active server. Sent Reg request
DB-1355
debug ip urd
To display debugging messages for URL Rendezvous Directory (URD) channel subscription report processing, use the debug ip urd command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip urd [hostname | ip-address] no debug ip urd
Syntax Description
hostname ip-address
(Optional) The domain Name System (DNS) name. (Optional) The IP address.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-1356
December 2010
debug ip urlfilter
To enable debug information of URL filter subsystems, use the debug ip urlfilter command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip urlfilter {function-trace | detailed | events} no debug ip urlfilter {function-trace | detailed | events}
Syntax Description
The system prints a sequence of important functions that are called when configuring URL filtering. The system prints detailed information about various activities that occur during URL filtering. The system prints various events such as queue event, timer event, and socket event.
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(15)T. This command was implemented on the Cisco 881 and Cisco 888 platforms. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-1357
============================================ Other configurations ===================== Allow Mode:OFF System Alert:ENABLED Audit Trail:ENABLED Log message on N2H2 server:DISABLED Maximum number of cache entries:5 Maximum number of packet buffers:20 Maximum outstanding requests:1000 fw1_4# 1d15h:URLF:got a socket read event... 1d15h:URLF:socket recv failed. 1d15h:URLF:Closing the socket for server (192.168.1.103:4005) 1d15h:%URLF-3-SERVER_DOWN:Connection to the URL filter server 192.168.1.103 is down 1d15h:URLF:Opening a socket for server (192.168.1.103:4005) 1d15h:URLF:socket fd 0 1d15h:%URLF-5-SERVER_UP:Connection to an URL filter server(192.168.1.103) is made, the router is returning from ALLOW MODE 1d15h:URLF:got cache idle timer event... 1d16h:URLF:got cache absolute timer event... 1d16h:URLF:got cache idle timer event... 1d16h:URLF:creating uis 0x63A95DB4, pending request 1 1d16h:URLF:domain name not found in the exclusive list 1d16h:URLF:got an cbac queue event... 1d16h:URLF:socket send successful...172.17.192.130:8080) -> 192.168.1.103:1052 seq 3344720064 wnd 24820 1d16h:URLF:holding pak 0x634A8A08 (172.17.192.130:8080) -> 192.168.1.103:1052 seq 3344721524 wnd 24820 1d16h:URLF:holding pak 0x634A98CC (172.17.192.130:8080) -> 192.168.1.103:1052 seq 3344722984 wnd 24820 1d16h:URLF:got a socket read event... 1d16h:URLF:socket recv (header) successful. 1d16h:URLF:socket recv (data) successful. 1d16h:URLF:n2h2 lookup code = 1 1d16h:URLF:Site/URL Blocked:sis 0x63675DC4, uis 0x63A95DB4 1d16h:%URLF-4-URL_BLOCKED:Access denied URL 'http://www.google.com/', client 192.168.1.103:1052 server 172.17.192.130:8080 1d16h:URLF:(192.168.1.103:1052) RST -> 172.17.192.130:8080 seq 3361738063 wnd 0 1d16h:URLF:(172.17.192.130:8080) FIN -> 192.168.1.103:1052 seq 3344720064 wnd 0 1d16h:URLF:deleting uis 0x63A95DB4, pending requests 0 1d16h:URLF:got cache idle timer event... 1d16h:URLF:creating uis 0x63A95DB4, pending request 1 1d16h:URLF:domain name not found in the exclusive list 1d16h:URLF:got an cbac queue event... 1d16h:URLF:socket send successfull... 1d16h:URLF:holding pak 0x634A812C (172.17.192.130:8080) -> 192.168.1.103:1101 seq 3589711120 wnd 24820 1d16h:URLF:holding pak 0x634A2E7C (172.17.192.130:8080) -> 192.168.1.103:1101 seq 3589712580 wnd 24820 1d16h:URLF:holding pak 0x634A3464 (172.17.192.130:8080) -> 192.168.1.103:1101 seq 3589714040 wnd 24820 1d16h:URLF:got a socket read event... 1d16h:URLF:socket recv (header) successful. 1d16h:URLF:socket recv (data) successful. 1d16h:URLF:n2h2 lookup code = 0 1d16h:%URLF-6-URL_ALLOWED:Access allowed for URL 'http://www.alcohol.com/', client 192.168.1.103:1101 server 172.17.192.130:8080 1d16h:URLF:Site/URL allowed:sis 0x6367D0C4, uis 0x63A95DB4 1d16h:URLF:releasing pak 0x634A812C:(172.17.192.130:8080) -> 192.168.1.103:1101 seq 3589711120 wnd 24820 1d16h:URLF:releasing pak 0x634A2E7C:(172.17.192.130:8080) -> 192.168.1.103:1101 seq 3589712580 wnd 24820
DB-1358
December 2010
1d16h:URLF:releasing pak 0x634A3464:(172.17.192.130:8080) -> 192.168.1.103:1101 seq 3589714040 wnd 24820 1d16h:URLF:deleting uis 0x63A95DB4, pending requests 0 1d16h:URLF:got cache idle timer event... 1d16h:URLF:creating uis 0x63A9777C, pending request 1 1d16h:URLF:domain name not found in the exclusive list 1d16h:URLF:got an cbac queue event... 1d16h:URLF:socket send successful... 1d16h:URLF:got a socket read event... 1d16h:URLF:socket recv (header) successful. 1d16h:URLF:socket recv (data) successful. 1d16h:URLF:n2h2 lookup code = 1 1d16h:URLF:Site/URL Blocked:sis 0x63677ED4, uis 0x63A9777C 1d16h:%URLF-4-URL_BLOCKED:Access denied URL 'http://www.google.com/', client 192.168.1.103:1123 server 172.17.192.130:8080 1d16h:URLF:(192.168.1.103:1123) RST -> 172.17.192.130:8080 seq 3536466275 wnd 0 1d16h:URLF:(172.17.192.130:8080) FIN -> 192.168.1.103:1123 seq 3618929551 wnd 0 1d16h:URLF:deleting uis 0x63A9777C, pending requests 0 1d16h:URLF:got cache idle timer event...
DB-1359
Syntax Description
Command Default
Debugging activity for the operation of Unicast RPF MIB objects and helper software does not occur.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRC. This command was integrated into Cisco IOS Release 12.4(20)T. This command was integrated into Cisco IOS Release 12.2(33)SXI2.
Usage Guidelines
Debug information for the Unicast RPF MIB is collected only when logging is enabled. Unicast RPF messages are stored in the logging buffer, and they are not displayed on the console unless you use the debug ip verify mib command.
Examples
The following example shows sample output of the debug ip verify mib command:
Router> enable Router# debug ip verify mib 01:29:45: cipUrpfScalar_get, searchType 161 01:29:45: ipurpfmib_get_scalars 01:29:45: cipUrpfScalar_get, searchType 161 01:29:45: cipUrpfScalar_get, searchType 161 01:29:45: ipurpfmib_get_scalars 01:29:45: cipUrpfScalar_get, searchType 161 01:29:45: cipUrpfScalar_get, searchType 161 01:29:45: ipurpfmib_get_scalars 01:29:45: cipUrpfScalar_get, searchType 161ipurpfmib_get_urpf_entryipurpfmib_get_urpf_entryipurpfmib_get_urpf_entryipurpfmib_get_ urpf_entry 01:29:45: cipUrpfIfMonEntry_get, searchType 161 01:29:45: ipurpfmib_get_urpf_ifmon_entry entry: ST 161, if 1, ip 1 01:29:45: cipUrpfIfMonEntry_get, searchType 161 01:29:45: ipurpfmib_get_urpf_ifmon_entry entry: ST 161, if 1, ip 1
DB-1360
December 2010
01:29:45: 01:29:45: 01:29:45: 01:29:45: 01:29:45: 01:29:45: 01:29:45: 01:29:45: 01:29:45: 01:29:45: 01:29:45: 01:29:45: 01:29:45: 01:29:45: 01:29:45: 01:29:45:
cipUrpfIfMonEntry_get, searchType 161 ipurpfmib_get_urpf_ifmon_entry entry: cipUrpfIfMonEntry_get, searchType 161 ipurpfmib_get_urpf_ifmon_entry entry: cipUrpfIfMonEntry_get, searchType 161 ipurpfmib_get_urpf_ifmon_entry entry: cipUrpfIfMonEntry_get, searchType 161 ipurpfmib_get_urpf_ifmon_entry entry: cipUrpfIfMonEntry_get, searchType 161 ipurpfmib_get_urpf_ifmon_entry entry: cipUrpfIfMonEntry_get, searchType 161 ipurpfmib_get_urpf_ifmon_entry entry: cipUrpfIfMonEntry_get, searchType 161 ipurpfmib_get_urpf_ifmon_entry entry: cipUrpfIfMonEntry_get, searchType 161 ipurpfmib_get_urpf_ifmon_entry entry:
Related Commands
DB-1361
debug ip virtual-reassembly
To enable debugging of the virtual fragment reassembly (VFR) subsystem, use the debug ip virtual-reassembly command in privileged EXEC mode. To disable VFR debugging, use the no form of this command. debug ip virtual-reassembly no debug ip virtual-reassembly
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output from the debug ip virtual-reassembly command allows you to monitor datagram fragmentation and reassembly statussuch as whether a datagram is incomplete and when fragments (from the datagram) are created (after a datagram is determined to be complete).
Router# debug ip virtual-reassembly 00:17:35: IP_VFR: path... 00:17:35: IP_VFR: 00:17:35: IP_VFR: 00:17:35: IP_VFR: 00:17:35: IP_VFR: fast path... 00:17:35: IP_VFR: 00:17:35: IP_VFR: 00:17:35: IP_VFR: 00:17:35: IP_VFR: fast path... 00:17:35: IP_VFR: 00:17:35: IP_VFR: 00:17:35: IP_VFR: 00:17:35: IP_VFR: 00:17:35: IP_VFR: fast path... 00:17:35: IP_VFR: 00:17:35: IP_VFR: 00:17:35: IP_VFR: 00:17:35: IP_VFR: 00:17:35: IP_VFR: 00:17:35: IP_VFR: fast path... fragment (sa:13.0.0.2, da:17.0.0.2, id:11745, offset:0, len:104) in fast created frag state for sa:13.0.0.2, da:17.0.0.2, id:11745... pak incomplete cpak-offset:0, cpak-len:104, flag: 1 dgrm incomplete, returning... fragment (sa:13.0.0.2, da:17.0.0.2, id:11745, offset:104, len:104) in cpak-offset:0, cpak-len:104, npak-offset:104 pak incomplete cpak-offset:104, cpak-len:104, flag: 1 dgrm incomplete, returning... fragment (sa:13.0.0.2, da:17.0.0.2, id:11745, offset:208, len:104) in cpak-offset:0, cpak-len:104, npak-offset:104 cpak-offset:104, cpak-len:104, npak-offset:208 pak incomplete cpak-offset:208, cpak-len:104, flag: 1 dgrm incomplete, returning... fragment (sa:13.0.0.2, da:17.0.0.2, id:11745, offset:312, len:104) in cpak-offset:0, cpak-len:104, npak-offset:104 cpak-offset:104, cpak-len:104, npak-offset:208 cpak-offset:208, cpak-len:104, npak-offset:312 pak incomplete cpak-offset:312, cpak-len:104, flag: 1 dgrm incomplete, returning... fragment (sa:13.0.0.2, da:17.0.0.2, id:11745, offset:416, len:92) in
DB-1362
December 2010
00:17:35: 00:17:35: 00:17:35: 00:17:35: 00:17:35: 00:17:35: len:104) 00:17:35: len:104) 00:17:35: len:104) 00:17:35: len:104) 00:17:35: len:92) 00:17:35: 00:17:35: 00:17:35: 00:17:35: 00:17:35: 00:17:35: 00:17:35:
cpak-offset:0, cpak-len:104, npak-offset:104 cpak-offset:104, cpak-len:104, npak-offset:208 cpak-offset:208, cpak-len:104, npak-offset:312 cpak-offset:312, cpak-len:104, npak-offset:416 dgrm complete, switching the frags. switching fragment (sa:13.0.0.2, da:17.0.0.2, id:11745, offset:0,
IP_VFR: switching fragment (sa:13.0.0.2, da:17.0.0.2, id:11745, offset:104, IP_VFR: switching fragment (sa:13.0.0.2, da:17.0.0.2, id:11745, offset:208, IP_VFR: switching fragment (sa:13.0.0.2, da:17.0.0.2, id:11745, offset:312, IP_VFR: switching fragment (sa:13.0.0.2, da:17.0.0.2, id:11745, offset:416, IP_VFR: IP_VFR: IP_VFR: IP_VFR: IP_VFR: IP_VFR: IP_VFR: all fragments have been switched. pak_subblock_free - pak 0x64A3DC30 pak_subblock_free - pak 0x6430F010 pak_subblock_free - pak 0x6430F678 pak_subblock_free - pak 0x643119B4 deleted frag state for sa:13.0.0.2, da:17.0.0.2, id:11745 pak_subblock_free - pak 0x64A3D5C8
Related Commands
Command ip virtual-reassembly
DB-1363
debug ip wccp
To display information about Web Cache Control Protocol (WCCP) services, use the debug ip wccp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip wccp {default | vrf vrf-name {events | packets [control]} | events | packets [bypass | control | redirect] | platform | subblocks} no debug ip wccp {default | vrf vrf-name {events | packets [control]} | events | packets [bypass | control | redirect] | platform | subblocks}
Syntax Description
default vrf vrf-name events packets control bypass redirect platform subblocks
Displays information about default WCCP services. Specifies a virtual routing and forwarding instance (VRF) to associate with a service group. Displays information about significant WCCP events. Displays information about every WCCP packet received or sent by the router. (Optional) Displays information about WCCP control packets. (Optional) Displays information about WCCP bypass packets. (Optional) Displays information about WCCP redirect packets. Displays information about WCCP platform API. Displays information about WCCP subblocks.
Command Default
Command Modes
Command History
Modification This command was introduced. This command replaces the debug ip wccp packets and debug ip wccp events commands. This command was integrated into Cisco IOS Release 12.2(33)SRE. This command was integrated into Cisco IOS XE Release 3.1S.
Usage Guidelines
When the vrf keyword is not used, the command displays debug information about all WCCP services on the router. The default keyword is used to specify default WCCP services.
DB-1364
December 2010
Examples
The following is sample output from the debug ip wccp events command when a Cisco Cache Engine is added to the list of available Web caches:
Router# debug ip wccp events WCCP-EVNT: WCCP-EVNT: WCCP-EVNT: WCCP-EVNT: Built I_See_You msg body w/1 usable web caches, change # 0000000A Web Cache 192.168.25.3 added Built I_See_You msg body w/2 usable web caches, change # 0000000B Built I_See_You msg body w/2 usable web caches, change # 0000000C
The following is sample output from the debug ip wccp packets command. The router is sending keepalive packets to the Cisco Cache Engines at 192.168.25.4 and 192.168.25.3. Each keepalive packet has an identification number associated with it. When the Cisco Cache Engine receives a keepalive packet from the router, it sends a reply with the identification number back to the router.
Router# debug ip wccp packets WCCP-PKT: WCCP-PKT: WCCP-PKT: WCCP-PKT: WCCP-PKT: WCCP-PKT: WCCP-PKT: WCCP-PKT: WCCP-PKT: WCCP-PKT: WCCP-PKT: WCCP-PKT: Received valid Here_I_Am Sending I_See_You packet Received valid Here_I_Am Sending I_See_You packet Received valid Here_I_Am Sending I_See_You packet Received valid Here_I_Am Sending I_See_You packet Received valid Here_I_Am Sending I_See_You packet Received valid Here_I_Am Sending I_See_You packet packet from 192.168.25.4 w/rcvd_id 00003532 to 192.168.25.4 w/ rcvd_id 00003534 packet from 192.168.25.3 w/rcvd_id 00003533 to 192.168.25.3 w/ rcvd_id 00003535 packet from 192.168.25.4 w/rcvd_id 00003534 to 192.168.25.4 w/ rcvd_id 00003536 packet from 192.168.25.3 w/rcvd_id 00003535 to 192.168.25.3 w/ rcvd_id 00003537 packet from 192.168.25.4 w/rcvd_id 00003536 to 192.168.25.4 w/ rcvd_id 00003538 packet from 192.168.25.3 w/rcvd_id 00003537 to 192.168.25.3 w/ rcvd_id 00003539
Related Commands
Description Clears the counter for packets redirected using WCCP. Enables support of the specified WCCP service for participation in a service group. Enables packet redirection on an outbound or inbound interface using WCCP. Lists a summary of the IP information and status of an interface.
DB-1365
debug ipc
To display debugging messages about interprocess communication (IPC) activity, use the debug ipc command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ipc {all | ports | seats | sessions | zones} no debug ipc {all | ports | seats | sessions | zones}
Syntax Description
Displays all debugging IPC messages. A confirmation message will appear because enabling this keyword can severely impact performance. Displays debugging messages related to the creation and deletion of IPC ports. Displays debugging messages related to the creation and deletion of IPC nodes (seats). Displays debugging messages related to the creation and deletion of IPC sessions. Displays debugging messages related to the creation and deletion of IPC zones.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The sessions and zones keywords were added. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ipc command to troubleshoot IPC issues discovered when the show ipc command is run. The debugging output varies depending on the types of IPC packets that are selected by the different keywords.
Caution
Use the debug ipc all command with caution because it enables the debug ipc packets command and the volume of output can severely impact system performance. A confirmation message is displayed. We recommend that you use one of the other keywords to focus on a specific IPC activity and to limit the volume of output.
DB-1366
December 2010
Examples
The following example shows the confirmation message that appears when the debug ipc all command is entered:
Router# debug ipc all This may severely impact system performance. Continue? [confirm]
The following example shows how to enable the display of debugging messages about IPC sessions. The debugging output varies depending on the type of IPC activity that is specified. Each entry includes some text explanationthe example below shows that the IPC control session was opened to port 0x1030000, closed, and then clearedfollowed by a series of header or data fields.
Router# debug ipc sessions Session level events debugging is on *Sep 14 13:13:35.435: IPC: Control Session opened to port 0x1030000 *Sep 14 13:13:35.439: -Traceback= 40779898 4077649C 40776A00 40777040 4077554C *Sep 14 13:13:35.439: IPC: Session 0 to port 0x1030000 closed *Sep 14 13:13:35.439: -Traceback= 4077A9D4 40776370 4077132C 40771A58 4062EC7C 4028EC8C 40649710 4057F87C *Sep 14 13:13:35.439: IPC: Session handle of session 0 to port 0x1030000 cleared *Sep 14 13:13:35.439: -Traceback= 407798EC 4077A9E0 40776370 4077132C 40771A58 4062EC7C 4028EC8C 40649710 4057F87C
Related Commands
Description Displays debugging messages about IPC packets. Displays IPC information.
DB-1367
Syntax Description
rx tx dest
(Optional) Displays debugging messages related to the retrieval of IPC ACK messages. (Optional) Displays debugging messages related to the transmission of IPC ACK messages. (Optional) Displays debugging messages related to a destination port of IPC ACK messages. If not specified, information about all destinations is displayed.
Use the destination-port-id argument to specify a hexadecimal number that represents a destination port ID. The range is from 0 to FFFFFFFF.
source
(Optional) Displays debugging information about messages from an IPC node. If not specified, information about all nodes is displayed.
Use the source-seat-id argument to specify a hexadecimal number that represents a source seat ID. The range is from 0 to FFFFFFFF.
session
(Optional) Displays debugging messages related to an IPC session. If not specified, information about all sessions is displayed.
Use the session-id argument to specify a session ID. The range is from 0 to 65535.
header dump
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ipc acks command to troubleshoot IPC ACK issues. To enable debugging for other IPC activities, use the debug ipc command.
DB-1368
December 2010
Examples
The following example shows how to enable the display of packet headers only when debugging IPC ACK messages. The debugging output varies depending on the type of IPC activity that is specified. Each entry includes some text explanationthe example below shows that the server received an ACK HDRfollowed by a series of header or data fields.
Router# debug ipc acks header dump Aug 19 03:52:36.136:IPC:Server received ACK HDR:442A64E0 src:100000A, dst:406116E8, index:-1, seq:22045, sz:0, type:65535, flags:2 hi:1F371, lo:0
Related Commands
DB-1369
Syntax Description
(Optional) Displays debugging messages related to IPC errors at the driver (transport) medium. (Optional) Displays information related to IPC messages that have sequence-related issues, such as duplicate or unexpected messages. (Optional) Displays only information related to IPC messages that have timed out.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The driver, sequence, and timeout keywords were added. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ipc errors command to troubleshoot IPC error issues. To enable debugging for other IPC activities, use the debug ipc command. The debugging output varies depending on the type of IPC activity that is specified.
Examples
The following example shows how to enable the display of error debugging information about IPC messages that have timed out. The debugging output varies depending on the type of IPC activity that is specified. Each entry includes some text explanationthe example below shows that the message number 4428D3D0 timed out waiting for an acknowledgment (Ack)followed by a series of header or data fields.
Router# debug ipc errors timeout Message Timeouts debugging is on *Sep 14 14:42:17.103: IPC: Message 4428D3D0 timed out waiting for Ack *Sep 14 14:42:17.103: IPC: MSG: ptr: 0x4428D3D0, flags: 0x88, retries: 6, seq: 0x1030002, refcount: 2,
DB-1370
December 2010
retry: 00:00:00, rpc_result = 0x0, data_buffer = 0x4442AB10, header = 0x4442AED4, data = 0x4442AEF4 HDR: src: 0x10000, dst: 0x103000A, index: 0, seq: 2, sz: 512, type: 0, flags: 0x400 hi: 0x1EC, lo: 0x4442AEF4 DATA: 00 00 00 05 00 00 00 00 00 00 00 3A 00 00 00 00 00 00 00 00
Related Commands
DB-1371
Syntax Description
flushes retries
(Optional) Displays only information related to IPC messages that are flushed. (Optional) Displays only information related to IPC messages that are re-sent.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The flushes and retries keywords were added.\ This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ipc events command to troubleshoot IPC events issues. To enable debugging for other IPC activities, use the debug ipc command.
Examples
The following example shows how to enable the display of debugging messages about IPC events:
Router# debug ipc events Special Events debugging is on
The following example shows how to enable the display of event debugging information about IPC messages that are re-sent. The debugging output varies depending on the type of IPC activity that is specified. Each entry includes some text explanationthe example below shows that there was a retry attempt for a specific messagefollowed by a series of header or data fields.
Router# debug ipc events retries Message Retries debugging is on *Sep 14 14:46:44.151: IPC: Retry attempt for MSG: ptr: 0x442AFE74, flags: 0x88, retries:4, seq: 0x1030003, refcount: 2, retry: 00:00:00, rpc_result = 0x0, data_buffer = 0x445EBA44, header =0x445EBE08, data = 0x445EBE28
DB-1372
December 2010
HDR: src: 0x10000, dst: 0x103000A, index: 0, seq: 3, sz: 512, type: 0, flags: 0x400 hi:0x201, lo: 0x445EBE28 DATA: 00 00 00 05 00 00 00 00 00 00 00 3A 00 00 00 00 00 00 03 D2
Related Commands
DB-1373
Syntax Description
rx tx dest
(Optional) Displays debugging messages related to the retrieval of IPC fragments. (Optional) Displays debugging messages related to the transmission of IPC fragments. (Optional) Displays debugging messages related to a destination port of IPC fragments. If not specified, information about all destinations is displayed.
Use the destination-port-id argument to specify a hexadecimal number that represents a destination port ID. The range is from 0 to FFFFFFFF.
source
(Optional) Displays debugging information about messages from an IPC node. If not specified, information about all nodes is displayed.
Use the source-seat-id argument to specify a hexadecimal number that represents a source seat ID. The range is from 0 to FFFFFFFF.
session
(Optional) Displays debugging messages related to an IPC session. If not specified, information about all sessions is displayed.
Use the session-id argument to specify a session ID. The range is from 0 to 65535.
type
(Optional) Displays debugging messages related to a type of IPC fragments. If not specified, information about all application types is displayed.
Use the application-type argument to specify a hexadecimal number that represents an application. The range is from 0 to FFFF.
flags
(Optional) Displays debugging messages related to an IPC fragments header flag. If not specified, information about all header flags is displayed.
Use the header-flag argument to specify a hexadecimal number that represents a header flag value. The range is from 0 to FFFF.
sequence
(Optional) Displays debugging messages related to a sequence number of an IPC fragment. If not specified, information about all sequence numbers is displayed.
Use the sequence argument to specify a sequence number. The range is from 0 to 65535.
DB-1374
December 2010
msgidhi
(Optional) Displays debugging messages related to the higher byte of the unique ID of an IPC fragment.
Use the msg-id-high argument to specify a hexadecimal number that represents a higher byte of the unique ID. The range is from 0 to FFFFFFFF.
msgidlo
(Optional) Displays debugging messages related to the lower byte of the unique ID of an IPC fragment.
Use the msg-id-low argument to specify a hexadecimal number that represents a lower byte of the unique ID. The range is from 0 to FFFFFFFF.
data
(Optional) Displays debugging messages related to the IPC fragment payload. If not specified, information about all of the IPC fragments payload is displayed.
offset(Optional) Displays offset IPC data. If this keyword is configured, the value keyword must also be configured.
Use the offset-from-header argument to specify the offset value
from the start of the IPC data. The range is from 0 to 65535.
Use the value keyword to configure the value expected at the offset
number that represents the value expected at the offset of the IPC data. The range is from 0 to FF.
range is from 0 to 65535. size (Optional) Displays IPC fragment debugging messages of a specific size. If not specified, information about messages of any size is displayed.
Use the size argument to specify the message size in rows. The range is from 0 to 65535.
header dump
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ipc fragments command to troubleshoot IPC fragment issues. To enable debugging for other IPC activities, use the debug ipc command.
DB-1375
Examples
The following example shows how to enable the display of debugging information about IPC fragments. The debugging output varies depending on the type of IPC activity that is specified. Each entry includes some text explanationthe example below shows that the server received a fragment messagefollowed by a series of header or data fields.
Router# debug ipc fragments IPC Fragments debugging is on 01:43:55: IPC: Server received fragment MSG: seq: 0x0, refcount: 1, retry: never, rpc_result = 0x0, data = 0x8626768 HDR: src: 0x10000, dst: 0x2210015, index: 0, hi:0x9AA, lo: 0x7D0 DATA: 00 00 00 01 00 00 00 00 00 00 00 AA 00 ptr: 0x503A4348, flags: 0x100, retries: 0, data_buffer = 0x433809E8, header = 0x8626748, seq: 1, sz: 1468, type: 0, flags: 0x10 00 00 00 00 00 17 E4
Related Commands
DB-1376
December 2010
Syntax Description
rx tx dest
(Optional) Displays debugging messages related to the retrieval of IPC NACK messages. (Optional) Displays debugging messages related to the transmission of IPC NACK messages. (Optional) Displays debugging messages related to a destination port of IPC NACK messages. If not specified, information about all destinations is displayed.
Use the destination-port-id argument to specify a hexadecimal number that represents a destination port ID. The range is from 0 to FFFFFFFF.
source
(Optional) Displays debugging information about messages from an IPC node. If not specified, information about all nodes is displayed.
Use the source-seat-id argument to specify a hexadecimal number that represents a source seat ID. The range is from 0 to FFFFFFFF.
session
(Optional) Displays debugging messages related to an IPC session. If not specified, information about all sessions is displayed.
Use the session-id argument to specify a session ID. The range is from 0 to 65535.
header dump
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ipc nacks command to troubleshoot IPC NACK issues. To enable debugging for other IPC activities, use the debug ipc command.
DB-1377
Examples
The following example shows how to enable the display of packet headers only when debugging IPC NACK messages. The debugging output varies depending on the type of IPC activity that is specified. Each entry includes some text explanationthe example below shows that the server sent a NACK message and received a NACK headerfollowed by a series of header or data fields.
Router# debug ipc nacks header dump IPC Nacks debugging is on 01:46:11: IPC: Server sent NACK MSG: ptr: 0x432A7428, flags: 0x100, retries: 0, seq: 0x0, refcount: 1, retry: never, rpc_result = 0x0, data_buffer = 0x431E4B50, header = 0x855F508, data = 0x855F528 HDR: src: 0x2210015, dst: 0x10000, index: 1, seq: 3, sz: 0, type: 0, flags: 0x100 hi: 0x4A9, lo: 0x85AA3E8 01:46:11: SP: IPC: Server received NACK HDR: E46A448 src: 2210015, dst: 10000, index: 1, seq: 3, sz: 0, type: 0, flags: 100 hi: 4A9, lo: 85AA3E8
Related Commands
DB-1378
December 2010
Syntax Description
rx tx dest
(Optional) Displays debugging messages related to the retrieval of IPC packets. (Optional) Displays debugging messages related to the transmission of IPC packets. (Optional) Displays debugging messages related to a destination port of IPC packets. If not specified, information about all destinations is displayed.
Use the destination-port-id argument to specify a hexadecimal number that represents a destination port ID. The range is from 0 to FFFFFFFF.
source
(Optional) Displays debugging information about messages from an IPC node. If not specified, information about all nodes is displayed.
Use the source-seat-id argument to specify a hexadecimal number that represents a source seat ID. The range is from 0 to FFFFFFFF.
session
(Optional) Displays debugging messages related to an IPC session. If not specified, information about all sessions is displayed.
Use the session-id argument to specify a session ID. The range is from 0 to 65535.
type
(Optional) Displays debugging messages related to a type of IPC packet. If not specified, information about all application types is displayed.
Use the application-type argument to specify a hexadecimal number that represents an application. The range is from 0 to FFFF.
flags
(Optional) Displays debugging messages related to an IPC packet header flag. If not specified, information about all header flags is displayed.
Use the header-flag argument to specify a hexadecimal number that represents a header flag value. The range is from 0 to FFFF.
sequence
(Optional) Displays debugging messages related to a sequence number of an IPC packet. If not specified, information about all sequence numbers is displayed.
Use the sequence argument to specify a sequence number. The range is from 0 to 65535.
DB-1379
msgidhi
(Optional) Displays debugging messages related to the higher byte of the unique ID of an IPC packet.
Use the msg-id-high argument to specify a hexadecimal number that represents a higher byte of the unique ID. The range is from 0 to FFFFFFFF.
msgidlo
(Optional) Displays debugging messages related to the lower byte of the unique ID of an IPC packet.
Use the msg-id-low argument to specify a hexadecimal number that represents a lower byte of the unique ID. The range is from 0 to FFFFFFFF.
data
(Optional) Displays debugging messages related to the IPC packet payload. If not specified, information about all of the IPC packets payload is displayed.
offset(Optional) Displays offset IPC data. If this keyword is configured, the value keyword must also be configured.
Use the offset-from-header argument to specify the offset value
from the start of the IPC data. The range is from 0 to 65535.
Use the value keyword to configure the value expected at the offset
number that represents the value expected at the offset of the IPC data. The range is from 0 to FF.
range is from 0 to 65535. size (Optional) Displays IPC packet debugging messages of a specific size. If not specified, information about messages of any size is displayed.
Use the size argument to specify the message size in rows. The range is from 0 to 65535.
header dump
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ipc packets command to troubleshoot IPC packet issues. To enable debugging for other IPC activities, use the debug ipc command.
DB-1380
December 2010
Caution
Use the debug ipc packets command with caution because the volume of output can severely impact system performance. A confirmation message is displayed. We recommend that you use one of the optional keywords to focus on a specific IPC activity and to limit the volume of output.
Examples
The following example shows how to enable the display of IPC packet debugging messages and includes some sample output. The debugging output varies depending on the type of IPC activity that is specified. Each entry includes some text explanationthe example below shows that the IPC server received a messagefollowed by a series of header or data fields.
Router# debug ipc packets This may severely impact system performance. Continue?[confirm] Y Aug 19 030612.297 IPC Server received MSG ptr 0x441BE75C, flags 0x80, retries 0, seq 0x0, refcount 1, retry never, rpc_result = 0x0, data_buffer = 0x443152A8, header = 0x4431566C, data = 0x4431568C HDR src 0x1060000, dst 0x1000C, index 2, seq 0, sz 28, type 770, flags 0x40 hi 0x1F25B, lo 0x442F0BC0 DATA 00 00 00 06 00 00 00 02 00 00 00 06 00 E7 00 02 00 00 00 00
The following example shows how to enable the display of IPC messages received with a destination port of 0x1000C in session 1 with a message size of 500 rows.
Router# debug ipc packets rx dest 1000C session 1 size 500
Related Commands
DB-1381
Syntax Description
(Optional) Displays debugging messages related to the retrieval of IPC RPC packets. (Optional) Displays debugging messages related to the transmission of IPC RPC packets. (Optional) Displays debugging messages related to IPC RPC queries. (Optional) Displays debugging messages related to IPC RPC responses. (Optional) Displays debugging messages related to a destination port of IPC RPC packets. If not specified, information about all destinations is displayed.
Use the destination-port-id argument to specify a hexadecimal number that represents a destination port ID. The range is from 0 to FFFFFFFF.
source
(Optional) Displays debugging information about messages from an IPC node. If not specified, information about all nodes is displayed.
Use the source-seat-id argument to specify a hexadecimal number that represents a source seat ID. The range is from 0 to FFFFFFFF.
session
(Optional) Displays debugging messages related to an IPC session. If not specified, information about all sessions is displayed.
Use the session-id argument to specify a session ID. The range is from 0 to 65535.
type
(Optional) Displays debugging messages related to a type of IPC RPC message. If not specified, information about all application types is displayed.
Use the application-type argument to specify a hexadecimal number that represents an application. The range is from 0 to FFFF.
flags
(Optional) Displays debugging messages related to an IPC RPC message header flag. If not specified, information about all header flags is displayed.
Use the header-flag argument to specify a hexadecimal number that represents a header flag value. The range is from 0 to FFFF.
DB-1382
December 2010
sequence
(Optional) Displays debugging messages related to a sequence number of an IPC RPC message. If not specified, information about all sequence numbers is displayed.
Use the sequence argument to specify a sequence number. The range is from 0 to 65535.
msgidhi
(Optional) Displays debugging messages related to the higher byte of the unique ID of an IPC RPC message.
Use the msg-id-high argument to specify a hexadecimal number that represents a higher byte of the unique ID. The range is from 0 to FFFFFFFF.
msgidlo
(Optional) Displays debugging messages related to the lower byte of the unique ID of an IPC RPC message.
Use the msg-id-low argument to specify a hexadecimal number that represents a lower byte of the unique ID. The range is from 0 to FFFFFFFF.
data
(Optional) Displays debugging messages related to the IPC RPC payload. If not specified, information about all of the IPC RPCs payload is displayed.
offset(Optional) Displays offset IPC data. If this keyword is configured, the value keyword must also be configured.
Use the offset-from-header argument to specify the offset value
from the start of the IPC data. The range is from 0 to 65535.
Use the value keyword to configure the value expected at the offset
number that represents the value expected at the offset of the IPC data. The range is from 0 to FF.
range is from 0 to 65535. size (Optional) Displays IPC RPC debugging messages of a specific size. If not specified, information about messages of any size is displayed.
Use the size argument to specify the message size in rows. The range is from 0 to 65535.
header dump
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-1383
Usage Guidelines
Use the debug ipc rpc command to troubleshoot IPC RPC packet issues. To enable debugging for other IPC activities, use the debug ipc command. The debugging output varies depending on the type of IPC activity that is specified.
Examples
The following example shows how to enable the display of packet headers only when debugging IPC RPC response messages. The debugging output varies depending on the type of IPC activity that is specified. Each entry includes some text explanationthe example below shows that the server received an RPC responsefollowed by a series of header or data fields.
Router# debug ipc rpc response header dump source 2210003 RPC debugging is on 01:53:43: SP: IPC: Server received RPC Reply HDR: E450048 src: 2210003, dst: 10000, index:0, seq: 1716, sz: 4, type: 2914, flags: 208 hi: A07, lo: E264DE8
Related Commands
DB-1384
December 2010
Syntax Description
events statistics
(Optional) Displays IPHC IPC command and control events. (Optional) Displays IPHC IPC counter updates.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(10). This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
If you issue the debug iphc ipc command without keywords, all the IPC messages that are passed between the RP and the LC are displayed. On routers with many interfaces and distributed systems, the number of IPC messages becomes unwieldy, because of all the counter updates. To display only the events that indicate interface state changes, issue the debug iphc ipc events command.
Examples
The following example enables the display of all IPHC IPC messages:
Router# debug iphc ipc IPHC IPC statistics debugging is on IPHC IPC event debugging is on The following example disables IPHC IPC statistics debugging: Router# no debug iphc ipc statistics IPHC IPC statistics debugging is off
The following example enables the display of IPHC IPC event messages:
Router# debug iphc ipc events
DB-1385
The command output shows the event messages as the interface changes from enabled to administratively down:
%OSPF-5-ADJCHG: Process 1, Nbr 10.10.10.10 on Multilink8 from FULL to DOWN %LINK-5-CHANGED: Interface Multilink8, changed state to administratively down. IPHC IPC 2: Set Negotiated mesg (Mu PPP 128 2 0) IPHC Mu8: Distributed FS disabled IPHC IPC 2: Send Set Configured mesg (Mu PPP 128 2 0) IPHC IPC Mu8: i/f state change complete (Up/Down: 0/1)
The following example enables the display of IPHC IPC counter updates:
Router# debug iphc ipc statistics IPHC IPC statistics debugging is on
Related Commands
DB-1386
December 2010
Syntax Description
rpf
(Optional) Displays packets dropped by the IPv6 CEF Unicast Reverse-Path Forwarding (Unicast RPF) feature.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. The rpf keyword was added. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ipv6 cef drop command is similar to the debug ip cef drops command, except that it is IPv6-specific.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debug output, use the logging command options in global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. For complete information on debug commands and redirecting debug output, refer to the Release 12.3 Cisco IOS Debug Command Reference.
DB-1387
Examples
The following is sample output from the debug ipv6 cef drop command:
Router# debug ipv6 cef drop *Aug 30 08:20:51.169: IPv6-CEF: received packet on Serial6/0/2 *Aug 30 08:20:51.169: IPv6-CEF: found no adjacency for 2001:0DB8::1 reason 2 *Aug 30 08:20:51.169: IPv6-CEF: packet not switched: code 0x1
Field IPv6-CEF: received packet on Serial6/0/2 IPv6-CEF: found no adjacency for 2001:0DB8::1 IPv6-CEF: packet not switched
Description Cisco Express Forwarding has received a packet addressed to the router via serial interface 6/0/2. Cisco Express Forwarding has found no adjacency for the IPv6 address prefix of 2001:0DB8::1. Cisco Express Forwarding has dropped the packet.
Related Commands
Description Displays debug messages for CEFv6 and dCEFv6 general events. Displays debug messages for CEFv6 and dCEFv6 table modification events.
DB-1388
December 2010
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH.
Usage Guidelines
The debug ipv6 cef events command is similar to the debug ip cef events command, except that it is IPv6-specific.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debug output, use the logging command options in global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. For complete information on debug commands and redirecting debug output, refer to the Release 12 Cisco IOS Debug Command Reference.
Examples
The following is sample output from the debug ipv6 cef events command:
Router# debug ipv6 cef events IPv6 CEF packet events debugging is on Router# *Aug 30 08:22:57.809: %LINK-3-UPDOWN: Interface Serial6/0/2, changed state to up *Aug 30 08:22:58.809: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial6/0/2, changed state to up *Aug 30 08:23:00.821: CEFv6-IDB: Serial6/0/2 address 2001:0DB8::248 add download succeeded
DB-1389
Field Interface Serial6/0/2, changed state to up Line protocol on Interface Serial6/0/2, changed state to up Serial6/0/2 address 2001:0DB8::248 add download succeeded
Description Indicates that the interface hardware on serial interface 6/0/2 is currently active. Indicates that the software processes that handle the line protocol consider the line usable for serial interface 6/0/2. The IPv6 address 2001:0DB8::248 was downloaded successfully.
Related Commands
Description Displays debug messages for CEFv6 and dCEFv6 table modification events.
DB-1390
December 2010
Syntax Description
Command Default
Debugging for CEFv6 and dCEFv6 load-sharing hash algorithm events is not enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ipv6 cef hash command is similar to the debug ip cef hash command, except that it is IPv6-specific. Use this command when changing the load-sharing algorithm to display IPv6 hash table details.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debug output, use the logging command options in global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. For complete information on debug commands and redirecting debug output, refer to the Release 12 Cisco IOS Debug Command Reference.
DB-1391
Related Commands
Description Displays debug messages for CEFv6 and dCEFv6 general events. Displays debug messages for CEFv6 and dCEFv6 table modification events.
DB-1392
December 2010
Syntax Description
Command Default
Debugging for CEFv6 and dCEFv6 packets that are process-switched on the router is not enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ipv6 cef receive command is similar to the debug ip cef receive command, except that it is IPv6-specific.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debug output, use the logging command options in global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. For complete information on debug commands and redirecting debug output, refer to the Release 12 Cisco IOS Debug Command Reference.
DB-1393
Examples
The following is sample output from the debug ipv6 cef receive command when another router in the network pings 2001:0DB8::2 which is a local address on this box:
Router# debug ipv6 cef receive IPv6 CEF packet receives debugging is on router# *Aug 30 08:25:14.869: IPv6CEF-receive: Receive *Aug 30 08:25:14.897: IPv6CEF-receive: Receive *Aug 30 08:25:14.925: IPv6CEF-receive: Receive *Aug 30 08:25:14.953: IPv6CEF-receive: Receive *Aug 30 08:25:14.981: IPv6CEF-receive: Receive
Description Cisco Express Forwarding has received a packet addressed to the router.
Related Commands
Description Displays debug messages for CEFv6 and dCEFv6 general events. Displays debug messages for CEFv6 and dCEFv6 table modification events.
DB-1394
December 2010
Syntax Description
background
Command Default
Debugging for CEFv6 and dCEFv6 table modification events is not enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ipv6 cef table command is similar to the debug ip cef table command, except that it is IPv6-specific. This command is used to record CEFv6 and dCEFv6 table events related to the Forwarding Information Base (FIB) tables. Types of events include the following:
Routing updates that populate the FIB tables Flushing of the FIB tables Adding or removing of entries to the FIB tables Table reloading process
DB-1395
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debug output, use the logging command options in global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. For complete information on debug commands and redirecting debug output, refer to the Cisco IOS Debug Command Reference.
Examples
The following is sample output from the debug ipv6 cef table command when a static route is added:
Router# debug ipv6 cef table IPv6 CEF table debugging is on router(config)# ipv6 route 5555::/64 serial 2/0 3000::2 router(config)# *Feb 24 08:46:09.187: IPv6CEF-Table: Event add, 5555::/64 *Feb 24 08:46:09.187: IPv6 CEF table: Created path_list 01184570 *Feb 24 08:46:09.187: IPv6 CEF table: Adding path 01181A80 to path_list 01184570 old path count=0 *Feb 24 08:46:09.187: IPv6 CEF table: No matching list for path list 01184570 *Feb 24 08:46:09.187: IPv6 CEF table: Adding fib entry 0117EE80 to path_list 01184570 old refcount=0 *Feb 24 08:46:09.187: IPv6 CEF table: Added path_list 01184570 to hash 50 *Feb 24 08:46:09.187: IPv6 CEF: Linking path 01181A80 to adjacency 01138E28 *Feb 24 08:46:09.187: IPv6 CEF table: Created 0 loadinfos for path_list 01184570 *Feb 24 08:46:09.187: IPv6CEF-Table: Validated 5555::/64
Related Commands
Description Displays debug messages for CEFv6 and dCEFv6 general events.
DB-1396
December 2010
Syntax Description
detail
(Optional) Displays detailed information about DHCP for IPv6 message decoding.
Command Default
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.4(24)T.
12.4(24)T
Usage Guidelines
The debug ipv6 dhcp detail command is used to show debug information related to the server address assignment.
Examples
Related Commands
Description Enables debugging for the DHCP for IPv6 binding database agent.
debug ipv6 dhcp relay Enables the DHCP for IPv6 relay agent debugging.
DB-1397
Syntax Description
Command Default
Debugging for the DHCP for IPv6 binding database agent is disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ipv6 dhcp database command enables debugging for DHCP for IPv6 database processing.
Examples
The following example enables debugging for the DHCP for IPv6 binding database agent:
Router# debug ipv6 dhcp database
Related Commands
DB-1398
December 2010
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The DHCP for IPv6 client, server, and relay functions are mutually exclusive on an interface. When one of these functions is already enabled and a user tries to configure a different function on the same interface, one of the following messages is displayed: Interface is in DHCP client mode, Interface is in DHCP server mode, or Interface is in DHCP relay mode.
Examples
The following example enables DHCP for IPv6 relay agent debugging:
Router# debug ipv6 dhcp relay
Related Commands
DB-1399
Syntax Description
(Optional) Autonomous system number. (Optional) IPv6 address of the neighboring router. (Optional) Displays EIGRP for IPv6 events and notifications in the console of the router. (Optional) Displays a summary of EIGRP for IPv6 routing information.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command was integrated into Cisco IOS Release 12.2(37)SE. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Because the debug ipv6 eigrp command generates a substantial amount of output, use it only when traffic on the network is light.
Examples
DB-1400
December 2010
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Release 12.2(2)T 12.0(21)ST 12.0(22)S 12.2(14)S 12.2(28)SB 12.2(25)SG 12.2(33)SRA 12.2(33)SXH 12.2SX
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ipv6 icmp command is similar to the debug ip icmp command, except that it is IPv6-specific.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debugging output, use the logging command options in global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. This command helps you determine whether the router is sending or receiving IPv6 ICMP messages. Use it, for example, when you are troubleshooting an end-to-end connection problem.
DB-1401
Note
For more information about the fields in debug ipv6 icmp output, refer to RFC 2463, Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6).
Examples
The following is sample output from the debug ipv6 icmp command:
Router# debug ipv6 icmp 13:28:40:ICMPv6:Received 13:28:45:ICMPv6:Received 13:28:50:ICMPv6:Received 13:28:55:ICMPv6:Received ICMPv6 ICMPv6 ICMPv6 ICMPv6 packet packet packet packet from from from from 2000:0:0:3::2, type 136 FE80::203:A0FF:FED6:1400, type 135 FE80::203:A0FF:FED6:1400, type 136 FE80::203:A0FF:FED6:1400, type 135
Table 189 describes significant fields shown in the first line of the display.
Table 189 debug ipv6 icmp Field Descriptions
Field 13:28:40:
Description Indicates the time (hours:minutes:seconds) at which the ICMP neighbor discovery event occurred.
nwnd: Indicates time (weeks, days) since last reboot of the event occurring. (not shown in sample output) For example, 1w4d: indicates the time (since the last reboot) of the event occurring was 1 week and 4 days ago. ICMPv6: Indication that this message describes an ICMP version 6 packet.
DB-1402
December 2010
Table 189
Description IPv6 address from which the ICMP version 6 packet is received. The number variable indicates one of the following IPv6 ICMP message types:
1Destination unreachable. The router cannot forward a packet that was sent or received. 2Packet too big. The router attempts to send a packet that exceeds the maximum transmission unit (MTU) of a link between itself and the packet destination. 3Time exceeded. Either the hop limit in transit or the fragment reassembly time is exceeded. 4Parameter problem. The router attempts to send an IPv6 packet that contains invalid parameters. An example is a packet containing a next header type unsupported by the router that is forwarding the packet. 128Echo request. The router received an echo reply. 129Echo reply. The router sent an echo reply. 133Router solicitation messages. Hosts send these messages to prompt routers on the local link to send router advertisement messages. 134Router advertisement messages. Routers periodically send these messages to advertise their link-layer addresses, prefixes for the link, and other link-specific information. These messages are also sent in response to router solicitation messages. 135Neighbor solicitation messages. Nodes send these messages to request the link-layer address of a station on the same link. 136Neighbor advertisement messages. Nodes send these messages, containing their link-local addresses, in response to neighbor solicitation messages. 137Redirect messages. Routers send these messages to hosts when a host attempts to use a less-than-optimal first hop address when forwarding packets. These messages contain a better first hop address that should be used instead.
DB-1403
Following are examples of the IPv6 ICMP messages types that can be displayed by the debug ipv6 icmp command:
ICMP echo request and ICMP echo reply messages. In the following example, an ICMP echo request is sent to address 2052::50 and an ICMP echo reply is received from address 2052::50.
1w4d:ICMPv6:Sending echo request to 2052::50 1w4d:ICMPv6:Received echo reply from 2052::50
ICMP packet too big messages. In the following example, a router tried to forward a packet to destination address 2052::50 via the next hop address 2052::52. The size of the packet was greater than 1280 bytes, which is the MTU of destination address 2052::50. As a result, the router receives an ICMP packet too big message from the next hop address 2052::52.
1w4d:Received ICMP too big from 2052::52 about 2052::50, MTU=1300
ICMP parameter problem messages. In the following example, an ICMP parameter problem message is received from address 2052::52.
1w4d:Received ICMP parameter problem from 2052::52
ICMP time exceeded messages. In the following example, an ICMP time exceeded message is received from address 2052::52.
1w4d:Received ICMP time exceeded from 2052::52
ICMP unreachable messages. In the following example, an ICMP unreachable message with code 1 is received from address 2052::52. Additionally, an ICMP unreachable message with code 1 is sent to address 2060::20 about address 2062::20.
1w4d:Received ICMP unreachable code 1 from 2052::52 1w4d:Sending ICMP unreachable code 1 to 2060::20 about 2062::20
Code 0 1 3 4
Description The router has no route to the packet destination. Although the router has a route to the packet destination, communication is administratively prohibited. The address is unreachable. The port is unreachable.
Related Commands
Description Displays debugging messages for IPv6 ICMP neighbor discovery transactions.
DB-1404
December 2010
Syntax Description
function-trace object-creation
Displays messages about software functions called by the Cisco IOS firewall. Displays messages about software objects being created by the Cisco IOS firewall. Object creation corresponds to the beginning of Cisco IOS firewall-inspected sessions. Displays messages about software objects being deleted by the Cisco IOS firewall. Object deletion corresponds to the closing of Cisco IOS firewall-inspected sessions. Displays messages about Cisco IOS firewall software events, including information about Cisco IOS firewall packet processing. Displays messages about Cisco IOS firewall timer events such as when a Cisco IOS firewall idle timeout is reached. Displays messages about Cisco IOS firewall-inspected protocol events, including details about the protocol's packets. Use this form of the command in conjunction with other Cisco IOS firewall debugging commands. This causes detailed information to be displayed for all the other enabled Cisco IOS firewall debugging.
object-deletion
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-1405
Examples
The following example enables the display of messages about Cisco IOS firewall events:
debug ipv6 inspect
Related Commands
Command ipv6 inspect audit-trail ipv6 inspect name show ipv6 inspect
Description Turns on CBAC audit trail messages, which are displayed on the console after each Cisco IOS firewall session closes. Defines a set of ipv6 inspection rules. Displays CBAC configuration and session information.
DB-1406
December 2010
Syntax Description
(Optional) IPv6 address, name, or interface of the multicast group as defined in the Domain Name System (DNS) hosts table. (Optional) Adjacency management activity. (Optional) MFIB data-driven signaling to routing protocols activity. (Optional) Route database management activity. (Optional) Initialization or deinitialization activity. (Optional) Communication with the MRIB. (Optional) Packet forwarding activity. (Optional) Process-level-only packet forwarding activity.
Command Modes
Privileged EXEC
Syntax Description
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
If no keywords are used, all IPbv6 MFIB activity debugging output is displayed.
Examples
The following example enables debugging output for adjacency management activity on the IPv6 MFIB:
Router# debug ipv6 mfib adjacency
DB-1407
debug ipv6 mld [group group-name | group-address | interface interface-type] no debug ipv6 mld [group group-name | group-address | interface interface-type]
Syntax Description
(Optional) Interface type. For more information, use the question mark (?) online help function.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.0(26)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command helps discover whether the MLD protocol activities are working correctly. In general, if MLD is not working, the router process never discovers that there is a host on the network that is configured to receive multicast packets. The messages displayed by the debug ipv6 mld command show query and report activity received from other routers and hosts. Use this command in conjunction with debug ipv6 pim to display additional multicast activity, to learn more information about the multicast routing process, or to learn why packets are forwarded out of particular interfaces.
DB-1408
December 2010
Examples
Related Commands
DB-1409
Syntax Description
group-name | group-address
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH.
Usage Guidelines
When the optional group-name or group-address argument is not used, all debugging information is displayed.
Examples
The following example shows how to enable information to be displayed about the explicit tracking of hosts. The command output is self-explanatory:
Router# debug ipv6 mld explicit 00:00:56:MLD:ET host FE80::A8BB:CCFF:FE00:800 report for FF05::6 (0 srcs) on Ethernet1/0 00:00:56:MLD:ET host FE80::A8BB:CCFF:FE00:800 switch to exclude for FF05::6 on Ethernet1/0 00:00:56:MLD:ET MRIB modify for (*,FF05::6) on Ethernet1/0 new 100, mdf 100
DB-1410
December 2010
Syntax Description
source-address
(Optional) Source address associated with an MLD membership for a group identified by the access list.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following example allows debugging information for SSM mapping to be displayed:
Router# debug ipv6 mld ssm-map
Related Commands
Command ipv6 mld ssm-map enable ipv6 mld ssm-map query dns ipv6 mld ssm-map static show ipv6 mld ssm-map
Description Enables the SSM mapping feature for groups in the configured SSM range Enables DNS-based SSM mapping. Configures static SSM mappings. Displays SSM mapping information.
DB-1411
Syntax Description
Events associated with the binding cache. Events associated with forwarding (tunneling) packets for which the router is acting as home agent. Events associated with the home agent, Dynamic Home Address Agent Discovery (DHAAD), Mobile prefix discovery (MPD), and generic home agent (HA) debugging and binding acknowledgments. Events associated with binding updates that are registrations.
registration
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ipv6 mobile command enables the display of selected debugging information. You may use multiple command lines to enable concurrent debugging of multiple classes of information.
Examples
In the following example, debugging information is displayed for binding updates processing:
Router# debug ipv6 mobile registration
Related Commands
Description Configures binding options for the Mobile IPv6 home agent feature in home-agent configuration mode. Enters home agent configuration mode.
DB-1412
December 2010
Command ipv6 mobile home-agent (interface configuration) ipv6 mobile home-agent preference
Description Initializes and start the IPv6 Mobile home agent on a specific interface.
DB-1413
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.0(26)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ipv6 mrib client command is used to display the activity in the MRIB associated with clients such as Protocol Independent Multicast (PIM) and Multicast Listener Discovery (MLD). If you are having difficulty with your client connections, use this command to display new clients being added and deleted. The debug ipv6 mrib client command also displays information on when a new client is added to or deleted from the MRIB, when a client connection is established or torn down, when a client binds to a particular MRIB table, and when a client is informed that there are updates to be read.
Examples
Related Commands
Command
Description
DB-1414
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.0(26)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ipv6 mrib io command to display information on when clients open and close MRIB I/O connections, when MRIB entry and interface updates are received and processed from clients, and when MRIB entry and interface updates are sent to clients.
Examples
DB-1415
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ipv6 mrib proxy command to display information on connections that are being opened and closed and on MRIB transaction messages that are being passed between the route processor and line cards.
Examples
DB-1416
December 2010
Syntax Description
group-name | group-address
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.0(26)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command displays update information related to the route database made by MRIB clients, which is then redistributed to the clients. Use this command to monitor MRIB route activity when discontinuity is found between the MRIB and the client database or between the individual client databases.
Examples
The following example enables the display of information about MRIB routing entry-related activity:
Router# debug ipv6 mrib route
Related Commands
DB-1417
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.0(26)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ipv6 mrib table command to display information on new MRIB tables being added and deleted.
Examples
DB-1418
December 2010
Syntax Description
detailed port
(Optional) Displays detailed information about NAT-PT translation events. (Optional) Displays port allocation events.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The port keyword was added to support Port Address Translation (PAT), or overload, multiplexing multiple IPv6 addresses to a single IPv4 address or to an IPv4 address pool. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug ipv6 nat command can be used to troubleshoot NAT-PT translation issues. If no keywords are specified, debugging messages for all NAT-PT protocol translation events are displayed.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debugging output, use the logging command options within global configuration mode. Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server.
Caution
Because the debug ipv6 nat command generates a substantial amount of output, use it only when traffic on the IPv6 network is low, so other activity on the system is not adversely affected.
Examples
The following example shows output for the debug ipv6 nat command:
Router# debug ipv6 nat
DB-1419
00:06:06: IPv6 NAT: (192.168.123.2) 00:06:06: IPv6 NAT: (3002::8) 00:06:06: IPv6 NAT: (192.168.123.2) 00:06:06: IPv6 NAT: (3002::8) 00:06:06: IPv6 NAT: 00:06:06: IPv6 NAT: 00:06:06: IPv6 NAT: 00:06:06: IPv6 NAT: 00:06:06: IPv6 NAT: 00:06:06: IPv6 NAT:
icmp src (3002::8) -> (192.168.124.8), dst (2001::2) -> icmp src (192.168.123.2) -> (2001::2), dst (192.168.124.8) -> icmp src (3002::8) -> (192.168.124.8), dst (2001::2) -> icmp src (192.168.123.2) -> (2001::2), dst (192.168.124.8) -> tcp tcp tcp tcp tcp tcp src src src src src src (3002::8) -> (192.168.124.8), dst (2001::2) -> (192.168.123.2) (192.168.123.2) -> (2001::2), dst (192.168.124.8) -> (3002::8) (3002::8) -> (192.168.124.8), dst (2001::2) -> (192.168.123.2) (3002::8) -> (192.168.124.8), dst (2001::2) -> (192.168.123.2) (3002::8) -> (192.168.124.8), dst (2001::2) -> (192.168.123.2) (192.168.123.2) -> (2001::2), dst (192.168.124.8) -> (3002::8)
Description Indicates that this is a NAT-PT packet. Protocol of the packet being translated. The source IPv6 address and the NAT-PT mapped IPv4 address.
Note
If mapping IPv4 hosts to IPv6 hosts the first address would be an IPv4 address, and the second address an IPv6 address.
The destination IPv6 address and the NAT-PT mapped IPv4 address.
Note
If mapping IPv4 hosts to IPv6 hosts the first address would be an IPv4 address, and the second address an IPv6 address.
The following example shows output for the debug ipv6 nat command with the detailed keyword:
Router# debug ipv6 nat detailed 00:14:12: IPv6 NAT: address allocated 192.168.124.8 00:14:16: IPv6 NAT: deleted a NAT entry after timeout
DB-1420
December 2010
debug ipv6 nd
To display debug messages for IPv6 Internet Control Message Protocol (ICMP) neighbor discovery transactions, use the debug ipv6 nd command in privileged EXEC mode. To disable debug messages for IPv6 ICMP neighbor discovery transactions, use the no form of this command. debug ipv6 nd no debug ipv6 nd
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The DAD: <nnnn::nn:> is unique, DAD: duplicate link-local <nnnn::nn:> on <interface type>, interface stalled, and Received NA for <nnnn::nn:> on <interface type> from <nnnn::nn:> fields were added to the command output. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command can help determine whether the router is sending or receiving IPv6 ICMP neighbor discovery messages.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debug output, use the logging command options within global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. For complete information on debug commands and redirecting debug output, refer to the Cisco IOS Debug Command Reference.
DB-1421
Examples
The following example shows output for the debug ipv6 nd command:
Router# debug ipv6 nd 13:22:40:ICMPv6-ND:STALE -> DELAY:2000:0:0:3::2 13:22:45:ICMPv6-ND:DELAY -> PROBE:2000:0:0:3::2 13:22:45:ICMPv6-ND:Sending NS for 2000:0:0:3::2 on FastEthernet0/0 13:22:45:ICMPv6-ND:Received NA for 2000:0:0:3::2 on FastEthernet0/0 from 2000:0:0:3::2 13:22:45:ICMPv6-ND:PROBE -> REACH:2000:0:0:3::2 13:22:45:ICMPv6-ND:Received NS for 2000:0:0:3::1 on FastEthernet0/0 from FE80::203:A0FF:FED6:1400 13:22:45:ICMPv6-ND:Sending NA for 2000:0:0:3::1 on FastEthernet0/0 13:23:15: ICMPv6-ND: Sending NS for FE80::1 on Ethernet0/1 13:23:16: ICMPv6-ND: DAD: FE80::1 is unique. 13:23:16: ICMPv6-ND: Sending NS for 2000::2 on Ethernet0/1 13:23:16: ICMPv6-ND: Sending NS for 3000::3 on Ethernet0/1 13:23:16: ICMPv6-ND: Sending NA for FE80::1 on Ethernet0/1 13:23:17: ICMPv6-ND: DAD: 2000::2 is unique. 13:23:53: ICMPv6-ND: Sending NA for 2000::2 on Ethernet0/1 13:23:53: ICMPv6-ND: DAD: 3000::3 is unique. 13:23:53: ICMPv6-ND: Sending NA for 3000::3 on Ethernet0/1 3d19h: ICMPv6-ND: Sending NS for FE80::2 on Ethernet0/2 3d19h: ICMPv6-ND: Received NA for FE80::2 on Ethernet0/2 from FE80::2 3d19h: ICMPv6-ND: DAD: duplicate link-local FE80::2 on Ethernet0/2,interface stalled 3d19h: %IPV6-4-DUPLICATE: Duplicate address FE80::2 on Ethernet0/2 3d19h: ICMPv6-ND: Sending NS for 3000::4 on Ethernet0/3 3d19h: ICMPv6-ND: Received NA for 3000::4 on Ethernet0/3 from 3000::4 3d19h: %IPV6-4-DUPLICATE: Duplicate address 3000::4 on Ethernet0/3
Description Indicates the time (hours:minutes:seconds) at which the ICMP neighbor discovery event occrred. Indicates that a state change is occurring for an entry in the IPv6 neighbors cache. Stale state. This state of an neighbor discovery cache entry used to be reachable, but is now is stale due to the entry not being used. In order to use this address, the router must go through the neighbor discovery process in order to confirm reachability. Delayed state. Reachability for this ND cache entry is currently being reconfirmed. While in the delay state, upper-layer protocols may inform IPv6 that they have confirmed reachability to the entry. Therefore, there is no need to send a neighbor solicitation for the entry. Probe state. While in the probe state, if no confirmation is received from the upper-layer protocols about the reachability of the entry, a neighbor solicitation message is sent. The entry remains in the probe state until a neighbor advertisement message is received in response to the neighbor solicitation message.
DELAY
PROBE
DB-1422
December 2010
Table 192
Description Sending a neighbor solicitation message. In the example output, a neighbor solicitation message is sent on Fast Ethernet interface 0/0 to determine the link-layer address of 2000:0:0:3::2 on Fast Ethernet interface 0/0. Received a neighbor advertisement message. In the example output, a neighbor advertisement message is received from the address 2000:0:0:3::2 (the second address) that includes the link-layer address of 2000:0:0:3::2 (first address) from Ethernet interface 0/0. Reachable state. An ND cache entry in this state is considered reachable, and the corresponding link-layer address can be used without needing to perform neighbor discovery on the address. Received neighbor solicitations. In the example output, the address FE80::203:A0FF:FED6:1400 (on Fast Ethernet interface 0/0) is trying to determine the link-local address of 2000:0:0:3::1. Sending for neighbor advertisements. In the example output, a neighbor advertisement containing the link-layer address of 2000:0:0:3::1 (an address assigned to the Fast Ethernet interface 0/0 address) was sent. Duplicate address detection processing was performed on the unicast IPv6 address (a neighbor solicitation message was not received in response to a neighbor advertisement message that contained the unicast IPv6 address) and the address is unique. Indicates time (days, hours) since the last reboot of the event occurring; 3d19h: indicates the time (since the last reboot) of the event occurring was 3 days and 19 hours ago. Duplicate address detection processing was performed on the link-local IPv6 address (the link-local address FE80::2 is used in the example). A neighbor advertisement message was received in response to a neighbor solicitation message that contained the link-local IPv6 address. The address is not unique, and the processing of IPv6 packets is disabled on the interface. System error message indicating the duplicate address. Duplicate address detection processing was performed on the global IPv6 address (the global address 3000::4 is used in the example). A neighbor advertisement message was received in response to a neighbor solicitation message that contained the global IPv6 address. The address is not unique and is not used.
Received NA for...
REACH
Received NS for...
Sending NA for...
3d19h:
Related Commands
Description Displays debug messages for IPv6 ICMP transactions. Displays IPv6 neighbor discovery cache information.
DB-1423
Syntax Description
(Optional) Displays adjacency information. (Optional) Displays the interaction between OSPF and IPSec in IPv6 networks, including creation and removal of policy definitions. (Optional) Displays database-timer information. (Optional) Displays flooding information. (Optional) Displays hello packet information. (Optional) Displays link-state advertisement (LSA) generation information for all LSA types. (Optional) Displays retransmission information.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated in Cisco IOS Release 12.2(15)T. This command was integrated in Cisco IOS Release 12.2(18)S. The ipsec keyword was added to support OSPF for IPv6 authentication for IPSec. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
DB-1424
December 2010
Examples
The following example displays adjacency information for OSPF for IPv6:
Router# debug ipv6 ospf adj
DB-1425
Syntax Description
acl-number
Command Modes
Command History
Release 12.2(33)SRC
Usage Guidelines
Examples
The following example shows how to turn on debugging for SPF scheduling:
Router# debug ipv6 ospf database-timer rate-limit
DB-1426
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
DB-1427
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following example displays database modification information for OSPF for IPv6:
Router# debug ipv6 ospf lsdb
DB-1428
December 2010
Syntax Description
Command Modes
Command History
Release 12.2(33)SRC
Usage Guidelines
Examples
DB-1429
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following example displays information about each OSPF for IPv6 packet received:
Router# debug ipv6 ospf packet
DB-1430
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ipv6 ospf spf statistic command displays the SPF calculation times in milliseconds, the node count, and a time stamp. Consult Cisco technical support before using this command.
Examples
The following example displays statistical information while running the SPF algorithm:
Router# debug ipv6 ospf spf statistics
Related Commands
Command debug ipv6 ospf debug ipv6 ospf events debug ipv6 ospf packet
Description Displays debugging information for the OSPFv3 for IPv6 feature. Displays information on OSPFv3-related events. Displays information about each OSPFv3 packet received.
DB-1431
Syntax Description
(Optional) Specifies an IPv6 access list. The access list name cannot contain a space or quotation mark, or begin with a numeric (Optional) May display additional detailed information about the IPv6 packet.
Command Default
Command Modes
Privileged EXEC
Command History
Release 12.2(2)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S 12.2(28)SB 12.2(25)SG 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. The access-list and detail keywords, and the access-list-name argument, were added. The access-list and detail keywords, and the access-list-name argument, were added. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ipv6 packet command is similar to the debug ip packet command, except that it is IPv6-specific.
DB-1432
December 2010
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debug output, use the logging command options within global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. For complete information on debug commands and redirecting debug output, refer to the Cisco IOS Debug Command Reference. IPv6 debugging information includes packets received, generated, and forwarded. Fast-switched packets do not generate messages. When an IPv6 access list is specified by using the access-list keyword and access-list-name argument, only packets matching the access list permit entries are displayed.
Caution
Because the debug ipv6 packet command generates a substantial amount of output, use it only when traffic on the IPv6 network is low, so other activity on the system is not adversely affected.
Examples
The following example shows output for the debug ipv6 packet command:
Router# debug ipv6 packet 13:25:40:IPV6:source 2000:0:0:3::1 (local) 13:25:40: dest 2000:0:0:3::2 (FastEthernet0/0) 13:25:40: traffic class 96, flow 0x0, len 143+195, prot 6, hops 64, originating 13:25:40:IPv6:Sending on FastEthernet0/0 13:25:40:IPV6:source 2000:0:0:3::2 (FastEthernet0/0) 13:25:40: dest 2000:0:0:3::1 13:25:40: traffic class 96, flow 0x0, len 60+14, prot 6, hops 64, forward to ulp 13:25:45:IPV6:source FE80::203:E4FF:FE12:CC1D (local) 13:25:45: dest FF02::9 (Ethernet1/1) 13:25:45: traffic class 112, flow 0x0, len 72+1428, prot 17, hops 255, originating 13:25:45:IPv6:Sending on Ethernet1/1 13:25:45:IPV6:source FE80::203:E4FF:FE12:CC00 (local) 13:25:45: dest 2000:0:0:3::2 (FastEthernet0/0) 13:25:45: traffic class 112, flow 0x0, len 72+8, prot 58, hops 255, originating 13:25:45:IPv6:Sending on FastEthernet0/0 13:25:45:IPV6:source 2000:0:0:3::2 (FastEthernet0/0) 13:25:45: dest FE80::203:E4FF:FE12:CC00 13:25:45: traffic class 112, flow 0x0, len 64+14, prot 58, hops 255, forward to ulp 13:25:45:IPV6:source FE80::203:A0FF:FED6:1400 (FastEthernet0/0) 13:25:45: dest 2000:0:0:3::1 13:25:45: traffic class 112, flow 0x0, len 72+14, prot 58, hops 255, forward to ulp
Field IPV6: source 2000:0:0:3::1 (local) dest 2000:0:0:3::2 (FastEthernet0/0) traffic class 96
Description Indicates that this is an IPv6 packet. The source address in the IPv6 header of the packet. The destination address in the IPv6 header of the packet. The contents of the traffic class field in the IPv6 header.
DB-1433
Table 193
Description The contents of the flow field of the IPv6 header. The flow field is used to label sequences of packets for which special handling is necessary by IPv6 routers. The length of the IPv6 packet. The length is expressed as two numbers with a plus (+) character between the numbers. The first number is the length of the IPv6 portion (IPv6 header length plus payload length). The second number is the entire datagram size minus the first number. The protocol field in the IPv6 header. Describes the next layer protocol that is carried by the IPv6 packet. In the example, the protocol 58 signifies that the next layer protocol is ICMPv6. The hops field in the IPv6 packet. This field is similar in function to the IPv4 time-to-live field. The presence of this field indicates that the packet shown was originated by the router. Specifies the interface on which the packet was sent. Indicates that the packet was received by the router at the destination address and was forwarded to an upper-layer protocol (ulp) for processing.
len 64+14
prot 6
DB-1434
December 2010
Syntax Description
(Optional) IPv6 address or name of the multicast group. (Optional) Interface type. For more information, use the question mark (?) online help function. (Optional) Debug statistics related to hello message processing and neighbor cache management. (Optional) Debug statistics specific to bootstrap router (BSR) protocol operation.
Command Modes
Privileged EXEC
Command History
Release 12.3(2)T 12.2(18)S 12.0(26)S 12.0(28)S 12.2(25)S 12.3(11)T 12.2(28)SB 12.2(25)SG 12.2(33)SRA 12.2(33)SXH 12.2SX
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.0(26)S. The bsr keyword was added. The bsr keyword was added. The bsr keyword was added. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command helps discover whether the PIM protocol activities are working correctly. The messages displayed by the debug ipv6 pim command show all PIM protocol messages, such as joins and prunes, received from or sent to other routers. Use this command in conjunction with debug ipv6 mld to display additional multicast activity, to learn more information about the multicast routing process, or to learn why packets are forwarded out of particular interfaces.
DB-1435
Examples
Related Commands
DB-1436
December 2010
Syntax Description
(Optional) Specifies that debug messages on a specified interface will be displayed. (Optional) Interface type and number. For more information, use the question mark (?) online help function. (Optional) Specifies that debug messages on a specified Route Processor (RP) will be displayed. (Optional) The name of the specified RP. (Optional) The IPv6 address of the specified RP.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH.
Usage Guidelines
Use the debug ipv6 pim df-election command if traffic is not flowing properly when operating in PIM bidirectional mode or if the show ipv6 pim df and show ipv6 pim df winner commands do not display the expected information.
Examples
The following example shows how to enable debugging for PIM bidirectional DF election message processing on Ethernet interface 1/0 and at 200::1:
Router# debug ipv6 pim df-election interface ethernet 1/0 rp 200::1
DB-1437
Related Commands
Command ipv6 pim rp-address show ipv6 pim df show ipv6 pim df winner
Description Configures the address of a PIM RP for a particular group range. Displays the DF-election state of each interface for each RP. Displays the DF-election winner on each interface for each RP.
DB-1438
December 2010
Syntax Description
access-list-name
(Optional) Name of the IPv6 access list for which to clear the match counters. Names cannot contain a space or quotation mark, or begin with a numeric.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(30)S. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
If no access list is specified using the optional access-list-name argument, information about all policy-matched and policy-routed packets is displayed. After you configure IPv6 policy routing, use the debug ipv6 policy command to verify that IPv6 policy-based routing (PBR) is policy-routing packets normally. Policy routing looks at various parts of the packet and then routes the packet based on certain user-defined attributes in the packet. The debug ipv6 policy command helps you determine what policy routing is following. It displays information about whether a packet matches the criteria, and if so, the resulting routing information for the packet. Do not use the debug ipv6 policy command unless you suspect a problem with IPv6 PBR policy routing.
Examples
The following example enables IPv6 policy routing packet activity. The output for this command is self-explanatory:
Router# debug ipv6 policy 00:02:38:IPv6 PBR:Ethernet0/0, matched src 2003::90 dst 2001:1000::1 protocol 58 00:02:38:IPv6 PBR:set nexthop 2003:1::95, interface Ethernet1/0 00:02:38:IPv6 PBR:policy route via Ethernet1/0/2003:1::95
DB-1439
Syntax Description
Command Default
No debugging is active.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
Related Commands
Command ipv6 local pool show ipv6 interface show ipv6 local pool
Description Configures a local IPv6 prefix pool. Displays the usability status of interfaces configured for IPv6. Displays information about defined IPv6 prefix pools.
DB-1440
December 2010
Syntax Description
interface-type interface-number
(Optional) The interface type about which to display debug messages. (Optional) The interface number about which to display debug messages.
Command Default
Command Modes
Privileged EXEC
Command History
Release 12.2(2)T 12.0(21)ST 12.0(22)S 12.2(14)S 12.2(28)SB 12.2(25)SG 12.2(33)SRA 12.2(33)SXH 12.2SX
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ipv6 rip command is similar to the debug ip rip command, except that it is IPv6-specific.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debug output, use the logging command options within global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. For complete information on debug commands and redirecting debug output, refer to the Cisco IOS Debug Command Reference. Using this command without arguments enables IPv6 RIP debugging for RIP packets that are sent and received on all router interfaces. Using this command with arguments enables IPv6 RIP debugging for RIP packets that are sent and received only on the specified interface.
DB-1441
Caution
Using this command on busy networks seriously degrades the performance of the router.
Examples
The following example shows output for the debug ipv6 rip command:
Router# debug ipv6 rip 13:09:10:RIPng:Sending multicast update on Ethernet1/1 for as1_rip 13:09:10: src=FE80::203:E4FF:FE12:CC1D 13:09:10: dst=FF02::9 (Ethernet1/1) 13:09:10: sport=521, dport=521, length=32 13:09:10: command=2, version=1, mbz=0, #rte=1 13:09:10: tag=0, metric=1, prefix=::/0 13:09:28:RIPng:response received from FE80::202:FDFF:FE77:1E42 on Ethernet1/1 for as1_rip 13:09:28: src=FE80::202:FDFF:FE77:1E42 (Ethernet1/1) 13:09:28: dst=FF02::9 13:09:28: sport=521, dport=521, length=32 13:09:28: command=2, version=1, mbz=0, #rte=1 13:09:28: tag=0, metric=1, prefix=2000:0:0:1:1::/80
The example shows two RIP packets; both are updates, known as responses in RIP terminology and indicated by a command value of 2. The first is an update sent by this router, and the second is an update received by this router. Multicast update packets are sent to all neighboring IPv6 RIP routers (all routers that are on the same links as the router sending the update, and that have IPv6 RIP enabled). An IPv6 RIP router advertises the contents of its routing table to its neighbors by periodically sending update packets over those interfaces on which IPv6 RIP is configured. An IPv6 router may also send triggered updates immediately following a routing table change. In this case the updates only includes the changes to the routing table. An IPv6 RIP router may solicit the contents of the routing table of a neighboring router by sending a Request (command =1) message to the router. The router will respond by sending an update (Response, command=2) containing its routing table. In the example, the received response packet could be a periodic update from the address FE80::202:FDFF:FE77:1E42 or a response to a RIP request message that was previously sent by the local router. Table 194 describes the significant fields shown in the display.
Table 194 debug ipv6 rip Field Descriptions
Description The name of the RIP process that is sending or receiving the update. The address from which the update was originated. The destination address for the update. The source and destination ports for the update. (IPv6 RIP uses port 521, as shown in the display.) The command field within the RIP packet. A value of 2 indicates that the RIP packet is a response (update); a value of 1 indicates that the RIP packet is a request. The version of IPv6 RIP being used. The current version is 1. There must be a 0 (mbz) field within the RIP packet.
version mbz
DB-1442
December 2010
Table 194
Description Indicates the number of routing table entries (RTEs) the RIP packet contains. The tag, metric, and prefix fields are specific to each RTE contained in the update. The tag field is intended to allow for the flagging of IPv6 RIP internal and external routes. The metric field is the distance metric from the router (sending this update) to the prefix. The prefix field is the IPv6 prefix of the destination being advertised.
Related Commands
Description Displays debug messages for IPv6 routing table updates and route cache updates.
DB-1443
Syntax Description
Command Default
Debugging for IPv6 routing table updates and route cache updates is not enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(2)T 12.0(21)ST 12.0(22)S 12.2(14)S 12.2(28)SB 12.2(25)SG 12.2(33)SRA 12.2(33)SXH 12.2SX
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(25)SG. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ipv6 routing command is similar to the debug ip routing command, except that it is IPv6-specific.
Note
By default, the network server sends the output from debug commands and system error messages to the console. To redirect debug output, use the logging command options within global configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. For complete information on debug commands and redirecting debug output, refer to the Cisco IOS Debug Command Reference.
DB-1444
December 2010
Examples
The following example shows output for the debug ipv6 routing command:
Router# debug ipv6 routing 13:18:43:IPv6RT0:Add 2000:0:0:1:1::/80 to table 13:18:43:IPv6RT0:Better next-hop for 2000:0:0:1:1::/80, [120/2] 13:19:09:IPv6RT0:Add 2000:0:0:2::/64 to table 13:19:09:IPv6RT0:Better next-hop for 2000:0:0:2::/64, [20/1] 13:19:09:IPv6RT0:Add 2000:0:0:2:1::/80 to table 13:19:09:IPv6RT0:Better next-hop for 2000:0:0:2:1::/80, [20/1] 13:19:09:IPv6RT0:Add 2000:0:0:4::/64 to table 13:19:09:IPv6RT0:Better next-hop for 2000:0:0:4::/64, [20/1] 13:19:37:IPv6RT0:Add 2000:0:0:6::/64 to table 13:19:37:IPv6RT0:Better next-hop for 2000:0:0:6::/64, [20/2]
The debug ipv6 routing command displays messages whenever the routing table changes. For example, the following message indicates that a route to the prefix 2000:0:0:1:1::/80 was added to the routing table at the time specified in the message.
13:18:43:IPv6RT0:Add 2000:0:0:1:1::/80 to table
The following message indicates that the prefix 2000:0:0:2::/64 was already in the routing table; however, a received advertisement provided a lower cost path to the prefix. Therefore, the routing table was updated with the lower cost path. (The [20/1] in the example is the administrative distance [20] and metric [1] of the better path.)
13:19:09:IPv6RT0:Better next-hop for 2000:0:0:2::/64, [20/1]
Related Commands
DB-1445
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug ipx ipxwan command is useful for verifying the startup negotiations between two routers running the IPX protocol through a WAN. This command produces output only during state changes or startup. During normal operations, no output is produced.
Examples
The following is sample output from the debug ipx ipxwan command during link startup:
Router# debug ipx ipxwan %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state IPXWAN: state (Disconnect -> Sending Timer Requests) [Serial1/6666:200 state brought up)] IPXWAN: state (Sending Timer Requests -> Disconnect) [Serial1/6666:200 state brought down)] IPXWAN: state (Disconnect -> Sending Timer Requests) [Serial1/6666:200 state brought up)] IPXWAN: IPXWAN: IPXWAN: IPXWAN: Send Send Send Send TIMER_REQ TIMER_REQ TIMER_REQ TIMER_REQ [seq [seq [seq [seq 0] 1] 2] 0] out out out out Serial1/6666:200 Serial1/6666:200 Serial1/6666:200 Serial1/6666:200 to up (IPX line (IPX line (IPX line
IPXWAN: Rcv TIMER_REQ on Serial1/6666:200, NodeID 1234, Seq 1 IPXWAN: Send TIMER_REQ [seq 1] out Serial1/6666:200 IPXWAN: Rcv TIMER_RSP on Serial1/6666:200, NodeID 1234, Seq 1, Del 6 IPXWAN: state (Sending Timer Requests -> Master: Sent RIP/SAP) [Serial1/6666:200 (Received Timer Response as master)] IPXWAN: Send RIPSAP_INFO_REQ [seq 0] out Serial1/6666:200 IPXWAN: Rcv RIPSAP_INFO_RSP from Serial1/6666:200, NodeID 1234, Seq 0 IPXWAN: state (Master: Sent RIP/SAP -> Master: Connect) [Serial1/6666:200 (Received Router Info Rsp as Master)]
DB-1446
December 2010
The following lines indicate that the startup process failed to receive a timer response, brought the link down, then brought the link up and tried again with a new timer set:
IPXWAN: state (Sending Timer Requests -> Disconnect) [Serial1/6666:200 (IPX line state brought down)] IPXWAN: state (Disconnect -> Sending Timer Requests) [Serial1/6666:200 (IPX line state brought up)]
The following lines indicate that the interface is sending timer requests and waiting for a timer response:
IPXWAN: Send TIMER_REQ [seq 0] out Serial1/6666:200 IPXWAN: Send TIMER_REQ [seq 1] out Serial1/6666:200
The following lines indicate that the interface has received a timer request from the other end of the link and has sent a timer response. The fourth line shows that the interface has come up as the master on the link.
IPXWAN: Rcv TIMER_REQ on Serial1/6666:200, NodeID 1234, Seq 1 IPXWAN: Send TIMER_REQ [seq 1] out Serial1/6666:200 IPXWAN: Rcv TIMER_RSP on Serial1/6666:200, NodeID 1234, Seq 1, Del 6 IPXWAN: state (Sending Timer Requests -> Master: Sent RIP/SAP) [Serial1/6666:200 (Received Timer Response as master)]
The following lines indicate that the interface is sending RIP/SAP requests:
IPXWAN: Send RIPSAP_INFO_REQ [seq 0] out Serial1/6666:200 IPXWAN: Rcv RIPSAP_INFO_RSP from Serial1/6666:200, NodeID 1234, Seq 0 IPXWAN: state (Master: Sent RIP/SAP -> Master: Connect) [Serial1/6666:200 (Received Router Info Rsp as Master)]
DB-1447
Syntax Description
Displays normal operating messages relating to incoming and outgoing NASI packets. This is the default. Displays messages indicating an error or failure in the protocol processing. Displays messages relating to internal NASI processing of NASI connections. The activity option includes all NASI activity such as traffic indication, timer events, and state changes.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ipx nasi command to display handshake or negotiation details between Sequenced Packet Exchange (SPX), NASI protocol, and other protocols or applications. Use the packets option to determine the NASI traffic flow, and use the error option as a quick check to see why NASI connections failed.
Examples
The following is sample output from the debug ipx nasi command with the packet and error options.
Router# debug ipx nasi packet Router# debug ipx nasi error NASI0: 6E6E Check server info NASI0: 6E6E sending server-info 4F00 Good response: 43 bytes NASI0: 7A6E Query Port. Find first NASI0: FFirst: line 0 DE, port: TTY1-__________ASYNC___^, group: ASYNC___^ NASI0: 7A6E sending Qport find-first response: 300 bytes NASI0: 7B6E port request. setting up port NASI: Check-login User: c h r i s
DB-1448
December 2010
NASI: Check-login PW hash: C7 A6 C5 C7 C4 C0 C5 C3 C4 CC C5 D0 C5 D3 C4 NASI: Check-login PW: l a b NASI1: 7B6E sending NCS Good server Data Ack in 0 bytes pkt NASI1: 7B6E sending Preq response: 303 bytes Good NASI1: 7B6E port request. setting up port NASI1: 7B6E sending NCS Good server Data Ack in 0 bytes pkt NASI1: 7B6E sending Preq response: 303 bytes Good NASI1: 7B6E Unknown NASI code 4500 Pkt Size: 13 45 0 0 FC 0 2 0 20 0 0 FF 1 0 NASI1: 7B6E Flush Rx Buffers NASI1: 7B6E sending NASI server TTY data: 1 byte in 14 size NASI1: 7B6E sending NCS Good server Data Ack in 1 bytes pkt
CF C4 C8 C5 CB C4 D4 C5 D7 C4
in 13 size pkt
in 13 size pkt
0 in NASI0 is the number of the terminal (TTY) to which this NASI connection is attached. 0 in NASI0 is used by all NASI control connections. 6E6E is the associated SPX connection pointer for this NASI connection.
Check server info
The following message indicates that the router is sending back a server-info packet with a positive acknowledgment, and the packet size is 43 bytes:
NASI0: 6E6E sending server-info 4F00 Good response: 43 bytes
The following line is a NASI packet type. Find first and Find next are NASI packet types.
NASI0: 7A6E Query Port. Find first
The following line indicates that the outgoing find first packet for the NASI connection 7A6E has line 0 DE, port name TTY1, and general name ASYNC:
NASI0: FFirst: line 0 DE, port: TTY1-__________ASYNC___^, group: ASYNC___^
Received NASI packet for NASI connection in line 1. 7B6E is the NASI connection pointer. The packet code is 4500 and is not recognizable by Cisco. Hexadecimal dump of the packet in line 2.
Related Commands
DB-1449
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command is useful for learning whether Internetwork Packet Exchange (IPX) packets are traveling over a router.
Note
In order to generate debug ipx packet information on all IPX traffic traveling over the router, you must first configure the router so that fast switching is disabled. Use the no ipx route-cache command on all interfaces on which you want to observe traffic. If the router is configured for IPX fast switching, only non fast-switched packets will produce output. When the IPX cache is invalidated or cleared, one packet for each destination is displayed as the cache is repopulated.
Examples
The following is sample output from the debug ipx packet command:
Router# debug ipx packet IPX: src=160.0260.8c4c.4f22, dst=1.0000.0000.0001, packet received IPX: src=160.0260.8c4c.4f22, dst=1.0000.0000.0001,gw=183.0000.0c01.5d85, sending packet
The first line indicates that the router receives a packet from a Novell station (address 160.0260.8c4c.4f22); this trace does not indicate the address of the immediate router sending the packet to this router. In the second line, the router forwards the packet toward the Novell server (address 1.0000.0000.0001) through an immediate router (183.0000.0c01.5d85). Table 195 describes the significant fields shown in the display.
Table 195 debug ipx packet Field Descriptions
Description Indicates that this is an IPX packet. Source address of the IPX packet. The Novell network number is 160. Its MAC address is 0260.8c4c.4f22. Destination address for the IPX packet. The address 0000.0000.0001 is an internal MAC address, and the network number 1 is the internal network number of a Novell 3.11 server.
DB-1450
December 2010
Table 195
Description Router received this packet from a Novell station, possibly through an intermediate router. Router is sending the packet over to the next hop router; its address of 183.0000.0c01.5d85 was learned from the IPX routing table. Router is attempting to send this packet.
DB-1451
Syntax Description
activity events
Displays messages relating to IPX routing activity. Displays messages relating to IPX routing events.
Command Modes
Privileged EXEC
Usage Guidelines
Normally, a router or server sends out one routing update per minute. Each routing update packet can include up to 50 entries. If many networks exist on the internetwork, the router sends out multiple packets per update. For example, if a router has 120 entries in the routing table, it would send three routing update packets per update. The first routing update packet would include the first 50 entries, the second packet would include the next 50 entries, and the last routing update packet would include the last 20 entries.
Examples
The following is sample output from the debug ipx routing command:
Router# debug ipx routing IPXRIP: update from 9999.0260.8c6a.1733 110801 in 1 hops, delay 2 IPXRIP: sending update to 12FF02:ffff.ffff.ffff via Ethernet 1 network 555, metric 2, delay 3 network 1234, metric 3, delay 4
Description IPX RIP packet. Routing update packet from an IPX server at address 9999.0260.8c6a.1733. Network 110801 is one hop away from the router at address 9999.0260.8c6a.1733. Delay is a time measurement (1/18th second) that the NetWare shell uses to estimate how long to wait for a response from a file server. Also known as ticks.
DB-1452
December 2010
Table 196
Field sending update to 12FF02:ffff.ffff.ffff via Ethernet 1 network 555 metric 2 delay 3
Description Router is sending this IPX routing update packet to address 12FF02:ffff.ffff.ffff through Ethernet interface 1. Packet includes routing update information for network 555. Network 555 is two metrics (or hops) away from the router. Network 555 is a delay of 3 away from the router. Delay is a measurement that the NetWare shell uses to estimate how long to wait for a response from a file server. Also known as ticks.
Related Commands
DB-1453
Syntax Description
activity events
(Optional) Provides more detailed output of SAP packets, including displays of services in SAP packets. (Optional) Limits amount of detailed output for SAP packets to those that contain interesting events.
Command Modes
Privileged EXEC
Usage Guidelines
Normally, a router or server sends out one SAP update per minute. Each SAP packet can include up to seven entries. If many servers are advertising on the network, the router sends out multiple packets per update. For example, if a router has 20 entries in the SAP table, it would send three SAP packets per update. The first SAP would include the first seven entries, the second SAP would include the next seven entries, and the last update would include the last six entries. Obtain the most meaningful detail by using the debug ipx sap activity and the debug ipx sap events commands together.
Caution
Because the debug ipx sap command can generate a substantial amount of output, use it with caution on networks that have many interfaces and large service tables.
Examples
The following is sample output from the debug ipx sap command:
Router# debug ipx sap IPXSAP: at 0023F778: I SAP Response type 0x2 len 160 src:160.0000.0c00.070d dest:160.ffff.ffff.ffff(452) type 0x4, "Hello2", 199.0002.0004.0006 (451), 2 hops type 0x4, "Hello1", 199.0002.0004.0008 (451), 2 hops IPXSAP: sending update to 160 IPXSAP: at 00169080: O SAP Update type 0x2 len 96 ssoc:0x452 dest:160.ffff.ffff.ffff(452) IPX: type 0x4, "Magnolia", 42.0000.0000.0001 (451), 2hops
The debug ipx sap command generates multiple lines of output for each SAP packeta packet summary message and a service detail message. The first line displays the internal router memory address of the packet. The technical support staff may use this information in problem debugging.
IPXSAP: at 0023F778:
DB-1454
December 2010
Description Indicates whether the router received the SAP packet as input (I) or is sending an update as output (O). Packet type. Format is 0xn; possible values for n include: 1General query 2General response 3Get Nearest Server request 4Get Nearest Server response
Length of this packet (in bytes). Source address of the packet. IPX network number and broadcast address of the destination IPX network for which the message is intended. IPX socket number of the process sending the packet at the source address. This number is always 452, which is the socket number for the SAP process.
DB-1455
Table 197
Description Indicates the type of service the server sending the packet provides. Format is 0xn. Some of the values for n are proprietary to Novell. Those values for n that have been published include the following (contact Novell for more information): 0Unknown 1User 2User group 3Print queue 4File server 5Job server 6Gateway 7Print server 8Archive queue 9Archive server AJob queue BAdministration 21NAS SNA gateway 24Remote bridge server 2DTime Synchronization VAP 2EDynamic SAP 47Advertising print server 4BBtrieve VAP 5.0 4CSQL VAP 7ATESNetWare for VMS 98NetWare access server 9ANamed Pipes server 9EPortable NetWareUNIX 111Test server 166NetWare management 233NetWare management agent 237NetExplorer NLM 239HMI hub 23ANetWare LANalyzer agent 26ANMS management FFFFWildcard (any SAP service) Contact Novell for more information.
DB-1456
December 2010
Table 197
Description Name of the server being advertised. Indicates the network number and address (and socket) of the server generating the SAP packet. Number of hops to the server from the router.
The fifth line of output indicates that the router sent a SAP update to network 160:
IPXSAP: sending update to 160
The format for debug ipx sap output describing a SAP update the router sends is similar to that describing a SAP update the router receives, except that the ssoc: field replaces the src: field, as the following line of output indicates: O SAP Update type 0x2 len 96 ssoc:0x452 dest:160.ffff.ffff.ffff(452) The ssoc:0x452 field indicates the IPX socket number of the process sending the packet at the source address. Possible values include the following: 451Network Core Protocol 452Service Advertising Protocol 453Routing Information Protocol 455NetBIOS 456Diagnostics 4000 to 6000Ephemeral sockets used for interaction with file servers and other network communications
Related Commands
Description Displays information on IPX routing packets that the router sends and receives.
DB-1457
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Use this command to troubleshoot connections that use SPX spoofing when SPX keepalive spoofing is enabled.
Examples
The following is sample output from the debug ipx spoof command:
Router# debug ipx spoof IPX: Tu1:200.0260.8c8d.da75->CC0001.0000.0000.0001 ln= 42 tc=02, SPX: 80 0 7004 4B8 8 1D 23 (new) (changed:yes) Last Changed 0 IPX: Tu1:200.0260.8c8d.c558->CC0001.0000.0000.0001 ln= 42 tc=02, SPX: 80 0 7104 2B8 7 29 2E (new) (changed:yes) Last Changed 0 IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.c558 ln= 42 tc=02, SPX: 80 0 2B8 7104 29 7 7 (early) IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.da75 ln= 42 tc=02, SPX: 80 0 4B8 7004 1D 8 8 (early) IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.da75 ln= 32 tc=02, watchdog IPX: local:200.0260.8c8d.da75->CC0001.0000.0000.0001 ln= 32 tc=00, watchdog snet IPX: Tu1:200.0260.8c8d.da75->CC0001.0000.0000.0001 ln= 42 tc=02, SPX: 80 0 7004 4B8 8 1D 23 (changed:clear) Last Changed 0 IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.c558 ln= 42 tc=02, SPX: C0 0 2B8 7104 29 7 7 (early) IPX: Tu1:200.0260.8c8d.c558->CC0001.0000.0000.0001 ln= 42 tc=02, SPX: 80 0 7104 2B8 7 29 2E (changed:clear) Last Changed 0 IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.c558 ln= 42 tc=02, SPX: C0 0 2B8 7104 29 7 7 (Last Changed 272 sec) IPX: local:200.0260.8c8d.c558->CC0001.0000.0000.0001 ln= 42 tc=02, spx keepalive sent 80 0 7104 2B8 7 29 2E
The following lines show that SPX packets were seen, but they are not seen for a connection that exists in the SPX table:
IPX: Tu1:200.0260.8c8d.da75->CC0001.0000.0000.0001 ln= 42 tc=02, SPX: 80 0 7004 4B8 8 1D 23 (new) (changed:yes) Last Changed 0 IPX: Tu1:200.0260.8c8d.c558->CC0001.0000.0000.0001 ln= 42 tc=02, SPX: 80 0 7104 2B8 7 29 2E (new) (changed:yes) Last Changed 0
DB-1458
December 2010
The following lines show SPX packets for connections that exist in the SPX table but that SPX idle time has not yet elapsed and spoofing has not started:
IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.c558 ln= 42 tc=02, SPX: 80 0 2B8 7104 29 7 7 (early) IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.da75 ln= 42 tc=02, SPX: 80 0 4B8 7004 1D 8 8 (early)
The following lines show an IPX watchdog packet and the spoofed reply:
IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.da75 ln= 32 tc=02, watchdog IPX: local:200.0260.8c8d.da75->CC0001.0000.0000.0001 ln= 32 tc=00, watchdog sent
The following lines show SPX packets that arrived more than two minutes after spoofing started. This situation occurs when the other sides of the SPX table are cleared. When the table is cleared, the routing processes stop spoofing the connection, which allows SPX keepalives from the local side to travel to the remote side and repopulate the SPX table.
IPX: Tu1:200.0260.8c8d.da75->CC0001.0000.0000.0001 ln= 42 tc=02, SPX: 80 0 7004 4B8 8 1D 23 (changed:clear) Last Changed 0 IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.c558 ln= 42 tc=02, SPX: C0 0 2B8 7104 29 7 7 (early) IPX: Tu1:200.0260.8c8d.c558->CC0001.0000.0000.0001 ln= 42 tc=02, SPX: 80 0 7104 2B8 7 29 2E (changed:clear) Last Changed 0
The following lines show that an SPX keepalive packet came in and was spoofed:
IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.c558 ln= 42 tc=02, SPX: C0 0 2B8 7104 29 7 7 (Last Changed 272 sec) IPX: local:200.0260.8c8d.c558->CC0001.0000.0000.0001 ln= 42 tc=02, spx keepalive sent 80 0 7104 2B8 7 29 2E
DB-1459
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug ipx spx command to display handshaking or negotiating details between the SPX protocol and the other protocols or applications. SPX debugging messages indicate various states of SPX connections such as incoming and outgoing traffic information, timer events, and related processing of SPX connections.
Examples
The following is sample output from the debug ipx spx command:
Router# debug ipx spx SPX: SPX: SPX: SPX: SPX: SPX: SPX: SPX: SPX: SPX: SPX: SPX: SPX: SPX: SPX: SPX: SPX: Sent an SPX packet I Con Src/Dst 776E/20A0 d-strm 0 con-ctl 80 I Con Src/Dst 776E/20A0 d-strm FE con-ctl 40 C847C Connection close requested by peer Sent an SPX packet purge timer fired. Cleaning up C847C purging spxcon C847C from conQ returning inQ buffers returning outQ buffers returning unackedQ buffers returning spxcon I Con Src/Dst 786E/FFFF d-strm 0 con-ctl C0 new connection request for listening socket Sent an SPX packet I Con Src/Dst 786E/20B0 d-strm 0 con-ctl 40 300 bytes data recvd Sent an SPX packet
The following line indicates an incoming SPX packet that has a source connection ID of 776E and a destination connection ID of 20A0 (both in hexadecimal). The data stream value in the SPX packet is indicated by d-strm, and the connection control value in the SPX packet is indicated by con-ctl (both in hexadecimal). All data packets received are followed by an SPX debugging message indicating the size of the packet. All control packets received are consumed internally.
SPX: I Con Src/Dst 776E/20A0 d-strm 0 con-ctl 80
DB-1460
December 2010
debug isdn
To display messages about activity in the structure and operation of ISDN in the Cisco IOS software, use the debug isdn command in privileged EXEC mode. To disable the ISDN debugging command, use the no form of this command. debug isdn {all | api name | cc [detail | interface {bri number | serial port/number}] | error [interface {bri number | serial port/number}] | events | mgmnt [detail | interface {bri number | serial port/number}] | q921 | q931 | standard [interface {bri number | serial port/number}] | tgrm} no debug isdn {all | api name | cc [detail | interface {bri number | serial port/number}] | error [interface {bri number | serial port/number}] | events | mgmnt [detail | interface {bri number | serial port/number}] | q921 | q931 | standard [interface {bri number | serial port/number}] | tgrm}
Syntax Description
Enables all debug isdn commands on all interfaces. Enables application programming interfaces (APIs) contained in ISDN on all interfaces. The name argument can be any one of the following APIs. The APIs must be entered one per command-line interface (CLI) command. To enable all of the APIs, use the all keyword.
acceptISDN call acceptance allAll ISDN API tracing bkhlISDN backhaul API tracing cdapiISDN API tracing csmISDN Compact Subscriber Module API tracing l2sockISDN Layer 2 socket API tracing nfasNon-Facility Associated Signaling packetISDN packet API tracing qsigISDN PRI Q Signaling API tracing rlmRedundant Link Manager API tracing
cc
Enables ISDN Call Control debug messages on all interfaces or, optionally, on a specific interface if you use the interface keyword. Call Control is a layer of processing within ISDN that is above the Q.931 protocol processing layer, but below the host and API layers. (Optional) Generates more information during the processing of a specific request. (Optional) Limits the debug isdn capability to one BRI or serial interface. (Optional) Identifies a single BRI interface number (BRI 2, for example) to which the debug isdn command is applied. (Optional) Identifies a single serial port and number (serial 1/0, for example) to which the debug isdn command is applied. Acceptable values are 0 through 7.
DB-1461
error
Generates error messages for normal exception conditions in the software on all interfaces or on a specific interface if you use the interface keyword. The actual significance of the message can be determined only by a detailed examination of surrounding debug messages. Displays ISDN events occurring on the user side of the ISDN interface. See the debug isdn events command page. Enables ISDN Management Entity messages on all interfaces or, optionally, on a specific interface. Management Entity controls the activation and deactivation of Q.921 resources. Displays data link layer access procedures that are taking place at the router on the Link Access Protocol D-channel (LAPD) of its ISDN interface. See the debug isdn q921 command page. Displays information about call setup and teardown of ISDN network connections between the local router and the network. See the debug isdn q931 command page. Enables a selected set of isdn debug command messages on all interfaces or, optionally, on a specific interface if you use the interface keyword, that should provide sufficient information to determine why a problem is occurring. Displays ISDN trunk group resource manager information. See the debug isdn tgrm command page.
events mgmnt
q921
q931
standard
tgrm
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was enhanced with the all, api, cc, error, mgmnt, and standard keywords. The mgmnt keyword was enhanced to display information about sharing the terminal endpoint identifier (TEI) when the isdn x25 dchannel q93-broadcast command is enabled for service access point identifier (SAPI) procedures that accept X.25 calls on the BRI D channel. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2(33)SRA 12.2SX
Usage Guidelines
DB-1462
December 2010
Caution
With the exception of the debug isdn events, debug isdn q921, debug isdn q931, and debug isdn tgrm commands, the commands described on this page are not intended for customer use and can cause ISDN or the Cisco IOS software to fail. The debug isdn events, debug isdn q921, debug isdn q931, and debug isdn tgrm commands are described on separate command pages. Follow all instructions from Cisco technical support personnel when enabling and disabling these commands.
Examples
The general format of the debug isdn command messages is as follows: date and time: ISDN interface feature: text message The text message can be used to determine activity in the structure and operation of ISDN in the Cisco IOS software, ISDN messages, and ISDN signaling procedures. The message must be interpreted by Cisco technical personnel. The following example shows a typical message for the debug isdn cc command:
*Mar 1 02:29:27.751: ISDN Se1/0:23 CC: CCPRI_Go: source id 0x300, call id 0x8008, event 0x341 (pre-ccb recovery)
The following example enables a selected set of debug isdn messages that should provide sufficient information for Cisco technical personnel to determine why a problem is occurring on BRI interface 2:
Router# debug isdn standard interface bri 2
The following report (highlighted in bold for purpose of example) is displayed when the isdn x25 dchannel q931-broadcast command is used to enable sharing the TEI:
Router# debug isdn mgmnt *Jun 8 22:38:56.535: ISDN *Jun 8 22:38:56.595: ISDN *Jun 8 22:38:56.595: ISDN L2: sapi 63 tei 127 ces 0 *Jun 8 22:38:56.595: ISDN type 9 *Jun 8 22:38:56.595: ISDN tei 85 tei 85 BR0 Q921: User TX -> IDREQ ri=29609 ai=127 BR0 Q921: User RX <- IDASSN ri=29609 ai=86 BR0 SERROR: L2_Go: at bailout DLCB is NULL ev 0x3 BR0 MGMNT: LM_MDL_UI_DATA_IND: message 2 ri 29609 ai 86 switch BR0 MGMNT: LM_MDL_UI_DATA_IND: OVERLAP REQUEST: ces 9 using lmtr
DB-1463
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was enhanced to display reports about SAPI 0 procedures that accept X.25 calls on the BRI D channel. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Although the debug isdn event and the debug isdn q931 commands provide similar debug information, the information is displayed in a different format. If you want to see the information in both formats, enable both commands at the same time. The displays will be intermingled. The ISDN events that can be displayed are Q.931 events (call setup and teardown of ISDN network connections). Use the show dialer command to retrieve information about the status and configuration of the ISDN interface on the router. Use the service timestamps debug datetime msec global configuration command to include the time with each message. For more information on ISDN switch types, codes, and values, see Appendix B, ISDN Switch Types, Codes, and Values.
Examples
The following is sample output from the debug isdn event command of call setup events for an outgoing call:
Router# debug isdn event ISDN Event: Call to 415555121202 received HOST_PROCEEDING Channel ID i = 0x0101 -------------------
DB-1464
December 2010
Channel ID i = 0x89 received HOST_CONNECT Channel ID i = 0x0101 ISDN Event: Connected to 415555121202 on B1 at 64 Kb/s
The following shows sample debug isdn event output of call setup events for an incoming call. The values used for internal purposes are unpacked information elements. The values that follow the ISDN specification are an interpretation of the unpacked information elements.
Router# debug isdn event received HOST_INCOMING_CALL Bearer Capability i = 0x080010 ------------------Channel ID i = 0x0101 Calling Party Number i = 0x0000, 415555121202 IE out of order or end of private IEs -Bearer Capability i = 0x8890 Channel ID i = 0x89 Calling Party Number i = 0x0083, 415555121202 ISDN Event: Received a call from 415555121202 on B1 at 64 Kb/s ISDN Event: Accepting the call received HOST_CONNECT Channel ID i = 0x0101 ISDN Event: Connected to 415555121202 on B1 at 64 Kb/s
The following is sample output from the debug isdn event command of call teardown events for a call that has been disconnected by the host side of the connection:
Router# debug isdn event received HOST_DISCONNECT ISDN Event: Call to 415555121202 was hung up
The following is sample output from the debug isdn event command of a call teardown event for an outgoing or incoming call that has been disconnected by the ISDN interface on the router side:
Router# debug isdn event ISDN Event: Hangup call to call id 0x8008
Description Indicates the requested bearer service to be provided by the network. See Table B-4 in Appendix B, ISDN Switch Types, Codes, and Values. Indicates the information element identifier. The value depends on the field it is associated with. Refer to the ITU-T Q.931 specification for details about the possible values associated with each field for which this identifier is relevant.
DB-1465
Table 198
Field Channel ID
Description Channel Identifier. The values and corresponding channels might be identified in several ways:
Channel ID i=0x0101Channel B1 Channel ID i=0x0102Channel B2 Channel ID i=0x83Any B channel Channel ID i=0x89Channel B1 (exclusive) Channel ID i=0x8AChannel B2 (exclusive) Channel ID i=0x81B1 (preferred) Channel ID i=0x82B2 (preferred)
Identifies the called party. This field is only present in outgoing calls. The Calling Party Number field uses the IA5 character set. Note that it may be replaced by the Keypad facility field. Indicates that an information element identifier is out of order or there are no more private network information element identifiers to interpret. Identifies the origin of the call. This field is present only in incoming calls. Note that the information about the incoming call includes the channel and speed. Whether the channel and speed are displayed depends on the network delivering the calling party number.
IE out of order or end of private IEs Received a call from 415555121202 on B1 at 64 Kb/s
The following is sample output from the debug isdn event command of a call teardown event for a call that has passed call screening and then has been hung up by the ISDN interface on the far end side:
Router# debug isdn event Jan Jan 3 11:29:52.559: ISDN BR0: RX <- DISCONNECT pd = 8 callref = 0x81 3 11:29:52.563: Cause i = 0x8090 - Normal call clearing
The following is sample output from the debug isdn event command of a call teardown event for a call that has not passed call screening and has been rejected by the ISDN interface on the router side:
Router# debug isdn event Jan Jan 3 11:32:03.263: ISDN BR0: RX <- DISCONNECT pd = 8 callref = 0x85 3 11:32:03.267: Cause i = 0x8095 - Call rejected
The following is sample output from the debug isdn event command of a call teardown event for an outgoing call that uses a dialer subaddress:
Router# debug isdn event Jan Jan Jan Jan Jan Jan Jan Jan Jan 3 3 3 3 3 3 3 3 3 11:41:48.483: 11:41:48.495: 11:41:48.495: 11:41:48.499: 11:41:48.503: 11:41:48.507: 11:41:48.571: 11:41:48.575: 11:41:48.587: ISDN BR0: Event: Call to 61885:1212 at 64 Kb/s ISDN BR0: TX -> SETUP pd = 8 callref = 0x04 Bearer Capability i = 0x8890 Channel ID i = 0x83 Called Party Number i = 0x80, '61885' Called Party SubAddr i = 0x80, 'P1212' ISDN BR0: RX <- CALL_PROC pd = 8 callref = 0x84 Channel ID i = 0x89 ISDN BR0: Event: incoming ces value = 1
DB-1466
December 2010
Jan
3 11:41:48.587: ISDN BR0: received HOST_PROCEEDING Channel ID i = 0x0101 Jan 3 11:41:48.591: ------------------Channel ID i = 0x89 Jan 3 11:41:48.731: ISDN BR0: RX <- CONNECT pd = 8 callref = 0x84 Jan 3 11:41:48.743: ISDN BR0: Event: incoming ces value = 1 Jan 3 11:41:48.743: ISDN BR0: received HOST_CONNECT Channel ID i = 0x0101 Jan 3 11:41:48.747: ------------------%LINK-3-UPDOWN: Interface BRI0:1 changed state to up Jan 3 11:41:48.771: ISDN BR0: Event: Connected to 61885:1212 on B1 at 64 Kb/s Jan 3 11:41:48.775: ISDN BR0: TX -> CONNECT_ACK pd = 8 callref = 0x04 %LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0:1, changed state to up %ISDN-6-CONNECT: Interface BRI0:1 is now connected to 61885:1212 goodie
The output is similar to the output of debug isdn q931. Refer to the debug isdn q931 command for detailed field descriptions. The following is sample output from the debug isdn event command of call setup events for a successful callback for legacy DDR:
Router# debug isdn event BRI0:Caller id Callback server starting to spanky 81012345678902 : Callback timer expired BRI0:beginning callback to spanky 81012345678902 BRI0: Attempting to dial 81012345678902
The following is sample output from the debug isdn event command for a callback that was unsuccessful because the router had no dialer map for the calling number:
Router# debug isdn event BRI0:Caller id 81012345678902 callback - no matching map
Field
Description
BRI0:Caller id Callback server starting to ... Caller ID callback has started, plus host name and number called. The callback enable timer starts now. : Callback timer expired BRI0:beginning callback to ... BRI0: Attempting to dial ... Callback timer has expired; callback can proceed. Actions proceeding after the callback timer expired, plus host name and number called.
The following is sample output from the debug isdn event command for a callback that was successful when the dialer profiles DDR feature is configured:
*Mar 1 00:46:51.827: *Mar 1 00:46:51.827: 81012345678901 *Mar 1 00:46:54.151: *Mar 1 00:46:54.151: *Mar 1 00:46:54.155: *Mar 1 00:46:54.155: *Mar 1 00:46:54.155: *Mar 1 00:46:54.503: *Mar 1 00:46:54.523: BR0:1:Caller id 81012345678901 matched to profile delorean Dialer1:Caller id Callback server starting to delorean : Callback timer expired Dialer1:beginning callback to delorean 81012345678901 Freeing callback to delorean 81012345678901 BRI0: Dialing cause Callback return call BRI0: Attempting to dial 81012345678901 %LINK-3-UPDOWN: Interface BRI0:2, changed state to up %DIALER-6-BIND: Interface BRI0:2 bound to profile Dialer1
DB-1467
*Mar 1 00:46:55.139: %LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0:2, changed state to up *Mar 1 00:46:58.187: %ISDN-6-CONNECT: Interface BRI0:2 is now connected to 81012345678901 delorean
The following example provides information about accepting X.25 calls on the ISDN D channel (for purpose of example, bold type indicates messages of interest in the following output):
Router# debug isdn event *Sep 28 12:34:29.747: ISDN BR1/1 EVENTd: isdn_host_packet_mode_events: Host packet call received call id 0xB
Table 200 describes significant fields of call setup events for a successful callback for the sample output from the debug isdn event command when the dialer profiles DDR feature is configured.
Table 200 debug isdn event Field Descriptions for Caller ID Callback and Dialer Profiles
Field BR0:1:Caller id ... matched to profile ... : Callback timer expired Dialer1:beginning callback to... Freeing callback to... BRI0: Dialing cause Callback return call BRI0: Attempting to dial %LINK-3-UPDOWN: Interface BRI0:2, changed state to up
Description Interface, channel number, caller ID that are matched, and the profile to bind to the interface. Callback timer has expired; callback can proceed. Callback process is beginning to the specified number. Callback has been started to the specified number, and the number has been removed from the callback list. The reason for the call and the number being dialed. Interface status: up.
%DIALER-6-BIND: Interface BRI0:2 bound Profile bound to the interface. to profile Dialer1 %LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0:2, changed state to up %ISDN-6-CONNECT: Interface BRI0:2 is now connected to ... Line protocol status: up. Interface is now connected to the specified host and number.
isdn_host_packet_mode_events: Host packet Host is accepting incoming X.25 call using ITU Q.931 call received call id 0xB SAPI value 0 procedures.
Related Commands
Description Displays call setup and teardown information of ISDN Layer 3 network connections.
DB-1468
December 2010
Syntax Description
(Optional) Displays ISDN Q.921 packet detail. (Optional) Displays ISDN Q.921 frame contents. (Optional) Specifies an interface for debugging. (Optional) Specifies the BRI interface and selects the interface number. Valid values are from 0 to 6.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The detail and frame keywords were added. This command was integrated into Cisco IOS Release 12.3(4)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The ISDN data link layer interface provided by the router conforms to the user interface specification defined by ITU-T recommendation Q.921. The debug isdn q921 command output is limited to commands and responses exchanged during peer-to-peer communication carried over the D channel. This debug information does not include data transmitted over the B channels that are also part of the router ISDN interface. The peers (data link layer entities and layer management entities on the routers) communicate with each other with an ISDN switch over the D channel.
Note
The ISDN switch provides the network interface defined by Q.921. This debug command does not display data link layer access procedures taking place within the ISDN network (that is, procedures taking place on the network side of the ISDN connection). Refer to Appendix B, ISDN Switch Types, Codes, and Values, in the ISDN Switch Types, Codes, and Values document on Cisco.com for a list of the supported ISDN switch types.
DB-1469
A router can be the calling or called party of the ISDN Q.921 data link layer access procedures. If the router is the calling party, the command displays information about an outgoing call. If the router is the called party, the command displays information about an incoming call and the keepalives. The debug isdn q921 command can be used with the debug isdn event, debug isdn q931, debug isdn q921 frame, and debug isdn q921 detail commands at the same time. The displays are intermingled. Use the service timestamps debug datetime msec global configuration command to include the time with each message.
Examples
The following is example output for a single active data link connection (DLC). The debugs turned on are debug isdn q921, debug isdn q921 frame, and debug isdn q921 detail. In the debugs below, Q921 followed by a colon (:) indicates that debug isdn q921 has been entered. Q921 followed by the letter f indicates that debug isdn q921 frame has been entered. Q921 followed by the letter d indicates that debug isdn q921 detail has been entered. The following output shows that the L2 frame is received. The first two octets form the address field; the third octet forms the control field. The address field identifies the originator of a frame and whether it is a command or a response. The second octet of the address field identifies the DLC with which the frame is associated. The control field (third octet) contains the frame type code and sequence number information.
00:12:10:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 00:12:10:ISDN Se1:15 Q921f:PBXb RX <- 0x0E03EF
The following output interprets the octet information. String PBXb indicates that the side receiving (RX) this frame is acting as a PBXb (as opposed to PBXa, which is the other possibility). This example also gives information about the type of frame received (SABMR), the associated DLC (1), the frame type code received from the control field (cntl=SABMR), and the sequence number (indicated by nbit, which is 0 in this case).
00:12:10:ISDN Se1:15 Q921:PBXb RX <- SABMR dlci=1 cntl=SABMR nbit=0
The following output shows information received from the driver (source_id of x200) showing an L2 frame (event x141). This results from the SABMR frame that was received from the peer PBX (v_bit and chan do not have any significance in this case).
00:12:10:ISDN Se1:15 Q921d:process_rxdata:Frame sent to L2 00:12:10:ISDN Q921d:isdn_from_driver_process:event_count 3 00:12:10:ISDN Se1:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0
The following output shows that DPNSS L2 for DLC 1 (chan 1) has received an SABMR frame (event x0) in the IDLE state (s_dpnss_idle):
00:12:10:ISDN Se1:15 Q921d:s_dpnss_idle:event x0 chan 1
The following output shows that for DLC 1 (chan 1 above), a UA frame (event x1) needs to be sent to the driver (dest x200):
00:12:10:ISDN Se1:15 Q921d:dpnss_l2_mail:dest x200 event x1 v_bit 1 chan 1 out_pkt x630531A4
The following output shows that for DLC 1, a DL_EST_IND (event x201) needs to be sent to L3 (DUA in this case because of the backhauling) indicating that this DLC is now up (in RESET COMPLETE state):
00:12:10:ISDN Se1:15 Q921d:dpnss_l2_mail:dest x300 event x201 v_bit 1 chan 1 out_pkt x0
DB-1470
December 2010
The following output shows that string PBXb is the side transmitting (TX) and that this frame is acting as PBX B. This example also gives information about the associated DLC (1), the frame type code transmitted from the control field (cntl=UA), and the sequence number (indicated by nbit, which is 0 in this case).
00:12:10:ISDN Se1:15 Q921:PBXb TX -> UA dlci=1 cntl=UA nbit=0
DB-1471
Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan
0x46030300102A31232A35302A33333330 8 17:24:43.599: 30303031233434343030303031 8 17:24:43.599:ISDN Se2/1:15 Q921:PBXa TX -> UI(C) dlci=1 cntl=UI nbit=0 i=0x00102A31232A35302A3333333030303031233434343030303031 8 17:24:43.599:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:24:43.623:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:24:43.623:ISDN Se2/1:15 Q921f:PBXa RX <- 0x460303 8 17:24:43.623:ISDN Se2/1:15 Q921:PBXa RX <- UI(R) dlci=1 cntl=UI nbit=0 8 17:24:43.623:ISDN Se2/1:15 Q921d:process_rxdata:Frame sent to L2 8 17:24:43.623:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:24:43.627:ISDN Se2/1:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:24:43.627:ISDN Se2/1:15 Q921d:s_dpnss_information_transfer:event x3 chan 1 8 17:24:43.719:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:24:43.719:ISDN Se2/1:15 Q921f:PBXa RX <0x440313092A34232A35302A3434343030 8 17:24:43.719: 303031232A31382A33312A33312A3331 8 17:24:43.719: 23 8 17:24:43.719:ISDN Se2/1:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=1 i=0x092A34232A35302A3434343030303031232A31382A33312A33312A333123 8 17:24:43.719:ISDN Se2/1:15 Q921d:process_rxdata:Frame sent to L2 8 17:24:43.719:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:24:43.719:ISDN Se2/1:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:24:43.719:ISDN Se2/1:15 Q921d:s_dpnss_information_transfer:event x2 chan 1 8 17:24:43.719:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x300 event x241 v_bit 1 chan 1 out_pkt x63EE5780 8 17:24:43.719:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x200 event x3 v_bit 1 chan 1 out_pkt x63EE57CC 8 17:24:43.723:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 8 17:24:43.723:ISDN Se2/1:15 Q921f:PBXa TX -> 0x440313 8 17:24:43.723:ISDN Se2/1:15 Q921:PBXa TX -> UI(R) dlci=1 cntl=UI nbit=1 8 17:24:43.723:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:24:43.727:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:24:43.727:ISDN Se2/1:15 Q921f:PBXa RX <0x440313092A34232A35302A3434343030 8 17:24:43.727: 303031232A31382A33312A33312A3331 8 17:24:43.727: 23 8 17:24:43.727:ISDN Se2/1:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=1 i=0x092A34232A35302A3434343030303031232A31382A33312A33312A333123 8 17:24:43.727:ISDN Se2/1:15 Q921d:process_rxdata:Frame sent to L2 8 17:24:43.727:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:24:43.731:ISDN Se2/1:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:24:43.731:ISDN Se2/1:15 Q921d:s_dpnss_information_transfer:event x2 chan 1 8 17:24:43.731:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x200 event x3 v_bit 1 chan 1 out_pkt x63EE57CC 8 17:24:43.731:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 8 17:24:43.731:ISDN Se2/1:15 Q921f:PBXa TX -> 0x440313 8 17:24:43.731:ISDN Se2/1:15 Q921:PBXa TX -> UI(R) dlci=1 cntl=UI nbit=1 8 17:24:43.731:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:24:43.739:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:24:43.739:ISDN Se2/1:15 Q921f:PBXa RX <0x440313092A34232A35302A3434343030 8 17:24:43.739: 303031232A31382A33312A33312A3331 8 17:24:43.739: 23 8 17:24:43.739:ISDN Se2/1:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=1 i=0x092A34232A35302A3434343030303031232A31382A33312A33312A333123 8 17:24:43.739:ISDN Se2/1:15 Q921d:process_rxdata:Frame sent to L2 8 17:24:43.739:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:24:43.739:ISDN Se2/1:15 Q921d:dpnss_l2_main:source_id x200 event
DB-1472
December 2010
Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan
x141 v_bit x0 chan x0 8 17:24:43.739:ISDN Se2/1:15 Q921d:s_dpnss_information_transfer:event x2 chan 1 8 17:24:43.739:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x200 event x3 v_bit 1 chan 1 out_pkt x63EE57CC 8 17:24:43.739:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 8 17:24:43.743:ISDN Se2/1:15 Q921f:PBXa TX -> 0x440313 8 17:24:43.743:ISDN Se2/1:15 Q921:PBXa TX -> UI(R) dlci=1 cntl=UI nbit=1 8 17:24:43.743:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:24:43.787:ISDN Se2/0:15 Q921d:dpnss_l2_main:source_id x4 event x240 v_bit x0 chan x2 8 17:24:43.787:ISDN Se2/0:15 Q921d:s_dpnss_information_transfer:event x240 chan 1 8 17:24:43.787:ISDN Se2/0:15 Q921d:dpnss_l2_mail:dest x200 event x2 v_bit 1 chan 1 out_pkt x636B1B64 8 17:24:43.787:ISDN Se2/0:15 LIFd:LIF_StartTimer:timer (0x63A4AFBC), ticks (500), event (0x1201) 8 17:24:43.791:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 8 17:24:43.791:ISDN Se2/0:15 Q921f:PBXa TX -> 0x460313092A31232A35302A3434343030 8 17:24:43.791: 30303123 8 17:24:43.791:ISDN Se2/0:15 Q921:PBXa TX -> UI(C) dlci=1 cntl=UI nbit=1 i=0x092A31232A35302A343434303030303123 8 17:24:43.791:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:24:43.811:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:24:43.811:ISDN Se2/0:15 Q921f:PBXa RX <- 0x460313 8 17:24:43.811:ISDN Se2/0:15 Q921:PBXa RX <- UI(R) dlci=1 cntl=UI nbit=1 8 17:24:43.811:ISDN Se2/0:15 Q921d:process_rxdata:Frame sent to L2 8 17:24:43.811:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:24:43.811:ISDN Se2/0:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:24:43.811:ISDN Se2/0:15 Q921d:s_dpnss_information_transfer:event x3 chan 1 8 17:24:52.107:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:24:52.107:ISDN Se2/1:15 Q921f:PBXa RX <0x440303052A34232A35302A3434343030 8 17:24:52.107: 303031232A31382A33312A33312A3331 8 17:24:52.107: 23 8 17:24:52.107:ISDN Se2/1:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=0 i=0x052A34232A35302A3434343030303031232A31382A33312A33312A333123 8 17:24:52.107:ISDN Se2/1:15 Q921d:process_rxdata:Frame sent to L2 8 17:24:52.107:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:24:52.111:ISDN Se2/1:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:24:52.111:ISDN Se2/1:15 Q921d:s_dpnss_information_transfer:event x2 chan 1 8 17:24:52.111:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x300 event x241 v_bit 1 chan 1 out_pkt x63F19CC8 8 17:24:52.111:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x200 event x3 v_bit 1 chan 1 out_pkt x63F19D14 8 17:24:52.111:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 8 17:24:52.111:ISDN Se2/1:15 Q921f:PBXa TX -> 0x440303 8 17:24:52.111:ISDN Se2/1:15 Q921:PBXa TX -> UI(R) dlci=1 cntl=UI nbit=0 8 17:24:52.111:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:24:52.119:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:24:52.119:ISDN Se2/1:15 Q921f:PBXa RX <0x440303052A34232A35302A3434343030 8 17:24:52.119: 303031232A31382A33312A33312A3331 8 17:24:52.119: 23 8 17:24:52.119:ISDN Se2/1:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=0 i=0x052A34232A35302A3434343030303031232A31382A33312A33312A333123 8 17:24:52.119:ISDN Se2/1:15 Q921d:process_rxdata:Frame sent to L2 8 17:24:52.119:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:24:52.119:ISDN Se2/1:15 Q921d:dpnss_l2_main:source_id x200 event
DB-1473
Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan
8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8
x141 v_bit x0 chan x0 x141 v_bit x0 chan x0 17:24:52.119:ISDN Se2/1:15 Q921d:s_dpnss_information_transfer:event x2 chan 1 17:24:52.119:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x200 event x3 v_bit 1 chan 1 out_pkt x63F19D14 17:24:52.119:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 17:24:52.123:ISDN Se2/1:15 Q921f:PBXa TX -> 0x440303 17:24:52.123:ISDN Se2/1:15 Q921:PBXa TX -> UI(R) dlci=1 cntl=UI nbit=0 17:24:52.123:ISDN Q921d:isdn_l2d_srq_process:event_count 1 17:24:52.127:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 17:24:52.127:ISDN Se2/1:15 Q921f:PBXa RX <0x440303052A34232A35302A3434343030 17:24:52.127: 303031232A31382A33312A33312A3331 17:24:52.127: 23 17:24:52.127:ISDN Se2/1:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=0 i=0x052A34232A35302A3434343030303031232A31382A33312A33312A333123 17:24:52.127:ISDN Se2/1:15 Q921d:process_rxdata:Frame sent to L2 17:24:52.127:ISDN Q921d:isdn_from_driver_process:event_count 1 17:24:52.131:ISDN Se2/1:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 17:24:52.131:ISDN Se2/1:15 Q921d:s_dpnss_information_transfer:event x2 chan 1 17:24:52.131:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x200 event x3 v_bit 1 chan 1 out_pkt x63F19D14 17:24:52.131:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 17:24:52.131:ISDN Se2/1:15 Q921f:PBXa TX -> 0x440303 17:24:52.131:ISDN Se2/1:15 Q921:PBXa TX -> UI(R) dlci=1 cntl=UI nbit=0 17:24:52.131:ISDN Q921d:isdn_l2d_srq_process:event_count 1 17:24:52.159:ISDN Se2/0:15 Q921d:dpnss_l2_main:source_id x4 event x240 v_bit x0 chan x2 17:24:52.159:ISDN Se2/0:15 Q921d:s_dpnss_information_transfer:event x240 chan 1 17:24:52.159:ISDN Se2/0:15 Q921d:dpnss_l2_mail:dest x200 event x2 v_bit 1 chan 1 out_pkt x63F19CC8 17:24:52.159:ISDN Se2/0:15 LIFd:LIF_StartTimer:timer (0x63A4AFBC), ticks (500), event (0x1201) 17:24:52.159:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 17:24:52.159:ISDN Se2/0:15 Q921f:PBXa TX -> 0x460303052A35302A3434343030303031 17:24:52.159: 23 17:24:52.159:ISDN Se2/0:15 Q921:PBXa TX -> UI(C) dlci=1 cntl=UI nbit=0 i=0x052A35302A343434303030303123 17:24:52.159:ISDN Q921d:isdn_l2d_srq_process:event_count 1 17:24:52.179:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 17:24:52.179:ISDN Se2/0:15 Q921f:PBXa RX <- 0x460303 17:24:52.179:ISDN Se2/0:15 Q921:PBXa RX <- UI(R) dlci=1 cntl=UI nbit=0 17:24:52.179:ISDN Se2/0:15 Q921d:process_rxdata:Frame sent to L2 17:24:52.183:ISDN Q921d:isdn_from_driver_process:event_count 1 17:24:52.183:ISDN Se2/0:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 17:24:52.183:ISDN Se2/0:15 Q921d:s_dpnss_information_transfer:event x3 chan 1 17:25:31.811:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 17:25:31.811:ISDN Se2/0:15 Q921f:PBXa RX <- 0x4403130830 17:25:31.811:ISDN Se2/0:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=1 i=0x0830 17:25:31.811:ISDN Se2/0:15 Q921d:process_rxdata:Frame sent to L2 17:25:31.811:ISDN Q921d:isdn_from_driver_process:event_count 1 17:25:31.811:ISDN Se2/0:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 17:25:31.811:ISDN Se2/0:15 Q921d:s_dpnss_information_transfer:event x2 chan 1 17:25:31.811:ISDN Se2/0:15 Q921d:dpnss_l2_mail:dest x300 event x241
DB-1474
December 2010
Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan
v_bit 1 chan 1 out_pkt x63F1806C 8 17:25:31.811:ISDN Se2/0:15 Q921d:dpnss_l2_mail:dest x200 event x3 v_bit 1 chan 1 out_pkt x636710B8 8 17:25:31.815:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 8 17:25:31.815:ISDN Se2/0:15 Q921f:PBXa TX -> 0x440313 8 17:25:31.815:ISDN Se2/0:15 Q921:PBXa TX -> UI(R) dlci=1 cntl=UI nbit=1 8 17:25:31.815:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:25:31.819:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:25:31.819:ISDN Se2/0:15 Q921f:PBXa RX <- 0x4403130830 8 17:25:31.819:ISDN Se2/0:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=1 i=0x0830 8 17:25:31.819:ISDN Se2/0:15 Q921d:process_rxdata:Frame sent to L2 8 17:25:31.819:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:25:31.823:ISDN Se2/0:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:25:31.823:ISDN Se2/0:15 Q921d:s_dpnss_information_transfer:event x2 chan 1 8 17:25:31.823:ISDN Se2/0:15 Q921d:dpnss_l2_mail:dest x200 event x3 v_bit 1 chan 1 out_pkt x63F19CC8 8 17:25:31.823:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 8 17:25:31.823:ISDN Se2/0:15 Q921f:PBXa TX -> 0x440313 8 17:25:31.823:ISDN Se2/0:15 Q921:PBXa TX -> UI(R) dlci=1 cntl=UI nbit=1 8 17:25:31.823:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:25:31.831:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:25:31.831:ISDN Se2/0:15 Q921f:PBXa RX <- 0x4403130830 8 17:25:31.831:ISDN Se2/0:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=1 i=0x0830 8 17:25:31.831:ISDN Se2/0:15 Q921d:process_rxdata:Frame sent to L2 8 17:25:31.831:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:25:31.831:ISDN Se2/0:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:25:31.831:ISDN Se2/0:15 Q921d:s_dpnss_information_transfer:event x2 chan 1 8 17:25:31.831:ISDN Se2/0:15 Q921d:dpnss_l2_mail:dest x200 event x3 v_bit 1 chan 1 out_pkt x636710B8 8 17:25:31.835:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 8 17:25:31.835:ISDN Se2/0:15 Q921f:PBXa TX -> 0x440313 8 17:25:31.835:ISDN Se2/0:15 Q921:PBXa TX -> UI(R) dlci=1 cntl=UI nbit=1 8 17:25:31.835:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:25:31.851:ISDN Se2/1:15 Q921d:dpnss_l2_main:source_id x4 event x240 v_bit x0 chan x2 8 17:25:31.851:ISDN Se2/1:15 Q921d:s_dpnss_information_transfer:event x240 chan 1 8 17:25:31.851:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x200 event x2 v_bit 1 chan 1 out_pkt x63F1806C 8 17:25:31.851:ISDN Se2/1:15 LIFd:LIF_StartTimer:timer (0x63E569A8), ticks (500), event (0x1201) 8 17:25:31.851:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 8 17:25:31.855:ISDN Se2/1:15 Q921f:PBXa TX -> 0x4603130830 8 17:25:31.855:ISDN Se2/1:15 Q921:PBXa TX -> UI(C) dlci=1 cntl=UI nbit=1 i=0x0830 8 17:25:31.855:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:25:31.875:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:25:31.875:ISDN Se2/1:15 Q921f:PBXa RX <- 0x460313 8 17:25:31.875:ISDN Se2/1:15 Q921:PBXa RX <- UI(R) dlci=1 cntl=UI nbit=1 8 17:25:31.875:ISDN Se2/1:15 Q921d:process_rxdata:Frame sent to L2 8 17:25:31.875:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:25:31.875:ISDN Se2/1:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:25:31.875:ISDN Se2/1:15 Q921d:s_dpnss_information_transfer:event x3 chan 1 8 17:25:31.879:ISDN Se2/0:15 Q921d:dpnss_l2_main:source_id x4 event x240 v_bit x0 chan x2 8 17:25:31.879:ISDN Se2/0:15 Q921d:s_dpnss_information_transfer:event
DB-1475
Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan
x240 chan 1 8 17:25:31.879:ISDN Se2/0:15 Q921d:dpnss_l2_mail:dest x200 event x2 v_bit 1 chan 1 out_pkt x63EFC5AC 8 17:25:31.879:ISDN Se2/0:15 LIFd:LIF_StartTimer:timer (0x63A4AFBC), ticks (500), event (0x1201) 8 17:25:31.879:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 8 17:25:31.879:ISDN Se2/0:15 Q921f:PBXa TX -> 0x4603130830 8 17:25:31.879:ISDN Se2/0:15 Q921:PBXa TX -> UI(C) dlci=1 cntl=UI nbit=1 i=0x0830 8 17:25:31.883:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:25:31.899:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:25:31.899:ISDN Se2/0:15 Q921f:PBXa RX <- 0x460313 8 17:25:31.899:ISDN Se2/0:15 Q921:PBXa RX <- UI(R) dlci=1 cntl=UI nbit=1 8 17:25:31.899:ISDN Se2/0:15 Q921d:process_rxdata:Frame sent to L2 8 17:25:31.899:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:25:31.903:ISDN Se2/0:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:25:31.903:ISDN Se2/0:15 Q921d:s_dpnss_information_transfer:event x3 chan 1 8 17:25:32.063:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:25:32.063:ISDN Se2/1:15 Q921f:PBXa RX <- 0x4403130830 8 17:25:32.063:ISDN Se2/1:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=1 i=0x0830 8 17:25:32.063:ISDN Se2/1:15 Q921d:process_rxdata:Frame sent to L2 8 17:25:32.063:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:25:32.067:ISDN Se2/1:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:25:32.067:ISDN Se2/1:15 Q921d:s_dpnss_information_transfer:event x2 chan 1 8 17:25:32.067:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x300 event x241 v_bit 1 chan 1 out_pkt x63EFC5AC 8 17:25:32.067:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x200 event x3 v_bit 1 chan 1 out_pkt x6367175C 8 17:25:32.067:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 8 17:25:32.067:ISDN Se2/1:15 Q921f:PBXa TX -> 0x440313 8 17:25:32.067:ISDN Se2/1:15 Q921:PBXa TX -> UI(R) dlci=1 cntl=UI nbit=1 8 17:25:32.067:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:25:32.075:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:25:32.075:ISDN Se2/1:15 Q921f:PBXa RX <- 0x4403130830 8 17:25:32.075:ISDN Se2/1:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=1 i=0x0830 8 17:25:32.075:ISDN Se2/1:15 Q921d:process_rxdata:Frame sent to L2 8 17:25:32.075:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:25:32.075:ISDN Se2/1:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:25:32.075:ISDN Se2/1:15 Q921d:s_dpnss_information_transfer:event x2 chan 1 8 17:25:32.075:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x200 event x3 v_bit 1 chan 1 out_pkt x6367175C 8 17:25:32.075:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 8 17:25:32.075:ISDN Se2/1:15 Q921f:PBXa TX -> 0x440313 8 17:25:32.079:ISDN Se2/1:15 Q921:PBXa TX -> UI(R) dlci=1 cntl=UI nbit=1 8 17:25:32.079:ISDN Q921d:isdn_l2d_srq_process:event_count 1 8 17:25:32.083:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:25:32.083:ISDN Se2/1:15 Q921f:PBXa RX <- 0x4403130830 8 17:25:32.083:ISDN Se2/1:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=1 i=0x0830 8 17:25:32.083:ISDN Se2/1:15 Q921d:process_rxdata:Frame sent to L2 8 17:25:32.083:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:25:32.087:ISDN Se2/1:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:25:32.087:ISDN Se2/1:15 Q921d:s_dpnss_information_transfer:event x2 chan 1 8 17:25:32.087:ISDN Se2/1:15 Q921d:dpnss_l2_mail:dest x200 event x3
DB-1476
December 2010
8 8 8 8
v_bit 1 chan 1 out_pkt x6367175C 17:25:32.087:ISDN Q921d:isdn_l2d_srq_process:QUEUE_EVENT 17:25:32.087:ISDN Se2/1:15 Q921f:PBXa TX -> 0x440313 17:25:32.087:ISDN Se2/1:15 Q921:PBXa TX -> UI(R) dlci=1 cntl=UI nbit=1 17:25:32.087:ISDN Q921d:isdn_l2d_srq_process:event_count 1
The following output shows details of the preceding debugging events. The first two octets (0x4403) form the address field, while the third octet (0x03) is the control field. All the octets starting from the fourth constitute DPNSS L3 information, which needs to be backhauled to the Cisco PGW2200.
Jan Jan Jan 8 17:24:43.495:ISDN Q921d:isdn_from_driver_process:QUEUE_EVENT 8 17:24:43.495:ISDN Se2/0:15 Q921f:PBXa RX <- 0x44030300102A34232A35302A33333330 8 17:24:43.495: 30303031233434343030303031
All of the octets following i= constitute DPNSS L3 information received from the peer:
Jan 8 17:24:43.495:ISDN Se2/0:15 Q921:PBXa RX <- UI(C) dlci=1 cntl=UI nbit=0 i=0x00102A34232A35302A3333333030303031233434343030303031
In the INFORMATION TRANSFER state, DLC 1 received a UI(C) frame (event x2) from the peer carrying DPNSS L3 information:
Jan Jan Jan Jan 8 17:24:43.495:ISDN Se2/0:15 Q921d:process_rxdata:Frame sent to L2 8 17:24:43.495:ISDN Q921d:isdn_from_driver_process:event_count 1 8 17:24:43.495:ISDN Se2/0:15 Q921d:dpnss_l2_main:source_id x200 event x141 v_bit x0 chan x0 8 17:24:43.495:ISDN Se2/0:15 Q921d:s_dpnss_information_transfer:event x2 chan 1
For DLC 1, event information is sent to L3 (IUA BACKHAUL, indicated by dest x300). In this case, DL_DATA_IND (event x241) indicates that some L3 information has been received from the peer.
Jan 8 17:24:43.495:ISDN Se2/0:15 Q921d:dpnss_l2_mail:dest x300 event x241 v_bit 1 chan 1 out_pkt x6367175C
Information is sent to the driver (dest x200), which is then sent to the peer): An Unnumbered InformationResponse [UI(R)] (event x3) acknowledges the received Unnumbered InformationCommand [UI(C)].
Jan 8 17:24:43.495:ISDN Se2/0:15 Q921d:dpnss_l2_mail:dest x200 event x3 v_bit 1 chan 1 out_pkt x63F183D4
The following is sample output from the debug isdn q921 command for an outgoing call:
Router# debug isdn q921 Jan 3 14:52:24.475: ISDN BR0: TX -> INFOc sapi = 0 tei = 64 ns = 5 nr = i = 0x08010705040288901801837006803631383835 Jan 3 14:52:24.503: ISDN BR0: RX <- RRr sapi = 0 tei = 64 nr = 6 Jan 3 14:52:24.527: ISDN BR0: RX <- INFOc sapi = 0 tei = 64 ns = 2 nr = i = 0x08018702180189 Jan 3 14:52:24.535: ISDN BR0: TX -> RRr sapi = 0 tei = 64 nr = 3 Jan 3 14:52:24.643: ISDN BR0: RX <- INFOc sapi = 0 tei = 64 ns = 3 nr = i = 0x08018707 Jan 3 14:52:24.655: ISDN BR0: TX -> RRr sapi = 0 tei = 64 nr = 4 %LINK-3-UPDOWN: Interface BRI0:1, changed state to up Jan 3 14:52:24.683: ISDN BR0: TX -> INFOc sapi = 0 tei = 64 ns = 6 nr = i = 0x0801070F Jan 3 14:52:24.699: ISDN BR0: RX <- RRr sapi = 0 tei = 64 nr = 7 %LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0:1, changed state to up %ISDN-6-CONNECT: Interface BRI0:1 is now connected to 61885 goodie Jan 3 14:52:34.415: ISDN BR0: RX <- RRp sapi = 0 tei = 64 nr = 7 Jan 3 14:52:34.419: ISDN BR0: TX -> RRf sapi = 0 tei = 64 nr = 4 2
DB-1477
In the following lines, the seventh and eighth most significant hexadecimal numbers indicate the type of message. 0x05 indicates a Call Setup message, 0x02 indicates a Call Proceeding message, 0x07 indicates a Call Connect message, and 0x0F indicates a Connect Ack message.
Jan Jan Jan Jan 3 14:52:24.475: ISDN BR0: TX i = 3 14:52:24.527: ISDN BR0: RX i = 3 14:52:24.643: ISDN BR0: RX i = 3 14:52:24.683: ISDN BR0: TX i = -> INFOc sapi = 0 tei = 64 ns = 5 nr 0x08010705040288901801837006803631383835 <- INFOc sapi = 0 tei = 64 ns = 2 nr 0x08018702180189 <- INFOc sapi = 0 tei = 64 ns = 3 nr 0x08018707 -> INFOc sapi = 0 tei = 64 ns = 6 nr 0x0801070F = 2 = 6 = 6 = 4
The following is sample output from the debug isdn q921 command for a startup message on a DMS-100 switch:
Router# debug isdn q921 Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan 3 3 3 3 3 3 3 3 14:47:28.455: 14:47:30.171: 14:47:30.219: 14:47:30.223: 14:47:30.227: 14:47:30.235: 14:47:30.239: 14:47:30.247: ISDN ISDN ISDN ISDN ISDN ISDN ISDN ISDN BR0: BR0: BR0: BR0: BR0: BR0: BR0: BR0: RX TX RX TX RX TX RX TX i = BR0: RX BR0: TX i = BR0: RX BR0: RX BR0: TX BR0: TX <- IDCKRQ ri = 0 ai = 127 0 -> IDREQ ri = 31815 ai = 127 <- IDASSN ri = 31815 ai = 64 -> SABMEp sapi = 0 tei = 64 <- IDCKRQ ri = 0 ai = 127 -> IDCKRP ri = 16568 ai = 64 <- UAf sapi = 0 tei = 64 -> INFOc sapi = 0 tei = 64 ns = 0 0x08007B3A03313233 <- RRr sapi = 0 tei = 64 nr = 1 -> INFOc sapi = 0 tei = 64 ns = 1 0x08007B3A03313233 <- RRr sapi = 0 tei = 64 nr = 2 <- RRp sapi = 0 tei = 64 nr = 2 -> RRf sapi = 0 tei = 64 nr = 0 -> RRp sapi = 0 tei = 64 nr = 0
nr = 0
3 14:47:30.267: ISDN 3 14:47:34.243: ISDN 3 3 3 3 14:47:34.267: 14:47:43.815: 14:47:43.819: 14:47:53.819: ISDN ISDN ISDN ISDN
nr = 0
The first seven lines of this example indicate a Layer 2 link establishment. The following lines indicate the message exchanges between the data link layer entity on the local router (user side) and the assignment source point (ASP) on the network side during the TEI assignment procedure. This assumes that the link is down and no TEI currently exists.
Jan Jan 3 14:47:30.171: ISDN BR0: TX -> 3 14:47:30.219: ISDN BR0: RX <IDREQ ri = 31815 ai = 127 IDASSN ri = 31815 ai = 64
At 14:47:30.171, the local router data link layer entity sent an Identity Request message to the network data link layer entity to request a TEI value that can be used in subsequent communication between the peer data link layer entities. The request includes a randomly generated reference number (31815) to differentiate among user devices that request automatic TEI assignment and an action indicator of 127 to indicate that the ASP can assign any TEI value available. The ISDN user interface on the router uses automatic TEI assignment. At 14:47:30.219, the network data link entity responds to the Identity Request message with an Identity Assigned message. The response includes the reference number (31815) previously sent in the request and TEI value (64) assigned by the ASP. The following lines indicate the message exchanges between the layer management entity on the network and the layer management entity on the local router (user side) during the TEI check procedure:
Jan Jan 3 14:47:30.227: ISDN BR0: RX <3 14:47:30.235: ISDN BR0: TX -> IDCKRQ IDCKRP ri = 0 ai = 127 ri = 16568 ai = 64
DB-1478
December 2010
At 14:47:30.227, the layer management entity on the network sends the Identity Check Request message to the layer management entity on the local router to check whether a TEI is in use. The message includes a reference number that is always 0 and the TEI value to check. In this case, an ai value of 127 indicates that all TEI values should be checked. At 14:47:30.227, the layer management entity on the local router responds with an Identity Check Response message indicating that TEI value 64 is currently in use. The following lines indicate the messages exchanged between the data link layer entity on the local router (user side) and the data link layer on the network side to place the network side into modulo 128 multiple frame acknowledged operation. Note that the data link layer entity on the network side also can initiate the exchange.
Jan Jan 3 14:47:30.223: ISDN BR0: TX -> 3 14:47:30.239: ISDN BR0: RX <SABMEp sapi = 0 tei = 64 UAf sapi = 0 tei = 64
At 14:47:30.223, the data link layer entity on the local router sends the SABME command with a SAPI of 0 (call control procedure) for TEI 64. At 14:47:30.239, the first opportunity, the data link layer entity on the network responds with a UA response. This response indicates acceptance of the command. The data link layer entity sending the SABME command may need to send it more than once before receiving a UA response. The following lines indicate the status of the data link layer entities. Both are ready to receive I frames.
Jan Jan 3 14:47:43.815: ISDN BR0: RX <3 14:47:43.819: ISDN BR0: TX -> RRp sapi = 0 RRf sapi = 0 tei = 64 nr = 2 tei = 64 nr = 0
These I-frames are typically exchanged every 10 seconds (T203 timer). The following is sample output from the debug isdn q921 command for an incoming call. It is an incoming SETUP message that assumes that the Layer 2 link is already established to the other side.
Router# debug isdn q921 Jan Jan Jan Jan Jan Jan Jan 3 3 3 3 3 3 3 14:49:22.507: 14:49:22.523: 14:49:32.527: 14:49:32.543: 14:49:42.067: 14:49:42.071: 14:49:47.307: ISDN ISDN ISDN ISDN ISDN ISDN ISDN BR0: BR0: BR0: BR0: BR0: BR0: BR0: TX -> RRp sapi = 0 tei = 64 nr = 0 RX <- RRf sapi = 0 tei = 64 nr = 2 TX -> RRp sapi = 0 tei = 64 nr = 0 RX <- RRf sapi = 0 tei = 64 nr = 2 RX <- RRp sapi = 0 tei = 64 nr = 2 TX -> RRf sapi = 0 tei = 64 nr = 0 RX <- UI sapi = 0 tei = 127 i = 0x08011F05040288901801897006C13631383836 BRI0:1, changed state to up BR0: TX -> INFOc sapi = 0 tei = 64 ns = 2 nr = 0 i = 0x08019F07180189 BR0: RX <- RRr sapi = 0 tei = 64 nr = 3 BR0: RX <- INFOc sapi = 0 tei = 64 ns = 0 nr = 3 i = 0x08011F0F180189 BR0: TX -> RRr sapi = 0 tei = 64 nr = 1 protocol on Interface BRI0:1, changed state to up
%LINK-3-UPDOWN: Interface Jan 3 14:49:47.347: ISDN Jan Jan 3 14:49:47.367: ISDN 3 14:49:47.383: ISDN
DB-1479
Description Indicates the date and time at which the frame was sent from or received by the data link layer entity on the router. The time is maintained by an internal clock. Indicates that this frame is being sent from the ISDN interface on the local router (user side). Indicates that this frame is being received by the ISDN interface on the local router from the peer (network side). Indicates the Identity Request message type sent from the local router to the network (ASP) during the automatic TEI assignment procedure. This message is sent in a UI command frame. The SAPI value for this message type is always 63 (indicating that it is a Layer 2 management procedure) but it is not displayed. The TEI value for this message type is 127 (indicating that it is a broadcast operation). Indicates the Reference number used to differentiate between user devices requesting TEI assignment. This value is a randomly generated number from 0 to 65535. The same ri value sent in the IDREQ message should be returned in the corresponding IDASSN message. Note that a Reference number of 0 indicates that the message is sent from the network side management layer entity and a reference number has not been generated. Indicates the Action indicator used to request that the ASP assign any TEI value. It is always 127 for the broadcast TEI. Note that in some message types, such as IDREM, a specific TEI value is indicated. Indicates the Identity Remove message type sent from the ASP to the user side layer management entity during the TEI removal procedure. This message is sent in a UI command frame. The message includes a reference number that is always 0, because it is not responding to a request from the local router. The ASP sends the Identity Remove message twice to avoid message loss. Indicates the Identity Assigned message type sent from the ISDN service provider on the network to the local router during the automatic TEI assignment procedure. This message is sent in a UI command frame. The SAPI value for this message type is always 63 (indicating that it is a Layer 2 management procedure). The TEI value for this message type is 127 (indicating it is a broadcast operation). Indicates the TEI value automatically assigned by the ASP. This TEI value is used by data link layer entities on the local router in subsequent communication with the network. The valid values are in the range from 64 to 126.
TX RX IDREQ
ri = 31815
ai = 127
IDREM
IDASSN
ai = 64
DB-1480
December 2010
Table 201
Field SABME
Description Indicates the set asynchronous balanced mode extended command. This command places the recipient into modulo 128 multiple frame acknowledged operation. This command also indicates that all exception conditions have been cleared. The SABME command is sent once a second for N200 times (typically three times) until its acceptance is confirmed with a UA response. For a list and brief description of other commands and responses that can be exchanged between the data link layer entities on the local router and the network, see ITU-T Recommendation Q.921. Identifies the service access point at which the data link layer entity provides services to Layer 3 or to the management layer. A SAPI with the value 0 indicates it is a call control procedure. Note that the Layer 2 management procedures such as TEI assignment, TEI removal, and TEI checking, which are tracked with the debug isdn q921 command, do not display the corresponding SAPI value; it is implicit. If the SAPI value were displayed, it would be 63. Indicates the TEI value automatically assigned by the ASP. This TEI value will be used by data link layer entities on the local router in subsequent communication with the network. The valid values are in the range from 64 to 126. Indicates the Identity Check Request message type sent from the ISDN service provider on the network to the local router during the TEI check procedure. This message is sent in a UI command frame. The ri field is always 0. The ai field for this message contains either a specific TEI value for the local router to check or 127, which indicates that the local router should check all TEI values. For a list and brief description of other message types that can be exchanged between the local router and the ISDN service provider on the network, see Appendix B, ISDN Switch Types, Codes, and Values. Indicates the Identity Check Response message type sent from the local router to the ISDN service provider on the network during the TEI check procedure. This message is sent in a UI command frame in response to the IDCKRQ message. The ri field is a randomly generated number from 0 to 65535. The ai field for this message contains the specific TEI value that has been checked. Confirms that the network side has accepted the SABME command previously sent by the local router. The final bit is set to 1. Indicates that this is an Information command. It is used to transfer sequentially numbered frames containing information fields that are provided by Layer 3. The information is transferred across a data-link connection. Indicates the information fields provided by Layer 3. The information is sent one frame at a time. If multiple frames need to be sent, several Information commands are sent. The pd value is the protocol discriminator. The value 8 indicates it is call control information. The call reference number is always null for SPID information.
sapi = 0
tei = 64
IDCKRQ
IDCKRP
UAf INFOc
DB-1481
Table 201
Field
Description
SPID information i = Indicates the SPID. The local router sends this information to the ISDN 0x343135393033383336363 switch to indicate the services to which it subscribes. SPIDs are 031 assigned by the service provider and are usually 10-digit telephone numbers followed by optional numbers. Currently, only the DMS-100 switch supports SPIDs, one for each B channel. If SPID information is sent to a switch type other than DMS-100, an error may be displayed in the debug information. ns = 0 nr = 0 Indicates the send sequence number of sent I frames. Indicates the expected send sequence number of the next received I frame. At time of transmission, this value should be equal to the value of ns. The value of nr is used to determine whether frames need to be re-sent for recovery. Indicates the Receive Ready response for unacknowledged information transfer. The RRr is a response to an INFOc. Indicates the Receive Ready command with the poll bit set. The data link layer entity on the user side uses the poll bit in the frame to solicit a response from the peer on the network side. Indicates the Receive Ready response with the final bit set. The data link layer entity on the network side uses the final bit in the frame to indicate a response to the poll. Indicates the service access point identifier. The SAPI is the point at which data link services are provided to a network layer or management entity. Currently, this field can have the value 0 (for call control procedure) or 63 (for Layer 2 management procedures). Indicates the terminal endpoint identifier (TEI) that has been assigned automatically by the assignment source point (ASP) (also called the layer management entity on the network side). The valid range is from 64 to 126. The value 127 indicates a broadcast.
RRr RRp
RRf
sapi
tei
Related Commands
Description Displays ISDN events occurring on the user side (on the router) of the ISDN interface. Displays information about call setup and teardown of ISDN network connections (Layer 3) between the local router (user side) and the network. Includes the time with each debug message.
DB-1482
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification The debug isdn command was introduced. This command was enhanced to display the contents of the Facility Information Element (IE) in textual format. This command was enhanced to display reports about SAPI 0 procedures that accept X.25 calls on the BRI D channel. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The ISDN network layer interface provided by the router conforms to the user interface specification defined by ITU-T recommendation Q.931, supplemented by other specifications such as for switch type VN4. The router tracks only activities that occur on the user side, not the network side, of the network connection. The display information debug isdn q931 command output is limited to commands and responses exchanged during peer-to-peer communication carried over the D channel. This debug information does not include data sent over the B channels, which are also part of the routers ISDN interface. The peers (network layers) communicate with each other via an ISDN switch over the D channel. A router can be the calling or the called party of the ISDN Q.931 network connection call setup and teardown procedures. If the router is the calling party, the command displays information about an outgoing call. If the router is the called party, the command displays information about an incoming call. This command decodes parameters of the Facility IE and displays them as text, along with parameter values as they are applicable and as they are relevant to the operation. In addition, the ASN.1 encoded Notification structure of the Notification-Indicator IE is also decoded. You can use the debug isdn q931 command with the debug isdn event and the debug isdn q921 commands at the same time. The displays will be intermingled. Use the service timestamps debug datetime msec global configuration command to include the time with each message.
DB-1483
Examples
The following is sample output from the debug isdn q931 command of a call setup procedure for an outgoing call:
Router# debug isdn q931 TX -> SETUP pd = 8 callref = 0x04 Bearer Capability i = 0x8890 Channel ID i = 0x83 Called Party Number i = 0x80, 415555121202 RX <- CALL_PROC pd = 8 callref = 0x84 Channel ID i = 0x89 RX <- CONNECT pd = 8 callref = 0x84 TX -> CONNECT_ACK pd = 8 callref = 0x04.... Success rate is 0 percent (0/5)
The following is sample output from the debug isdn q931 command of a call setup procedure for an incoming call:
Router# debug isdn q931 RX <- SETUP pd = 8 callref = 0x06 Bearer Capability i = 0x8890 Channel ID i = 0x89 Calling Party Number i = 0x0083, 81012345678902 TX -> CONNECT pd = 8 callref = 0x86 RX <- CONNECT_ACK pd = 8 callref = 0x06
The following is sample output from the debug isdn q931 command that shows the contents of the Facility IE. The following example uses the supplementary service Malicious Call Identification (MCID). In this service, the router sends out the Facility IE.
Router# debug isdn q931 Sep 20 04:09:38.335 UTC: ISDN Se7/1:23 Q931: TX -> DISCONNECT pd = 8 Cause i = 0x8290 - Normal call clearing Facility i = 0x91A106020107020103 Protocol Profile = Remote Operations Protocol 0xA106020107020103 Component = Invoke component Invoke Id = 7 <MCID> Operation = MCIDRequest callref = 0x0007
The following is sample output from the debug isdn q931 command of a call teardown procedure from the network:
Router# debug isdn q931 RX <- DISCONNECT pd = 8 callref = 0x84 Cause i = 0x8790 Looking Shift to Codeset 6 Codeset 6 IE 0x1 1 0x82 10 TX -> RELEASE pd = 8 callref = 0x04 Cause i = 0x8090 RX <- RELEASE_COMP pd = 8 callref = 0x84
Table 202 describes the significant fields shown in the displays, in alphabetical order.
DB-1484
December 2010
Table 202
Description Indicates the requested bearer service to be provided by the network. Indicates the CALL PROCEEDING message; the requested call setup has begun and no more call setup information will be accepted. Identifies the called party. This field is present only in outgoing SETUP messages. Note that it can be replaced by the Keypad facility field. This field uses the IA5 character set. Identifies the origin of the call. This field is present only in incoming SETUP messages. This field uses the IA5 character set. Indicates the call reference number in hexadecimal notation. The value of this field indicates the number of calls made from either the router (outgoing calls) or the network (incoming calls). Note that the originator of the SETUP message sets the high-order bit of the call reference number to 0. The destination of the connection sets the high-order bit to 1 in subsequent call control messages, such as the CONNECT message. For example, callref = 0x04 in the request becomes callref = 0x84 in the response. Indicates the cause of the disconnect. Indicates the channel identifier. The value 83 indicates any channel, 89 indicates the B1 channel, and 8A indicates the B2 channel. For more information about the channel identifier, refer to ITU-T Recommendation Q.931.
Cause Channel ID
Codeset 6 IE 0x1 i = 0x82, Indicates charging information. This information is specific to the NTT 10 switch type and may not be sent by other switch types. CONNECT CONNECT_ACK DISCONNECT Indicates that the called user has accepted the call. Indicates that the calling user acknowledges the called users acceptance of the call. Indicates either that the user side has requested the network to clear an end-to-end connection or that the network has cleared the end-to-end connection. Indicates the information element identifier. The value depends on the field it is associated with. Refer to the ITU-T Q.931 specification for details about the possible values associated with each field for which this identifier is relevant.
i=
Looking Shift to Codeset 6 Indicates that the next information elements will be interpreted according to information element identifiers assigned in codeset 6. Codeset 6 means that the information elements are specific to the local network. pd Indicates the protocol discriminator. The protocol discriminator distinguishes messages for call control over the user-network ISDN interface from other ITU-T-defined messages, including other Q.931 messages. The protocol discriminator is 8 for call control messages such as SETUP. For basic-1tr6, the protocol discriminator is 65.
DB-1485
Table 202
Description Remote operations protocol, which contains networking extensions for other services. This profile determines which protocol should be used to decode the rest of a Facility IE message. A Facility IE can contain multiple components. Each component displays a hexadecimal code followed by the code contents in text. In the example that included encoded ISDN Facility IE message output, 0xA106020107020103 is the hexadecimal code and represents the Facility IE Component, Invoke Id, and Operation. The Operation portion of the IE corresponds to the supplementary service that the component represents.
RELEASE
Indicates that the sending equipment will release the channel and call reference. The recipient of this message should prepare to release the call reference and channel. Indicates that the sending equipment has received a RELEASE message and has now released the call reference and channel. Indicates that this message is being received by the user side of the ISDN interface from the network side. Indicates that the SETUP message type has been sent to initiate call establishment between peer network layers. This message can be sent from either the local router or the network. Indicates that this message is being sent from the local router (user side) to the network side of the ISDN interface.
RELEASE_COMP RX <SETUP
TX ->
For purpose of example, bold text in the following example indicates the acceptance of an incoming X.25 call on the ISDN D channel, per ITU Q.931 SAPI value 0 procedures:
Router# debug isdn q931 *Sep 28 12:34:29.739: ISDN BR1/1 Q931: RX <- SETUP pd = 8 callref = 0x5C (re-assembled) Bearer Capability i = 0x88C0C2E6 Standard = CCITT Transfer Capability = Unrestricted Digital Transfer Mode = Packet Transfer Rate = Packet - not specified User Info L2 Protocol = Recommendation Q921/I.441 User Info L3 Protocol = Recommendation X.25, Packet Layer Channel ID i = 0x8C Exclusive, No B-channel Information Rate i = 0x8888 Packet Layer Binary Params i = 0x80 Packet Layer Window Size i = 0x8282 Packet Size i = 0x8888 Calling Party Number i = 0x0083, '144014384106' Plan:Unknown, Type:Unknown User-User i = 0x02CC000000
The command output is intermingled with information from the debug isdn events command; see the description for the debug isdn events command to understand significant fields displayed in this report.
DB-1486
December 2010
Related Commands
Description Displays ISDN events occurring on the router (user side) of the ISDN interface. Displays Layer 2 access procedures that are taking place at the router on the D channel of its ISDN interface. Configure a time-stamp on debugging or system logging messages.
DB-1487
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Disable console logging and use buffered logging before using the debug isdn tgrm command. Using the debug isdn tgrm command generates a large volume of debugs, which can affect router performance.
Examples
Sample output from the debug isdn tgrm command is shown below. The output shows that the channel used (bchan) is 1, service state is 0 (in-service), call_state is 2 (busy), false busy is 0, and DSL is 2. The output also shows that the B channel is 1, the channel is available, and the call state is transitioned from 0 (idle) to 2 (busy). The last two lines of output shows that bchan is 1, call state is 1 (busy), call type is 2 (voice), and call direction is 1 (incoming).
00:26:31:ISDN:get_tgrm_avail_state:idb 0x64229380 bchan 1 service_state 0 call_state 2 false busy 0x0 dsl 2 00:26:31:ISDN:update_tgrm_call_status:idb 0x64229380 bchan 1 availability state 1 call state(prev,new) (0,2), dsl 2 00:26:31:ISDN:Calling TGRM with tgrm_call_isdn_update:idb 0x64229380 bchan 1 call state 1 call type 2 call dir 1
Table 203 provides an alphabetical listing of the fields shown in the debug isdn tgrm command output and a description of each field.
DB-1488
December 2010
Table 203
Bearer channel used for this call. Direction of the call: 0 = Incoming 1 = Outgoing
call_state
State of the call. It has different values depending on whether it is from ISDN perspective or TGRM perspective. When printed from get_tgrm_avail_state(), it is the state value from ISDN perspective: 0 = Idle 1 = Negotiate 2 = Busy 3 = Reserved 4 = Restart pending 5 = Maintenance pend 6 = Reassigned When printed from tgrm_call_isdn_update(), it is the state value from TGRM perspective: 0 = Idle 1 = Busy 2 = Pending 3 = Reject
Indicates the state transition of the call. The state values are as shown in call_state from the ISDN perspective. Type of call: 0 = Invalid 1 = Data 2 = Voice 3 = Modem 4 = None
Internal interface identifier. Bit map of all the channels on the interface indicating their soft busy status. Address of the interface descriptor block (IDB) for the interface. Service state: 0 = In-service 1 = Maintenance 2 = Out of service
DB-1489
Related Commands
Command show trunk group translation-profile (voice service POTS) trunk-group (interface)
Description Displays the configuration of the trunk group. Assigns a translation profile to the interface. Assigns a trunk group to the interface.
DB-1490
December 2010
Syntax Description
interface
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug isis adj packets command:
Router# debug isis adj packets ISIS-Adj: ISIS-Adj: ISIS-Adj: ISIS-Adj: ISIS-Adj: ISIS-Adj: ISIS-Adj: Rec L1 IIH from 0000.0c00.40af (Ethernet0), Rec L2 IIH from 0000.0c00.40af (Ethernet0), Rec L1 IIH from 0000.0c00.0c36 (Ethernet1), Area mismatch, level 1 IIH on Ethernet1 Sending L1 IIH on Ethernet1 Sending L2 IIH on Ethernet1 Rec L2 IIH from 0000.0c00.0c36 (Ethernet1), cir type 3, cir id BBBB.BBBB.BBBB.01 cir type 3, cir id BBBB.BBBB.BBBB.01 cir type 3, cir id CCCC.CCCC.CCCC.03
The following line indicates that the router received an IS-IS hello packet (IIH) on Ethernet interface 0 from the Level 1 router (L1) at MAC address 0000.0c00.40af. The circuit type is the interface type:
1Level 1 only; 2Level 2 only; 3Level 1/2
The circuit ID is what the neighbor interprets as the designated router for the interface.
ISIS-Adj: Rec L1 IIH from 0000.0c00.40af (Ethernet0), cir type 3, cir id BBBB.BBBB.BBBB.01
The following line indicates that the router (configured as a Level 1 router) received on Ethernet interface 1 is an IS-IS hello packet from a Level 1 router in another area, thereby declaring an area mismatch:
ISIS-Adj: Area mismatch, level 1 IIH on Ethernet1
The following lines indicates that the router (configured as a Level 1/Level 2 router) sent on Ethernet interface 1 is a Level 1 IS-IS hello packet, and then a Level 2 IS-IS packet:
ISIS-Adj: Sending L1 IIH on Ethernet1 ISIS-Adj: Sending L2 IIH on Ethernet1
DB-1491
Syntax Description
information
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug isis authentication command with the information keyword:
Router# debug isis authentication information 3d03h:ISIS-AuthInfo:No auth TLV found in received packet 3d03h:ISIS-AuthInfo:No auth TLV found in received packet
The sample output indicates that the router has been running for 3 days and 3 hours. Debugging output is about IS-IS authentication information. The local router is configured for authentication, but it received a packet that does not contain authentication data; the remote router does not have authentication configured.
DB-1492
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, information about traffic engineering advertisements is printed in IS-IS LSA messages:
Router# debug isis mpls traffic-eng advertisements System ID:Router1.00 Router ID:10.106.0.6 Link Count:1 Link[1] Neighbor System ID:Router2.00 (P2P link) Interface IP address:10.42.0.6 Neighbor IP Address:10.42.0.10 Admin. Weight:10 Physical BW:155520000 bits/sec Reservable BW:5000000 bits/sec BW unreserved[0]:2000000 bits/sec, BW unreserved[1]:100000 bits/sec BW unreserved[2]:100000 bits/sec, BW unreserved[3]:100000 bits/sec BW unreserved[4]:100000 bits/sec, BW unreserved[5]:100000 bits/sec BW unreserved[6]:100000 bits/sec, BW unreserved[7]:0 bits/sec Affinity Bits:0x00000000
DB-1493
Field System ID Router ID Link Count Neighbor System ID Interface IP address Neighbor IP Address Admin. Weight Physical BW Reservable BW BW unreserved Affinity Bits
Description Identification value for the local system in the area. Multiprotocol Label Switching traffic engineering router ID. Number of links that MPLS traffic engineering advertised. Identification value for the remote system in an area. IPv4 address of the interface. IPv4 address of the neighbor. Administrative weight associated with this link. Bandwidth capacity of the link (in bits per second). Amount of reservable bandwidth on this link. Amount of bandwidth that is available for reservation. Attribute flags of the link that are being flooded.
DB-1494
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, information is printed about traffic engineering-related IS-IS events:
Router# debug isis mpls traffic-eng events ISIS-RRR:Send MPLS TE Et4/0/1 Router1.02 adjacency down:address 0.0.0.0 ISIS-RRR:Found interface address 10.1.0.6 Router1.02, building subtlv... 58 bytes ISIS-RRR:Found interface address 10.42.0.6 Router2.00, building subtlv... 64 bytes ISIS-RRR:Interface address 0.0.0.0 Router1.00 not found, not building subtlv ISIS-RRR:LSP Router1.02 changed from 0x606BCD30 ISIS-RRR:Mark LSP Router1.02 changed because TLV contents different, code 16 ISIS-RRR:Received 1 MPLS TE links flood info for system id Router1.00
DB-1495
Syntax Description
detail
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. Support for the Cisco 7304 router was added. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug isis nsf command to display basic information about the IS-IS state during an NSF restart. Use the debug isis nsf detail command to display additional IS-IS state detail during an NSF restart.
Examples
The following example displays IS-IS state information during an NSF restart:
router# debug isis nsf IS-IS NSF events debugging is on
The following example displays detailed IS-IS state information during an NSF restart:
router# debug isis nsf detail IS-IS NSF events (detailed) debugging is on router# Jan 24 20:04:54.090:%CLNS-5-ADJCHANGE:ISIS:Adjacency to gsr1 (GigabitEthernet2/0/0) Standby adjacency Jan 24 20:04:54.090:ISIS-NSF:ADJ:000C.0000.0000 (Gi2/0/0), type 8/1, cnt 0/1, ht 10 Jan 24 20:04:54.142:ISIS-NSF:Rcv LSP - L2 000B.0000.0000.00-00, seq 251, csum B0DC, 120, len 123 (local) Jan 24 20:04:55.510:ISIS-NSF:Rcv LSP - L1 000B.0000.0000.00-00, seq 23E, csum D20D, 120, len 100 (local) Jan 24 20:04:56.494:ISIS-NSF:ADJ:000C.0000.0000 (Gi2/0/0), type 8/0, cnt 0/1, ht 30
Up, (NEW) ht ht
DB-1496
December 2010
Jan 24 20:04:56.502:ISIS-NSF:Rcv LSP - L1 000B.0000.0000.01-00, seq 21C, csum 413, ht 120, len 58 (local) Jan 24 20:04:58.230:ISIS-NSF:Rcv LSP - L2 000C.0000.0000.00-00, seq 11A, csum E197, ht 1194, len 88 (Gi2/0/0) Jan 24 20:05:00.554:ISIS-NSF:Rcv LSP - L1 000B.0000.0000.00-00, seq 23F, csum 1527, ht 120, len 111 (local)
Related Commands
Description Configures NSF operations for IS-IS. Specifies how long an NSF restart will wait for all interfaces with IS-IS adjacencies to come up before completing the restart. Specifies the minimum time between NSF restart attempts. Specifies the methodology used to determine how long IETF NSF will wait for the LSP database to synchronize before generating overloaded link state information for itself and flooding that information out to its neighbors. Displays both ES and IS neighbors. Displays current state information regarding IS-IS NSF.
DB-1497
Syntax Description
(Optional) Displays debugging information for IS-IS IP Version 4 routes in the global RIB. (Optional) Displays debugging information for IS-IS IP Version 4 routes in the IS-IS local RIB. (Optional) Number of an access list. This is a decimal number from 100 to 199 or from 2000 to 2699. (Optional) Will not display debug information if the IS-IS IP Version 4 IS-IS local RIB has not changed.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(18)SXE. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug isis rib command to verify if an IP prefix has been installed or removed. To monitor updates from the IS-IS database to the IS-IS local RIB, use the local keyword, and to monitor updates from the IS-IS database to the global RIB, use the global keyword. It is highly recommended that you limit the debugging output to information specific to the IP prefix that is associated with a specific access list by entering the accest-list-number argument.
DB-1498
December 2010
Examples
The following is sample output from the debug isis rib command after the ip route priority high command was used to give high priority to IS-IS IP prefixes for the configured access list access-list1. The debug output shows that the route 10.1.1.0/24 has been removed from the IS-IS local RIB.
Router# show running-config| include access-list 1 accest-list 1 permit 10.1.1.0 0.0.0.255 ! access-list 1 is configured Router# debug isis rib local terse 1 00:07:07: ISIS-LR: 10.1.1.0/24 aged out in LSP[10/(7->8)] ! The route 10.1.1.0/24 is removed from the IS-IS local RIB LSP[10/(7->8)]. 00:07:07: ISIS-LR: rem path: [115/80/20] via 10.2.2.2(Et2) from 10.22.22.22 tg 0 LSP[10/7] from active chain (add to deleted chain) !The remote path [115/80/20] is removed from the active chain. 00:07:07: ISIS-LR: Enqueued to updateQ[2] for 10.1.1.0/24 !Q[2] is marked to be the update 00:07:07: ISIS-LR: rem path: [115/80/20] via 10.2.2.2(Et2) from 10.22.22.22 tg 0 LSP[10/7] from deleted chain 00:07:07: ISIS-LR: Rem RT 10.1.1.0/24 !The remote route [115/80/20] is removed from the deleted chain
Field ISIS-LR 10.1.1.0/24 rem path: [115/80/20] via 10.2.2.2(Et2) from 10.22.22.22 tg 0
Description IS-IS local route debugger. IP prefix. Indicates the removal or insertion of a routing pathin this instance, it is a removal. Administrative instance/type/metric for the routing path that has been removed or inserted. IP address of the next hop of the router, in this instance, Ethernet2. IP address to advertise the route path. Priority of the IP prefix. All prefixes have a tag 0 priority unless otherwise configured.
Related Commands
Description Assigns a high priority to an IS-IS IP prefix. Displays paths for routes in the IP Version 4 IS-IS local RIB.
DB-1499
Syntax Description
(Optional) Displays debug information for level 1 redistribution cache. (Optional) Displays debug information for level 2 redistribution cache. (Optional) An access list number from 1 to 199 or from 1300 to 2699.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(7)T. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(18)SXE. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
We recommend that you use this command only when a Cisco Technical Assistance Center representative requests you to do so to gather information for a troubleshooting purpose.
Examples
In the following example, the debug isis rib redistribution command is used to display information about events that update the IS-IS redistribution cache. The output is self-explanatory.
Router# debug isis rib redistribution level-1 123 IS-IS IPv4 redistribution RIB debugging is on for access list 123 for L1 Router# router isis Router(config-router)# redistribute connected level-1 Router(config)# access-list 123 permit ip 10.0.0.0 0.255.255.255 any Router(config)# interface Loopback123 Router(config-if)# ip address 10.123.123.3 255.255.255.255 Nov 25 00:33:46.532: ISIS-RR: 10.123.123.3/32: Up event, from 0x607CAF60 Nov 25 00:33:46.532: ISIS-RR: looking at L1 redist RIB Nov 25 00:33:46.532: ISIS-RR: redistributed to ISIS
DB-1500
December 2010
ISIS-RR:
added
ISIS-RR: Scanning L1 redist RIB ISIS-RR: adv 10.123.123.3/32 as L1 redist route ISIS-RR: End of scanningL1 redist RIB
The following line indicates that the connected route 10.123.123.3/32 was added to the IS-IS level 1 local redistribution cache with cost 0, metric type external, and administrative tag of 0:
Nov 25 00:33:46.532: ISIS-RR: tag 0 external added 10.123.123.3/32 to L1 redist RIB: [Connected/0]
The following line indicates that the redistributed route 10.123.123.3/32 was advertised in an IS-IS link-state packet (LSP) as a level 1 redistributed route:
Nov 25 00:33:47.532: ISIS-RR: adv 10.123.123.3/32 as L1 redist rout
Related Commands
Description Clears some or all prefixes in the local redistribution cache. Displays the prefixes in the IS-IS redistribution cache.
DB-1501
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The Intermediate System-to-Intermediate System (IS-IS) Interdomain Routing Protocol (IDRP) provides routing between ISs by flooding the network with link-state information. IS-IS provides routing at two levels, intra-area (Level 1) and intra-domain (Level 2). Level 1 routing allows Level 1 ISs to communicate with other Level 1 ISs in the same area. Level 2 routing allows Level 2 ISs to build an interdomain backbone between Level 1 areas by traversing only Level 2 ISs. Level 1 ISs only need to know the path to the nearest Level 2 IS in order to take advantage of the interdomain backbone created by the Level 2 ISs. The IS-IS protocol uses the shortest-path first (SPF) routing algorithm to build Level 1 and Level 2 routes. The debug isis spf statistics command provides information for determining the time required to place a Level 1 IS or Level 2 IS on the shortest path tree (SPT) using the IS-IS protocol.
Note
The SPF algorithm is also called the Dijkstra algorithm, after the creator of the algorithm.
Examples
The following is sample output from the debug isis spf statistics command:
Router# debug isis spf statistics ISIS-Stats: ISIS-Stats: ISIS-Stats: ISIS-Stats: Compute L1 SPT, Timestamp 2780.328 seconds Complete L1 SPT, Compute time 0.004, 1 nodes on SPT Compute L2 SPT, Timestamp 2780.3336 seconds Complete L2 SPT, Compute time 0.056, 12 nodes on SPT
Description Indicates that Level 1 ISs are to be added to a Level 1 area. Indicates the time at which the SPF algorithm was applied. The time is expressed as the number of seconds elapsed since the system was up and configured. Indicates that the algorithm has completed for Level 1 routing.
Complete L1 SPT
DB-1502
December 2010
Table 206
Description Indicates the time required to place the ISs on the SPT. Indicates the number of ISs that have been added. Indicates that Level 2 ISs are to be added to the domain. Indicates that the algorithm has completed for Level 2 routing.
The following lines show the statistical information available for Level 1 ISs:
ISIS-Stats: Compute L1 SPT, Timestamp 2780.328 seconds ISIS-Stats: Complete L1 SPT, Compute time 0.004, 1 nodes on SPT
The output indicates that the SPF algorithm was applied 2780.328 seconds after the system was up and configured. Given the existing intra-area topology, 4 milliseconds were required to place one Level 1 IS on the SPT. The following lines show the statistical information available for Level 2 ISs:
ISIS-Stats: Compute L2 SPT, Timestamp 2780.3336 seconds ISIS-Stats: Complete L2 SPT, Compute time 0.056, 12 nodes on SPT
This output indicates that the SPF algorithm was applied 2780.3336 seconds after the system was up and configured. Given the existing intradomain topology, 56 milliseconds were required to place 12 Level 2 ISs on the SPT.
DB-1503
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Support for IPv6 was added. Support for IPv6 was added. Support for IPv6 was added. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command displays information about significant events that occur during SPF-related processing.
Examples
The following example displays significant events during an IS-IS SPF computation:
Router# debug isis spf-events ISIS-Spf: ISIS-Spf: ISIS-Spf: ISIS-Spf: ISIS-Spf: adj 3 ISIS-Spf: ISIS-Spf: ISIS-Spf: ISIS-Spf: ISIS-Spf: ISIS-Spf: ISIS-Spf: ISIS-Spf: Compute L2 IPv6 SPT Move 0000.0000.1111.00-00 to PATHS, metric 0 Add 0000.0000.2222.01-00 to TENT, metric 10 Move 0000.0000.2222.01-00 to PATHS, metric 10 considering adj to 0000.0000.2222 (Ethernet3/1) metric 10, level 2, circuit 3, (accepted) Add 0000.0000.2222.00-00 to TENT, metric 10 Next hop 0000.0000.2222 (Ethernet3/1) Move 0000.0000.2222.00-00 to PATHS, metric 10 Add 0000.0000.2222.02-00 to TENT, metric 20 Next hop 0000.0000.2222 (Ethernet3/1) Move 0000.0000.2222.02-00 to PATHS, metric 20 Add 0000.0000.3333.00-00 to TENT, metric 20
DB-1504
December 2010
ISIS-Spf: Next hop 0000.0000.2222 (Ethernet3/1) ISIS-Spf: Move 0000.0000.3333.00-00 to PATHS, metric 20
DB-1505
Syntax Description
Command Modes
Privileged EXEC
Examples
This router has been configured for IS-IS routing. The following is sample output from thee debug isis update-packets command:
Router# debug isis update-packets ISIS-Update: ISIS-Update: ISIS-Update: ISIS-Update: ISIS-Update: ISIS-Update: ISIS-Update: ISIS-Update: len 91 ISIS-Update: ISIS-Update: ISIS-Update: ISIS-Update: ISIS-Update: ISIS-Update: ISIS-Update: Sending L1 CSNP on Ethernet0 Sending L2 CSNP on Ethernet0 Updating L2 LSP Delete link 888.8800.0181.00 from L2 LSP 1600.8906.4022.00-00, seq E Updating L1 LSP Sending L1 CSNP on Ethernet0 Sending L2 CSNP on Ethernet0 Add link 8888.8800.0181.00 to L2 LSP 1600.8906.4022.00-00, new seq 10, Sending L2 LSP 1600.8906.4022.00-00, seq 10, ht 1198 on Tunnel0 Sending L2 CSNP on Tunnel0 Updating L2 LSP Rate limiting L2 LSP 1600.8906.4022.00-00, seq 11 (Tunnel0) Updating L1 LSP Rec L2 LSP 888.8800.0181.00.00-00 (Tunnel0) PSNP entry 1600.8906.4022.00-00, seq 10, ht 1196
The following lines indicate that the router has sent a periodic Level 1 and Level 2 complete sequence number PDU on Ethernet interface 0:
ISIS-Update: Sending L1 CSNP on Ethernet0 ISIS-Update: Sending L2 CSNP on Ethernet0
The following lines indicate that the network service access point (NSAP) identified as 8888.8800.0181.00 was deleted from the Level 2 LSP 1600.8906.4022.00-00. The sequence number associated with this LSP is 0xE.
ISIS-Update: Updating L2 LSP ISIS-Update: Delete link 888.8800.0181.00 from L2 LSP 1600.8906.4022.00-00, seq E
The following lines indicate that the NSAP identified as 8888.8800.0181.00 was added to the Level 2 LSP 1600.8906.4022.00-00. The new sequence number associated with this LSP is 0x10.
ISIS-Update: Updating L1 LSP ISIS-Update: Sending L1 CSNP on Ethernet0 ISIS-Update: Sending L2 CSNP on Ethernet0
DB-1506
December 2010
ISIS-Update: Add link 8888.8800.0181.00 to L2 LSP 1600.8906.4022.00-00, new seq 10, len 91
The following line indicates that the router sent Level 2 LSP 1600.8906.4022.00-00 with sequence number 0x10 on tunnel 0 interface:
ISIS-Update: Sending L2 LSP 1600.8906.4022.00-00, seq 10, ht 1198 on Tunnel0
The following lines indicates that a Level 2 LSP could not be transmitted because it was recently sent:
ISIS-Update: Sending L2 CSNP on Tunnel0 ISIS-Update: Updating L2 LSP ISIS-Update: Rate limiting L2 LSP 1600.8906.4022.00-00, seq 11 (Tunnel0)
The following lines indicate that a Level 2 partial sequence number PDU (PSNP) has been received on tunnel 0 interface:
ISIS-Update: Updating L1 LSP ISIS-Update: Rec L2 PSNP from 8888.8800.0181.00 (Tunnel0)
The following line indicates that a Level 2 PSNP with an entry for Level 2 LSP 1600.8906.4022.00-00 has been received. This output is an acknowledgment that a previously sent LSP was received without an error.
ISIS-Update: PSNP entry 1600.8906.4022.00-00, seq 10, ht 1196
DB-1507
debug iua as
To display debugging messages for the IDSN User Adaptation Layer (IUA) application server (AS), use the debug iua as command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug iua as {user | state} {all | name as-name} no debug iua as
Syntax Description
Displays information about the use of application programming interfaces (APIs) and events between the ISDN layer and IUA. Displays information about AS state transitions. Enables debug for all the configured ASs. Defines the name of the AS.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(15)T on the Cisco 2420, Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series; and Cisco AS5300, Cisco AS5350, Cisco AS5400, and Cisco AS5850 network access server (NAS) platforms. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Examples
The following example shows debugging output when an ISDN backhaul connection is initially established. The output shows that state debugging is turned on for all ASs and that the AS is active.
Router# debug iua as state all IUA :state debug turned ON for ALL AS 00:11:52:IUA:AS as1 number of ASPs up is 1 00:11:57:IUA:AS as1 xsition AS-Up --> AS-Active, cause - ASP asp1
Related Commands
DB-1508
December 2010
Syntax Description
Displays information about all packets. Displays information about IUA peer-to-peer messages. Displays information about the signals being sent by the Stream Control Transmission Protocol (SCTP) layer. Displays information about ASP state transition. Enables debugging output for all configured ASPs. Defines the name of the ASP.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(15)T on the Cisco 2420, Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series; and Cisco AS5300, Cisco AS5350, Cisco AS5400, and Cisco AS5850 network access server (NAS) platforms. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
DB-1509
Examples
The following example shows debugging output when an ISDN backhaul connection is initially established. The output shows that peer message debugging is turned on for all ASPs and that the ASP is active.
Router# debug iua asp peer-msg all IUA :peer message debug turned ON for ALL ASPs Router# 00:04:58:IUA :recieved ASP_UP message on ASP asp1 00:04:58:IUA:ASP asp1 xsition ASP-Down --> ASP-Up , cause - rcv peer msg ASP-UP 00:04:58:IUA:sending ACK of type 0x304 to asp asp1 00:05:03:IUA:recv ASP_ACTIVE message for ASP asp1 00:05:03:IUA:ASP asp1 xsition ASP-Up --> ASP-Active, cause - rcv peer msg ASP-Active
Related Commands
DB-1510
December 2010
debug kerberos
To display information associated with the Kerberos Authentication Subsystem, use the debug kerberos command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug kerberos no debug kerberos
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Kerberos is a security system that authenticates users and services without passing a cleartext password over the network. Cisco supports Kerberos under the authentication, authorization, and accounting (AAA) security system. Use the debug aaa authentication command to get a high-level view of login activity. When Kerberos is used on the router, you can use the debug kerberos command for more detailed debugging information.
Examples
The following is part of the sample output from the debug aaa authentication command for a Kerberos login attempt that failed. The information indicates that Kerberos is the authentication method used.
Router# debug aaa authentication AAA/AUTHEN/START (116852612): Method=KRB5 AAA/AUTHEN (116852612): status = GETUSER AAA/AUTHEN/CONT (116852612): continue_login AAA/AUTHEN (116852612): status = GETUSER AAA/AUTHEN (116852612): Method=KRB5 AAA/AUTHEN (116852612): status = GETPASS AAA/AUTHEN/CONT (116852612): continue_login AAA/AUTHEN (116852612): status = GETPASS AAA/AUTHEN (116852612): Method=KRB5 AAA/AUTHEN (116852612): password incorrect AAA/AUTHEN (116852612): status = FAIL
The following is sample output from the debug kerberos command for a login attempt that was successful. The information indicates that the router sent a request to the key distribution center (KDC) and received a valid credential.
Router# debug kerberos Kerberos: Kerberos: Kerberos: Kerberos: Requesting TGT with expiration date of 820911631 Sent TGT request to KDC Received TGT reply from KDC Received valid credential with endtime of 820911631
DB-1511
The following is sample output from the debug kerberos command for a login attempt that failed. The information indicates that the router sent a request to the KDC and received a reply, but the reply did not contain a valid credential.
Router# debug kerberos Kerberos: Requesting TGT with expiration date of 820911731 Kerberos: Sent TGT request to KDC Kerberos: Received TGT reply from KDC Kerberos: Received invalid credential. AAA/AUTHEN (425003829): password incorrect
The following output shows other failure messages you might see that indicate a configuration problem. The first message indicates that the router failed to find the default Kerberos realm, therefore the process failed to build a message to send to the KDC. The second message indicates that the router failed to retrieve its own IP address. The third message indicates that the router failed to retrieve the current time. The fourth message indicates the router failed to find or create a credentials cache for a user, which is usually caused by low memory availability.
Router# debug kerberos Kerberos: Kerberos: Kerberos: Kerberos: authentication authentication authentication authentication failed failed failed failed when parsing name while getting my address while getting time of day while allocating credentials cache
Related Commands
DB-1512
December 2010
debug kpml
To enable Keypad Markup Language (KPML) parser and builder debugs, use the debug kpml command to specify the debug option. To disable KPML parser and builder debugs, use the no form of this command (you must enter one option). debug kpml [all | parser | builder | error] no debug kpml [all | parser | builder | error]
Syntax Description
Enables all kpml debug tracing. Enables kpml parser tracing. Enables kpml builder tracing. Enables kpml error tracing.
Command Default
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
For incoming dial peers if you configure multiple DTMF negotiation methods, the first configure value takes precedence, then the second, then the third. For incoming dial peers, the first out-of-band negotiation method takes precedence over other DTMF negotiation methods, except when rtp-nte has precedence; in this case, sip-kpml takes precedence over other out-of-band negotiation methods. For incoming dial peers, if both sip-kpml and rtp-nte notification mechanisms are enabled and negotiated, the gateway relies on RFC 2833 notification to receive digits and a SUBSCRIBE for KPML is not initiated. SIP KPML support complies to the IEFT draft draft-ietf-sipping-kpml-04.txt with the following limitations:
The SIP gateway always initiates SUBSCRIBE in the context of an established INVITE dialog. The gateway supports receiving SUBSCRIBE in the context of an established INVITE dialog, as well as out-of-call context requests with a leg parameter in the Event header. If the request code does not match an existing INVITE dialog, the gateway sends a NOTIFY with KPML status-code 481 and sets Subscription-State to terminated.
DB-1513
The gateway does not support the Globally Routable User Agent (GRUU) requirement. The Contact header in the INVITE/200 OK message generates locally from the gateways contact information. The gateway always initiates persistent subscriptions, but it receives and processes persistent and one-shot subscriptions. The gateway supports only single-digit reporting. There is no need for inter-digit timer support. The only regular expressions supported are those which match to a single digit. For example:
<regex>x</regex>Matches to any digit 0 through 9 <regex>1</regex>Matches digit 1 <regex>[x#*ABCD]</regex>Matches to any digit 0 through 9, # (the pound sign), * (an
asterisk), or A, B, C, or D
<regex>[24]</regex>Matches digits 2 or 4 <regex>[2-9]</regex>Matches on any digit 2 through 9 <regex>[^2-9]</regex>Matches digits 0 or 1
The gateway does not support long key presses. Long key presses are detected and reported as a single digit press. Digit suppression is not supported (pre tag for suppressing inband digits). Individual stream selection is not supported. A SUBSCRIBE request for KPML applies to all audio streams in the dialog (stream element and reverse not supported).
Examples
DB-1514
December 2010
Call-ID: [email protected] CSeq: 103 SUBSCRIBE Max-Forwards: 70 Date: Fri, 01 Mar 2002 00:16:15 GMT User-Agent: Cisco-SIPGateway/IOS-12.x Event: kpml Expires: 7200 Contact: <sip:172.18.193.251:5060> Content-Type: application/kpml-request+xml Content-Length: 327 <?xml version="1.0" encoding="UTF-8"?><kpml-request xmlns="urn:ietf:params:xml:ns:kpml-request" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="urn:ietf:params:xml:ns:kpml-request kpml-request.xsd" version="1.0"><pattern persist="persist"><regex tag="dtmf">[x*#ABCD]</regex></pattern></kpml-request> /-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg: Received: SUBSCRIBE sip:172.18.193.251:5060 SIP/2.0 Via: SIP/2.0/UDP 172.18.193.250:5060;branch=z9hG4bK5FE3 From: <sip:[email protected]>;tag=39497C-2EA To: <sip:172.18.193.251>;tag=EA330-F6 Call-ID: [email protected] CSeq: 101 SUBSCRIBE Max-Forwards: 70 Date: Fri, 01 Mar 2002 01:02:46 GMT User-Agent: Cisco-SIPGateway/IOS-12.x Event: kpml Expires: 7200 Contact: <sip:172.18.193.250:5060> Content-Type: application/kpml-request+xml Content-Length: 327 <?xml version="1.0" encoding="UTF-8"?><kpml-request xmlns="urn:ietf:params:xml:ns:kpml-request" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="urn:ietf:params:xml:ns:kpml-request kpml-request.xsd" version="1.0"><pattern persist="persist"><regex tag="dtmf">[x*#ABCD]</regex></pattern></kpml-request> /-1/xxxxxxxxxxxx/KPML/Parser/kpml_init: //-1/xxxxxxxxxxxx/KPML/Parser/kpml_decode: Parsing <?xml version="1.0" encoding="UTF-8"?><kpml-request xmlns="urn:ietf:params:xml:ns:kpml-request" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="urn:ietf:params:xml:ns:kpml-request kpml-request.xsd" version="1.0"><pattern persist="persist"><regex tag="dtmf">[x*#ABCD]</regex></pattern></kpml-request> /-1/xxxxxxxxxxxx/KPML/Parser/kpml_request_ptbuild: //-1/xxxxxxxxxxxx/KPML/Parser/kpml_create_new_node: creating node par/cur/child=0x00000000/0x645E910C/0x00000000 top/child=0x645E910C/0x00000000 //-1/xxxxxxxxxxxx/KPML/Parser/kpml_pattern_ptbuild: //-1/xxxxxxxxxxxx/KPML/Parser/kpml_create_new_node: creating node par/cur/child=0x645E910C/0x645E91E8/0x00000000 top/child=0x645E910C/0x645E91E8 //-1/xxxxxxxxxxxx/KPML/Parser/kpml_regex_ptbuild: //-1/xxxxxxxxxxxx/KPML/Parser/kpml_create_new_node: creating node par/cur/child=0x645E91E8/0x645E923C/0x00000000 top/child=0x645E910C/0x645E91E8 //-1/xxxxxxxxxxxx/KPML/Parser/kpml_character_data: buf=[x*#ABCD]</regex></pattern></kpml-request> /-1/xxxxxxxxxxxx/KPML/Parser/kpml_regex_char_data_ptbuild: char data=[x*#ABCD] //-1/xxxxxxxxxxxx/KPML/Parser/kpml_end_element_handler: elem name=regex
DB-1515
//-1/xxxxxxxxxxxx/KPML/Parser/kpml_end_element_handler: elem name=pattern //-1/xxxxxxxxxxxx/KPML/Parser/kpml_end_element_handler: elem name=kpml-request //-1/xxxxxxxxxxxx/KPML/Parser/kpml_pattern_ptproc: //-1/xxxxxxxxxxxx/KPML/Parser/kpml_regex_ptproc: //-1/xxxxxxxxxxxx/KPML/Parser/kpml_decode_context_free: kpml_decode_context_free:mem_mgr_mempool_free: mem_refcnt(6488B89C)=0 - mempool cleanup //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg: Received: SIP/2.0 200 OK Via: SIP/2.0/UDP 172.18.193.251:5060;branch=z9hG4bKFF36 From: <sip:172.18.193.251>;tag=EA330-F6 To: <sip:[email protected]>;tag=39497C-2EA Date: Fri, 01 Mar 2002 01:02:51 GMT Call-ID: [email protected] CSeq: 103 SUBSCRIBE Content-Length: 0 Contact: <sip:172.18.193.250:5060> Expires: 7200 //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg: Sent: SIP/2.0 200 OK Via: SIP/2.0/UDP 172.18.193.250:5060;branch=z9hG4bK5FE3 From: <sip:[email protected]>;tag=39497C-2EA To: <sip:172.18.193.251>;tag=EA330-F6 Date: Fri, 01 Mar 2002 00:16:24 GMT Call-ID: [email protected] CSeq: 101 SUBSCRIBE Content-Length: 0 Contact: <sip:172.18.193.251:5060> Expires: 7200 //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg: Sent: NOTIFY sip:172.18.193.250:5060 SIP/2.0 Via: SIP/2.0/UDP 172.18.193.251:5060;branch=z9hG4bK101EA4 From: <sip:172.18.193.251>;tag=EA330-F6 To: <sip:[email protected]>;tag=39497C-2EA Call-ID: [email protected] CSeq: 104 NOTIFY Max-Forwards: 70 Date: Fri, 01 Mar 2002 00:16:24 GMT User-Agent: Cisco-SIPGateway/IOS-12.x Event: kpml Subscription-State: active Contact: <sip:172.18.193.251:5060> Content-Length: 0 //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg: Received: NOTIFY sip:172.18.193.251:5060 SIP/2.0 Via: SIP/2.0/UDP 172.18.193.250:5060;branch=z9hG4bK6111 From: <sip:[email protected]>;tag=39497C-2EA To: <sip:172.18.193.251>;tag=EA330-F6 Call-ID: [email protected] CSeq: 102 NOTIFY Max-Forwards: 70 Date: Fri, 01 Mar 2002 01:02:51 GMT User-Agent: Cisco-SIPGateway/IOS-12.x Event: kpml Subscription-State: active Contact: <sip:172.18.193.250:5060>
DB-1516
December 2010
Content-Length: 0 ... //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode: encode_data=0x64E25D00 //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode_context_create: chunk_size=2k, max_allowed=16k //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode_context_create: context=0x64FADC10, mp=0x64AFBBE0 //-1/xxxxxxxxxxxx/KPML/Builder/kpml_build_response: //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode: malloc xml_buf=0x645E910C, length=112 //-1/xxxxxxxxxxxx/KPML/Builder/kpml_build_response: //-1/xxxxxxxxxxxx/KPML/Builder/kpml_build_response: length=73, buffp=0x645E917B //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode: rc=0, encoded str=<?xml version="1.0" encoding="UTF-8"?><kpml-response version="1.0" code="200" text="OK" digits="1" tag="dtmf"/> //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode_context_free: kpml_encode_context_free:mem_mgr_mempool_free: mem_refcnt(64AFBBE0)=0 - mempool cleanup //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg: Sent: NOTIFY sip:172.18.193.250:5060 SIP/2.0 Via: SIP/2.0/UDP 172.18.193.251:5060;branch=z9hG4bK1117DE From: <sip:172.18.193.251>;tag=EA330-F6 To: <sip:[email protected]>;tag=39497C-2EA Call-ID: [email protected] CSeq: 105 NOTIFY Max-Forwards: 70 Date: Fri, 01 Mar 2002 00:37:33 GMT User-Agent: Cisco-SIPGateway/IOS-12.x Event: kpml Subscription-State: active Contact: <sip:172.18.193.251:5060> Content-Type: application/kpml-response+xml Content-Length: 113 <?xml version="1.0" encoding="UTF-8"?><kpml-response version="1.0" code="200" text="OK" digits="1" tag="dtmf"/> /-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg: Received: SIP/2.0 200 OK Via: SIP/2.0/UDP 172.18.193.251:5060;branch=z9hG4bK1117DE From: <sip:172.18.193.251>;tag=EA330-F6 To: <sip:[email protected]>;tag=39497C-2EA Date: Fri, 01 Mar 2002 01:24:08 GMT Call-ID: [email protected] CSeq: 105 NOTIFY Content-Length: 0 //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode: encode_data=0x64E25D00 //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode_context_create: chunk_size=2k, max_allowed=16k //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode_context_create: context=0x651E8084, mp=0x65501720 //-1/xxxxxxxxxxxx/KPML/Builder/kpml_build_response: //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode: malloc xml_buf=0x645E910C, length=112 //-1/xxxxxxxxxxxx/KPML/Builder/kpml_build_response: //-1/xxxxxxxxxxxx/KPML/Builder/kpml_build_response: length=73, buffp=0x645E917B //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode: rc=0, encoded str=<?xml version="1.0" encoding="UTF-8"?><kpml-response version="1.0" code="200" text="OK" digits="2" tag="dtmf"/> //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode_context_free: kpml_encode_context_free:mem_mgr_mempool_free: mem_refcnt(65501720)=0 - mempool cleanup //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode: encode_data=0x656F9128 //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode_context_create: chunk_size=2k, max_allowed=16k
DB-1517
//-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode_context_create: context=0x651E8084, mp=0x6488B6CC //-1/xxxxxxxxxxxx/KPML/Builder/kpml_build_response: //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode: malloc xml_buf=0x645E910C, length=112 //-1/xxxxxxxxxxxx/KPML/Builder/kpml_build_response: //-1/xxxxxxxxxxxx/KPML/Builder/kpml_build_response: length=73, buffp=0x645E917B //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode: rc=0, encoded str=<?xml version="1.0" encoding="UTF-8"?><kpml-response version="1.0" code="200" text="OK" digits="3" tag="dtmf"/> //-1/xxxxxxxxxxxx/KPML/Builder/kpml_encode_context_free: kpml_encode_context_free:mem_mgr_mempool_free: mem_refcnt(6488B6CC)=0 - mempool cleanup //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg: Sent: NOTIFY sip:172.18.193.250:5060 SIP/2.0 Via: SIP/2.0/UDP 172.18.193.251:5060;branch=z9hG4bK12339 From: <sip:172.18.193.251>;tag=EA330-F6 To: <sip:[email protected]>;tag=39497C-2EA Call-ID: [email protected] CSeq: 106 NOTIFY Max-Forwards: 70 Date: Fri, 01 Mar 2002 00:37:44 GMT User-Agent: Cisco-SIPGateway/IOS-12.x Event: kpml Subscription-State: active Contact: <sip:172.18.193.251:5060 Content-Type: application/kpml-response+xml Content-Length: 113 <?xml version="1.0" encoding="UTF-8"?><kpml-response version="1.0" code="200" text="OK" digits="2" tag="dtmf"/> /-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg: Received: SIP/2.0 200 OK Via: SIP/2.0/UDP 172.18.193.251:5060;branch=z9hG4bK12339 From: <sip:172.18.193.251>;tag=EA330-F6 To: <sip:[email protected]>;tag=39497C-2EA Date: Fri, 01 Mar 2002 01:24:20 GMT Call-ID: [email protected] CSeq: 106 NOTIFY Content-Length: 0 ...
Related Commands
DB-1518
December 2010
debug kron
To display debugging messages about Command Scheduler policies or occurrences, use the debug kron command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug kron {all | exec-cli | info | major} no debug kron {all | exec-cli | info | major}
Syntax Description
Displays all debugging output about Command Scheduler policy lists or occurrences. Displays detailed debugging output about Command Scheduler policy list command-line interface (CLI) commands. Displays debugging output about Command Scheduler policy lists, occurrence warnings, or progress information. Displays debugging output about Command Scheduler policy list or occurrence failures.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SRC. This command was integrated into Cisco IOS Release 12.2(33)SB. This command was integrated into Cisco IOS Release 12.2(33)SXI.
Usage Guidelines
Use the debug kron command to display the output of a scheduled EXEC show command on the console.
Examples
The following example shows debugging messages for the EXEC CLI show version after the CLI was run at a scheduled interval:
Router# debug kron exec-cli Kron cli occurrence messages debugging is on 2w6d: Call parse_cmd 'show version' 2w6d: Kron CLI return 0 ' **CLI 'show version': Cisco Internetwork Operating System Software IOS (tm) C2600 Software (C2600-I-M
DB-1519
Related Commands
Description Displays the status and schedule information for Command Scheduler occurrences.
DB-1520
December 2010
debug l2ctrl
To enable debugging for Layer 2 Control (L2CTRL), use the debug l2ctrl command in privileged EXEC mode. To disable debugging for L2CTRL, use the no form of this command. debug l2ctrl {all | evc | pm | registry} no debug l2ctrl {all | evc | pm | registry}
Syntax Description
Displays all L2CTRL debugging messages. Displays Ethernet virtual circuit (EVC) and L2CTRL messages. Displays switch PM and L2CTRL messages. Displays L2CTRL registries.
Command Modes
Command History
Release 12.2(33)SRD
Examples
The following example shows how to enable debugging of all L2CTRL related events:
Router# debug l2ctrl all
Related Commands
DB-1521
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The SGSN module uses the proprietary Layer 2 Relay protocol in conjunction with the intra-Serving GPRS Support Node (iSGSN) protocol for communication between the SGSN-datacom (SGSN-D) and SGSN-telecom (SGSN-T) units that comprise the SGSN. For debugging purposes, it might also be useful to trace Layer 2 Relay packets. To display information about Layer 2 Relay packets, use the debug l2relay packets command. Normally you will not need to use the debug l2relay events or debug l2relay packets commands. If problems with the SGSN are encountered, Cisco technical support personnel may request that issue the command.
Caution
Because the debug l2relay events command generates a substantial amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples
DB-1522
December 2010
Related Commands
DB-1523
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.1(3)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug l2relay packets command to display information about Layer 2 Relay packets. The SGSN module uses the proprietary Layer 2 Relay protocol in conjunction with the intra-Serving GPRS Support Node (iSGSN) protocol for communication between the SGSN-datacom (SGSN-D) and SGSN-telecom (SGSN-T) units that comprise the SGSN. For debugging purposes, it might also be useful to trace Layer 2 Relay events. To display information about Layer 2 Relay events, use the debug l2relay events command. Normally you will not need to use the debug l2relay packets or debug l2relay events command. If problems with the SGSN are encountered, Cisco technical support personnel may request that you issue the command.
Caution
Because the debug l2relay packets command generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples
DB-1524
December 2010
Related Commands
DB-1525
debug l2tp
To enable debugging of Layer 2 Tunneling Protocol (L2TP) information, use the debug l2tp command in privileged EXEC mode. To disable L2TP debugging, use the no form of this command. debug l2tp {all | application | brief | db {error | event | lookup} | error | event | export | l2tun | packet {brief | detail | error | event} | route | seq [brief] | snmp | timer} no debug l2tp {all | application | brief | db {error | event | lookup} | error | event | export | l2tun | packet {brief | detail | error | event} | route | seq [brief] | snmp | timer}
Syntax Description
all application brief db error event lookup export l2tun packet detail route seq brief snmp timer
Enables the most commonly used L2TP debugs. Enables L2TP application information debugs. Enables L2TP debug information in a single line. Enables L2TP database debugs. Enables L2TP error debugs. Enables L2TP event debugs. Enables L2TP database lookup. Enables L2TP external data and command-line interface (CLI) debugs. Enables Layer 2 tunnels (L2Tun) socket application programming interface (API) debugs. Enables L2TP packet information debugs. Enables L2TP packet dump details debugs. Enables L2TP route watch debugs. Enables extra sequencing debugs. (Optional) Enables L2TP one-line sequencing debugs. Enables L2TP Simple Network Management Protocol (SNMP) event debugs. Enables L2TP timer debugs.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command was integrated into Cisco IOS Release 12.2(33)SB. This command was modified. The application and brief keywords were added. This command was modified. The snmp and route keywords were added.
Usage Guidelines
DB-1526
December 2010
Examples
The following sample output of the show debugging command displays the debugs enabled for L2TP. The field descriptions are self-explanatory.
Router# show debugging L2TP: L2TP L2TP L2TP L2TP L2TP L2TP L2TP L2TP L2TP L2TP L2TP L2TP L2TP L2TP
packet events debugging is on packet errors debugging is on packet detail debugging is on errors debugging is on events debugging is on L2TUN socket API debugging is on sequencing debugging is on export data to applications and cli debugging is on route watch debugging is on timers debugging is on brief, one line debugs debugging is on application debugs debugging is on database lookups debugging is on SNMP events debugging is on
Related Commands
Description Displays information about the types of debugging that are enabled for your router.
DB-1527
Syntax Description
Displays L2TP redundancy-facility (cf) events. Displays L2TP redundancy details. Displays L2TP redundancy errors. Displays L2TP redundancy events. Displays L2TP redundancy forwarding-service manager (fsm) events. Displays L2TP redundancy resynchronizations. Displays L2TP redundancy-facility (rf) events.
Command Modes
Command History
Usage Guidelines
Use the debug l2tp redundancy command in privileged EXEC mode to display a list of redundancy events and errors. Use the show l2tp redundancy command in privileged EXEC mode to display information on the state of the Layer 2 Tunneling Protocol (L2TP) or a specific L2TP session redundancy data.
Examples
The following example shows how to display a debug of redundancy events during the setup and termination of an L2TP High Availability (HA) tunnel for a L2TP Network Server (LNS) active Route Processor (RP):
LNS1> debug enable LNS1# debug l2tp redundancy cf L2TP redundancy cf debugging is on LNS1# debug l2tp redundancy detail L2TP redundancy details debugging is on LNS1# debug l2tp redundancy error L2TP redundancy errors debugging is on LNS1# debug l2tp redundancy event L2TP redundancy events debugging is on LNS1# debug l2tp redundancy fsm L2TP redundancy fsm debugging is on
DB-1528
December 2010
LNS1# debug l2tp redundancy resync L2TP redundancy resync debugging is on LNS1# debug l2tp redundancy rf L2TP redundancy rf debugging is on LNS1# *Aug 26 18:00:00.467: %SYS-5-CONFIG_I: Configured from console by console LNS1# *Aug 26 18:00:45.631: L2TP tnl 01000:________: CCM initialized CCM session *Aug 26 18:00:45.631: : L2TP HA:CC playback chkpt skipped, CC not doing HA *Aug 26 18:00:45.711: : L2TP HA FSM:Receive proto FSM event 19 *Aug 26 18:00:45.711: : L2TP HA FSM:Receive RxSCCRQ *Aug 26 18:00:45.711: : L2TP HA:lcm_cc alloc: l2tp_cc 070B45B8, lcm_cc 02FE55E8 *Aug 26 18:00:45.711: : L2TP HA FSM:FSM-CC ev Rx-SCCRQ *Aug 26 18:00:45.711: : L2TP HA FSM:FSM-CC Idle->Wt-ChkptSidRmt *Aug 26 18:00:45.711: : L2TP HA FSM:FSM-CC do Block-Tx-AckSCCRQ *Aug 26 18:00:45.711: : L2TP HA FSM:Checkpoint Two Cc IDs *Aug 26 18:00:45.711: L2TP HA CF: Chkpt send: s/c id 0/52631, BothCcId, seq 0, ns/nr 0/0, rid 51583, len 52; flush = 1, ctr 1 *Aug 26 18:00:45.711: 01000:0000CD97: L2TP HA:Enqueue peer Ns 0 to ns_q, seq 1 (q sz 0) *Aug 26 18:00:45.711: L2TP tnl 01000:0000CD97: Encoding SCCRQ-IN CHKPT *Aug 26 18:00:45.711: L2TP tnl 01000:0000CD97: Tx CHKPT *Aug 26 18:00:45.739: L2TP tnl 01000:0000CD97: Encoding SCCRP-OUT CHKPT *Aug 26 18:00:45.739: L2TP tnl 01000:0000CD97: Tx CHKPT *Aug 26 18:00:45.739: : L2TP HA:Adjust local window size to 10 *Aug 26 18:00:45.739: 01000:0000CD97: L2TP HA FSM:Receive proto TxCM event SCCRP *Aug 26 18:00:45.739: : L2TP HA FSM:Receive TxSCCRP LNS1# *Aug 26 18:00:45.739: : L2TP HA FSM:FSM-CC ev Tx-SCCRP *Aug 26 18:00:45.739: : L2TP HA FSM:FSM-CC Wt-ChkptSidRmt->WtCcIdRmt2 *Aug 26 18:00:45.739: : L2TP HA FSM:FSM-CC do Block-Tx-SCCRP *Aug 26 18:00:45.739: 01000:0000CD97: L2TP HA FSM:Found blocked RxSCCRQ, seq_num 1 *Aug 26 18:00:45.739: 01000:0000CD97: L2TP HA FSM:Queued SCCRP to CC hold_q *Aug 26 18:00:46.863: : L2TP HA FSM:CHKPT status callback: status 0, len 56 *Aug 26 18:00:46.863: : L2TP HA FSM:Context s/c id 0/52631, BothCcId, seq 1, ns/nr 0/0, rid 51583, len 52 *Aug 26 18:00:46.863: L2TP HA CF: Rcvd status s/c id 0/52631, BothCcId, seq 1, ns/nr 0/0, rid 51583, len 52 *Aug 26 18:00:46.863: L2TP HA CF: Rcvd status 0: len 56 *Aug 26 18:00:46.863: L2TP HA CF: Status content s/c id 0/52631, BothCcId, seq 1, ns/nr 0/0, rid 51583, len 52 *Aug 26 18:00:46.863: 01000:0000CD97: L2TP HA FSM:Recv chkpt ack: s/c id 0/52631, BothCcId, seq 1, ns/nr 0/0, rid 51583, len 52 *Aug 26 18:00:46.863: : L2TP HA FSM:Receive CC-ChkptAck *Aug 26 18:00:46.863: : L2TP HA FSM:FSM-CC ev Rx-CkpACK-CcID-Rmt *Aug 26 18:00:46.863: : L2TP HA FSM:FSM-CC WtCcIdRmt2->Wt-RxSccn *Aug 26 18:00:46.863: : L2TP HA FSM:FSM-CC do Allow-Tx-SCCRP2 *Aug 26 18:00:46.863: : L2TP HA FSM:Received Chkpt of local + remote CC ID *Aug 26 18:00:46.863: 01000:0000CD97: L2TP HA:Try to remove from CC's ns_q: seq num 1 (current Ns 1) *Aug 26 18:00:46.863: 01000:0000CD97: L2TP HA:Ns entry to remove: found (current Ns 1) *Aug 26 18:00:46.863: 01000:0000CD97: L2TP HA:Advance peer Nr to 1 (ns_q sz 0) *Aug 26 18:00:46.863: 01000:0000CD97: L2TP HA:CC send all unblocked if can LNS1# *Aug 26 18:00:46.863: 01000:0000CD97: L2TP HA:CC send one blocked CM (SCCRP): ns 0 (0), nr 1 *Aug 26 18:00:46.863: L2TP HA CF: O SCCRP 51583/0 ns/nr 0/1 *Aug 26 18:00:47.867: 01000:0000CD97: L2TP HA FSM:Receive Cm-Ack *Aug 26 18:00:47.867: 01000:0000CD97: L2TP HA FSM:Receive CC Cm-Ack *Aug 26 18:00:47.867: : L2TP HA FSM:FSM-CC ev Rx-CmACK *Aug 26 18:00:47.867: : L2TP HA FSM:FSM-CC in Wt-RxSccn *Aug 26 18:00:47.867: : L2TP HA FSM:FSM-CC do Ignore *Aug 26 18:00:47.867: 01000:0000CD97: L2TP HA FSM:Ignore event *Aug 26 18:00:47.867: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 1, peer 1
DB-1529
*Aug 26 18:00:47.867: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (1,0/1,1, int 1, rx 1, 1) (ns_q sz 0) *Aug 26 18:00:47.867: 01000:0000CD97: L2TP HA FSM:Peer Ns 1 (1), Nr 1 (ns_q sz 0) *Aug 26 18:00:48.087: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 1, peer 1 *Aug 26 18:00:48.087: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (1,0/1,1, int 1, rx 1, 1) (ns_q sz 0) *Aug 26 18:00:48.087: 01000:0000CD97: L2TP HA FSM:Peer Ns 1 (2), Nr 1 (ns_q sz 0) *Aug 26 18:00:48.087: : L2TP HA FSM:Receive proto FSM event 21 *Aug 26 18:00:48.087: 01000:0000CD97: L2TP HA FSM:Receive RxSCCCN *Aug 26 18:00:48.087: : L2TP HA FSM:FSM-CC ev Rx-SCCCN *Aug 26 18:00:48.087: : L2TP HA FSM:FSM-CC Wt-RxSccn->WtCcsUp *Aug 26 18:00:48.087: : L2TP HA FSM:FSM-CC do Allow-Tx-AckSCCCN *Aug 26 18:00:48.087: 01000:0000CD97: L2TP HA FSM:Allow TxSCCCN-ACK *Aug 26 18:00:48.087: 01000:0000CD97: L2TP HA FSM:Receive CcUp *Aug 26 18:00:48.087: : L2TP HA FSM:FSM-CC ev Proto CcUp *Aug 26 18:00:48.087: : L2TP HA FSM:FSM-CC WtCcsUp->Wt-CkptCcUp *Aug 26 18:00:48.087: : L2TP HA FSM:FSM-CC do Chkpt-CcUp2 *Aug 26 18:00:48.087: : L2TP HA FSM:Checkpoint CcUp *Aug 26 18:00:48.087: L2TP HA CF: Chkpt send: s/c id 0/52631, CcUp, seq 0, ns/nr 1/1, rid 0, len 52; flush = 1, ctr 2 *Aug 26 18:00:48.091: L2TP tnl 01000:0000CD97: CCM added sync data *Aug 26 18:00:48.095: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 2, peer 1 *Aug 26 18:00:48.095: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (2,1/1,1, int 2, rx 1, 2) (ns_q sz 0) *Aug 26 18:00:48.095: 01000:0000CD97: L2TP HA FSM:Peer Ns 2 (3), Nr 1 (ns_q sz 0) *Aug 26 18:00:48.095: L2TP _____:01000:000036F8: Encoding ICRQ-IN CHKPT *Aug 26 18:00:48.095: L2TP _____:01000:000036F8: Tx CHKPT *Aug 26 18:00:48.095: : L2TP HA FSM:Receive proto FSM event 3 *Aug 26 18:00:48.095: : L2TP HA FSM:Receive RxICRQ *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM: Using ICRQ FSM *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev created *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Init->Idle *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do none *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Rx-xCRQ *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Idle->Wt-ChkptSidRmt *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Block-Tx-AckXCRQ *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:Checkpoint TwoSessionIDs *Aug 26 18:00:48.095: L2TP HA CF: Chkpt send: s/c id 14072/52631, BothSesId, seq 0, ns/nr 1/2, rid 40276, len 52; flush = 1, ctr 3 *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA:Enqueue peer Ns 2 to ns_q, seq 3 (q sz 0) *Aug 26 18:00:48.131: : L2TP HA:Try to buffer sock msg type 19 *Aug 26 18:00:48.131: : L2TP HA:Buffering skipped *Aug 26 18:00:48.131: L2TP _____:01000:000036F8: Encoding ICRP-OUT CHKPT *Aug 26 18:00:48.131: L2TP _____:01000:000036F8: Tx CHKPT *Aug 26 18:00:48.131: 01000:0000CD97: L2TP HA FSM:Receive proto TxCM event ICRP *Aug 26 18:00:48.131: _____:_____:000036F8: L2TP HA FSM:Receive TxICRP *Aug 26 18:00:48.131: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Tx-xCRP *Aug 26 18:00:48.131: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Wt-ChkptSidRmt->Wt-SesIdRmt2 *Aug 26 18:00:48.131: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Block-Tx-xCRP *Aug 26 18:00:48.131: _____:01000:000036F8: L2TP HA FSM:Found blocked RxICRQ, seq_num 3 LNS1# *Aug 26 18:00:48.131: _____:01000:000036F8: L2TP HA FSM:Queued xCRP to session hold_q *Aug 26 18:00:48.131: : L2TP HA:Try to buffer sock msg type 23 *Aug 26 18:00:48.131: : L2TP HA:CC not in resync state, buffering skipped *Aug 26 18:00:49.115: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 2, peer 1 *Aug 26 18:00:49.115: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (2,2/1,1, int 3, rx 1, 3) (ns_q sz 1) *Aug 26 18:00:49.211: : L2TP HA FSM:CHKPT status callback: status 0, len 56 *Aug 26 18:00:49.211: : L2TP HA FSM:Context s/c id 0/52631, CcUp, seq 2, ns/nr 1/1, rid 0, len 52 *Aug 26 18:00:49.211: : L2TP HA FSM:CHKPT status callback: status 0, len 56
DB-1530
December 2010
*Aug 26 18:00:49.211: : L2TP HA FSM:Context s/c id 14072/52631, BothSesId, seq 3, ns/nr 1/2, rid 40276, len 52 *Aug 26 18:00:49.211: L2TP HA CF: Rcvd status s/c id 0/52631, CcUp, seq 2, ns/nr 1/1, rid 0, len 52 *Aug 26 18:00:49.211: L2TP HA CF: Rcvd status 0: len 56 *Aug 26 18:00:49.211: L2TP HA CF: Status content s/c id 0/52631, CcUp, seq 2, ns/nr 1/1, rid 0, len 52 *Aug 26 18:00:49.211: 01000:0000CD97: L2TP HA FSM:Recv chkpt ack: s/c id 0/52631, CcUp, seq 2, ns/nr 1/1, rid 0, len 52 *Aug 26 18:00:49.211: : L2TP HA FSM:Receive CC-ChkptAck *Aug 26 18:00:49.211: : L2TP HA FSM:FSM-CC ev Rx-CkpACK-CcUp *Aug 26 18:00:49.211: : L2TP HA FSM:FSM-CC Wt-CkptCcUp->ProcCcsUp *Aug 26 18:00:49.211: : L2TP HA FSM:FSM-CC do Proc-ChpACK-CcUp2 *Aug 26 18:00:49.211: : L2TP HA FSM:Received chkpt ACK of CcUp *Aug 26 18:00:49.211: L2TP HA CF: Rcvd status s/c id 14072/52631, BothSesId, seq 3, ns/nr 1/2, rid 40276, len 52 *Aug 26 18:00:49.211: L2TP HA CF: Rcvd status 0: len 56 *Aug 26 18:00:49.211: L2TP HA CF: Status content s/c id 14072/52631, BothSesId, seq 3, ns/nr 1/2, rid 40276, len 52 *Aug 26 18:00:49.211: 01000:0000CD97: L2TP HA FSM:Recv chkpt ack: s/c id 14072/52631, BothSesId, seq 3, ns/nr 1/2, rid 40276, len 52 *Aug 26 18:00:49.211: _____:_____:000036F8: L2TP HA FSM:Receive Session-ChkptAck *Aug 26 18:00:49.211: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Rx-CktACK-SesID-Rmt *Aug 26 18:00:49.211: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Wt-SesIdRmt2->Wt-RxXccn *Aug 26 18:00:49.211: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Allow-Tx-xCRP *Aug 26 18:00:49.211: 01000:0000CD97: L2TP HA:Try to remove from CC's ns_q: seq num 3 (current Ns 3) *Aug 26 18:00:49.211: _____:01000:000036F8: L2TP HA:Ns entry to remove: found (current Ns 3) *Aug 26 18:00:49.211: _____:01000:000036F8: L2TP HA:Advance peer Nr to 3 (ns_q sz 0) *Aug 26 18:00:49.211: _____:01000:000036F8: L2TP HA:Session send all unblocked *Aug 26 18:00:49.211: 01000:0000CD97: L2TP HA:CC send if can (ICRP): ns 1 (1, 1), nr 3 (3) *Aug 26 18:00:49.211: L2TP HA CF: O ICRP 51583/40276 ns/nr 1/3 *Aug 26 18:00:49.231: 01000:0000CD97: L2TP HA FSM:Receive Cm-Ack *Aug 26 18:00:49.231: _____:_____:000036F8: L2TP HA FSM:Receive session Cm-Ack LNS1# *Aug 26 18:00:49.231: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Rx-CmACK *Aug 26 18:00:49.231: _____:01000:000036F8: L2TP HA FSM:FSM-Sn in Wt-RxXccn *Aug 26 18:00:49.231: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Ignore *Aug 26 18:00:49.231: _____:01000:000036F8: L2TP HA FSM:Ignore event *Aug 26 18:00:49.231: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 3, peer 2 *Aug 26 18:00:49.231: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (3,2/2,2, int 3, rx 2, 3) (ns_q sz 0) *Aug 26 18:00:49.231: 01000:0000CD97: L2TP HA FSM:Peer Ns 3 (3), Nr 2 (ns_q sz 0) LNS1# *Aug 26 18:00:50.407: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 3, peer 2 *Aug 26 18:00:50.407: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (3,2/2,2, int 3, rx 2, 3) (ns_q sz 0) *Aug 26 18:00:50.407: 01000:0000CD97: L2TP HA FSM:Peer Ns 3 (4), Nr 2 (ns_q sz 0) *Aug 26 18:00:50.407: : L2TP HA FSM:Receive proto FSM event 5 *Aug 26 18:00:50.407: _____:_____:000036F8: L2TP HA FSM:Receive RxICCN *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Rx-xCCN *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Wt-RxXccn->Wt-SessUp *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Allow-Tx-AckXCCN *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:Allow TxICCN-ACK *Aug 26 18:00:50.407: L2TP _____:01000:000036F8: Encoding ICCN-IN CHKPT *Aug 26 18:00:50.407: L2TP _____:01000:000036F8: Tx CHKPT *Aug 26 18:00:50.407: _____:_____:000036F8: L2TP HA FSM:Receive SessionUp *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Proto SessUp *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Wt-SessUp->Wt-CkptSesUp *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Chkpt-SesUp2 *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:Checkpoint SessionUP *Aug 26 18:00:50.407: L2TP HA CF: Chkpt send: s/c id 14072/52631, SesUp, seq 0, ns/nr 2/3, rid 0, len 52; flush = 1, ctr 4
DB-1531
*Aug 26 18:00:51.055: : L2TP HA FSM:CHKPT status callback: status 0, len 56 *Aug 26 18:00:51.055: : L2TP HA FSM:Context s/c id 14072/52631, SesUp, seq 4, ns/nr 2/3, rid 0, len 52 *Aug 26 18:00:51.055: L2TP HA CF: Rcvd status s/c id 14072/52631, SesUp, seq 4, ns/nr 2/3, rid 0, len 52 *Aug 26 18:00:51.055: L2TP HA CF: Rcvd status 0: len 56 *Aug 26 18:00:51.055: L2TP HA CF: Status content s/c id 14072/52631, SesUp, seq 4, ns/nr 2/3, rid 0, len 52 *Aug 26 18:00:51.055: 01000:0000CD97: L2TP HA FSM:Recv chkpt ack: s/c id 14072/52631, SesUp, seq 4, ns/nr 2/3, rid 0, len 52 *Aug 26 18:00:51.055: _____:_____:000036F8: L2TP HA FSM:Receive Session-ChkptAck *Aug 26 18:00:51.055: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Rx-CktACK-SesUp *Aug 26 18:00:51.055: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Wt-CkptSesUp->Proc-SessUp *Aug 26 18:00:51.055: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Proc-ChpACK-SesUp *Aug 26 18:00:51.055: _____:01000:000036F8: L2TP HA FSM:Received chkpt ACK of SessionUP *Aug 26 18:00:51.347: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up LNS1# *Aug 26 18:00:51.635: : L2TP HA:Try to buffer sock msg type 26 *Aug 26 18:00:51.635: : L2TP HA:CC not in resync state, buffering skipped *Aug 26 18:00:51.659: : L2TP HA:Try to buffer sock msg type 26 *Aug 26 18:00:51.659: : L2TP HA:CC not in resync state, buffering skipped LNS1# *Aug 26 18:00:52.363: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access2, changed state to up LNS1# LNS1# clear l2tp all Proceed with clearing LNS1# *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: 4/4 (Q sz 0) LNS1# *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: 0, len 52; flush = 1, *Aug 26 18:01:21.271: *Aug 26 18:01:21.295: *Aug 26 18:01:21.295: *Aug 26 18:01:22.423: *Aug 26 18:01:22.423: 0, len 52 *Aug 26 18:01:22.423: 0, len 52 *Aug 26 18:01:22.423: *Aug 26 18:01:22.423: rid 0, len 52 *Aug 26 18:01:22.423: seq 5, ns/nr 2/3, rid *Aug 26 18:01:22.423: *Aug 26 18:01:22.423: *Aug 26 18:01:22.423: *Aug 26 18:01:22.423: *Aug 26 18:01:22.423: all tunnels? [confirm] 00001:_____:000036F8: L2TP HA FSM:Receive Session-CC-Rm 00001:_____:000036F8: L2TP HA FSM:Receive SessionRm 01000:0000CD97: L2TP HA FSM:Receive proto TxCM event StopCCN 01000:0000CD97: L2TP HA FSM:Receive TxSTOPCCN : L2TP HA FSM:FSM-CC ev Tx-STOPCCN : L2TP HA FSM:FSM-CC ProcCcsUp->Wt-CkptCcDn : L2TP HA FSM:FSM-CC do Chkpt-CcDwn 01000:0000CD97: L2TP HA FSM:Receive TxSTOPCCN while CC up 01000:0000CD97: L2TP HA:CC ns_q cleanup: overall head Ns old/new =
: L2TP HA FSM:Checkpoint CCDown L2TP HA CF: Chkpt send: s/c id 0/52631, CcDwn, seq 0, ns/nr 2/3, rid ctr 5 01000:0000CD97: L2TP HA FSM:Queued STOPCCN to cc hold_q : L2TP HA:Try to buffer sock msg type 22 : L2TP HA:Buffering skipped : L2TP HA FSM:CHKPT status callback: status 0, len 56 : L2TP HA FSM:Context s/c id 0/52631, CcDwn, seq 5, ns/nr 2/3, rid L2TP HA CF: Rcvd status s/c id 0/52631, CcDwn, seq 5, ns/nr 2/3, rid L2TP HA CF: Rcvd status 0: len 56 L2TP HA CF: Status content s/c id 0/52631, CcDwn, seq 5, ns/nr 2/3, 01000:0000CD97: L2TP HA FSM:Recv chkpt ack: s/c id 0/52631, CcDwn, 0, len 52 : L2TP HA FSM:Receive CC-ChkptAck : L2TP HA FSM:FSM-CC ev Rx-CkpACK-CcDwn : L2TP HA FSM:FSM-CC Wt-CkptCcDn->Wt-RxStopAck : L2TP HA FSM:FSM-CC do Allow-Tx-STOPCCN4 : L2TP HA FSM:Received Chkpt of CC removal
DB-1532
December 2010
*Aug 26 18:01:22.423: 01000:0000CD97: L2TP HA:Try to remove from CC's ns_q: seq num 5 (current Ns 4) *Aug 26 18:01:22.423: 01000:0000CD97: L2TP HA:Ns entry to remove: not found (current Ns 4) *Aug 26 18:01:22.423: 01000:0000CD97: L2TP HA:CC send all unblocked if can *Aug 26 18:01:22.423: 01000:0000CD97: L2TP HA:CC send one blocked CM (SCCRP): ns 2 (2), nr 4 *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Receive Cm-Ack *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Receive CC Cm-Ack *Aug 26 18:01:22.451: : L2TP HA FSM:FSM-CC ev Rx-CmACK *Aug 26 18:01:22.451: : L2TP HA FSM:FSM-CC Wt-RxStopAck->Wt-CkptCcRm *Aug 26 18:01:22.451: : L2TP HA FSM:FSM-CC do ChkptCcRm3 *Aug 26 18:01:22.451: : L2TP HA FSM:Received STOPCCN-ACK while waiting for it, checkpoint CCRm and remove cc *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA:CC ns_q cleanup: overall head Ns old/new = 4/4 (Q sz 0) *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Checkpoint CcRm *Aug 26 18:01:22.451: L2TP HA CF: Chkpt send: s/c id 0/52631, CcRm, seq 0, ns/nr 3/3, rid 0, len 52; flush = 1, ctr 6 *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 4, peer 3 *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (4,3/3,3, int 4, rx 3, 4) (ns_q sz 0) *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Peer Ns 4 (4), Nr 3 (ns_q sz 0) *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Receive CC-Rm *Aug 26 18:01:22.451: : L2TP HA FSM:FSM-CC ev Proto CcRm *Aug 26 18:01:22.451: : L2TP HA FSM:FSM-CC Wt-CkptCcRm->End *Aug 26 18:01:22.451: : L2TP HA FSM:FSM-CC do RmCc3 *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:CC destruction after Tx/Rx StopCCN LNS1# *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA:CC ns_q cleanup: overall head Ns old/new = 4/4 (Q sz 0) *Aug 26 18:01:22.451: : L2TP HA FSM:Checkpoint CCRm *Aug 26 18:01:22.451: L2TP HA CF: Chkpt send: s/c id 0/52631, CcRm, seq 0, ns/nr 3/3, rid 0, len 52; flush = 1, ctr 7 *Aug 26 18:01:22.451: : L2TP HA:lcm_cc free: l2tp_cc 070B45B8, lcm_cc 02FE55E8 *Aug 26 18:01:22.451: L2TP tnl _____:________: CCM setting state to DOWN *Aug 26 18:01:23.571: : L2TP HA FSM:CHKPT status callback: status 0, len 56 *Aug 26 18:01:23.571: : L2TP HA FSM:Context s/c id 0/52631, CcRm, seq 6, ns/nr 3/3, rid 0, len 52 *Aug 26 18:01:23.571: : L2TP HA FSM:CHKPT status callback: status 0, len 56 *Aug 26 18:01:23.571: : L2TP HA FSM:Context s/c id 0/52631, CcRm, seq 7, ns/nr 3/3, rid 0, len 52 *Aug 26 18:01:23.571: L2TP HA CF: Rcvd status s/c id 0/52631, CcRm, seq 6, ns/nr 3/3, rid 0, len 52 *Aug 26 18:01:23.571: L2TP HA CF: Rcvd status 0: len 56 *Aug 26 18:01:23.571: L2TP HA CF: Status content s/c id 0/52631, CcRm, seq 6, ns/nr 3/3, rid 0, len 52 *Aug 26 18:01:23.571: : L2TP HA FSM:Ignore chkpt ACK: CC not found. LNS1# *Aug 26 18:01:23.571: L2TP HA CF: Rcvd status s/c id 0/52631, CcRm, seq 7, ns/nr 3/3, rid 0, len 52 *Aug 26 18:01:23.571: L2TP HA CF: Rcvd status 0: len 56 *Aug 26 18:01:23.571: L2TP HA CF: Status content s/c id 0/52631, CcRm, seq 7, ns/nr 3/3, rid 0, len 52 *Aug 26 18:01:23.571: : L2TP HA FSM:Ignore chkpt ACK: CC not found. LNS1# *Aug 26 18:01:35.771: %REDUNDANCY-3-STANDBY_LOST: Standby processor fault (PEER_DOWN_INTERRUPT)
DB-1533
Table 207 describes the significant fields shown in the debug l2tp redundancy command output.
Table 207 debug l2tp redundancy Command Field Descriptions
Description Number of L2TP checkpointing-facility events (cf-events). Number of L2TP checkpointing errors. Number of L2TP checkpointing events. Number of L2TP checkpointing fsm events. Number of L2TP checkpointing resynchronized events. Number of L2TP checkpointing redundancy-facility events (rf-events).
Related Commands
Command debug vpdn redundancy l2tp sso enable l2tp tunnel resync show l2tp redundancy show vpdn redundancy sso enable
Description Displays information about VPDN sessions that have redundancy events and errors. Enables L2TP HA. Specifies the number of packets sent before waiting for an acknowledgment message. Displays L2TP sessions containing redundancy data. Displays VPDN sessions containing redundancy data. Enables L2TP HA session for VPDN groups.
DB-1534
December 2010
debug lacp
To enable debugging of all Link Aggregation Control Protocol (LACP) activity, use the debug lacp command in privileged EXEC mode. To disable LACP debugging, use the no form of this command. debug lacp [all | event | fsm | misc | multi-chassis [all | database | lacp-mgr | redundancy-group | user-interface] | packet] no debug lacp [all | event | fsm | misc | multi-chassis [all | database | lacp-mgr | redundancy-group | user-interface] | packet]
Syntax Description
all event fsm misc multi-chassis all database lacp-mgr redundancy-group user-interface packet
(Optional) Activates debugging for all LACP operations. (Optional) Activates debugging of events that occur within LACP. (Optional) Activates debugging for changes within the LACP finite state machine. (Optional) Activates debugging for various operations that may be useful for monitoring the status of LACP. (Optional) Activates multi-chassis LACP (mLACP) debugging. (Optional) Activates all mLACP debugging. (Optional) Activates mLACP database debugging. (Optional) Activates mLACP interface debugging. (Optional) Activates mLACP interchassis redundancy group debugging. (Optional) Activates mLACP interchassis user interface debugging. (Optional) Displays the receiving and transmitting LACP control packets.
Command Default
Command Modes
Command History
Modification Support for this command was introduced on the Cisco Catalyst 4500 series switch. This command was integrated into Cisco IOS Release 12.2(31)SB. Support for this command on the Cisco 7600 router was integrated into Cisco IOS Release 12.2(33)SRB. This command was integrated into Cisco IOS XE Release 2.4. This command was modified. The following keywords were added: multi-chassis, all, database, lacp-mgr, redundancy-group, and user-interface.
DB-1535
Usage Guidelines
Examples
The following sample output from the debug lacp all command shows LACP activity on a port-channel member link Gigabit Ethernet 5/0/0:
Router# debug lacp all Link Aggregation Control Protocol all debugging is on Router1# *Aug 20 17:21:51.685: LACP :lacp_bugpak: Receive LACP-PDU packet via Gi5/0/0 *Aug 20 17:21:51.685: LACP : packet size: 124 *Aug 20 17:21:51.685: LACP: pdu: subtype: 1, version: 1 *Aug 20 17:21:51.685: LACP: Act: tlv:1, tlv-len:20, key:0x1, p-pri:0x8000, p:0x14, p-state:0x3C, s-pri:0xFFFF, s-mac:0011.2026.7300 *Aug 20 17:21:51.685: LACP: Part: tlv:2, tlv-len:20, key:0x5, p-pri:0x8000, p:0x42, p-state:0x3D, s-pri:0x8000, s-mac:0014.a93d.4a00 *Aug 20 17:21:51.685: LACP: col-tlv:3, col-tlv-len:16, col-max-d:0x8000 *Aug 20 17:21:51.685: LACP: term-tlv:0 termr-tlv-len:0 *Aug 20 17:21:51.685: LACP: Gi5/0/0 LACP packet received, processing *Aug 20 17:21:51.685: lacp_rx Gi5: during state CURRENT, got event 5(recv_lacpdu) *Aug 20 17:21:59.869: LACP: lacp_p(Gi5/0/0) timer stopped *Aug 20 17:21:59.869: LACP: lacp_p(Gi5/0/0) expired *Aug 20 17:21:59.869: lacp_ptx Gi5: during state SLOW_PERIODIC, got event 3(pt_expired) *Aug 20 17:21:59.869: @@@ lacp_ptx Gi5: SLOW_PERIODIC -> PERIODIC_TX *Aug 20 17:21:59.869: LACP: Gi5/0/0 lacp_action_ptx_slow_periodic_exit entered *Aug 20 17:21:59.869: LACP: lacp_p(Gi5/0/0) timer stopped *Aug 20 17:22:00.869: LACP: lacp_t(Gi5/0/0) timer stopped *Aug 20 17:22:00.869: LACP: lacp_t(Gi5/0/0) expired *Aug 20 17:22:19.089: LACP :lacp_bugpak: Receive LACP-PDU packet via Gi5/0/0 *Aug 20 17:22:19.089: LACP : packet size: 124 *Aug 20 17:22:19.089: LACP: pdu: subtype: 1, version: 1 *Aug 20 17:22:19.089: LACP: Act: tlv:1, tlv-len:20, key:0x1, p-pri:0x8000, p:0x14, p-state:0x4, s-pri:0xFFFF, s-mac:0011.2026.7300 *Aug 20 17:22:19.089: LACP: Part: tlv:2, tlv-len:20, key:0x5, p-pri:0x8000, p:0x42, p-state:0x34, s-pri:0x8000, s-mac:0014.a93d.4a00 *Aug 20 17:22:19.089: LACP: col-tlv:3, col-tlv-len:16, col-max-d:0x8000 *Aug 20 17:22:19.089: LACP: term-tlv:0 termr-tlv-len:0 *Aug 20 17:22:19.089: LACP: Gi5/0/0 LACP packet received, processing *Aug 20 17:22:19.089: lacp_rx Gi5: during state CURRENT, got event 5(recv_lacpdu) *Aug 20 17:22:19.989: LACP: lacp_t(Gi5/0/0) timer stopped *Aug 20 17:22:19.989: LACP: lacp_t(Gi5/0/0) expired *Aug 20 17:22:19.989: LACP: timer lacp_t(Gi5/0/0) started with interval 1000. *Aug 20 17:22:19.989: LACP: lacp_send_lacpdu: (Gi5/0/0) About to send the 110 LACPDU *Aug 20 17:22:19.989: LACP :lacp_bugpak: Send LACP-PDU packet via Gi5/0/0 *Aug 20 17:22:19.989: LACP : packet size: 124 *Aug 20 17:22:20.957: LACP: lacp_t(Gi5/0/0) timer stopped *Aug 20 17:22:20.957: LACP: lacp_t(Gi5/0/0) expired *Aug 20 17:22:21.205: %LINK-3-UPDOWN: Interface GigabitEthernet5/0/0, changed state to down *Aug 20 17:22:21.205: LACP: lacp_hw_off: Gi5/0/0 is going down *Aug 20 17:22:21.205: LACP: if_down: Gi5/0/0 *Aug 20 17:22:21.205: lacp_ptx Gi5: during state SLOW_PERIODIC, got event 0(no_periodic)
DB-1536
December 2010
*Aug 20 changed *Aug 20 Down *Aug 20 *Aug 20 *Aug *Aug *Aug *Aug *Aug *Aug 20 20 20 20 20 20
17:22:22.089: %LINEPROTO-5-UPDOWN: Line protocol on Interface Port-channel5, state to down 17:22:22.153: %C10K_ALARM-6-INFO: CLEAR CRITICAL GigE 5/0/0 Physical Port Link 17:22:23.413: LACP: Gi5/0/0 oper-key: 0x0 17:22:23.413: LACP: lacp_hw_on: Gi5/0/0 is coming up 17:22:23.413: 17:22:23.413: 17:22:23.413: 17:22:23.413: 17:22:24.153: 17:22:24.153: lacp_ptx Gi5: during state NO_PERIODIC, got event 0(no_periodic) @@@ lacp_ptx Gi5: NO_PERIODIC -> NO_PERIODIC LACP: Gi5/0/0 lacp_action_ptx_no_periodic entered LACP: lacp_p(Gi5/0/0) timer stopped %LINK-3-UPDOWN: Interface GigabitEthernet5/0/0, changed state to up LACP: lacp_hw_on: Gi5/0/0 is coming up lacp_ptx Gi5: during state FAST_PERIODIC, got event @@@ lacp_ptx Gi5: FAST_PERIODIC -> NO_PERIODIC LACP: Gi5/0/0 lacp_action_ptx_fast_periodic_exit entered LACP: lacp_p(Gi5/0/0) timer stopped LACP: LACP: lacp_p(Gi5/0/0) timer stopped LACP: lacp_p(Gi5/0/0) expired lacp_ptx Gi5: during state FAST_PERIODIC, got event @@@ lacp_ptx Gi5: FAST_PERIODIC -> PERIODIC_TX LACP: Gi5/0/0 lacp_action_ptx_fast_periodic_exit entered LACP: lacp_p(Gi5/0/0) timer stopped LACP: lacp_p(Gi5/0/0) timer stopped LACP: lacp_p(Gi5/0/0) expired lacp_ptx Gi5: during state FAST_PERIODIC, got event @@@ lacp_ptx Gi5: FAST_PERIODIC -> PERIODIC_TX LACP: Gi5/0/0 lacp_action_ptx_fast_periodic_exit entered LACP: lacp_p(Gi5/0/0) timer stopped
*Aug 20 17:22:24.153: 0(no_periodic) *Aug 20 17:22:24.153: *Aug 20 17:22:24.153: *Aug 20 17:22:24.153: *Aug 20 17:22:24.153: *Aug 20 17:22:25.021: *Aug 20 17:22:25.021: *Aug 20 17:22:25.021: 3(pt_expired) *Aug 20 17:22:25.021: *Aug 20 17:22:25.021: *Aug 20 17:22:25.021: *Aug 20 17:22:25.917: *Aug 20 17:22:25.917: *Aug 20 17:22:25.917: 3(pt_expired) *Aug 20 17:22:25.917: *Aug 20 17:22:25.917: *Aug 20 17:22:25.917: Router1#
DB-1537
debug ldap
To enable debugging for Lightweight Directory Access Protocol (LDAP) configuration, use the debug ldap command in privileged EXEC mode. To disable debugging, use the no form of this command. debug ldap {all | error | event | legacy | packet} no debug ldap {all | error | event | legacy | packet}
Syntax Description
Displays all event, legacy, and packet related messages. Displays error messages about the local authentication server. Displays debug messages related to LDAP proxy events. Displays legacy messages. Displays the content of the RADIUS packets that are sent and received.
Command Modes
Command History
Release 15.1(1)T
Examples
The following is sample output from the debug ldap legacy command:
Router# debug ldap legacy put_filter "(&(objectclass=*)(cn=firewall_user))" put_filter: AND put_filter_list "(objectclass=*)(cn=firewall_user)" put_filter "(objectclass=*)" put_filter: simple put_filter "(cn=firewall_user)" put_filter: simple Doing socket writeldap_result wait4msg (timeout 0 sec, 1 usec) ldap_select_fd_wait (select) ldap_read_activity lc 0x6804D354 Doing socket read LDAP-TCP:Bytes read = 1478 ldap_match_request succeeded for msgid 2 h 0 ldap_get_dn ldap_get_dn ldap_msgfree ldap_result wait4msg (timeout 0 sec, 1 usec) ldap_read_activity lc 0x6804D354 ldap_match_request succeeded for msgid 2 h 0 changing lr 0x6774F8D4 to COMPLETE as no continuations removing request 0x6774F8D4 from list as lm 0x681C9B78 all 0 ldap_msgfree ldap_msgfree ldap_parse_result
DB-1538
December 2010
ldap_parse_result ldap_req_encode Doing socket writeldap_msgfree ldap_result wait4msg (timeout 0 sec, 1 usec) ldap_select_fd_wait (select) ldap_result wait4msg (timeout 0 sec, 1 usec) ldap_select_fd_wait (select) ldap_read_activity lc 0x6804D354 Doing socket read LDAP-TCP:Bytes read = 22 ldap_match_request succeeded for msgid 3 h 0 changing lr 0x6774F8D4 to COMPLETE as no continuations removing request 0x6774F8D4 from list as lm 0x681C9B78 all 0 ldap_msgfree ldap_msgfree ldap_parse_result ldap_parse_result ldap_msgfree ldap_result wait4msg (timeout 0 sec, 1 usec) ldap_select_fd_wait (select)
Related Commands
Description Creates an IPv4 address within an LDAP server address pool Defines an LDAP server and enters LDAP server configuration mode. Configures the transport protocol for establishing a connection with the LDAP server.
DB-1539
Syntax Description
Displays all debug information related to the LEC. Displays debug information related to the LAN Emulation (LANE) Address Resolution Protocol (ARP) table. Displays debug information to track the following:
MPOA specific TLV information in le-arp requests/responses Elan-id and local segment TLV in lane control frames When a LANE client is bound to an MPC/MPS
Displays debug information about each packet. Displays debug information related to client switched virtual circuits (SVCs). Displays debug information when the state changes. Displays debug information related to the topology of the emulated LAN (ELAN).
interface interface (Optional) Limits the debugging output to messages that relate to a particular interface or subinterface. If you enter this command multiple times with different interfaces, the last interface entered will be the one used to filter the messages.
Defaults
If the interface number is not specified, the default will be the number of all the mpoa lane clients.
Command Modes
Privileged EXEC
Command History
Modification This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug lane client all command can generate a large amount of output. Use a limiting keyword or specify a subinterface to decrease the amount of output and focus on the information you need.
DB-1540
December 2010
Examples
The following example shows output for debug lane client packet and debug lane client state commands for an LEC joining an ELAN named elan1:
Router# debug lane client packet Router# debug lane client state
The LEC listens for signaling calls to its ATM address (Initial State):
LEC ATM2/0.1: sending LISTEN LEC ATM2/0.1: listen on LEC ATM2/0.1: received LISTEN 39.020304050607080910111213.00000CA05B40.01
The LEC calls the LAN Emulation Configuration Server (LECS) and attempts to set up the Configure Direct VC (LECS Connect Phase):
LEC LEC LEC LEC ATM2/0.1: sending SETUP ATM2/0.1: callid ATM2/0.1: called party ATM2/0.1: calling_party 0x6114D174 39.020304050607080910111213.00000CA05B43.00 39.020304050607080910111213.00000CA05B40.01
The LEC receives a CONNECT response from the LECS. The Configure Direct VC is established:
LEC ATM2/0.1: received CONNECT LEC ATM2/0.1: callid LEC ATM2/0.1: vcd 0x6114D174 148
The LEC sends a CONFIG REQUEST to the LECS on the Configure Direct VC (Configuration Phase):
LEC LEC LEC LEC LEC LEC LEC ATM2/0.1: sending LANE_CONFIG_REQ on VCD 148 ATM2/0.1: SRC MAC address 0000.0ca0.5b40 ATM2/0.1: SRC ATM address 39.020304050607080910111213.00000CA05B40.01 ATM2/0.1: LAN Type 2 ATM2/0.1: Frame size 2 ATM2/0.1: LAN Name elan1 ATM2/0.1: LAN Name size 5
The LEC receives a CONFIG RESPONSE from the LECS on the Configure Direct VC:
LEC LEC LEC LEC LEC LEC LEC ATM2/0.1: received LANE_CONFIG_RSP on VCD 148 ATM2/0.1: SRC MAC address 0000.0ca0.5b40 ATM2/0.1: SRC ATM address 39.020304050607080910111213.00000CA05B40.01 ATM2/0.1: LAN Type 2 ATM2/0.1: Frame size 2 ATM2/0.1: LAN Name elan1 ATM2/0.1: LAN Name size 5
DB-1541
The LEC calls the LAN Emulation Server (LES) and attempts to set up the Control Direct VC (Join/Registration Phase):
LEC LEC LEC LEC ATM2/0.1: sending SETUP ATM2/0.1: callid ATM2/0.1: called party ATM2/0.1: calling_party 0x61167110 39.020304050607080910111213.00000CA05B41.01 39.020304050607080910111213.00000CA05B40.01
The LEC receives a CONNECT response from the LES. The Control Direct VC is established:
LEC ATM2/0.1: received CONNECT LEC ATM2/0.1: callid LEC ATM2/0.1: vcd 0x61167110 150
The LEC sends a JOIN REQUEST to the LES on the Control Direct VC:
LEC LEC LEC LEC LEC LEC LEC LEC LEC ATM2/0.1: sending LANE_JOIN_REQ on VCD 150 ATM2/0.1: Status 0 ATM2/0.1: LECID 0 ATM2/0.1: SRC MAC address 0000.0ca0.5b40 ATM2/0.1: SRC ATM address 39.020304050607080910111213.00000CA05B40.01 ATM2/0.1: LAN Type 2 ATM2/0.1: Frame size 2 ATM2/0.1: LAN Name elan1 ATM2/0.1: LAN Name size 5
The LEC receives a SETUP request from the LES to set up the Control Distribute VC:
LEC LEC LEC LEC ATM2/0.1: received SETUP ATM2/0.1: callid ATM2/0.1: called party ATM2/0.1: calling_party 0x6114D174 39.020304050607080910111213.00000CA05B40.01 39.020304050607080910111213.00000CA05B41.01
A CONNECT_ACK is received from the ATM switch. The Control Distribute VC is established:
LEC ATM2/0.1: received CONNECT_ACK The LEC receives a JOIN response from the LES on the Control Direct VC. LEC LEC LEC LEC LEC LEC LEC LEC LEC ATM2/0.1: received LANE_JOIN_RSP on VCD 150 ATM2/0.1: Status 0 ATM2/0.1: LECID 1 ATM2/0.1: SRC MAC address 0000.0ca0.5b40 ATM2/0.1: SRC ATM address 39.020304050607080910111213.00000CA05B40.01 ATM2/0.1: LAN Type 2 ATM2/0.1: Frame size 2 ATM2/0.1: LAN Name elan1 ATM2/0.1: LAN Name size 5
The LEC sends an LE ARP request to the LES to obtain the broadcast and unknown server (BUS) ATM NSAP address (BUS connect):
LEC LEC LEC LEC LEC ATM2/0.1: sending LANE_ARP_REQ on VCD 150 ATM2/0.1: SRC MAC address 0000.0ca0.5b40 ATM2/0.1: SRC ATM address 39.020304050607080910111213.00000CA05B40.01 ATM2/0.1: TARGET MAC address ffff.ffff.ffff ATM2/0.1: TARGET ATM address 00.000000000000000000000000.000000000000.00
DB-1542
December 2010
The LEC receives its own LE ARP request via the LES over the Control Distribute VC:
LEC LEC LEC LEC LEC ATM2/0.1: received LANE_ARP_RSP ATM2/0.1: SRC MAC address ATM2/0.1: SRC ATM address ATM2/0.1: TARGET MAC address ATM2/0.1: TARGET ATM address on VCD 151 0000.0ca0.5b40 39.020304050607080910111213.00000CA05B40.01 ffff.ffff.ffff 39.020304050607080910111213.00000CA05B42.01
The LEC calls the BUS and attempts to set up the Multicast Send VC:
LEC LEC LEC LEC ATM2/0.1: sending SETUP ATM2/0.1: callid ATM2/0.1: called party ATM2/0.1: calling_party 0x6114D354 39.020304050607080910111213.00000CA05B42.01 39.020304050607080910111213.00000CA05B40.01
The LEC receives a CONNECT response from the BUS. The Multicast Send VC is established:
LEC ATM2/0.1: received CONNECT LEC ATM2/0.1: callid LEC ATM2/0.1: vcd 0x6114D354 153
The LEC receives a SETUP request from the BUS to set up the Multicast Forward VC:
LEC LEC LEC LEC ATM2/0.1: received SETUP ATM2/0.1: callid ATM2/0.1: called party ATM2/0.1: calling_party 0x610D4230 39.020304050607080910111213.00000CA05B40.01 39.020304050607080910111213.00000CA05B42.01
A CONNECT_ACK is received from the ATM switch. The Multicast Forward VC is established:
LEC ATM2/0.1: received CONNECT_ACK The LEC moves into the OPERATIONAL state. %LANE-5-UPDOWN: ATM2/0.1 elan elan1: LE Client changed state to up
The following output is from the show lane client command after the LEC joins the emulated LAN as shown in the debug lane client output:
Router# show lane client LE Client ATM2/0.1 ELAN name: elan1 Admin: up State: operational Client ID: 1 LEC up for 1 minute 2 seconds Join Attempt: 1 HW Address: 0000.0ca0.5b40 Type: token ring Max Frame Size: 4544 Ring:1 Bridge:1 ELAN Segment ID: 2048 ATM Address: 39.020304050607080910111213.00000CA05B40.01 VCD rxFrames txFrames Type ATM Address 0 0 0 configure 39.020304050607080910111213.00000CA05B43.00 142 1 2 direct 39.020304050607080910111213.00000CA05B41.01 143 1 0 distribute 39.020304050607080910111213.00000CA05B41.01 145 0 0 send 39.020304050607080910111213.00000CA05B42.01 146 1 0 forward 39.020304050607080910111213.00000CA05B42.01
DB-1543
The following example shows debug lane client all command output when an interface with LECS, an LES/BUS, and an LEC is shut down:
Router# debug lane client all LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: received RELEASE_COMPLETE callid 0x60E8B474 cause code 0 action A_PROCESS_REL_COMP action A_TEARDOWN_LEC sending RELEASE callid 0x60EB6160 cause code 31 sending RELEASE callid 0x60EB7548 cause code 31 sending RELEASE callid 0x60EB9E48 cause code 31 sending CANCEL ATM address 47.00918100000000613E5A2F01.006070174820.02 state ACTIVE event LEC_SIG_RELEASE_COMP => TERMINATING received RELEASE_COMPLETE callid 0x60E8D108 cause code 0 action A_PROCESS_REL_COMP action A_TEARDOWN_LEC sending RELEASE callid 0x60EB66D4 cause code 31 sending RELEASE callid 0x60EB7B8C cause code 31 sending RELEASE callid 0x60EBA3BC cause code 31 sending CANCEL ATM address 47.00918100000000613E5A2F01.006070174820.03 state ACTIVE event LEC_SIG_RELEASE_COMP => TERMINATING received RELEASE_COMPLETE callid 0x60EB7548 cause code 0 action A_PROCESS_TERM_REL_COMP state TERMINATING event LEC_SIG_RELEASE_COMP => TERMINATING received RELEASE_COMPLETE callid 0x60EB7B8C cause code 0 action A_PROCESS_TERM_REL_COMP state TERMINATING event LEC_SIG_RELEASE_COMP => TERMINATING received RELEASE_COMPLETE callid 0x60EBC458 cause code 0 action A_PROCESS_REL_COMP action A_TEARDOWN_LEC sending RELEASE callid 0x60EBD30C cause code 31 sending RELEASE callid 0x60EBDD28 cause code 31 sending RELEASE callid 0x60EBF174 cause code 31 sending CANCEL
DB-1544
December 2010
LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC LEC
ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.2: ATM1/0.2: ATM1/0.3: ATM1/0.3: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3:
ATM address 47.00918100000000613E5A2F01.006070174820.01 state ACTIVE event LEC_SIG_RELEASE_COMP => TERMINATING received RELEASE_COMPLETE callid 0x60EBDD28 cause code 0 action A_PROCESS_TERM_REL_COMP state TERMINATING event LEC_SIG_RELEASE_COMP => TERMINATING received RELEASE_COMPLETE callid 0x60EB6160 cause code 0 action A_PROCESS_TERM_REL_COMP state TERMINATING event LEC_SIG_RELEASE_COMP => TERMINATING received RELEASE_COMPLETE callid 0x60EB66D4 cause code 0 action A_PROCESS_TERM_REL_COMP state TERMINATING event LEC_SIG_RELEASE_COMP => TERMINATING received RELEASE_COMPLETE callid 0x60EB9E48 cause code 0 action A_PROCESS_TERM_REL_COMP state TERMINATING event LEC_SIG_RELEASE_COMP => IDLE received RELEASE_COMPLETE callid 0x60EBA3BC cause code 0 action A_PROCESS_TERM_REL_COMP state TERMINATING event LEC_SIG_RELEASE_COMP => IDLE received RELEASE_COMPLETE callid 0x60EBD30C cause code 0 action A_PROCESS_TERM_REL_COMP state TERMINATING event LEC_SIG_RELEASE_COMP => TERMINATING received RELEASE_COMPLETE callid 0x60EBF174 cause code 0 action A_PROCESS_TERM_REL_COMP state TERMINATING event LEC_SIG_RELEASE_COMP => IDLE received CANCEL state IDLE event LEC_SIG_CANCEL => IDLE received CANCEL state IDLE event LEC_SIG_CANCEL => IDLE received CANCEL state IDLE event LEC_SIG_CANCEL => IDLE action A_SHUTDOWN_LEC sending CANCEL ATM address 47.00918100000000613E5A2F01.006070174820.01 state IDLE event LEC_LOCAL_DEACTIVATE => IDLE action A_SHUTDOWN_LEC sending CANCEL ATM address 47.00918100000000613E5A2F01.006070174820.02 state IDLE event LEC_LOCAL_DEACTIVATE => IDLE action A_SHUTDOWN_LEC sending CANCEL ATM address 47.00918100000000613E5A2F01.006070174820.03 state IDLE event LEC_LOCAL_DEACTIVATE => IDLE
DB-1545
The following output is from the debug lane client mpoa command when the lane interface is shut down:
Router# debug lane client mpoa Router#conf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#int atm 1/1/0.1 Router(config-subif)#shutdown Router(config-subif)# 00:23:32:%LANE-5-UPDOWN:ATM1/1/0.1 elan elan2:LE Client changed state to down 00:23:32:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN 00:23:32:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN Router(config-subif)# Router(config-subif)# Router(config-subif)# Router(config-subif)#exit Router(config)#exit
The following output is from the debug lane client mpoa command when the lane interface is started (not shut down):
Router# debug lane client mpoa Router#conf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#int atm 1/1/0.1 Router(config-subif)# Router(config-subif)# Router(config-subif)#no shutdown Router(config-subif)# 00:23:39:LEC ATM1/1/0.1:lec_process_lane_tlv:msg LANE_CONFIG_RSP, num_tlvs 14 00:23:39:LEC ATM1/1/0.1:elan id from LECS set to 300 00:23:39:LEC ATM1/1/0.1:lec_process_lane_tlv:msg LANE_JOIN_RSP, num_tlvs 1 00:23:39:LEC ATM1/1/0.1:elan id from LES set to 300 00:23:39:LEC ATM1/1/0.1:lec_append_mpoa_dev_tlv: 00:23:39:LEC ATM1/1/0.1:got mpoa client addr 47.0091810000000050E2097801.0050A 29AF42D.00 00:23:39:%LANE-5-UPDOWN:ATM1/1/0.1 elan elan2:LE Client changed state to up 00:23:39:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:UP 00:25:57:LEC ATM1/1/0.1:lec_process_lane_tlv:msg LANE_ARP_REQ, num_tlvs 1 00:25:57:LEC ATM1/1/0.1:lec_process_dev_type_tlv: lec 47.0091810000000050E 2097801.00500B306440.02 type MPS, mpc 00.000000000000000000000000.000000000000.00 mps 47.0091810000000050E2097801.00500B306444.00, num_mps_mac 1, mac 0050.0b3 0.6440 00:25:57:LEC ATM1/1/0.1:create mpoa_lec 00:25:57:LEC ATM1/1/0.1:new mpoa_lec 0x617E3118 00:25:57:LEC ATM1/1/0.1:lec_process_dev_type_tlv:type MPS, num _mps_mac 1 00:2t 5:57:LEC ATM1/1/0.1:lec_add_mps: remote lec 47.0091810000000050E2097801.00500B306440.02 mps 47.0091810000000050E2097801.00500B306444.00 num_mps_mac 1, mac 0050.0b30 .6440 00:25:57:LEC ATM1/1/0.1:mpoa_device_change:lec_nsap 47.0091810000000050E20978 01.00500B306440.02, appl_type 5 mpoa_nsap 47.0091810000000050E2097801.00500B306444.00, opcode 4 00:25:57:LEC ATM1/1/0.1:lec_add_mps:add mac 0050.0b30.6440, mps_mac 0x617E372 C 00:25:57:LEC ATM1/1/0.1:mpoa_device_change:lec_nsap 47.0091810000000050E20978 01.00500B306440.02, appl_type 5 mpoa_nsap 47.0091810000000050E2097801.00500B306444.00, opcode 5 00:25:57:LEC ATM1/1/0.1: mps_mac 0050.0b30.6440 00:25:57:LEC ATM1/1/0.1:lec_append_mpoa_dev_tlv:
DB-1546
December 2010
The following output is from the debug lane client mpoa command when the ATM major interface is shut down:
Router# debug lane client mpoa Router# conf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#int atm 1/1/0 Router(config-if)# shutdown Router(config-if)# 00:26:28:LANE ATM1/1/0:atm hardware reset 00:26:28:%LANE-5-UPDOWN:ATM1/1/0.1 elan elan2:LE Client changed state to down 00:26:28:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN 00:26:28:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN 00:26:28:%MPOA-5-UPDOWN:MPC mpc2:state changed to down 00:26:28:LEC ATM1/1/0.1:mpoa_to_lec:appl 6, opcode 0 00:26:30:%LINK-5-CHANGED:Interface ATM1/1/0, changed state to administratively down 00:26:30:LANE ATM1/1/0:atm hardware reset 00:26:31:%LINEPROTO-5-UPDOWN:Line protocol on Interface ATM1/1/0, changed stat e to down Router(config-if)# 00:26:31:LEC ATM1/1/0.1:mpoa_to_lec:appl 6, opcode 0 00:26:32:LANE ATM1/1/0:atm hardware reset 00:26:32:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN 00:26:34:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN Router(config-if)# exit Router(config)# exit
The following output is from the debug lane client mpoa command when the ATM major interface is started:
Router# debug lane client mpoa Router# conf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)# int atm 1/1/0 Router(config-if)# no shutdown 00:26:32:LANE ATM1/1/0:atm hardware reset 00:26:32:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN 00:26:34:%LINK-3-UPDOWN:Interface ATM1/1/0, changed state to down 00:26:34:LANE ATM1/1/0:atm hardware reset 00:26:41:%LINK-3-UPDOWN:Interface ATM1/1/0, changed state to up 00:26:42:%LINEPROTO-5-UPDOWN:Line protocol on Interface ATM1/1/0, changed stat e to up 00:27:10:%LANE-6-INFO:ATM1/1/0:ILMI prefix add event received 00:27:10:LANE ATM1/1/0:prefix add event for 470091810000000050E2097801 ptr=0x6 17BFC0C len=13 00:27:10: the current first prefix is now:470091810000000050E2097801 00:27:10:%ATMSSCOP-5-SSCOPINIT:- Intf :ATM1/1/0, Event :Rcv End, State :Act ive. 00:27:10:LEC ATM1/1/0.1:mpoa_to_lec:appl 6, opcode 0 00:27:10:%LANE-3-NOREGILMI:ATM1/1/0.1 LEC cannot register 47.0091810000000050E 2097801.0050A29AF428.01 with ILMI 00:27:10:%LANE-6-INFO:ATM1/1/0:ILMI prefix add event received 00:27:10:LANE ATM1/1/0:prefix add event for 470091810000000050E2097801 ptr=0x6 17B8E6C len=13
DB-1547
00:27:10: the current first prefix is now:470091810000000050E2097801 00:27:10:%LANE-5-UPDOWN:ATM1/1/0.1 elan elan2:LE Client changed state to down 00:27:10:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN 00:27:10:LEC ATM1/1/0.1:mpoa_to_lec:appl 6, opcode 0 00:27:10:%MPOA-5-UPDOWN:MPC mpc2:state changed to up 00:27:10:LEC ATM1/1/0.1:mpoa_to_lec:appl 6, opcode 1 00:27:12:LEC ATM1/1/0.1:lec_process_lane_tlv:msg LANE_CONFIG_RSP, num_tlvs 14 00:27:12:LEC ATM1/1/0.1:elan id from LECS set to 300 00:27:12:LEC ATM1/1/0.1:lec_process_lane_tlv:msg LANE_JOIN_RSP, num_tlvs 1 00:27:12:LEC ATM1/1/0.1:elan id from LES set to 300 00:27:12:LEC ATM1/1/0.1:lec_append_mpoa_dev_tlv: 00:27:12:LEC ATM1/1/0.1:got mpoa client addr 47.0091810000000050E2097801.0050A 29AF42D.00 00:27:12:%LANE-5-UPDOWN:ATM1/1/0.1 elan elan2:LE Client changed state to up 00:27:12:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:UP Router(config-if)#exit Router(config)#exit
Related Commands
Description Displays MPC debug information. Displays information about the MPOA server.
DB-1548
December 2010
Syntax Description
all
Displays all debugging messages related to the LANE configuration server. The output includes both the events and packets types of output. Displays only messages related to significant LANE configuration server events. Displays information on each packet sent or received by the LANE configuration server.
events packets
Command Modes
Privileged EXEC
Usage Guidelines
The debug lane config output is intended to be used primarily by a Cisco technical support representative.
Examples
The following is sample output from the debug lane config all command when an interface with LECS, an LES/BUS, and an LEC is shut down:
Router# debug lane config all LECS EVENT ATM1/0: processing interface down transition LECS EVENT ATM1/0: placed de-register address 0x60E8A824 (47.00918100000000613E5A2F01.006070174823.00) request with signalling LECS EVENT ATM1/0: ilmiDeRegisterAddress: sendSetRequestToILMI failure; interface down LECS EVENT ATM1/0: placed de-register address 0x60EC4F28 (47.007900000000000000000000.00A03E000001.00) request with signalling LECS EVENT ATM1/0: ilmiDeRegisterAddress: sendSetRequestToILMI failure; interface down LECS EVENT ATM1/0: placed de-register address 0x60EC5C08 (47.00918100000000613E5A2F01.006070174823.99) request with signalling LECS EVENT ATM1/0: ilmiDeRegisterAddress: sendSetRequestToILMI failure; interface down LECS EVENT ATM1/0: tearing down all connexions LECS EVENT ATM1/0: elan 'xxx' LES 47.00918100000000613E5A2F01.006070174821.01 callId 0x60CE0F58 deliberately being disconnected LECS EVENT ATM1/0: sending RELEASE for call 0x60CE0F58 cause 31 LECS EVENT ATM1/0: elan 'yyy' LES 47.00918100000000613E5A2F01.006070174821.02 callId 0x60CE2104 deliberately being disconnected LECS EVENT ATM1/0: sending RELEASE for call 0x60CE2104 cause 31 LECS EVENT ATM1/0: elan 'zzz' LES 47.00918100000000613E5A2F01.006070174821.03 callId 0x60CE2DC8 deliberately being disconnected LECS EVENT ATM1/0: sending RELEASE for call 0x60CE2DC8 cause 31 LECS EVENT ATM1/0: All calls to/from LECSs are being released LECS EVENT ATM1/0: placed de-register address 0x60EC4F28 (47.007900000000000000000000.00A03E000001.00) request with signalling LECS EVENT ATM1/0: ilmiDeRegisterAddress: sendSetRequestToILMI failure; interface down
DB-1549
LECS EVENT ATM1/0: ATM_RELEASE_COMPLETE received: callId 0x60CE0F58 cause 0 LECS EVENT ATM1/0: call 0x60CE0F58 cleaned up LECS EVENT ATM1/0: ATM_RELEASE_COMPLETE received: callId 0x60CE2104 cause 0 LECS EVENT ATM1/0: call 0x60CE2104 cleaned up LECS EVENT ATM1/0: ATM_RELEASE_COMPLETE received: callId 0x60CE2DC8 cause 0 LECS EVENT ATM1/0: call 0x60CE2DC8 cleaned up LECS EVENT ATM1/0: UNKNOWN/UNSET: signalling DE-registered LECS EVENT: UNKNOWN/UNSET: signalling DE-registered LECS EVENT ATM1/0: UNKNOWN/UNSET: signalling DE-registered LECS EVENT ATM1/0: placed de-register address 0x60E8A824 (47.00918100000000613E5A2F01.006070174823.00) request with signalling LECS EVENT ATM1/0: ilmiDeRegisterAddress: sendSetRequestToILMI failure; interface down ? LECS EVENT ATM1/0: placed de-register address 0x60EC5C08 (47.00918100000000613E5A2F01.006070174823.99) request with signalling LECS EVENT ATM1/0: ilmiDeRegisterAddress: sendSetRequestToILMI failure; interface down ? LECS EVENT ATM1/0: tearing down all connexions LECS EVENT ATM1/0: All calls to/from LECSs are being released LECS EVENT: config server 56 killed
DB-1550
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug lane finder command output is intended to be used primarily by a Cisco technical support representative.
Examples
The following is sample output from the debug lane finder command when an interface with LECS, LES/BUS, and LEC is shut down:
Router# debug lane finder LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS LECS FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER FINDER ATM1/0.3: user request 1819 of type GET_MASTER_LECS_ADDRESS queued up ATM1/0: finder state machine started ATM1/0: time to perform a getNext on the ILMI ATM1/0: LECS 47.00918100000000613E5A2F01.006070174823.00 deleted ATM1/0: ilmi_client_request failed, answering all users ATM1/0: answering all requests now ATM1/0: responded to user request 1819 ATM1/0: number of remaining requests still to be processed: 0 ATM1/0.2: user request 1820 of type GET_MASTER_LECS_ADDRESS queued up ATM1/0: finder state machine started ATM1/0: time to perform a getNext on the ILMI ATM1/0: ilmi_client_request failed, answering all users ATM1/0: answering all requests now ATM1/0: responded to user request 1820 ATM1/0: number of remaining requests still to be processed: 0 ATM1/0.1: user request 1821 of type GET_MASTER_LECS_ADDRESS queued up ATM1/0: finder state machine started ATM1/0: time to perform a getNext on the ILMI ATM1/0: ilmi_client_request failed, answering all users ATM1/0: answering all requests now ATM1/0: responded to user request 1821 ATM1/0: number of remaining requests still to be processed: 0
DB-1551
Syntax Description
interface interface
(Optional) Limits the debugging output to messages relating to a specific interface or subinterface. If you use this command multiple times with different interfaces, the last interface entered is the one used to filter debugging messages.
Command Modes
Privileged EXEC
Usage Guidelines
The debug lane server command output is intended to be used primarily by a Cisco technical support representative. The debug lane server command can generate a substantial amount of output. Specify a subinterface to decrease the amount of output and focus on the information you need.
Examples
The following is sample output from the debug lane server command when an interface with LECS, LES/BUS, and LEC is shut down:
Router# debug lane server LES ATM1/0.1: lsv_lecsAccessSigCB called with callId 0x60CE124C, opcode ATM_RELEASE_COMPLETE LES ATM1/0.1: disconnected from the master LECS LES ATM1/0.1: should have been connected, will reconnect in 3 seconds LES ATM1/0.2: lsv_lecsAccessSigCB called with callId 0x60CE29E0, opcode ATM_RELEASE_COMPLETE LES ATM1/0.2: disconnected from the master LECS LES ATM1/0.2: should have been connected, will reconnect in 3 seconds LES ATM1/0.3: lsv_lecsAccessSigCB called with callId 0x60EB1940, opcode ATM_RELEASE_COMPLETE LES ATM1/0.3: disconnected from the master LECS LES ATM1/0.3: should have been connected, will reconnect in 3 seconds LES ATM1/0.2: elan yyy client 1 lost control distribute LES ATM1/0.2: elan yyy client 1: lsv_kill_client called LES ATM1/0.2: elan yyy client 1 state change Oper -> Term LES ATM1/0.3: elan zzz client 1 lost control distribute LES ATM1/0.3: elan zzz client 1: lsv_kill_client called LES ATM1/0.3: elan zzz client 1 state change Oper -> Term LES ATM1/0.2: elan yyy client 1 lost MC forward LES ATM1/0.2: elan yyy client 1: lsv_kill_client called LES ATM1/0.3: elan zzz client 1 lost MC forward LES ATM1/0.3: elan zzz client 1: lsv_kill_client called LES ATM1/0.1: elan xxx client 1 lost control distribute LES ATM1/0.1: elan xxx client 1: lsv_kill_client called LES ATM1/0.1: elan xxx client 1 state change Oper -> Term LES ATM1/0.1: elan xxx client 1 lost MC forward LES ATM1/0.1: elan xxx client 1: lsv_kill_client called
DB-1552
December 2010
LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES LES
ATM1/0.2: ATM1/0.2: ATM1/0.3: ATM1/0.3: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.1: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.2: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3: ATM1/0.3:
elan yyy client 1 released control direct elan yyy client 1: lsv_kill_client called elan zzz client 1 released control direct elan zzz client 1: lsv_kill_client called elan yyy client 1 MC forward released elan yyy client 1: lsv_kill_client called elan yyy client 1: freeing client structures elan yyy client 1 unregistered 0060.7017.4820 elan yyy client 1 destroyed elan zzz client 1 MC forward released elan zzz client 1: lsv_kill_client called elan zzz client 1: freeing client structures elan zzz client 1 unregistered 0060.7017.4820 elan zzz client 1 destroyed elan xxx client 1 released control direct elan xxx client 1: lsv_kill_client called elan xxx client 1 MC forward released elan xxx client 1: lsv_kill_client called elan xxx client 1: freeing client structures elan xxx client 1 unregistered 0060.7017.4820 elan xxx client 1 destroyed elan xxx major interface state change cleanupLecsAccess: discarding all validation requests shutting down elan xxx: lsv_kill_lesbus called elan xxx: LES/BUS state change operational -> terminating cleanupLecsAccess: discarding all validation requests elan yyy major interface state change cleanupLecsAccess: discarding all validation requests shutting down elan yyy: lsv_kill_lesbus called elan yyy: LES/BUS state change operational -> terminating cleanupLecsAccess: discarding all validation requests elan zzz major interface state change cleanupLecsAccess: discarding all validation requests shutting down elan zzz: lsv_kill_lesbus called elan zzz: LES/BUS state change operational -> terminating cleanupLecsAccess: discarding all validation requests elan xxx: lsv_kill_lesbus called cleanupLecsAccess: discarding all validation requests elan xxx: lsv_kill_lesbus called cleanupLecsAccess: discarding all validation requests elan xxx: stopped listening on addresses elan xxx: all clients killed elan xxx: multicast groups killed elan xxx: addresses de-registered from ilmi elan xxx: LES/BUS state change terminating -> down elan xxx: administratively down elan yyy: lsv_kill_lesbus called cleanupLecsAccess: discarding all validation requests elan yyy: lsv_kill_lesbus called cleanupLecsAccess: discarding all validation requests elan yyy: stopped listening on addresses elan yyy: all clients killed elan yyy: multicast groups killed elan yyy: addresses de-registered from ilmi elan yyy: LES/BUS state change terminating -> down elan yyy: administratively down elan zzz: lsv_kill_lesbus called cleanupLecsAccess: discarding all validation requests elan zzz: lsv_kill_lesbus called cleanupLecsAccess: discarding all validation requests elan zzz: stopped listening on addresses
DB-1553
elan zzz: all clients killed elan zzz: multicast groups killed elan zzz: addresses de-registered from ilmi elan zzz: LES/BUS state change terminating -> down elan zzz: administratively down cleanupLecsAccess: discarding all validation requests cleanupLecsAccess: discarding all validation requests cleanupLecsAccess: discarding all validation requests
DB-1554
December 2010
Syntax Description
interface interface
(Optional) Limits the debugging output to messages relating to a specific interface or subinterface. If you use this command multiple times with different interfaces, the last interface entered is the one used to filter debugging messages.
Command Modes
Privileged EXEC
Usage Guidelines
The debug lane signaling command output is intended to be used primarily by a Cisco technical support representative. The debug lane signaling command can generate a substantial amount of output. Specify a subinterface to decrease the amount of output and focus on the information you need.
Examples
The following is sample output from the debug lane signaling command when an interface with LECS, LES/BUS, and LEC is shut down:
Router# debug lane signaling LANE SIG ATM1/0.2: received ATM_RELEASE_COMPLETE callid 0x60EB565C cause 0 lv 0x60E8D348 lvstate LANE_VCC_CONNECTED LANE SIG ATM1/0.2: lane_sig_mc_release: breaking lv 0x60E8D348 from mcg 0x60E97E84 LANE SIG ATM1/0.2: timer for lv 0x60E8D348 stopped LANE SIG ATM1/0.2: sent ATM_RELEASE request for lv 0x60E8D468 in state LANE_VCC_CONNECTED LANE SIG ATM1/0.2: sent ATM_RELEASE request for lv 0x60E8D3D8 in state LANE_VCC_CONNECTED LANE SIG ATM1/0.2: sent ATM_RELEASE request for lv 0x60E8D2B8 in state LANE_VCC_CONNECTED LANE SIG ATM1/0.3: received ATM_RELEASE_COMPLETE callid 0x60EB5CA0 cause 0 lv 0x60E8BEF4 lvstate LANE_VCC_CONNECTED LANE SIG ATM1/0.3: lane_sig_mc_release: breaking lv 0x60E8BEF4 from mcg 0x60E9A37C LANE SIG ATM1/0.3: timer for lv 0x60E8BEF4 stopped LANE SIG ATM1/0.3: sent ATM_RELEASE request for lv 0x60E8C014 in state LANE_VCC_CONNECTED LANE SIG ATM1/0.3: sent ATM_RELEASE request for lv 0x60E8BF84 in state LANE_VCC_CONNECTED LANE SIG ATM1/0.3: sent ATM_RELEASE request for lv 0x60E8BE64 in state LANE_VCC_CONNECTED LANE SIG ATM1/0.2: received ATM_RELEASE_COMPLETE callid 0x60EB9040 cause 0 lv 0x60E8D468 lvstate LANE_VCC_DROP_SENT LANE SIG ATM1/0.2: lane_sig_mc_release: breaking lv 0x60E8D468 from mcg 0x60E97EC8 LANE SIG ATM1/0.2: timer for lv 0x60E8D468 stopped LANE SIG ATM1/0.3: received ATM_RELEASE_COMPLETE callid 0x60EB97D4 cause 0 lv 0x60E8C014 lvstate LANE_VCC_DROP_SENT LANE SIG ATM1/0.3: lane_sig_mc_release: breaking lv 0x60E8C014 from mcg 0x60E9A3C0 LANE SIG ATM1/0.3: timer for lv 0x60E8C014 stopped LANE SIG ATM1/0.1: received ATM_RELEASE_COMPLETE callid 0x60EBCEB8 cause 0 lv 0x60EBBAF0 lvstate LANE_VCC_CONNECTED LANE SIG ATM1/0.1: lane_sig_mc_release: breaking lv 0x60EBBAF0 from mcg 0x60E8F51C LANE SIG ATM1/0.1: timer for lv 0x60EBBAF0 stopped
DB-1555
LANE SIG ATM1/0.1: sent ATM_RELEASE request for lv 0x60EBBC10 in state LANE_VCC_CONNECTED LANE SIG ATM1/0.1: sent ATM_RELEASE request for lv 0x60EBBB80 in state LANE_VCC_CONNECTED LANE SIG ATM1/0.1: sent ATM_RELEASE request for lv 0x60EBBA60 in state LANE_VCC_CONNECTED LANE SIG ATM1/0.1: received ATM_RELEASE_COMPLETE callid 0x60EBEB00 cause 0 lv 0x60EBBC10 lvstate LANE_VCC_DROP_SENT LANE SIG ATM1/0.1: lane_sig_mc_release: breaking lv 0x60EBBC10 from mcg 0x60E8F560 LANE SIG ATM1/0.1: timer for lv 0x60EBBC10 stopped LANE SIG ATM1/0.2: received ATM_RELEASE_COMPLETE callid 0x60E8B174 cause 0 lv 0x60E8D2B8 lvstate LANE_VCC_RELEASE_SENT LANE SIG ATM1/0.2: timer for lv 0x60E8D2B8 stopped LANE SIG ATM1/0.3: received ATM_RELEASE_COMPLETE callid 0x60E8B990 cause 0 lv 0x60E8BE64 lvstate LANE_VCC_RELEASE_SENT LANE SIG ATM1/0.3: timer for lv 0x60E8BE64 stopped LANE SIG ATM1/0.2: received ATM_RELEASE_COMPLETE callid 0x60EB7FE0 cause 0 lv 0x60E8D3D8 lvstate LANE_VCC_RELEASE_SENT LANE SIG ATM1/0.2: timer for lv 0x60E8D3D8 stopped LANE SIG ATM1/0.3: received ATM_RELEASE_COMPLETE callid 0x60EB8554 cause 0 lv 0x60E8BF84 lvstate LANE_VCC_RELEASE_SENT LANE SIG ATM1/0.3: timer for lv 0x60E8BF84 stopped LANE SIG ATM1/0.1: received ATM_RELEASE_COMPLETE callid 0x60EBB6D4 cause 0 lv 0x60EBBA60 lvstate LANE_VCC_RELEASE_SENT LANE SIG ATM1/0.1: timer for lv 0x60EBBA60 stopped LANE SIG ATM1/0.1: received ATM_RELEASE_COMPLETE callid 0x60EBE24C cause 0 lv 0x60EBBB80 lvstate LANE_VCC_RELEASE_SENT LANE SIG ATM1/0.1: timer for lv 0x60EBBB80 stopped LANE SIG ATM1/0.1: sent ATM_CANCEL_NSAP request for lv 0x0 in state NULL_VCC_POINTER LANE SIG ATM1/0.1: sent ATM_CANCEL_NSAP request for lv 0x0 in state NULL_VCC_POINTER LANE SIG ATM1/0.2: sent ATM_CANCEL_NSAP request for lv 0x0 in state NULL_VCC_POINTER LANE SIG ATM1/0.2: sent ATM_CANCEL_NSAP request for lv 0x0 in state NULL_VCC_POINTER LANE SIG ATM1/0.3: sent ATM_CANCEL_NSAP request for lv 0x0 in state NULL_VCC_POINTER LANE SIG ATM1/0.3: sent ATM_CANCEL_NSAP request for lv 0x0 in state NULL_VCC_POINTER LANE SIG ATM1/0.1: received ATM_CANCEL_NSAP for nsap 00.000000000000050000000000.000000000000.00 LANE SIG ATM1/0.1: received ATM_CANCEL_NSAP for nsap 00.000000000000050000000000.000000000000.00 LANE SIG ATM1/0.2: received ATM_CANCEL_NSAP for nsap 00.000000000000050000000000.000000000000.00 LANE SIG ATM1/0.2: received ATM_CANCEL_NSAP for nsap 00.000000000000050000000000.000000000000.00 LANE SIG ATM1/0.3: received ATM_CANCEL_NSAP for nsap 00.000000000000050000000000.000000000000.00 LANE SIG ATM1/0.3: received ATM_CANCEL_NSAP for nsap 00.000000000000050000000000.000000000000.00
DB-1556
December 2010
debug lapb
To display all traffic for interfaces using Link Access Procedure, Balanced (LAPB) encapsulation, use the debug lapb command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug lapb no debug lapb
Syntax Description
Command Modes
Command History
Release 11.0
Usage Guidelines
This command displays information on the X.25 Layer 2 protocol. It is useful to users familiar with the LAPB protocol. You can use the debug lapb command to determine why X.25 interfaces or LAPB connections are going up and down. It is also useful for identifying link problems, as evidenced when the show interfaces EXEC command displays a high number of rejects or frame errors over the X.25 link. The debug lapb command can generate debugging messages of LAPB on all interfaces configured with the encapsulation lapb command or when X.25 traffic is present on interfaces configured with the encapsulation x25 command. LAPB debugging produces a substantial amount of data and makes debugging very tedious. The problem becomes more severe if the network contains a large number of X.25 interfaces. Therefore the LAPB debugs are set to be available for individual interface.
Caution
Because the debug lapb command generates a substantial amount of output, use it when the aggregate of all LAPB traffic on X.25 and LAPB interfaces is fewer than five frames per second.
Examples
The following is sample output from the debug lapb command (the numbers 1 through 7 at the top of the display have been added in order to aid documentation):
1 Serial0: Serial0: Serial0: Serial0: Serial0: Serial0: Serial0: Serial0: 2 LAPB LAPB LAPB LAPB LAPB LAPB LAPB LAPB 3 4 5 6 7 I CONNECT (5) IFRAME P 2 1 O REJSENT (2) REJ F 3 O REJSENT (5) IFRAME 0 3 I REJSENT (2) REJ (C) 7 I DISCONNECT (2) SABM P O CONNECT (2) UA F O CONNECT (5) IFRAME 0 0 T1 CONNECT 357964 0
DB-1557
Each line of output describes a LAPB event. There are two types of LAPB events: frame events (when a frame enters or exits the LAPB) and timer events. In the sample output, the last line describes a timer event; all of the other lines describe frame events. Table 208 describes the first seven fields.
Table 208 debug lapb Field Descriptions
Field First field (1) Second field (2) Third field (3)
Description Interface type and unit number reporting the frame event. Protocol providing the information. Frame event type. Possible values are as follows:
IFrame input OFrame output T1T1 timer expired T3Interface outage timer expired T4Idle link timer expired
State of the protocol when the frame event occurred. Possible values are as follows:
BUSY (RNR frame received) CONNECT DISCONNECT DISCSENT (disconnect sent) ERROR (FRMR frame sent) REJSENT (reject frame sent) SABMSENT (SABM frame sent)
In a frame event, this value is the size of the frame (in bytes). In a timer event, this value is the current timer value (in milliseconds).
DB-1558
December 2010
Table 208
Description In a frame event, this value is the frame type name. Possible values for frame type names are as follows:
DISCDisconnect DMDisconnect mode FRMRFrame reject IFRAMEInformation frame ILLEGALIllegal LAPB frame REJReject RNRReceiver not ready RRReceiver ready SABMSet asynchronous balanced mode SABMESet asynchronous balanced mode, extended UAUnnumbered acknowledgment
In a T1 timer event, this value is the number of retransmissions already attempted. Seventh field (7) (This field will not print if the frame control field is required to appear as either a command or a response, and that frame type is correct.) This field is present only in frame events. It describes the frame type identified by the LAPB address and Poll/Final bit. Possible values are as follows:
(C)Command frame (R)Response frame PCommand/Poll frame FResponse/Final frame /ERRCommand/Response type is invalid for the control field. An ?ERR generally means that the data terminal equipment (DTE)/data communications equipment (DCE) assignments are not correct for this link. BAD-ADDRAddress field is neither Command nor Response
A timer event displays only the first six fields of debug lapb command output. For frame events, however, the seventh field documents the LAPB control information present in the frame. Depending on the value of the frame type name shown in the sixth field, the seventh field may or may not appear. After the Poll/Final indicator, depending on the frame type, three different types of LAPB control information can be printed. For information frames, the value of the N(S) field and the N(R) field will be printed. The N(S) field of an information frame is the sequence number of that frame, so this field will rotate between 0 and 7 for (modulo 8 operation) or 0 and 127 (for modulo 128 operation) for successive outgoing information frames and (under normal circumstances) also will rotate for incoming information frame streams. The N(R) field is a piggybacked acknowledgment for the incoming information frame stream; it informs the other end of the link which sequence number is expected next.
DB-1559
RR, RNR, and REJ frames have an N(R) field, so the value of that field is printed. This field has exactly the same significance that it does in an information frame. For the FRMR frame, the error information is decoded to display the rejected control field, V(R) and V(S) values, the Response/Command flag, and the error flags WXYZ. In the following example, the output shows an idle link timer action (T4) where the timer expires twice on an idle link, with the value of T4 set to five seconds:
Serial2: Serial2: Serial2: Serial2: Serial2: Serial2: LAPB LAPB LAPB LAPB LAPB LAPB T4 CONNECT 255748 O CONNECT (2) RR P I CONNECT (2) RR F T4 CONNECT 260748 O CONNECT (2) RR P I CONNECT (2) RR F 5 5 5 5
The following example output shows an error condition when no DCE to DTE connection exists. Note that if a frame has only one valid type (for example, a SABM can only be a command frame), a received frame that has the wrong frame type will be flagged as a receive error (R/ERR in the following output). This feature makes misconfigured links (DTE-DTE or DCE-DCE) easy to spot. Other less common errors will also be highlighted, such as a too-short or too-long frame or an invalid address (neither command nor response).
Serial2: Serial2: Serial2: Serial2: Serial2: Serial2: LAPB LAPB LAPB LAPB LAPB LAPB T1 SABMSENT 1026508 O SABMSENT (2) SABM I SABMSENT (2) SABM T1 SABMSENT 1029508 O SABMSENT (2) SABM I SABMSENT (2) SABM 1 P (R/ERR) 2 P (R/ERR)
The output in the next example shows tha the router is misconfigured and has a standard (modulo 8) interface connected to an extended (modulo 128) interface. This condition is indicated by the SABM balanced mode and SABME balanced mode extended messages appearing on the same interface.
Serial2: Serial2: Serial2: Serial2: Serial2: Serial2: LAPB LAPB LAPB LAPB LAPB LAPB T1 SABMSENT 1428720 0 O SABMSENT (2) SABME P I SABMSENT (2) SABM P T1 SABMSENT 1431720 1 O SABMSENT (2) SABME P I SABMSENT (2) SABM P
The output in the next example shows that the debug lapb command is set for a single interface; that is, interface 0/0.
Serial0/0: Serial0/0: Serial0/0: Serial0/0: Serial0/0: Serial0/0: Serial0/0: LAPB LAPB LAPB LAPB LAPB LAPB LAPB O I I O O I O CONNECT CONNECT CONNECT CONNECT CONNECT CONNECT CONNECT (17) IFRAME 1 7 (5) IFRAME 7 2 (6) IFRAME 0 2 (2) RR (R) 1 (50) IFRAME 2 1 (15) IFRAME 1 2 (5) IFRAME 3 2
DB-1560
December 2010
debug lapb-ta
To display debugging messages for Link Access Procedure, Balanced-Terminal Adapter (LAPB-TA), use the debug lapb-ta command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug lapb-ta [error | event | traffic] no debug lapb-ta [error | event | traffic]
Syntax Description
(Optional) Displays LAPB-TA errors. (Optional) Displays LAPB-TA normal events. (Optional) Displays LAPB-TA in/out traffic data.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug lapb-ta command with the error, event, and traffic keywords activated:
Router# debug lapb-ta error LAPB-TA error debugging is on Router# debug lapb-ta event LAPB-TA event debugging is on Router# debug lapb-ta traffic LAPB-TA traffic debugging is on Mar 9 12:11:36.464:LAPB-TA:Autodetect trying to detect LAPB on BR3/0:1 Mar 9 12:11:36.464: sampled pkt: 2 bytes: 1 3F.. match Mar 9 12:11:36.468:LAPBTA:get_ll_config:BRI3/0:1 Mar 9 12:11:36.468:LAPBTA:line 130 allocated for BR3/0:1 Mar 9 12:11:36.468:LAPBTA:process 79 Mar 9 12:11:36.468:BR3/0:1:LAPB-TA started
DB-1561
Mar 9 12:11:36.468:LAPBTA:service change:LAPB physical layer up, context 6183E144 interface up, protocol down Mar 9 12:11:36.468:LAPBTA:service change:, context 6183E144 up Mar 9 12:11:36.468:LAPB-TA:BR3/0:1, 44 sent 2d14h:%LINEPROTO-5-UPDOWN:Line protocol on Interface BRI3/0:1, changed state to up 2d14h:%ISDN-6-CONNECT:Interface BRI3/0:1 is now connected to 60213 Mar 9 12:11:44.508:LAPB-TA:BR3/0:1, 1 rcvd Mar 9 12:11:44.508:LAPB-TA:BR3/0:1, 3 sent Mar 9 12:11:44.700:LAPB-TA:BR3/0:1, 1 rcvd Mar 9 12:11:44.700:LAPB-TA:BR3/0:1, 3 sent Mar 9 12:11:44.840:LAPB-TA:BR3/0:1, 1 rcvd Mar 9 12:11:44.840:LAPB-TA:BR3/0:1, 14 sent Mar 9 12:11:45.852:LAPB-TA:BR3/0:1, 1 rcvd Mar 9 12:11:46.160:LAPB-TA:BR3/0:1, 2 rcvd Mar 9 12:11:47.016:LAPB-TA:BR3/0:1, 1 rcvd Mar 9 12:11:47.016:LAPB-TA:BR3/0:1, 10 sent
DB-1562
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
For each datagram (packet) received or sent, a message is logged to the console.
Caution
This command severely impacts LAT performance and is intended for troubleshooting use only.
Examples
The following is sample output from the debug lat packet command:
Router# debug lat packet LAT: I int=Ethernet0, src=0000.0c01.0509, dst=0900.2b00.000f, type=0, M=0, R=0 LAT: I int=Ethernet0, src=0800.2b11.2d13, dst=0000.0c01.7876, type=A, M=0, R=0 LAT: O dst=0800.2b11.2d13, int=Ethernet0, type= A, M=0, R=0, len= 20, next 0 ref 1
The second line of output describes a packet that is input to the router. Table 209 describes the fields in this line.
Table 209 debug lat packet Field Descriptions
Description Indicates that this display shows LAT debugging output. Indicates that this line of output describes a packet that is input to the router (I) or output from the router (O). Indicates the interface on which the packet event took place. Indicates the source address of the packet.
DB-1563
Table 209
Description Indicates the destination address of the packet. Indicates the message type (in hexadecimal notation). Possible values are as follows:
0 = Run Circuit 1 = Start Circuit 2 = Stop Circuit A = Service Announcement C = Command D = Status E = Solicit Information F = Response Information
The third line of output describes a packet that is output from the router. Table 210 describes the last three fields in this line.
Table 210 debug lat packet Field Descriptions
Description Indicates the length (in hexadecimal notation) of the packet (in bytes). Indicates the link on the transmit queue. Indicates the count of packet users.
DB-1564
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug lex rcmd command:
Router# debug lex rcmd LEX-RCMD: "shutdown" command received on unbound serial interface- Serial0 LEX-RCMD: Lex0: "inventory" command received Rcvd rcmd: FF 03 80 41 41 13 00 1A 8A 00 00 16 01 FF 00 00 Rcvd rcmd: 00 02 00 00 07 5B CD 15 00 00 0C 01 15 26 LEX-RCMD: ACK or response received on Serial0 without a corresponding ID LEX-RCMD: REJ received LEX-RCMD: illegal CODE field received in header: <number> LEX-RCMD: illegal length for Lex0: "lex input-type-list" LEX-RCMD: Lex0 is not bound to a serial interface LEX-RCMD: encapsulation failure LEX-RCMD: timeout for Lex0: "lex priority-group" command LEX-RCMD: re-transmitting Lex0: "lex priority-group command LEX-RCMD: lex_setup_and_send called with invalid parameter LEX-RCMD: bind occurred on shutdown LEX interface LEX-RCMD: Serial0- No free Lex interface found with negotiated MAC address 0000.0c00.d8db LEX-RCMD: No active Lex interface found for unbind
The following output indicates that a LAN Extender remote command packet was received on a serial interface that is not bound to a LAN Extender interface:
LEX-RCMD: "shutdown" command received on unbound serial interface- Serial0
This message can occur for any of the LAN Extender remote commands. Possible causes of this message are as follows:
FLEX state machine software error Serial line momentarily goes down, which is detected by the host but not by FLEX
The following output indicates that a LAN Extender remote command response has been received. The hexadecimal values are for internal use only.
LEX-RCMD: Lex0: "inventory" command received Rcvd rcmd: FF 03 80 41 41 13 00 1A 8A 00 00 16 01 FF 00 00 Rcvd rcmd: 00 02 00 00 07 5B CD 15 00 00 0C 01 15 26
DB-1565
The following output indicates that when the host router originates a LAN Extender remote command to FLEX, it generates an 8-bit identifier that is used to associate a command with its corresponding response:
LEX-RCMD: ACK or response received on Serial0 without a corresponding ID
FLEX was busy at the time that the command arrived and could not send an immediate response. The command timed out on the host router and then FLEX finally sent the response. Transmission error. Software error.
Possible responses to Config-Request are Config-ACK, Config-NAK, and Config-Rej. The following output shows that some of the options in the Config-Request are not recognizable or are not acceptable to FLEX due to transmission errors or software errors:
LEX-RCMD: REJ received
The following output shows that a LAN Extender remote command response was received but that the CODE field in the header was incorrect:
LEX-RCMD: illegal CODE field received in header: <number>
The following output indicates that a LAN Extender remote command response was received but that it had an incorrect length field. This message can occur for any of the LAN Extender remote commands.
LEX-RCMD: illegal length for Lex0: "lex input-type-list"
The following output shows that a host router was about to send a remote command when the serial link went down:
LEX-RCMD: Lex0 is not bound to a serial interface
The following output shows that the serial encapsulation routine of the interface failed to encapsulate the remote command datagram because the LEX-NCP was not in the OPEN state. Due to the way the PPP state machine is implemented, it is normal to see a single encapsulation failure for each remote command that gets sent at bind time.
LEX-RCMD: encapsulation failure
The following output shows that the timer expired for the given remote command without having received a response from the FLEX device. This message can occur for any of the LAN Extender remote commands.
LEX-RCMD: timeout for Lex0: "lex priority-group" command
The following output indicates that the host is resending the remote command after a timeout:
LEX-RCMD: re-transmitting Lex0: lex priority-group command
The following output indicates that an illegal parameter was passed to the lex_setup_and_send routine. This message could be displayed due to a host software error.
LEX-RCMD: lex_setup_and_send called with invalid parameter
DB-1566
December 2010
The following output is informational and shows when a bind occurs on a shutdown interface:
LEX-RCMD: bind occurred on shutdown LEX interface
The following output shows that the LEX-NCP reached the open state and a bind operation was attempted with the FLEX's MAC address, but no free LAN Extender interfaces were found that were configured with that MAC address. This output can occur when the network administrator does not configure a LAN Extender interface with the correct MAC address.
LEX-RCMD: Serial0- No free Lex interface found with negotiated MAC address 0000.0c00.d8db
The following output shows that the serial line that was bound to the LAN Extender interface went down and the unbind routine was called, but when the list of active LAN Extender interfaces was searched, the LAN Extender interface corresponding to the serial interface was not found. This output usually occurs because of a host software error.
LEX-RCMD: No active Lex interface found for unbind
DB-1567
debug license
To enable controlled Cisco IOS software license debugging activity on a device, use the debug license command in privileged EXEC mode. To disable debugging, use the no form of this command. debug license {agent {all | error} | core {all | error | event} | errors | events | ipc} no debug license {agent {all | error} | core {all | error | event} | errors | events | ipc}
Syntax Description
agent
allDebugs all license agent messages. error Debugs only license agent error messages. allDebugs all license core messages error Debugs only license core error messages eventDebugs only license core event messages.
core
Debugs license warnings and errors. Debugs license event messages. Debugs license interprocess communication (IPC) messages.
Command Default
Debugging is disabled.
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.4(15)XZ. This command was integrated into Cisco IOS Release 12.4(20)T.
12.4(15)XZ 12.4(20)T
Usage Guidelines
Examples
The following example shows how to enable debugging for license warnings and errors on a router:
Router# debug license errors
The following example shows how to enable debugging for all license agent information on a switch:
Switch# debug license agent all
DB-1568
December 2010
license agent app https[0x43FBC7C]: urlhook function license agent app https[0x43FBC7C]: https action function LIC_AGENT:Processing XML message <?xml version="1.0" encoding="UTF-8"?> <SOAP:Envelope xmlns:SOAP="http://www.w3.org/2003/05/soap-envelope"> <SOAP:Header> <clm:Header version="1.0" xmlns:clm="http://www.cisco.com/clm"> <clm:Time>2003-04-23T20:27:19.827Z</clm:Time> </clm:Header> </SOAP:Header> <SOAP:Body> <lica:request xmlns:lica="http://www.cisco.com/clm"> <lica:installRequest> <lica:license encoding="BASE64"> PENJU0NPX1dUX0FSVElGQUNUUyB2ZXJzaW9uPSIxLjAiPjxDSVNDT19XVF9MSUNFTlNFIHZlcnNp b249IjEuMCI+PEZFQVRVUkVfTkFNRT5pcGJhc2U8L0ZFQVRVUkVfTkFNRT48RkVBVFVSRV9WRVJT SU9OPjEuMDwvRkVBVFVSRV9WRVJTSU9OPjxVREk+PFBJRD5CVUxMU0VZRTI0PC9QSUQ+PFNOPkNB VDEwMDZSMEU4PC9TTj48L1VEST48U09VUkNFPkNpc2NvIEhRPC9TT1VSQ0U+PENSRUFURV9EQVRF PjIwMDYtMTEtMjJUMDA6MzM6NTA8L0NSRUFURV9EQVRFPjxMSUNFTlNFX0xJTkVfSEFTSCBoYXNo QWxnbz0iU0hBMSI+NDJiNFVWWFpOd3pJK0ZNdEV6QlNZSDRWdzFFPTwvTElDRU5TRV9MSU5FX0hB U0g+PFRZUEU+UkVHVUxBUjwvVFlQRT48TElDRU5TRV9MSU5FPjwhW0NEQVRBWzExIGlwYmFzZSAx LjAgTE9ORyBOT1JNQUwgU1RBTkRBTE9ORSBFWENMIElORklOSVRFX0tFWVMgSU5GSU5JVEVfS0VZ UyBORVZFUiBORVZFUiBOaUwgU0xNX0NPREUgQ0xfTkRfTENLIE5pTCAqMVZBUlY5WlJESzREOU5U NDAwIE5pTCBOaUwgTmlMIDVfTUlOUyA8VURJPjxQSUQ+QlVMTFNFWUUyNDwvUElEPjxTTj5DQVQx MDA2UjBFODwvU04+PC9VREk+IGUxWW8wS1U2VnJLOnBJZXRib1dJVkEyZlVaVGdieUlEaklHWERR VXc3dkxOYWlXRzZ0dUJOMG5lTXpKaHpzQ2tMN1l3TWFxS2paem05YW5FbVJHUUVPTHlDdmRVZksw QmNLN0pPcnZsUkw0VjMyJDxXTEM+QVFFQklRQUIvLy9GbS8vWDkybThNb0NOZkVMSHJiVzRjWDFM ZGNpdDNMVU5GWlV1OWppT0phcXB5Q2N6TTFpaUlKbVE3NEd5WHJFY3F2UGlBbVdTYUVtVVQ1NnJz dGs2Z3ZtaitFUUtSZkQ5QTBpbWUxY3pyZEt4ZklMVDBMYVhUNDE2bndtZnA5MlR5YTZ2SVE0Rm5s QmRxSjFzTXpYZVNxOFBtVmNUVTlBNG85aGlsOXZLdXI4TjlGODg1RDlHVkYwYkpIY2lUNU09PC9X TEM+XV0+PC9MSUNFTlNFX0xJTkU+PFVTRVJfTU9ESUZJQUJMRV9DT01NRU5UIGZpZWxkUmVzdHJp Y3Rpb25zPSJNYXggOTkgQVNDSUkgY2hhcmFjdGVycyBpbiBsZW5ndGguIj48L1VTRVJfTU9ESUZJ QUJMRV9DT01NRU5UPjwvQ0lTQ09fV1RfTElDRU5TRT48L0NJU0NPX1dUX0FSVElGQUNUUz4= </lica:license> </lica:installRequest> </lica:request> </SOAP:Body> </SOAP:Envelope> LIC_AGENT: XML received opcode(1) LIC_AGENT: License ipbase %IOS_LICENSE_IMAGE_APPLICATION-6-LICENSE_LEVEL: Next reboot level = ipbase and License = ipbase LIC_AGENT: Notification Event type = 1 License Installed LIC_AGENT: Notification Event type = 13 License Annotate
DB-1569
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is used to display the statistics, which are used for debugging the status of the various conditions occurred during execution of the monitoring process.
Examples
Related Commands
Command debug all no debug all clear counters show link monitor debug
Description Enables debugging for link monitoring. Disables debugging for link monitoring. Clears show interface counters on all interfaces. Show link monitor error statistics.
DB-1570
December 2010
debug list
To filter debugging information on a per-interface or per-access list basis, use the debug list command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug list [list] [interface] no debug list [list] [interface]
Syntax Description
list interface
(Optional) An access list number in the range from 1100 to 1199. (Optional) The interface type. Allowed values are the following:
channelIBM Channel interface ethernetIEEE 802.3 fddiANSI X3T9.5 nullNull interface serialSerial tokenringIEEE 802.5 tunnelTunnel interface
Command Modes
Privileged EXEC
Usage Guidelines
The debug list command is used with other debug commands for specific protocols and interfaces to filter the amount of debug information that is displayed. In particular, this command is designed to filter specific physical unit (PU) output from bridging protocols. The debug list command is supported with the following commands:
debug arp debug llc2 errors debug llc2 packets debug llc2 state debug rif debug sdlc debug token ring
Note
All debug commands that support access list filtering use access lists in the range from 1100 to 1199. The access list numbers shown in the examples are merely samples of valid numbers.
DB-1571
Examples
To use the debug list command on only the first of several Logical Link Control, type 2 (LLC2) connections, use the show llc2 command to display the active connections:
Router# show llc2 SdllcVirtualRing2008 DTE: 4000.2222.22c7 4000.1111.111c 04 04 state NORMAL SdllcVirtualRing2008 DTE: 4000.2222.22c8 4000.1111.1120 04 04 state NORMAL SdllcVirtualRing2008 DTE: 4000.2222.22c1 4000.1111.1104 04 04 state NORMAL
Next, configure an extended bridging access list, numbered 1103, for the connection you want to filter:
access-list 1103 permit 4000.1111.111c 0000.0000.0000 4000.2222.22c7 0000.0000.0000 0xC 2 eq 0x404
The convention for the LLC debug list command filtering is to use dmac = 6 bytes, smac = 6 bytes, dsap_offset = 12, and ssap_offset = 13. Finally, you invoke the following debug commands:
Router# debug list 1103 Router# debug llc2 packet LLC2 Packets debugging is on for access list: 1103
To use the debug list command for Synchronous Data Link Control (SDLC) connections, with the exception of address 04, create access list 1102 to deny the specific address and permit all others:
access-list 1102 deny 0000.0000.0000 0000.0000.0000 0000.0000.0000 0000.0000.0000 0xC 1 eq 0x4 access-list 1102 permit 0000.0000.0000 0000.0000.0000 0000.0000.0000 0000.0000.0000
The convention is to use dmac = 0.0.0, smac = 0.0.0, and sdlc_frame_offset = 12. Invoke the following debug commands:
Router# debug list 1102 Router# debug sdlc SDLC link debugging is on for access list: 1102
To enable SDLC debugging (or debugging for any of the other supported protocols) for a specific interface rather than for all interfaces on a router, use the following commands:
Router# debug list serial 0 Router# debug sdlc SDLC link debugging is on for interface: Serial0
To enable Token Ring debugging between two MAC address, 0000.3018.4acd and 0000.30e0.8250, configure an extended bridging access list 1106:
access-list 1106 permit 0000.3018.4acd 8000.0000.0000 0000.30e0.8250 8000.0000.0000 access-list 1106 permit 0000.30e0.8250 8000.0000.0000 0000.3018.4acd 8000.0000.0000
DB-1572
December 2010
To enable routing information field (RIF) debugging for a single MAC address, configure an access list 1109:
access-list 1109 permit permit 0000.0000.0000 ffff.ffff.ffff 4000.2222.22c6 0000.0000.0000
Related Commands
Command debug llc2 errors debug llc2 packet debug llc2 state debug rif debug rtsp debug token ring
Description Displays LLC2 protocol error conditions or unexpected input. Displays all input and output from the LLC2 protocol stack. Displays state transitions of the LLC2 protocol. Displays information on entries entering and leaving the RIF cache. Displays information on SDLC frames received and sent by any router serial interface involved in supporting SDLC end station functions. Displays messages about Token Ring interface activity.
DB-1573
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug llc2 dynwind command:
Router# debug llc2 dynwind LLC2/DW: LLC2/DW: LLC2/DW: LLC2/DW: LLC2/DW: LLC2/DW: LLC2/DW: BECN received! event REC_I_CMD, Window size reduced to 4 1 consecutive I-frame(s) received without BECN 2 consecutive I-frame(s) received without BECN 3 consecutive I-frame(s) received without BECN 4 consecutive I-frame(s) received without BECN 5 consecutive I-frame(s) received without BECN Current working window size is 5
In this example, the router receives a backward explicit congestion notification (BECN) and reduces the window size to 4. After receiving five consecutive I frames without a BECN, the router increases the window size to 5.
Related Commands
Command debug llc2 errors debug llc2 packet debug llc2 state
Description Displays LLC2 protocol error conditions or unexpected input. Displays all input and output from the LLC2 protocol stack. Displays state transitions of the LLC2 protocol.
DB-1574
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug llc2 errors command from a router ignoring an incorrectly configured device:
Router# debug llc2 errors LLC: LLC: LLC: LLC: LLC: LLC: admstate: admstate: admstate: admstate: admstate: admstate: 4000.1014.0001 4000.1014.0001 4000.1014.0001 4000.1014.0001 4000.1014.0001 4000.1014.0001 0000.0000.0000 0000.0000.0000 0000.0000.0000 0000.0000.0000 0000.0000.0000 0000.0000.0000 04 04 04 04 04 04 04 04 04 04 04 04 REC_RR_RSP REC_RR_RSP REC_RR_RSP REC_RR_RSP REC_RR_RSP REC_RR_RSP
Each line of output contains the remote MAC address, the local MAC address, the remote service access point (SAP), and the local SAP. In this example, the router receives unsolicited RR frames marked as responses.
Related Commands
Command debug list debug llc2 dynwind debug llc2 packet debug llc2 state
Description Filters debugging information on a per-interface or per-access list basis. Displays changes to the dynamic window over Frame Relay. Displays all input and output from the LLC2 protocol stack. Displays state transitions of the LLC2 protocol.
DB-1575
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command also displays information about some error conditions as well as internal interactions between the Common Link Services (CLS) layer and the LLC2 layer.
Examples
The following is sample output from the debug llc2 packet command from the router sending ping data back and forth to another router:
Router# debug llc2 packet LLC: llc2_input 401E54F0: 10400000 .@.. 401E5500: 303A90CF 0006F4E1 2A200404 012B5E 0:.O..ta* ...+ LLC: i REC_RR_CMD N(R)=21 p/f=1 LLC: 0006.f4e1.2a20 0000.303a.90cf 04 04 NORMAL REC_RR_CMD (3) LLC (rs): 0006.f4e1.2a20 0000.303a.90cf 04 04 REC_RR_CMD N(R)=42 LLC: 0006.f4e1.2a20 0000.303a.90cf 04 04 txmt RR_RSP N(R)=20 p/f=1 LLC: llc_sendframe 401E5610: 0040 0006F4E1 2A200000 [email protected]* .. 401E5620: 303A90CF 04050129 00 N 0:.O...). 2012 LLC: llc_sendframe 4022E3A0: 0040 0006F4E1 [email protected] 4022E3B0: 2A200000 303A90CF 04042A28 2C000202 * ..0:.O..*(,... 4022E3C0: 00050B90 A02E0502 FF0003D1 004006C1 .... [email protected] 4022E3D0: D7C9D5C 0.128 C400130A C1D7D7D5 4BD5F2F0 WIUGD...AWWUKUrp 4022E3E0: F1F30000 011A6071 00010860 D7027000 qs....`q...`W.p. 4022E3F0: 00003B00 1112FF01 03000243 6973636F ..;........Cisco 4022E400: 20494F53 69 IOSi LLC: 0006.f4e1.2a20 0000.303a.90cf 04 04 txmt I N(S)=21 N(R)=20 p/f=0 size=90 LLC: llc2_input 401E5620: 10400000 303A90CF [email protected]:.O 401E5630: 0006F4E1 2A200404 282C2C00 02020004 ..ta* ..(,,..... 401E5640: 03902000 1112FF01 03000243 6973636F .. ........Cisco 401E5650: 20494F53 A0 IOS LLC: i REC_I_CMD N(R)=22 N(S)=20 V(R)=20 p/f=0 LLC: 0006.f4e1.2a20 0000.303a.90cf 04 04 NORMAL REC_I_CMD (1) LLC (rs): 0006.f4e1.2a20 0000.303a.90cf 04 04 REC_I_CMD N(S)=20 V(R)=20 LLC (rs): 0006.f4e1.2a20 0000.303a.90cf 04 04 REC_I_CMD N(R)=44 LLC: INFO: 0006.f4e1.2a20 0000.303a.90cf 04 04 v(r) 20
DB-1576
December 2010
The first three lines indicate that the router has received some input from the link:
LLC: llc2_input 401E54F0: 10400000 401E5500: 303A90CF 0006F4E1 2A200404 012B5E .@.. 0:.O..ta* ...+
The next line indicates that this input was an RR command with the poll bit set. The other router has received sequence number 21 and is waiting for the final bit.
LLC: i REC_RR_CMD N(R)=21 p/f=1
The next two lines contain the MAC addresses of the sender and receiver, and the state of the router when it received this frame:
LLC: 0006.f4e1.2a20 0000.303a.90cf 04 04 NORMAL REC_RR_CMD (3) LLC (rs): 0006.f4e1.2a20 0000.303a.90cf 04 04 REC_RR_CMD N(R)=42
The next four lines indicate that the router is sending a response with the final bit set:
LLC: 0006.f4e1.2a20 0000.303a.90cf 04 04 txmt RR_RSP N(R)=20 p/f=1 LLC: llc_sendframe 401E5610: 0040 0006F4E1 2A200000 [email protected]* .. 401E5620: 303A90CF 04050129 00 N 0:.O...). 2012
Related Commands
Command debug list debug llc2 dynwind debug llc2 errors debug llc2 state
Description Filters debugging information on a per-interface or per-access list basis. Displays changes to the dynamic window over Frame Relay. Displays LLC2 protocol error conditions or unexpected input. Displays state transitions of the LLC2 protocol.
DB-1577
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Refer to the ISO/IEC standard 8802-2 for definitions and explanations of debug llc2 state command output.
Examples
The following is sample output from the debug llc2 state command when a router disables and enables an interface:
Router# debug llc2 state LLC (stsw): 0006.f4e1.2a20 0000.303a.90cf 04 04, NORMAL -> AWAIT (P_TIMER_EXP) LLC(rs): 0006.f4e1.2a20 0000.303a.90cf 04 04, AWAIT -> D_CONN (P_TIMER_EXP) LLC: cleanup 0006.f4e1.2a20 0000.303a.90cf 04 04, UNKNOWN (17) LLC (stsw): 0006.f4e1.2a20 0000.303a.90cf 04 04, ADM -> SETUP (CONN_REQ) LLC: normalstate: set_local_busy 0006.f4e1.2a20 0000.303a.90cf 04 04 LLC (stsw): 0006.f4e1.2a20 0000.303a.90cf 04 04, NORMAL -> BUSY (SET_LOCAL_BUSY) LLC: Connection established: 0006.f4e1.2a20 0000.303a.90cf 04 04, success LLC (stsw): 0006.f4e1.2a20 0000.303a.90cf 04 04, SETUP -> BUSY (SET_LOCAL_BUSY) LLC: busystate: 0006.f4e1.2a20 0000.303a.90cf 04 04 local busy cleared LLC (stsw): 0006.f4e1.2a20 0000.303a.90cf 04 04, BUSY -> NORMAL (CLEAR_LOCAL_BUSY)
Related Commands
Command debug list debug llc2 dynwind debug llc2 errors debug llc2 packet
Description Filters debugging information on a per-interface or per-access list basis. Displays changes to the dynamic window over Frame Relay. Displays LLC2 protocol error conditions or unexpected input. Displays all input and output from the LLC2 protocol stack.
DB-1578
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Unusual events include stations reporting errors or error thresholds being exceeded.
Examples
The following is sample output from the debug lnm events command:
Router# debug lnm events IBMNM3: Adding 0000.3001.1166 to error list IBMNM3: Station 0000.3001.1166 going into preweight condition IBMNM3: Station 0000.3001.1166 going into weight condition IBMNM3: Removing 0000.3001.1166 from error list LANMGR0: Beaconing is present on the ring LANMGR0: Ring is no longer beaconing IBMNM3: Beaconing, Postmortem Started IBMNM3: Beaconing, heard from 0000.3000.1234 IBMNM3: Beaconing, Postmortem Next Stage IBMNM3: Beaconing, Postmortem Finished
The following message indicates that station 0000.3001.1166 reported errors and has been added to the list of stations reporting errors. This station is located on Ring 3.
IBMNM3: Adding 0000.3001.1166 to error list
The following message indicates that station 0000.3001.1166 has passed the early warning threshold for error counts:
IBMNM3: Station 0000.3001.1166 going into preweight condition
The following message indicates that station 0000.3001.1166 is experiencing a severe number of errors:
IBMNM3: Station 0000.3001.1166 going into weight condition
The following message indicates that the error counts for station 0000.3001.1166 have all decayed to zero, so this station is being removed from the list of stations that have reported errors:
IBMNM3: Removing 0000.3001.1166 from error list
The following message indicates that Ring 0 has entered failure mode. This ring number is assigned internally.
LANMGR0: Beaconing is present on the ring
DB-1579
The following message indicates that Ring 0 is no longer in failure mode. This ring number is assigned internally.
LANMGR0: Ring is no longer beaconing
The following message indicates that the router is beginning its attempt to determine whether any stations left the ring during the automatic recovery process for the last beaconing failure. The router attempts to contact stations that were part of the fault domain to detect whether they are still operating on the ring.
IBMNM3: Beaconing, Postmortem Started
The following message indicates that the router is attempting to determine whether any stations left the ring during the automatic recovery process for the last beaconing failure. It received a response from station 0000.3000.1234, one of the two stations in the fault domain.
IBMNM3: Beaconing, heard from 0000.3000.1234
The following message indicates that the router is attempting to determine whether any stations left the ring during the automatic recovery process for the last beaconing failure. It is initiating another attempt to contact the two stations in the fault domain.
IBMNM3: Beaconing, Postmortem Next Stage
The following message indicates that the router has attempted to determine whether any stations left the ring during the automatic recovery process for the last beaconing failure. It has successfully heard back from both stations that were part of the fault domain.
IBMNM3: Beaconing, Postmortem Finished
Explanations follow for other messages that the debug lnm events command can generate. The following message indicates that the router is out of memory:
LANMGR: memory request failed, find_or_build_station()
The following message indicates that Ring 3 is experiencing a large number of errors that cannot be attributed to any individual station:
IBMNM3: Non-isolating error threshold exceeded
The following message indicates that a station (or stations) on Ring 3 is receiving frames faster than they can be processed:
IBMNM3: Adapters experiencing congestion
The following message indicates that the beaconing has lasted for over 1 minute and is considered a permanent error:
IBMNM3: Beaconing, permanent
The following message indicates that the beaconing lasted for less than 1 minute. The router is attempting to determine whether either station in the fault domain left the ring.
IBMNM: Beaconing, Destination Started
In the preceding line of output, the following can replace Started: Next State, Finished, Timed out, and Cannot find station n.
DB-1580
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Examples
The following is sample output from the debug lnm llc command:
Router# debug lnm llc IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: IBMNM: Received LRM Set Reporting Point frame from 1000.5ade.0d8a. found bridge: 001-2-00A, addresses: 0000.3040.a630 4000.3040.a630 Opening connection to 1000.5ade.0d8a on TokenRing0 Sending LRM LAN Manager Accepted to 1000.5ade.0d8a on link 0. sending LRM New Reporting Link Established to 1000.5a79.dbf8 on link 1. Determining new controlling LNM Sending Report LAN Manager Control Shift to 1000.5ade.0d8a on link 0. Sending Report LAN Manager Control Shift to 1000.5a79.dbf8 on link 1. Bridge 001-2-00A received Request Bridge Status from 1000.5ade.0d8a. Sending Report Bridge Status to 1000.5ade.0d8a on link 0. Bridge 001-2-00A received Request REM Status from 1000.5ade.0d8a. Sending Report REM Status to 1000.5ade.0d8a on link 0. Bridge 001-2-00A received Set Bridge Parameters from 1000.5ade.0d8a. Sending Bridge Parameters Set to 1000.5ade.0d8a on link 0. sending Bridge Params Changed Notification to 1000.5a79.dbf8 on link 1. Bridge 001-2-00A received Set REM Parameters from 1000.5ade.0d8a. Sending REM Parameters Set to 1000.5ade.0d8a on link 0. sending REM Parameters Changed Notification to 1000.5a79.dbf8 on link 1. Bridge 001-2-00A received Set REM Parameters from 1000.5ade.0d8a. Sending REM Parameters Set to 1000.5ade.0d8a on link 0. sending REM Parameters Changed Notification to 1000.5a79.dbf8 on link 1. Received LRM Set Reporting Point frame from 1000.5ade.0d8a. found bridge: 001-1-00A, addresses: 0000.3080.2d79 4000.3080.2d7
As the output indicates, the debug lnm llc command output can vary somewhat in format.
DB-1581
Description Displays LLC-level debugging information. Router received a frame. The other possible value is Sending, to indicate that the router is sending a frame. The function of the LLC-level software that is communicating as follows:
CRSConfiguration Report Server LBSLAN Bridge Server LRMLAN Reporting Manager REMRing Error Monitor RPSRing Parameter Server RSRing Station
DB-1582
December 2010
Table 211
Description Name of the specific frame that the router sent or received. Possible values include the following:
Bridge Counter Report Bridge Parameters Changed Notification Bridge Parameters Set CRS Remove Ring Station CRS Report NAUN Change CRS Report Station Information CRS Request Station Information CRS Ring Station Removed LRM LAN Manager Accepted LRM Set Reporting Point New Reporting Link Established REM Forward MAC Frame REM Parameters Changed Notification REM Parameters Set Report Bridge Status Report LAN Manager Control Shift Report REM Status Request Bridge Status Request REM Status Set Bridge Parameters Set REM Parameters
from 1000.5ade.0d8a
If the router has received the frame, this address is the source address of the frame. If the router is sending the frame, this address is the destination address of the frame.
The following message indicates that the lookup for the bridge with which the LAN Manager was requesting to communicate was successful:
IBMNM: found bridge: 001-2-00A, addresses: 0000.3040.a630 4000.3040.a630
DB-1583
The following message indicates that a LAN Manager has connected or disconnected from an internal bridge and that the router computes which LAN Manager is allowed to change parameters:
IBMNM: Determining new controlling LNM
The following line of output indicates which bridge in the router is the destination for the frame:
IBMNM: Bridge 001-2-00A received Request Bridge Status from 1000.5ade.0d8a.
DB-1584
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Examples
The following is sample output from the debug lnm mac command:
Router# debug lnm mac LANMGR0: LANMGR0: LANMGR0: LANMGR0: LANMGR0: LANMGR0: LANMGR2: LANMGR2: LANMGR2: LANMGR0: LANMGR0: LANMGR2: LANMGR0: LANMGR2: LANMGR2: LANMGR2: LANMGR2: LANMGR2: LANMGR0: LANMGR0: LANMGR0: LANMGR0: LANMGR0: LANMGR2: LANMGR2: LANMGR2: RS received request address from 4000.3040.a670. RS sending report address to 4000.3040.a670. RS received request state from 4000.3040.a670. RS sending report state to 4000.3040.a670. RS received request attachments from 4000.3040.a670. RS sending report attachments to 4000.3040.a670. RS received ring purge from 0000.3040.a630. CRS received report NAUN change from 0000.3040.a630. RS start watching ring poll. CRS received report NAUN change from 0000.3040.a630. RS start watching ring poll. REM received report soft error from 0000.3040.a630. REM received report soft error from 0000.3040.a630. RS received ring purge from 0000.3040.a630. RS received AMP from 0000.3040.a630. RS received SMP from 0000.3080.2d79. CRS received report NAUN change from 1000.5ade.0d8a. RS start watching ring poll. RS received ring purge from 0000.3040.a630. RS received AMP from 0000.3040.a630. RS received SMP from 0000.3080.2d79. CRS received report NAUN change from 1000.5ade.0d8a. RS start watching ring poll. RS received SMP from 1000.5ade.0d8a. RPS received request initialization from 1000.5ade.0d8a. RPS sending initialize station to 1000.5ade.0d8a.
DB-1585
Table 212
Field LANMGR0:
Description Indicates that this line of output displays MAC-level debugging information. 0 indicates the number of the Token Ring interface associated with this line of debugging output. Indicates which function of the MAC-level software is communicating as follows:
RS
CRSConfiguration Report Server REMRing Error Monitor RPSRing Parameter Server RSRing Station
Indicates that the router received a frame. The other possible value is sending, to indicate that the router is sending a frame. Indicates the name of the specific frame that the router sent or received. Possible values include the following:
AMP initialize station report address report attachments report nearest active upstream neighbor (NAUN) change report soft error report state request address request attachments request initialization request state ring purge SMP
from 4000.3040.a670
Indicates the source address of the frame, if the router has received the frame. If the router is sending the frame, this address is the destination address of the frame.
As the output indicates, all debug lnm mac command messages follow the format described in Table 212 except the following:
LANMGR2: RS start watching ring poll LANMGR2: RS stop watching ring poll
These messages indicate that the router starts and stops receiving AMP and SMP frames. These frames are used to build a current picture of which stations are on the ring.
DB-1586
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug local-ack state command:
Router# debug local-ack state LACK_STATE: 2370300, hashp LLC2 open to finish LACK_STATE: 2370304, hashp new state = connected LACK_STATE: 2373816, hashp LACK_STATE: 2489548, hashp LLC2 open to finish LACK_STATE: 2489548, hashp new state = connected LACK_STATE: 2490132, hashp linkdown response LACK_STATE: 2490140, hashp new state = disconnected LACK_STATE: 2497640, hashp LLC2 open to finish LACK_STATE: 2497644, hashp new state = connected 2AE628, old state = disconn, new state = awaiting 2AE628, old state = awaiting LLC2 open to finish, 2AE628, old state = connected, new state = disconnected 2AE628, old state = disconn, new state = awaiting 2AE628, old state = awaiting LLC2 open to finish, 2AE628, old state = connected, new state = awaiting 2AE628, old state = awaiting linkdown response, 2AE628, old state = disconn, new state = awaiting 2AE628, old state = awaiting LLC2 open to finish,
Description Indicates that this packet describes a state change in the local acknowledgment state machine. System clock. Internal control block pointer used by technical support staff for debugging purposes.
DB-1587
Table 213
Description Old state condition in the local acknowledgment state machine. Possible values include the following:
Disconn (disconnected) awaiting LLC2 open to finish connected awaiting linkdown response
New state condition in the local acknowledgment state machine. Possible values include the following:
Disconn (disconnected) awaiting LLC2 open to finish connected awaiting linkdown response
DB-1588
December 2010
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS XE Release 2.1.
Usage Guidelines
The debug management event mib command prints messages to the screen whenever the Event MIB evaluates a specified trigger. These messages are given in real-time, and are intended to be used by technical support engineers for troubleshooting purposes. Definitions for the OID (object identifier) fields can be found in the EVENT-MIB.my file, available for download from the Cisco MIB website on http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml.
Examples
The following is sample output from the debug management event mib command:
Router# debug management event mib Event Process Bool: Owner aseem, Trigger 01 Event Bool process: invoke event Event Bool process: no wildcarding Event: OID ifEntry.10.3 Event getValue abs: 69847284 Event Bool process: Trigger Fired ! mteSetNotifyObjects: Event execOnFiring: sending notification Event: OID ifEntry.10.1 Event add_objects: Owner , Trigger Event add_objects: Owner aseem, Trigger sethi Event Found Owner: aseem Event Found Name: sethi Event: OID ifEntry.10.1
DB-1589
Event: sending trap with 7 OIDs Event: OID mteHotTrigger.0 Event: OID mteHotTargetName.0 Event: OID mteHotContextName.0 Event: OID ifEntry.10.3 Event: OID mteHotValue.0 Event: OID ifEntry.10.1 Event: OID ifEntry.10.1 Event mteDoSets: setting oid Event mteDoSets: non-wildcarded oid Event: OID ciscoSyslogMIB.1.2.1.0 Event Thresh Process: Owner aseem, Trigger 01 Event Thresh process: invoke rising event Event Thresh process: invoke falling event Event Thresh process: no wildcarding Event: OID ifEntry.10.3 Event getValue abs: 69847284 Event Existence Process: Owner aseem, Trigger 01 Event Exist process: invoke event Event Exist process: no wildcarding Event: OID ifEntry.10.3 Event getValue abs: 69847284 Event Check ExistTrigger for Absent Event Check ExistTrigger for Changed Router# no debug management event mib
Related Commands
Description Displays the SNMP Event values that have been configured on your routing device through the use of the Event MIB.
DB-1590
December 2010
Syntax Description
Specifies the Expression MIB evaluator. Specifies the Expression MIB SNMP operations. Specifies the Expression MIB parsing.
Command Default
Command Modes
Command History
Modification This command was introduced in a release earlier than Cisco IOS Release 12.2(1). This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command is supported in the Cisco IOS Release 12.2SR train. Support in a specific 12.2SR release of this train depends on your feature set, platform, and platform hardware. This command is supported in the Cisco IOS Release 12.2SB train. Support in a specific 12.2SB Release of this train depends on your feature set, platform, and platform hardware.
12.2SR
12.2SB
Examples
The following example shows how to enable debugging options for Expression MIB:
Router# debug management expression mib Expression MIB SNMP operations debugging is on
Related Commands
Description Displays the SNMP Expression values that have been configured on your routing device through the use of the Expression MIB.
DB-1591
debug mdss
To display the run-time errors and sequence of events for the multicast distributed switching services (MDSS), use the debug mdss command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mdss {all | error | event} no debug mdss {all | error | event}
Syntax Description
Displays both errors and sequence of events for MDSS. Displays the run-time errors for MDSS. Displays the run-time sequence of events for MDSS.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows output using the debug mdss command with the all keyword:
Router# debug mdss all mdss all debugging is on Router# clear ip mroute * Router# 01:31:03: MDSS: 01:31:03: MDSS: 01:31:03: MDSS: 01:31:03: MDSS: 01:31:03: MDSS: 01:31:03: MDSS: 01:31:03: MDSS: 01:31:03: MDSS: Vlan21) +Vlan22 01:31:03: MDSS: 01:31:03: MDSS: Vlan21) +Vlan22 01:31:03: MDSS: MCACHE_MTU
got MDFS_CLEARALL --> mdss_flush_all_sc enqueue a FE_GLOBAL_DELETE got MDFS_MROUTE_ADD for (0.0.0.0, 224.0.1.40) --> mdss_free_scmdb_cache got MDFS_MROUTE_ADD for (0.0.0.0, 239.255.158.197) got MDFS_MROUTE_ADD for (192.1.21.6, 239.255.158.197) got a MDFS_MIDB_ADD for (192.1.21.6, 239.255.158.197, -- mdss_add_oif enqueue a FE_OIF_ADD (192.1.21.6, 239.255.158.197, mdb (192.1.21.6, 239.255.158.197) fast_flags |
DB-1592
December 2010
01:31:03: MDSS: Vlan21) +Vlan23 01:31:03: MDSS: 01:31:03: MDSS: Vlan21) +Vlan23 01:31:03: MDSS: MCACHE_MTU 01:31:03: MDSS: Vlan21) +Vlan24 01:31:03: MDSS: 01:31:03: MDSS: Vlan21) +Vlan24 01:31:03: MDSS: MCACHE_MTU 01:31:03: MDSS: Vlan21) +Vlan25 01:31:03: MDSS: 01:31:03: MDSS: Vlan21) +Vlan25 01:31:03: MDSS: MCACHE_MTU 01:31:03: MDSS: Vlan21) +Vlan26 01:31:03: MDSS:
got a MDFS_MIDB_ADD for (192.1.21.6, 239.255.158.197, -- mdss_add_oif enqueue a FE_OIF_ADD (192.1.21.6, 239.255.158.197, mdb (192.1.21.6, 239.255.158.197) fast_flags | got a MDFS_MIDB_ADD for (192.1.21.6, 239.255.158.197, -- mdss_add_oif enqueue a FE_OIF_ADD (192.1.21.6, 239.255.158.197, mdb (192.1.21.6, 239.255.158.197) fast_flags | got a MDFS_MIDB_ADD for (192.1.21.6, 239.255.158.197, -- mdss_add_oif enqueue a FE_OIF_ADD (192.1.21.6, 239.255.158.197, mdb (192.1.21.6, 239.255.158.197) fast_flags | got a MDFS_MIDB_ADD for (192.1.21.6, 239.255.158.197, -- mdss_add_oif
01:31:03: MDSS: enqueue a FE_OIF_ADD (192.1.21.6, 239.255.158.197, Vlan21) +Vlan26 01:31:03: MDSS: mdb (192.1.21.6, 239.255.158.197) fast_flags | MCACHE_MTU 01:31:03: MDSS: got a MDFS_MIDB_ADD for (192.1.21.6, 239.255.158.197,u Vlan21) +Vlan27
Related Commands
DB-1593
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug media resource provisioning all command:
Router# debug media resource provisioning all . . . Media resource provisioning all debugging is on. Disabling profile will disconnect active CONFERENCING calls, do you want to continue ? [yes/no] *Jul 8 18:46:36: rpm_if_profile_exist ::profile id 10, service TRANSCODING *Jul 8 18:46:36: rpm_get_rscid_profile_info Profile with profile id :10, service :TRANSCODING does not exist *Jul 8 18:46:36: rpm_if_profile_exist ::profile id 10, service CONFERENCING *Jul 8 18:46:36: rpm_if_profile_exist ::profile id 10, service TRANSCODING *Jul 8 18:46:36: rpm_get_rscid_profile_info Profile with profile id :10, service :TRANSCODING does not exist *Jul 8 18:46:36: rpm_if_profile_exist ::profile id 10, service CONFERENCING Must be yes or no Router(config-dspfarm-profile)# Router(config-dspfarm-profile)# Router(config-dspfarm-profile)# Router(config-dspfarm-profile)# no shutdown Router(config-dspfarm-profile)# *Jul 8 18:46:42: rpm_user_enable_profile ::profile id 10, service CONFERENCING *Jul 8 18:46:44:%DSPRM-5-UPDOWN:DSP 10 in slot 1, changed state to up *Jul 8 18:46:44: rpm_rscprv_update ::provider_id 1 rsc_id 2 rsc_grp_state 4num_channel_delta 0 *Jul 8 18:46:44: rpm_rscprv_update resource update from resource provider 1 is successful Router(config-dspfarm-profile)# Router(config-dspfarm-profile)# exit Router(config)# exit
DB-1594
December 2010
Related Commands
Command debug media resource provisioning errors debug media resource provisioning events
Description Displays debugging messages related to media resource provisioning errors. Displays debugging messages related to media resource provisioning events.
DB-1595
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug media resource provisioning errors command:
Router# debug media resource provisioning errors Media resource provisioning errors debugging is on Router# no debug media resource provisioning errors Media resource provisioning errors debugging is off
Related Commands
Command debug media resource provisioning all debug media resource provisioning events
Description Displays debugging messages related to all media resource provisioning. Displays debugging messages related to media resource provisioning events.
DB-1596
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug media resource provisioning events command:
Router# debug media resource provisioning events Media resource provisioning events debugging is on Router# no debug media resource provisioning events Media resource provisioning events debugging is off Router#
Related Commands
Command
Description
debug media resource provisioning Displays debugging messages related to all media resource all provisioning. debug media resource provisioning Displays debugging messages related to media resource errors provisioning errors.
DB-1597
debug mediacard
To display Digital Signal Processor Resource Manager (DSPRM) debugging information, use the debug mediacard command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mediacard {all | errors | events | message} no debug mediacard {all | errors | events | message}
Syntax Description
Debugs DSPRM errors, events, and messages. Debugs DSPRM errors. Debugs DSPRM events. Debugs DSPRM messages.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Communication Media Module. This command was integrated into Cisco IOS Release 12.3(14)T. This command was integrated into Cisco IOS Release 12.4(3). This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug mediacard errors command to debug active calls. You should use the debug mediacard all command during minimum traffic periods only; using the debug mediacard all command during active calls can significantly impact system performance.
Examples
DB-1598
December 2010
860472, txPacketSize 20, txRTPPayloadType 0 *Mar 1 07:45:06.362: < CREATE_CONFERENCE_ACK (0x4001) , pktLen 116, confId 1, instId 0, seqNo 27983, Payload (84 bytes): status 0 (Normal Completion), param1 3, param2 0 *Mar 1 07:45:06.362: < CREATE_CHANNEL_ACK (0x4064) , pktLen 116, confId 1, ins tId 26625, seqNo 27984, Payload (84 bytes): status 0 (Normal Completion), param1 0, param2 0 *Mar 1 07:45:06.362: > CREATE_CONFERENCE (0x1) , pktLen 56, confId 2, instId All possible debugging has been turned off MTP#26625, seqNo 27985, Payload (24 bytes): confType 3, agcMode 1, spkrUpdateRep ortMode 1, maxActSpkr 3 *Mar 1 07:45:06.362: > CREATE_CHANNEL (0x64) , pktLen 100, confId 2, instId 26 626, seqNo 27986, Payload (68 bytes): rxCodecType 2, suppressRx 1, rxCNG 2, rxPL C 2, rxVAD 2, rxToneDet 1, rxSpkrPriority 1, rxInactiveTimeOut 7200, rxPacketSiz e 20, rxRTPPayloadType 0 *Mar 1 07:45:06.366: txCodecType 1, suppressTx 1, txVAD 1, AGC 1, txSSRC 167 858296, txPacketSize 20, txRTPPayloadType 0 *Mar 1 07:45:06.366: < CREATE_CONFERENCE_ACK (0x4001) , pktLen 116, confId 2, instId 0, seqNo 27985, Payload (84 bytes): status 0 (Normal Completion), param1 3, param2 0 Router# debug mediacard events Media Card service events debugging is on *Mar 1 07:47:53.926: ms_ac_open_rtp_sockets: loc_ipaddr = 10.1.80.24 loc_mac<00 03.feac.c842> rem_ip<0.0.0.0> rem_port<0> *Mar 1 07:47:53.926: ms_ac_get_unique_udp_port: rtcp_socket = 6255F490 *Mar 1 07:47:53.926: ms_ac_get_unique_udp_port: SLOT3 Port<3450> is assigned! *Mar 1 07:47:53.926: ms_ac_open_local_rtp: rtpinfo 64382A3C, local_port =23930 *Mar 1 07:47:53.926: ms_ac_rtp_enq: Sent msg 101 to DSPFARM *Mar 1 07:47:53.926: ms_ac_open_remote_rtp: rtpinfo 64382A3C, loc_ipaddr = 10.1 .80.24 loc_udp_prt <23930> ,loc_mac<0003.feac.c842> *Mar 1 07:47:53.926: ms_ac_open_remote_rtp: remote_ipaddr = 10.1.2.15 remote_ud p_prt <17932> *Mar 1 07:47:53.926: ms_ac_nexthop_macaddr idb<630BDFCC> nexthop<10.1.80.1> *Mar 1 07:47:53.926: ms_ac_nexthop_macaddr ptr<6301F5AC> through<GigabitEtherne t1/0> nexthop<10.1.80.1> *Mar 1 07:47:53.926: ms_ac_after_found_mac <10.1.2.15>'s mac <00d0.002a.7400> f ound *Mar 1 07:47:53.926: ms_ac_check_xcode_rem_ip: rtpinfo <64382A3C> other_rtpinfo <0> *Mar 1 07:47:53.926: ms_ac_rtp_enq: Sent msg 103 to DSPFARM *Mar 1 07:47:53.942: ms_ac_open_rtp_sockets: loc_ipaddr = 10.1.80.24 loc_mac<00 03.feac.c842> rem_ip<0.0.0.0> rem_port<0> *Mar 1 07:47:53.942: ms_ac_get_unique_udp_port: rtcp_socket = 6256C9B4 *Mar 1 07:47:53.942: ms_ac_get_unique_udp_port: SLOT3 Port<1778> is assigned! *Mar 1 07:47:53.942: ms_ac_open_local_rtp: rtpinfo 6438353C, local_port =22258 *Mar 1 07:47:53.942: ms_ac_rtp_enq: Sent msg 101 to DSPFARM *Mar 1 07:47:53.942: ac_validate_xcode_params: codeDec<2> codeEnc<1> decDur<20> encDur<20> *Mar 1 07:47:53.942: ac_open_xcode_channel: codeDec<1> codeEnc<2> decDur<20> en cDur<20> VADen<0> prf_id<4> *Mar 1 07:47:53.942: reserve_xcode_resource: reserve xcode resource:codecDec<1> codecEnc<2> *Mar 1 07:47:53.942: al
Related Commands
DB-1599
debug memory
To enable debugging on memory, use the debug memory command in privileged EXEC mode. To disable memory debugging, use the no form of this command. debug memory [rmi] no debug memory
Syntax Description
rmi
(Optional) Displays debug information related to memory Remote Method Invocation (RMI).
Command Default
Command Modes
Command History
Release 12.4(2)T
Usage Guidelines
The debug memory command is used when debugging memory manager operations such as allocating and reallocating memory.
Examples
Related Commands
DB-1600
December 2010
debug mgcp
To enable debug traces for Media Gateway Control Protocol (MGCP) errors, events, media, packets, parser, and Call Admission Control (CAC), use the debug mgcp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mgcp [all | errors [endpoint endpoint-name] | events [endpoint endpoint-name] | media [endpoint endpoint-name] | nas | packets [endpoint endpoint-name | input-hex] | parser | src | voipcac] no debug mgcp [all | errors | events | media | nas | packets | parser | src | voipcac]
Syntax Description
all errors endpoint endpoint-name events media nas packets input-hex parser src voipcac
(Optional) Debugs MGCP errors, events, media, packets, parser and builder, and CAC. (Optional) Debugs MGCP errors. (Optional) Debugs MGCP errors, events, media, or packets per endpoint. (Optional) Debugs MGCP events. (Optional) Debugs MGCP tone and signal events. (Optional) Debugs MGCP network access server (NAS) (data) events. (Optional) Debugs MGCP packets. (Optional) Debugs MGCP input packets in hexadecimal values. (Optional) Debugs MGCP parser and builder. (Optional) Debugs MGCP System Resource Check (SRC) CAC information. (Optional) Turns on debugging messages for the Voice over IP (VoIP) CAC process at the MGCP application layer.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Additional information was displayed for the gateways. The output was modified to display parameters for the MGCP channel-associated signaling (CAS) PBX and ATM adaptation layer 2 (AAL2) permanent virtual circuit (PVC) features.
DB-1601
Release 12.2(2)XA
Modification The media keyword was added. The endpoint endpoint-name keyword and argument were added as options for the errors, events, media, and packets keywords. The input-hex keyword option was added for the packets keyword. The nas keyw ord and the src and voipcac keywords were added. (Refer to MGCP VoIP Call Admission Control in Cisco IOS Release 12.2(2)XB.) This command was integrated into Cisco IOS Release 12.2(8)T.
Note
12.2(2)XB
12.2(8)T
The nas keyword was not integrated into Cisco IOS Release 12.2(8)T.
The command was implemented on the Cisco AS5350, Cisco AS5400, and Cisco AS5850. Support for this command was implemented in Cisco 7200 series images. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following is sample output from the debug mgcp errors, debug mgcp events, debug mgcp media, debug mgcp nas, debug mgcp packets, debug mgcp parser, and debug mgcp src commands and keywords. The debug mgcp all command and keyword would show a compilation of all this output, including the debug mgcp voipcac command and keyword output. Note that using the debug mgcp all command and keyword may severely impact network performance. The following is sample output from the debug mgcp errors command and keyword:
Router# debug mgcp errors Unknown network interface type
The following is sample output from the debug mgcp events command and keyword:
Router# debug mgcp events Media Gateway Control Protocol events debugging is on Router# 1w1d: MGC stat - 172.19.184.65, total=44, succ=7, failed=21 1w1d: MGCP msg 1 1w1d: remove_old_under_specified_ack: 1w1d: MGC stat - 172.19.184.65, total=44, succ=8, failed=21 1w1d: updating lport with 2427setup_ipsocket: laddr=172.29.248.193, lport=2427, faddr=172.19.184.65, fport=2427 1w1d: enqueue_ack: ackqhead=0, ackqtail=0, ackp=1DC1D38, msg=21A037C
The following is sample output from the debug mgcp media command and keyword:
Router# debug mgcp media Media Gateway Control Protocol media events debugging is on Router#
DB-1602
December 2010
DYNAMIC DYNAMIC *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1 *Jan 1
payload type payload type 03:02:13.159:mgcp_verify_supp_reqdet_ev 03:02:13.159:mgcp_verify_supp_signal_ev 03:02:13.159:process_request_ev- callp 635368FC, voice_if 6353C1F8 03:02:13.159:process_detect_ev- callp 635368FC, voice_if 6353C1F8 03:02:13.159:process_signal_ev- callp 635368FC, voice_ifp 6353C1F8 03:02:13.159:mgcp_process_quarantine_mode- callp 635368FC, voice_if 6353C1F8 03:02:13.159:mgcp_process_quarantine_mode- new q mode:process=0, loop=0 03:02:13.179:process_deferred_request_events 03:02:13.479:mgcp_verify_supp_reqdet_ev 03:02:13.479:mgcp_verify_supp_signal_ev 03:02:13.479:process_request_ev- callp 6353BCCC, voice_if 638C3094 03:02:13.479:process_detect_ev- callp 6353BCCC, voice_if 638C3094 03:02:13.479:process_signal_ev- callp 6353BCCC, voice_ifp 638C3094 03:02:13.479:mgcp_process_quarantine_mode- callp 6353BCCC, voice_if 638C3094 03:02:13.479:mgcp_process_quarantine_mode- new q mode:process=0, loop=0 03:02:13.499:process_deferred_request_events 03:02:13.827:mgcp_verify_supp_reqdet_ev 03:02:13.827:mgcp_verify_supp_signal_ev 03:02:13.827:process_request_ev- callp 635368FC, voice_if 6353C1F8 03:02:13.827:process_detect_ev- callp 635368FC, voice_if 6353C1F8 03:02:13.827:process_signal_ev- callp 635368FC, voice_ifp 6353C1F8 03:02:13.827:mgcp_process_quarantine_mode- callp 635368FC, voice_if 6353C1F8 03:02:13.827:mgcp_process_quarantine_mode- new q mode:process=0, loop=0 03:02:13.831:process_deferred_request_events 03:02:23.163:mgcp_cr_and_init_evt_node:$$$ the node pointer 63520B14
*Jan 1 03:02:23.163:mgcp_insert_node_to_preprocess_q:$$$enq to preprocess, qhead=63520B14, qtail=63520B14, count 1, evtptr=63520B14 *Jan 1 03:02:23.479:mgcp_cr_and_init_evt_node:$$$ the node pointer 63520BA8 *Jan 1 03:02:23.479:mgcp_insert_node_to_preprocess_q:$$$enq to preprocess, qhead=63520BA8, qtail=63520BA8, count 1, evtptr=63520BA8
The following is sample output for the debug mgcp nas command and keyword, with the debug mgcp packets command and keyword enabled as well:
Router# debug mgcp nas Media Gateway Control Protocol nas pkg events debugging is on Router# debug mgcp packets Media Gateway Control Protocol packets debugging is on Router# 01:49:14:MGCP Packet received CRCX 58 S7/DS1-0/23 MGCP 1.0 X:57 M:nas/data C:3 L:b:64, nas/bt:modem, nas/cdn:3000, nas/cgn:1000 mgcp_parse_conn_mode :string past nas = data mgcp_chq_nas_pkg:Full string:nas/bt:modem mgcp_chq_nas_pkg:string past slash:bt mgcp_chq_nas_pkg:string past colon:modem mgcp_chq_nas_pkg:Full string:nas/cdn:3000 mgcp_chq_nas_pkg:string past slash:cdn mgcp_chq_nas_pkg:string past colon:3000 mgcp_chq_nas_pkg:Full string:nas/cgn:1000 c5400#
DB-1603
mgcp_chq_nas_pkg:string past slash:cgn mgcp_chq_nas_pkg:string past colon:1000 CHECK DATA CALL for S7/DS1-0/23 mgcpapp_xcsp_get_chan_cb -Found - Channel state
Idle
CRCX Recv mgcpapp_endpt_is_data:endpt S7/DS1-0/23, slot 7, port 0 chan 23 mgcpapp_data_call_hnd:mgcpapp_xcsp_get_chan_cb -Found - Channel state bw=64, bearer=E1,cdn=3000,cgn=1000
Idle
The following is sample output from the debug mgcp packets command and keyword:
Router# debug mgcp packets Media Gateway Control Protocol packets debugging is on Router# 1w1d: MGCP Packet received DLCX 408631346 * MGCP 0.1 1w1d: send_mgcp_msg, MGCP Packet sent ---> 1w1d: 250 408631346 <---
The following is sample output from the debug mgcp parser command and keyword:
Router# debug mgcp parser Media Gateway Control Protocol parser debugging is on Router# 1w1d: -- mgcp_parse_packet() - call mgcp_parse_header - mgcp_parse_header()- Request Verb FOUND DLCX - mgcp_parse_packet() - out mgcp_parse_header - SUCCESS: mgcp_parse_packet()- MGCP Header parsing was OK - mgcp_val_mandatory_parms() - SUCCESS: mgcp_parse_packet()- END of Parsing 1w1d: -- mgcp_build_packet()1w1d: - mgcp_estimate_msg_buf_length() - 87 bytes needed for header - mgcp_estimate_msg_buf_length() - 87 bytes needed after checking parameter lines - mgcp_estimate_msg_buf_length() - 87 bytes needed after checking SDP lines - SUCCESS: MGCP message building OK - SUCCESS: END of building
The following is sample output from the debug mgcp src command and keyword:
Router# debug mgcp src Media Gateway Control Protocol System Resource Check CAC debugging is on Router# 00:14:08: setup_indication: Set incoming_call flag=TRUE in voice_if 00:14:08: send_mgcp_msg, MGCP Packet sent ---> 00:14:08: NTFY 11 aaln/S1/1@Router MGCP 0.1 N: emu@[1.4.173.1]:51665 X: 35 O: hd <--00:14:08: MGCP Packet received 200 11 hello 00:14:08: MGCP Packet received RQNT 42 aaln/S1/1 MGCP 0.1 N: emu@[1.4.173.1]:51665 X: 41 R: D/[0-9*#T](d), hu S: dl D: (911|xxxx)
DB-1604
December 2010
00:14:08: send_mgcp_msg, MGCP Packet sent ---> 00:14:08: 200 42 OK <--00:14:12: send_mgcp_msg, MGCP Packet sent ---> 00:14:12: NTFY 12 aaln/S1/1@Router MGCP 0.1 N: emu@[1.4.173.1]:51665 X: 41 O: D/2222 <--00:14:12: MGCP Packet received 200 12 phone-number ok 00:14:12: MGCP Packet received CRCX 44 aaln/S1/1 MGCP 0.1 N: emu@[1.4.173.1]:51665 C: 3 X: 43 R: hu(n) M: recvonly L: a:G.711u,p:5,e:off,s:off 00:14:12: 00:14:12: 00:14:12: 00:14:12: mgcp_setup_conn_check_system_resource: System resource check successful mgcp_voice_crcx: System resource is available mgcp_set_call_counter_control: Incoming call with 1 network leg, flag=FALSE send_mgcp_msg, MGCP Packet sent --->
00:14:12: 200 44 I: 4 v=0 o=- 4 0 IN IP4 1.4.120.1 s=Cisco SDP 0 c=IN IP4 1.4.120.1 t=0 0 m=audio 16404 RTP/AVP 0 <--00:14:13: MGCP Packet received MDCX 48 aaln/S1/1 MGCP 0.1 N: emu@[1.4.173.1]:51665 C: 3 I: 4 X: 47 M: recvonly R: hu L: a:G.711u,p:5,e:off,s:off
v=0 o=- 4 0 IN IP4 1.4.120.3 s=Cisco SDP 0 c=IN IP4 1.4.120.3 t=0 0 m=audio 16384 RTP/AVP 0 00:14:13: mgcp_modify_conn_check_system_resource: System resource check successful 00:14:13: mgcp_modify_connection: System resource is available 00:14:13: send_mgcp_msg, MGCP Packet sent ---> 00:14:13: 200 48 OK <--00:14:20: MGCP Packet received -
DB-1605
MDCX 52 aaln/S1/1 MGCP 0.1 N: emu@[1.4.173.1]:51665 C: 3 I: 4 X: 51 M: sendrecv R: hu L: a:G.711u,p:5,e:off,s:off 00:14:20: mgcp_modify_conn_check_system_resource: System resource check successful 00:14:20: mgcp_modify_connection: System resource is available 00:14:20: send_mgcp_msg, MGCP Packet sent ---> 00:14:20: 200 52 OK <--00:14:34: MGCP Packet received DLCX 56 aaln/S1/1 MGCP 0.1 X: 55 N: emu@[1.4.173.1]:51665 C: 3 I: 4 R: hu 00:14:34: send_mgcp_msg, MGCP Packet sent ---> 00:14:34: 250 56 P: PS=1382, OS=110180, PR=1378, OR=109936, PL=63484, JI=520, LA=2 <--00:14:36: mgcp_reset_call_direction: Reseting incoming_call flag=FALSE in voice_if 00:14:36: send_mgcp_msg, MGCP Packet sent ---> 00:14:36: NTFY 13 aaln/S1/1@tlkrgw1 MGCP 0.1 N: emu@[1.4.173.1]:51665 X: 55 O: hu <---
DB-1606
December 2010
Syntax Description
tracelevel
criticalDisplays only high priority debug information. moderateDisplays medium and high priority debug information. verboseDisplays all debug information. This is the default level.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Additional information was displayed for the gateways. The output was modified to display parameters for the MGCP channel-associated signaling (CAS) PBX and ATM adaptation layer 2 (AAL2) permanent virtual circuit (PVC) features. The command was implemented on the Cisco AS5350, Cisco AS5400, and Cisco AS5850. Support for this command was implemented in Cisco 7200 series images. The tracelevel keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
debug mgcp endptdb debug mgcp errors debug mgcp events debug mgcp gcfm debug mgcp inout debug mgcp media
DB-1607
debug mgcp nas debug mgcp packets debug mgcp parser debug mgcp src debug mgcp state debug mgcp voipcac
Caution
Using the debug mgcp all command may severely impact network performance.
Examples
The following is sample output from the debug mgcp all command:
Router# debug mgcp all This may severely impact network performance. Continue[confirm] Media Gateway Control Protocol all debugging is on, trace-level Verbose Router# *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_count_active_mgc_msg_stat(240):[lvl=1]MGC stat 192.168.1.200, total=8, succ=5, failed=1 *Sep 10 17:20:24.408: MGCP Packet received from 192.168.1.200:7979---> CRCX 6 aaln/S2/SU1/1 MGCP 1.0 M: recvonly C: 1 <--*Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcpapp_process_mgcp_msg(3318):[lvl=0] : <NEW MGCP MSG From CA> *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_packet(316):[lvl=0]call mgcp_parse_header *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_packet(320):[lvl=0]out mgcp_parse_header *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_packet(360):[lvl=1]SUCCESS: - MGCP Header parsing was OK *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_string_parse(186):[lvl=0]return code=1. *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_parameter_lines(725):[lvl=1]return parse function in mgcp_parm_rules_array[6]. *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4762):[lvl=0](in_ptr: recvonly) *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4780):[lvl=0]tmp_ptr:(recvonly) *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4816):[lvl=0]tmp_ptr:(recvonly) *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4822):[lvl=0]match recvonly recvonly *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4830):[lvl=0]case MODE_RECVONLY
DB-1608
December 2010
*Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4894):[lvl=0]SUCCESS: Connection Mode parsing is OK *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_string_parse(186):[lvl=0]return code=1. *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_parameter_lines(725):[lvl=1]return parse function in mgcp_parm_rules_array[1]. *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_call_id(840):[lvl=0]in_ptr: 1 *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_call_id(883):[lvl=1]SUCCESS: Call ID string(1) parsing is OK *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_val_mandatory_parms(12428):[lvl=0]Entered *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_val_comp_mp_parms(14923):[lvl=0]Entered *Sep 10 17:20:24.408: //-1/xxxxxxxxxxxx/MGCP/mgcp_val_comp_mp_parms(14928):[lvl=1] lcon_opt_ptr could not be obtained *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_packet(378):[lvl=2]SUCCESS: END of Parsing *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_a(1339):[lvl=0]aaln/S2/SU1/1 *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_aaln_slot(1632):[lvl=0]2/SU1/1 *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_digit(1600):[lvl=0]2/SU1/1 *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_aaln_slot(1641):[lvl=0] : ifn 0x665449A8, slot:2 *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_aaln_su(1773):[lvl=0]1/1 *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_digit(1600):[lvl=0]1/1 *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_aaln_port(1807):[lvl=0]1 *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_digit(1600):[lvl=0]1 *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/mgcp_endpt_get_endpt_offset(2590):[lvl=0]endpt NULL *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_get_by_ifn(1326):[lvl=0]Entered *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_get_tree_link_by_ifn(1145):[lvl=0]Entered *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_compute_key(196):[lvl=0]type 2 slot 0002 subunit 0001 *Sep 10 17:20:24.412: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_get_tree_link_by_ifn(1157):[lvl=0]computed key 0x2081FF01
Related Commands
Command debug mgcp endpoint debug mgcp tracelevel-default mgcp mgcp debug-header show debugging show mgcp voice call debug
Description Enables debug traces for a specific MGCP endpoint. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays the types of debugging that are enabled. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1609
Syntax Description
Name of the MGCP endpoint for which to enable debugging. Must be a fully specified and supported endpoint. Displays MGCP errors, events, media, and packets for the specified endpoint. Displays MGCP errors for the specified endpoint. Displays MGCP events for the specified endpoint. Displays MGCP tone and signal events for the specified endpoint. Displays MGCP packets for the specified endpoint. (Optional) Sets the priority level for the all, events, or media debug trace.
Note
criticalDisplays only high-priority debug information. moderateDisplays medium and high-priority debug information. verboseDisplays all debug information. This is the default level. This keyword is not available for errors or packets debugging.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command enables debugging for a specific MGCP endpoint. You can enable the same type of debugging globally for all endpoints by using the debug mgcp all, debug mgcp errors, debug mgcp events, debug mgcp media, or debug mgcp packets commands.
DB-1610
December 2010
Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance. This command sets the trace level for the specific endpoint. You can set the trace level globally for all MGCP debug commands and endpoints by using the debug mgcp tracelevel-default command. Setting the endpoint-specific trace level takes precedence over the global trace-level.
Note
Trace levels are not supported for errors or packets debugging because all of the output from those commands is set to high priority.
Examples
The following is sample output from the debug mgcp endpoint command:
Router# debug mgcp endpoint aaln/S2/SU1/1 events tracelevel critical Media Gateway Control Protocol events debugging for endpoint aaln/S2/SU1/1 is on, trace-level Critical Router# *Sep 10 17:46:13.100: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcp_idle_crcx(4875):[lvl=2]callp(0x63E313E0), current state CALL_IDLE, event EV_CREATE_CONN *Sep 10 17:46:13.100: //7/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_invoke_app_sm(570):[lvl=2]MGCP:FSM done- callp(63E313E0), new state CALL_CONNECTING, event EV_CREATE_CONN *Sep 10 17:46:13.104: //8/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_call_pre_conference(223):[lvl=2]call p(0x63E311D0), current state CALL_CONNECTING, event EV_CALL_CONNECT *Sep 10 17:46:13.104: //8/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_call_connect(7331):[lvl=2]callp(0x63 E311D0), current state CALL_CONNECTING, event EV_CALL_CONNECT *Sep 10 17:46:13.104: //8/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_invoke_app_sm(570):[lvl=2]MGCP:FSM done- callp(63E311D0), new state CALL_CONFERENCING, event EV_CALL_CONNECT *Sep 10 17:46:13.104: //7/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_call_proceeding(6306):[lvl=2]callp( 0x63E313E0), current state CALL_CONNECTING, event EV_CALL_PROCEED *Sep 10 17:46:13.104: //7/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_call_connect(7331):[lvl=2]callp(0x6 3E313E0), current state CALL_CONNECTING, event EV_CALL_PROCEED *Sep 10 17:46:13.104: //7/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_invoke_app_sm(570):[lvl=2]MGCP:FSM done- callp(63E313E0), new state CALL_CONFERENCING, event EV_CALL_PROCEED *Sep 10 17:46:13.108: //7/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_ignore_ccapi_ev(4316):[lvl=2]callp( 0x63E313E0), current state CALL_CONFERENCING, event EV_CONF_RDY *Sep 10 17:46:13.108: //7/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_invoke_app_sm(570):[lvl=2]MGCP:FSM done- callp(63E313E0), new state CALL_CONFERENCING, event EV_CONF_RDY *Sep 10 17:46:13.108: //7/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_call_modified(7710):[lvl=2]callp(0x 63E313E0), current state CALL_CONFERENCING, event EV_MODIFY_DONE *Sep 10 17:46:13.108: //7/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_invoke_app_sm(570):[lvl=2]MGCP:FSM done- callp(63E313E0), new state CALL_CONFERENCING, event EV_MODIFY_DONE *Sep 10 17:46:13.108: //7/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_voice_mode_done(7994):[lvl=2]callp( 0x63E313E0), current state CALL_CONFERENCING, event EV_VOICE_MODE_DONE, minor ev(d): 138, minor ev
DB-1611
*Sep 10 17:46:13.112: //7/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_invoke_app_sm(570):[lvl=2]MGCP:FSM done- callp(63E313E0), new state CALL_ACTIVE, event EV_VOICE_MODE_DONE *Sep 10 17:46:23.104: //7/9D04EB218005/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_invoke_app_sm(570):[lvl=2]MGCP:FSM done- callp(63E313E0), new state CALL_ACTIVE, event EV_MEDIA_EVT
Related Commands
Command debug mgcp all debug mgcp errors debug mgcp events debug mgcp media debug mgcp packets debug mgcp tracelevel-default mgcp mgcp debug-header show debugging show mgcp voice call debug
Description Enables all debug traces for MGCP. Enables debug traces for MGCP errors. Enables debug traces for MGCP events. Enables debug traces for MGCP tone and signal events. Enables debug traces for MGCP packets. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays the types of debugging that are enabled. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1612
December 2010
Syntax Description
tracelevel
criticalDisplays only high priority debug information. moderateDisplays medium and high priority debug information. verboseDisplays all debug information. This is the default level.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(11)T. The tracelevel keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command enables debugging globally for all MGCP endpoints. You can limit debugging to a specific endpoint by using the debug mgcp endpoint command. Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance.
Examples
The following is sample output from the debug mgcp endptdb command used with the debug mgcp packets command:
Router# debug mgcp packets Media Gateway Control Protocol packets debugging for all endpoints is on Router# debug mgcp endptdb
DB-1613
Media Gateway Control Protocol endpoint database debugging for all endpoints is on, trace-level Verbose Router# *Sep 10 11:39:16.467: MGCP Packet received from 192.168.1.200:7979---> CRCX 27 aaln/S2/SU1/1 MGCP 1.0 M: recvonly C: 1 <--*Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_a(1339):[lvl=0]aaln/S2/SU1/1 *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_aaln_slot(1632):[lvl=0]2/SU1/1 *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_digit(1600):[lvl=0]2/SU1/1 *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_aaln_slot(1641):[lvl=0] : ifn 0x665449A8, slot:2 *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_aaln_su(1773):[lvl=0]1/1 *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_digit(1600):[lvl=0]1/1 *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_aaln_port(1807):[lvl=0]1 *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_digit(1600):[lvl=0]1 *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_get_by_ifn(1326):[lvl=0]Entered *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_get_tree_link_by_ifn(1145):[lvl=0]Entered *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_compute_key(196):[lvl=0]type 2 slot 0002 subunit 0001 *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_get_tree_link_by_ifn(1157):[lvl=0]computed key 0x2081FF01 *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_get_state(3758):[lvl=0]endpt aaln/S2/SU1/1 *Sep 10 11:39:16.467: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_default_get_state(3779):[lvl=0]endpt aaln/S2/SU1/1 *Sep 10 11:39:16.479: MGCP Packet sent to 192.168.1.200:7979---> 200 27 OK I: D v=0 c=IN IP4 192.168.1.79 m=audio 16870 RTP/AVP 0 8 99 101 102 2 15 103 4 104 105 106 107 18 100 a=rtpmap:99 G.729a/8000 a=rtpmap:101 G.726-16/8000 a=rtpmap:102 G.726-24/8000 a=rtpmap:103 G.723.1-H/8000 a=rtpmap:104 G.723.1-L/8000 a=rtpmap:105 G.729b/8000 a=rtpmap:106 G.723.1a-H/8000 a=rtpmap:107 G.723.1a-L/8000 a=rtpmap:100 X-NSE/8000 a=fmtp:100 200-202 a=X-sqn:0 a=X-cap: 1 audio RTP/AVP 100 a=X-cpar: a=rtpmap:100 X-NSE/8000 a=X-cpar: a=fmtp:100 200-202 a=X-cap: 2 image udptl t38 <---
DB-1614
December 2010
Related Commands
Command debug mgcp all debug mgcp endpoint debug mgcp tracelevel-default mgcp mgcp debug-header show mgcp voice call debug
Description Enables all debug traces for MGCP. Enables debug traces for a specific MGCP endpoint. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1615
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Release 12.1(1)T 12.1(3)T 12.1(5)XM, 12.2(2)T 12.2(2)XA 12.2(11)T 12.2(13)T 12.4(4)T 12.2SX
Modification This command was introduced. Additional information was displayed for the gateways. The output was modified to display parameters for the MGCP channel-associated signaling (CAS) PBX and ATM adaptation layer 2 (AAL2) permanent virtual circuit (PVC) features. The endpoint endpoint-name keyword and argument were added. The command was implemented on the Cisco AS5350, Cisco AS5400, and Cisco AS5850. Support for this command was implemented in Cisco 7200 series images. The endpoint endpoint-name keyword and argument were removed and replaced by the debug mgcp endpoint command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command enables error debugging globally for all MGCP endpoints. You can limit debugging to a specific endpoint by using the debug mgcp endpoint command.
Examples
The following is sample output from the debug mgcp errors command:
Router# debug mgcp errors *Oct 16 12:09:05.538: MGC stat - 10.208.237.83, total=1029, succ=998, failed=0mgcp_parse_header()- Request Verb FOUND AUEP - mgcp_parse_request_header()- MGCP_V10, start check for profile - mgcp_parse_header: mgcp_parse_request_header returns status: 0
DB-1616
December 2010
*Oct 16 12:09:05.538: MGCP Packet received from 10.208.237.83AUEP 9634549 S0/DS1-0/1@AS5300 MGCP 1.0 F: I *Oct 16 12:09:05.542: -- mgcp_parse_packet() - call mgcp_parse_header - mgcp_parse_header()- Request Verb FOUND AUEP - mgcp_parse_request_header()- MGCP_V10, start check for profile - mgcp_parse_header: mgcp_parse_request_header returns status: 0 - mgcp_parse_packet() - out mgcp_parse_header - SUCCESS: mgcp_parse_packet()-MGCP Header parsing was OK - mgcp_parse_parameter_lines(), code_str:: I, code_len:2, str:F: I - mgcp_parse_parameter_lines(str:F: I) -num_toks: 28 - mgcp_parse_parameter_lines() check NULL str(I), in_ptr(F: I) - mgcp_parse_parameter_lines() return Parse function in mgcp_parm_rules_array[14] - mgcp_parse_req_info(I) is called - mgcp_parse_req_info() - tmp_ptr:(I) - SUCCESS: Request Info parameter line (F:) parsing OK - mgcp_val_mandatory_parms()
Related Commands
Command debug mgcp all debug mgcp endpoint mgcp mgcp debug-header show mgcp voice call debug
Description Enables all debug traces for MGCP. Enables debug traces for a specific MGCP endpoint. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1617
Syntax Description
tracelevel
criticalDisplays only high priority debug information. moderateDisplays medium and high priority debug information. verboseDisplays all debug information. This is the default level.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Additional information was displayed for the gateways. The output was modified to display parameters for the MGCP channel-associated signaling (CAS) PBX and ATM adaptation layer 2 (AAL2) permanent virtual circuit (PVC) features. The endpoint endpoint-name keyword and argument were added. The command was implemented on the Cisco AS5350, Cisco AS5400, and Cisco AS5850. Support for this command was implemented in Cisco 7200 series images. The endpoint endpoint-name keyword and argument were removed and replaced by the debug mgcp endpoint command. The tracelevel keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
This command enables events debugging globally for all MGCP endpoints. You can limit debugging to a specific endpoint by using the debug mgcp endpoint command. Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance.
DB-1618
December 2010
Examples
The following is sample output from the debug mgcp events command:
Router# debug mgcp events Media Gateway Control Protocol events debugging for all endpoints is on, trace-level Verbose Router# *Sep 10 09:22:41.276: //-1/xxxxxxxxxxxx/MGCP/mgcpapp_stw_call_back(316):[lvl=0]timer type 1 *Sep 10 09:22:41.276: //-1/xxxxxxxxxxxx/MGCP/mgcpapp_process_timers(1431):[lvl=0]timer of type 1 expired. *Sep 10 09:22:41.276: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcp_remove_old_ack(712):[lvl=1]Removing ack: (trans ID 15) : 250 15 OK P: PS=0, OS=0, PR=0, OR=0, PL=0, JI=0, LA=0 *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP/mgcp_count_active_mgc_msg_stat(240):[lvl=1]MGC stat 192.168.1.200, total=18, succ=14, failed=2 *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP/mgcpapp_process_mgcp_msg(3318):[lvl=0] : <NEW MGCP MSG From CA> *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP/mgcp_endpt_get_endpt_offset(2590):[lvl=0]endpt NULL *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcpapp_setup_per_call_data(2487):[lvl=1]mgcpap p_setup_per_call_data: callp: 63E313E0, vdbptr: 65822AF8, state: CALL_IDLE *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP/mgcp_endpt_get_notified_entity(439):[lvl=0]Entered *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP/mgcp_endpt_get_notified_entity(458):[lvl=1]ne callagenthost:7979, ne addr 192.168.1.200:7979 *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP/xlate_mgcp_ev(921):[lvl=1]hdr_type 1 *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcpapp_process_mgcp_event(2615):[lvl=1]Process ing Incoming Message [CRCX 16] *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcpapp_invoke_mgcp_sm(2559):[lvl=1]Msg In-Progress(Active) [INVVERB 0], await_ev=0, queued=0x00000000 *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcp_process_deferred_queue(3362):[lvl=0]Entere d *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP/mgcp_store_endpt_and_ntfy_entity_name(4464):[lvl=0]Entered *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcp_invoke_app_sm(535):[lvl=0]MGCP:calling FSM- callp(63E313E0) *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcp_idle_crcx(4875):[lvl=2]callp(0x63E313E0), current state CALL_IDLE, event EV_CREATE_CONN *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP/mgcp_init_modem_relay_params(103):[lvl=0]modem-relay-enabled=0, mr-gw-xid=0 *Sep 10 09:22:42.300: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcp_compute_debugsy_hdr(274):[lvl=0]Building Debugsy header *Sep 10 09:22:42.300: //-1/C537F3F38008/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_compute_debugsy_hdr(383):[lvl=0]GU ID[C537F3F38008] assigned to call_id[-1], endpt[aaln/S2/SU1/1], mgcp_call_id[n/a], conn_id[0] *Sep 10 09:22:42.300: //-1/C537F3F38008/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_idle_crcx(4961):[lvl=0]calls mgcp_allocate_if()
DB-1619
*Sep 10 09:22:42.300: //-1/C537F3F38008/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_idle_crcx(5006):[lvl=1]get capability *Sep 10 09:22:42.300: //-1/C537F3F38008/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_compute_debugsy_hdr(274):[lvl=0]Bu ilding Debugsy header *Sep 10 09:22:42.304: //-1/C537F3F38008/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_compute_debugsy_hdr(383):[lvl=0]GU ID[C537F3F38008] assigned to call_id[-1], endpt[aaln/S2/SU1/1], mgcp_call_id[1], conn_id[0] *Sep 10 09:22:42.304: //-1/C537F3F38008/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_idle_crcx(5093):[lvl=0]Default aal2 vc = 1 1-pvc,2-svc *Sep 10 09:22:42.304: //-1/xxxxxxxxxxxx/MGCP/mgcp_init_vox_if_record(6781):[lvl=0]reusing records. conn_type: 2, vox if_type: 1 *Sep 10 09:22:42.304: //-1/xxxxxxxxxxxx/MGCP/mgcp_compute_debugsy_hdr(274):[lvl=0]Building Debugsy header
Related Commands
Command debug mgcp all debug mgcp endpoint debug mgcp tracelevel-default mgcp mgcp debug-header show mgcp voice call debug
Description Enables all debug traces for MGCP. Enables debug traces for a specific MGCP endpoint. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1620
December 2010
Syntax Description
tracelevel
criticalDisplays only high priority debug information. moderateDisplays medium and high priority debug information. verboseDisplays all debug information. This is the default level.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command enables GCFM debugging globally for all MGCP endpoints. Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance.
Examples
The following is sample output from the debug mgcp gcfm command:
Router# debug mgcp gcfm Media Gateway Control Protocol gcfm debugging for all endpoints is on, trace-level Verbose Router# *Sep 10 09:24:52.692: //-1/12F030978009/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_gcfm_percall_register(315):[lvl=2] GCFM Inactive *Sep 10 09:24:52.692: //-1/12F030978009/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_gcfm_percall_register(315):[lvl=2]G CFM Inactive Router#
DB-1621
Related Commands
Command debug call filter inout debug mgcp endpoint debug mgcp tracelevel-default mgcp mgcp debug-header show mgcp voice call debug
Description Displays the debug trace inside the GCFM. Enables debug traces for a specific MGCP endpoint. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1622
December 2010
Syntax Description
tracelevel
criticalDisplays only high priority debug information. moderateDisplays medium and high priority debug information. verboseDisplays all debug information. This is the default level.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance.
Examples
The following is sample output from the debug mgcp inout command:
Router# debug mgcp inout Media Gateway Control Protocol inout debugging for all endpoints is on, trace-level Verbose Router# *Sep 10 09:26:37.780: //-1/xxxxxxxxxxxx/MGCP/mgcp_count_active_mgc_msg_stat(240):[lvl=1]MGC stat 192.168.1.200, total=22, succ=18, failed=2 *Sep 10 09:26:37.780: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_packet(316):[lvl=0]call mgcp_parse_header *Sep 10 09:26:37.780: //-1/xxxxxxxxxxxx/MGCP/mgcp_string_parse(186):[lvl=0]return code=1.
DB-1623
*Sep 10 09:26:37.780: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4762):[lvl=0](in_ptr: recvonly) *Sep 10 09:26:37.780: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4894):[lvl=0]SUCCESS: Connection Mode parsing is OK *Sep 10 09:26:37.780: //-1/xxxxxxxxxxxx/MGCP/mgcp_string_parse(186):[lvl=0]return code=1. *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_call_id(840):[lvl=0]in_ptr: 1 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_call_id(883):[lvl=1]SUCCESS: Call ID string(1) parsing is OK *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/mgcp_val_mandatory_parms(12428):[lvl=0]Entered *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_a(1339):[lvl=0]aaln/S2/SU1/1 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_aaln_slot(1632):[lvl=0]2/SU1/1 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_digit(1600):[lvl=0]2/SU1/1 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_aaln_su(1773):[lvl=0]1/1 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_digit(1600):[lvl=0]1/1 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_aaln_port(1807):[lvl=0]1 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_name_parse_digit(1600):[lvl=0]1 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/mgcp_endpt_get_endpt_offset(2590):[lvl=0]endpt NULL *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_get_by_ifn(1326):[lvl=0]Entered *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_get_tree_link_by_ifn(1145):[lvl=0]Entered *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_compute_key(196):[lvl=0]type 2 slot 0002 subunit 0001 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_get_state(3758):[lvl=0]endpt aaln/S2/SU1/1 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xgcp_endpt_default_get_state(3779):[lvl=0]endpt aaln/S2/SU1/1 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/mgcp_endpt_get_notified_entity(439):[lvl=0]Entered *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/mgcp_endpt_get_notified_entity(458):[lvl=1]ne callagenthost:7979, ne addr 192.168.1.200:7979 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/xlate_mgcp_ev(921):[lvl=1]hdr_type 1 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcpapp_invoke_mgcp_sm(2559):[lvl=1]Msg In-Progress(Active) [INVVERB 0], await_ev=0, queued=0x00000000 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcp_process_deferred_queue(3362):[lvl=0]Entere d *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/mgcp_store_endpt_and_ntfy_entity_name(4464):[lvl=0]Entered *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcp_idle_crcx(4875):[lvl=2]callp(0x63E313E0), current state CALL_IDLE, event EV_CREATE_CONN *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP/mgcp_init_modem_relay_params(103):[lvl=0]modem-relay-enabled=0, mr-gw-xid=0 *Sep 10 09:26:37.784: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcp_compute_debugsy_hdr(274):[lvl=0]Building Debugsy header *Sep 10 09:26:37.784: //-1/5193F3E0800A/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_compute_debugsy_hdr(383):[lvl=0]GU ID[5193F3E0800A] assigned to call_id[-1], endpt[aaln/S2/SU1/1], mgcp_call_id[n/a], conn_id[0]
DB-1624
December 2010
*Sep 10 09:26:37.784: //-1/5193F3E0800A/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_verify_supp_reqdet_ev(10645):[lvl= 0]Entered *Sep 10 09:26:37.784: //-1/5193F3E0800A/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_verify_supp_signal_ev(10685):[lvl= 0]Entered *Sep 10 09:26:37.784: //-1/5193F3E0800A/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_compute_debugsy_hdr(274):[lvl=0]Bu ilding Debugsy header
Related Commands
Command debug mgcp all debug mgcp tracelevel-default mgcp mgcp debug-header show mgcp voice call debug
Description Enables all debug traces for MGCP. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1625
Syntax Description
tracelevel
criticalDisplays only high priority debug information. moderateDisplays medium and high priority debug information. verboseDisplays all debug information. This is the default level.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The command was implemented on the Cisco AS5350, Cisco AS5400, and Cisco AS5850. Support for this command was implemented in Cisco 7200 series images. The endpoint endpoint-name keyword and argument were removed and replaced by the debug mgcp endpoint command. The tracelevel keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
This command enables media debugging globally for all MGCP endpoints. You can limit debugging to a specific endpoint by using the debug mgcp endpoint command. Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance.
DB-1626
December 2010
Examples
The following is sample output from the debug mgcp media command:
Router# debug mgcp media Media Gateway Control Protocol media events debugging for all endpoints is on, trace-level Verbose Router# *Sep 10 09:27:48.928: //-1/7BFBA9F9800B/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_verify_supp_reqdet_ev(10645):[lvl= 0]Entered *Sep 10 09:27:48.928: //-1/7BFBA9F9800B/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_verify_supp_signal_ev(10685):[lvl= 0]Entered *Sep 10 09:27:48.928: //-1/7BFBA9F9800B/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/process_request_ev(5800):[lvl=1]callp 63E313E0, voice_if 6663CA38 *Sep 10 09:27:48.928: //-1/7BFBA9F9800B/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/process_detect_ev(6007):[lvl=0]callp 63E313E0, voice_if 6663CA38 *Sep 10 09:27:48.928: //-1/7BFBA9F9800B/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/process_signal_ev(5500):[lvl=0]callp 63E313E0, voice_ifp 6663CA38 *Sep 10 09:27:48.928: //-1/7BFBA9F9800B/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_process_quarantine_mode(6096):[lvl =0]callp 63E313E0, voice_if 6663CA38 *Sep 10 09:27:48.928: //-1/7BFBA9F9800B/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_process_quarantine_mode(6149):[lvl =0]Q mode not found, Reset default values *Sep 10 09:27:48.928: //-1/7BFBA9F9800B/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_process_quarantine_mode(6168):[lvl =1]Q mode: process=0, loop=0 *Sep 10 09:27:48.936: //19/7BFBA9F9800B/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_process_pending_t38_port_switch(16 49):[lvl=1]conn_recp->conn_id: 0x0 *Sep 10 09:27:48.940: //19/7BFBA9F9800B/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/process_deferred_request_events(5724):[ lvl=0]Entered
Related Commands
Command debug mgcp all debug mgcp endpoint debug mgcp tracelevel-default mgcp mgcp debug-header show mgcp voice call debug
Description Enables all debug traces for MGCP. Enables debug traces for a specific MGCP endpoint. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1627
Syntax Description
tracelevel
criticalDisplays only high priority debug information. moderateDisplays medium and high priority debug information. verboseDisplays all debug information. This is the default level.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The command was implemented on the Cisco AS5350, Cisco AS5400, and Cisco AS5850. Support for this command was implemented in Cisco 7200 series images. The tracelevel keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance.
Examples
The following is sample output for the debug mgcp nas command with the debug mgcp packets command also enabled:
Router# debug mgcp nas Media Gateway Control Protocol nas pkg events debugging for all endpoints is on, trace-level Verbose Router# debug mgcp packets
DB-1628
December 2010
Media Gateway Control Protocol packets debugging for all endpoints is on Router# *Sep 10 11:51:41.863: MGCP Packet received from 192.168.1.200:7979---> CRCX 34 aaln/S2/SU1/1 MGCP 1.0 X:57 M: nas/data C:3 L:b:64, nas/bt:modem, nas/cdn:3000, nas/cgn:1000 C: 1 <--*Sep 10 11:51:41.863: //-1/xxxxxxxxxxxx/MGCP/mgcp_chq_nas_pkg(779):[lvl=0]Full string: nas/bt:modem *Sep 10 11:51:41.863: //-1/xxxxxxxxxxxx/MGCP/mgcp_chq_nas_pkg(791):[lvl=1]string past slash: bt *Sep 10 11:51:41.863: //-1/xxxxxxxxxxxx/MGCP/mgcp_chq_nas_pkg(792):[lvl=1]string past colon: modem *Sep 10 11:51:41.863: //-1/xxxxxxxxxxxx/MGCP/mgcp_chq_nas_pkg(779):[lvl=0]Full string: nas/cdn:3000 *Sep 10 11:51:41.863: //-1/xxxxxxxxxxxx/MGCP/mgcp_chq_nas_pkg(791):[lvl=1]string past slash: cdn *Sep 10 11:51:41.863: //-1/xxxxxxxxxxxx/MGCP/mgcp_chq_nas_pkg(792):[lvl=1]string past colon: 3000 *Sep 10 11:51:41.863: //-1/xxxxxxxxxxxx/MGCP/mgcp_chq_nas_pkg(779):[lvl=0]Full string: nas/cgn:1000 *Sep 10 11:51:41.863: //-1/xxxxxxxxxxxx/MGCP/mgcp_chq_nas_pkg(791):[lvl=1]string past slash: cgn *Sep 10 11:51:41.863: //-1/xxxxxxxxxxxx/MGCP/mgcp_chq_nas_pkg(792):[lvl=1]string past colon: 1000
Related Commands
Command debug mgcp all debug mgcp tracelevel-default mgcp mgcp debug-header show mgcp voice call debug
Description Enables all debug traces for MGCP. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1629
Syntax Description
input-hex
Command Default
Command Modes
Privileged EXEC
Command History
Release 12.1(1)T 12.1(3)T 12.1(5)XM, 12.2(2)T 12.2(2)XA 12.2(11)T 12.2(13)T 12.4(4)T 12.2SX
Modification This command was introduced. Additional information was displayed for the gateways. The output was modified to display parameters for the MGCP channel-associated signaling (CAS) PBX and ATM adaptation layer 2 (AAL2) permanent virtual circuit (PVC) features. The endpoint endpoint-name keyword and argument and the input-hex keyword were added. The command was implemented on the Cisco AS5350, Cisco AS5400, and Cisco AS5850. Support for this command was implemented in Cisco 7200 series images. The endpoint endpoint-name keyword and argument were removed and replaced by the debug mgcp endpoint command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command enables packet debugging globally for all MGCP endpoints. You can limit debugging to a specific endpoint by using the debug mgcp endpoint command. Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance.
DB-1630
December 2010
Examples
The following is sample output from the debug mgcp packets command:
Router# debug mgcp packets Media Gateway Control Protocol packets debugging for all endpoints is on Router# *Sep 10 11:57:26.795: MGCP Packet received from 192.168.1.200:7979---> CRCX 38 aaln/S2/SU1/1 MGCP 1.0 M: recvonly C: 1 <--*Sep 10 11:57:26.795: //-1/xxxxxxxxxxxx/MGCP|aaln/S2/SU1/1|-1|-1/mgcpapp_invoke_mgcp_sm(2569):[lvl=0]CHECK DATA CALL for aaln/S2/SU1/1 *Sep 10 11:57:26.807: MGCP Packet sent to 192.168.1.200:7979---> 200 38 OK I: 10 v=0 c=IN IP4 192.168.1.79 m=audio 18876 RTP/AVP 0 8 99 101 102 2 15 103 4 104 105 106 107 18 100 a=rtpmap:99 G.729a/8000 a=rtpmap:101 G.726-16/8000 a=rtpmap:102 G.726-24/8000 a=rtpmap:103 G.723.1-H/8000 a=rtpmap:104 G.723.1-L/8000 a=rtpmap:105 G.729b/8000 a=rtpmap:106 G.723.1a-H/8000 a=rtpmap:107 G.723.1a-L/8000 a=rtpmap:100 X-NSE/8000 a=fmtp:100 200-202 a=X-sqn:0 a=X-cap: 1 audio RTP/AVP 100 a=X-cpar: a=rtpmap:100 X-NSE/8000 a=X-cpar: a=fmtp:100 200-202 a=X-cap: 2 image udptl t38 <---
Related Commands
Command debug mgcp all debug mgcp endpoint debug mgcp tracelevel-default mgcp mgcp debug-header show mgcp voice call debug
Description Enables all debug traces for MGCP. Enables debug traces for a specific MGCP endpoint. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1631
Syntax Description
tracelevel
criticalDisplays only high priority debug information. moderateDisplays medium and high priority debug information. verboseDisplays all debug information. This is the default level.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Additional information was displayed for the gateways. The output was modified to display parameters for the MGCP channel-associated signaling (CAS) PBX and ATM adaptation layer 2 (AAL2) permanent virtual circuit (PVC) features. The command was implemented on the Cisco AS5350, Cisco AS5400, and Cisco AS5850. Support for this command was implemented in Cisco 7200 series images. The tracelevel keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance.
DB-1632
December 2010
Examples
The following is sample output from the debug mgcp parser command:
Router# debug mgcp parser Media Gateway Control Protocol parser debugging for all endpoints is on, trace-level Verbose Router# *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_packet(316):[lvl=0]call mgcp_parse_header *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_packet(320):[lvl=0]out mgcp_parse_header *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_packet(360):[lvl=1]SUCCESS: - MGCP Header parsing was OK *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_string_parse(186):[lvl=0]return code=1. *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_parameter_lines(725):[lvl=1]return parse function in mgcp_parm_rules_array[6]. *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4762):[lvl=0](in_ptr: recvonly) *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4780):[lvl=0]tmp_ptr:(recvonly) *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4816):[lvl=0]tmp_ptr:(recvonly) *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4822):[lvl=0]match recvonly recvonly *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4830):[lvl=0]case MODE_RECVONLY *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_conn_mode(4894):[lvl=0]SUCCESS: Connection Mode parsing is OK *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_string_parse(186):[lvl=0]return code=1. *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_parameter_lines(725):[lvl=1]return parse function in mgcp_parm_rules_array[1]. *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_call_id(840):[lvl=0]in_ptr: 1 *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_call_id(883):[lvl=1]SUCCESS: Call ID string(1) parsing is OK *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_val_mandatory_parms(12428):[lvl=0]Entered *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_val_comp_mp_parms(14923):[lvl=0]Entered *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_val_comp_mp_parms(14928):[lvl=1] lcon_opt_ptr could not be obtained *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_parse_packet(378):[lvl=2]SUCCESS: END of Parsing *Sep 10 11:58:51.283: //-1/95915C328011/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_validate_version_with_call_agent_s erv_type(8322):[lvl=1]req_msg_version: 5, config_version: 5 *Sep 10 11:58:51.283: //-1/xxxxxxxxxxxx/MGCP/mgcp_validate_net_type(6601):[lvl=1] lcnw_valid=0, lc_con_valid=0 *Sep 10 11:58:51.287: //-1/xxxxxxxxxxxx/MGCP/mgcp_validate_net_type(6710):[lvl=1]Network type/conection type valid = 1. connection type = 1 [1->RTP, 2->AAL1_SDT, 4->AAL2] *Sep 10 11:58:51.287: //-1/xxxxxxxxxxxx/MGCP/mgcp_get_qos(2665):[lvl=1]MGCP msg qos value=0 *Sep 10 11:58:51.287: //-1/xxxxxxxxxxxx/MGCP/mgcp_init_dyn_payload_types(2899):[lvl=1]used payload type map = 2F400003
DB-1633
*Sep 10 11:58:51.287: //-1/xxxxxxxxxxxx/MGCP/get_voip_peer_info(7155):[lvl=1]No SDP connection info *Sep 10 11:58:51.287: //-1/95915C328011/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_select_codec_only(897):[lvl=1]num supprt codec=14 *Sep 10 11:58:51.287: //-1/95915C328011/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_select_codec_only(1061):[lvl=0]glob codec=1 (syn=1) *Sep 10 11:58:51.287: //-1/95915C328011/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_select_codec_only(1063):[lvl=0]supp list= *Sep 10 11:58:51.287: //-1/95915C328011/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_select_codec_only(1067):[lvl=0] 1 *Sep 10 11:58:51.287: //-1/95915C328011/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_select_codec_only(1067):[lvl=0],2 *Sep 10 11:58:51.287: //-1/95915C328011/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_select_codec_only(1067):[lvl=0],7
Related Commands
Command debug mgcp all debug mgcp tracelevel-default mgcp mgcp debug-header show mgcp voice call debug
Description Enables all debug traces for MGCP. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1634
December 2010
Syntax Description
tracelevel
criticalDisplays only high priority debug information. moderateDisplays medium and high priority debug information. verboseDisplays all debug information. This is the default level.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(8)T. The command was implemented on the Cisco AS5350, Cisco AS5400, and Cisco AS5850. Support for this command was implemented in Cisco 7200 series images. The tracelevel keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance.
Examples
The following is sample output from the debug mgcp src command:
Router# debug mgcp src Media Gateway Control Protocol System Resource Check CAC debugging for all endpoints is on, trace-level Verbose Router#
DB-1635
*Sep 10 12:01:14.403: //-1/EADF209C8013/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_set_call_counter_control(8163):[lvl =1]Outgoing call with 1 network leg, flag=TRUE *Sep 10 12:03:01.051: //35/EADF209C8013/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_reset_call_direction(8184):[lvl=1] Reseting incoming_call flag=FALSE in voice_if
Related Commands
Command debug mgcp all debug mgcp tracelevel-default mgcp mgcp debug-header show mgcp voice call debug
Description Enables all debug traces for MGCP. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1636
December 2010
Syntax Description
tracelevel
criticalDisplays only high priority debug information. moderateDisplays medium and high priority debug information. verboseDisplays all debug information. This is the default level.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(8)T. The tracelevel keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance.
Examples
The following is sample output from the debug mgcp state command:
Router# debug mgcp state Media Gateway Control Protocol state transition debugging for all endpoints is on, trace-level Verbose Router# *Sep 10 12:08:02.755: //39/DE454D0E8015/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_set_call_state(7562):[lvl=2]callp( 0x63E313E0) old state=CALL_IDLE new state=CALL_CONNECTING *Sep 10 12:08:02.755: //40/DE454D0E8015/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_set_call_state(7562):[lvl=2]callp(0 x63E311D0) old state=CALL_IDLE new state=CALL_CONNECTING
DB-1637
*Sep 10 12:08:02.755: //39/DE454D0E8015/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_set_call_state(7562):[lvl=2]callp( 0x63E313E0) old state=CALL_CONNECTING new state=CALL_CONNECTING *Sep 10 12:08:02.759: //40/DE454D0E8015/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_set_call_state(7562):[lvl=2]callp(0 x63E311D0) old state=CALL_CONNECTING new state=CALL_CONFERENCING *Sep 10 12:08:02.759: //39/DE454D0E8015/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_set_call_state(7562):[lvl=2]callp( 0x63E313E0) old state=CALL_CONNECTING new state=CALL_CONFERENCING *Sep 10 12:08:02.759: //40/DE454D0E8015/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_set_call_state(7562):[lvl=2]callp(0 x63E311D0) old state=CALL_CONFERENCING new state=CALL_CONFERENCING *Sep 10 12:08:02.763: //39/DE454D0E8015/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_set_call_state(7562):[lvl=2]callp( 0x63E313E0) old state=CALL_CONFERENCING new state=CALL_ACTIVE *Sep 10 12:08:02.763: //40/DE454D0E8015/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_set_call_state(7562):[lvl=2]callp(0 x63E311D0) old state=CALL_CONFERENCING new state=CALL_ACTIVE
Related Commands
Command debug mgcp all debug mgcp tracelevel-default mgcp mgcp debug-header show mgcp voice call debug
Description Enables all debug traces for MGCP. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1638
December 2010
Syntax Description
Only high priority debug information is displayed. Medium and high priority debug information is displayed. All debug information is displayed. This is the default value.
Command Default
The default trace level for all MGCP debug commands is verbose.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance. This command sets the trace level globally for all MGCP debug commands and endpoints. You can set the trace level independently for a specific endpoint by using the debug mgcp endpoint command. The endpoint-specific trace level takes precedence over the global trace-level set with this command.
Note
This command applies only to MGCP debug commands that are issued after the default trace level is set. For example, if you enable several debug commands and then change the default trace level, the new trace level does not apply to any previously enabled MGCP debug commands.
Examples
The following example sets the default trace level to critical for all MGCP debug traces:
Router# debug mgcp tracelevel-default critical Router# debug mgcp events Media Gateway Control Protocol events debugging for all endpoints is on, trace-level Critical
DB-1639
Router# debug mgcp state Media Gateway Control Protocol state transition debugging for all endpoints is on, trace-level Critical
Notice that if the default trace level is then changed, as in the following example, the new trace level applies only to any MGCP debug commands that are issued after the default trace level is changed.
Router# debug mgcp tracelevel-default verbose Router# debug mgcp voipcac Media Gateway Control Protocol VoIPCAC debugging for all endpoints is on, trace-level Verbose Router# show debug MGCP: Media Gateway Control Protocol events debugging is on, trace level Critical Media Gateway Control Protocol VoIPCAC debugging is on, trace level Verbose Media Gateway Control Protocol state transition debugging is on, trace level Critical
Related Commands
Command debug mgcp all debug mgcp endpoint mgcp debug-header show mgcp voice call debug
Description Enables all debug traces for MGCP. Enables debug traces for a specific MGCP endpoint. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1640
December 2010
Syntax Description
tracelevel
criticalDisplays only high priority debug information. moderateDisplays medium and high priority debug information. verboseDisplays all debug information. This is the default level.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(8)T. The command was implemented on the Cisco AS5350, Cisco AS5400, and Cisco AS5850. Support for this command was implemented in Cisco 7200 series images. The tracelevel keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Trace levels allow you to control the amount of debug information that is displayed in the output from MGCP debug commands. Reducing the amount of output displayed on the console port makes it easier to locate the correct debug information and limits the impact to network performance.
Examples
The following is sample output from the debug mgcp voipcac command:
Router# debug mgcp voipcac Media Gateway Control Protocol VoIPCAC debugging for all endpoints is on, trace-level Verbose Router#
DB-1641
*Sep 10 12:04:47.747: //-1/6A09713E8014/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_idle_crcx(5251):[lvl=0]Check for HP and QOS combination *Sep 10 12:04:47.751: //-1/6A09713E8014/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/mgcp_idle_crcx(5451):[lvl=0]CAC success *Sep 10 12:04:47.751: //-1/6A09713E8014/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/set_up_voip_call_leg(3918):[lvl=0]get voice interface *Sep 10 12:04:47.751: //-1/6A09713E8014/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/set_up_voip_call_leg(4441):[lvl=0]Initia lize VoIP CAC record stored in VoIP interface struct *Sep 10 12:04:47.751: //38/6A09713E8014/MGCP|aaln/S2/SU1/1|-1|-1/<VOIP>/mgcp_connect_peer_vox_call_leg(1546):[lv l=0]set_up_voip_call_leg returns OK *Sep 10 12:04:47.759: //37/6A09713E8014/MGCP|aaln/S2/SU1/1|-1|-1/<VOICE>/process_signal_request_list(5608):[lvl= 0]Entered
Related Commands
Command debug mgcp all debug mgcp tracelevel-default mgcp mgcp debug-header show mgcp voice call debug
Description Enables all debug traces for MGCP. Sets the trace level globally for all MGCP debug traces. Starts the MGCP daemon. Enables the display of MGCP module-dependent information in the debug header. Displays MGCP configuration information. Specifies the format of the debug header.
DB-1642
December 2010
debug mls rp
To display various Internetwork Packet Exchange (IPX) Multilayer Switching (MLS) debugging elements, use the debug mls rp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mls rp {error | events | ipx | locator | packets | all} no debug mls rp {error | events | ipx | locator | packets | all}
Syntax Description
Displays MLS error messages. Displays a run-time sequence of events for the Multilayer Switching Protocol (MLSP). Displays IPX-related events for MLS, including route purging and changes to access lists and flow masks. Identifies which switch is switching a particular flow of MLS explorer packets. Displays packet contents (in verbose and hexadecimal formats) for MLSP messages. Displays all MLS debugging events.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following shows sample output from the debug mls rp ipx command:
Router# debug mls rp ipx IPX MLS debugging is on Router# conf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)# int vlan 22 Router(config-if)# no ipx access-group out 05:44:37:FCP:flowmask changed to destination
DB-1643
Related Commands
Description Displays debugging messages for route change events that affect IPX MLS.
DB-1644
December 2010
Syntax Description
Displays all multicast MLSP debugging information, including errors, events, and packets. Displays error messages related to multicast MLSP. Displays the run-time sequence of events for multicast MLSP. Displays the contents of MLSP packets.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following example shows output from the debug mls rp ip multicast command using the error keyword:
Router# debug mls rp ip multicast error mlsm error debugging is on chtang-7200# 06:06:45: MLSMERR: scb is INACTIVE, free INSTALL_FE 06:06:46: MLSM: --> mlsm_proc_sc_ins_req(10.0.0.1, 224.2.2.3, 10)
The following example shows output from the debug mls rp ip multicast command using the event keyword:
Router# debug mls rp ip multicast event mlsm events debugging is on Router#
DB-1645
3d23h: MSCP: 3d23h: MLSM: packet:8403 3d23h: MLSM: 3d23h: MSCP: 3d23h: MLSM: packet:8523 3d23h: MLSM: 3d23h: MSCP: 3d23h: MSCP: 3d23h: MLSM: 3d23h: MSCP: 3d23h: MLSM: packet:8643
incoming shortcut flow statistic from Fa2/0.11 Flow_stat: (192.1.10.6, 239.255.158.197), byte :537792 byte delta:7680 packet delta:120, time delta: 10 incoming shortcut flow statistic from Fa2/0.11 Flow_stat: (192.1.10.6, 239.255.158.197), byte :545472 byte delta:7680 packet delta:120, time delta: 10 Router transmits keepalive_msg on Fa2/0.11 incoming shortcut keepalive ACK from Fa2/0.11 Include-list: (192.1.2.1 -> 0.0.0.0) incoming shortcut flow statistic from Fa2/0.11 Flow_stat: (192.1.10.6, 239.255.158.197), byte :553152
The following example shows output from the debug mls rp ip multicast command using the packet keyword:
Router# debug mls rp ip multicast packet mlsm packets debugging is on Router# Router# Router# Router# **23h: MSCP(I): 01 00 0c cc cc cc 00 e0 1e 7c fe 5f 00 30 aa aa ...LLL.`.|~_.0 ..23h: MSCP(I): 03 00 00 0c 01 07 01 05 00 28 01 02 0a c7 00 10 .........(...G ..23h: MSCP(I): a6 0b b4 ff 00 00 c0 01 0a 06 ef ff 9e c5 00 00 &[email protected] 3d23h: MSCP(I): 00 00 00 09 42 c0 00 00 00 00 00 00 25 0b ....B@......%. 3d23h: **23h: MSCP(O): 01 00 0c 00 00 00 aa 00 04 00 01 04 00 00 aa aa ......*....... LL23h: MSCP(O): 03 00 00 0c 00 16 00 00 00 00 01 00 0c cc cc cc .............L ..23h: MSCP(O): aa 00 04 00 01 04 00 24 aa aa 03 00 00 0c 01 07 *......$**.... ..23h: MSCP(O): 01 06 00 1c c0 01 02 01 aa 00 04 00 01 04 00 00 ....@...*..... 3d23h: MSCP(O): 00 0b 00 00 00 00 00 00 01 01 0a 62 ...........b 3d23h: **23h: MSCP(I): ...LLL.`.|~_.$ ..23h: MSCP(I): .............G ..23h: MSCP(I): ..4.......@... 3d23h: MSCP(I): 3d23h:
01 00 0c cc cc cc 00 e0 1e 7c fe 5f 00 24 aa aa 03 00 00 0c 01 07 01 86 00 1c 01 02 0a c7 00 10 a6 0b b4 ff 00 00 00 0b 00 00 c0 01 02 01 00 00 00 00
Related Commands
DB-1646
December 2010
Effective with release 12.3(8)T, the debug mmoip aaa command is replaced by the debug fax mmoip aaa command. See the debug fax mmoip aaa command for more information. To display output that relates to authentication, authorization, and accounting (AAA) services with store-and-forward fax, use the debug mmoip aaa command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mmoip aaa no debug mmoip aaa
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco 1750 access router. This command was replaced by the debug fax mmoip aaa command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following output shows how the debug mmoip aaa command provides information about AAA for the on-ramp or off-ramp gateways:
Router# debug mmoip aaa 5d10h:fax_aaa_begin_authentication:User-Name = mmoip-b.cisco.com 5d10h:fax_aaa_begin_authentication:fax_account_id_origin = GATEWAY_ID 5d10h:fax_aaa_end_authentication_callback:Authentication successful
The following output shows how the debug mmoip aaa command provides information about AAA for the off-ramp gateway:
Router# debug mmoip aaa 5d10h:fax_aaa_start_accounting:User-Name = mmoip-b.cisco.com 5d10h:fax_aaa_start_accounting:Calling-Station-Id = [email protected] 5d10h:fax_aaa_start_accounting:Called-Station-Id = [email protected] 5d10h:fax_aaa_start_accounting:fax_account_id_origin = GATEWAY_ID mmoip-b#ax_aaa_start_accounting:fax_msg_id = <[email protected]> 5d10h:fax_aaa_start_accounting:fax_pages = 2
DB-1647
5d10h:fax_aaa_start_accounting:fax_coverpage_flag = TRUE 5d10h:fax_aaa_start_accounting:fax_connect_speed = 14400bps 5d10h:fax_aaa_start_accounting:fax_recipient_count = 1 5d10h:fax_aaa_start_accounting:fax_auth_status = USER SUCCESS 5d10h:fax_aaa_start_accounting:gateway_id = mmoip-b.cisco.com 5d10h:fax_aaa_start_accounting:call_type = Fax Send 5d10h:fax_aaa_start_accounting:port_used = slot:0 vfc port:0 5d10h:fax_aaa_do_offramp_accounting tty(6), Stopping accounting 5d10h:fax_aaa_stop_accounting:ftdb->cact->generic.callActiveTransmitBytes = 18038 5d10h:fax_aaa_stop_accounting:ftdb->cact->generic.callActiveTransmitPackets = 14
The following output shows how the debug mmoip aaa command provides information about AAA for the on-ramp gateway:
Router# debug mmoip aaa 5d10h:fax_aaa_start_accounting:User-Name = mmoip-b.cisco.com 5d10h:fax_aaa_start_accounting:Calling-Station-Id = [email protected] 5d10h:fax_aaa_start_accounting:Called-Station-Id = [email protected] 5d10h:fax_aaa_start_accounting:fax_account_id_origin = GATEWAY_ID 5d10h:fax_aaa_start_accounting:fax_msg_id = [email protected] 5d10h:fax_aaa_start_accounting:fax_pages = 2 5d10h:fax_aaa_start_accounting:fax_connect_speed = 14400bps 5d10h:fax_aaa_start_accounting:fax_auth_status = USER SUCCESS 5d10h:fax_aaa_start_accounting:email_server_address = 1.14.116.1 5d10h:fax_aaa_start_accounting:email_server_ack_flag = TRUE 5d10h:fax_aaa_start_accounting:gateway_id = mmoip-b.cisco.com 5d10h:fax_aaa_start_accounting:call_type = Fax Receive 5d10h:fax_aaa_start_accounting:port_used = Cisco Powered Fax System slot:1 port:4 5d10h:fax_aaa_do_onramp_accounting tty(5), Stopping accounting 5d10h:fax_aaa_stop_accounting:endb->cact->generic.callActiveTransmitBytes = 26687 5d10h:fax_aaa_stop_accounting:ftdb->cact->generic.callActiveReceiveBytes = 18558 5d10h:fax_aaa_stop_accounting:ftdb->cact->generic.callActiveReceivePackets = 14
DB-1648
December 2010
Syntax Description
string
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was introduced on the Cisco 1750 access router. This command was implemented on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. This feature was implemented on the Cisco 7200 series routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The debug mmoip send email command is used to test connectivity between the on-ramp gateway and the e-mail server. Basically, this debug command sends an e-mail message to the recipient specified in the e-mail address string. There is no specific output associated with the debug mmoip send email command; to see how the on-ramp gateway and e-mail server interact when processing the test e-mail message, enable the debug fmail client command. The following example tests connectivity between the on-ramp gateway and the e-mail server by sending a test e-mail message to [email protected]:
Router# debug fmail client Router# debug mmoip send email [email protected] 01:22:59:faxmail_client_send_test:Sending the test message to [email protected] from [email protected]... 01:22:59:faxmail_client_send_test:Opening client engine. 01:22:59:faxmail_client_send_test:Sending 59 bytes ... 01:22:59:faxmail_client_send_test:Done sending test email.
DB-1649
Related Commands
Description Displays e-mail parameters (such as Mail from and Envelope to and Envelope from) and the progress of the SMTP client.
DB-1650
December 2010
Syntax Description
string
E.164 telephone number to be used for sending the test fax. There is no default.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco 1750 access router. This command was implemented on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. This feature was introduced on the Cisco 7200 series routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The debug mmoip send fax command is used to test connectivity between the off-ramp gateway and a recipient fax device. Basically, this debug command sends a test fax transmission to the recipient specified in the telephone number string. There is no specific output associated with the debug mmoip send fax command. The following example sends a test fax message to the telephone number 5550839:
Router# debug mmoip send fax 5550839
The following output shows that the off-ramp gateway is placing a fax call:
01:28:18:ftsp_offramp_match_digits:phone number to translate:5550839 01:28:18: destPat(5......), matched(1), prefix() peer_tag(1) 01:28:18:ftsp_offramp_match_digits:target:710839 01:28:18:fap_offcm:tty(4), Got dial message00:00:00.000:AT&F\Q0S7=255
DB-1651
00:00:00.140:ATE0 OK 00:00:00.140:AT+FCLASS=2 00:00:00.148: OK 00:00:00.148:+FDCC=..;+FBOR= 00:00:00.168:AT+FLID 00:00:00.180: OK 00:00:00.180:ATDTW710839 The following output shows that the fax transmission is complete; in this particular example, there was a transmission error, and the modem timed out. 01:28:25:ftsp_setup_for_oc:tty4, callid=0xA 01:28:25:ftsp_setup_for_oc ctl=0, cas grp=-1, snmp_ix=30 01:28:25:ftsp_off_ramp_active_call_init tty4 callid=0xA, snmp_ix=30 01:29:18:fap_offpmt:tty(4), TxPhaseA:modem timeout 01:29:18:%FTSP-6-FAX_DISCONNECT:Transmission er
DB-1652
December 2010
Syntax Description
prefix-filename tftp-server-name
Name of the TIFF file. The format for the TIFF filename is telephone-number.TIFF. TFTP server to which the output from the TIFF writer is sent.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco 1750 access router. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The debug mmoip transfer command sends the content of the fax data received to the TFTP server named by the tftp-server-name variable into the file identified by the prefix-filename variable. Each page of the fax transmission is a separate file, designated by the letter p, followed by the page number. For example, the following command transfers the received fax content to a TFTP server named keyer. The first page of the transmission goes to the file named /tftpboot/test/testp1.tiff, the second page goes to the file named /tftpboot/test/testp2.tiff and so on.
Router# debug mmoip transfer /tftpboot/test/test keyer
The named files must exist on the TFTP server and be writable in order for the debug operation to be successful.
DB-1653
debug modem
To observe modem line activity on an access server, use the debug modem command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug modem no debug modem
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug modem command. The output shows when the modem line changes state.
Router# debug modem 15:25:51: 15:25:51: 15:25:51: 15:27:51: 15:27:51: 15:27:51: 15:27:52: 15:27:52: 15:27:57: 15:27:58: TTY4: tty4: TTY4: TTY4: TTY4: TTY4: TTY4: tty4: TTY4: TTY4: DSR came up Modem: IDLE->READY Autoselect started Autoselect failed Line reset Modem: READY->HANGUP dropping DTR, hanging up Modem: HANGUP->IDLE restoring DTR DSR came up
DB-1654
December 2010
Syntax Description
(Optional) The slot and modem port number. (Optional) The modem group.
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug modem csm command to troubleshoot call switching problems. With this command, you can trace the complete sequence of switching incoming and outgoing calls.
Examples
The following is sample output from the debug modem csm command. In this example, a call enters the modem (incoming) on slot 1, port 0:
Router(config)# service timestamps debug uptime Router(config)# end Router# debug modem csm 00:04:09: 00:04:09: 00:04:09: 00:04:09: 00:04:11: 00:04:13: 00:04:15: 00:04:15: 00:04:15: ccpri_ratetoteup bear rate is 10 CSM_MODEM_ALLOCATE: slot 1 and port 0 is allocated. MODEM_REPORT(0001): DEV_INCALL at slot 1 and port 0 CSM_PROC_IDLE: CSM_EVENT_ISDN_CALL at slot 1, port 0 CSM_RING_INDICATION_PROC: RI is on CSM_RING_INDICATION_PROC: RI is off CSM_PROC_IC1_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 0 MODEM_REPORT(0001): DEV_CONNECTED at slot 1 and port 0 CSM_PROC_IC2_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1, port 0
The following is sample output from the debug modem csm command when call is dialed from the modem into the network (outgoing) from slot 1, port 2:
Router# debug modem csm atdt16665202 00:11:21: CSM_PROC_IDLE: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 2 00:11:21: T1_MAIL_FROM_NEAT: DC_READY_RSP: mid = 1, slot = 0, unit = 0 00:11:21: CSM_PROC_OC1_REQUEST_DIGIT: CSM_EVENT_DIGIT_COLLECT_READY at slot 1, port 2 00:11:24: T1_MAIL_FROM_NEAT: DC_FIRST_DIGIT_RSP: mid = 1, slot = 0, unit = 0 00:11:24: CSM_PROC_OC2_COLLECT_1ST_DIGIT: CSM_EVENT_GET_1ST_DIGIT at slot 1, port 2 00:11:27: T1_MAIL_FROM_NEAT: DC_ALL_DIGIT_RSP: mid = 1, slot = 0, unit = 0 00:11:27: CSM_PROC_OC3_COLLECT_ALL_DIGIT: CSM_EVENT_GET_ALL_DIGITS (16665202) at slot 1, port 2 00:11:27: ccpri_ratetoteup bear rate is 10
DB-1655
00:11:27: MODEM_REPORT(A000): DEV_CALL_PROC at slot 1 and port 2 00:11:27: CSM_PROC_OC4_DIALING: CSM_EVENT_ISDN_BCHAN_ASSIGNED at slot 1, port 2 00:11:31: MODEM_REPORT(A000): DEV_CONNECTED at slot 1 and port 2 00:11:31: CSM_PROC_OC5_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1, port 2 CONNECT 19200/REL - MNP
The following is sample output from the debug modem csm command for an incoming call:
Router# debug modem csm Router#1.19.36.7 2001 Trying 1.19.36.7, 2001 ... Open atdt111222333444555666 *Apr 7 12:39:42.475: Mica Modem(1/0): Rcvd Dial String(111222333444555666) *Apr 7 12:39:42.475: CSM_PROC_IDLE: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 0 *Apr 7 12:39:42.479: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_CHANNEL_LOCK at slot 1 and port 0 *Apr 7 12:39:42.479: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_BCHAN_ASSIGNED at slot 1, port 0 *Apr 7 12:39:42.479: Mica Modem(1/0): Configure(0x1) *Apr 7 12:39:42.479: Mica Modem(1/0): Configure(0x5) *Apr 7 12:39:42.479: Mica Modem(1/0): Call Setup *Apr 7 12:39:42.479: neat msg at slot 0: (1/0): Tx LOOP_CLOSURE (ABCD=1101) *Apr 7 12:39:42.491: neat msg at slot 0: (0/0): Rx LOOP_CLOSURE (ABCD=1101) *Apr 7 12:39:42.531: VDEV_ALLOCATE: slot 1 and port 3 is allocated. *Apr 7 12:39:42.531: CSM_RX_CAS_EVENT_FROM_NEAT:(0004): EVENT_CALL_DIAL_IN at slot 1 and port 3 *Apr 7 12:39:42.531: CSM_PROC_IDLE: CSM_EVENT_DSX0_CALL at slot 1, port 3 *Apr 7 12:39:42.531: Mica Modem(1/3): Configure(0x0) *Apr 7 12:39:42.531: Mica Modem(1/3): Configure(0x5) *Apr 7 12:39:42.531: Mica Modem(1/3): Call Setup *Apr 7 12:39:42.595: Mica Modem(1/0): State Transition to Call Setup *Apr 7 12:39:42.655: Mica Modem(1/3): State Transition to Call Setup *Apr 7 12:39:42.655: Mica Modem(1/3): Went offhook *Apr 7 12:39:42.655: CSM_PROC_IC1_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 3 *Apr 7 12:39:42.671: neat msg at slot 0: (0/0): Tx LOOP_CLOSURE (ABCD=1101) *Apr 7 12:39:42.691: neat msg at slot 0: (1/0): Rx LOOP_CLOSURE (ABCD=1101) *Apr 7 12:39:42.731: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_START_TX_TONE at slot 1 and port 0 *Apr 7 12:39:42.731: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_START_TX_TONE at slot 1, port 0 *Apr 7 12:39:42.731: Mica Modem(1/0): Generate digits:called_party_num= len=1 *Apr 7 12:39:42.835: Mica Modem(1/3): Rcvd Digit detected(#) *Apr 7 12:39:42.835: CSM_PROC_IC2_COLLECT_ADDR_INFO: CSM_EVENT_KP_DIGIT_COLLECTED (DNIS=, ANI=) at slot 1, port 3 *Apr 7 12:39:42.855: neat msg at slot 0: (0/0): Tx LOOP_OPEN (ABCD=0101) *Apr 7 12:39:42.871: neat msg at slot 0: (1/0): Rx LOOP_OPEN (ABCD=0101) *Apr 7 12:39:42.899: Mica Modem(1/0): Rcvd Digits Generated *Apr 7 12:39:42.911: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_END_TX_TONE at slot 1 and port 0 *Apr 7 12:39:42.911: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_END_TX_TONE at slot 1, port 0 *Apr 7 12:39:42.911: Mica Modem(1/0): Generate digits:called_party_num=A len=1 *Apr 7 12:39:43.019: Mica Modem(1/0): Rcvd Digits Generated *Apr 7 12:39:43.019: CSM_PROC_OC4_DIALING: CSM_EVENT_TONE_GENERATED at slot 1, port 0 *Apr 7 12:39:43.019: Mica Modem(1/3): Rcvd Digit detected(A) *Apr 7 12:39:43.335: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_START_TX_TONE at slot 1 and port 0 *Apr 7 12:39:43.335: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_START_TX_TONE at slot 1, port 0 *Apr 7 12:39:43.335: Mica Modem(1/0): Generate digits:called_party_num=111222333444555666 len=19 *Apr 7 12:39:43.439: Mica Modem(1/3): Rcvd Digit detected(1) *Apr 7 12:39:43.559: Mica Modem(1/3): Rcvd Digit detected(1) *Apr 7 12:39:43.619: Mica Modem(1/3): Rcvd Digit detected(1) *Apr 7 12:39:43.743: Mica Modem(1/3): Rcvd Digit detected(2) *Apr 7 12:39:43.859: Mica Modem(1/3): Rcvd Digit detected(2)
DB-1656
December 2010
*Apr 7 12:39:43.919: Mica Modem(1/3): Rcvd Digit detected(2) *Apr 7 12:39:44.043: Mica Modem(1/3): Rcvd Digit detected(3) *Apr 7 12:39:44.163: Mica Modem(1/3): Rcvd Digit detected(3) *Apr 7 12:39:44.223: Mica Modem(1/3): Rcvd Digit detected(3) *Apr 7 12:39:44.339: Mica Modem(1/3): Rcvd Digit detected(4) *Apr 7 12:39:44.459: Mica Modem(1/3): Rcvd Digit detected(4) *Apr 7 12:39:44.523: Mica Modem(1/3): Rcvd Digit detected(4) *Apr 7 12:39:44.639: Mica Modem(1/3): Rcvd Digit detected(5) *Apr 7 12:39:44.763: Mica Modem(1/3): Rcvd Digit detected(5) *Apr 7 12:39:44.883: Mica Modem(1/3): Rcvd Digit detected(5) *Apr 7 12:39:44.943: Mica Modem(1/3): Rcvd Digit detected(6) *Apr 7 12:39:45.063: Mica Modem(1/3): Rcvd Digit detected(6) *Apr 7 12:39:45.183: Mica Modem(1/3): Rcvd Digit detected(6) *Apr 7 12:39:45.243: Mica Modem(1/3): Rcvd Digit detected(B) *Apr 7 12:39:45.243: CSM_PROC_IC2_COLLECT_ADDR_INFO: CSM_EVENT_DNIS_COLLECTED (DNIS=111222333444555666, ANI=) at slot 1, port 3 *Apr 7 12:39:45.363: Mica Modem(1/0): Rcvd Digits Generated *Apr 7 12:39:45.891: neat msg at slot 0: (0/0): Tx LOOP_CLOSURE (ABCD=1101) *Apr 7 12:39:45.907: neat msg at slot 0: (1/0): Rx LOOP_CLOSURE (ABCD=1101) *Apr 7 12:39:46.115: neat msg at slot 0: (0/0): Tx LOOP_OPEN (ABCD=0101) *Apr 7 12:39:46.131: neat msg at slot 0: (1/0): Rx LOOP_OPEN (ABCD=0101) *Apr 7 12:39:46.175: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_START_TX_TONE at slot 1 and port 0 *Apr 7 12:39:46.175: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_START_TX_TONE at slot 1, port 0 *Apr 7 12:39:46.175: Mica Modem(1/0): Generate digits:called_party_num= len=3 *Apr 7 12:39:46.267: Mica Modem(1/3): Rcvd Digit detected(#) *Apr 7 12:39:46.387: Mica Modem(1/3): Rcvd Digit detected(A) *Apr 7 12:39:46.447: Mica Modem(1/3): Rcvd Digit detected(B) *Apr 7 12:39:46.447: CSM_PROC_IC2_COLLECT_ADDR_INFO: CSM_EVENT_ADDR_INFO_COLLECTED (DNIS=111222333444555666, ANI=) at slot 1, port 3 *Apr 7 12:39:46.507: Mica Modem(1/0): Rcvd Digits Generated *Apr 7 12:39:46.507: CSM_PROC_OC4_DIALING: CSM_EVENT_ADDR_INFO_COLLECTED at slot 1, port 0 *Apr 7 12:39:47.127: CSM_RX_CAS_EVENT_FROM_NEAT:(0004): EVENT_CHANNEL_CONNECTED at slot 1 and port 3 *Apr 7 12:39:47.127: CSM_PROC_IC4_WAIT_FOR_CARRIER: CSM_EVENT_DSX0_CONNECTED at slot 1, port 3 *Apr 7 12:39:47.127: Mica Modem(1/3): Link Initiate *Apr 7 12:39:47.131: neat msg at slot 0: (0/0): Tx LOOP_CLOSURE (ABCD=1101) *Apr 7 12:39:47.147: neat msg at slot 0: (1/0): Rx LOOP_CLOSURE (ABCD=1101) *Apr 7 12:39:47.191: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_CHANNEL_CONNECTED at slot 1 and port 0 *Apr 7 12:39:47.191: CSM_PROC_OC5_WAIT_FOR_CARRIER: CSM_EVENT_DSX0_CONNECTED at slot 1, port 0 *Apr 7 12:39:47.191: Mica Modem(1/0): Link Initiate *Apr 7 12:39:47.227: Mica Modem(1/3): State Transition to Connect *Apr 7 12:39:47.287: Mica Modem(1/0): State Transition to Connect *Apr 7 12:39:49.103: Mica Modem(1/0): State Transition to Link *Apr 7 12:39:52.103: Mica Modem(1/3): State Transition to Link *Apr 7 12:40:00.927: Mica Modem(1/3): State Transition to Trainup *Apr 7 12:40:00.991: Mica Modem(1/0): State Transition to Trainup *Apr 7 12:40:02.615: Mica Modem(1/0): State Transition to EC Negotiating *Apr 7 12:40:02.615: Mica Modem(1/3): State Transition to EC Negotiating CONNECT 31200 /V.42/V.42bis Router> *Apr 7 12:40:05.983: Mica Modem(1/0): State Transition to Steady State *Apr 7 12:40:05.983: Mica Modem(1/3): State Transition to Steady State+++ OK ath *Apr 7 12:40:09.167: Mica Modem(1/0): State Transition to Steady State Escape *Apr 7 12:40:10.795: Mica Modem(1/0): State Transition to Terminating *Apr 7 12:40:10.795: Mica Modem(1/3): State Transition to Terminating *Apr 7 12:40:11.755: Mica Modem(1/3): State Transition to Idle *Apr 7 12:40:11.755: Mica Modem(1/3): Went onhook
DB-1657
*Apr 7 12:40:11.755: CSM_PROC_IC5_OC6_CONNECTED: CSM_EVENT_MODEM_ONHOOK at slot 1, port 3 *Apr 7 12:40:11.755: VDEV_DEALLOCATE: slot 1 and port 3 is deallocated *Apr 7 12:40:11.759: neat msg at slot 0: (0/0): Tx LOOP_OPEN (ABCD=0101) *Apr 7 12:40:11.767: neat msg at slot 0: (1/0): Rx LOOP_OPEN (ABCD=0101) *Apr 7 12:40:12.087: neat msg at slot 0: (1/0): Tx LOOP_OPEN (ABCD=0101) *Apr 7 12:40:12.091: neat msg at slot 0: (0/0): Rx LOOP_OPEN (ABCD=0101) *Apr 7 12:40:12.111: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_CALL_IDLE at slot 1 and port 0 *Apr 7 12:40:12.111: CSM_PROC_IC5_OC6_CONNECTED: CSM_EVENT_DSX0_DISCONNECTED at slot 1, port 0 *Apr 7 12:40:12.111: Mica Modem(1/0): Link Terminate(0x6) *Apr 7 12:40:12.779: Mica Modem(1/3): State Transition to Terminating *Apr 7 12:40:12.839: Mica Modem(1/3): State Transition to Idle *Apr 7 12:40:13.495: Mica Modem(1/0): State Transition to Idle *Apr 7 12:40:13.495: Mica Modem(1/0): Went onhook *Apr 7 12:40:13.495: CSM_PROC_IC6_OC8_DISCONNECTING: CSM_EVENT_MODEM_ONHOOK at slot 1, port 0 *Apr 7 12:40:13.495: VDEV_DEALLOCATE: slot 1 and port 0 is deallocated Router#disc Closing connection to 1.19.36.7 [confirm] Router# *Apr 7 12:40:18.783: Mica Modem(1/0): State Transition to Terminating *Apr 7 12:40:18.843: Mica Modem(1/0): State Transition to Idle Router#
The MICA technologies modem goes through the following internal link states when the call comes in:
Call Setup Off Hook Connect Link Trainup EC Negotiation Steady State
The following section describes the CSM activity for an incoming call. When a voice call comes in, CSM is informed of the incoming call. This allocates the modem and sends the Call Setup message to the MICA modem. The Call_Proc message is sent through D channel. The modem sends an offhook message to CSM by sending the state change to Call Setup. The D channel then sends a CONNECT message. When the CONNECT_ACK message is received, the Link initiate message is sent to the MICA modem and it negotiates the connection with the remote modem. In the following debug examples, a modem on slot 1, port 13 is allocated. It goes through its internal states before it is in Steady State and answers the call.
Router# debug modem csm Modem Management Call Switching Module debugging is on *May 13 15:01:00.609: MODEM_REPORT:dchan_idb=0x60D437F8, call_id=0xE, ces=0x1 bchan=0x12, event=0x1, cause=0x0 *May 13 15:01:00.609: VDEV_ALLOCATE: slot 1 and port 13 is allocated. *May 13 15:01:00.609: MODEM_REPORT(000E): DEV_INCALL at slot 1 and port 13 *May 13 15:01:00.609: CSM_PROC_IDLE: CSM_EVENT_ISDN_CALL at slot 1, port 13 *May 13 15:01:00.609: Mica Modem(1/13): Configure(0x0) *May 13 15:01:00.609: Mica Modem(1/13): Configure(0x0) *May 13 15:01:00.609: Mica Modem(1/13): Configure(0x6) *May 13 15:01:00.609: Mica Modem(1/13): Call Setup *May 13 15:01:00.661: Mica Modem(1/13): State Transition to Call Setup *May 13 15:01:00.661: Mica Modem(1/13): Went offhook
DB-1658
December 2010
*May 13 15:01:00.661: CSM_PROC_IC1_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 13 *May 13 15:01:00.661: MODEM_REPORT:dchan_idb=0x60D437F8, call_id=0xE, ces=0x1 bchan=0x12, event=0x4, cause=0x0 *May 13 15:01:00.661: MODEM_REPORT(000E): DEV_CONNECTED at slot 1 and port 13 *May 13 15:01:00.665: CSM_PROC_IC3_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1, port 13 *May 13 15:01:00.665: Mica Modem(1/13): Link Initiate *May 13 15:01:00.693: Mica Modem(1/13): State Transition to Connect *May 13 15:01:01.109: Mica Modem(1/13): State Transition to Link *May 13 15:01:09.433: Mica Modem(1/13): State Transition to Trainup *May 13 15:01:11.541: Mica Modem(1/13): State Transition to EC Negotiating *May 13 15:01:12.501: Mica Modem(1/13): State Transition to Steady State
The following section describes the status of CSM when a call is connected. The show modem csm x/y command is similar to AS5200 access server. For an active incoming analog call, the modem_status and csm_status should be VDEV_STATUS_ACTIVE_CALL and CSM_IC4_CONNECTED, respectively.
Router# show modem csm 1/13 MODEM_INFO: slot 1, port 13, unit 0, modem_mask=0x0000, modem_port_offset=0 tty_hwidb=0x60D0BCE0, modem_tty=0x60B6FE7C, oobp_info=0x00000000, modem_pool=0x60ADC998 modem_status(0x0002):VDEV_STATUS_ACTIVE_CALL. csm_state(0x0204)=CSM_IC4_CONNECTED, csm_event_proc=0x600C6968, current call thru PRI line invalid_event_count=0, wdt_timeout_count=0 wdt_timestamp_started is not activated wait_for_dialing:False, wait_for_bchan:False pri_chnl=TDM_PRI_STREAM(s0, u0, c18), modem_chnl=TDM_MODEM_STREAM(s1, c13) dchan_idb_start_index=0, dchan_idb_index=0, call_id=0x000E, bchan_num=18 csm_event=CSM_EVENT_ISDN_CONNECTED, cause=0x0000 ring_indicator=0, oh_state=0, oh_int_enable=0, modem_reset_reg=0 ring_no_answer=0, ic_failure=0, ic_complete=1 dial_failure=0, oc_failure=0, oc_complete=0 oc_busy=0, oc_no_dial_tone=0, oc_dial_timeout=0 remote_link_disc=0, stat_busyout=0, stat_modem_reset=0 oobp_failure=0 call_duration_started=1d02h, call_duration_ended=00:00:00, total_call_duration=00:00:00 The calling party phone number = 4085552400 The called party phone number = 4085551400 total_free_rbs_timeslot = 0, total_busy_rbs_timeslot = 0, total_dynamic_busy_rbs_timeslot = 0, total_static_busy_rbs_timeslot = 0, min_free_modem_threshold = 6
The following section describes the CSM activity for an outgoing call. For MICA modems, the dial tone is not required to initiate an outbound call. Unlike in the AS5200, the digit collection step is not required. The dialed digit string is sent to the CSM in the outgoing request to the CSM. CSM signals the D channel to generate an outbound voice call, and the B channel assigned is connected to the modem and the CSM. The modem is ordered to connect to the remote side with a CONNECT message, and by sending a link initiate message, the modem starts to train.
DB-1659
Router# debug modem csm Modem Management Call Switching Module debugging is on Router# debug isdn q931 ISDN Q931 packets debugging is on *May 15 12:48:42.377: Mica Modem(1/0): Rcvd Dial String(5552400) *May 15 12:48:42.377: CSM_PROC_IDLE: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 0 *May 15 12:48:42.377: CSM_PROC_OC3_COLLECT_ALL_DIGIT: CSM_EVENT_GET_ALL_DIGITS at slot 1, port 0 *May 15 12:48:42.377: CSM_PROC_OC3_COLLECT_ALL_DIGIT: called party num: (5552400) at slot 1, port 0 *May 15 12:48:42.381: process_pri_call making a voice_call. *May 15 12:48:42.381: ISDN Se0:23: TX -> SETUP pd = 8 callref = 0x0011 *May 15 12:48:42.381: Bearer Capability i = 0x8090A2 *May 15 12:48:42.381: Channel ID i = 0xE1808397 *May 15 12:48:42.381: Called Party Number i = 0xA1, '5552400' *May 15 12:48:42.429: ISDN Se0:23: RX <- CALL_PROC pd = 8 callref = 0x8011 *May 15 12:48:42.429: Channel ID i = 0xA98397 *May 15 12:48:42.429: MODEM_REPORT:dchan_idb=0x60D437F8, call_id=0xA011, ces=0x1 bchan=0x16, event=0x3, cause=0x0 *May 15 12:48:42.429: MODEM_REPORT(A011): DEV_CALL_PROC at slot 1 and port 0 *May 15 12:48:42.429: CSM_PROC_OC4_DIALING: CSM_EVENT_ISDN_BCHAN_ASSIGNED at slot 1, port 0 *May 15 12:48:42.429: Mica Modem(1/0): Configure(0x1) *May 15 12:48:42.429: Mica Modem(1/0): Configure(0x0) *May 15 12:48:42.429: Mica Modem(1/0): Configure(0x6) *May 15 12:48:42.429: Mica Modem(1/0): Call Setup *May 15 12:48:42.489: Mica Modem(1/0): State Transition to Call Setup *May 15 12:48:42.589: ISDN Se0:23: RX <- ALERTING pd = 8 callref = 0x8011 *May 15 12:48:43.337: ISDN Se0:23: RX <- CONNECT pd = 8 callref = 0x8011 *May 15 12:48:43.341: MODEM_REPORT:dchan_idb=0x60D437F8, call_id=0xA011, ces=0x1 bchan=0x16, event=0x4, cause=0x0 *May 15 12:48:43.341: MODEM_REPORT(A011): DEV_CONNECTED at slot 1 and port 0 *May 15 12:48:43.341: CSM_PROC_OC5_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1, port 0 *May 15 12:48:43.341: Mica Modem(1/0): Link Initiate *May 15 12:48:43.341: ISDN Se0:23: TX -> CONNECT_ACK pd = 8 callref = 0x0011 *May 15 12:48:43.385: Mica Modem(1/0): State Transition to Connect *May 15 12:48:43.849: Mica Modem(1/0): State Transition to Link *May 15 12:48:52.665: Mica Modem(1/0): State Transition to Trainup *May 15 12:48:54.661: Mica Modem(1/0): State Transition to EC Negotiating *May 15 12:48:54.917: Mica Modem(1/0): State Transition to Steady State
Related Commands
Description Creates modem startup messages between the network management software and the modem on the specified OOB port. Performs a call trace on the specified modem, which allows you to determine why calls are terminated.
DB-1660
December 2010
Syntax Description
tty-range
Modem tty number or range. You can specify a single TTY line number or a range from 0 through the number of modems you have in your Cisco AS5800 access server. Be sure to include a dash (-) between the range values you specify. Modem group information. Location of the modem by shelf/slot/port numbers for internal modems.
group shelf/slot/port
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug modem dsip command displays each Distributed System Interconnect Protocol (DSIP) message that relates to a modem and is sent from or received at the router shelf. This command can be applied to a single modem or a group of modems.
Examples
The following examples show a display of the available debug modem command options and debug modem dsip command options:
Router# debug modem ? dsip maintenance oob trace traffic <cr> Modem DSIP activity Modem maintenance activity Modem out of band activity Call Trace Upload Modem data traffic
DB-1661
The following example indicates that a Real Time Server (RTS) status message was received from the router shelf, and an ACK message was sent back:
Router# debug modem dsip 00:11:02: 00:11:02: 00:11:02: 00:11:11: 00:11:18: 00:11:19: 00:11:19: 00:11:23: 00:12:31: 00:12:31: 00:12:31: 00:12:32: 00:12:32: 00:12:32: 00:12:32: 00:12:32: 00:12:33: 00:12:33: 00:12:33: 00:12:35: 00:12:38: 00:12:47: RSMODEM_SEND-1/2/06: MODEM_RING_INDICATION_MSG cci1 si0 ms0 RSMODEM_sRCV-1/2/06:l12,MODEM_CALL_ACK_MSG: RSMODEM_SEND-1/2/06: MODEM_CALL_ACCEPT_MSG RSMODEM_sRCV-2:l0,MODEM_POLL_MSG: 0 16 0 7 0 146 0 36 21 RSMODEM_sRCV-1/2/06:l12,MODEM_SET_DCD_STATE_MSG: 1 RSMODEM_SEND-1/2/06: MODEM_RTS_STATUS_MSG 1 RSMODEM_dRCV-2:l1258607996,MODEM_RTS_STATUS_MSG: 0 6 0 23 0 RSMODEM_sRCV-2:l0,MODEM_POLL_MSG: 0 16 0 7 0 146 0 150 21 RSMODEM_sRCV-1/2/06:l12,MODEM_SET_DCD_STATE_MSG: 0 RSMODEM_SEND-1/2/06: MODEM_CALL_HANGUP_MSG RSMODEM_sRCV-1/2/06:l12,MODEM_ONHOOK_MSG: RSMODEM_SEND-1/2/06: MODEM_RTS_STATUS_MSG 1 RSMODEM_SEND-1/2/06: MODEM_SET_DTR_STATE_MSG 0 RSMODEM_dRCV-2:l1258659676,MODEM_RTS_STATUS_MSG: 0 6 0 16 0 RSMODEM_SEND-1/2/06: MODEM_RTS_STATUS_MSG 1 RSMODEM_dRCV-2:l1258600700,MODEM_RTS_STATUS_MSG: 0 6 0 13 0 RSMODEM_SEND-1/2/06: MODEM_SET_DTR_STATE_MSG 0 RSMODEM_SEND-1/2/06: MODEM_RTS_STATUS_MSG 1 RSMODEM_dRCV-2:l1258662108,MODEM_RTS_STATUS_MSG: 0 6 0 16 0 RSMODEM_sRCV-2:l0,MODEM_POLL_MSG: 0 16 0 7 0 146 1 34 22 RSMODEM_SEND-1/2/06: MODEM_SET_DTR_STATE_MSG 1 RSMODEM_sRCV-2:l0,MODEM_POLL_MSG: 0 16 0 7 0 146 0 12 22 mm65535,0 dc0
0 0 0 0
0 0 0 0 0 0 0 0
0 0 0 0
Description Router shelf modem shelf sends a MODEM_RING_INDICATION_MSG message. Router shelf modem received a MODEM_CALL_ACK_MSG message. Router shelf accepts the call. Router shelf sends a hangup message. Request to send message status.
Related Commands
Description Displays output for DSIP used between the router shelf and the dial shelf. Displays output for framed, unframed, and asynchronous data transmission received from the modem cards.
DB-1662
December 2010
Syntax Description
(Optional) The slot and modem port number. (Optional) The modem group.
Command Modes
Privileged EXEC
Usage Guidelines
The message types and sequence numbers that appear in the debugging output are initiated by the Modem Out-of-Band Protocol and used by service personnel for debugging purposes.
Caution
Entering the debug modem oob command without specifying a slot and modem number debugs all out-of-band ports, which generates a substantial amount of information.
Examples
The following is sample output from the debug modem oob command. This example debugs the out-of-band port on modem 2/0, which creates modem startup messages between the network management software and the modem.
Router# debug modem oob 2/0 MODEM(2/0): MODEM(2/0): MODEM(2/0): MODEM(2/0): MODEM(2/0): MODEM(2/0): MODEM(2/0): MODEM(2/0): MODEM(2/0): One message sent --Message type:3, Sequence number:0 Modem DC session data reply One message sent --Message type:83, Sequence number:1 DC session event = One message sent --Message type:82, Sequence number:2 No status changes since last polled One message sent --Message type:3, Sequence number:3 Modem DC session data reply One message sent --Message type:83, Sequence number:4
DB-1663
Syntax Description
(Optional) Identifies a particular call. (Optional) Value of the system UpTime when the call associated with this entry was started. Valid values are 0 through 4294967295. (Optional) Dial peer identification number used to distinguish between calls with the same setup time. Valid values are 0 through 10.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(11)T
Modification This command was introduced for the Cisco 2600, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 7200 series routers and the Cisco AS5300 universal access server. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
In a stable modem relay network, the debug modem relay errors command produces little output.
Examples
The following is sample output from the debug modem relay errors command. The output shows the sequence number of the packet, time stamp, direction, layer, and payload bytes, followed by each byte of the payload in hexadecimal.
Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 28 tm 11944 OUT ERR, pb=12, payload: 00 06 00 00 00 00 00 07 00 00 01 DE *Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 29 tm 11944 OUT ERR, pb=12, payload: 00 06 00 00 00 00 00 04 00 00 00 BE *Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 30 tm 11944 OUT ERR, pb=12, payload: 00 06 00 00 00 00 00 05 FF FF FF FD
DB-1664
December 2010
Related Commands
Description Displays gateway DSP modem relay termination codes. Displays events that may cause failure of the modem relay network.
DB-1665
Syntax Description
(Optional) Identifies a particular call. (Optional) Value of the system UpTime when the call associated with this entry was started. Valid values are 0 through 4294967295. (Optional) Dial peer identification number used to distinguish between calls with the same setup time. Valid values are 0 through 10.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(11)T
Modification This command was introduced for the Cisco 2600, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 7200 series routers and the Cisco AS5300 universal access server. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
In a stable modem relay network, the debug modem relay events command produces little output.
Examples
The following is sample output from the debug modem relay events command. The output shows the sequence number of the packet, time stamp, direction, layer, and payload bytes, followed by each byte of the payload in hexadecimal.
Router# debug modem relay events Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 28 tm 11944 OUT EVNT, pb=12, payload: 00 06 00 00 00 00 00 07 00 00 01 DE *Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 29 tm 11944 OUT EVNT, pb=12, payload: 00 06 00 00 00 00 00 04 00 00 00 BE *Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 30 tm 11944 OUT EVNT, pb=12, payload: 00 06 00 00 00 00 00 05 FF FF FF FD
DB-1666
December 2010
Related Commands
Description Displays gateway DSP modem relay termination codes. Displays modem relay network errors.
DB-1667
Syntax Description
(Optional) Identifies a particular call. (Optional) Value of the system UpTime when the call associated with this entry was started. Valid values are 0 through 4294967295. (Optional) Dial peer identification number used to distinguish between calls with the same setup time. Valid values are 0 through 10.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(11)T
Modification This command was introduced for the Cisco 2600, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 7200 series routers, and the Cisco AS5300 universal access server. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
Disable console logging and use buffered logging before using the debug modem relay packetizer command. Using the debug modem relay packetizer command generates a large volume of debugs, which can affect router performance.
Examples
The following is sample output from the debug modem relay packetizer command. The output shows the sequence number of the packet, time stamp, direction, layer, and payload bytes, followed by each byte of the payload in hexadecimal.
Router# debug modem relay packetizer Jan 11 05:33:33.715:ModemRelay pkt[0:D:11]. sqn 8 tm 47610 IN PKTZR, pb=7, payload: 82 38 00 18 03 01 87 *Jan 11 05:33:33.727:ModemRelay pkt[0:D:11]. sqn 9 tm 47616 OUT PKTZR, pb=7, payload: 82 20 00 18 03 01 47 *Jan 11 05:33:35.719:ModemRelay pkt[0:D:11]. sqn 10 tm 49614 IN PKTZR, pb=7, payload: 82 39 00 18 03 01 87
DB-1668
December 2010
Related Commands
Description Displays gateway DSP modem relay termination codes. Displays modem relay network errors.
DB-1669
Syntax Description
(Optional) Identifies a particular call. (Optional) Value of the system UpTime when the call associated with this entry was started. Valid values are 0 through 4294967295. (Optional) Dial peer identification number used to distinguish between calls with the same setup time. Valid values are 0 through 10.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(11)T
Modification This command was introduced for the Cisco 2600, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 7200 series routers, and the Cisco AS5300 universal access server. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
Disable console logging and use buffered logging before using the debug modem relay physical command. Using the debug modem relay physical command generates a large volume of debugs, which can affect router performance.
Examples
The following is sample output from the debug modem relay physical command. The output shows the sequence number of the packet, time stamp, direction, layer, and payload bytes, followed by each byte of the payload in hexadecimal.
Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 28 tm 11944 OUT PHYS, pb=12, payload: 00 06 00 00 00 00 00 07 00 00 01 DE *Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 29 tm 11944 OUT PHYS, pb=12, payload: 00 06 00 00 00 00 00 04 00 00 00 BE *Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 30 tm 11944 OUT PHYS, pb=12, payload: 00 06 00 00 00 00 00 05 FF FF FF FD
DB-1670
December 2010
Related Commands
Description Displays gateway DSP modem relay termination codes. Displays modem relay network errors.
DB-1671
Syntax Description
(Optional) Identifies a particular call. (Optional) Value of the system UpTime when the call associated with this entry was started. Valid values are 0 through 4294967295. (Optional) Dial peer identification number used to distinguish between calls with the same setup time. Valid values are 0 through 10.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(11)T
Modification This command was introduced for the Cisco 2600, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 7200 series routers, and the Cisco AS5300 universal access server. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
Disable console logging and use buffered logging before using the debug modem relay sprt command. Using the debug modem relay sprt command generates a large volume of debugs, which can affect router performance.
Examples
The following is sample output from the debug modem relay sprt command. The output shows the sequence number of the packet, time stamp, direction, layer, and payload bytes, followed by each byte of the payload in hexadecimal.
Jan 11 05:37:16.151:ModemRelay pkt[0:D:11]. sqn 34 tm 7910 OUT SPRT, pb=4, payload: 02 00 03 71 *Jan 11 05:37:16.295:ModemRelay pkt[0:D:11]. sqn 35 tm 8048 IN SPRT, pb=13, payload: 02 00 01 F1 F7 7E FD F5 90 F3 3E 90 55 *Jan 11 05:37:16.303:ModemRelay pkt[0:D:11]. sqn 36 tm 8060 IN SPRT, pb=6, payload: 02 00 01 41 04 00
DB-1672
December 2010
Related Commands
Description Displays gateway DSP modem relay termination codes. Displays modem relay network errors.
DB-1673
Syntax Description
(Optional) Identifies a particular call. (Optional) Value of the system UpTime when the call associated with this entry was started. Valid values are 0 through 4294967295. (Optional) Dial peer identification number used to distinguish between calls with the same setup time. Valid values are 0 through 10.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(11)T
Modification This command was introduced for the Cisco 2600, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 7200 series routers, and the Cisco AS5300 universal access server. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
Disable console logging and use buffered logging before using the debug modem relay udp command. Using the debug modem relay udp command generates a large volume of debugs, which can affect router performance.
Examples
The following is sample output from the debug modem relay udp command. The output shows three UDP packets related to modem relay. In the sample output, OUT or IN represent packet direction, and UDP indicates the specific layer that reported the packet.
Jan 1 03:39:29.407:ModemRelay pkt[0:D (4)]. sqn 61 tm 3060 OUT UDP, pb=6, payload: 80 00 00 00 00 00 *Jan 1 03:39:29.471:ModemRelay pkt[0:D (4)]. sqn 62 tm 3120 IN UDP, pb=6, payload: 40 00 00 00 00 00 *Jan 1 03:39:29.471:ModemRelay pkt[0:D (4)]. sqn 63 tm 3120 IN UDP, pb=6, payload: 80 00 00 00 00 00
DB-1674
December 2010
Related Commands
Description Displays gateway DSP modem relay termination codes. Displays modem relay network errors.
DB-1675
Syntax Description
(Optional) Identifies a particular call. (Optional) Value of the system UpTime when the call associated with this entry was started. Valid values are 0 through 4294967295. (Optional) Dial peer identification number used to distinguish between calls with the same setup time. Valid values are 0 through 10.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced . This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug modem relay v14 command to debug V.14 layer modem relay calls. Using this command generates a large volume of debugs, which can affect router performance; disable console logging and use buffered logging before using the debug modem relay v14 command. In most instances you will use this command only at the request of Cisco Technical Assistance Center (TAC).
Examples
The following is sample output from the debug modem relay v14 command. The output shows the sequence number of the packet time stamp, direction, layer, and payload bytes, followed by each byte of the payload in hexadecimal.
Router# debug modem relay v14 *Aug 10 22:51:37.496: ModemRelay 08 BC 4C 51 CE 1A 69 ED D6 65 62 *Aug 10 22:51:38.216: ModemRelay 9A 9C 7F 57 2D D7 4C 98 E8 EC FC *Aug 10 22:51:38.216: ModemRelay 64 F9 73 D3 AB 11 61 ED 1E 5D 51 *Aug 10 22:51:38.216: ModemRelay C1 77 90 12 F8 37 E8 7A 64 8D 0E E5 2E 94 65 79 C2 A8 E9 6F D9 6C pkt[1/1:1]. 8C 7F D3 9A pkt[1/1:1]. 73 69 F2 FF pkt[1/1:1]. 8D B1 9F CA pkt[1/1:1]. 61 58 7E E4 3B sqn 15649 tm 48766 OUT V14, pb=18, payload: 82 5A 7A sqn 15650 tm 48778 IN V14, pb=22, payload: A3 E8 B0 A4 58 BB AE sqn 15651 tm 48790 OUT V14, pb=18, payload: 49 BF F4 sqn 15652 tm 48796 IN V14, pb=21, payload: E8 87 E0 B4 83 C7 A4 60 7A 64 8B 09 B9 80 2E
DB-1676
December 2010
Related Commands
Description Displays gateway DSP modem relay termination codes. Displays modem relay network errors.
DB-1677
Syntax Description
(Optional) Identifies a particular call. (Optional) Value of the system UpTime when the call associated with this entry was started. Valid values are 0 through 4294967295. (Optional) Dial peer identification number used to distinguish between calls with the same setup time. Valid values are 0 through 10.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(11)T
Modification This command was introduced for the Cisco 2600, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 7200 series routers, and the Cisco AS5300 universal access server. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
Disable console logging and use buffered logging before using the debug modem relay v42 command. Using the debug modem relay v42 command generates a large volume of debugs, which can affect router performance.
Examples
The following is sample output from the debug modem relay v42 command. The output shows the sequence number of the packet, timestamp, direction, layer, and payload-bytes, followed by each byte of the payload in hexadecimal.
Jan 11 05:42:08.715:ModemRelay pkt[0:D:13]. sqn 3 tm 10104 OUT V42, pb=43, payload: 03 AF 82 80 00 13 03 03 8A 89 00 05 02 03 E0 06 02 03 E0 07 01 08 08 01 08 F0 00 0F 00 03 56 34 32 01 01 03 02 02 04 00 03 01 20 *Jan 11 05:42:08.847:ModemRelay pkt[0:D:13]. sqn 4 tm 10236 IN V42, pb=2, payload: 03 7F
DB-1678
December 2010
Related Commands
Description Displays gateway DSP modem relay termination codes. Displays modem relay network errors.
DB-1679
Syntax Description
normal abnormal
(Optional) Uploads the call trace to the syslog server on normal call termination (for example, a local user hangup or a remote user hangup). (Optional) Uploads the call trace to the syslog server on abnormal call termination (for example, any call termination other than normal termination, such as a lost carrier or a watchdog timeout). (Optional) Uploads the call trace on all call terminations including normal and abnormal call termination. (Optional) The slot and modem port number. (Optional) The modem group.
Command Modes
Privileged EXEC
Usage Guidelines
The debug modem trace command applies only to manageable modems. For additional information, use the show modem command.
Examples
The following is sample output from the debug modem trace abnormal command:
Router# debug modem trace abnormal 1/14 Modem 1/14 Abnormal End of Connection Trace. Caller 123-4567 Start-up Response: AS5200 Modem, Firmware 1.0 Control Reply: 0x7C01 DC session response: brasil firmware 1.0 RS232 event: DSR=On, DCD=On, RI=Off, TST=Off changes: RTS=No change, DTR=No change, CTS=No change changes: DSR=No change, DCD=No change, RI=No change, TST=No change Modem State event: Connected Connection event: Speed = 19200, Modulation = VFC Direction = Originate, Protocol = reliable/LAPM, Compression = V42bis DTR event: DTR On Modem Activity event: Data Active Modem Analog signal event: TX = -10, RX = -24, Signal to noise = -32 End connection event: Duration = 10:34-11:43, Number of xmit char = 67, Number of rcvd char = 88, Reason: Watchdog Time-out.
DB-1680
December 2010
Related Commands
Description Debugs the CSM used to connect calls on the modem. Creates modem startup messages between the network management software and the modem on the specified OOB port.
DB-1681
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug modem traffic command displays output for framed, unframed, and asynchronous data sent or received by the modem cards.
Examples
The following example displays information about unframed or framed data sent to or received from the modem cards:
Router# debug modem traffic MODEM-RAW-TX:modem = 6/5/00, length = 1, data = 0x61, 0xFF, 0x7D, 0x23 MODEM-RAW-RX:modem = 6/5/00, length = 1, data = 0x61, 0x0, 0x0, 0x0
The information indicates unframed asynchronous data transmission and reception involving the modem on shelf 6, slot 5, port 00. The following example displays framed asynchronous data transmission and reception involving the modem on shelf 6, slot 5, port 00:
Router# debug modem traffic MODEM-FRAMED-TX:modem = 6/5/00, length = 8, data = 0xFF, 0x3, 0x82 MODEM-FRAMED-RX:modem = 6/5/00, length = 14, data = 0xFF, 0x3, 0x80
DB-1682
December 2010
Related Commands
Description Displays output for modem control messages that are received or sent to the router.
DB-1683
Usage Guidelines
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified to reflect new MPLS IETF terminology and CLI command syntax. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug mpls adjacency command to monitor when entries are updated in or added to the adjacency database.
Examples
The following is sample output from the debug mpls adjacency command:
Router# debug mpls adjacency TAG ADJ: add 10.10.0.1, Ethernet0/0/0 TAG ADJ: update 10.10.0.1, Ethernet0/0/0
Table 215 describes the significant fields shown in the sample display.
Table 215 debug mpls adjacency Field Description
Description Adding an entry to the database. Updating the MAC address for an existing entry.
DB-1684
December 2010
Table 215
DB-1685
Effective with Cisco IOS Release 12.4(20)T, the debug mpls atm-cos command is not available in Cisco IOS software. To display ATM label virtual circuit (VC) bind or request activity that is based on the configuration of a Quality of Service (QoS) map, use the debug mpls atm-cos command in privileged EXEC mode. To disable this feature, use the no form of this command. debug mpls atm-cos [bind | request] no debug mpls atm-cos [bind | request]
Syntax Description
bind request
(Optional) Specifies debug information about bind responses for a VC path. (Optional) Specifies debug information about bind requests for a VC path.
Defaults
Command Modes
Command History
Modification This command was introduced. This command was modified to reflect MPLS IETF syntax and terminology. This command was incorporated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was removed.
Examples
The following command sequence demonstrates how to obtain sample output from the debug mpls atm-cos command. First, display the Multiprotocol Label Switching (MPLS) forwarding table to see which prefixes are associated with a single label VC (LVC), as shown below:
Router# show mpls forwarding Local tag 26 27 28 29 30 31 32 33 Outgoing tag or VC 28 Pop tag 27 30 Pop tag 2/34 Pop tag Pop tag Prefix or Tunnel Id 10.17.17.17/32 10.11.11.11/32 10.16.16.16/32 10.92.0.0/8 10.95.0.0/8 10.10.10.10/32 10.14.14.14/32 10.90.0.0/8 Bytes tag switched 0 1560 0 0 2600 0 0 0 Outgoing interface PO6/0 PO6/0 PO6/0 PO6/0 PO6/0 AT2/0.1 Fa5/0 Fa5/0 Next Hop point2point point2point point2point point2point point2point point2point 10.91.0.1 10.91.0.1
DB-1686
December 2010
34 35 36 37 38 39 40
0 0 0 0 0 0 540 0
Second, enable debugging of request and bind events, as shown in the command sequence below:
Router# debug mpls atm-cos ? bind request Bind response for VC path Requests for VC binds path
Router# debug mpls atm-cos request ATM TAGCOS VC requests debugging is on Router# debug mpls atm-cos bind ATM TAGCOS Bind response debugging is on
Third, configure an MPLS ATM subinterface for multi-VC mode. The corresponding request and bind events are displayed, as shown below:
Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface a2/0.1 Router(config-subif)# mpls atm multi-vc Router(config-subif)# end Router# 19:59:14:%SYS-5-CONFIG_I:Configured from console by console Router# 19:59:24:TAGCOS-REQ:vc request 10.10.10.10/32, available 19:59:24:TAGCOS-REQ:vc request 10.10.10.10/32, standard 19:59:24:TAGCOS-REQ:vc request 10.10.10.10/32, premium 19:59:24:TAGCOS-REQ:vc request 10.10.10.10/32, control 19:59:24:TAGCOS-REQ:vc request 10.96.0.0/8, available 19:59:24:TAGCOS-REQ:vc request 10.96.0.0/8, standard 19:59:24:TAGCOS-REQ:vc request 10.96.0.0/8, premium 19:59:24:TAGCOS-REQ:vc request 10.96.0.0/8, control TAGCOS-REQ/TCATM:10.11.11.11/32,len=4352,band=1099528405504,class=0x700 TAGCOS-REQ/TCATM:10.12.12.12/32,len=4352,band=2199040033280,class=0x700 TAGCOS-REQ/TCATM:10.13.13.13/32,len=4352,band=3298551661056,class=0x700 TAGCOS-REQ/TCATM:10.14.14.14/32,len=4352,band=4398063288832,class=0x700 TAGCOS-REQ/TCATM:10.15.15.15/32,len=4352,band=5497574916608,class=0x700 TAGCOS-REQ/TCATM:10.16.16.16/32,len=4352,band=6597086544384,class=0x700 TAGCOS-REQ/TCATM:10.17.17.17/32,len=4352,band=7696598172160,class=0x700 TAGCOS-REQ/TCATM:10.18.18.18/32,len=4352,band=8796109799936,class=0x700 TAGCOS-REQ/TCATM:10.90.0.0/8,len=768,band=3940649674539009,class=0x2 TAGCOS-REQ/TCATM:10.91.0.0/8,len=768,band=3940649674604545,class=0x2 TAGCOS-REQ/TCATM:10.92.0.0/8,len=768,band=3940649674670081,class=0x2 TAGCOS-REQ/TCATM:10.93.0.0/8,len=768,band=3940649674735617,class=0x2 TAGCOS-REQ/TCATM:10.94.0.0/8,len=768,band=3940649674801153,class=0x2 TAGCOS-REQ/TCATM:10.95.0.0/8,len=768,band=3940649674866689,class=0x2 TAGCOS-REQ/TCATM:10.97.0.0/8,len=768,band=3940649674932225,class=0x2 TAGCOS-REQ/TCATM:10.98.0.0/8,len=768,band=3940649674997761,class=0x2 TAGCOS-BIND:binding_ok 10.10.10.10/32,VCD=41 - control 41,41,41,41 TAGCOS-BIND:binding_ok 10.10.10.10/32, Inform TFIB pidx=0, in_tag=31, idx=0x80000000 TAGCOS-BIND:binding_ok 10.96.0.0/8,VCD=42 - control 42,42,42,42 TAGCOS-BIND:binding_ok 10.96.0.0/8, Inform TFIB pidx=1, in_tag=34, idx=0x80000001
DB-1687
10.10.10.10/32,VCD=43 - premium 43,43,43,41 10.96.0.0/8,VCD=44 - premium 44,44,44,42 10.10.10.10/32,VCD=45 - standard 45,45,43,41 10.96.0.0/8,VCD=46 - standard 46,46,44,42 10.10.10.10/32,VCD=47 - available 47,45,43,41 10.96.0.0/8,VCD=48 - available 48,46,44,42
DB-1688
December 2010
Effective with Cisco IOS Release 12.4(20)T, the debug mpls atm-ldp api command is not available in Cisco IOS software. To display information about the virtual channel identifier (VCI) allocation of label virtual circuits (LVCs), label-free requests, and cross-connect requests, use the debug mpls atm-ldp api command in privileged EXEC mode. To disable this feature, use the no form of this command. debug mpls atm-ldp api no debug mpls atm-ldp api
Syntax Description
Defaults
Command Modes
Command History
Release 11.1CT 12.0(10)ST 12.0(14)ST 12.1(2)T 12.1(8a)E 12.2(2)T 12.2(4)T 12.2(8)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S 12.2(33)SRA 12.4(20)T
Modification This command was introduced. This command was modified to reflect MPLS IETF command syntax and terminology. This command was integrated into Cisco IOS Release 12.0(14)ST. This command was modified. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(4)T. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was removed.
Usage Guidelines
Use the debug mpls atm-ldp api command in conjunction with the debug mpls atm-ldp routes and debug mpls atm-ldp states command to display more complete information about an LVC.
DB-1689
Examples
The following shows sample output from the debug mpls atm-ldp api command:
Router# debug mpls atm-ldp api Tailend Router Free label Req 167.50.0.0 on ATM0/0.2 VPI/VCI 1/674 TAGATM_API: received label free request interface: ATM0/0.2 dir: in vpi: 1 vci: 674 TAGATM_API: completed label free interface: ATM0/0.2 vpi: 1 vci: 674 result: TAGATM_OK
Description Subsystem that displays the message. Interface used by the driver to allocate or free VPI/VCI resources. Direction of the VC:
Virtual path identifier. Virtual channel identifier. The return error code from the driver API.
Related Commands
DB-1690
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug mpls atm-ldp failure command to display failure information about the LC-ATM. This command is useful for determining failure cases. This command displays only failure information, unlike the debug mpls atm-ldp api command, which displays all API events.
Examples
This section shows sample output from the debug mpls atm-ldp failure command. The following failure message displays during a race condition where the LC-ATM attempts to allocate label virtual circuits (LVCs) on an interface where MPLS has been disabled:
Router# debug mpls atm-ldp failure TAGATM_API_FAILURE: allocate_tag_req on ATM1/0/0 tagsw not enabled
The following failure message displays when the LC-ATM fails to deallocate the output leg LVC of a cross connect:
Router# debug mpls atm-ldp failure
DB-1691
The following failure message displays when a cross connect cannot be installed on the switching fabric. The result code is also provided.
Router# debug mpls atm-ldp failure TAGATM_API_FAILURE: setup_xconn_req InstallSvcXconn failed result
The following message displays when attempts to establish a cross connect fail. The result describes the reason for the failure.
Router# debug mpls atm-ldp failure TCATM-4-XCONNECT_FAILED: 10.254.13.237/32 for ATM0/1/2 ATM1/0/0 TAGATM_API: x-conn setup request completed input interface: ATM0/1/2 vpi: 1 vci: 48 output interface: ATM1/0/0 vpi: 2 vci: 2038 result = TAGATM_FAIL Xconnect setup response for 10.254.13.215: failure, 8
The following message displays when attempts to remove a cross connect fail. The result describes why the cross connect cannot be removed.
Router# debug mpls atm-ldp failure TCATM-4-XCONNECT_REMOVE_FAILED: Remove XConnect API failed for ATM1/0/12 1/894 -> ATM1/0/13 1/528 TAGATM_API: x-conn remove request completed input interface: ATM1/0/12 vpi: 1 vci: 894 output interface: ATM1/0/13 vpi: 1 vci: 528 result = TAGATM_FAIL
Related Commands
DB-1692
December 2010
Effective with Cisco IOS Release 12.4(20)T, the debug mpls atm-ldp routes command is not available in Cisco IOS software. To display information about the state of the routes for which virtual circuit identifier (VCI) requests are being made, use the debug mpls atm-ldp routes command in privileged EXEC mode. To disable this feature, use the no form of this command. debug mpls atm-ldp routes no debug mpls atm-ldp routes
Syntax Description
Defaults
Command Modes
Command History
Command 11.1CT 12.0(10)ST 12.0(14)ST 12.1(2)T 12.1(8a)E 12.2(2)T 12.2(4)T 12.2(8)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was modified to reflect MPLS IETF command syntax and terminology. This command was integrated into Cisco IOS Release 12.0(14)ST. This command was modified. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(4)T. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was removed.
12.4(20)T
DB-1693
Usage Guidelines
When there are many routes and system activities (that is, shutting down interfaces, learning new routes, and so forth), the debug mpls atm-ldp routes command displays extensive information that might interfere with system timing. Most commonly, this interference affects normal label distribution protocol (LDP) operation. To avoid this problem, you can increase the LDP hold time by means of the mpls ldp holdtime command.
Examples
The following shows sample output from the debug mpls atm-ldp routes command:
Router# debug mpls atm-ldp routes CleanupRoutes,not deleting route of idb ATM0/0.2,rdbIndex 0 tcatmFindRouteTags,153.7.0.0/16,idb=ATM0/0.2,nh=134.111.102.98,index=0 AddNewRoute,153.7.0.0/16,idb=ATM0/0.2 CleanupRoutes,153.7.0.0/16 CleanupRoutes,not deleting route of idb ATM0/0.2,rdbIndex 0 tcatmFindRouteTags,153.8.0.0/16,idb=ATM0/0.2,nh=134.111.102.98,index=0 AddNewRoute,153.8.0.0/16,idb=ATM0/0.2 CleanupRoutes,153.8.0.0/16 CleanupRoutes,not deleting route of idb ATM0/0.2,rdbIndex 0 tcatmFindRouteTags,153.9.0.0/16,idb=ATM0/0.2,nh=134.111.102.98,index=0 AddNewRoute,153.9.0.0/16,idb=ATM0/0.2 CleanupRoutes,153.9.0.0/16 CleanupRoutes,not deleting route of idb ATM0/0.2,rdbIndex 0 tcatmFindRouteTags,153.10.0.0/16,idb=ATM0/0.2,nh=134.111.102.98,index=0 AddNewRoute,153.10.0.0/16,idb=ATM0/0.2 CleanupRoutes,153.10.0.0/16 CleanupRoutes,not deleting route of idb ATM0/0.2,rdbIndex 0 tcatmFindRouteTags,153.11.0.0/16,idb=ATM0/0.2,nh=134.111.102.98,index=0 AddNewRoute,153.11.0.0/16,idb=ATM0/0.2 CleanupRoutes,153.11.0.0/16
Field CleanupRoutes
Description Cleans up the routing table after a route has been deleted.
not deleting route of idb The route cleanup event has not removed the specified route. ATM0/0.2 rdbIndex tcatmFindRouteTags idb nh index AddNewRoute Index identifying the route. Request a VC for the route. The internal descriptor for an interface. Next hop for the route. Identifier for the route. Action of adding routes for a prefix or address.
Related Commands
Description Changes the time an LDP session is maintained in the absence of LDP messages from the session peer.
DB-1694
December 2010
Effective with Cisco IOS Release 12.4(20)T, the debug mpls atm-ldp states command is not available in Cisco IOS software. To display information about label virtual circuit (LVC) state transitions as they occur, use the debug mpls atm-ldp states command in privileged EXEC mode. To disable this feature, use the no form of this command. debug mpls atm-ldp states no debug mpls atm-ldp states
Syntax Description
Defaults
Command Modes
Command History
Release 11.1CT 12.0(10)ST 12.0(14)ST 12.1(2)T 12.1(8a)E 12.2(2)T 12.2(4)T 12.2(8)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was modified to reflect MPLS IETF command syntax and terminology. This command was integrated into Cisco IOS Release 12.0(14)ST. This command was modified. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(4)T. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was removed.
12.4(20)T
DB-1695
Usage Guidelines
When there are many routes and system activities (such as shutting down interfaces, learning new routes, and so forth), the debug mpls atm-ldp states command outputs extensive information that might interfere with system timing. Most commonly, this interference affects normal label distribution protocol (LDP) operation. To avoid this problem, you should increase the LDP hold time by means of the mpls ldp holdtime command.
Examples
The following shows sample output from the debug mpls atm-ldp states command:
Router# debug mpls atm-ldp states Transit Transit Transit Transit Transit Transit Transit Output 166.35.0.0 VPI/VCI 1/67 Input 166.35.0.0 VPI/VCI 1/466 Input 166.35.0.0 VPI/VCI 1/466 Input 166.35.0.0 VPI/VCI 1/466 Input 166.35.0.0 VPI/VCI 1/466 Input 166.35.0.0 VPI/VCI 1/466 Input 166.35.0.0 VPI/VCI 1/466 Active -> XmitRelease NoPath Active -> ApiWaitParentLoss ParentLoss ApiWaitParentLoss -> ParentWait ApiSuccess ParentWait -> XmitWithdraw NoPath XmitWithdraw -> XmitWithdraw Transmit XmitWithdraw -> NonExistent Release NonExistent -> NonExistent ApiSuccess
Related Commands
Description Changes the time an LDP session is maintained in the absence of LDP messages from the session peer.
DB-1696
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series router. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command with caution. The command displays the events for every label binding.
Examples
The following example shows the output when you issue the command on the standby Route Processor:
Router# debug mpls checkpoint label-binding MPLS Label Binding Checkpoint debugging is on 3d17h: mpls_lbl_bind_chkpt: client ID 13 up, total client 1 3d17h: mpls_lbl_bind_chkpt: msg rx for 1D, vers 0, type 1 action 56, len 0, state 4, peer 13 3d17h: mpls_lbl_bind_chkpt: post msg type 1 3d17h: mpls_lbl_bind_chkpt: msg rx for 1D, vers 0, type 1 action 56, len 0, state 4, peer 13 3d17h: mpls_lbl_bind_chkpt: post msg type 1 3d17h: mpls_lbl_bind_chkpt: msg rx for 1D, vers 0, type 1 action 56, len 0, state 4, peer 13 3d17h: mpls_lbl_bind_chkpt: post msg type 1 3d17h: mpls_lbl_bind_chkpt: appl_id 13, KEY 000C800018888200 3d17h: mpls_chkpt_db: AVL insert successful, Key 000C800018888200 action Add, label 19 3d17h: mpls_lbl_bind_chkpt: appl_id 13, KEY 000C800013200080 3d17h: mpls_chkpt_db: AVL insert successful, Key 000C800013200080 action Add, label 20
DB-1697
mpls_lbl_bind_chkpt: appl_id 13, KEY 000C8000138383838200 mpls_chkpt_db: AVL insert successful, Key 000C8000138383838200 action Add, label 21 Stby RP OR CF peer not ready, don't send msg mpls_lbl_bind_chkpt: client ID 13 down, total client 0 mpls_lbl_bind_chkpt: msg rx for 1D, vers 0, type 1 56, len 2, state 4, peer 13 mpls_lbl_bind_chkpt: post msg type 1 mpls_lbl_bind_chkpt: appl_id 13, KEY action NSF unconfig, appl id 13
Related Commands
Description Display the events for the VRF checkpointing system between the active and standby Route Processors.
DB-1698
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following is sample output from the debug mpls events command:
Router# debug mpls events MPLS events debugging is on TAGSW: Unbound IP address, 155.0.0.55, from Router ID TAGSW: Bound IP address, 199.44.44.55, to Router ID
DB-1699
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
Examples
The command in the following examples display all IPRM debugging for the global routing table.
Cisco 7500 Series Example
Router# debug mpls ip iprm IPRM debugging is on for global routing table iprm: prefix deleted: 10.0.0.44/32(glbl) iprm: delete mfi rewrite: 10.0.0.44/32(glbl) . . . iprm: discover prefix labels: 10.0.0.44/32(glbl); recurs tree change; ctxt 0x38002 iprm: get mfi rewrite 10.0.0.44/32(glbl) obtained: 0 fpis/0 mois iprm: announce prefix local labels: lcatm; trans #80; 10.0.0.44/32(glbl); 0 labels; flags 0x0 iprm: update mfi rewrite: 10.0.0.44/32(glbl); prefix label info iprm: omit rewrite create: 10.0.0.44/32(glbl) iprm: discover prefix labels: 10.0.0.44/32(glbl); recurs tree change; ctxt 0x38000
DB-1700
December 2010
iprm: get mfi rewrite 10.0.0.44/32(glbl) obtained: 0 fpis/0 mois iprm: announce prefix local labels: lcatm; trans #81; 10.0.0.44/32(glbl); 0 labels; flags 0x0 iprm: get path labels: 10.0.0.44/32(glbl); nh 10.0.0.55(glbl), Et4/0/1; trans #81; recurs tree change iprm: ldm get path labels: 10.0.0.44/32(glbl), ldp; flags 0x8000 iprm: announce prefix local labels: ldp; trans #81; 10.0.0.44/32(glbl); 1 label; flags 0x0 iprm: lab 21, ltbl 0 iprm: announce path labels: ldp; trans #81; 10.0.0.44/32(glbl); 0 labels; flags 0x0 iprm: path: nh 10.0.0.55(glbl), Et4/0/1 iprm: update mfi rewrite: 10.0.0.44/32(glbl); prefix label info iprm: lcl lab 21, ltbl 0, ldp iprm: path lab -, nh 10.0.0.55(glbl), Et4/0/1; ldp iprm: create mfi rewrite 10.0.0.44/32(glbl) passed: 2 fpis/1 mois iprm: fpi[0] IV4, owner IPRM; 10.0.0.44/32; glbl iprm: fpi[1] LBL, owner LDP; 21, ltbl 0 iprm: moi[0] PKT, flags 0x8; lab label-no-label; nh 10.0.0.55; nh if Et4/0/1 (nsf)
discover prefix labels: 10.0.0.44/32(glbl); recurs tree change; ctxt 0x38002 get mfi rewrite 10.0.0.44/32(glbl) obtained: 0 fpis/0 mois update mfi rewrite: 10.0.0.44/32(glbl); prefix label info omit rewrite create: 10.0.0.44/32(glbl) discover prefix labels: 10.0.0.44/32(glbl); recurs tree change; ctxt 0x38000 get mfi rewrite 10.0.0.44/32(glbl) obtained: 0 fpis/0 mois
iprm: get path labels: 10.0.0.44/32(glbl); nh 10.0.0.55(glbl), GigabitEthernet4/0/0; trans #81; recurs tree change iprm: ldm get path labels: 10.0.0.44/32(glbl), ldp; flags 0x8000 iprm: announce prefix local labels: ldp; trans #81; 10.0.0.44/32(glbl); 1 label; flags 0x0 iprm: lab 21, ltbl 0 iprm: announce path labels: ldp; trans #81; 10.0.0.44/32(glbl); 0 labels; flags 0x0 iprm: path: nh 10.0.0.55(glbl), GigabitEthernet4/0/0 iprm: update mfi rewrite: 10.0.0.44/32(glbl); prefix label info iprm: lcl lab 21, ltbl 0, ldp iprm: path lab -, nh 10.0.0.55(glbl), GigabitEthernet4/0/0; ldp iprm: create mfi rewrite 10.0.0.44/32(glbl) passed: 2 fpis/1 mois iprm: fpi[0] IV4, owner IPRM; 10.0.0.44/32; glbl iprm: fpi[1] LBL, owner LDP; 21, ltbl 0 iprm: moi[0] PKT, flags 0x8; lab label-no-label; nh 10.0.0.55; nh if GigabitEthernet4/0/0 (nsf)
Table 219 describes the significant fields shown in the display. The field descriptions also apply to the output of following debug commands:
debug mpls ip iprm cef debug mpls ip iprm events debug mpls ip iprm ldm
DB-1701
Table 219
Field discover prefix labels announce prefix local labels announce path labels mfi rewrite
Description The prefix labels that the IP LDM discovered. IP LDMs pass prefix incoming (local) and outgoing (path) labels to IPRM by announcing the labels. The information required by MPLS Forwarding Infrastructure (MFI) to create forwarding data structures for an MPLS forwarding equivalence class (FEC). For IP over MPLS a prefix is an MPLS FEC. An MFI rewrite includes a set of forwarding path identifier (FPI) and MPLS output information (MOI) elements. Forwarding path identifier, which is required to locate MPLS forwarding information for a FEC. IP over MPLS deals with several types of FPIs, including IPv4 (IV4), IPv6 (IV6), and label (LBL) FPIs.
fpi
Note
moi
MPLS output information. For IP over MPLS, there is a MOI for each prefix path. The MOI includes the next hop (nh), outgoing interface (nh if), and outgoing label. IP over MPLS handles several types of MOIs, including packet (PKT) and ATM (ATM). The process IPRM uses to read (get) or update (create/update) an MFI rewrite. Recursion tree change. Cisco Express Forwarding notifies IPRM when the recursion tree (see below) for a prefix changes. IPRM responds by performing label discovery (see above). A prefix known to Cisco Express Forwarding can have one or more paths (routes). Each is either a terminal path with a next hop and an outgoing interface or a recursive path with a next hop and no outgoing interface. The next hop for a recursive path typically matches a prefix known to Cisco Express Forwarding. That prefix also has one or more paths. The IP recursion tree for prefix P is a tree rooted at P's Cisco Express Forwarding entry with one of more path descendants. Terminal paths are leaf nodes in P's recursion tree and recursive paths are nonleaf nodes, each of which points to the Cisco Express Forwarding entry for its next hop. The global (default) routing table. Context. Information used by IPRM when it performs label discovery. Information passed between IPRM and other components. Transaction number used to identify an ongoing label discovery.
recursion tree
DB-1702
December 2010
Table 219
Related Commands
Command
Description
debug mpls ip iprm cef Displays debugging information for interactions between Cisco Express Forwarding and the IPRM. debug mpls ip iprm events debug mpls ip iprm ldm debug mpls ip iprm mfi Displays events related to the MPLS IPRM. Displays debugging information for interactions between the LDMs and the MPLS IPRM. Displays debugging information for interactions between the MFI and the MPLS IPRM.
DB-1703
Syntax Description
(Optional) Displays the debugging information for one or more routing tables. Displays debugging information for all routing tables. The ID of the routing table for which you want to display debugging information. Table 0 is the default or global routing table. (Optional) Displays debugging information for the VPN routing and forwarding (VRF) instance you specify. The name of the VRF instance. You can find VRF names with the show ip vrf command. (Optional) Displays debugging information for the access control list (ACL) you specify. The name of the ACL. You can find ACL names with the show ip access-list command. (Optional) Displays debugging information for the prefix list you specify. The name of the prefix list. You can find prefix list names with the show ip prefix-list command.
Defaults
Debugging is not enabled. If you do not supply an optional keyword, all the debugging events are displayed.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
DB-1704
December 2010
Usage Guidelines
This command limits the debug output to the IPRM interactions with Cisco Express Forwarding.
Examples
In the following example, IPRM events related to Cisco Express Forwarding are displayed.
Cisco 7500 Series Example
Router# debug mpls ip iprm cef IPRM CEF interaction debugging is on for global routing table iprm: prefix deleted: 10.0.0.44/32(glbl) iprm: discover prefix labels: 10.0.0.44/32(glbl); recurs tree change; ctxt 0x38002 iprm: announce prefix local labels: lcatm; trans #94; 10.0.0.44/32(glbl); 0 labels; flags 0x0 . . . iprm: discover prefix labels: 10.0.0.44/32(glbl); recurs tree change; ctxt 0x38000 iprm: announce prefix local labels: lcatm; trans #97; 10.0.0.44/32(glbl); 0 labels; flags 0x0 iprm: get path labels: 10.0.0.44/32(glbl); nh 10.0.0.55(glbl), Et4/0/1; trans #97; recurs tree change iprm: announce prefix local labels: ldp; trans #97; 10.0.0.44/32(glbl); 1 label; flags 0x0 iprm: lab 21, ltbl 0 iprm: announce path labels: ldp; trans #97; 10.0.0.44/32(glbl); 0 labels; flags 0x0 iprm: path: nh 10.0.0.55(glbl), Et4/0/1
See the field descriptions for the debug mpls ip iprm command for an explanation of the fields displayed in the output.
Related Commands
DB-1705
Description Displays debugging information for interactions between the IP LDMs and the MPLS IPRM. Displays debugging information for interactions between the MFI and the MPLS IPRM.
DB-1706
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
Examples
See the command page for debug mpls ip iprm for sample command output and an explanation of the fields displayed in the output.
Related Commands
Command
Description
debug mpls ip iprm cef Displays debugging information for interactions between Cisco Express Forwarding and the IPRM. debug mpls ip iprm ldm debug mpls ip iprm mfi Displays debugging information for interactions between the LDMs and the MPLS IPRM. Displays debugging information for interactions between the MFI and the MPLS IPRM.
DB-1707
debug mpls ip iprm ldm [bgp | ldp | vpnv4 | table {all | table-id} | vrf vrf-name | acl acl-name | prefix-list prefix-list-name] no debug mpls ip iprm ldm
Syntax Description
bgp lcatm ldp vpnv4 6pe table all table-id vrf vrf-name acl acl-name prefix-list prefix-list-name
(Optional) Displays Border Gateway Protocol (BGP) events. (Optional) Displays Label Controlled ATM (LC-ATM) events.
Note
(Optional) Displays Label Distribution Protocol (LDP) events. (Optional) Displays Virtual Private Network (VPNv4) events. (Optional) Displays IPv6 over MPLS events.
Note
(Optional) Displays debugging information for one or more routing tables. (Optional) Displays debugging information for all routing tables. (Optional) Specifies the routing table for which you want to display debugging information. Table 0 is the default or global routing table. (Optional) Displays debugging information for the VPN routing and forwarding (VRF) instance you specify. (Optional) The name of the VRF instance. You can find VRF names with the show ip vrf command. (Optional) Displays debugging information for the access control list (ACL) you specify. (Optional) The name of the ACL. You can find ACL names with the show ip access-list command. (Optional) Displays debugging information for the prefix list you specify. (Optional) The name of the prefix list. You can find prefix list names with the show ip prefix-list command.
Defaults
Debugging is not enabled. If you do not supply an optional keyword, all the debugging events are displayed.
DB-1708
December 2010
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
Examples
See the debug mpls ip iprm command page for sample output and an explanation of the fields displayed in the output.
Related Commands
Command
Description
debug mpls ip iprm cef Displays debugging information for interactions between Cisco Express Forwarding and the IPRM. debug mpls ip iprm events debug mpls ip iprm mfi Displays debugging information about events related to the MPLS IPRM. Displays debugging information for interactions between the MFI and the MPLS IPRM.
DB-1709
Syntax Description
(Optional) Displays debugging information for one or more routing tables. (Optional) Displays debugging information for all routing tables. (Optional) Displays debugging information for the routing table you specify. Table 0 is the default or global routing table. (Optional) Displays debugging information for the VPN Routing and Forwarding (VRF) instance you specify. (Optional) The name of the VRF instance. You can find VRF names with the show ip vrf command. (Optional) Displays debugging information for the access control list (ACL) you specify. (Optional) The name of the ACL. You can find ACL names with the show ip access-list command. (Optional) Displays debugging information for the prefix list you specify. (Optional) The name of the prefix list. You can find prefix list names with the show ip prefix-list command.
Defaults
Debugging is not enabled. If you enable debugging but do not supply an optional keyword, all the debugging events are displayed.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.4(20)T.
DB-1710
December 2010
Examples
See the debug mpls ip iprm command page for an explanation of the fields displayed in the output.
Related Commands
Command
Description
debug mpls ip iprm cef Displays debugging information for interactions between Cisco Express Forwarding and the MPLS IPRM .
DB-1711
Description Displays events related to the MPLS IPRM. Displays debugging information for interactions between the IP LDMs and the MPLS IPRM.
DB-1712
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use debug commands with care. They use a significant amount of CPU time and can affect system performance.
Examples
In the following example, the output shows that NSF/SSO and Graceful Restart synchronize the data between the active and backup Route Processors after an AToM virtual circuit (VC) is created. (Both the debug mpls l2transport checkpoint and the debug acircuit checkpoint commands are enabled in this example.) The debug mpls l2transport checkpoint command is enabled on the active RP:
Router# debug mpls l2transport checkpoint Router# debug acircuit checkpoint Router# show debug AToM HA: AToM checkpointing events and errors debugging is on AC HA: Attachment Circuit Checkpoint debugging is on Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface Fa5/1/1.2
DB-1713
Router(config-subif)# xconnect 10.55.55.2 1002 pw-class mpls AToM HA [10.55.55.2, 1002]: Build provision msg, SSM sw/seg 8192/8194 [0x2000/0x2002] PW i d 9216 [0x2400] local label 21 AC HA: Dynamic Sync. Event:4 Sw:8192[2000] Se:16385[4001] AToM HA: CF sync send complete AC HA CF: Sync send complete. Code:0
On the standby Route Processor, the following messages indicate that it receives checkpointing data:
AC HA [10.55.55.2, 1002]: Add to WaitQ. Flags:1 AToM HA [105.55.55.2, 1002]: Received 32-byte provision version 1 CF message AC HA CF: ClientId:89, Entity:0 Length:40 AToM HA [10.55.55.2, 1002]: Process chkpt msg provision [1], ver 1 AToM HA [10.55.55.2, 1002]: Reserved SSM sw/seg 8192/8194 [0x2000/0x2002] PW id 9216 [0x24 00] AC HA: Process Msg:35586. Ptr:44CBFD90. Val:0 AC HA: Sync. Event:4 CktType:4 Sw:8192[2000] Se:16385[4001] AC HA [10.55.55.2, 1002]: Remove from WaitQ. Flags:1[OK][OK]
During a switchover from the active to the backup Route Processor, the debug messages look similar to the following:
%HA-5-MODE: Operating mode is hsa, configured mode is sso. AC HA RF: CId:83, Seq:710, Sta:RF_STATUS_OPER_REDUNDANCY_MODE_CHANGE, Opr:5, St:STANDBY HO T, PSt:ACTIVE AToM HA: CID 84, Seq 715, Status RF_STATUS_OPER_REDUNDANCY_MODE_CHANGE, Op 5, State STANDB Y HOT, Peer ACTIVE AC HA RF: CId:83, Seq:710, Sta:RF_STATUS_PEER_PRESENCE, Opr:0, St:STANDBY HOT, PSt:ACTIVE AToM HA: CID 84, Seq 715, Status RF_STATUS_PEER_PRESENCE, Op 0, State STANDBY HOT, Peer AC TIVE AC HA RF: CId:83, Seq:710, Sta:RF_STATUS_PEER_COMM, Opr:0, St:STANDBY HOT, PSt:DISABLED AToM HA: CID 84, Seq 715, Status RF_STATUS_PEER_COMM, Op 0, State STANDBY HOT, Peer DISABL ED %HA-2-CUTOVER_NOTICE: Cutover initiated. Cease all console activity until system restarts. %HA-2-CUTOVER_NOTICE: Do not add/remove RSPs or line cards until switchover completes. %HA-2-CUTOVER_NOTICE: Deinitializing subsystems... %OIR-6-REMCARD: Card removed from slot 4, interfaces disabled %OIR-6-REMCARD: Card removed from slot 5, interfaces disabled %OIR-6-REMCARD: Card removed from slot 9, interfaces disabled %HA-2-CUTOVER_NOTICE: Reinitializing subsystems... %HA-2-CUTOVER_NOTICE: System preparing to restart... %HA-5-NOTICE: Resuming initialization... AC HA RF: CId:83, Seq:710, Sta:RF_STATUS_REDUNDANCY_MODE_CHANGE, Opr:7, St:STANDBY HOT, PS t:DISABLED . . . %LDP-5-GR: LDP restarting gracefully. Preserving forwarding state for 250 seconds. AC HA RF: CId:83, Seq:710, Sta:RF_PROG_ACTIVE, Opr:0, St:ACTIVE, PSt:DISABLED AToM HA: CID 84, Seq 715, Event RF_PROG_ACTIVE, Op 0, State ACTIVE, Peer DISABLED AC HA: Process Msg:35588. Ptr:0. Val:0 AC HA: Switchover: Standby->Active AC HA RF: Reconciling
Related Commands
Description Enables the display of AToM attachment circuit events when AToM is configured for NSF/SSO and Graceful Restart.
DB-1714
December 2010
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command does not display output on platforms where AToM Fast Reroute is implemented in the forwarding code. This command does not display output for the Cisco 7500 (both RP and VIP) series routers, 7200 series routers, and Cisco 12000 series route processor. The command does display output on Cisco 10720 Internet router line cards and Cisco 12000 series line cards.
Examples
In the following example, the primary link is disabled, which causes the backup tunnel (Tu1) to become the primary path.
Router# execute-on slot 3 debug mpls l2transport fast-reroute ========= Line Card (Slot 3) ========= AToM fast reroute debugging is on SLOT 3:Sep 16 17:58:56.346: AToM SMGR: Processing TFIB FRR event for 1.4.0.1 SLOT 3:Sep 16 17:58:56.346: AToM SMGR: Finished processing TFIB FRR event for 1.4.0.1 SLOT 3:Sep 16 17:58:56.346: AToM SMGR: Processing TFIB FRR event for Tunnel41 SLOT 3:Sep 16 17:58:56.346: AToM SMGR: Finished processing TFIB FRR event for Tunnel41 Sep 16 17:58:58.342: %LINK-3-UPDOWN: Interface POS0/0, changed state to down Sep 16 17:58:58.342: %OSPF-5-ADJCHG: Process 1, Nbr 1.0.0.1 on POS0/0 from FULL to DOWN, Neighbor Down: Interface down or detached Sep 16 17:58:59.342: %LINEPROTO-5-UPDOWN: Line protocol on Interface POS0/0, changed state to down
DB-1715
Related Commands
DB-1716
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You can issue this command either from the line card or the route processor to log Any Transport over MPLS (AToM) updates to or from line cards. This command applies only to platforms that support distributed mode.
Examples
The following is sample output from the debug mpls l2transport ipc command:
Router# debug mpls l2transport ipc AToM ipc debugging is on *May 27 23:56:04.699 UTC: *May 27 23:56:04.699 UTC: 255 *May 27 23:56:04.699 UTC: interface *May 27 23:56:04.699 UTC: slot 255 *May 27 23:56:04.699 UTC: all linecards *May 27 23:56:04.699 UTC: 255 *May 27 23:56:04.699 UTC: interface *May 27 23:56:04.699 UTC: 255
AToM SMGR: Repopulating line card 255 AToM SMGR [17.17.17.17, 1101]: Sending Imposition update to slot AToM SMGR [17.17.17.17, 1101]: Imposition being done on ingress AToM SMGR [17.17.17.17, 1101]: Sending disposition update to AToM SMGR [17.17.17.17, 1101]: Distributing disposition info to AToM SMGR [17.17.17.17, 701]: Sending Imposition update to slot AToM SMGR [17.17.17.17, 701]: Imposition being done on ingress AToM SMGR [17.17.17.17, 701]: Sending disposition update to slot
DB-1717
*May 27 23:56:04.699 all linecards *May 27 23:56:04.699 255 *May 27 23:56:04.699 interface *May 27 23:56:04.699 slot 255 *May 27 23:56:04.699 all linecards
UTC: AToM SMGR [17.17.17.17, 701]: Distributing disposition info to UTC: AToM SMGR [17.17.17.17, 1201]: Sending Imposition update to slot UTC: AToM SMGR [17.17.17.17, 1201]: Imposition being done on ingress UTC: AToM SMGR [17.17.17.17, 1201]: Sending disposition update to UTC: AToM SMGR [17.17.17.17, 1201]: Distributing disposition info to
DB-1718
December 2010
Syntax Description
data
Displays (in hex) the AToM switched packets for imposition and disposition. This can help validate that packets are flowing between the customer edge (CE) routers. Also, you can display the packets to check the format of the data or the data itself. Displays AToM switching errors, such as the reason that packets cannot be switched. This can help identify why data is not being transported.
error
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command sparingly because the command output can be overwhelming. For platforms that support distributed switching, the command displays output only for packets switched by the central route processor module. Packets switched autonomously by the linecards are not displayed. For example, packets switched by Versatile Interface Processors (VIPs) on the Cisco 7500 router are not displayed.
Examples
The following is sample output from the debug mpls l2transport packet commands for a PPP over MPLS configuration:
Router# debug mpls l2transport packet data AToM packet data debugging is on Router# debug mpls l2transport packet error AToM packet errors debugging is on Router# show debug
DB-1719
AToM: AToM packet data debugging is on AToM packet errors debugging is on *Mar 24 *Mar 24 are 0 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 are 0 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 are 0 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 are 0 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 are 0 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 *Mar 24 are 0 23:29:30.495: ATOM-PPP Switching: check features failed. 23:29:30.495: ATOM-PPP Switching (Fast) Imposition Packet data: experimental bits 23:29:30.495: 23:29:30.495: 23:29:30.495: 23:29:30.495: 23:29:30.495: 23:29:30.495: 23:29:30.495: 23:29:30.495: 23:29:30.495: 23:29:30.495: 23:29:30.499: 23:29:31.835: 23:29:31.835: 23:29:31.835: 23:29:49.423: 23:29:49.423: 23:29:49.423: 23:29:49.435: 23:29:49.435: 23:29:49.435: 23:29:49.435: 23:29:49.435: 23:29:49.435: 23:29:49.435: 23:29:49.435: 23:29:49.435: 23:29:49.435: 23:29:49.443: 23:29:49.443: 23:29:49.443: 23:29:49.447: 23:29:49.447: 23:29:49.447: 23:29:49.451: 23:29:49.451: 23:29:49.451: 23:29:49.451: 23:29:49.451: 23:29:49.455: 23:29:49.455: 23:29:49.455: 23:29:49.455: 23:29:49.455: 23:29:49.463: 23:29:49.463: 23:29:49.463: 23:29:49.463: 23:29:49.463: 23:29:49.471: 23:29:49.471: 0F 00 88 47 00 01 00 FD C0 01 01 01 66 51 88 B4 CE 73 23 30 00 04 3C 61 49 84 D8 33 17 8C 86 69 39 98 CD E2 DE 72 35 88 09 E7 F2 73 CC 06 DC 38 49 E5 31 00 A0 E8 28 21 E4 21 69 28 D8 60 A3 62 B1 60 ATOM-L2 Switching FF 03 00 FD C0 04 FF FF FB 14 B0 00 10 FF 00 01 C0 4B 41 73 39 00 00 40 83 C0 00 06 F2 60 00 11 02 49 B8 E9 0C 60 61 3A 6F 33 66 83 6D 14 88 06 A6 2D 26 8A A5 80 Disposition 8A 57 FF FF 51 F4 00 00 9E 9D 1A 09 E3 45 02 00 88 06 80 0D 4D C8 21 82 00 01 03 94 00 C6 C6 CA 80 02 00 00 02 CC 50 53 71 20 C3 B6 00 02 00 A7 08 A1 01 05 31 FC 00 CC 70 23 08 DC 4C 12 E4 39
Packet data: FF FF FF FF FF FF
ATOM-L2 Switching Disposition Packet data: FF 03 C0 21 01 11 00 0F 03 05 C2 23 05 05 06 5F 23 35 D4 ATOM-PPP Switching: check features failed. ATOM-PPP Switching (Fast) Imposition Packet data: experimental bits 0F 00 88 C0 21 01 E5 ATOM-PPP ATOM-PPP 47 00 01 10 FF 00 01 61 02 00 15 00 00 2F 00 0F 03 05 C2 23 05 05 06 5F CC 5F Switching: check features failed. Switching (Fast) Imposition Packet data: experimental bits
0F 00 88 47 00 01 10 FF 00 01 61 02 00 15 00 00 C0 21 02 11 00 0F 03 05 C2 23 05 05 06 5F 23 35 D4 ATOM-L2 Switching Disposition Packet data: FF 03 C0 21 02 2F 00 0F 03 05 C2 23 05 05 06 5F CC 5F E5 ATOM-L2 Switching Disposition Packet data: FF 03 C2 23 01 D0 00 1C 10 45 59 13 1A 92 FD 93 01 A2 CF B6 FB 3A 04 46 93 63 65 32 2D 67 73 72 ATOM-PPP Switching: check features failed. ATOM-PPP Switching (Fast) Imposition Packet data: experimental bits 0F 00 88 C2 23 01 B4 C0 73 ATOM-PPP ATOM-PPP 47 00 01 10 FF 00 01 61 02 00 22 00 00 F5 00 1C 10 F1 98 35 3F 79 F2 1A 15 10 D7 B1 9F 2A 63 65 31 2D 67 73 72 Switching: check features failed. Switching (Fast) Imposition Packet data: experimental bits
0F 00 88 47 00 01 10 FF 00 01 61 02 00 22 00 00 C2 23 02 D0 00 1C 10 56 4A 32 5B 99 55 D5 CF 44 FC D3 D9 3F CC 8C A8 63 65 31 2D 67 73 72 ATOM-L2 Switching Disposition Packet data: FF 03 C2 23 02 F5 00 1C 10 45 84 E4 E5 DD C0 5F FD 2F 37 63 9A 3D 03 7B B9 63 65 32 2D 67 73 72 ATOM-L2 Switching Disposition Packet data: FF 03 C2 23 03 D0 00 04 ATOM-PPP Switching: check features failed. ATOM-PPP Switching (Fast) Imposition Packet data: experimental bits
DB-1720
December 2010
0F 00 88 C2 23 03 ATOM-PPP ATOM-PPP
47 00 01 10 FF 00 01 61 02 00 0A 00 00 F5 00 04 Switching: check features failed. Switching (Fast) Imposition Packet data: experimental bits
DB-1721
Syntax Description
event message
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug mpls l2transport signaling command:
Router# debug mpls l2transport signaling event AToM LDP event debugging is on Router# debug mpls l2transport signaling message AToM LDP message debugging is on Router# show debugging AToM: AToM LDP event debugging is on AToM LDP message debugging is on *Mar 24 23:10:55.611: *Mar 24 23:10:55.611: *Mar 24 23:10:56.063: *Mar 24 23:10:56.583: state to up AToM LDP [9.9.9.9]: Allocate LDP instance AToM LDP [9.9.9.9]: Opening session, 1 clients %SYS-5-CONFIG_I: Configured from console by console %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial3/0, changed
DB-1722
December 2010
AToM LDP [9.9.9.9]: Session is up AToM LDP [9.9.9.9]: Peer address change, add 1.1.1.100 AToM LDP [9.9.9.9]: Peer address change, add 46.1.1.6 AToM LDP [9.9.9.9]: Peer address change, add 9.9.9.9 AToM LDP [9.9.9.9]: Peer address change, add 57.1.1.6 AToM LDP [9.9.9.9]: Sending label mapping msg id 50, group id 6, vc label 21, status 0, mtu 1500 AToM LDP [9.9.9.9]: Received label mapping msg, id 113 id 50, group id 6, vc label 21, status 0, mtu 1500
DB-1723
Syntax Description
Displays AToM event messages about the VCs. Displays debug information related to the finite state machine (FSM). Displays debug information related to the Label Distribution Protocol (LDP). Displays debug information related to the subscriber service switch (SSS). Displays debug information related to the status of the VCs.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.0(25)S. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. The command was updated to include the ldp, sss, and status keywords as part of the MPLS Pseudowire Status Signaling feature.
12.2(33)SRC
Usage Guidelines
You can issue this command from the line card or the route processor.
Examples
The following is sample output from the debug mpls l2transport vc commands:
Router# debug mpls l2transport vc event AToM vc event debugging is on Router# debug mpls l2transport vc fsm AToM vc fsm debugging is on
DB-1724
December 2010
Router# show debugging AToM: AToM vc event debugging is on AToM vc fsm debugging is on *Mar 24 23:17:24.371: AToM MGR [10.9.9.9, 50]: Event provision, state changed from idle to provisioned *Mar 24 23:17:24.371: AToM MGR [10.9.9.9, 50]: Provision vc *Mar 24 23:17:24.371: AToM SMGR [10.9.9.9, 50]: Requesting VC create, vc_handle 61A09930 *Mar 24 23:17:24.371: AToM MGR [10.9.9.9, 50]: Event local up, state changed from provisioned to local standby *Mar 24 23:17:24.371: AToM MGR [10.9.9.9, 50]: Update local vc label binding *Mar 24 23:17:24.371: AToM SMGR [10.9.9.9, 50]: sucessfully processed create request *Mar 24 23:17:24.875: %SYS-5-CONFIG_I: Configured from console by console *Mar 24 23:17:25.131: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial3/0, changed state to up *Mar 24 23:17:28.567: AToM MGR [10.9.9.9, 50]: Event ldp up, state changed from local standby to local ready *Mar 24 23:17:28.567: AToM MGR [10.9.9.9, 50]: Advertise local vc label binding *Mar 24 23:17:28.567: AToM MGR [10.9.9.9, 50]: Event remote up, state changed from local ready to establishing *Mar 24 23:17:28.567: AToM MGR [10.9.9.9, 50]: Remote end up *Mar 24 23:17:28.567: AToM MGR [10.9.9.9, 50]: Event remote validated, state changed from establishing to established *Mar 24 23:17:28.567: AToM MGR [10.9.9.9, 50]: Validate vc, activating data plane *Mar 24 23:17:28.567: AToM SMGR [10.9.9.9, 50]: Processing imposition update, vc_handle 61A09930, update_action 3, remote_vc_label 21 *Mar 24 23:17:28.567: AToM SMGR [10.9.9.9, 50]: Imposition Programmed, Output Interface: PO5/0 *Mar 24 23:17:28.567: AToM SMGR [10.9.9.9, 50]: Processing disposition update, vc_handle 61A09930, update_action 3, local_vc_label 22 *Mar 24 23:17:28.571: AToM SMGR: Processing TFIB event for 10.9.9.9 *Mar 24 23:17:28.571: AToM SMGR [10.9.9.9, 50]: Imposition Programmed, Output Interface: PO5/0
The following is sample output of MPLS Pseudowire Status Signaling messages from the debug mpls l2transport vc status event and debug mpls l2transport vc status fsm commands:
Router# debug mpls l2transport vc status event Router# debug mpls l2transport vc status fsm
*Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb
26 26 26 26 26 26 26 26 26 26 26 26 26 26 26
14:03:42.543: 14:03:42.543: 14:03:42.543: 14:03:42.543: 14:03:42.543: 14:03:42.543: 14:03:42.543: 14:03:42.543: 14:03:42.543: 14:03:42.543: 14:03:42.543: 14:03:42.543: 14:03:42.543: 14:03:42.543: 14:03:42.551:
AToM AToM AToM AToM AToM AToM AToM AToM AToM AToM AToM AToM AToM AToM AToM
MGR MGR MGR MGR MGR MGR MGR MGR MGR MGR MGR MGR MGR MGR MGR
[10.9.9.9, [10.9.9.9, [10.9.9.9, [10.9.9.9, [10.9.9.9, [10.9.9.9, [10.9.9.9, [10.9.9.9, [10.9.9.9, [10.9.9.9, [10.9.9.9, [10.9.9.9, [10.9.9.9, [10.9.9.9, [10.9.9.9,
100]: 100]: 100]: 100]: 100]: 100]: 100]: 100]: 100]: 100]: 100]: 100]: 100]: 100]: 100]:
Receive SSS STATUS(UP) AC status UP S:Evt local up, LndRru->LnuRru S:Evt local ready, LnuRru->LruRru S:Act send label(UP) Send label(UP) Local AC : UP Dataplane: no fault Overall : no fault Remote label is ready S:Evt remote ready in LruRru S:Evt remote up in LruRru S:Evt dataplane clear fault in LruRru S:Evt dataplane clear fault in LruRru S:Evt dataplane clear fault in LruRru
DB-1725
The status codes in the messages, such as S: and LruRru, indicate the staus of the local and remote routers. The following list translates the status codes: Llocal router Rremote router r or nready (r) or not ready (n) u or d up (u) or down (d) status The output also includes these values: DDataplane SLocal shutdown
DB-1726
December 2010
Syntax Description
bfd
(Optional) Displays event messages when Bidirectional Forwarding Detection (BFD) sessions are created, when BFD sends dataplane fault notifications to Layer 2 VPN (L2VPN), and when L2VPN sends the attachment circuit (AC) signaling status to BFD. Displays AToM event messages about the VCCV.
event
Command Modes
Command History
Release 15.0(1)S
Usage Guidelines
Use this command to enable AToM VCCV events and AToM VCCV BFD events debugging.
Examples
The following examples show how to enable MPLS L2transport VC VCCV and VCCV BFD event debugging:
Router# debug mpls l2transport vc vccv bfd event AToM VCCV BFD events debugging is on Router# debug mpls l2transport vc vccv event AToM VCCV events debugging is on Router# show debugging AToM VCCV BFD events debugging is on AToM VCCV events debugging is on
Related Commands
DB-1727
Syntax Description
(Optional) Limits the displayed advertisements to those for LDP peers permitted by the access control list (acl). (Optional) Limits the displayed advertisements to those for prefixes permitted by the access control list (acl).
Defaults
Displays information about advertisements to all LDP peers for all prefixes.
Command Modes
Privileged EXEC
Command History
Release 11.1CT 12.0(10)ST 12.0(14)ST 12.1(2)T 12.1(8a)E 12.2(2)T 12.2(4)T 12.2(8)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was modified to reflect MPLS IETF command syntax and terminology. This command was integrated into Cisco IOS Release 12.0(14)ST. This command was integrated into Cisco IOS Release 12.1(2)T. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(4)T. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-1728
December 2010
Usage Guidelines
Use this command to monitor the label and address advertisements to LDP peers. Use the peer-acl or prefix-acl options separately or together to limit the information display to specific LDP peers and/or specific prefixes.
Note
This command monitors advertisement of non-LC-ATM labels (generic labels) only. Use the debug mpls atm-ldp command to monitor LC-ATM activity.
Examples
The following shows sample output from the debug mpls ldp advertisements command:
Router# debug mpls ldp advertisements tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: tagcon: peer peer peer peer peer peer peer peer peer peer peer peer peer peer peer peer peer peer peer 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 144.0.0.44:0 (pp (pp (pp (pp (pp (pp (pp (pp (pp (pp (pp (pp (pp (pp (pp (pp (pp (pp (pp 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): 0x60E105BC): advertise advertise advertise advertise advertise advertise advertise advertise advertise advertise advertise advertise advertise advertise advertise advertise advertise advertise advertise 130.77.0.33 133.0.0.33 34.0.0.33 103.0.0.33 35.0.0.33 38.0.0.33 34.0.0.0/8, label 3 (#2) 203.0.7.7/32, label 24 (#4) 35.0.0.0/8, label 3 (#8) 103.0.0.0/8, label 3 (#10) 138.1.0.0/16, label 26 (#14) 155.0.0.55/32, label 27 (#16) 38.0.0.0/8, label 3 (#18) 212.10.1.0/24, label 30 (#24) 59.0.0.0/8, label 32 (#28) 144.0.0.44/32, label 33 (#30) 106.0.0.0/8, label 34 (#32) 133.0.0.33/32, label 3 (#34) 45.0.0.0/8, label 39 (#36)
Description Identifies the source of the message as the label control subsystem. LDP identifier of the peer to which the advertisement was targeted. Identifier for the data structure used to represent the peer at the label distribution level. Useful for correlating debug output. Identifies what was advertised to the peereither an interface address (a.b.c.d) or label binding (a.b.c.d/m, label t (#n)). For a label binding advertisement, the sequence number of the label information base (LIB) modification that made it necessary to advertise the label.
DB-1729
Related Commands
Command debug mpls ldp bindings show mpls ip binding show mpls ldp neighbor
Description Displays information about changes to the LIB used to keep track of label bindings learned from LDP peers through LDP downstream label distribution. Displays specified information about label bindings learned by LDP. Displays the status of LDP sessions.
DB-1730
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(2)T. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to monitor backoff parameters configured for LDP sessions.
Examples
The following shows sample output from the debug mpls ldp backoff command:
Router# debug mpls ldp backoff LDP session establishment backoff debugging is on Router# Jan Jan Jan Jan Jan Jan Jan Jan 6 6 6 6 6 6 6 6 22:31:13.012: 22:31:13.824: 22:31:17.848: 22:31:18.220: 22:31:21.908: 22:31:22.980: 22:31:25.724: 22:31:26.944: ldp: ldp: ldp: ldp: ldp: ldp: ldp: ldp: Backoff Backoff Backoff Backoff Backoff Backoff Backoff Backoff peer peer peer peer peer peer peer peer ok: ok: ok: ok: ok: ok: ok: ok: 12.12.12.12:0; 12.12.12.12:1; 12.12.12.12:0; 12.12.12.12:1; 12.12.12.12:0; 12.12.12.12:1; 12.12.12.12:0; 12.12.12.12:1; backing backing backing backing backing backing backing backing off; off; off; off; off; off; off; off; threshold/count threshold/count threshold/count threshold/count threshold/count threshold/count threshold/count threshold/count 8/6 8/6 8/6 8/6 8/6 8/6 8/7 8/7
DB-1731
6 6 6 6 6 6
Backoff peer ok: 12.12.12.12:0; backing off; Backoff peer ok: 12.12.12.12:1; backing off; Backoff peer ok: 12.12.12.12:0; backing off; Backoff peer ok: 12.12.12.12:1; backing off; Update backoff rec: 12.12.12.12:0, threshold Update backoff rec: 12.12.12.12:1, threshold
Field ldp Backoff peer ok: a.b.c.d:n backing off; threshold/count x/y
Description Identifies the Label Distribution Protocol. Identifies the LDP peer for which a session is being delayed because of a failure to establish a session due to incompatible configuration. Indicates that a session setup attempt failed and the LSR is delaying its next attempt (that is, is backing off). Identifies a set threshold (x) and a count (y) that represents the time that has passed since the last attempt to set up a session with the peer. The count is incremented every 15 seconds until it reaches the threshold. When the count equals the threshold, a fresh attempt is made to set up an LDP session with the peer. Indicates that the backoff period is over and that it is time for another attempt to set up an LDP session. Indicates the backoff time of x*15 seconds, for the next LDP session attempt with the peer. Indicates unsuccessful attempts to set up an LDP session with two different LDP peers. In this example, attempts to set up sessions with LDP peers 12.12.12.12:0 and 12.12.12.12:1 are failing.
Related Commands
Description Configures session setup delay parameters for the LDP backoff mechanism.
show mpls ldp backoff Displays information about the configured session setup backoff parameters and any potential LDP peers with which session setup attempts are being throttled.
DB-1732
December 2010
Syntax Description
(Optional) Display information about LDP local label allocation filtering. (Optional) Limits the displayed binding information to that learned from LDP peers permitted by the access control list (acl). (Optional) Limits the displayed binding information to that learned for prefixes permitted by the access control list (acl).
Command Default
Displays information about all bindings learned from all LDP peers.
Command Modes
Command History
Release 11.1CT 12.0(10)ST 12.0(14)ST 12.1(2)T 12.1(8a)E 12.2(2)T 12.2(4)T 12.2(8)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was modified to correspond to MPLS Internet Engineering Task Force (IETF) command syntax and terminology. This command was integrated into Cisco IOS Release 12.0(14)ST. This command was integrated into Cisco IOS Release 12.1(2)T. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(4)T. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-1733
Modification The filter keyword was added and the output of the command was updated to display information about LDP local label allocation filtering. This command was integrated into Cisco IOS Release 12.2(33)SB.
Usage Guidelines
Use this command to monitor label bindings and label switch router (LSR) addresses learned from LDP peers.
Note
This command monitors non-LC-ATM labels (generic labels) only. Use the debug mpls atm-ldp states command to monitor LC-ATM activity.
Examples
The following is sample output from the debug mpls ldp bindings command:
Router# debug mpls ldp bindings tagcon:tibent(10.34.0.0/8):created; find route tags request tagcon:tibent(10.34.0.0/8):label 3 (#2) assigned tagcon:tibent(10.0.7.7/32):created; find route tags request tagcon:tibent(10.0.7.7/32):label 24 (#4) assigned tagcon:tibent(10.0.0.44/32):created; find route tags request tagcon:tibent(10.0.0.44/32):label 33 (#30) assigned tagcon:tibent(10.106.0.0/8):created; find route tags request tagcon:tibent(10.106.0.0/8):label 34 (#32) assigned tagcon:tibent(10.0.0.33/32):created; find route tags request tagcon:tibent(10.0.0.33/32):label 3 (#34) assigned tagcon:tibent(10.45.0.0/8):created; find route tags request tagcon:tibent(10.45.0.0/8):label 39 (#36) assigned tagcon:Assign peer id; 10.0.0.44:0:id 0 tagcon:10.0.0.44:0:10.0.0.44 added to addr<->ldp ident map tagcon:10.0.0.44:0:10.34.0.44 added to addr<->ldp ident map tagcon:10.0.0.44:0:10.45.0.44 added to addr<->ldp ident map tagcon:tibent(10.0.0.44/32):rem label 3 from 10.0.0.44:0 added tagcon:tibent(10.34.0.0/8):label 3 from 10.0.0.44:0 added tagcon:tibent(10.45.0.0/8):label 3 from 10.0.0.44:0 added tagcon:tibent(10.107.0.0/8):created; remote label learned tagcon:tibent(10.107.0.0/8):label 55 from 10.0.0.44:0 added tagcon:tibent(10.0.7.7/32):label 209 from 10.0.0.44:0 added tagcon:tibent(10.0.0.33/32):label 207 from 10.0.0.44:0 added
Description Identifies the source of the message as the label control subsystem. Destination that has a label binding change. An LIB entry has been created for the specified destination for the indicated reason. Describes a change to the label bindings for the specified destination. The change is for a label binding learned from the specified LDP peer.
DB-1734
December 2010
Table 222
Description Describes a change to a locally assigned (incoming) label for the specified destination. Sequence number of the modification to the LIB corresponding to the local label change.
a.b.c.d:n: e.f.g.h added The address e.f.g.h has been added to the set of addresses associated with to addr<->ldp ident map LDP identifier a.b.c.d:n. The following is output from the debug mpls ldp bindings command when LDP local label allocation filtering is configured:
Router# debug mpls ldp %SYS-5-CONFIG_I: Configured from console by console Router# debug mpls ldp bindings filter LDP Local Label Filtering changes debugging is on Router# configure terminal Enter configuration commands, one per line. Router(config)# mpls ldp label Router(config-ldp-lbl)# allocate global host-routes Router(config-ldp-lbl)# LDP LLAF: Enqueued work item to walk tib for all tables LDP LLAF: Withdraw local label for 10.10.7.0 LDP LLAF: Withdraw local label for 10.10.8.0 LDP LLAF: Withdraw local label for 10.10.9.0 Router(config-ldp-lbl)# LDP LLAF: announce zero local and path labels: 10.10.7.0 LDP LLAF: announce zero local and path labels: 10.10.8.0 LDP LLAF: announce zero local and path labels: 10.10.9.0 Router(config-ldp-lbl)# Router(config-ldp-lbl)# no allocate global host-routes Router(config-ldp-lbl)# LDP LLAF: Enqueued work item to walk tib for all tables tib: get path labels: 10.1.1.1/32, tableid: 0, Et1/0, nh 10.10.7.2 LDP LLAF: 10.1.1.1 accepted, absence of filtering config tagcon: announce labels for: 10.1.1.1/32; nh 10.10.7.2, Et1/0, inlabel 17, outlabel imp-null (from 10.1.1.1:0), get path labels tib: get path labels: 10.2.2.2/32, tableid: 0, Et2/0, nh 10.10.8.2 LDP LLAF: 10.2.2.2 accepted, absence of filtering config tagcon: announce labels for: 10.2.2.2/32; nh 10.10.8.2, Et2/0, inlabel 16, outlabel imp-null (from 10.2.2.2:0), get path labels tib: get path labels: 10.10.7.0/24, tableid: 0, Et1/0, nh 0.0.0.0 LDP LLAF: 10.10.7.0 accepted, absence of filtering config tagcon: tibent(10.10.7.0/24): label 1 (#20) assigned tagcon: announce labels for: 10.10.7.0/24; nh 0.0.0.0, Et1/0, inlabel imp-null, outlabel unknown (from 0.0.0.0:0), get path labels tib: get path labels: 10.10.8.0/24, tableid: 0, Et2/0, nh 0.0.0.0 LDP LLAF: 10.10.8.0 accepted, absence of filtering config tagcon: tibent(10.10.8.0/24): label 1 (#21) assigned End with CNTL/Z.
DB-1735
tagcon: announce labels for: 10.10.8.0/24; nh 0.0.0.0, Et2/0, inlabel imp-null, outlabel unknown (from 0.0.0.0:0), get path labels tib: get path labels: 10.10.9.0/24, tableid: 0, Et1/0, nh 10.10.7.2 LDP LLAF: 10.10.9.0 accepted, absence of filtering config tagcon: tibent(10.10.9.0/24): label 22 (#22) assigned tagcon: announce labels for: 10.10.9.0/24; nh 10.10.7.2, Et1/0, inlabel 22, outlabel imp-null (from 10.1.1.1:0), get path labels . . . Router(config-ldp-lbl)# no mpls ldp label Router(config-ldp-lbl)# end Router# no debug mpls ldp bindings filter
Description Indicates that the messages apply to LDP local label allocation filtering.
Withdraw local label for Prefix 10.10.7.0 is not in the global routing table. LDP withdraws the label 10.10.7.0 and does not assign a local labels. announce zero local and LDP does not announce local and path label for prefix 10.10.7.0. path labels: 10.10.7.0 tagcon: announce labels The label control subsystem announces the next hop (nh) and labels for the for: named prefix. tib: get path labels: LDP LLAF: 10.1.1.1 accepted; tibent(network/mask) LDP LIB searches for the routing and forwarding path for the named prefix. LDP accepts the prefix. The prefix was found in the global table (or accepted by the prefix list, if a prefix list was named as a filter). Destination that has a label binding change.
Related Commands
Description Displays information about label virtual circuit (lvc) state transitions as they occur. Displays the contents of the LIB.
DB-1736
December 2010
Effective with Cisco IOS Release 12.2(33)SRA, the debug mpls ldp checkpoint command is replaced by the debug mpls vpn ha command. See the debug mpls vpn ha command for more information. To enable the display of Multiprotocol Label Switching (MPLS) Label Distribution Protocol (LDP) checkpoint debugging information, use the debug mpls ldp checkpoint command in privileged EXEC mode. To disable the display of MPLS LDP checkpoint debugging information, use the no form of this command. debug mpls ldp checkpoint no debug mpls ldp checkpoint
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was replaced by the debug mpls vpn ha command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The following examples show sample output from the debug mpls ldp checkpoint command:
Sample Output on the Active Route Processor or PRE
Router# debug mpls ldp checkpoint LDP Checkpointing events and errors debugging LDP-CF: 0:3.3.3.3/32,20:: checkpointing local LDP-CF: 0:3.3.3.3/32,20:: changing checkpoint LDP-CF: 0:3.3.3.3/32,20:: changing checkpoint LDP-CF: received CF send-ack LDP-CF: 0:3.3.3.3/32,20:: changing checkpoint is on binding state from none to add-send state from add-send to add-wait state from add-wait to added
DB-1737
Table 224 describes the significant fields in the sample display shown above.
Table 224 debug mpls ldp checkpoint Command Field Descriptions
Field 0:3.3.3.3/32,20::
Description The table ID, prefix, prefix length, and label of the checkpointed label binding.
Related Commands
Description Displays information about the LDP checkpoint system on the active route processor.
DB-1738
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(14)T. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command shows events and errors related to LDP Graceful Restart.
Examples
The following example shows sample output from the debug mpls ldp graceful-restart command. The output shows that a session was lost. The status message show the events that happen during recovery of the bindings.
Router# debug mpls ldp graceful-restart LDP LDP LDP LDP LDP LDP LDP GR: GR: GR: GR: GR: GR: GR: GR session 10.110.0.10:0:: lost down nbr 10.110.0.10:0:: created [1 total] GR session 10.110.0.10:0:: bindings retained down nbr 10.110.0.10:0:: added all 7 addresses [7 total] down nbr 10.110.0.10:0:: state change (None -> Reconnect-Wait) down nbr 10.110.0.10:0:: reconnect timer started [120000 msecs] down nbr 10.110.0.10:0:: added to bindings task queue [1 entries]
DB-1739
LDP GR: searching for down nbr record (10.110.0.10:0, 10.2.0.10) LDP GR: search for down nbr record (10.110.0.10:0, 10.2.0.10) returned 10.110.0.10:0 LDP GR: Added FT Sess TLV (Rconn 120000, Rcov 120000) to INIT msg to 10.110.0.10:0 LDP GR: Tagcon querying for up to 12 bindings update tasks LDP GR: down nbr 10.110.0.10:0:: requesting bindings MARK for {10.110.0.10:0, 1} LDP GR: down nbr 10.110.0.10:0:: removed from bindings task queue [0 entries] LDP GR: Requesting 1 bindings update tasks [0 left in queue] LDP GR: 2.0.0.0/8:: updating binding from 10.110.0.10:0, inst 1:: marking stale; LDP GR: 10.2.0.0/16:: updating binding from 10.110.0.10:0, inst 1:: marking stale; LDP GR: 14.0.0.14/32:: updating binding from 10.110.0.10:0, inst 1:: marking stale; LDP GR: searching for down nbr record (10.110.0.10:0, 10.2.0.10) LDP GR: search for down nbr record (10.110.0.10:0, 10.2.0.10) returned 10.110.0.10:0 LDP GR: Added FT Sess TLV (Rconn 120000, Rcov 120000) to INIT msg to 10.110.0.10:0 LDP GR: searching for down nbr record (10.110.0.10:0, 10.2.0.10) LDP GR: search for down nbr record (10.110.0.10:0, 10.2.0.10) returned 10.110.0.10:0 LDP GR: Added FT Sess TLV (Rconn 120000, Rcov 120000) to INIT msg to 10.110.0.10:0 LDP GR: searching for down nbr record (10.110.0.10:0, 10.2.0.10) LDP GR: search for down nbr record (10.110.0.10:0, 10.2.0.10) returned 10.110.0.10:0 LDP GR: Added FT Sess TLV (Rconn 120000, Rcov 120000) to INIT msg to 10.110.0.10:0 LDP GR: searching for down nbr record (10.110.0.10:0, 10.2.0.10) LDP GR: search for down nbr record (10.110.0.10:0, 10.2.0.10) returned 10.110.0.10:0 LDP GR: Added FT Sess TLV (Rconn 120000, Rcov 120000) to INIT msg to 10.110.0.10:0 LDP GR: searching for down nbr record (10.110.0.10:0, 10.2.0.10) LDP GR: search for down nbr record (10.110.0.10:0, 10.2.0.10) returned 10.110.0.10:0 LDP GR: Added FT Sess TLV (Rconn 120000, Rcov 120000) to INIT msg to 10.110.0.10:0 LDP GR: Received FT Sess TLV from 10.110.0.10:0 (fl 0x1, rs 0x0, rconn 120000, rcov 120000) LDP GR: GR session 10.110.0.10:0:: allocated instance, 2 LDP GR: GR session 10.110.0.10:0:: established LDP GR: GR session 10.110.0.10:0:: found down nbr 10.110.0.10:0 LDP GR: down nbr 10.110.0.10:0:: reconnect timer stopped LDP GR: down nbr 10.110.0.10:0:: state change (Reconnect-Wait -> Recovering) LDP GR: down nbr 10.110.0.10:0:: recovery timer started [120000 msecs] %LDP-5-GR: GR session 10.110.0.10:0 (inst. 2): starting graceful recovery %LDP-5-NBRCHG: LDP Neighbor 10.110.0.10:0 is UP LDP GR: 2.0.0.0//8:: refreshing stale binding from 10.110.0.10:0, inst 1 -> inst 2 LDP GR: 10.43.0.0//16:: refreshing stale binding from 10.110.0.10:0, inst 1 -> inst 2 LDP GR: down nbr 10.110.0.10:0:: recovery timer expired %LDP-5-GR: GR session 10.110.0.10:0 (inst. 2): completed graceful recovery LDP GR: down nbr 10.110.0.10:0:: destroying record [0 left] LDP GR: down nbr 10.110.0.10:0:: state change (Recovering -> Delete-Wait) LDP GR: down nbr 10.110.0.10:0:: added to bindings task queue [1 entries] LDP GR: Tagcon querying for up to 12 bindings update tasks LDP GR: down nbr 10.110.0.10:0:: requesting bindings DEL for {10.110.0.10:0, 1} LDP GR: down nbr 10.110.0.10:0:: removed from bindings task queue [0 entries] LDP GR: Requesting 1 bindings update tasks [0 left in queue] LDP GR: GR session 10.110.0.10:0:: released instance, 1
LDP GR: GR session 10.110.0.10:0:: found down nbr 10.110.0.10:0 down nbr 10.110.0.10:0:: removed from bindings task queue [0 entries] LDP GR: 2.0.0.0/8:: updating binding from 10.110.0.10:0, inst 1:: marking stale;
DB-1740
December 2010
Table 225 describes the fields for the debug command output.
:
Table 225
Field LDP GR GR session 10.110.0.10:0 found down nbr 10.110.0.10:0 down nbr 10.110.0.10:0:: removed from bindings task queue [0 entries] 2.0.0.0/8::
Description Identifies LDP Graceful Restart application ID of the LDP session that is enabled for Graceful Restart. Describes the event that is happening to that LDP session. Identifies the Down Neighbor record, which logs the state of a recently lost Graceful Restart session. Describes the event that is happening to the recently lost Graceful Restart session. Identifies the Forwarding Equivalence Class (FEC) associated with the remote label binding being modified. The FEC identifies the Label Information Base (LIB) entry. Lists the operation being performed on the remote label binding. Identifies the LDP session during which the remote label binding was learned.
Related Commands
DB-1741
Syntax Description
(Optional) Enables the display of LDP-IGP Synchronization events for the specified interface. (Optional) Enables the display of LDP-IGP Synchronization events for the specified peer access control list (ACL).
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(14)T. The command output was modified to display events related to the delay timer on interfaces running Open Shortest Path First (OSPF) processes, if the delay timer is configured. The command output was modified to display events related to synchronization on interfaces running Intermediate System-to-Intermediate System (IS-IS) processes. This command was integrated into Cisco IOS Release 12.4(12). This command was integrated into Cisco IOS Release 12.2(33)SB.
12.0(32)SY
12.4(12) 12.2(33)SB
Examples
The following example shows events related to MPLS LDP-IGP Synchronization on interfaces running OSPF:
Router# debug mpls ldp igp sync LDP-SYNC: infinite) LDP-SYNC: LDP-SYNC: Et0/0, OSPF 1: notify status (required, not achieved, no delay, holddown internal status (achieved, timer running) E1/0, 10.0.0.1: Adj being deleted, sync_achieved goes down E1/0, OSPF 1: notify status (required, not achieved, delay, holddown infinite)
LDP-SYNC: Et0/0: Session already up and interface address advertised, sync_achieved comes up. LDP-SYNC: Et0/0, OSPF 1: notify status (required, achieved, no delay, holddown infinite)
The following example shows events associated when an IS-IS instance, ISIS-1, is configured for Synchronization:
Router# debug mpls ldp igp sync
DB-1742
December 2010
07:59:27: LDP-SYNC: Et0/0, OSPF 1: notify status (required, not achieved, no delay, holddown infinite) internal status (achieved, timer running) 07:59:27: LDP-SYNC: Enqueue request req_type 0 IGP ISIS ISIS-1 interface none. 07:59:27: LDP-SYNC: ISIS ISIS-1: SYNC enabled, added to global tree, informed IGP. 07:59:27: LDP-SYNC: Enqueue request req_type 3 IGP ISIS ISIS-1 interface Et0/0. 07:59:27: LDP-SYNC: Enqueue request req_type 3 IGP ISIS ISIS-1 interface Et0/0. 07:59:27: LDP-SYNC: Et0/0, ISIS ISIS-1: Added to per-interface IGP list. 07:59:27: LDP-SYNC: Et0/0: Enabled for SYNC by IGP 07:59:27: LDP-SYNC: Et0/0, ISIS ISIS-1: notify status (required, not achieved, delay, holddown infinite) 07:59:27: LDP-SYNC: Et0/0, ISIS ISIS-1: Ignore IGP enable-interface request: already enabled.
Description The first line of the output for an interface shows the status of the MPLS LDP-IGP Synchronization in relation to the status of the interface. The notify status shows the following MPLS LDP-IGP Synchronization information for each interface:
If LDP-IGP Synchronization is required. If LDP-IGP Synchronization has been achieved. If the IGP should wait for LDP Synchronization to be achieved. The length of time the IGP should wait for the LDP Synchronization to be achieved.
internal status
The internal status displays LDP internal synchronization status and the state of the timer. The internal status can be achieved or not achieved. The timer state can be running or not running.
The following example shows events associated with MPLS LDP-IGP Synchronization on interfaces running OSPF when you have configured a delay timer:
Router# debug mpls ldp igp sync *Jan 3 04:38:49.571: LDP-SYNC: Et0/0, OSPF 1: notify status (required, not achieved, no delay, holddown infinite) internal status (achieved, timer running) ! *Jan 3 04:38:49.571: LDP-SYNC: Et0/0, OSPF 1: Sync disabled by IGP. Stop delay timer *Jan 3 04:38:49.571: LDP-SYNC: Et0/0, OSPF 1: TAGSW subblock destroyed. Stop delay timer *Jan 3 04:38:49.571: LDP-SYNC: Et0/0, OSPF 1: Sync down. Stop delay timer *Jan 3 04:38:49.571: LDP-SYNC: Et0/0, OSPF 1: Delay notifying IGP of sync achieved for 60 seconds *Jan 3 04:38:49.571: LDP-SYNC: Et0/0, OSPF 1: Delay timer expired, notify IGP of sync achieved *Jan 3 04:38:49.571: LDP-SYNC: Et0/0, OSPF 1: Delay timer expired but sync is no longer required won't notify IGP of sync achieved *Jan 3 04:38:49.571: LDP-SYNC: Et0/0, OSPF 1: Delay timer expired but sync is down won't notify IGP of sync achieved
DB-1743
Related Commands
Description Enables LDP-IGP Synchronization on all interfaces that belong to an OSPF process or IS-IS process. Displays information about interfaces configured for LDP-IGP Synchronization.
DB-1744
December 2010
Syntax Description
Displays LDP messages sent to LDP peers permitted by the access control list (acl). Displays LDP messages received from LDP peers permitted by the access control list (acl). (Optional) Displays all LDP messages sent to and received from LDP peers (including periodic KeepAlive messages) permitted by the access control list (acl). (Optional) Limits the messages displayed for LDP peers in accordance with the access control list (acl).
peer-acl acl
Defaults
All messages sent (for sent keyword) or received (for received keyword) are displayed except for periodic KeepAlive messages.
Command Modes
Privileged EXEC
Command History
Release 11.1CT 12.0(10)ST 12.0(14)ST 12.1(2)T 12.1(8a)E 12.2(2)T 12.2(4)T 12.2(8)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S
Modification This command was introduced. This command was modified to reflect MPLS IETF command syntax and terminology. This command was integrated into Cisco IOS Release 12.0(14)ST. This command was integrated into Cisco IOS Release 12.1(2)T. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(4)T. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S.
DB-1745
Modification This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
LDP requires periodic transmission of KeepAlive messages. If you do not specify the all option, periodic KeepAlive messages are not displayed.
Examples
The following shows sample output from the debug mpls ldp messages received command:
Router# debug mpls ldp messages received Router# debug mpls ldp messages sent ldp: ldp: ldp: ldp: ldp: ldp: ldp: ldp: ldp: ldp: ldp: ldp: ldp: ldp: ldp: ldp: ldp: Rcvd Sent Sent Rcvd Sent Sent Sent Sent Rcvd Rcvd Rcvd Rcvd Rcvd Rcvd Rcvd Rcvd Rcvd init msg from 144.0.0.44 (pp 0x0) init msg to 144.0.0.44:0 (pp 0x0) keepalive msg to 144.0.0.44:0 (pp 0x0) keepalive msg from 144.0.0.44:0 (pp 0x0) address msg to 144.0.0.44:0 (pp 0x610F00E0) label mapping msg to 144.0.0.44:0 (pp 0x610F00E0) label mapping msg to 144.0.0.44:0 (pp 0x610F00E0) label mapping msg to 144.0.0.44:0 (pp 0x610F00E0) address msg from 144.0.0.44:0 (pp 0x610F00E0) label mapping msg from 144.0.0.44:0 (pp 0x610F00E0) label mapping msg from 144.0.0.44:0 (pp 0x610F00E0) label mapping msg from 144.0.0.44:0 (pp 0x610F00E0) label mapping msg from 144.0.0.44:0 (pp 0x610F00E0) label mapping msg from 144.0.0.44:0 (pp 0x610F00E0) label mapping msg from 144.0.0.44:0 (pp 0x610F00E0) label mapping msg from 144.0.0.44:0 (pp 0x610F00E0) label mapping msg from 144.0.0.44:0 (pp 0x610F00E0)
Field ldp: Rcvd xxx msg Sent xxx msg from a.b.c.d from a.b.c.d:e to a.b.c.d:e (pp 0xnnnnnnnn)
Description Identifies the source of the displayed information as LDP. Type of message received or sent. Host that sent the message. Used in the early stages of the opening of an LDP session, when the LDP identifier is not yet known. LDP identifier of the peer that sent the message or to which the message was sent. Identifies the data structure used to represent the peer at the label distribution level. Useful for correlating debug output.
DB-1746
December 2010
Related Commands
Command
Description
debug mpls ldp session Displays the contents of LDP messages sent to and received from LDP peers. io
DB-1747
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Release 11.1CT 12.0(10)ST 12.0(14)ST 12.1(2)T 12.1(8a)E 12.2(2)T 12.2(4)T 12.2(8)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was modified to reflect MPLS IETF command syntax and terminology. This command was integrated into Cisco IOS Release 12.0(14)ST. This command was integrated into Cisco IOS Release 12.1(2)T. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(4)T. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
A low-level state machine that deals with session establishment and shutdown A high-level state machine that deals with setting up and shutting down label advertisement
DB-1748
December 2010
Use the debug mpls ldp session state-machine command to monitor the lower-level session state machine. Use the debug mpls ldp peer state-machine command to monitor the higher-level session state machine.
Examples
The following shows sample output from the debug mpls ldp peer state-machine command:
Router# debug mpls ldp peer state-machine tagcon: start session TCP timers for 144.0.0.44:0 (pp 0x610EEC84) tagcon: Enqueue peer up work for 144.0.0.44:0 (pp 0x610EEC84) tagcon: peer 144.0.0.44:0 (pp 0x610EEC84): Event unsol open unsol op pdg -> estab tagcon: Send initial advertisements to peer 144.0.0.44:0 tagcon: Initial address advertisement to peer 144.0.0.44:0 tagcon: Initial label advertisement to peer 144.0.0.44:0 ... tagcon: peer 144.0.0.44:0 (pp 0x610EEC84): Event down estab -> destroyed tagcon: peer 144.0.0.44:0 (pp 0x610EEC84): Event cleanup done destroyed -> non-ex
Description Identifies the source of the message as the label control subsystem. LDP identifier of the peer for the session with the state change. Address of the data structure used to represent the peer at the label distribution level. This address is useful for correlating debug output. Event causing the state change. State of the LDP session has changed from state s1 to state s2.
Related Commands
Command
Description
debug mpls ldp session Displays information about LDP messages sent to or received from LDP io peers. show mpls ldp neighbor Displays the status of LDP sessions.
DB-1749
Syntax Description
(Optional) Limits the displayed binding information to that allocated for prefixes permitted by a prefix access control list (ACL). (Optional) Limits the displayed binding withdraw information to those Label Distribution Protocol (LDP) peers permitted by a peer ACL.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to monitor LDP information when a local label binding associated with a prefix is withdrawn and freed. LDP withdraws a previously advertised label before advertising a new label. If you enter the debug mpls ldp prev-label command without an optional keyword and argument, the command displays output for all previous label binding changes. Use the prefix-acl acl or peer-acl acl keywords and arguments to limit the output to prefixes defined by the respective ACLs.
Examples
The following is sample output from the debug mpls ldp prev-label command:
Router# debug mpls ldp prev-label tagcon: tagcon: tagcon: tagcon: tagcon: Changing state to WITHDRAWN for prefix=10.0.1.1, label31 Creating prev_lbl_info for prefix=10.0.1.1, label31 noroute hold timer expired for 10.0.1.1/255.255.255.255, tag withdrawn, seqno 47 tibent(10.0.1.1/32): label 32 from 10.0.0.2:0 removed Deleting prev label info for prefix = 10.0.1.1, tag = 31
DB-1750
December 2010
Description Identifies the source of the message as the label control subsystem. Describes the label binding change; in this case, the label is to be withdrawn. The prefix (10.0.1.1) from which the local label binding is to be withdrawn and freed. The local label binding (31) that is to be withdrawn from the prefix. The hostname, network, and mask for the destination that has a label binding change.
Related Commands
Description Displays information about addresses and label bindings learned from LDP peers by means of LDP downstream unsolicited label distribution.
DB-1751
Syntax Description
(Optional) Includes the contents of periodic KeepAlive messages in the displayed message output to LDP peers. (Optional) Limits the displayed message output to those LDP peers permitted by the access control list (acl).
Defaults
Displays the contents of LDP messages sent and received except for periodic KeepAlive messages.
Command Modes
Privileged EXEC
Command History
Release 11.1CT 12.0(10)ST 12.0(14)ST 12.1(2)T 12.1(8a)E 12.2(2)T 12.2(4)T 12.2(8)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was modified to reflect MPLS IETF command syntax and terminology. This command was integrated into Cisco IOS Release 12.0(14)ST. This command was integrated into Cisco IOS Release 12.1(2)T. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(4)T. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Displays the contents of all messages sent and received except for periodic KeepAlive messages.
DB-1752
December 2010
Examples
The following shows sample output from the debug mpls ldp session io command:
Router# debug mpls ldp session io all ldp: Rcvd init msg from 144.0.0.44 (pp 0x0) ldp: LDP init msg: PDU hdr: LDP Id: 144.0.0.44:0; Msg Contents: 0x00 0x01 0x00 0x20 0x90 0x00 0x00 0x2C 0x00 0x00 0x02 0x00 0x00 0x16 0x00 0x10 0x21 0x05 0x00 0x00 0x0E 0x00 0x01 0x00 0xB4 0x00 0x00 0x00 0x00 0x85 0x00 0x21 0x00 0x00 ldp: Sent init msg to 144.0.0.44:0 (pp 0x0) ldp: LDP init msg: PDU hdr: LDP Id: 133.0.0.33:0; Msg Contents: 0x00 0x01 0x00 0x20 0x85 0x00 0x00 0x21 0x00 0x00 0x02 0x00 0x00 0x16 0x00 0x06 0x32 0x05 0x00 0x00 0x0E 0x00 0x01 0x00 0xB4 0x00 0x00 0x00 0x00 0x90 0x00 0x2C 0x00 0x00 ldp: Sent keepalive msg to 144.0.0.44:0 (pp 0x0) ldp: LDP keepalive msg: PDU hdr: LDP Id: 133.0.0.33:0; Msg Contents: 0x00 0x01 0x00 0x0E 0x85 0x00 0x00 0x21 0x00 0x00 0x02 0x01 0x00 0x04 0x00 0x06 0x33 ldp: Rcvd keepalive msg from 144.0.0.44:0 (pp 0x0) ldp: LDP keepalive msg: PDU hdr: LDP Id: 144.0.0.44:0; Msg Contents: 0x00 0x01 0x00 0x0E 0x90 0x00 0x00 0x2C 0x00 0x00 0x02 0x01 0x00 0x04 0x00 0x10 0x22 ldp: Sent address msg to 144.0.0.44:0 (pp 0x610ECDD0) ldp: LDP address msg: PDU hdr: LDP Id: 133.0.0.33:0; Msg Contents: 0x00 0x01 0x00 0x34 0x85 0x00 0x00 0x21 0x00 0x00 0x03 0x00 0x00 0x2A 0x00 0x06 0x34 0x01 0x01 0x00 0x22 0x00 0x01 0x02 0x00 0x00 0xA3 0x82 0x42 0x00 0x82 0x4D 0x00 0x21 0x85 0x00 0x00 0x21 0x22 0x00 0x00 0x21 0x67 0x00 0x00 0x23 0x00 0x00 0x21 0x26 0x00 0x00 0x21 ldp: Sent label mapping msg to 144.0.0.44:0 (pp 0x610ECDD0) ldp: LDP label mapping msg: PDU hdr: LDP Id: 133.0.0.33:0; Msg Contents: 0x00 0x01 0x00 0x22 0x85 0x00 0x00 0x21 0x00 0x00 0x04 0x00 0x00 0x18 0x00 0x06 0x36 0x01 0x00 0x00 0x08 0x02 0x00 0x01 0x20 0xCB 0x00 0x07 0x07 0x02 0x00 0x04 0x00 0x00 0x00 0x18 ldp: Rcvd address msg from 144.0.0.44:0 (pp 0x610ECDD0) ldp: LDP address msg: PDU hdr: LDP Id: 144.0.0.44:0; Msg Contents: 0x00 0x01 0x00 0x24 0x90 0x00 0x00 0x2C 0x00 0x00 0x03 0x00 0x00 0x1A 0x00 0x10 0x23 0x01 0x01 0x00 0x12 0x00 0x01 0x90 0x00 0x00 0x2C 0x02 0x00 0x00 0x22 0x00 0x00 0x2C 0x2D 0x00 0x00 0x2C ldp: Rcvd label mapping msg from 144.0.0.44:0 (pp 0x610ECDD0) ldp: LDP label mapping msg: PDU hdr: LDP Id: 144.0.0.44:0; Msg Contents: 0x00 0x01 0x00 0x22 0x90 0x00 0x00 0x2C 0x00 0x00 0x04 0x00 0x00 0x18 0x00 0x10 0x24 0x01 0x00 0x00 0x08 0x02 0x00 0x01 0x20 0x90 0x00 0x00 0x2C 0x02 0x00 0x04 0x00 0x00 0x00 0x03
0x00 0x00
0x00 0x00
0x00
0x00
0x00 0x00
0x00 0xA4
0x00 0x00
Field ldp: Rcvd xxx msg from a.b.c.d Sent xxx msg to a.b.c.d to a.b.c.d:e
Description Identifies the source of the message as LDP. Indicates that a message of the specified type has been received. Host to which the message has been sent. Used in the early stages of the opening of an LDP session when the LDP identifier is not yet known. Indicates that a message of the specified type has been sent. Host to which the message has been sent. Used in the early stages of the opening of an LDP session when the LDP identifier is not yet known. LDP identifier of the peer to which the message has been sent.
DB-1753
Table 230
Field (pp 0xnnnnnnnn) LDP xxx msg PDU hdr: LDP Id: a.b.c.d:e Msg contents: 0xnn ... 0xnn
Description Identifies the data structure used to represent the peer at the label distribution level. Useful for correlating debug output. Type of message that has been sent. LDP identifier of the sender included in the LDP protocol data unit (PDU) header. Contents of the message represented as a sequence of bytes.
Related Commands
Command
Description
debug mpls ldp session Displays information about state transitions for LDP sessions. state-machine
DB-1754
December 2010
Syntax Description
peer-acl acl
(Optional) Enables the display of events for the peers whose router IDs are listed in the access control list.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(14)T. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, the display of events related to MPLS LDP-IGP Synchronization are enabled:
Router# debug mpls ldp session protection
Related Commands
Description Forcibly resets an LDP session. Displays the contents of the LDP.
DB-1755
Syntax Description
peer-acl acl
(Optional) Limits the displayed information to that for LDP peers permitted by the access control list (acl).
Defaults
Command Modes
Privileged EXEC
Command History
Release 11.1CT 12.0(10)ST 12.0(14)ST 12.1(2)T 12.1(8a)E 12.2(2)T 12.2(4)T 12.2(8)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was modified to reflect MPLS IETF command syntax and terminology. This command was integrated into Cisco IOS Release 12.0(14)ST. This command was integrated into Cisco IOS Release 12.1(2)T. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(4)T. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
A low-level state machine that deals with session establishment and shutdown A high-level state machine that deals with setting up and shutting down label advertisement
DB-1756
December 2010
Use the debug mpls ldp session state-machine command to monitor the lower-level session state machine. Use the debug mpls ldp peer state-machine command to monitor the higher-level session state machine.
Examples
The following shows sample output from the debug mpls ldp session state-machine command:
Router# debug mpls ldp session state-machine ldp: ptcl_adj:144.0.0.44(0x610EED30): Non-existent -> Role pasv ldp: create ptcl_adj: tp = 0x610EED30, ipaddr = 144.0.0.44 ldp: ptcl_adj:144.0.0.44(0x610EED30): Event: Xport opened; Role pasv -> Role pasv ldp: ptcl_adj:34.0.0.44(0x610EED30): Event: Rcv Init; Role pasv -> Init rcvd pasv ldp: ptcl_adj:34.0.0.44(0x610EED30): Event: Rcv KA; Init rcvd pasv -> Oper ldp: ptcl_adj:unknown(0x610EED30): Event: Xport closed; Oper -> Non-existent
Description Identifies the source of the message as LDP. Identifies the network address of the LDP peer. Identifies the data structure used to represent the peer at the protocol level. Useful for correlating debug output. Event that caused the state transition. State of the LDP session has changed from state s1 to state s2.
Related Commands
DB-1757
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Release 11.1CT 12.0(10)ST 12.0(14)ST 12.1(2)T 12.1(8a)E 12.2(2)T 12.2(4)T 12.2(8)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was modified to reflect MPLS IETF command syntax and terminology. This command was integrated into Cisco IOS Release 12.0(14)ST. This command was integrated into Cisco IOS Release 12.1(2)T. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(4)T. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Platforms that are not directly connected may engage in LDP label distribution (for example, to support two-level labeling across an LSP tunnel).
DB-1758
December 2010
An LDP session between nondirectly connected label switch routers (LSRs) is called a targeted session and is supported by LDP extended discovery which uses targeted Hello messages sent to specific IP addresses. An LSR (Router 1) attempting to initiate an LDP targeted session with another LSR (Router 2) sends targeted Hello messages sent to a specific IP address of Router 2. If the configuration of Router 2 permits it to respond to targeted Hello messages from Router 1, it does so, and the LDP session can be established. In this situation, Router 1 is said to be an active LSR for the targeted session because it initiated the targeted Hello messages; Router 2 is said to be a passive LSR for the session because it responded to them. As with LDP sessions between two directly connected LSRs, it is possible for a targeted session to be the result of multiple discovery activities which are targeted to different IP addresses for the same LSR. In addition, it is possible for both LSRs in a targeted session to be active and for both to be passive. The debug messages enabled by debug mpls ldp targeted-neighbors report activity relating to targeted sessions.
Examples
The following shows sample output from the debug mpls ldp targeted-neighbors command:
Router# debug mpls ldp targeted-neighbors ldp-trgtnbr: ldp-trgtnbr: ldp-trgtnbr: ldp-trgtnbr: ldp-trgtnbr: ldp-trgtnbr: ldp-trgtnbr: ldp-trgtnbr: ldp-trgtnbr: ldp-trgtnbr: ldp-trgtnbr: ldp-trgtnbr: 144.0.0.44 144.0.0.44 144.0.0.44 144.0.0.44 144.0.0.44 144.0.0.44 144.0.0.44 144.0.0.44 144.0.0.44 144.0.0.44 144.0.0.44 144.0.0.44 Req active allocated Set peer start; flags 0x0 Defer peer cleanup; cleancnt 1 Set peer finished; flags 0xF ref count incremented to 1 Release active; ref count decremented to 0 Clear peer start; flags 0xF Undefer cleanup start; clearcnt 0, flags 0xC Undefer cleanup finish; clearcnt 0, flags 0x8 Clear peer finished; flags 0x8 freed
Description Identifies this as an LDP targeted neighbor debug statement. IP address for the targeted neighbor.
Related Commands
DB-1759
Syntax Description
(Optional) Limits the displayed information to that for LDP peers permitted by the access control list (acl). (Optional) Limits the displayed information to that for the specified interface.
Defaults
Display information about LDP TCP connection activity for all peers and all interfaces.
Command Modes
Privileged EXEC
Command History
Release 11.1CT 12.0(10)ST 12.0(14)ST 12.1(2)T 12.1(8a)E 12.2(2)T 12.2(4)T 12.2(8)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was modified to reflect MPLS IETF command syntax and terminology. This command was integrated into Cisco IOS Release 12.0(14)ST. This command was integrated into Cisco IOS Release 12.1(2)T. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(4)T. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-1760
December 2010
Usage Guidelines
Use this command to monitor LDP activity relating to the establishment of the transport (TCP) connection for LDP sessions. When two devices establish a TCP connection for an LDP session, the device with the larger transport address plays an active role and the other plays a passive role. The active device attempts to establish a TCP connection to the well-known LDP port at the passive device. The passive device waits for the connection to the well-known port to be established.
Examples
The following shows sample output from the debug mpls ldp transport connections command:
Router# debug mpls ldp transport connections Debug output at active peer: ldp: ldp: ldp: ldp: ldp: Opening listen port 646 for 144.0.0.44, 34.0.0.44 Open LDP listen TCB 0x60E105BC; lport = 646; fhost = 144.0.0.44 Add listen TCB to list; tcb 0x60E105BC; addr 144.0.0.44 Incoming ldp conn 133.0.0.33:646 <-> 144.0.0.44:11042 create ptcl_adj: tp = 0x610ECD64, ipaddr = 144.0.0.44
Debug output at passive peer: ldp: Opening ldp conn; adj 0x60BAC33C, 144.0.0.44 <-> 133.0.0.33 ldp: ldp conn is up; adj 0x60BAC33C, 144.0.0.44:11042 <-> 133.0.0.33:646
Field ldp: adj 0xnnnnnnnn a.b.c.d -> p.q.r.s a.b.c.d:x -> p.q.r.s:y
Description Identifies the source of the message as LDP. Identifies the data structure used to represent the peer at the transport level. Useful for correlating debug output. Indicates a TCP connection between a.b.c.d and p.q.r.s. Indicates a TCP connection between a.b.c.d, port x and p.q.r.s, port y.
Related Commands
Description Prints information about the events related to the LDP peer discovery mechanism.
DB-1761
Syntax Description
(Optional) Limits the displayed information to that for LDP peers permitted by the access control list (acl). (Optional) Limits the displayed information to that for the specified interface.
Defaults
Displays information about LDP discovery activity for all peers and all interfaces.
Command Modes
Privileged EXEC
Command History
Release 11.1CT 12.0(10)ST 12.0(14)ST 12.1(2)T 12.1(8a)E 12.2(2)T 12.2(4)T 12.2(8)T 12.0(21)ST 12.0(22)S 12.0(23)S 12.2(13)T 12.2(14)S 12.2(33)SRA 12.2SX
Modification This command was introduced. This command was modified to reflect MPLS IETF command syntax and terminology. This command was integrated into Cisco IOS Release 12.0(14)ST. This command was integrated into Cisco IOS Release 12.1(2)T. This command was integrated into Cisco IOS Release 12.1(8a)E. This command was integrated into Cisco IOS Release 12.2(2)T. This command was integrated into Cisco IOS Release 12.2(4)T. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.0(21)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.0(23)S. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-1762
December 2010
Usage Guidelines
Use this command to monitor LDP discovery activity. This command might generate a great deal of output. Use the peer-acl option or interface option, or both, to limit the output to peers or interfaces of interest.
Note
The command includes all of the output generated by the debug mpls ldp transport connection command.
Examples
The following shows sample output from the debug mpls ldp transport events command:
Router# debug mpls ldp transport events ldp: enabling ldp on Ethernet1/1/1 ldp: Set intf id: intf 0x611D684C, Ethernet1/1/1, not lc-atm, intf_id 0 ldp: Set intf id: intf 0x617C5638, ATM0/0.2, not lc-atm, intf_id 0 ldp: Send ldp hello; ATM3/0.1, src/dst 8.1.1.1/224.0.0.2, inst_id 1, tcatm ldp: Rcvd ldp hello; ATM3/0.1, from 203.0.7.7 (203.0.7.7:2), intf_id 1, opt ldp: Send ldp hello; Ethernet1/1/1, src/dst 138.1.0.88/224.0.0.2, inst_id 0 ldp: Rcvd ldp hello; Ethernet1/1/1, from 10.105.0.9 (7.1.1.1:0), intf_id 0, ldp: ldp Hello from 10.105.0.9 (7.1.1.1:0) to 224.0.0.2, opt 0xC ldp: New adj 0x617C5EBC from 10.105.0.9 (7.1.1.1:0), Ethernet1/1/1 ldp: Opening ldp conn; adj 0x617C5EBC, 8.1.1.1 <-> 7.1.1.1 ldp: ldp conn is up; adj 0x617C5EBC, 8.1.1.1:11013 <-> 7.1.1.1:646 ldp: Send ldp hello; ATM3/0.1, src/dst 8.1.1.1/224.0.0.2, inst_id 1, tcatm ldp: Rcvd ldp hello; ATM3/0.1, from 203.0.7.7 (203.0.7.7:2), intf_id 1, opt ldp: Send ldp hello; Ethernet1/1/1, src/dst 138.1.0.88/224.0.0.2, inst_id 0 ldp: Rcvd ldp hello; Ethernet1/1/1, from 10.105.0.9 (7.1.1.1:0), intf_id 0, ... ldp: Send ldp hello; Ethernet1/1/1, src/dst 138.1.0.88/224.0.0.2, inst_id 0 ldp: Send ldp hello; ATM3/0.1, src/dst 8.1no tag ip .0.2, inst_id 1, tcatm ldp: disabling ldp on Ethernet1/1/1 ldp: Hold timer expired for adj 0x617C5EBC, will close conn ldp: Closing ldp conn 8.1.1.1:11013 <-> 7.1.1.1:646, adj 0x617C5EBC ldp: Adjacency 0x617C5EBC, 10.105.0.9 timed out ldp: Adj 0x617C5EBC; state set to closed ldp: Rcvd ldp hello; ATM3/0.1, from 203.0.7.7 (203.0.7.7:2), intf_id 1, opt ldp: Ignore Hello from 10.105.0.9, Ethernet1/1/1; no intf
0x8, tcatm
Description Identifies the source of the message as LDP. Identifies the data structure used to represent the peer at the transport level. Useful for correlating debug output. Network address and LDP identifier of the peer.
DB-1763
Table 234
Description Interface identifier (non-zero for LC-ATM interfaces; 0 otherwise). Bits that describe options in the LDP discovery Hello packet:
0x1Targeted Hello option 0x2Send targeted Hello option 0x4Transport address option 0x8LDP Hello message (as opposed to TDP Hello message)
Related Commands
Command debug mpls ldp transport connections show mpls ldp discovery
Description Displays information about the TCP connections used to support LDP sessions. Displays the status of the LDP discovery process.
DB-1764
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified to reflect new MPLS IETF terminology and CLI syntax. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Several lines of output are produced for each route placed into the label-forwarding information base (LFIB). If your router has thousands of labeled routes, be careful about issuing this command. When label switching is first enabled, each of these routes is placed into the LFIB, and several lines of output are displayed for each route.
Examples
The following is sample output from the debug mpls lfib cef command:
Router# debug mpls lfib cef Cisco Express Forwarding related TFIB services debugging is on tagcon: tc_ip_rtlookup fail on 10.0.0.0/8:subnet_lookup failed TFIB: route tag chg 10.7.0.7/32,idx=1,inc=Withdrn,outg=Withdrn,enabled=0x2 TFIB: fib complete delete: prefix=10.7.0.7/32,inc tag=26,delete_info=1 TFIB: deactivate tag rew for 10.7.0.7/32,index=0 TFIB: set fib rew: pfx 10.7.0.7/32,index=0,add=0,tag_rew->adj=Ethernet2/3 TFIB: resolve tag rew,prefix=10.7.0.7/32,no tag_info,no parent TFIB: fib scanner start:needed:1,unres:0,mac:0,loadinfo:0 TFIB: resolve tag rew,prefix=10.7.0.7/32,no tag_info,no parent TFIB: fib upd loadinf 10.100.100.100/32,tag=Tun_hd,fib no loadin,tfib no loadin
DB-1765
TFIB: fib check cleanup for 10.100.100.100/32,index=0,return_value=0 TFIB: fib_scanner_end TFIB: create dynamic entry for 10.11.0.11/32 TFIB: call find_route_tags,dist_method=1,next_hop=10.93.0.11,Et2/3 TFIB: route tag chg 10.11.0.11/32,idx=0,inc=26,outg=Unkn,enabled=0x3 TFIB: create tag info 10.11.0.11/32,inc tag=26,has no info TFIB: resolve tag rew,prefix=10.11.0.11/32,has tag_info,no parent TFIB: finish fib res 10.11.0.11/32:index 0,parent outg tag no parent TFIB: fib upd loadinf 10.11.0.11/32,tag=26,fib no loadin,tfib no loadin TFIB: set fib rew: pfx 10.11.0.11/32,index=0,add=1,tag_rew->adj=Ethernet2/3 tagcon: route_tag_change for: 10.250.0.97/32 intag 33, outtag 28, nexthop tsr 10.11.0.11:0 TFIB: route tag chg 10.250.0.97/32,idx=0,inc=33,outg=28,enabled=0x3 TFIB: deactivate tag rew for 10.250.0.97/32,index=0 TFIB: set fib rew: pfx 10.250.0.97/32,index=0,add=0,tag_rew->adj=Ethernet2/3 TFIB: create tag info 10.250.0.97/32,inc tag=33,has old info On VIP: TFIB: route tag chg 10.13.72.13/32,idx=0,inc=34,outg=Withdrn,enabled=0x3 TFIB: deactivate tag rew for 10.13.72.13/32,index=0 TFIB: set fib rew: pfx 10.13.72.13/32,index=0,add=0,tag_rew->adj= TFIB: create tag info 10.13.72.13/32,inc tag=34,has old info TFIB: resolve tag rew,prefix=10.13.72.13/32,has tag_info,no parent TFIB: finish fib res 10.13.72.13/32:index 0,parent outg tag no parent TFIB: set fib rew: pfx 10.100.100.100/32,index=0,add=0,tag_rew->adj= TFIB: create tag info 10.100.100.100/32,inc tag=37,has old info TFIB: resolve tag rew,prefix=10.100.100.100/32,has tag_info,no parent TFIB: finish fib res 10.100.100.100/32:index 0,parent outg tag no parent TFIB: fib upd loadinf 10.100.100.100/32,tag=37,fib no loadin,tfib no loadin
Table 235 lists the significant fields shown in the display. See Table 237 for a description of special labels that appear in the output of this debug command.
Table 235 debug mpls lfib cef Field Descriptions
Field tagcon LFIB tc_ip_rtlookup fail on x.y.w.z/m: subnet_lookup failed route tag chg x.y.w.z/m idx=-1 inc=s outg=s enabled=0xn
Description The name of the subsystem issuing the debug output (Label Control). The name of the subsystem issuing the debug output. The destination with IP address and mask shown is not in the routing table.
Request to create the LFIB entry for the specified prefix/mask. The index within the FIB entry of the path whose LFIB entry is being created. The parameter 1 means all paths for this FIB entry. Incoming label of the entry being processed. Outgoing label of the entry being processed. Bit mask indicating the types of label switching currently enabled:
Indicates that the FIB entry is being deleted. A destination prefix. Indicates that label_info is also being deleted.
DB-1766
December 2010
Table 235
Field deactivate tag rew for x.y.w.z/m index=n set fib rew: pfx x.y.w.z/m add=0 tag_rew->adj=s resolve tag rew,prefix=x.y.w.z/m no tag_info no parent fib scanner start needed:1 unres:n mac:n loadinfo:n fib upd loadinf x.y.w.z/m tag=s fib no loadin tfib no loadin fib check cleanup for x.y.w.z/m return_value=x fib_scanner_end
Description Indicates that label rewrite for specified prefix is being deleted. Index of path in the FIB entry being processed. Indicates that label rewrite is being installed or deleted from the FIB entry for the specified destination for label imposition purposes. Indicates that label rewrite is being deleted from the FIB (no longer imposing labels). Adjacency of label rewrite for label imposition. Indicates that the FIB route to the specified prefix is being resolved. Indicates that there is no label_info for the destination (destination not labeled). Indicates that the route is not recursive. Indicates that the periodic scan of the FIB has started. Indicates that the LFIB needs the FIB to be scanned. Indicates the number of unresolved TFIB entries. Indicates the number of TFIB entries missing MAC strings. Indicates whether the nonrecursive accounting state has changed and whether the loadinfo information in the LFIB needs to be adjusted. Indicates that a check for nonrecursive accounting is being made and that the LFIB loadinfo information for the specified prefix is being updated. Incoming label of entry. Indicates that the corresponding FIB entry has no loadinfo. Indicates that the LFIB entry has no loadinfo. Indicates that a check is being made on the LFIB entry for the specified destination to determine if rewrite needs to be removed from the LFIB. If x is 0, indicates that no change has occurred in the LFIB entry. If x is 1, there was a change. Indicates that the FIB scan has come to an end.
create dynamic entry for Indicates that the LFIB has been enabled and that an LFIB entry is being x.y.w.z/m created for the specified destination. call find_route_tags dist_method=n next_hop=x.y.z.w interface name create tag info has no info finish fib re x.y.z.w/m Indicates that the labels for that destination are being requested. Identifies the label distribution methodTDP, TC-ATM, and so on. Identifies the next hop for the destination. Identifies the outgoing interface for the destination. Indicates that a label_info data structure is being created for the destination. Indicates that the destination does not already have label_info. Indicates that the LFIB entry for the specified route is being completed.
DB-1767
Table 235
Field parent outg tag s tagcon: route_tag_change for: x.y.z.w/m intag s outtag s nexthop tsr x.y.z.w.i
Description If recursive, specifies the outgoing label of the route through which it is recursive (the parent). If not recursive, s = no parent. Indicates that label control is notifying LFIB that labels are available for the specified destination. Identifies the incoming label for the destination. Identifies the outgoing label for the destination. Identifies the TDP ID of the next hop that sent the tag.
Related Commands
Command debug mpls lfib lsp debug mpls lfib state debug mpls lfib struct
Description Prints detailed information about label rewrites being created and deleted as LSP tunnels are added or removed. Traces what happens when label switching is enabled or disabled. Traces the allocation and freeing of LFIB-related data structures, including the LFIB itself, label rewrites, and label_info data.
DB-1768
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified to reflect new MPLS IETF terminology and CLI syntax. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Several lines of output are produced for each route placed into the LFIB. If your router has thousands of labeled routes, issue this command with care. When label switching is first enabled, each of these routes is placed into the LFIB and a label encapsulation is created. The command output shows you on which adjacency the label rewrite is being created and the labels assigned.
Examples
The following is sample output from the debug mpls lfib enc command. This example shows the encapsulations for three routes that have been created and placed into the LFIB.
Router# debug mpls lfib enc TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: finish res:inc tag=28,outg=Imp_null,next_hop=10.93.72.13,Ethernet4/0/3 update_mac, mac_length = 14,addr=10.93.72.13,idb=Ethernet4/0/3 get ip adj: addr=10.93.72.13,is_p2p=0,fibidb=Ethernet4/0/3,linktype=7 get tag adj: addr=10.93.72.13,is_p2p=0,fibidb=Ethernet4/0/3,linktype=79 encaps:inc=28,outg=Imp_null,idb:Ethernet4/0/3,sizes 14,14,1504,type 0 finish res:inc tag=30,outg=27,next_hop=10.93.72.13,Ethernet4/0/3 get ip adj: addr=10.93.72.13,is_p2p=0,fibidb=Ethernet4/0/3,linktype=7 get tag adj: addr=10.93.72.13,is_p2p=0,fibidb=Ethernet4/0/3,linktype=79 encaps:inc=30,outg=27,idb:Ethernet4/0/3,sizes 14,18,1500,type 0 finish res:inc tag=30,outg=10,next_hop=0.0.0.0,ATM0/0.1
DB-1769
TFIB: get ip adj: addr=0.0.0.0,is_p2p=1,fibidb=ATM0/0.1,linktype=7 TFIB: get tag adj: addr=0.0.0.0,is_p2p=1,fibidb=ATM0/0.1,linktype=79 TFIB: encaps:inc=30,outg=10,idb:ATM0/0,sizes 4,8,4470,type 1
Field TFIB finish res inc tag=x or inc=x outg=y next_hop=a.b.c.d interface get ip adj get tag adj addr = a.b.c.d is_p2p=x fibidb = s linktype = x
Description Identifies the source of the message as the LFIB subsystem. Identifies that the LFIB resolution is being finished. An incoming (local) label for the LFIB entry is being created. Labels can be numbers or special values. An outgoing (remote) label for the LFIB entry is being created. IP address of the next hop for the destination. The outgoing interface through which a packet will be sent. Identifies that the IP adjacency to use in the LFIB entry is being determined. Identifies that the label switching adjacency to use for the LFIB entry is being determined. The IP address of the adjacency. If x is 1, this is a point-to-point adjacency. If x is 0, it is not. Indicates the interface of the adjacency. The link type of the adjacency, as follows:
7 = LINK_IP 79 = LINK_TAG x = length of macstring y = length of tag encapsulation z = tag MTU 0 = normal 1 = TCATM 2 = TSP tunnel
sizes x,y,z
type = x
idb:s update_mac
Indicates the outgoing interface. Indicates that the macstring of the adjacency is being updated.
Table 237 describes the special labels, which sometimes appear in the debug output, and their meanings.
Table 237 Special Labels Appearing in debug Command Output
Meaning No label assigned yet. This destination does not have a label (for example, a BGP route).
DB-1770
December 2010
Table 237
Meaning The label for this destination has been withdrawn. This destination should have a label, but it is not yet known. A recursive route that will get a label when resolved. Explicit null labelused over TC-ATM. Implicit null labelfor directly connected routes. Identifies head of TSP tunnel.
Related Commands
Command debug mpls lfib cef debug mpls lfib lsp debug mpls lfib state debug mpls lfib struct
Description Prints detailed information about label rewrites being created, resolved, and deactivated as CEF routes are added, changed, or removed. Prints detailed information about label rewrites being created and deleted as LSP tunnels are added or removed. Traces what happens when label switching is enabled or disabled. Traces the allocation and freeing of LFIB-related data structures, including the LFIB itself, label rewrites, and label_info data.
DB-1771
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Because using debug commands can use a great deal of bandwidth on your system, use caution when enabling the debug mpls lfib fast-reroute database command.
Examples
The following example displays debugging output for in Fast Reroute processing:
Router# debug mpls lfib fast-reroute database LFIB-FRR:Clear headend FRR info for Tunnel1 LFIB-FRR:FRR info for Tunnel1 changed LFIB-FRR:update headend FRR info for 10.8.0.1/32 LFIB-FRR:item B13D94 [Tu1] (group PO0/0->Tu4000):destroying entry for 10.8.0.1/32... [514 left] LFIB-FRR:item B13D94 [Tu1]:removed from name tree LFIB-FRR:item B13D94 [Tu1]:removed from group PO0/0->Tu4000 tree %LINK-5-CHANGED:Interface Tunnel1, changed state to administratively down LFIB-FRR:Clear headend FRR info for Tunnel1 LFIB-FRR:FRR info for Tunnel1 changed LFIB-FRR:Clear headend FRR info for Tunnel1 LFIB-FRR:FRR info for Tunnel1 changed LFIB-FRR:Set headend FRR info for Tunnel1 {main=PO0/0,backup=Tu4000,label=18} LFIB-FRR:FRR info for Tunnel1 changed %SYS-5-CONFIG_I:Configured from console by console LFIB-FRR:update headend FRR info for 10.8.0.1/32
DB-1772
December 2010
LFIB-FRR:item B13D94 [Tu1]:inserted in name tree LFIB-FRR:item B13D94 [Tu1]:inserted in group PO0/0->Tu4000 tree LFIB-FRR:item B13D94 [Tu1] (group PO0/0->Tu4000):full entry created for 10.8.0.1/32 [total 515] LFIB-FRR:update headend FRR info for 10.8.0.1/32 LFIB-FRR:item B13D94 [Tu1] (group PO0/0->Tu4000):updating entry for 10.8.0.1/32... LFIB-FRR:item B13D94 [Tu1] (group PO0/0->Tu4000):... updated %LINK-3-UPDOWN:Interface Tunnel1, changed state to up LFIB-FRR:update headend FRR info for 10.43.0.0/16 LFIB-FRR:item B04C2C [Tu486]:inserted in name tree LFIB-FRR:item B04C2C [Tu486]:inserted in group PO0/0->Tu4000 tree LFIB-FRR:item B04C2C [Tu486] (group PO0/0->Tu4000):full entry created for 10.43.0.0/16 [total 516] LFIB-FRR:update headend FRR info for 10.43.0.0/16 LFIB-FRR:item B04BB4 [Tu481]:inserted in name tree LFIB-FRR:item B04BB4 [Tu481]:inserted in group PO0/0->Tu4000 tree LFIB-FRR:item B04BB4 [Tu481] (group PO0/0->Tu4000):full entry created for 10.43.0.0/16 [total 517] LFIB-FRR:update headend FRR info for 10.2.0.0/16 LFIB-FRR:item B04B3C [Tu486]:inserted in name tree LFIB-FRR:item B04B3C [Tu486]:inserted in group PO0/0->Tu4000 tree LFIB-FRR:item B04B3C [Tu486] (group PO0/0->Tu4000):full entry created for 10.2.0.0/16 [total 518] LFIB-FRR:update headend FRR info for 10.2.0.0/16 LFIB-FRR:item B04AC4 [Tu481]:inserted in name tree LFIB-FRR:item B04AC4 [Tu481]:inserted in group PO0/0->Tu4000 tree
Related Commands
Command
Description
debug mpls traffic-eng Displays debugging information about fast reroute events. tunnels fast-reroute events debug mpls traffic-eng Displays debugging information about the rerouting of traffic from tunnels fast-reroute link-protected interfaces to backup tunnels. reroutes
DB-1773
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Because using debug commands can use a great deal of bandwidth on your system, use caution when enabling the debug mpls lfib fast-reroute events command.
Examples
The following example reports on the rerouting of traffic to a backup tunnel because of a change of state at a link-protected physical interface.
Router# debug mpls lfib fast-reroute events LFIB-FRR:enqueued interface DOWN event for PO0/0 (Up) LFIB-FRR:discarded interface DOWN event for PO0/0 (Up) LFIB-FRR:processing interface DOWN event for PO0/0 (Up) LFIB-FRR:group PO0/0->Tu4000:output if fixup:Backup(Tu4000) -> Backup(Tu4000)
Note
The state given in parentheses reflects what the FRR database currently understands to be the state of the physical interface. This may or may not be the same as the event state reported earlier on that same display line.
DB-1774
December 2010
Related Commands
Command
Description
debug mpls traffic-eng Displays debugging information about changes to the fast reroute database. tunnels fast-reroute database debug mpls traffic-eng Displays debugging information about the rerouting of traffic from tunnels fast-reroute link-protected interfaces to backup tunnels. reroutes
DB-1775
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Because using debug commands can use a great deal of bandwidth on your system, use caution when enabling the debug mpls lfib fast-reroute reroutes command. The output of this command increases in proportion to the number of tunnels that utilize fast reroute.
Examples
DB-1776
December 2010
Related Commands
Command
Description
debug mpls traffic-eng Displays debugging information about changes to the fast reroute database. tunnels fast-reroute database debug mpls traffic-eng Displays debugging information about fast reroute events. tunnels fast-reroute events
DB-1777
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified to reflect new MPLS IETF terminology and CLI syntax. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug mpls lfib lsp command:
Router# debug mpls lfib lsp TSP-tunnel related TFIB services debugging is on TFIB: tagtun,next hop=10.93.72.13,inc=35,outg=1,idb=Et4/0/3 TFIB: tsptunnel:next hop=10.93.72.13,inc=35,outg=Imp_null,if_number=7 TFIB: tsptun update loadinfo:tag=35,loadinfo_reqd=0,no new loadinfo,no old loadinfo TFIB: tagtun tag chg linec,fiblc=0,in tg=35,o tg=1,if=7,nh=10.93.72.13 TFIB: tagtun,next hop=10.92.0.7,inc=36,outg=1,idb=Et4/0/2 TFIB: tsptunnel:next hop=10.92.0.7,inc=36,outg=Imp_null,if_number=6 TFIB: tsptun update loadinfo:tag=36,loadinfo_reqd=0,no new loadinfo,no old loadinfo TFIB: tagtun tag chg linec,fiblc=0,in tg=36,o tg=1,if=6,nh=10.92.0.7 TFIB: tagtun_delete, inc = 36 tagtun tag del linec,itag=12 TFIB: tagtun_delete, inc = 35 tagtun tag del linec,itag=12 TFIB: tagtun,next hop=10.92.0.7,inc=35,outg=1,idb=Et4/0/2 TFIB: tsptunnel:next hop=10.92.0.7,inc=35,outg=Imp_null,if_number=6 TFIB: tsptun update loadinfo:tag=35,loadinfo_reqd=0,no new loadinfo,no old loadinfo TFIB: tagtun tag chg linec,fiblc=0,in tg=35,o tg=1,if=6,nh=10.92.0.7
DB-1778
December 2010
On VIP: TFIB: tagtun chg msg,in tg=35,o tg=1,nh=10.93.72.13,if=7 TFIB: tsptunnel:next hop=10.93.72.13,inc=35,outg=Imp_null,if_number=7 TFIB: tsptun update loadinfo:tag=35,loadinfo_reqd=0,no new loadinfo,no TFIB: tagtun chg msg,in tg=36,o tg=1,nh=10.92.0.7,if=6 TFIB: tsptunnel:next hop=10.92.0.7,inc=36,outg=Imp_null,if_number=6 TFIB: tsptun update loadinfo:tag=36,loadinfo_reqd=0,no new loadinfo,no TFIB: tagtun chg msg,in tg=35,o tg=1,nh=10.93.72.13,if=7 TFIB: tsptunnel:next hop=10.93.72.13,inc=35,outg=Imp_null,if_number=7 TFIB: tsptun update loadinfo:tag=35,loadinfo_reqd=0,no new loadinfo,no TFIB: tagtun chg msg,in tg=36,o tg=1,nh=10.92.0.7,if=6 TFIB: tsptunnel:next hop=10.92.0.7,inc=36,outg=Imp_null,if_number=6 TFIB: tsptun update loadinfo:tag=36,loadinfo_reqd=0,no new loadinfo,no TFIB: tagtun chg msg,in tg=35,o tg=1,nh=10.92.0.7,if=6 TFIB: tsptunnel:next hop=10.92.0.7,inc=35,outg=Imp_null,if_number=6 TFIB: tsptun update loadinfo:tag=35,loadinfo_reqd=0,no new loadinfo,no
old loadinfo
old loadinfo
old loadinfo
old loadinfo
old loadinfo
Table 238 describes the significant fields shown in the sample display.
Table 238 debug mpls lfib lsp Field Descriptions
Field tagtun next hop=x.y.z.w inc=x outg=x idb=s if_number=7 tsptunnel tsptun update loadinfo tag=x loadinfo_reqd=x no new loadinfo no old loadinfo tagtun tag chg linec fiblc=x in tg=x o tg=x if=x nh=x.y.w.z tagtun_delete tagtun tag del linec tagtun chg msg
Description Name of routine entered. Next hop for the tunnel being created. Incoming label for this hop of the tunnel being created. Outgoing label (1 means Implicit Null label). Outgoing interface for the tunnel being created. Interface number of the outgoing interface. Name of the routine entered. The procedure being performed. Incoming label of the LFIB slot whose loadinfo is being updated. Indicates whether a loadinfo is expected for this entry (non-recursive accounting is on). No change required in loadinfo. No previous loadinfo available. Line card is being informed of the TSP tunnel. Indicates which line card is being informed (0 means all). Indicates the incoming label of new TSP tunnel. Indicates the outgoing label of new TSP tunnel. Indicates the outgoing interface number. Indicates the next hop IP address. Indicates that a procedure is being performed: delete a TSP tunnel. Informs the line card of the TSP tunnel deletion. Indicates that the line card has received a message to create a TSP tunnel.
DB-1779
Related Commands
Description Prints detailed information about label rewrites being created, resolved, and deactivated as CEF routes are added, changed, or removed. Traces what happens when label switching is enabled or disabled. Traces the allocation and freeing of LFIB-related data structures, including the LFIB itself, label rewrites, and label_info data.
DB-1780
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified to reflect new MPLS IETF terminology and CLI syntax. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command when you wish to trace what happens to the label-forwarding information base (LFIB) when you issue the mpls ip or the mpls tsp-tunnel command.
Examples
The following is sample output from the debug mpls lfib state command:
Router# debug mpls lfib state TFIB enable/disable state debugging is on TFIB: Upd tag sb 6(status:0xC1,tmtu:1500,VPI:1-1 VC=0/32,et:0/0/0),lc 0x0 TFIB: intf status chg: idb=Et4/0/2,status=0xC1,oldstatus=0xC3 TFIB: interface dyntag change,change in state to Ethernet4/0/2 TFIB: enable entered, table exists,enabler type=0x2 TFIB: enable, TFIB already enabled, types now 0x3,returning TFIB: enable entered, table exists,enabler type=0x1 TFIB: disable entered, table exists,type=0x1 TFIB: cleanup: tfib[32] still non-0 On linecard only: TFIB: disable lc msg recvd, type=0x1 TFIB: Ethernet4/0/1 fibidb subblock message received
DB-1781
TFIB: enable lc msg recvd, type=0x1 TFIB: Tunnel301 set encapfix to 0x6016A97C
Description Identifies the source of the message as the LFIB subsystem. Indicates that the status of the xth label switching sub-block is being updated, where x is the interface number. There is a label switching sub-block for each interface on which label switching has been enabled. Identifies the values of the fields in the label switching sub-block, as follows:
status byte maximum transmission unit (tmtu) range of ATM VPs control VP control VC (if this is a TC-ATM interface) encapsulation type (et) encapsulation information tunnel interface number (lc) line card number to which the update message is being sent (0 means all line cards)
intf status chg idb=Et4/0/2 status=0xC1 oldstatus=0xC3 interface dyntag change, change in state to Ethernet4/0/2 enable entered TFIB already enabled table exists cleanup: tfib[x] still non-0 disable lc mesg recvd, type=0x1 disable entered, table exists,type=0x1 Ethernet4/0/1 fibidb subblock message received
Indicates that there was an interface status change. Identifies the interface whose status changed. Indicates the new status bits in the label switching sub-block of the idb. Indicates the old status bits before the change. Indicates that there was a change in the dynamic label status for the particular interface. Indicates that the code that enables the LFIB was invoked. Indicates that the LFIB was already enabled when this call was made. Indicates that an LFIB table had already been allocated in a previous call. Indicates that the LFIB is being deleted, but that slot x is still active. Indicates that a message to disable label switching type 1 (dynamic) was received by the line card. Indicates that a call to disable dynamic label switching was issued. Indicates that a message giving fibidb status change was received on the line card.
DB-1782
December 2010
Table 239
Description Indicates that the line card received a message to enable label switching type 1 (dynamic). Shows that fibidb Tunnel301 on the line card received an encapsulation fixup.
types now 0x3, returning Shows the value of the bitmask indicating the type of label switching enabled on the interface, as follows:
Related Commands
Description Prints detailed information about label rewrites being created, resolved, and deactivated as CEF routes are added, changed, or removed. Prints detailed information about label rewrites being created and deleted as LSP tunnels are added or removed. Traces the allocation and freeing of LFIB-related data structures, including the LFIB itself, label rewrites, and label_info data.
DB-1783
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified to reflect new MPLS IETF terminology and CLI syntax. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug mpls lfib struct command:
Router# debug mpls lfib struct TFIB data structure changes debugging is on TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: TFIB: delete tag rew, incoming tag 32 remove from tfib,inc tag=32 set loadinfo,tag=32,no old loadinfo,no new loadinfo TFIB not in use. Checking for entries. cleanup: tfib[0] still non-0 remove from tfib,inc tag=Tun_hd set loadinfo,tag=Exp_null,no old loadinfo,no new loadinfo TFIB freed. enable, TFIB allocated, size 4024 bytes, maxtag = 500 create tag rewrite: inc Tun_hd,outg Unkn add to tfib at Tun_hd, first in circular list, mac=0,enc=0 delete tag rew, incoming tag Tun_hd remove from tfib,inc tag=Tun_hd set loadinfo,tag=Exp_null,no old loadinfo,no new loadinfo create tag rewrite: inc Tun_hd,outg Unkn add to tfib at Tun_hd, first in circular list, mac=0,enc=0 create tag rewrite: inc 26,outg Unkn
DB-1784
December 2010
add to tfib at 26, first in circular list, mac=0,enc=0 add to tfib at 27, added to circular list, mac=0,enc=0 delete tag rew, incoming tag Tun_hd remove from tfib,inc tag=Tun_hd set loadinfo,tag=Exp_null,no old loadinfo,no new loadinfo add to tfib at 29, added to circular list, mac=4,enc=8 delete tag rew, incoming tag 29 remove from tfib,inc tag=29
Field TFIB delete tag rew remove from tfib inc tag=s set loadinfo tag=s no old loadinfo no new loadinfo TFIB not in use. Checking for entries. cleanup: tfib[x] still non-0 TFIB freed
Description The subsystem issuing the message. A label rewrite is being freed. A label rewrite is being removed from the LFIB. The incoming label of the entry being processed. The loadinfo field in the LFIB entry is being set (used for nonrecursive accounting). The incoming label of the entry being processed. The LFIB entry did not have a loadinfo before. The LFIB entry should not have a loadinfo now. Label switching has been disabled and the LFIB is being freed up. The LFIB is being checked for any entries in use, and entry x is the lowest numbered slot still in use. The LFIB table has been freed.
enable, TFIB allocated, Label switching has been enabled and an LFIB of x bytes has been allocated. size x bytes, maxtag = y The largest legal label is y. create tag rewrite inc s outg s add to tfib at s first in circular list mac=0,enc=0 added to circular list A label rewrite is being created. The incoming label. The outgoing label. A label rewrite has been placed in the LFIB at slots. This LFIB slot had been empty and this is the first rewrite in the list. Length of the MAC string and total encapsulation length, including labels. A label rewrite is being added to an LFIB slot that already had an entry. This rewrite is being inserted in the circular list.
Related Commands
Command debug mpls lfib cef debug mpls lfib lsp debug mpls lfib state
Description Prints detailed information about label rewrites being created, resolved, and deactivated as CEF routes are added, changed, or removed. Prints detailed information about label rewrites being created and deleted as LSP tunnels are added or removed. Traces what happens when label switching is enabled or disabled.
DB-1785
Syntax Description
(Optional) Displays MPLS) echo packet type, length, values (TLVs) information as it is being coded and decoded. (Optional) Displays error conditions encountered during MPLS echo request and echo reply encoding and decoding. See Table 241. (Optional) Displays MPLS echo request and reply send and receive event information. (Optional) Interprocess communication. Displays debug information regarding communication between the Route Processor and line cards. (Optional) Displays detailed debugging information for the MPLS echo packets sent and received. This output is seen only on the originating router and the router generating the reply. (Optional) Displays packet errors for MPLS echo request and reply. No output is expected for this command. (Optional) Provides information regarding LSP traceroute path discovery operations. (Optional) Displays multipath information. (Optional) Enables all the command keywords.
Command Default
Command Modes
Command History
Modification This command was introduced. The following keywords were added: ipc, path-discovery, multipath, and all. This command was integrated into Cisco IOS Release 12.28(SB) and implemented on the Cisco 10000 series router. This command was integrated into Cisco IOS Release 12.0(32)SY. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.4(11)T.
DB-1786
December 2010
Modification This command was integrated into Cisco IOS Release 12.2(31)SB2. This command was integrated into Cisco IOS Release 12.2(33)SXH. The following keywords were added for Cisco IOS Release 12.0(33)S: ipc, path-discovery, multipath, and all. This command was integrated into Cisco IOS Release 12.4(20)T. This command was integrated into Cisco IOS Release 12.2(33)SXI.
Usage Guidelines
Use this command to monitor activity associated with the ping mpls and the trace mpls commands. Table 241 lists the messages displayed by the debug mpls lspv error command and the reason for each error message.
Table 241 Messages Displayed by the debug mpls lspv error Command
Message
Echo reply discarded because not An echo reply message is sent because the IP header indicates that routable the packet has the Router Alert set and the packet is not routable. UDP checksum error, packet discarded Invalid echo message type Illegal Action A packet is received on the port being used by Label Switched Path Verification (LSPV) and there is a checksum error on the packet. An MPLS echo packet with an invalid echo message type (neither a request nor a reply) is received. The state machine that drives the LSPV software detects an invalid condition.
Examples
The following is sample output from the ping mpls command when LSPV event debugging is enabled:
Router# debug mpls lspv event LSPV event debugging is on Router# ping mpls ipv4 10.131.159.252/32 repeat 1 Sending 1, 100-byte MPLS Echos to 10.131.159.252/32, timeout is 2 seconds, send interval is 0 msec:
Codes: '!' - success, 'Q' - request not transmitted, '.' - timeout, 'U' - unreachable, 'R' - downstream router but not target
Type escape sequence to abort. ! Success rate is 100 percent (1/1), round-trip min/avg/max = 48/48/48 ms Router# *Dec 31 19:31:15.366: LSPV: waiting for 2 seconds *Dec 31 19:31:15.366: LSPV: sender_handle: 2000002D, Event Echo Requests Start, [Idle->Waiting for Echo Reply]
DB-1787
*Dec 31 19:31:15.414: LSPV: sender_handle: 2000002D, Event Echo Reply Received, [Waiting for Echo Reply->Waiting for Interval] *Dec 31 19:31:15.466: LSPV: sender_handle: 2000002D, Event Echo Requests Cancel, [Waiting for Interval->Idle] Router# undebug all All possible debugging has been turned off
The following is sample output from the ping mpls command when LSPV TLV debugging is enabled:
Router# debug mpls lspv tlv LSPV tlv debugging is on Router# ping mpls ipv4 10.131.159.252/32 repeat 1 Sending 1, 100-byte MPLS Echos to 10.131.159.252/32, timeout is 2 seconds, send interval is 0 msec:
Codes: '!' - success, 'Q' - request not transmitted, '.' - timeout, 'U' - unreachable, 'R' - downstream router but not target Type escape sequence to abort. ! Success rate is 100 percent (1/1), round-trip min/avg/max = 40/40/40 ms Router# *Dec 31 19:32:32.566: LSPV: Echo Hdr encode: version 1, msg type 1, reply mode 2 , return_code 0, return_subcode 0, sender handle 9400002E, sequence number 1, timestamp sent 14:32:32 EST Wed Dec 31 2003, timestamp rcvd 19:00:00 EST Thu Dec 31 1899 *Dec 31 19:32:32.566: LSPV: IPV4 FEC encode: destaddr 10.131.159.252/32 *Dec 31 19:32:32.566: LSPV: Pad TLV encode: type 1, size 18, pattern 0xABCD *Dec 31 19:32:32.606: LSPV: Echo Hdr decode: version 1, msg type 2, reply mode 2, return_code 3, return_subcode 0, sender handle 9400002E, sequence number 1, timestamp sent 14:32:32 EST Wed Dec 31 2003, timestamp rcvd 14:32:32 EST Wed Dec 31 2003 Router# undebug all All possible debugging has been turned off
The following is sample output from the trace mpls multipath command when LSPV multipath debugging is on:
Router# debug mpls lspv multipath multipath information debugging is on Router# trace mpls multipath ipv4 10.5.5.5/32 Starting LSP Multipath Traceroute for 10.5.5.5/32 Codes: '!' - success, 'Q' - request not sent, '.' - timeout, 'L' - labeled output interface, 'B' - unlabeled output interface, 'D' - DS Map mismatch, 'F' - no FEC mapping, 'f' - FEC mismatch, 'M' - malformed request, 'm' - unsupported tlvs, 'N' - no label entry, 'P' - no rx intf label prot, 'p' - premature termination of LSP, 'R' - transit router, 'I' - unknown upstream index, 'X' - unknown return code, 'x' - return code 0 Type escape sequence to abort. LL
DB-1788
December 2010
*Aug 30 20:39:03.719: LSPV: configuring bitmask multipath, base 0x7F000000, bitmapsize 32, start 0x7F000000, numbits 32 *Aug 30 20:39:03.719: LSPV: multipath info: info_length 4, bitmapsize 32, multipath_length 8, start 127.0.0.0, base 127.0.0.0, numbits 32 *Aug 30 20:39:03.719: LSPV: multipath info: info_length 4, bitmapsize 32, multipath_length 8, start 127.0.0.0, base 127.0.0.0, numbits 32 *Aug 30 20:39:03.719: LSPV: getnext bit_cursor 0, index 0, mask 0x80000000 *Aug 30 20:39:03.719: LSPV: next addr 127.0.0.1 *Aug 30 20:39:03.719: LSPV: multipath info: datagramsize 8 *Aug 30 20:39:03.719: 7F 00 00 00 FF FF FF FF *Aug 30 20:39:04.007: LSPV: multipath info: ! Path 0 found, output interface Et1/0 source 10.2.3.2 destination 127.0.0.1 Paths (found/broken/unexplored) (1/0/0) Echo Request (sent/fail) (3/0) Echo Reply (received/timeout) (3/0) Total Time Elapsed 924 ms Router# *Aug 30 20:39:04.007: 7F 00 00 00 FF FF FF FF *Aug 30 20:39:04.007: LSPV: ds map convert: rtr_id A030404, mtu 1500 intf_addr 10.3.4.4 hashkey 8, multipath length 8, info 2130706432 *Aug 30 20:39:04.007: LSPV: multipath info: hashkey type 8, base 0x7F000000, bitmapsize 32, info0 0xFFFFFFFF *Aug 30 20:39:04.007: LSPV: multipath info: info_length 4, bitmapsize 32, multipath_length 8, start 127.0.0.1, base 127.0.0.1, numbits 32 *Aug 30 20:39:04.007: LSPV: getnext bit_cursor 0, index 0, mask 0x80000000 *Aug 30 20:39:04.007: LSPV: next addr 127.0.0.1 *Aug 30 20:39:04.007: LSPV: multipath info: datagramsize 8 *Aug 30 20:39:04.007: 7F 00 00 00 FF FF FF FF *Aug 30 20:39:04.299: LSPV: multipath info: datagramsize 8 *Aug 30 20:39:04.299: 7F 00 00 00 FF FF FF FF *Aug 30 20:39:04.299: LSPV: ds map convert: rtr_id A040505, mtu 1504 intf_addr 10.4.5.5 hashkey 8, multipath length 8, info 2130706432 *Aug 30 20:39:04.299: LSPV: multipath info: hashkey type 8, base 0x7F000000, bitmapsize 32, info0 0xFFFFFFFF *Aug 30 20:39:04.299: LSPV: multipath info: info_length 4, bitmapsize 32, multipath_length 8, start 127.0.0.1, base 127.0.0.1, numbits 32 *Aug 30 20:39:04.299: LSPV: getnext bit_cursor 0, index 0, mask 0x80000000 *Aug 30 20:39:04.299: LSPV: next addr 127.0.0.1 *Aug 30 20:39:04.299: LSPV: multipath info: datagramsize 8 *Aug 30 20:39:04.299: 7F 00 00 00 FF FF FF FF Router# undebug all multipath information debugging is off
Related Commands
Description Checks MPLS LSP connectivity. Discovers MPLS LSP routes that packets will actually take when traveling to their destinations.
DB-1789
Syntax Description
Command Default
Command Modes
Command History
Release 15.0(1)S
Usage Guidelines
Use this command when the MLDP-based MVPN feature appears not to be functioning. The command enables debugging output for all MLDP events that occur when the MLDP-based MVPN feature is enabled. This feature provides extensions to Label Distribution Protocol (LDP) for the setup of point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) label switched paths (LSPs) for transport in the Multicast Virtual Private Network MVPN core network. Issuing this command is equivalent to issuing the following commands:
debug mpls mldp filter opaque_type debug mpls mldp generic debug mpls mldp gr debug mpls mldp mfi debug mpls mldp mrib debug mpls mldp neighbor debug mpls mldp packet
Examples
The following example shows how to enable debugging output for all MLDP events:
Router# debug mpls mldp all
Related Commands
DB-1790
December 2010
Command debug mpls mldp filter opaque_type debug mpls mldp generic debug mpls mldp gr debug mpls mldp mfi debug mpls mldp mrib debug mpls mldp neighbor debug mpls mldp packet show mpls mldp database
Description Enables filtering of MLDP debugging output using the opaque type. Enables debugging output for generic MLDP events. Enables debugging output for MLDP graceful restart events. Enables debugging output for MLDP/MFI interaction events. Enables debugging output for MLDP/MRIB interaction events. Enables debugging output for MLDP neighbor events. Enables debugging output for MLDP-generated MPLS control plane events. Displays MLDP information.
DB-1791
Syntax Description
type
The opaque type to be used for filtering. The following types are supported:
ipv4 source-groupthis represents the IPv4 Protocol Independent Source-Specific Transit multicast application type. The IPv4 source address and group address are also specified. ipv6 source-groupthis represents the IPv6 Protocol Independent Source-Specific Transit multicast application type.The IPv6 source address and group address are also specified. mdt vpn-id mdt-numberthis represents the Multicast Virtual Private Network (MVPN) multicast application type. The VPN identifier and the Multicast Distribution Tree (MDT) number are also specified. vpnv4 source-group route-distinguisherthis represents the Direct MDT (VPNv4) multicast application type.The IPv4 source address, group address, and the VPN route distinguisher are also specified. type-numberthe type-number. Valid values are from 0-65535.
Command Default
Command Modes
Command History
Release 15.0(1)S
Usage Guidelines
Use this command when the MLDP-based MVPN feature appears not to be functioning. The command enables filtering of MLDP debugging output using the opaque type. This output occurs when the MLDP-based MVPN feature is enabled. This feature provides extensions to Label Distribution Protocol (LDP) for the setup of point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) label switched paths (LSPs) for transport in the Multicast Virtual Private Network (MVPN) core network. The opaque type represents the type of multicast application (for example, MVPN) occurring across an MPLS core network.
DB-1792
December 2010
Examples
The following example shows how to enable filtering of MLDP debugging output using the opaque type:
Router# debug mpls mldp filter opaque_type mdt 100:2 0
Related Commands
Command debug mpls mldp all debug mpls mldp generic debug mpls mldp gr debug mpls mldp mfi debug mpls mldp mrib debug mpls mldp neighbor debug mpls mldp packet show mpls mldp database
Description Enables debugging output for all MLDP events. Enables debugging output for generic MLDP events. Enables debugging output for MLDP graceful restart events. Enables debugging output for MLDP/MFI interaction events. Enables debugging output for MLDP/MRIB interaction events. Enables debugging output for MLDP neighbor events. Enables debugging output for MLDP-generated MPLS control plane events. Displays MLDP information.
DB-1793
Syntax Description
id
Command Default
Command Modes
Command History
Release 15.0(1)S
Usage Guidelines
Use this command when the MLDP-based MVPN feature appears not to be functioning. The command enables debugging output for generic MLDP events that occur when the MLDP-based MVPN feature is enabled. This feature provides extensions to Label Distribution Protocol (LDP) for the setup of point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) label switched paths (LSPs) for transport in the Multicast Virtual Private Network (MVPN) core network.
Examples
The following example shows how to enable debugging output for generic MLDP events:
Router# debug mpls mldp generic
Related Commands
Command debug mpls mldp all debug mpls mldp filter opaque_type debug mpls mldp gr debug mpls mldp mfi debug mpls mldp mrib debug mpls mldp neighbor debug mpls mldp packet show mpls mldp database
Description Enables debugging output for all MLDP events. Enables filtering of MLDP debugging output using the opaque type. Enables debugging output for MLDP graceful restart events. Enables debugging output for MLDP/MFI interaction events. Enables debugging output for MLDP/MRIB interaction events. Enables debugging output for MLDP neighbor events. Enables debugging output for MLDP-generated MPLS control plane events. Displays MLDP information.
DB-1794
December 2010
Syntax Description
id
Command Default
Command Modes
Command History
Release 15.0(1)S
Usage Guidelines
Use this command when the MLDP-based MVPN feature appears not to be functioning. The command enables debugging output for MLDP graceful restart events that occur when the MLDP-based MVPN feature is enabled. This feature provides extensions to Label Distribution Protocol (LDP) for the setup of point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) label switched paths (LSPs) for transport in the Multicast Virtual Private Network (MVPN) core network.
Examples
The following example shows how to enable debugging output for MLDP GR events:
Router# debug mpls mldp gr
Related Commands
Command debug mpls mldp all debug mpls mldp filter opaque_type debug mpls mldp generic debug mpls mldp mfi debug mpls mldp mrib debug mpls mldp neighbor debug mpls mldp packet show mpls mldp database
Description Enables debugging output for all MLDP events. Enables filtering of MLDP debugging output using the opaque type. Enables debugging output for generic MLDP events. Enables debugging output for MLDP/MFI interaction events. Enables debugging output for MLDP/MRIB interaction events. Enables debugging output for MLDP neighbor events. Enables debugging output for MLDP-generated MPLS control plane events. Displays MLDP information.
DB-1795
Syntax Description
id
Command Default
Command Modes
Command History
Release 15.0(1)S
Usage Guidelines
Use this command when the MLDP-based MVPN feature appears not to be functioning. The command enables debugging output for MLDP/MFI interaction events that occur when the MLDP-based MVPN feature is enabled. This feature provides extensions to Label Distribution Protocol (LDP) for the setup of point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) label switched paths (LSPs) for transport in the Multicast Virtual Private Network (MVPN) core network.
Examples
The following example shows how to enable debugging output for MLDP/MFI interaction events:
Router# debug mpls mldp mfi
Related Commands
Command debug mpls mldp all debug mpls mldp filter opaque_type debug mpls mldp generic debug mpls mldp gr debug mpls mldp mrib debug mpls mldp neighbor debug mpls mldp packet show mpls mldp database
Description Enables debugging output for all MLDP events. Enables filtering of MLDP debugging output using the opaque type. Enables debugging output for generic MLDP events. Enables debugging output for MLDP graceful restart events. Enables debugging output for MLDP/MRIB interaction events. Enables debugging output for MLDP neighbor events. Enables debugging output for MLDP-generated MPLS control plane events. Displays MLDP information.
DB-1796
December 2010
Syntax Description
Command Default
Command Modes
Command History
Release 15.0(1)S
Usage Guidelines
Use this command when the MLDP-based MVPN feature appears not to be functioning. The command enables debugging output for MLDP/MRIB interaction events that occur when the MLDP-based MVPN feature is enabled. This feature provides extensions to Label Distribution Protocol (LDP) for the setup of point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) label switched paths (LSPs) for transport in the Multicast Virtual Private Network (MVPN) core network.
Examples
The following example shows how to enable debugging output for MLDP/MRIB interaction events:
Router# debug mpls mldp mrib
Related Commands
Command debug mpls mldp all debug mpls mldp filter opaque_type debug mpls mldp generic debug mpls mldp gr debug mpls mldp mfi debug mpls mldp neighbor debug mpls mldp packet show mpls mldp database
Description Enables debugging output for all MLDP events. Enables filtering of MLDP debugging output using the opaque type. Enables debugging output for generic MLDP events. Enables debugging output for MLDP graceful restart events. Enables debugging output for MLDP/MFI interaction events. Enables debugging output for MLDP neighbor events. Enables debugging output for MLDP-generated MPLS control plane events. Displays MLDP information.
DB-1797
Syntax Description
Command Default
Command Modes
Command History
Release 15.0(1)S
Usage Guidelines
Use this command when the MLDP-based MVPN feature appears not to be functioning. The command enables debugging output for MLDP neighbor events that occur when the MLDP-based MVPN feature is enabled. This feature provides extensions to Label Distribution Protocol (LDP) for the setup of point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) label switched paths (LSPs) for transport in the Multicast Virtual Private Network (MVPN)core network.
Examples
The following example shows how to enable debugging output for MLDP neighbor events:
Router# debug mpls mldp neighbor
Related Commands
Command debug mpls mldp all debug mpls mldp filter opaque_type debug mpls mldp generic debug mpls mldp gr debug mpls mldp mfi debug mpls mldp mrib debug mpls mldp packet show mpls mldp database
Description Enables debugging output for all MLDP events. Enables filtering of MLDP debugging output using the opaque type. Enables debugging output for generic MLDP events. Enables debugging output for MLDP graceful restart events. Enables debugging output for MLDP/MFI interaction events. Enables debugging output for MLDP/MRIB interaction events. Enables debugging output for MLDP-generated MPLS control plane events. Displays MLDP information.
DB-1798
December 2010
Syntax Description
Command Default
Command Modes
Command History
Release 15.0(1)S
Usage Guidelines
Use this command when the MLDP-based MVPN feature appears not to be functioning. The command enables debugging output for MLDP-generated MPLS control plane events that occur when the MLDP-based MVPN feature is enabled. This feature provides extensions to Label Distribution Protocol (LDP) for the setup of point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) label switched paths (LSPs) for transport in the Multicast Virtual Private Network (MVPN) core network.
Examples
The following example shows how to enable debugging output for MLDP-generated MPLS control plane events:
Router# debug mpls mldp packet
Related Commands
Command debug mpls mldp all debug mpls mldp filter opaque_type debug mpls mldp generic debug mpls mldp gr debug mpls mldp mfi debug mpls mldp mrib debug mpls mldp neighbor show mpls mldp database
Description Enables debugging output for all MLDP events. Enables filtering of MLDP debugging output using the opaque type. Enables debugging output for generic MLDP events. Enables debugging output for MLDP graceful restart events. Enables debugging output for MLDP/MFI interaction events. Enables debugging output for MLDP/MRIB interaction events. Enables debugging output for MLDP neighbor events. Displays MLDP information.
DB-1799
Syntax Description
Defaults
Command Modes
EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(5)T. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-1800
December 2010
Router# 4d00h:Egress flow:entry created, dest 3.3.3.3/32, src 42.42.42.42/32 Router# conf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)# int eth1/4 Router(config-if)# no mpls netflow egress Router(config-if)# 4d00h:MPLS output feature change, trigger TFIB scan 4d00h:tfib_scanner_walk, prefix 5.5.5.5/32, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 2.0.0.0/8, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 3.3.3.3/32, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 40.40.40.40/32, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 50.50.50.50/32, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 100.100.100.100/32, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 180.1.1.0/24, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 190.1.1.0/24, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 2.0.0.0/8, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 4.4.4.4/32, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 40.40.40.40/32, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 50.50.50.50/32, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 177.1.1.0/24, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 180.1.1.0/24, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 190.1.1.0/24, rewrite flow flag 1 Router(config-if)# Router(config-if)# mpls netflow egress Router(config-if)# 4d00h:Interface refcount with output feature enabled = 2 4d00h:MPLS output feature change, trigger TFIB scan 4d00h:tfib_scanner_walk, prefix 5.5.5.5/32, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 2.0.0.0/8, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 3.3.3.3/32, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 40.40.40.40/32, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 50.50.50.50/32, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 100.100.100.100/32, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 180.1.1.0/24, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 190.1.1.0/24, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 2.0.0.0/8, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 4.4.4.4/32, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 40.40.40.40/32, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 50.50.50.50/32, rewrite flow flag 0 4d00h:tfib_scanner_walk, prefix 177.1.1.0/24, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 180.1.1.0/24, rewrite flow flag 1 4d00h:tfib_scanner_walk, prefix 190.1.1.0/24, rewrite flow flag 1 4d00h:Egress flow:entry created, dest 3.3.3.3/32, src 42.42.42.42/32 Router(config-if)# Router(config-if)# end Router# show run int eth1/4 Building configuration... Current configuration: ! interface Ethernet1/4 ip vrf forwarding vpn1 ip address 180.1.1.1 255.255.255.0 no ip directed-broadcast mpls netflow egress end Router# Router# 4d00h:%SYS-5-CONFIG_I:Configured from console by console Router#
DB-1801
Note
Flow flag 1 prefixes are reachable through this interface; therefore, MPLS egress NetFlow accounting is applied to all packets going out the destination prefix. Flow flag 0 prefixes are not reachable through this interface; therefore, MPLS egress NetFlow accounting is not applied to any packets going out the destination prefix.
Related Commands
DB-1802
December 2010
Syntax Description
interface
Defaults
The debug output displays all labeled packets, regardless of the interface.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified for new MPLS terminology and syntax. The command ouput was enhanced to display MPLS high availability information. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The optional interface parameter restricts the display to only those packets received or sent on the indicated interface or subinterface.
Note
Use this command with care because it generates output for every packet processed. Furthermore, enabling this command causes fast and distributed label switching to be disabled for the selected interfaces. To avoid adversely affecting other system activity, use this command only when traffic on the network is at a minimum.
Examples
The following is sample output from the debug mpls packets command:
Router# debug mpls packets
DB-1803
TAG: Hs3/0: recvd: CoS=0, TTL=254, Tag(s)=27 TAG: Hs0/0: xmit: (no tag) TAG: Hs0/0: recvd: CoS=0, TTL=254, Tag(s)=30 TAG: Hs3/0: xmit: CoS=0, TTL=253, Tag(s)=27
Description The identifier for the interface on which the packet was received or sent. Packet received. Packet transmitted. Class of Service field from the packet label header. Time to live field from the packet label header. Last label was popped off the packet and sent unlabeled. A list of labels on the packet, ordered from the top of the stack to the bottom.
The following is sample output from the debug mpls packets command:
Router# debug mpls packets Gi6/0/0: rx: Len 118 Stack {30 6 255} - ipv4 data Gi6/1/1: tx: Len 118 Stack {22 6 254} - ipv4 data
Related Commands
DB-1804
December 2010
Syntax Description
vrf vpn-name
(Optional) Displays information only for the specified VPN routing and forwarding instance.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(26)S. This command was integrated into Cisco IOS Release 12.3(14)T. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SB
Usage Guidelines
Use the debug mpls static binding command to troubleshoot problems related to Multiprotocol Lbel Switching (MPLS) static labels or VRF-aware MPLS static labels. If you specify the vrf keyword, debugging is enabled only for a specified VRF. You can enable debugging only for a VRF.
Examples
The following is sample output from the debug mpls static binding command:
Router# debug mpls static binding vrf vpn100 MPLS Static label bindings debugging is on 00:15:13: 00:15:13: 00:15:13: 00:15:13: 00:15:13: 00:15:18: 00:15:18: 00:15:18: mpls: mpls: mpls: mpls: mpls: mpls: mpls: Add remote static binding: 10.0.0.0/8; label 0; nexthop 172.16.0.8:0 Add static label binding for 10.0.0.0/8 Add static label binding for 10.0.0.1/8 Add remote static binding: 10.0.0.1/8; label 2607; nexthop 172.17.0.66:0 Add static label binding for 172.18.0.0/16 Periodic static label adjust Static label update: 10.0.0.0/8 Add remote label: nexthop: 172.16.0.8:0; label: 0
DB-1805
00:15:18: 00:15:18: 00:15:18: 00:15:18: 00:15:18: 00:15:18: 00:15:18: 00:15:28: 00:15:28: 00:15:28: 00:15:28: 00:15:28: 00:15:28: 00:15:28: 00:15:28: 00:15:28: 00:15:38: 00:15:38: 00:15:38:
mpls: Periodic static label adjust mpls: Static label update: 10.0.0.1/8 Waiting for withdrawal of dynamic local label 55 Add remote label: nexthop: 172.17.0.66:0; label: 2607 mpls: Periodic static label adjust mpls: Static label update: 172.18.0.0/16 Waiting for withdrawal of dynamic local label 17 mpls: Periodic static label adjust mpls: Periodic static label adjust mpls: Static label update: 10.0.0.1/8 Local label 55 added to tib Signal route tag change, in label 55;out label 8388611; nh 192.168.44.77 mpls: Periodic static label adjust mpls: Static label update: 172.18.0.0/16 Local label 17 added to tib Signal route tag change, in label 17;out label 8388611; nh 192.168.44.66 mpls: Periodic static label adjust mpls: Periodic static label adjust mpls: Periodic static label adjust
Related Commands
DB-1806
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, information is printed about traffic engineering area configuration change events:
Router# debug mpls traffic-eng areas TE-AREAS:isis level-1:up event TE-PCALC_LSA:isis level-1
DB-1807
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, information is printed about automatic routing over traffic engineering tunnels:
Router# debug mpls traffic-eng autoroute TE-Auto:announcement that destination 0001.0000.0003.00 has 1 tunnels Tunnel1 (traffic share 333, nexthop 10.112.0.12)
DB-1808
December 2010
Syntax Description
(Optional) Enables all backup autotunnel debugging output. (Optional) Prints backup autotunnel system events. (Optional) Prints the system state of backup autotunnels.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(11)T. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, debugging information is printed about the system state of backup autotunnels:
Router# debug mpls traffic-eng auto-tunnel backup state
Related Commands
Command debug mpls traffic-eng auto-tunnel primary debug mpls traffic-eng tunnels events mpls traffic-eng auto-tunnel backup show ip explicit-paths show mpls traffic-eng tunnels
Description Prints system information about traffic engineering primary tunnels. Prints information about traffic engineering tunnel management system events. Automatically builds NHOP and NNHOP backup tunnels. Displays the configured IP explicit paths. Shows information about tunnels.
DB-1809
Syntax Description
(Optional) Enables all primary autotunnel debugging output. (Optional) Prints primary autotunnel system events. (Optional) Prints the system state of primary autotunnels.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(11)T. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, debugging information is printed about system events of primary autotunnels:
Router# debug mpls traffic-eng auto-tunnel primary events
*Feb 6 18:12:57.871: TE_AUTO_TUN: primary CLI command: interface tunnel3000 no logging event link-status ip unnumbered Loopback0 tunnel destination 192.168.1.1 tunnel mode mpls traffic-eng end
In the following example, debugging information is printed about the system state of primary autotunnels:
Router# debug mpls traffic-eng auto-tunnel primary state Samplefor debug mpls traffic-eng auto-tunnel primary state: *Feb 6 18:11:44.363: TE_AUTO_TUN: Didn't find protected Up Tunnel3000 to router id 192.168.1.1 out POS2/0
DB-1810
December 2010
Sample for debug mpls traffic-eng auto-tunnel backup events (this is one log that prints on multiple lines): *Feb 6 18:19:04.303: TE_AUTO_TUN: CLI command: ip explicit-path name __dynamic_tunnel4000 index 1 next-address 192.168.1.2
Related Commands
Command debug mpls traffic-eng auto-tunnel backup debug mpls traffic-eng tunnels events mpls traffic-eng auto-tunnel primary config show ip explicit-paths show mpls traffic-eng tunnels
Description Prints system information about traffic engineering backup autotunnels. Prints information about traffic engineering tunnel management system events. Enables IP processing without an explicit address. Displays the configured IP explicit paths. Shows information about tunnels.
DB-1811
Syntax Description
Displays debug information for the specified ACL. Valid values are 1199 and 13002699. Displays debug information sorted by P2P or P2MP messages. Displays debug information about P2P tunnels. Displays debug information about P2MP tunnels.
Command Modes
Command History
Release 12.2(33)SRE
Examples
The following example enables the display of debug message for P2MP tunnels:
Router# debug mpls traffic-eng filter dest-mode p2mp Setting filter for TE P2MP Tunnels/LSPs
Related Commands
DB-1812
December 2010
Syntax Description
detail access-list-number
(Optional) Prints detailed debug information. (Optional) Displays number of the access list.
A standard IP access list is in the range 1 to 199. An extended IP access list is in the range 1300 to 2699.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(16)ST. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.2(18)SXD. This command was integrated into Cisco IOS Release 12.2(27)SBC. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
Use the debug mpls traffic-eng forwarding-adjacency command to troubleshoot any problems that occur after you configure the tunnel mpls traffic-eng forwarding-adjacency command. If you enter the detail keyword before the access-list-number argument, you can specify an access list. However, if you enter an access list before you enter the detail keyword, you cannot specify the detail keyword.
Examples
The following is sample output from the debug mpls traffic-eng forwarding-adjacency command:
Router# debug mpls traffic-eng forwarding-adjacency MPLS traffic-eng debugging is on
DB-1813
When the tunnel comes up, the command generates the following debug output:
*Oct *Oct *Oct 2 12:27:07.846:TE-Auto:announcement that destination 0168.0001.0007.00 has 1 tunnels 2 12:27:07.846: Tunnel0 (traffic share 142857, nexthop 192.168.1.7) 2 12:27:07.846: (flags: Forward-Adjacency, holdtime 0)
Related Commands
Command show debug show mpls traffic-eng forwarding-adjacency tunnel mpls traffic-eng forwarding-adjacency
Description Displays active debug output. Displays TE tunnels being advertised as links in an IGP network. Advertises a TE tunnel as a link in an IGP network.
DB-1814
December 2010
Syntax Description
Displays information about autotunnel activity during the MPLS traffic engineering stateful switchover (SSO) process. Displays errors encountered during the MPLS traffic engineering SSO process. Displays information about link management activity during the MPLS traffic engineering SSO process. Displays significant events that occur during the MPLS traffic engineering SSO process. Displays information about the standby behavior during the MPLS traffic engineering SSO process. Displays information about recovery activity during the MPLS traffic engineering SSO process. Display information about checkpointing activities during the MPLS traffic engineering SSO process. Checkpointing occurs when a message is sent and acknowledged. Displays information about tunnel activity during the MPLS traffic engineering SSO process.
tunnel
Command Default
Debugging is disabled until you issue this command with one or more keywords.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-1815
Usage Guidelines
This command displays debugging output about the SSO process for MPLS traffic engineering tunnels, autotunnels, and link management systems. The SSO process occurs when the active router becomes unavailable and system control and routing protocol execution is transferred from the now inactive RP to the redundant standby RP, thus providing uninterrupted network services.
Examples
The following is sample output from the debug mpls traffic-eng ha sso command when you enabled debugging keywords to monitor the SSO process for tunnels and link management systems as the standby router becomes active:
Router# debug mpls traffic-eng ha sso link-management events MPLS traffic-eng SSO link management events debugging is on Router# debug mpls traffic-eng ha sso link-management recovery MPLS traffic-eng SSO link management recovery debugging is on Router# debug mpls traffic-eng ha sso link-management standby MPLS traffic-eng SSO link management standby behavior debugging is on Router# debug mpls traffic-eng ha sso link-management checkpoint MPLS traffic-eng SSO link management checkpointed info debugging is on Router# debug mpls traffic-eng ha sso tunnel standby MPLS traffic-eng SSO tunnel standby behavior debugging is on Router# debug mpls traffic-eng ha sso tunnel recovery MPLS traffic-eng SSO tunnel head recovery debugging is on Router# debug mpls traffic-eng ha sso tunnel events MPLS traffic-eng SSO events for tunnel heads debugging is on Router# debug mpls traffic-eng ha sso errors MPLS traffic-eng SSO errors debugging is on Router# show debug MPLS TE: MPLS traffic-eng MPLS traffic-eng MPLS traffic-eng MPLS traffic-eng MPLS traffic-eng MPLS traffic-eng MPLS traffic-eng MPLS traffic-eng Router# Standby-Router# <-----This command displays the debugging that is enabled.
link management events debugging is on link management recovery debugging is on link management standby behavior debugging is on link management checkpointed info debugging is on tunnel standby behavior debugging is on tunnel head recovery debugging is on events for tunnel heads debugging is on errors debugging is on
DB-1816
December 2010
Following is the sample debugging output displayed during a successful SSO recovery on the standby router as it becomes active:
*May 12 20:03:15.303: RRR_HA_STATE: Told to wait for IGP convergence *May 12 20:03:14.807: %FABRIC-SP-STDBY-5-FABRIC_MODULE_ACTIVE: The Switch Fabric Module in slot 5 became active. *May 12 20:03:15.763: RRR_HA_REC: Attempting to recover last flooded info; protocol: OSPF, area: 0 *May 12 20:03:15.763: RRR_HA_REC: recovered ospf area 0 instance 0x48FFF240 *May 12 20:03:15.763: RRR_HA_REC: recovered system info *May 12 20:03:15.763: RRR_HA_REC: recovered link[0] info *May 12 20:03:15.763: RRR_HA: Recovered last flooded info for igp: OSPF, area: 0 *May 12 20:03:15.763: Pre announce tunnel 10 *May 12 20:03:15.763: TSPVIF_HA_EVENT: added Router_t10 to dest list *May 12 20:03:15.763: TSPVIF_HA_EVENT: Completed announcement of 1 tunnel heads to IGP *May 12 20:03:15.763: TSPVIF_HA_REC: Attempting to recover Tunnel10 after SSO *May 12 20:03:15.763: LSP-TUNNEL-REOPT: Tunnel10 [61] set to recover *May 12 20:03:15.763: TSPVIF_HA_REC: Recovered number hops = 5 *May 12 20:03:15.763: TSPVIF_HA_REC: recovered ospf area 0 instance 0x48FFF240 *May 12 20:03:15.763: TSPVIF_HA_REC: Recovered Hop 0: 10.0.3.1, Id: 10.0.0.3 Router Node (ospf) flag:0x0 *May 12 20:03:15.763: TSPVIF_HA_REC: Recovered Hop 1: 10.0.3.2, Id: 10.0.0.7 Router Node (ospf) flag:0x0 *May 12 20:03:15.763: TSPVIF_HA_REC: Recovered Hop 2: 10.0.6.1, Id: 10.0.0.7 Router Node (ospf) flag:0x0 *May 12 20:03:15.763: TSPVIF_HA_REC: Recovered Hop 3: 10.0.6.2, Id: 10.0.0.9 Router Node (ospf) flag:0x0 *May 12 20:03:15.763: TSPVIF_HA_REC: Recovered Hop 4: 10.0.0.9, Id: 10.0.0.9 Router Node (ospf) flag:0x0 *May 12 20:03:15.763: TSPVIF_HA_REC: signalling recovered setup for Tunnel10: popt 1 [61], weight 2 *May 12 20:03:15.891: TSPVIF_HA_REC: recovered Tu10 forwarding info needed by query *May 12 20:03:15.891: TSPVIF_HA_REC: output_idb: GigabitEthernet3/2, output_nhop: 180.0.3.2 Standby-Router# Router# *May 12 20:03:25.891: TSPVIF_HA_REC: recovered Tu10 forwarding info needed by query *May 12 20:03:25.891: TSPVIF_HA_REC: output_idb: GigabitEthernet3/2, output_nhop: 10.0.3.2 *May 12 20:03:35.891: TSPVIF_HA_REC: recovered Tu10 forwarding info needed by query *May 12 20:03:35.891: TSPVIF_HA_REC: output_idb: GigabitEthernet3/2, output_nhop: 10.0.3.2 *May 12 20:03:35.895: RRR_HA_STATE: IGP flood prevented during IGP recovery *May 12 20:03:38.079: LSP-TUNNEL-REOPT: Tunnel10 [61] received RESV for recovered setup *May 12 20:03:38.079: LSP-TUNNEL-REOPT: Tunnel10 [61] removed as recovery *May 12 20:03:38.079: TSPVIF_HA_EVENT: notifying RSVP HA to add lsp_info using key 10.0.0.3->10.0.0.9 Tu10 [61] 10.0.0.3 *May 12 20:03:38.079: TSPVIF_HA_EVENT: updated 7600-1_t10 state; action = add; result = success *May 12 20:03:38.079: TSPVIF_HA_EVENT: 7600-1_t10 fully recovered; rewrite refreshed *May 12 20:03:38.079: TSPVIF_HA_EVENT: notifying CBTS bundle about Router_t10 *May 12 20:03:38.079: TSPVIF_HA_EVENT: notifying RSVP HA to remove lsp_info using key 10.0.0.3->10.0.0.9 Tu10 [61] 10.0.0.3 *May 12 20:03:38.079: RRR_HA: Received notification recovery has ended. Notify IGP to flood. *May 12 20:03:38.079: TSPVIF_HA_EVENT: Received notification recovery has ended *May 12 20:03:38.079: TSPVIF_HA_STANDBY: prevent verifying setups; IGP has not converged *May 12 20:03:38.083: TSPVIF_HA_STANDBY: preventing new setups; reason: IGP recovering *May 12 20:03:38.083: TSPVIF_HA_STANDBY: prevent verifying setups; IGP has not converged *May 12 20:03:38.083: TSPVIF_HA_STANDBY: preventing new setups; reason: IGP recovering *May 12 20:03:38.083: RRR_HA_STATE: IGP flood prevented during IGP recovery 7600-1# *May 12 20:03:47.723: RRR_HA: Received notification that RIB table 0 has converged.
DB-1817
*May 12 20:03:47.723: to flood. *May 12 20:03:47.723: *May 12 20:03:47.723: success *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: result = success *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: (GigabitEthernet3/2) *May 12 20:03:47.723: *May 12 20:03:47.723 *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: Router# *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.723: *May 12 20:03:47.727: *May 12 20:03:47.727: *May 12 20:03:47.727: *May 12 20:03:47.727: *May 12 20:03:47.727: *May 12 20:03:47.727: *May 12 20:03:47.727: *May 12 20:03:47.727: success Router#
Notify IGP
RRR_HA_STATE: Told not to wait for IGP convergence RRR_HA_INFO: update flooded system info; action = add; result = LM System key:: Flooding Protocol: ospf IGP Area ID: 0 LM Flood Data:: LSA Valid flags: 0x0 Node LSA flag: 0x0 IGP System ID: 10.0.0.3 MPLS TE Router ID: 10.0.0.3 Flooded links: 1 TLV length: 0 (bytes) Fragment id: 0 rrr_ha_lm_get_link_info_size: link size: 212 bytes; num TLVs: 0 rrr_ha_sizeof_lm_link_info: link size: 212 bytes; num TLVs: 0 RRR_HA_INFO: update flooded link[0] info; action = add; RRR HA Checkpoint Info Buffer:: Info Handle: 0x490BB1C8 Max Size: 212 Info Size: 212 Info Write Pointer: 0x490BB29C LM Link key:: Flooding Protocol: ospf IGP Area ID: 0
Link ID: 0
Ifnumber: 5 Link Valid Flags: 0x193B Link Subnet Type: Broadcast Local Intfc ID: 0 Neighbor Intf ID: 0 Link IP Address: 10.0.3.1 Neighbor IGP System ID: 10.0.3.2 Neighbor IP Address: 10.0.0.0 IGP Metric: 1 TE Metric: 1 Physical Bandwidth: 1000000 kbits/sec Res. Global BW: 3000 kbits/sec Res. Sub BW: 0 kbits/sec Upstream:: Global Pool ----------0 0 0 0 0 0 0 0 Global Pool ----------3000 3000 3000 3000 3000 3000 3000 2900 Sub Pool ---------0 0 0 0 0 0 0 0 Sub Pool ---------0 0 0 0 0 0 0 0
Reservable Bandwidth[0]: Reservable Bandwidth[1]: Reservable Bandwidth[2]: Reservable Bandwidth[3]: Reservable Bandwidth[4]: Reservable Bandwidth[5]: Reservable Bandwidth[6]: Reservable Bandwidth[7]: Downstream::
Reservable Bandwidth[0]: kbits/sec Reservable Bandwidth[1]: kbits/sec Reservable Bandwidth[2]: kbits/sec Reservable Bandwidth[3]: kbits/sec Reservable Bandwidth[4]: kbits/sec Reservable Bandwidth[5]: kbits/sec Reservable Bandwidth[6]: kbits/sec Reservable Bandwidth[7]: kbits/sec Affinity Bits: 0x0 Protection Type: Capability 0, Working Priority 0 Number of TLVs: 0 RRR_HA: Updated flood state for ospf area 0 with 1 links); result =
DB-1818
December 2010
Related Commands
Description Displays debugging output for RSVP HA activities that improve the accessibility of network resources. Displays debugging output for RSVP activities during the graceful switchover from an active RP to a redundant RP.
DB-1819
Syntax Description
detail acl-number
(Optional) Prints detailed debugging information. (Optional) Uses the specified access list to filter the debugging information. Prints information only for those LSPs that match the access list.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T, and the detail keyword and the acl-number argument were added. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, information is printed about traffic engineering LSP admission control on traffic engineering interfaces:
Router# debug mpls traffic-eng link-management admission-control TE-LM-ADMIT:tunnel 10.106.0.6 TE-LM-ADMIT:tunnel 10.106.0.6 TE-LM-ADMIT:tunnel 10.106.0.6 TE-LM-ADMIT:tunnel 10.106.0.6 TE-LM-ADMIT:Admission control on link Ethernet4/0/1 [reason TE-LM-ADMIT:tunnel 10.106.0.6 TE-LM-ADMIT:tunnel 10.106.0.6 TE-LM-ADMIT:Admission control on link Ethernet4/0/1 [reason 1_10002:created [total 4] 1_10002: None -> New 1_10002: New -> Admitting 2nd Path Leg 1_10002: Admitting 2nd Path Leg -> Path Admitted has granted Path query for 10.106.0.6 1_10002 (10.112.0.12) 0] 1_10002: Path Admitted -> Admitting 1st Resv Leg 1_10002: Admitting 1st Resv Leg -> Resv Admitted has granted Resv query for 10.106.0.6 1_10002 (10.112.0.12) 0]
DB-1820
December 2010
Syntax Description
detail acl-number
(Optional) Prints detailed debugging information. (Optional) Uses the specified access list to filter the debugging information.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. The detail keyword and the acl-number argument were added. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about resource advertisements for traffic engineering interfaces:
Router# debug mpls traffic-eng link-management advertisements detail TE-LM-ADV:area isis level-1:IGP announcement:link Et4/0/1:info changed TE-LM-ADV:area isis level-1:IGP msg:link Et4/0/1:includes subnet type (2), described nbrs (1) TE-LM-ADV:area isis level-1:IGP announcement:link Et4/0/1:info changed TE-LM-ADV:area isis level-1:IGP msg:link Et4/0/1:includes subnet type (2), described nbrs (1) TE-LM-ADV:LSA:Flooding manager received message:link information change (Et4/0/1) TE-LM-ADV:area isis level-1:*** Flooding node information *** System Information:: Flooding Protocol: ISIS Header Information:: IGP System ID: 0001.0000.0001.00 MPLS TE Router ID: 10.106.0.6
DB-1821
Flooded Links: 1 Link ID:: 0 Link IP Address: 10.1.0.6 IGP Neighbor: ID 0001.0000.0001.02 Admin. Weight: 10 Physical Bandwidth: 10000 kbits/sec Max Reservable BW: 5000 kbits/sec Downstream:: Reservable Bandwidth[0]: 5000 kbits/sec Reservable Bandwidth[1]: 2000 kbits/sec Reservable Bandwidth[2]: 2000 kbits/sec Reservable Bandwidth[3]: 2000 kbits/sec Reservable Bandwidth[4]: 2000 kbits/sec Reservable Bandwidth[5]: 2000 kbits/sec Reservable Bandwidth[6]: 2000 kbits/sec Attribute Flags: 0x00000000
Field Flooding Protocol IGP System ID MPLS TE Router ID Flooded Links Link ID Link IP Address IGP Neighbor Admin. Weight Physical Bandwidth Max Reservable BW Reservable Bandwidth Attribute Flags
Description Interior Gateway Protocol (IGB) that is flooding information for this area. Identification that IGP flooding uses in this area to identify this node. MPLS traffic engineering router ID. Number of links that are flooded in this area. Index of the link that is being described. Local IP address of this link. IGP neighbor on this link. Administrative weight associated with this link. Links bandwidth capacity (in kbps). Maximum amount of bandwidth that is currently available for reservation at this priority. Amount of bandwidth that is available for reservation. Attribute flags of the link being flooded.
DB-1822
December 2010
Syntax Description
detail acl-number
(Optional) Prints detailed debugging information. (Optional) Uses the specified access list to filter the debugging information. Prints information only for those LSPs that match the access list.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. The detail keyword and the acl-number argument were added. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, information is printed about bandwidth allocation for traffic engineering LSPs:
Router# debug mpls traffic-eng link-management bandwidth-allocation TE-LM-BW:tunnel Et4/0/1 TE-LM-BW:tunnel TE-LM-BW:tunnel Et4/0/1 TE-LM-BW:tunnel 10.106.0.6 1_10002:requesting Downstream bw hold (3000000 bps [S]) on link 10.106.0.6 1_10002:Downstream bw hold request succeeded 10.106.0.6 1_10002:requesting Downstream bw lock (3000000 bps [S]) on link 10.106.0.6 1_10002:Downstream bw lock request succeeded_Rs
DB-1823
Related Commands
Command debug mpls traffic-eng link-management admission-control debug mpls traffic-eng link-management errors
Description Prints information about traffic engineering LSP admission control on traffic engineering interfaces. Prints information about errors encountered during any traffic engineering link management procedure.
DB-1824
December 2010
Syntax Description
detail
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about errors encountered during a traffic engineering link management procedure:
Router# debug mpls traffic-eng link-management errors detail 00:04:48 TE-LM-ROUTING: link Et1/1/1: neighbor 0010.0000.0012.01: add to IP peer db failed
Related Commands
Command debug mpls traffic-eng link-management admission-control debug mpls traffic-eng link-management advertisements debug mpls traffic-eng link-management bandwidth-allocation
Description Prints information about traffic engineering LSP admission control on traffic engineering interfaces. Prints information about resource advertisements for traffic engineering interfaces. Prints information about bandwidth allocation for traffic engineering LSPs.
DB-1825
Command
Description
debug mpls traffic-eng link-management events Prints information about traffic engineering link management system events. debug mpls traffic-eng link-management igp-neighbors debug mpls traffic-eng link-management links Prints information about changes to the link management databases of IGP neighbors. Prints information about traffic engineering link management interface events.
DB-1826
December 2010
Syntax Description
detail
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T and the detail keyword was added. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about traffic engineering link management system events:
Router# debug mpls traffic-eng link-management events detail TE-LM-EVENTS:stopping MPLS TE Link Management process TE-LM-EVENTS:MPLS TE Link Management process dying now
DB-1827
Syntax Description
detail
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T and the detail keyword was added. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about changes to the link management database of IGP neighbors:
Router# debug mpls traffic-eng link-management igp-neighbors detail TE-LM-NBR:link AT0/0.2:neighbor 0001.0000.0002.00:created (isis level-1, 10.42.0.10, Up)[total 2]
Related Commands
DB-1828
December 2010
Syntax Description
detail
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T and the detail keyword was added. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about traffic engineering link management interface events:
Router# debug mpls traffic-eng link-management links detail TE-LM-LINKS:link AT0/0.2:RSVP enabled TE-LM-LINKS:link AT0/0.2:increasing RSVP bandwidth from 0 to 5000000 TE-LM-LINKS:link AT0/0.2:created [total 2] TE-LM-LINKS:Binding MPLS TE LM Admission Control as the RSVP Policy Server on ATM0/0.2 TE-LM-LINKS:Bind attempt succeeded TE-LM-LINKS:link AT0/0.2:LSP tunnels enabled
DB-1829
Syntax Description
detail
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about traffic engineering LSP preemption:
Router# debug mpls traffic-eng link-management preemption detail TE-LM-BW:preempting Downstream bandwidth, 1000000, for tunnel 10.106.0.6 2_2 TE-LM-BW:building preemption list to get bandwidth, 1000000, for tunnel 10.106.0.6 2_2 (priority 0) TE-LM-BW:added bandwidth, 3000000, from tunnel 10.106.0.6 1_2 (pri 1) to preemption list TE-LM-BW:preemption list build to get bw, 1000000, succeeded (3000000) TE-LM-BW:preempting bandwidth, 1000000, using plist with 1 tunnels TE-LM-BW:tunnel 10.106.0.6 1_2:being preempted on AT0/0.2 by 10.106.0.6 2_2 TE-LM-BW:preemption of Downstream bandwidth, 1000000, succeeded
DB-1830
December 2010
Syntax Description
detail
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T and the detail keyword was added. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about traffic engineering link management routing resolutions that can be performed to help RSVP interpret explicit route objects:
Router# debug mpls traffic-eng link-management routing detail TE-LM-ROUTING:route options to 10.42.0.10:building list (w/ nhop matching) TE-LM-ROUTING:route options to 10.42.0.10:adding {AT0/0.2, 10.42.0.10} TE-LM-ROUTING:route options to 10.42.0.10:completed list has 1 links
Related Commands
DB-1831
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, information is printed about unequal cost load balancing over traffic engineering tunnels:
Router# debug mpls traffic-eng load-balancing TE-Load:10.210.0.0/16, 2 routes, loadbalancing based on MPLS TE bandwidth TE-Load:10.200.0.0/16, 2 routes, loadbalancing based on MPLS TE bandwidth
DB-1832
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB and implemented on the Cisco 10000 series routers. This command was integrated into Cisco IOS Release 12.2(28)SRA. This command was integrated into Cisco IOS Release 12.2(28)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command and enable TE globally:
00:10:23: TE-LSD-CLIENT: register with LSD OK; conn_id = 23, recov time = 60000 s 00:10:23: TE-LSD-CLIENT: LSD is now up
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command and disable TE globally:
00:09:50: TE-LSD-CLIENT: unregister LSD client; result = OK; conn_id 23
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command and enable TE on specific interfaces on Cisco 7500 series routers:
00:10:23: TE-LSD-CLIENT: enabled TE LSD client on Ethernet1/0; status = OK 00:10:23: TE-LSD-CLIENT: enabled TE LSD client on Serial2/0; status = OK 00:10:23: TE-LSD-CLIENT: enabled TE LSD client on Serial3/0; status = OK
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command and disable TE on specific interfaces on Cisco 7500 series routers:
00:09:50: TE-LSD-CLIENT: disabled TE LSD client on Ethernet1/0; status = OK
DB-1833
00:09:50: TE-LSD-CLIENT: disabled TE LSD client on Serial2/0; status = OK 00:09:50: TE-LSD-CLIENT: disabled TE LSD client on Serial3/0; status = OK
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command and enable TE on specific interfaces on Cisco 10000 series routers:
00:10:23: TE-LSD-CLIENT: enabled TE LSD client on GigabitEthernet1/0/0; status = OK 00:10:23: TE-LSD-CLIENT: enabled TE LSD client on Serial2/0/0; status = OK 00:10:23: TE-LSD-CLIENT: enabled TE LSD client on Serial3/0/0; status = OK
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command and disable TE on specific interfaces on Cisco 10000 series routers:
00:09:50: TE-LSD-CLIENT: disabled TE LSD client on GigabitEthernet1/0/0; status = OK 00:09:50: TE-LSD-CLIENT: disabled TE LSD client on Serial2/0/0; status = OK 00:09:50: TE-LSD-CLIENT: disabled TE LSD client on Serial3/0/0; status = OK
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command, allocate labels on tunnel midpoints, and create tunnel midpoint rewrites on Cisco 7500 series routers:
00:14:04: TE-LSD-CLIENT: label alloc OK; label = 16, conn_id = 23 00:14:04: TE-LSD-CLIENT: Create TE mid rewrite for 10.100.100.100 1 [5], Result: OK 00:14:04: In: Serial3/0, 16 Out: Serial2/0, 3
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command, allocate labels on tunnel midpoints, and create tunnel midpoint rewrites on a Cisco 10000 series router:
00:14:04: TE-LSD-CLIENT: label alloc OK; label = 16, conn_id = 23 00:14:04: TE-LSD-CLIENT: Create TE mid rewrite for 10.100.100.100 1 [5], Result: OK 00:14:04: In: Serial3/0/0, 16 Out: Serial2/0/0, 3
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command, free labels on tunnel midpoints, and delete tunnel midpoints on a Cisco 7500 series router:
00:13:13: TE-LSD-CLIENT: Delete TE mid rewrite for iou-100_t1, Result: OK 00:13:13: In: Serial3/0, 16 Out: Serial2/0, 1 00:13:13: TE-LSD-CLIENT: free label 16 result = OK; conn_id = 23
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command, free labels on tunnel midpoints, and delete tunnel midpoints on a Cisco 10000 series router:
00:13:13: TE-LSD-CLIENT: Delete TE mid rewrite for iou-100_t1, Result: OK 00:13:13: In: Serial3/0/0, 16 Out: Serial2/0/0, 1 00:13:13: TE-LSD-CLIENT: free label 16 result = OK; conn_id = 23
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command and create tunnel headend rewrites on a Cisco 7500 series router:
00:09:10: TE-LSD-CLIENT: Create TE he rewrite for iou-100_t1, Result = OK 00:09:10: tun_inst: 7 Out: Serial3/0, 16 Dest: 10.0.0.2 ps_flags: 0x60003
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command and create tunnel headend rewrites on a Cisco 10000 series router:
00:09:10: TE-LSD-CLIENT: Create TE he rewrite for iou-100_t1, Result = OK 00:09:10: tun_inst: 7 Out: Serial3/0/0, 16 Dest: 10.0.0.2 ps_flags: 0x60003
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command and delete tunnel headend rewrites on a Cisco 7500 series router:
00:09:15: TE-LSD-CLIENT: Delete TE he rewrite for iou-100_t1, Result: OK 00:09:15: tun_inst: 7 Out: Serial3/0, 16 ps_flags: 0x60003
DB-1834
December 2010
The following messages are displayed when you issue the debug mpls traffic-eng lsd-client command and delete tunnel headend rewrites on a Cisco 10000 series router:
00:09:15: TE-LSD-CLIENT: Delete TE he rewrite for iou-100_t1, Result: OK 00:09:15: tun_inst: 7 Out: Serial3/0/0, 16 ps_flags: 0x60003
Related Commands
Command debug mpls ip iprm events debug mpls ip iprm ldm debug mpls ip iprm mfi
Description Displays events related to the MPLS IPRM. Displays debugging information for interactions between the IP LDMs and the MPLS IPRM. Displays debugging information for interactions between the MFI and the MPLS IPRM.
DB-1835
Syntax Description
Displays path calculation application programming interface (API) events. Displays detailed path calculation information. Displays path calculation error event information. The specific tunnel for which path calculation information is displayed. Valid values are 065535. Displays information for path lookup events. Displays information for shortest path first (SPF) calculations. Displays information for path verifications.
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was modified. The api, dump, and errors keywords were added.
12.2(33)SRE
Examples
In the following example, information is printed about the calculation of the traffic engineering path:
Router# debug mpls traffic-eng path lookup TE-PCALC:Tunnel1000 Path Setup to 10.110.0.10:FULL_PATH TE-PCALC:bw 0, min_bw 0, metric:0 TE-PCALC:setup_pri 0, hold_pri 0 TE-PCALC:affinity_bits 0x0, affinity_mask 0xFFFF TE-PCALC_PATH:create_path_hoplist:ip addr 10.42.0.6 unknown.
DB-1836
December 2010
Syntax Description
Command Modes
Command History
Release 12.2(33)SXH
Usage Guidelines
If you report a problem and the show mpls traffic-eng process-restart iprouting displays abnormal results, your technical support representative might ask you to issue the debug mpls traffic-eng process-restart command, then perform an IP routing process restart and capture the output for analysis.
Examples
The following example shows partial output from an IP routing process restart:
Router# debug mpls traffic-eng process-restart 02:24:22: 02:24:22: 02:24:22: 02:24:22: 02:24:22: 02:24:22: 02:24:22: 02:24:22: 02:24:22: 02:24:22: 02:24:22: SM: ---TE ION Process Restart 0x78EF9050: process restart (3) SM: NORM (1) --> AWAIT-CFG (3) TE ION Restart timer started, proc_idx:0 delay:120000 SM: ---TE ION Process Restart 0x78EF9050: process cfg replay start (4) SM: AWAIT-CFG (3) --> CFG (4) TE ION Restart timer started, proc_idx:0 delay:300000 SM: ---TE ION Process Restart 0x78EF9050: reg invoke succeeded (2) SM: CFG (4) --> CFG (4) SM: ---TE ION Process Restart 0x78EF9050: process cfg replay done (5) SM: CFG (4) --> SYNC (5) TE ION Restart timer started, proc_idx:0 delay:900000
The output shows typical process restart information that your technical support representative might request if you report a problem after an IP routing process restart. The information displayed can vary, depending on the conditions that caused the restart.
Related Commands
Description Displays the status of IP routing and MPLS traffic engineering synchronization after an IP routing process restarts.
DB-1837
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, information is printed about traffic engineering topology change events:
Router# debug mpls traffic-eng topology change TE-PCALC_LSA:NODE_CHANGE_UPDATE isis level-1 link flags:LINK_CHANGE_BW system_id:0001.0000.0001.00, my_ip_address:10.42.0.6 nbr_system_id:0001.0000.0002.00, nbr_ip_address 10.42.0.10
DB-1838
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, information is printed about traffic engineering topology LSA events:
Router# debug mpls traffic-eng topology lsa TE-PCALC_LSA:node_lsa_add:Received a LSA:flags 0x1 ! IGP Id:0001.0000.0001.00, MPLS TE Id:10.106.0.6 is VALID has 2 links (frag_id 0) link[0 ]:Nbr IGP Id:0001.0000.0001.02 frag_id 0, Intf Address:0.0.0.0 admin_weight:10, attribute_flags:0x0 link[1 ]:Nbr IGP Id:0001.0000.0002.00 frag_id 0, Intf Address:10.42.0.6, Nbr Intf Address:10.42.0.10 admin_weight:100, attribute_flags:0x0 TE-PCALC_LSA:(isis level-1):Received lsa:
DB-1839
IGP Id:0001.0000.0001.00, MPLS TE Id:10.106.0.6 Router Node id 8 link[0 ]:Nbr IGP Id:0001.0000.0002.00, nbr_node_id:9, gen:114 frag_id 0, Intf Address:10.42.0.6, Nbr Intf Address:10.42.0.10 admin_weight:100, attribute_flags:0x0 physical_bw:155520 (kbps), max_reservable_bw:5000 (kbps) allocated_bw reservable_bw allocated_bw reservable_bw ----------------------------------------------bw[0]:0 5000 bw[1]:3000 2000 bw[2]:0 2000 bw[3]:0 2000 bw[4]:0 2000 bw[5]:0 2000 bw[6]:0 2000 bw[7]:0 2000
DB-1840
December 2010
Syntax Description
detail
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about errors encountered during a traffic engineering tunnel management procedure:
Router# debug mpls traffic-eng tunnels errors 00:04:14: LSP-TUNNEL-SIG: Tunnel10012[1]: path verification failed (unprotected) [Cant use link 10.12.4.4 on node 10.0.0.4]
DB-1841
Syntax Description
detail
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T and the detail keyword was added. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about traffic engineering tunnel management system events:
Router# debug mpls traffic-eng tunnels events detail LSP-TUNNEL:received event:interface admin. down [Ethernet4/0/1] LSP-TUNNEL:posting action(s) to all-tunnels: check static LSPs LSP-TUNNEL:scheduling pending actions on all-tunnels LSP-TUNNEL:applying actions to all-tunnels, as follows: check static LSPs
DB-1842
December 2010
Syntax Description
detail acl-number
(Optional) Prints detailed debugging information. (Optional) Uses the specified access list to filter the debugging information. Prints information only about traffic engineering tunnels that match the access list.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T, and the detail keyword and the acl-number argument were added. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about MPLS label management for traffic engineering tunnels:
Router# debug mpls traffic-eng tunnels labels detail LSP-TUNNEL-LABELS:tunnel 10.106.0.6 1 [2]:fabric PROGRAM request LSP-TUNNEL-LABELS:tunnel 10.106.0.6 1 [2]:programming label 16 on output interface ATM0/0.2 LSP-TUNNEL-LABELS:descriptor 71FA64:continuing Program request LSP-TUNNEL-LABELS:descriptor 71FA64:set Interface Point Out State to, allocated LSP-TUNNEL-LABELS:# of resource points held for default interfaces:2 LSP-TUNNEL-LABELS:descriptor 71FA64:set Fabric State to, enabled LSP-TUNNEL-LABELS:descriptor 71FA64:set Fabric Kind to, default (LFIB) LSP-TUNNEL-LABELS:descriptor 71FA64:set Fabric State to, set LSP-TUNNEL-LABELS:tunnel 10.106.0.6 1 [2]:fabric PROGRAM reply
DB-1843
To restrict output to information about a single tunnel, you can configure an access list and supply it to the debug command. Configure the access list as follows:
Router(config-ext-nacl)# permit udp host scr_address host dst_address eq tun intfc
For example, if tunnel 10012 has destination 10.0.0.11 and source 10.0.0.4, as determined by the show mpls traffic-eng tunnels command, the following access list could be configured and added to the debug command:
Router(config-ext-nacl)# permit udp host 10.0.0.4 10.0.0.11 eq 10012
DB-1844
December 2010
Syntax Description
detail acl-number
(Optional) Prints detailed debugging information. (Optional) Uses the specified access list to filter the debugging information. Prints information about only those traffic engineering tunnel reoptimizations that match the access list.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T, and the detail keyword and the acl-number argument were added. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about traffic engineering tunnel reoptimizations that match access list number 101:
Router# debug mpls traffic-eng tunnels reoptimize detail 101 LSP-TUNNEL-REOPT:Tunnel1 LSP-TUNNEL-REOPT:Tunnel1 LSP-TUNNEL-REOPT:Tunnel1 LSP-TUNNEL-REOPT:Tunnel1 LSP-TUNNEL-REOPT:Tunnel1 LSP-TUNNEL-REOPT:Tunnel1 LSP-TUNNEL-REOPT:Tunnel1 LSP-TUNNEL-REOPT:Tunnel1 LSP-TUNNEL-REOPT:Tunnel1 curr option 2 (0x6175CF8C), activate new option 2 new path:option 2 [10002], weight 20 old path:option 2 [2], weight 110 [10002] set as reopt path option 2 [10002] installing as current [2] removed as current [2] set to delayed clean [10002] removed as reopt [10002] set to current
DB-1845
Syntax Description
detail acl-number
(Optional) Prints detailed debugging information. (Optional) Uses the specified access list to filter the debugging information. Prints information about only those traffic engineering tunnel signalling operations that match the access list.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T, and the detail keyword and the acl-number argument were added. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about traffic engineering tunnel signalling operations that match access list number 101:
Router# debug mpls traffic-eng tunnels signalling detail 101 LSP-TUNNEL-SIG:tunnel Tunnel1 [2]:RSVP head-end open LSP-TUNNEL-SIG:tunnel Tunnel1 [2]:received Path NHOP CHANGE LSP-TUNNEL-SIG:Tunnel1 [2]:first hop change:0.0.0.0 --> 10.1.0.10 LSP-TUNNEL-SIG:received ADD RESV request for tunnel 10.106.0.6 1 [2] LSP-TUNNEL-SIG:tunnel 10.106.0.6 1 [2]:path next hop is 10.1.0.10 (Et4/0/1) LSP-TUNNEL-SIG:Tunnel1 [2] notified of new label information LSP-TUNNEL-SIG:sending ADD RESV reply for tunnel 10.106.0.6 1 [2]
DB-1846
December 2010
Syntax Description
detail acl-number
(Optional) Prints detailed debugging information. (Optional) Uses the specified access list to filter the debugging information. Prints information about state maintenance for traffic engineering tunnels that match the access list.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about state maintenance for traffic engineering tunnels that match access list number 99:
Router# debug mpls traffic-eng tunnels state detail 99 LSP-TUNNEL:tunnel 10.106.0.6 1 [2]: Connected -> Disconnected LSP-TUNNEL:Tunnel1 received event:LSP has gone down LSP-TUNNEL:tunnel 10.106.0.6 1 [2]: Disconnected -> Dead LSP-TUNNEL-SIG:Tunnel1:changing state from up to down LSP-TUNNEL:tunnel 10.106.0.6 1 [2]: Dead -> Connected
DB-1847
Syntax Description
detail acl-number
(Optional) Prints detailed debugging information. (Optional) Uses the specified access list to filter the debugging information. Prints information about traffic engineering tunnel timer management that matches the access list.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(3)T, and the detail keyword and the acl-number argument were added. This command was integrated into Cisco IOS Release 12.0(10)ST. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, detailed debugging information is printed about traffic engineering tunnel timer management:
Router# debug mpls traffic-eng tunnels timers detail LSP-TUNNEL-TIMER:timer fired for Action Scheduler LSP-TUNNEL-TIMER:timer fired for Tunnel Head Checkup
DB-1848
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The following example shows sample output from the debug mpls vpn ha command:
Router# debug mpls vpn ha VPN HA debugging is on.
DB-1849
Effective Cisco IOS Release 12.4(20)T, the debug mpls xtagatm cross-connect command is not available in Cisco IOS software. To display requests and responses for establishing and removing cross-connects on the controlled ATM switch, use the debug mpls xtagatm cross-connect command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mpls xtagatm cross-connect no debug mpls xtagatm cross-connect
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was updated to reflect the Multiprotocol Label Switching (MPLS) Internet Engineering Task Force (IETF) terminology. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was removed.
12.4(20)T
Usage Guidelines
This command monitors requests to establish or remove cross-connects from XmplsATM interfaces to the Virtual Switch Interface (VSI) master, as well as the VSI master responses to these requests.
Note
Use this command with care, because it generates output for each cross-connect operation performed by the label switch controller (LSC). In a network configuration with many label virtual circuits (LVCs), the volume of output generated can interfere with system timing and the proper operation of other router functions. Use this command only in situations in which the LVC setup or teardown rate is low.
Examples
The following is sample output from the debug mpls xtagatm cross-connect command:
Router# debug mpls xtagatm cross-connect
DB-1850
December 2010
XTagATM: cross-conn request; SETUP, userdata 0x17, userbits 0x1, prec 7 0xC0100 (Ctl-If) 1/32 <-> 0xC0200 (XTagATM0) 0/32 XTagATM: cross-conn response; DOWN, userdata 0x60CDCB5C, userbits 0x2, result OK 0xC0200 1/37 --> 0xC0300 1/37
Field XTagATM cross-conn request response SETUP TEARDOWN UP DOWN userdata, userbits prec result 0xC0100 (Ctl-If) 1/32
Description The source of the debugging message as an XmplsATM interface. An indicator that the debugging message pertains to a cross-connect setup or teardown operation. A request from an XmplsATM interface to the VSI master to set up or tear down a cross-connect. Response from the VSI master to an XmplsATM interface that a cross-connect was set up or removed. A request for the setup of a cross-connect. A request for the teardown of a cross-connect. The cross-connect is established. The cross-connect is not established. Values passed with the request that are returned in the corresponding fields in the matching response. The precedence for the cross-connect. The status of the completed request. Information about the interface:
One endpoint of the cross-connect is on the interface whose logical interface number is 0xC0100. The interface is the VSI control interface. The virtual path identifier (VPI) value at this endpoint is 1. The virtual channel identifier (VCI) value at this end of the cross-connect is 32.
The other endpoint of the cross-connect is on the interface whose logical interface number is 0xC0200. The interface is associated with XmplsATM interface 0. The VPI value at this endpoint is 0. The VCI value at this end of the cross-connect is 32.
->
DB-1851
Related Commands
DB-1852
December 2010
Effective with Cisco IOS Release 12.4(20)T, the debug mpls xtagatm errors command is not available in Cisco IOS software. To display information about error and abnormal conditions that occur on XmplsATM interfaces, use the debug mpls xtagatm errors command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mpls xtagatm errors no debug mpls xtagatm errors
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was updated to reflect the Multiprotocol Label Switching (MPLS) Internet Engineering Task Force (IETF) terminology. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was removed.
12.4(20)T
Usage Guidelines
Use the debug mpls xtagatm errors command to display information about abnormal conditions and events that occur on XmplsATM interfaces.
Examples
The following is sample output from the debug mpls xtagatm errors command:
Router# debug mpls xtagatm errors XTagATM VC: XTagATM0 1707 2/352 (ATM1/0 1769 3/915): Cross-connect setup failed NO_RESOURCES
This message indicates a failed attempt to set up a cross-connect for a terminating a virtual circuit (VC) on XmplsATM0. The reason for the failure was a lack of resources on the controlled ATM switch.
DB-1853
Effective with Cisco IOS Release 12.4(20)T, the debug mpls xtagatm events command is not available in Cisco IOS software. To display information about major events that occur on XmplsATM interfaces, not including events for specific XmplsATM virtual circuits (VCs) and switch cross-connects, use the debug mpls xtagatm events command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mpls xtagatm events no debug mpls xtagatm events
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was updated to reflect the Multiprotocol Label Switching (MPLS) Internet Engineering Task Force (IETF) terminology. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was removed.
12.4(20)T
Usage Guidelines
Use the debug mpls xtagatm events command to monitor major events that occur on XmplsATM interfaces. This command monitors events that pertain only to XmplsATM interfaces as a whole and does not include any events that pertain to individual XmplsATM VCs or individual switch cross-connects. The specific events that are monitored when the debug mpls xtagatm events command is in effect include the following:
Receiving asynchronous notifications that the VSI master sent through the external ATM application programming interface (ExATM API) to an XmplsATM interface. Resizing of the table that is used to store switch cross-connect information. This table is resized automatically as the number of cross-connects increases. Marking of XmplsATM VCs as stale when an XmplsATM interface shuts down, thereby ensuring that the stale interfaces are refreshed before new XmplsATM VCs can be created on the interface.
DB-1854
December 2010
Examples
The following is sample output from the debug mpls xtagatm events command:
Router# debug mpls xtagatm events XTagATM: XTagATM: XTagATM: XTagATM: desired cross-connect table size set to 256 ExATM API intf event Up, port 0xA0100 (None) ExATM API intf event Down, port 0xA0100 (None) marking all VCs stale on XTagATM0
Description The source of the debugging message. The table of cross-connect information has been set to hold 256 entries. A single cross-connect table is shared among all XmplsATM interfaces. The cross-connect table is automatically resized as the number of cross-connects increases. The information in the debug output pertains to an asynchronous notification sent by the Virtual Switch Interface (VSI) master to the XmplsATM driver. The specific event that was sent by the VSI master to the XmplsATM driver. The event pertains to the VSI interface whose logical interface number is 0xA0100, and that this logical interface is not bound to an XmplsATM interface. All existing XmplsATM VCs on interface XmplsATM0 are marked as stale, and that XmplsATM0 remains down until all of these VCs are refreshed.
ExATM API
DB-1855
Effective with Cisco IOS Release 12.4(20)T, the debug mpls xtagatm vc command is not available in Cisco IOS software. To display information about events that affect individual XmplsATM terminating virtual circuits (VCs), use the debug mpls xtagatm vc command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mpls xtagatm vc no debug mpls xtagatm vc
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was updated to reflect the Multiprotocol Label Switching (MPLS) Internet Engineering Task Force (IETF) terminology. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was removed.
12.4(20)T
Usage Guidelines
Use the debug mpls xtagatm vc command to display detailed information about all events that affect individual XmplsATM terminating VCs.
Note
Use this command with care, because it results in extensive output when many XmplsATM VCs are set up or torn down. This output can interfere with system timing and normal operation of other router functions. Use the debug mpls xtagatm vc command only when a few XmplsATM VCs are created or removed.
Examples
The following is sample output from the debug mpls xtagatm vc command:
Router# debug mpls xtagatm vc
DB-1856
December 2010
18 18 19 43
0 0/0): Setup, Down 88 1/32): Complete, 0 0/0): Setup, Down 67 1/84): Teardown,
Field XTagATM VC XTagATM <ifnum> vcd vpi/vci (ctl-if vcd vpi/vci) Setup, Complete, Teardown oldstate -> newstate
Description The source of the debugging message. The particular XmplsATM interface number for the terminating VC. The virtual circuit descriptor (VCD) and virtual path identifier/virtual channel identifier (VPI/VCI) values for the terminating VC. The control interface, the VCD, and the VPI and VCI values for the private VC corresponding to the XmplsATM VC on the control interface. The name of the event that occurred for the indicated VC. The state of the terminating VC before and after the processing of the event.
DB-1857
Syntax Description
Displays debugging information for all MPC activity. Displays debugging information for data plane activity only. This option applies only to routers. Displays debugging information for egress functionality only. Displays general debugging information only. Displays debugging information for ingress functionality only. Displays debugging information for keep-alive activity only. Displays debugging information for specific platforms only. This option applies only to the Catalyst 5000 series ATM module. (Optional) Specifies the name of the MPC with the specified name.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following shows how to turn on debugging for the MPC ip_mpc:
ATM# debug mpoa client all name ip_mpc
Related Commands
DB-1858
December 2010
Syntax Description
name mps-name
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug mpoa server command optionally limits the output only to the specified MPOA Server (MPS).
Examples
The following turns on debugging only for the MPS named ip_mps:
Router# debug mpoa server name ip_mps
DB-1859
debug mrcp
To display debugging messages for Media Resource Control Protocol (MRCP) operations, use the debug mrcp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mrcp {all | api | detail | error | pmh | session | socket | state} no debug mrcp {all | api | detail | error | pmh | session | socket | state}
Syntax Description
Displays all MRCP debugging messages. Displays messages between the application and the MRCP stack. Displays detailed MRCP version 2 (MRCP v2) debugging messages. Displays MRCP error messages. Displays protocol message handler (PMH) messages. Displays messages about active MRCP sessions. Displays MRCP v2 socket debugging messages Displays Finite State Machine (FSM) messages.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 3640, Cisco 3660, Cisco AS5300, Cisco AS5350, and Cisco AS5400. This command was modified to support MRCP v2. The detail and socket keywords were added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows output from the debug mrcp api command:
Router# debug mrcp api
The first four lines show Real Time Streaming Protocol (RTSP) socket commands for Text-To-Speech (TTS) operations:
*Apr *Apr *Apr *Apr 17 17 17 17 16:31:16.323:mrcp_add_param:param:Kill-On-Barge-In: 16:31:16.323:mrcp_add_param:param:Speech-Language: 16:31:16.323:mrcp_add_param:param:Logging-Tag: 16:31:16.323:mrcp_add_param:param:Content-Base:
DB-1860
December 2010
17 17 17 17 17
The following lines show RTSP socket commands for Automatic Speech Recognition (ASR) operations:
*Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 16:31:16.323:mrcp_add_param:param:Confidence-Threshold: 16:31:16.323:mrcp_add_param:param:Sensitivity-Level: 16:31:16.323:mrcp_add_param:param:Speed-Vs-Accuracy: 16:31:16.323:mrcp_add_param:param:Dtmf-Interdigit-Timeout: 16:31:16.323:mrcp_add_param:param:Dtmf-Term-Timeout: 16:31:16.323:mrcp_add_param:param:Dtmf-Term-Char: 16:31:16.323:mrcp_add_param:param:No-Input-Timeout: 16:31:16.323:mrcp_add_param:param:Logging-Tag: 16:31:16.327:mrcp_add_param:param:Content-Base: 16:31:16.327:mrcp_add_param:param:Recognizer-Start-Timers: 16:31:16.327:mrcp_recognizer_start 5 16:31:26.715:mrcp_add_param:param:Kill-On-Barge-In: 16:31:26.715:mrcp_add_param:param:Speech-Language: 16:31:26.715:mrcp_add_param:param:Logging-Tag: 16:31:26.715:mrcp_add_param:param:Content-Base: 16:31:26.715:mrcp_synth_speak 5 16:31:30.451:mrcp_destroy_session 5 type:SYNTHESIZER 16:31:30.451:mrcp_destroy_session 5 type:RECOGNIZER
The following examples show output from the debug mrcp error command:
Router# debug mrcp error
This output shows an error when the response from the server is incorrect:
*May *May 9 20:29:09.936:Response from 10.1.2.58:554 failed 9 20:29:09.936:MRCP/1.0 71 422 COMPLETE
This output shows an error when the RTSP connection to the server fails:
*May 9 20:29:09.936:Connecting to 10.1.2.58:554 failed
This output shows an error when the recognize request comes out of sequence:
*May 9 20:29:09.936:act_idle_recognize:ignoring old recognize request
The following example shows output from the debug mrcp pmh command:
Router# debug mrcp pmh *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 16:32:51.777:param:Kill-On-Barge-In: true 16:32:51.777:param:Speech-Language: en-US 16:32:51.777:param:Logging-Tag: 14:14 16:32:51.777:param:Content-Base: http://server-asr/ 16:32:51.777:param:Content-Base: http://server-asr/ 16:32:51.777:param:Confidence-Threshold: 50 16:32:51.781:param:Sensitivity-Level: 50 16:32:51.781:param:Speed-Vs-Accuracy: 50 16:32:51.781:param:Dtmf-Interdigit-Timeout: 10000 16:32:51.781:param:Dtmf-Term-Timeout: 10000 16:32:51.781:param:Dtmf-Term-Char: # 16:32:51.781:param:No-Input-Timeout: 10000 16:32:51.781:param:Logging-Tag: 14:14 16:32:51.781:param:Content-Base: http://server-asr/ 16:32:51.781:param:Recognizer-Start-Timers: false 16:32:51.877:GRAMMAR-CONTENT-HEADER 16:32:51.877:Content-Type:application/grammar+xml
DB-1861
Content-Id:[email protected] Content-Length:356 *Apr 17 16:32:51.885:GRAMMAR-CONTENT-HEADER *Apr 17 16:32:51.885:Content-Type:text/uri-list Content-Length:30 *Apr 17 16:32:51.885:Total-Length=365 *Apr 17 16:32:51.885:@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ *Apr 17 16:32:51.885:RECOGNIZE 20 MRCP/1.0 Confidence-Threshold:50 Sensitivity-Level:50 Speed-Vs-Accuracy:50 Dtmf-Interdigit-Timeout:10000 Dtmf-Term-Timeout:10000 Dtmf-Term-Char:# No-Input-Timeout:10000 Logging-Tag:14:14 Content-Base:http://server-asr/ Recognizer-Start-Timers:false *Apr 17 16:32:51.885:Content-Type:text/uri-list Content-Length:30 *Apr 17 16:32:51.885:session:[email protected] *Apr 17 16:32:51.885:@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ *Apr 17 16:32:51.889:SPEECH-MARKUP-TYPE-HEADER *Apr 17 16:32:51.889:Content-Type:application/synthesis+ssml Content-Length:126 *Apr 17 16:32:51.889:Total-Length=313 *Apr 17 16:32:51.889:@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ *Apr 17 16:32:51.889:SPEAK 18 MRCP/1.0 Kill-On-Barge-In:true Speech-Language:en-US Logging-Tag:14:14 Content-Base:http://server-asr/ *Apr 17 16:32:51.889:Content-Type:application/synthesis+ssml Content-Length:126 *Apr 17 16:32:51.889:<?xml version="1.0"?><speak> Who do you want speak to?? Joe, Carl, Alex?. And I am extending the length of the text</speak> *Apr 17 16:32:51.889:@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ *Apr Apr *Apr *Apr *Apr *Apr Apr *Apr *Apr *Apr *Apr Apr *Apr *Apr *Apr *Apr Apr 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 16:32:51.925:mrcp_pmh_parse_response:Length:28 16:32:51.925:mrcp_pmh_get_request_line:Line:MRCP/1.0 19 200 COMPLETE 16:32:51.925:Request-tag:19 resp-code:200 Status:COMPLETE 16:32:51.925:No Of Properties:0 16:32:51.925:mrcp_process_recog_response: 16:32:51.933:mrcp_pmh_parse_response:Length:31 16:32:51.933:mrcp_pmh_get_request_line:Line:MRCP/1.0 20 200 IN-PROGRESS 16:32:51.933:Request-tag:20 resp-code:200 Status:IN-PROGRESS 16:32:51.933:No Of Properties:0 16:32:51.933:mrcp_process_recog_response: 16:32:53.413:mrcp_pmh_parse_response:Length:31 16:32:53.413:mrcp_pmh_get_request_line:Line:MRCP/1.0 18 200 IN-PROGRESS 16:32:53.413:Request-tag:18 resp-code:200 Status:IN-PROGRESS 16:32:53.413:No Of Properties:0 16:32:53.413:mrcp_process_synth_response: 16:33:01.685:mrcp_pmh_parse_response:Length:100 16:33:01.689:mrcp_pmh_get_event_line:Line:SPEAK-COMPLETE 18 COMPLETE MRCP/1.0
DB-1862
December 2010
*Apr 17 16:33:01.689:Request-tag:18 resp-code:200 Status:COMPLETE *Apr 17 16:33:01.689:No Of Properties:2 *Apr 17 16:33:01.689:mrcp_process_synth_events: *Apr 17 16:33:01.689: COMPLETION-CAUSE:1 *Apr 17 16:33:01.689:mrcp_send_synth_app_response: *Apr 17 16:33:01.689:mrcp_pmh_parse_response:Length:61 Apr 17 16:33:01.689:mrcp_pmh_get_event_line:Line:START-OF-SPEECH 20 IN-PROGRESS MRCP/1.0 *Apr 17 16:33:01.689:Request-tag:20 resp-code:200 Status:IN-PROGRESS *Apr 17 16:33:01.689:No Of Properties:1 *Apr 17 16:33:01.689:mrcp_process_recog_events: *Apr 17 16:33:02.653:mrcp_pmh_parse_response:Length:815 Apr 17 16:33:02.653:mrcp_pmh_get_event_line:Line:RECOGNITION-COMPLETE 20 COMPLETE MRCP/1.0 *Apr 17 16:33:02.653:Request-tag:20 resp-code:200 Status:COMPLETE *Apr 17 16:33:02.653:No Of Properties:2 *Apr 17 16:33:02.653:mrcp_process_recog_events: *Apr 17 16:33:02.653: COMPLETION-CAUSE:0 *Apr 17 16:33:02.653:mrcp_send_recog_app_response: *Apr 17 16:33:02.661:param:Kill-On-Barge-In: true *Apr 17 16:33:02.661:param:Speech-Language: en-US *Apr 17 16:33:02.661:param:Logging-Tag: 14:14 *Apr 17 16:33:02.661:param:Content-Base: http://server-asr/ *Apr 17 16:33:02.665:SPEECH-MARKUP-TYPE-HEADER *Apr 17 16:33:02.665:Content-Type:application/synthesis+ssml Content-Length:57 *Apr 17 16:33:02.665:Total-Length=243 *Apr 17 16:33:02.665:@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ *Apr 17 16:33:02.665:SPEAK 22 MRCP/1.0 Kill-On-Barge-In:true Speech-Language:en-US Logging-Tag:14:14 Content-Base:http://server-asr/ *Apr 17 16:33:02.665:Content-Type:application/synthesis+ssml Content-Length:57 *Apr 17 16:33:02.665:<?xml version="1.0"?><speak> You have joe mails</speak> *Apr 17 16:33:02.665:@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ *Apr Apr *Apr *Apr *Apr *Apr Apr *Apr *Apr *Apr *Apr *Apr 17 17 17 17 17 17 17 17 17 17 17 17 16:33:02.833:mrcp_pmh_parse_response:Length:31 16:33:02.833:mrcp_pmh_get_request_line:Line:MRCP/1.0 22 200 IN-PROGRESS 16:33:02.833:Request-tag:22 resp-code:200 Status:IN-PROGRESS 16:33:02.833:No Of Properties:0 16:33:02.833:mrcp_process_synth_response: 16:33:06.382:mrcp_pmh_parse_response:Length:98 16:33:06.382:mrcp_pmh_get_event_line:Line:SPEAK-COMPLETE 22 COMPLETE MRCP/1.0 16:33:06.382:Request-tag:22 resp-code:200 Status:COMPLETE 16:33:06.382:No Of Properties:2 16:33:06.382:mrcp_process_synth_events: 16:33:06.382: COMPLETION-CAUSE:0 16:33:06.382:mrcp_send_synth_app_response:
The following example shows output from the debug mrcp session command:
Router# debug mrcp session *Apr *Apr *Apr *Apr *Apr *Apr *Apr 17 17 17 17 17 17 17 16:34:07.851:mrcp_create_session: 16:34:07.851:mrcp_create_session:New SCB creation 16:34:07.851:mrcp_create_svr_session_url: 16:34:07.851:mrcp_create_session: 16:34:07.851:mrcp_create_session:Already an SCB is created for this call 16:34:07.851:mrcp_process_events:event:LIB_CONNECT SYNTHESIZERCONN-STATUS=0 16:34:07.855:mrcp_process_events:event:SPEAK SYNTHESIZER
DB-1863
*Apr 17 16:34:07.855:mrcp_process_events:event:SPEAK defered *Apr 17 16:34:07.855:mrcp_process_events:event:LIB_CONNECT RECOGNIZERCONN-STATUS=0 *Apr 17 16:34:07.855:mrcp_process_events:event:DEFINE_GRAMMAR RECOGNIZER *Apr 17 16:34:07.855:mrcp_process_events:event:DEFINE_GRAMMAR defered *Apr 17 16:34:07.855:mrcp_process_events:event:LIB_CONNECT RECOGNIZERCONN-STATUS=0 *Apr 17 16:34:07.855:mrcp_process_events:event:RECOGNIZE RECOGNIZER *Apr 17 16:34:07.855:mrcp_process_events:event:RECOGNIZE defered *Apr 17 16:34:07.855:mrcp_response_handler:status=RTSPLIB_STATUS_SERVER_CONNECTED *Apr 17 16:34:07.855:mrcp_process_events:event:LIB_CONNECTED SYNTHESIZERCONN-STATUS=4 *Apr 17 16:34:07.947:mrcp_response_handler:status=RTSPLIB_STATUS_RTP_RECORD_SETUP *Apr 17 16:34:07.947:mrcp_process_events:event:RECOG_RTP_SETUP RECOGNIZER *Apr 17 16:34:07.947:mrcp_process_defered_events:event:DEFINE_GRAMMAR *Apr 17 16:34:07.947:mrcp_process_defered_events:event:RECOGNIZECONN-STATUS=2 *Apr 17 16:34:07.971:mrcp_response_handler:status=RTSPLIB_STATUS_RECORD_ASSOCIATED *Apr 17 16:34:07.971:mrcp_response_handler:status=RTSPLIB_STATUS_RTP_PLAY_SETUP *Apr 17 16:34:07.975:mrcp_process_events:event:RECOGNIZER_ASSOCIATED RECOGNIZER *Apr 17 16:34:07.975:mrcp_process_events:event:SYNTH_RTP_SETUP SYNTHESIZER *Apr 17 16:34:07.975:mrcp_process_defered_events:event:SPEAKCONN-STATUS=1 *Apr 17 16:34:07.975:mrcp_response_handler:status=RTSPLIB_STATUS_PLAY_ASSOCIATED *Apr 17 16:34:07.975:mrcp_process_events:event:SYNTHESIZER_ASSOCIATED SYNTHESIZER *Apr 17 16:34:08.007:mrcp_response_handler:status=RTSPLIB_STATUS_RESP_OK *Apr 17 16:34:08.019:mrcp_response_handler:status=RTSPLIB_STATUS_RESP_OK *Apr 17 16:34:08.059:mrcp_response_handler:status=RTSPLIB_STATUS_RESP_OK *Apr 17 16:34:17.611:mrcp_response_handler:status=RTSPLIB_STATUS_RESP_OK *Apr 17 16:34:17.611:mrcp_response_handler:status=RTSPLIB_STATUS_RESP_OK *Apr 17 16:34:17.611:mrcp_process_events:event:SPEECH_COMPLETE SYNTHESIZER *Apr 17 16:34:17.611:mrcp_process_events:event:START_OF_SPEECH RECOGNIZER *Apr 17 16:34:18.575:mrcp_response_handler:status=RTSPLIB_STATUS_RESP_OK *Apr 17 16:34:18.575:mrcp_process_events:event:RECOGNITION_COMPLETE RECOGNIZER *Apr 17 16:34:18.583:mrcp_process_events:event:SPEAK SYNTHESIZER *Apr 17 16:34:18.587:mrcp_response_handler:status=RTSPLIB_STATUS_PLAY_ASSOCIATED *Apr 17 16:34:18.587:mrcp_process_events:event:SYNTHESIZER_ASSOCIATED SYNTHESIZER *Apr 17 16:34:18.763:mrcp_response_handler:status=RTSPLIB_STATUS_RESP_OK *Apr 17 16:34:22.279:mrcp_response_handler:status=RTSPLIB_STATUS_RESP_OK *Apr 17 16:34:22.283:mrcp_process_events:event:SPEECH_COMPLETE SYNTHESIZER *Apr 17 16:34:22.307:mrcp_process_events:event:LIB_DESTROY SYNTHESIZERCONN-STATUS=12 *Apr 17 16:34:22.311:mrcp_process_events:event:LIB_DESTROY RECOGNIZERCONN-STATUS=12 *Apr 17 16:34:22.311:mrcp_response_handler:status=RTSPLIB_STATUS_CLEANUP *Apr 17 16:34:22.315:mrcp_free_fsm: *Apr 17 16:34:22.315:mrcp_free_scb: *Apr 17 16:34:22.315:mrcp_create_session_history:scb=0x62C712F4 *Apr 17 16:34:22.315:mrcp_insert_session_history_record:current=0x62999544, callID=0x12 *Apr 17 16:34:22.315:mrcp_insert_session_history_record:count = 3 *Apr 17 16:34:22.315:mrcp_insert_session_history_record:starting history record deletion_timer of 10 minutes
The following example shows output from the debug mrcp state command:
Router# debug mrcp state *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr 17 17 17 17 17 17 17 17 16:35:25.141:mrcp_add_synthesizer_fsm:adding synthesizer fsm 16:35:25.141:mrcp_add_connection_fsm:adding connection fsm 16:35:25.141:mrcp_add_rtpsetup_fsm:adding rtpsetup fsm 16:35:25.145:hash_get: key=7 16:35:25.145:mrcp_add_recognizer_fsm:adding recognizer fsm 16:35:25.145:mrcp_add_connection_fsm:adding connection fsm 16:35:25.145:mrcp_add_rtpsetup_fsm:adding rtpsetup fsm 16:35:25.145:mrcp_fsm_execute:type=SYNTHESIZER
The following lines show the gateway connecting to the TTS server:
*Apr 17 16:35:25.145: curr[CONNECT_IDLE] next[CONNECTING] action=610B8FD00 *Apr 17 16:35:25.145:act_idle_libconnect ev-id[LIB_CONNECT]
DB-1864
December 2010
*Apr 17 16:35:25.145:mrcp_shortcut_connection_fsm *Apr 17 16:35:25.149:mrcp_fsm_execute:type=SYNTHESIZER *Apr 17 16:35:25.149: curr[CONNECTING] ev-id[LIB_CONNECT_PENDING] next[CONNECTING] action=610B90F80 *Apr 17 16:35:25.149:act_connecting_libpending *Apr 17 16:35:25.149:mrcp_fsm_execute:type=SYNTHESIZER *Apr 17 16:35:25.149: curr[CONNECTING] ev-id[LIB_CONNECT] next[CONNECTING] action=610B8D480 *Apr 17 16:35:25.149:act_connectfsm_error *Apr 17 16:35:25.149:mrcp_fsm_execute:type=SYNTHESIZER *Apr 17 16:35:25.149: curr[CONNECTING] ev-id[LIB_CONNECT]
The following lines show the gateway successfully connected to the TTS server:
next[CONNECTING] action=610B8D480 *Apr 17 16:35:25.149:act_connectfsm_error *Apr 17 16:35:25.149:mrcp_fsm_execute:type=SYNTHESIZER *Apr 17 16:35:25.149: curr[CONNECTING] ev-id[LIB_CONNECTED] next[CONNECTED] action=610B913C0 *Apr 17 16:35:25.149:act_connecting_libconnected *Apr 17 16:35:25.149:act_rtpsetupfsm_libdescribed *Apr 17 16:35:25.237:mrcp_fsm_execute:type=RESOURCE_NONE *Apr 17 16:35:25.237: curr[RTP_IDLE] ev-id[RECOG_RTP_SETUP] next[RTP_RECOG_SETUP_DONE] action=610B94F40 *Apr 17 16:35:25.237:act_idle_recog_rtpsetup *Apr 17 16:35:25.237:mrcp_fsm_execute:type=RECOGNIZER *Apr 17 16:35:25.237: curr[RECOG_IDLE] ev-id[DEFINE_GRAMMAR] next[RECOG_IDLE] action=610B99340 *Apr 17 16:35:25.237:act_idle_define_grammar: *Apr 17 16:35:25.237:hash_add: key=31 *Apr 17 16:35:25.237:mrcp_fsm_execute:type=RECOGNIZER *Apr 17 16:35:25.237: curr[RECOG_IDLE] ev-id[RECOGNIZE] next[RECOG_ASSOCIATING] action=610B98400 *Apr 17 16:35:25.237:act_idle_recognize: *Apr 17 16:35:25.245:mrcp_fsm_execute:type=RECOGNIZER *Apr 17 16:35:25.245: curr[RECOG_ASSOCIATING] ev-id[RECOGNIZER_ASSOCIATED] next[RECOGNIZING] action=610B9AB40 *Apr 17 16:35:25.245:act_associating_recognizer_associated: *Apr 17 16:35:25.249:hash_add: key=32 *Apr 17 16:35:25.249:mrcp_fsm_execute:type=RESOURCE_NONE *Apr 17 16:35:25.249: curr[RTP_IDLE] ev-id[SYNTH_RTP_SETUP] next[RTP_SYNTH_SETUP_DONE] action=610B93D40 *Apr 17 16:35:25.249:act_idle_synth_rtpsetup *Apr 17 16:35:25.249:mrcp_fsm_execute:type=SYNTHESIZER *Apr 17 16:35:25.249: curr[SYNTH_IDLE] ev-id[SPEAK] next[SYNTH_ASSOCIATING] action=610BA5540 *Apr 17 16:35:25.249:act_idle_speak *Apr 17 16:35:25.249:mrcp_fsm_execute:type=SYNTHESIZER *Apr 17 16:35:25.249: curr[SYNTH_ASSOCIATING] ev-id[SYNTHESIZER_ASSOCIATED]
The following lines show the TTS server performing speech synthesis:
*Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr next[SPEAKING] action=610BA7B40 17 16:35:25.249:act_associating_speak_associated 17 16:35:25.249:hash_add: key=30 17 16:35:25.285:hash_get: key=31 17 16:35:25.285:hash_delete: key=31 17 16:35:25.293:hash_get: key=32 17 16:35:25.293:hash_get: key=30 17 16:35:32.805:hash_get: key=30 17 16:35:32.805:hash_delete: key=30 17 16:35:32.805:mrcp_fsm_execute:type=SYNTHESIZER 17 16:35:32.805: curr[SPEAKING] ev-id[SPEECH_COMPLETE] next[SYNTH_IDLE] action=610BAA680
DB-1865
17 16:35:32.805:act_speaking_speech_complete 17 16:35:32.809:hash_get: key=32 17 16:35:32.809:mrcp_fsm_execute:type=RECOGNIZER 17 16:35:32.809: curr[RECOGNIZING] ev-id[START_OF_SPEECH] next[RECOGNIZING] action=610B9F3C0 *Apr 17 16:35:32.809:act_recognizing_start_of_speech *Apr 17 16:35:33.781:hash_get: key=32 *Apr 17 16:35:33.781:hash_delete: key=32 *Apr 17 16:35:33.781:mrcp_fsm_execute:type=RECOGNIZER *Apr 17 16:35:33.781: curr[RECOGNIZING] ev-id[RECOGNITION_COMPLETE] next[RECOGNIZED] action=610B9D240 *Apr 17 16:35:33.781:act_recognizing_recognition_complete: *Apr 17 16:35:33.789:mrcp_fsm_execute:type=SYNTHESIZER *Apr 17 16:35:33.789: curr[SYNTH_IDLE] ev-id[SPEAK] next[SYNTH_ASSOCIATING] action=610BA5540 *Apr 17 16:35:33.789:act_idle_speak *Apr 17 16:35:33.793:mrcp_fsm_execute:type=SYNTHESIZER *Apr 17 16:35:33.793: curr[SYNTH_ASSOCIATING] ev-id[SYNTHESIZER_ASSOCIATED] next[SPEAKING] action=610BA7B40 *Apr 17 16:35:33.793:act_associating_speak_associated *Apr 17 16:35:33.793:hash_add: key=34 *Apr 17 16:35:33.949:hash_get: key=34 *Apr 17 16:35:37.221:hash_get: key=34 *Apr 17 16:35:37.221:hash_delete: key=34 *Apr 17 16:35:37.221:mrcp_fsm_execute:type=SYNTHESIZER *Apr 17 16:35:37.221: curr[SPEAKING] ev-id[SPEECH_COMPLETE] next[SYNTH_IDLE] action=610BAA680 *Apr 17 16:35:37.221:act_speaking_speech_complete *Apr 17 16:35:37.245:mrcp_fsm_execute:type=SYNTHESIZER *Apr 17 16:35:37.249: curr[CONNECTED] ev-id[LIB_DESTROY] next[CONNECTED] action=610B8DD00 *Apr 17 16:35:37.249:act_connected_libdestroy *Apr 17 16:35:37.249:mrcp_fsm_execute:type=SYNTHESIZER *Apr 17 16:35:37.249: curr[CONNECTED] ev-id[LIB_DESTROY] next[CONNECTED] action=610B8DD00 *Apr 17 16:35:37.249:act_connected_libdestroy
The following example shows output from the debug mrcp detail command:
Router# debug mrcp detail *Sep 1 21:37:53.652: //68//MRCP:/mrcpv2_allocate_scb: scb=0xC07318C8, root_scb=0x661BDD54 *Sep 1 21:37:53.708: //-1//MRCP:/MRCPV2_ADD_REQUEST_LINE: IsFinal=FALSE;TotalLength=165 *Sep 1 21:37:53.708: //-1//MRCP:/MRCPV2_ADD_HEADER: TotalLength=87 *Sep 1 21:37:53.708: //-1//MRCP:/MRCPV2_ADD_REQUEST_LINE: IsFinal=TRUE;TotalLength=535: MRCP/2.0 535 DEFINE-GRAMMAR 1 Channel-Identifier: 0000251844F8ACAD@speechrecog : Speech-Language: en-US Content-Base: http://http-server1/php/ : Content-Type: application/srgs+xml Content-Id: [email protected] Content-Length: 290 : <?xml version="1.0"?><grammar mode="voice" version="1.0" root="xxx" xmlns="http://www.w3.org/2001/06/grammar" xml:lang="en-US"> <rule id="xxx" scope="public"> <one-of>
DB-1866
December 2010
<item>one</item> <item>two</item> </one-of> </rule> </grammar> *Sep 1 21:37:53.708: //-1//MRCP:/MRCPV2_ADD_REQUEST_LINE: IsFinal=FALSE;TotalLength=160 *Sep 1 21:37:53.708: //-1//MRCP:/MRCPV2_ADD_HEADER: TotalLength=82 *Sep 1 21:37:53.708: //-1//MRCP:/MRCPV2_ADD_REQUEST_LINE: IsFinal=TRUE;TotalLength=499: MRCP/2.0 499 RECOGNIZE 2 Channel-Identifier: 0000251844F8ACAD@speechrecog : Speech-Language: en-US Confidence-Threshold: 0.50 Sensitivity-Level: 0.50 Speed-Vs-Accuracy: 0.50 Dtmf-Interdigit-Timeout: 10000 Dtmf-Term-Timeout: 0 Dtmf-Term-Char: # No-Input-Timeout: 20000 N-Best-List-Length: 1 Logging-Tag: 68:68 Content-Base: http://http-server1/php/ Media-Type: audio/basic Start-Input-Timers: false : Content-Type: text/uri-list Content-Length: 31 : session:[email protected] : MRCP/2.0 80 1 200 COMPLETE Channel-Identifier: 0000251844F8ACAD@speechrecog : MRCP/2.0 83 2 200 IN-PROGRESS Channel-Identifier: 0000251844F8ACAD@speechrecog
*Sep 1 21:37:57.404: //-1//MRCP:/MRCPV2_ADD_REQUEST_LINE: IsFinal=FALSE;TotalLength=169 *Sep 1 21:37:57.404: //-1//MRCP:/MRCPV2_ADD_HEADER_CR: TotalLength=93 *Sep 1 21:37:57.404: //-1//MRCP:/MRCPV2_ADD_REQUEST_LINE: IsFinal=TRUE;TotalLength=93: MRCP/2.0 93 START-INPUT-TIMERS 3 Channel-Identifier: 0000251844F8ACAD@speechrecog : MRCP/2.0 80 3 200 COMPLETE Channel-Identifier: 0000251844F8ACAD@speechrecog : MRCP/2.0 148 START-OF-INPUT 2 IN-PROGRESS Channel-Identifier: 0000251844F8ACAD@speechrecog Proxy-Sync-Id: 0F1F813000000148 Input-Type: speech : MRCP/2.0 589 RECOGNITION-COMPLETE 2 COMPLETE Channel-Identifier: 0000251844F8ACAD@speechrecog
DB-1867
Proxy-Sync-Id: 0F1F813000000148 Completion-Cause: 000 success Content-Type: application/nlsml+xml Content-Length: 369 <?xml version="1.0" encoding="UTF-8"?> <result grammar="session:[email protected]"> <interpretation grammar="session:[email protected]" confidence="0.646043"> <instance confidence="0.646043"> one </instance> <input mode="speech" confidence="0.646043"> one <input confidence="0.646043"> one </input> </input> </interpretation> </result> *Sep 1 21:37:59.588: //-1//MRCP:/MRCPV2_ADD_REQUEST_LINE: IsFinal=FALSE;TotalLength=165 *Sep 1 21:37:59.588: //-1//MRCP:/MRCPV2_ADD_HEADER: TotalLength=87 *Sep 1 21:37:59.588: //-1//MRCP:/MRCPV2_ADD_REQUEST_LINE: IsFinal=TRUE;TotalLength=566: MRCP/2.0 566 DEFINE-GRAMMAR 1 Channel-Identifier: 00001FEC44F8AA93@speechrecog : Speech-Language: en-US Content-Base: http://http-server1/php/ : Content-Type: application/srgs+xml Content-Id: [email protected] Content-Length: 321 : <?xml version="1.0"?><grammar mode="voice" version="1.0" root="xxx" xmlns="http://www.w3.org/2001/06/grammar" xml:lang="en-US"> <rule id="xxx" scope="public"> <one-of> <item>three</item> <item>four</item> <item>one</item> </one-of> </rule> </grammar> *Sep 1 21:37:59.588: //-1//MRCP:/MRCPV2_ADD_REQUEST_LINE: IsFinal=FALSE;TotalLength=160 *Sep 1 21:37:59.588: //-1//MRCP:/MRCPV2_ADD_HEADER: TotalLength=82 *Sep 1 21:37:59.588: //-1//MRCP:/MRCPV2_ADD_REQUEST_LINE: IsFinal=TRUE;TotalLength=499: MRCP/2.0 499 RECOGNIZE 2 Channel-Identifier: 00001FEC44F8AA93@speechrecog : Speech-Language: en-US Confidence-Threshold: 0.50 Sensitivity-Level: 0.50 Speed-Vs-Accuracy: 0.50 Dtmf-Interdigit-Timeout: 10000 Dtmf-Term-Timeout: 0 Dtmf-Term-Char: # No-Input-Timeout: 10000 N-Best-List-Length: 1
DB-1868
December 2010
Logging-Tag: 68:68 Content-Base: http://http-server1/php/ Media-Type: audio/basic Start-Input-Timers: false : Content-Type: text/uri-list Content-Length: 31 : session:[email protected] : MRCP/2.0 80 1 200 COMPLETE Channel-Identifier: 00001FEC44F8AA93@speechrecog : MRCP/2.0 83 2 200 IN-PROGRESS Channel-Identifier: 00001FEC44F8AA93@speechrecog
*Sep 1 21:38:00.044: //-1//MRCP:/MRCPV2_ADD_REQUEST_LINE: IsFinal=FALSE;TotalLength=169 *Sep 1 21:38:00.044: //-1//MRCP:/MRCPV2_ADD_HEADER_CR: TotalLength=93 *Sep 1 21:38:00.044: //-1//MRCP:/MRCPV2_ADD_REQUEST_LINE: IsFinal=TRUE;TotalLength=93: MRCP/2.0 93 START-INPUT-TIMERS 3 Channel-Identifier: 00001FEC44F8AA93@speechrecog : MRCP/2.0 80 3 200 COMPLETE Channel-Identifier: 00001FEC44F8AA93@speechrecog : MRCP/2.0 148 START-OF-INPUT 2 IN-PROGRESS Channel-Identifier: 00001FEC44F8AA93@speechrecog Proxy-Sync-Id: 0925248800000011 Input-Type: speech : MRCP/2.0 589 RECOGNITION-COMPLETE 2 COMPLETE Channel-Identifier: 00001FEC44F8AA93@speechrecog Proxy-Sync-Id: 0925248800000011 Completion-Cause: 000 success Content-Type: application/nlsml+xml Content-Length: 369 <?xml version="1.0" encoding="UTF-8"?> <result grammar="session:[email protected]"> <interpretation grammar="session:[email protected]" confidence="0.701971"> <instance confidence="0.701971"> one </instance> <input mode="speech" confidence="0.701971"> one <input confidence="0.701971"> one </input> </input> </interpretation> </result>
The following example shows output from the debug mrcp socket command:
Router# debug mrcp socket
DB-1869
*Sep 1 21:52:58.392: //74//MRCP:/mrcpv2_tcp_socket_connect: Socket=0,Dest=10.1.2.201:51001 *Sep 1 21:52:58.392: //74//MRCP:/mrcpv2_connect_to_server: SocketConnectStatus[MRCPV2_SOCK_CONNECT_PENDING(2)], SocketId=0, ServerSession=0xC0732278, Dest=10.1.2.201:51001 *Sep 1 21:52:58.392: //-1//MRCP:/mrcpv2_handle_socket_read: Before Execute: Socket=0, SocketStatus=MRCPV2_SOCK_CONNECT_PENDING(2) *Sep 1 21:52:58.392: //-1//MRCP:/mrcpv2_handle_socket_read: After Execute: Socket=0, SocketStatus=MRCPV2_SOCK_CONNECTED(1) *Sep 1 21:52:58.392: //74//MRCP:/mrcpv2_partial_socket_send: (Socket:0 Length:87) 600 bytes of data *Sep 1 21:52:58.392: //74//MRCP:/mrcpv2_partial_socket_send: Buffer Sent Successfully; fd=0, Sent=87 *Sep 1 21:52:58.392: //74//MRCP:/mrcpv2_partial_socket_send: (Socket:0 Length:64) 600 bytes of data *Sep 1 21:52:58.392: //74//MRCP:/mrcpv2_partial_socket_send: Buffer Sent Successfully; fd=0, Sent=64 *Sep 1 21:52:58.392: //74//MRCP:/mrcpv2_partial_socket_send: (Socket:0 Length:94) 600 bytes of data *Sep 1 21:52:58.392: //74//MRCP:/mrcpv2_partial_socket_send: Buffer Sent Successfully; fd=0, Sent=94
Related Commands
Command show mrcp client session active show mrcp client session history show mrcp client statistics hostname
Description Displays information about active MRCP sessions. Displays information about past MRCP sessions. Displays statistics about MRCP sessions.
DB-1870
December 2010
Effective with release 12.3(8)T, the debug mspi receive command is replaced by the debug fax mspi command. See the debug fax mspi command for more information. To display debugging messages for the receiving mail Service Provider Interface (MSPI), use the debug mspi receive command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mspi receive no debug mspi receive
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 universal access server. This command was integrated into Cisco IOS Release 12.1(5)T. This command was implemented on the Cisco 1750 access router. This command was replaced by the debug fax mspi command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug mspi receive command:
Router# debug mspi receive Jan 1 ph#in: Jan 1 Jan 1 Jan 1 Jan 1 Jan 1 Jan 1 Jan 1 Jan 1 Jan 1 Dec 31 05:09:33.890: mspi_tel_num_trans: from: Radhika, fax=5271714 ph#dial: 5271714 05:09:33.890: incoming destPat(5271714), matched(7), tag(22) 05:09:33.890: out destPat(5......), tag(20), dgt strip enabled 05:09:33.890: mspi_off_new_rcpt: envlp_to [[email protected]], 30 05:09:33.890: tel_numb_dial: 5271714, subaddr:[], cover page 05:09:39.122: mspi_offramp_rfc822_header: msgType=0 05:09:39.122: envlp_from: [Radhika], 8 05:09:39.122: mspi_off_put_buff: ignore mime type=1, st=CONNECTING, len=0 05:09:39.122: moff_save_buffer: cid=0x1F, mime=9, len=4 05:09:39.122: offramp disabled receiving! 21:09:44.078: %ISDN-6-CONNECT: Interface Serial0:22 is now connected to 5271714
DB-1871
Jan 1 05:09:52.154: Jan 1 05:09:52.154: Jan 1 05:09:52.154: Jan 1 05:09:52.154: offramp rcpt enabled Jan 1 05:09:54.126: Jan 1 05:09:54.134:
mspi_bridge: cid=0x1F, dst cid=0x22, data dir=OFFRAMP, conf dir=DEST mspi_offramp_send_buffer: cid=0x1F, mime=9 buffer with only CR/LF - set buff_len=0 mspi_offramp_send_buffer: cid=0x1F, mime=9 rx BUFF_END_OF_PART, mspi_offramp_send_buffer: cid=0x1F, mime=11 mspi_offramp_send_buffer: cid=0x1F, mime=11
Related Commands
DB-1872
December 2010
Effective with Cisco IOS Release 12.3(8)T, the debug mspi send command is replaced by the debug fax mspi command. See the debug fax mspi command for more information. To display debugging messages for the sending mail Service Provider Interface (MSPI), use the debug mspi send command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mspi send no debug mspi send
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 universal access server. This command was integrated into Cisco IOS Release 12.1(5)T. This command was introduced on the Cisco 1750 access router. This command was replaced by the debug fax mspi command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug mspi send command:
Router# debug mspi send *Oct 16 08:40:27.515: dir=DEST *Oct 16 08:40:29.143: *Oct 16 08:40:29.147: *Oct 16 08:40:29.147: *Oct 16 08:40:30.147: *Oct 16 08:40:30.147: *Oct 16 08:40:30.147: *Oct 16 08:40:38.995: mspi_bridge: cid=0x21, dst cid=0x26, data dir=OFFRAMP, conf mspi_setup_req: for cid=0x27 [email protected] [email protected] mspi_chk_connect: cid=0x27, cnt=0, SMTP connected to the server ! mspi_bridge: cid=0x27, dst cid=0x28, data dir=ONRAMP, conf dir=SRC mspi_xmit: cid=0x27, st=CONFERENCED, src_cid=0x28, buf cnt=0
DB-1873
Related Commands
DB-1874
December 2010
Effective with release 12.3(8)T, the debug mta receiv all command is replaced by the debug fax mta command. See the debug fax mta command for more information. To show output relating to the activity on the Simple Mail Transfer Protocol (SMTP) server, use the debug mta receive all command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mta receive all no debug mta receive all
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(5)T. This command was implemented on the Cisco 1750 access router. This command was implemented on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. This feature was implemented on the Cisco 7200 series routers. This command was replaced by the debug fax mta command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows the messages exchanged (for example, the handshake) between the e-mail server and the off-ramp gateway:
Router# debug mta receive all Jan Jan Jan Jan 1 1 1 1 05:07:41.314: 05:07:43.354: 05:07:45.386: 05:07:47.426: esmtp_server_work: esmtp_server_work: esmtp_server_work: esmtp_server_work: calling calling calling calling helo mail rcpt data
DB-1875
Jan 1 05:07:49.514: (S)R: 'Content-Type: multipart/mixed; boundary="------------11F7CD9D2EB3E8B8D5627C62"' Jan 1 05:07:49.514: (S)R: '' Jan 1 05:07:49.514: esmtp_server_engine_new_part: Jan 1 05:07:49.514: (S)R: 'Content-Type: text/plain; charset=us-ascii' Jan 1 05:07:49.514: (S)R: 'Content-Transfer-Encoding: 7bit' Jan 1 05:07:49.514: (S)R: '' Jan 1 05:07:49.514: esmtp_server_engine_new_part: Jan 1 05:07:49.514: esmtp_server_work: freeing temp header Jan 1 05:07:49.514: (S)R: 'Content-Type: image/tiff; name="DevTest.8.1610.tif"' Jan 1 05:07:49.514: (S)R: 'Content-Transfer-Encoding: base64' Jan 1 05:07:49.514: (S)R: 'Content-Disposition: inline; filename="DevTest.8.1610.tif"' Jan 1 05:07:49.514: (S)R: '' Jan 1 05:07:49.514: esmtp_server_engine_update_recipient_status: status=6 Jan 1 05:07:49.514: esmtp_server_engine_new_part: Jan 1 05:07:49.518: esmtp_server_work: freeing temp header Jan 1 05:08:03.014: esmtp_server_engine_update_recipient_status: status=7 Jan 1 05:08:04.822: esmtp_server_engine_update_recipient_status: status=6 Jan 1 05:08:33.042: esmtp_server_engine_update_recipient_status: status=7 Jan 1 05:08:34.906: esmtp_server_engine_getline: Unexpected end of file on socket 1 Jan 1 05:08:34.906: esmtp_server_work: error occurred with ctx=0x61FFF710, socket=1
Related Commands
DB-1876
December 2010
Effective with release 12.3(8)T, the debug mta send all command is replaced by the debug fax mta command. See the debug fax mta command for more information. To display output for all of the on-ramp client connections, use the debug mta send all command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mta send all no debug mta send all
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco 1750 access router. This command was implemented on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. This feature was implemented on the Cisco 7200 series routers. This command was replaced by the debug fax mta command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows the messages exchanged (for example, the handshake) between the e-mail server and the on-ramp gateway:
Router# debug mta send all *Oct 16 09:04:13.055: esmtp_client_engine_open: [email protected], [email protected] *Oct 16 09:04:13.055: esmtp_client_engine_add_headers: from_comment= *Oct 16 09:04:13.111: esmtp_client_work: socket 0 attempting to connect to IP address 171.71.154.56 *Oct 16 09:04:13.111: esmtp_client_work: socket 0 readable for first time *Oct 16 09:04:13.135: esmtp_client_work: socket 0 readable for first time
DB-1877
*Oct 16 09:04:13.135: (C)R: 220 madeup.abccompany.com ESMTP Sendmail 8.8.4-Cisco.1/8.6.5 ready at Wed, 27 Sep 2000 11:45:46 -0700 (PDT) *Oct 16 09:04:13.135: (C)S: EHLO mmoip-c.cisco.com *Oct 16 09:04:13.183: (C)R: 250-madeup.abccompany.com Hello [172.22.95.16], pleased to meet you *Oct 16 09:04:13.183: (C)R: 250-EXPN *Oct 16 09:04:13.183: (C)R: 250-VERB
Related Commands
Description Displays output for a specific on-ramp SMTP client connection during an e-mail transmission.
DB-1878
December 2010
Effective with release 12.3(8)T, the debug mta send rcpt-to command is no longer available in Cisco IOS. To display output for a specific on-ramp Simple Mail Transfer Protocol (SMTP) client connection during an e-mail transmission, use the debug mta send rcpt-to command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug mta send rcpt-to string no debug mta send rcpt-to string
Syntax Description
string
E-mail address.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco 1750 access router. This command was implemented on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. This feature was implemented on the Cisco 7200 series routers. This command was removed and is no longer available in Cisco IOS software. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows debugging information displayed when the debug mta send rcpt-to command has been enabled and the SMTP client is sending an e-mail message:
Router# debug mta send rcpt-to 5551212 Router# socket 0 attempting to connect to IP address 100.00.00.00 socket 0 readable for first time - let's try to read it R:220 madeup.abc.com ESMTP Sendmail 8.8.4-abc.1/8.6.5 ready at Tue, 6 Apr 1999 13:35:39 -0700 (PDT) S:EHLO mmoip-c.abc.com R:250-quisp.cisco.com Hello [100.00.00.00], pleased to meet you
DB-1879
R:250-EXPN R:250-VERB R:250-8BITMIME R:250-SIZE R:250-DSN R:250-ETRN R:250-XUSR R:250 HELP S:MAIL FROM:<testing@> RET=HDRS R:250 <testing@>... Sender ok S:RCPT TO:<[email protected]> NOTIFY=SUCCESS ORCPT=rfc822;testing@ R:250 <[email protected]>... Recipient ok R:354 Enter mail, end with "." on a line by itself S:Received:(Cisco Powered Fax System) by mmoip-c.cisco.com for <[email protected]> (with Cisco NetWorks); Fri, 17 Oct 1997 14:54:27 +0800 S:To: <[email protected]> S:Message-ID:<[email protected]> S:Date:Fri, 17 Oct 1997 14:54:27 +0800 S:Subject:mmoip-c subject here S:X-Mailer:IOS (tm) 5300 Software (C5300-IS-M) S:MIME-Version:1.0 S:Content-Type:multipart/mixed; S: boundary="yradnuoB=_000E1997145426826.mmoip-ccisco.com" S:From:"Test User" <testing@> S:--yradnuoB=_000E1997145426826.mmoip-ccisco.com S:Content-ID:<[email protected]> S:--yradnuoB=_000E1997145426826.mmoip-ccisco.com-Sending terminating dot ...(socket=0) S:. R:250 NAA09092 Message accepted for delivery S:QUIT R:221 [email protected] closing connection Freeing SMTP ctx at 0x6121D454 returned from work_routine, context freed
Related Commands
DB-1880
December 2010
debug mvrp
To display debugging information for Multiple VLAN Registration Protocol (MVRP) configurations, use the debug mvrp command in privileged EXEC mode. To disable debugging of MVRP configurations, use the no form of this command. debug mvrp [all | config | error | event | ha | packets | switch] no debug mvrp
Syntax Description
(Optional) Enables all levels of debugging (Optional) Displays user configuration information. (Optional) Enables error-level debugging. (Optional) Enables event-level debugging. (Optional) Enables high availability-level debugging. (Optional) Enables packet-level debugging. (Optional) Enables switch-level debugging.
Command Modes
Command History
Release 12.2(33)SXI
Usage Guidelines
Conditional interface debugging can be used to limit the scope of output messages related to an interface.
Cisco Catalyst 6000 Series Platforms
On switches with a Switch Processor (SP) or Route Processor (RP), this command can be used only on the SP console.
Examples
Related Commands
Description Clears statistics related to MVRP and recorded on one (or all) MVRP-enabled ports. Displays statistics for configured MVRP attributes on a device or specified ports on a device.
DB-1881
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(2)XT
Modification This command was introduced on the following platforms: Cisco 1750, Cisco 1751, Cisco 2600 series and Cisco 3600 series multiservice routers; and Cisco IAD2420 series Integrated Access Devices (IADs). This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. This command was implemented on the Cisco 1760 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug mwi relay errors command provides a debug monitor display of any error messages, when MWI Relay Server (Cisco IOS Telephony Server) is trying to do MWI Relay to extensions on remote Cisco IOS Telephony Service (ITS).
Examples
The following examples show errors when MWI Relay Server tries to do an MWI Relay to extension 7004, but location of 7004 is not known to the MWI Relay Server:
Router# debug mwi relay errors mwi-relay error info debugging is on 01:46:48: MWI-APP: mwi_notify_status: No ClientID (7004) registered
DB-1882
December 2010
Related Commands
Description Sets MWI debugging for the Cisco IOS Telephony Service router. Sets MWI relay events debugging for the Cisco IOS Telephony Service router.
DB-1883
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(2)XT
Modification This command was introduced on the following platforms: Cisco 1750, Cisco 1751, Cisco 2600 series and Cisco 3600 series multiservice routers; and Cisco IAD2420 series Integrated Access Devices (IADs). This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. This command was implemented on the Cisco 1760 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug mwi relay events command provides a debug monitor display of events, when MWI Relay Server (Cisco IOS Telephony Server) is trying to do MWI Relay to extensions on remote Cisco IOS Telephony Services (ITS).
Examples
The following debugging messages are shown when the MWI Relay server tries to send MWI Information to remote client 7001 and the location of 7001 is known by the MWI Relay Server:
Router# debug mwi relay events mwi-relay events info debugging is on 01:45:34: mwi_notify_status: Queued event for mwi_app_queue 01:45:34: MWI-APP: mwi_app_process_event: 01:45:34: MWI-APP: mwi_app_process_event: MWI Event for ClientID(7001)@(1.8.17.22)
DB-1884
December 2010
Related Commands
Description Sets MWI debugging for the Cisco IOS Telephony Service router. Sets MWI relay errors debugging for the Cisco IOS Telephony Service router.
DB-1885
debug nat64
To enable stateless Network Address Translation 64 (NAT64) debugging, use the debug nat64 command in privileged EXEC mode. To disable NAT64 debugging, use the no form of this command. debug nat64 {all | ha {all | info | trace | warn} | id-manager | info | issu {all | message | trace} | memory | statistics | trace | warn} no debug nat64 {all | ha {all | info | trace | warn} | id-manager | info | issu {all | message| trace} | memory | statistics | trace | warn}
Syntax Description
all ha all info trace warn id-manager info issu all message trace memory statistics trace warn
Enables information, trace, and warning level debugging. Enables high availability (HA) debugging. Enables HA information, trace, and warning level debugging. Enables HA information level debugging. Enables HA trace level debugging. Enables HA warning level debugging. Enables Interface Descriptor manager trace debugging. Enables information level debugging. Enables In-Service Software Upgrade (ISSU) debugging. Enables ISSU trace level and message debugging. Enables ISSU message debugging. Enables ISSU trace level debugging. Enables memory trace debugging. Enables statistics debugging. Enables trace level debugging. Enables warning level debugging.
Command Modes
Command History
Usage Guidelines
The general debugging levels are information, trace, and warning. The debug nat64 memory and debug nat64 id-manager commands provide detailed traces related to resources and memory allocation. The debug nat64 issu command provides traces specific to the ISSU messages exchanged.
DB-1886
December 2010
Examples
The following is sample output from the debug nat64 statistics command. The output fields are self-explanatory.
Router# debug nat64 statistics NAT64 statistics debugging is on Sep 16 18:26:24.537 IST: NAT64 (stats): Received Sep 16 18:26:24.537 IST: NAT64 (stats): Updating 95856998 (is_delta(TRUE) value(1488104)) Sep 16 18:26:24.537 IST: NAT64 (stats): Received Sep 16 18:26:24.537 IST: NAT64 (stats): Updating 7894088 (is_delta(TRUE) value(122550)) Sep 16 18:26:24.537 IST: NAT64 (stats): Received Sep 16 18:26:24.537 IST: NAT64 (stats): Updating 1720138437 (is_delta(TRUE) value(1488105)) Sep 16 18:26:24.537 IST: NAT64 (stats): Updating 1604581833 (is_delta(TRUE) value(122550)) stats update for IDB(FastEthernet0/3/5) pkts_translated_v4v6 from 94368894 to stats update for IDB(FastEthernet0/3/4) pkts_translated_v6v4 from 7771538 to global stats update pkts_translated_v4v6 from 1718650332 to pkts_translated_v6v4 from 1604459283 to
The following is sample output from the debug nat64 memory command. The output fields are self-explanatory.
Router# debug nat64 memory NAT64 memory debugging is on Sep 16 18:28:03.713 IST: NAT64 (memory): Allocated 0x7FFA7DA2F750 Sep 16 18:28:03.713 IST: NAT64 (memory): Allocated 0x7FFA9EC00D30 Sep 16 18:28:03.713 IST: NAT64 (memory): Allocated 0x7FFA9D1532C8
Related Commands
DB-1887
Syntax Description
(Optional) Displays the error situation for each circuit. (Optional) Displays the packets received and sent for each circuit. (Optional) Displays the flow control information for each circuit. (Optional) Displays the state changes for each circuit.
Command Modes
Usage Guidelines
NCIA is an architecture developed by Cisco for accessing Systems Network Architecture (SNA) applications. This architecture allows native SNA interfaces on hosts and clients to access TCP/IP backbones. You cannot enable debugging output for a particular client or particular circuit.
Caution
Do not enable the debug ncia circuit command during normal operation because this command generates a substantial amount of output messages and could slow down the router.
Examples
The following is sample output from the debug ncia circuit error command. In this example, the possible errors are displayed. The first error message indicates that the router is out of memory. The second message indicates that the router has an invalid circuit control block. The third message indicates that the router is out of memory. The remaining messages identify errors related to the finite state machine.
Router# debug ncia circuit error NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: ncia_circuit_create memory allocation fail ncia_send_ndlc: invalid circuit control block send_ndlc: fail to get buffer for ndlc primitive xxx ncia circuit fsm: Invalid input ncia circuit fsm: Illegal state ncia circuit fsm: Illegal input ncia circuit fsm: Unexpected input ncia circuit fsm: Unknown error rtn code
The following is sample output from the debug ncia circuit event command. In this example, a session startup sequence is displayed.
Router# debug ncia circuit event NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_START_DL, Len: 24, tmac: 4000.1060.1000,
DB-1888
December 2010
tsap: 4, csap 8, oid: 8A91E8, tid 0, lfs 16, ws 1 NCIA: create circuit: saddr 4000.1060.1000, ssap 4, daddr 4000.3000.0003, dsap 8 sid: 8B09A8 NCIA: send NDLC_DL_STARTED to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_DL_STARTED, Len: 2,4 tmac: 4000.1060.1000, tsap: 4, csap 8, oid: 8A91E8, tid 8B09A8, lfs 16, ws 1 NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 12, sid: 8B09A8, FC 0x81 NCIA: send NDLC_XID_FRAME to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 12, sid: 8A91E8, FC 0xC1 NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 18, sid: 8B09A8, FC 0xC1 NCIA: send NDLC_CONTACT_STN to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_CONTACT_STN, Len: 12, sid: 8A91E8, FC 0xC1 NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_STN_CONTACTED, Len: 12, sid: 8B09A8, FC 0xC1 NCIA: send NDLC_INFO_FRAME to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_INFO_FRAME, Len: 30, sid: 8A91E8, FC 0xC1
Field IN OUT Ver_Id MsgType Len tmac tsap csap oid tid lfs ws saddr ssap daddr dsap sid FC
Description Incoming message from client. Outgoing message to client. NDLC version ID. NDLC message type. NDLC message length. Target MAC. Target SAP. Client SAP. Origin ID. Target ID. Largest frame size flag. Window size. Source MAC address. Source SAP. Destination MAC address. Destination SAP. Session ID. Flow control flag.
In the following messages, an NDLC_START_DL messages is received from a client to start a data-link session:
NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_START_DL, Len: 24, tmac: 4000.1060.1000, tsap: 4, csap 8, oid: 8A91E8, tid 0, lfs 16, ws 1 NCIA: create circuit: saddr 4000.1060.1000, ssap 4, daddr 4000.3000.0003, dsap 8 sid: 8B09A8
The next two messages indicate that an NDLC_DL_STARTED message is sent to a client. The server informs the client that a data-the link session is started.
DB-1889
NCIA: send NDLC_DL_STARTED to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_DL_STARTED, Len: 2,4 tmac: 4000.1060.1000, tsap: 4, csap 8, oid: 8A91E8, tid 8B09A8, lfs 16, ws 1
In the following two messages, an NDLC_XID_FRAME message is received from a client, and the client starts an XID exchange:
NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 12, sid: 8B09A8, FC 0x81 NCIA: send NDLC_XID_FRAME to client 10.2.20.3 for ckt: 8B09A8
In the following two messages, an NDLC_XID_FRAME message is sent from a client, and an DLC_XID_FRAME message is received from a client:
NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 12, sid: 8A91E8, FC 0xC1 NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 18, sid: 8B09A8, FC 0xC1
The next two messages show that an NDLC_CONTACT_STN message is sent to a client:
NCIA: send NDLC_CONTACT_STN to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_CONTACT_STN, Len: 12, sid: 8A91E8, FC 0xC1
In the following message, an NDLC_STN_CONTACTED message is received from a client. The client informs the server that the station has been contacted.
NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_STN_CONTACTED, Len: 12, sid: 8B09A8, FC 0xC1
In the last two messages, an NDLC_INFO_FRAME is sent to a client, and the server sends data to the client:
NCIA: send NDLC_INFO_FRAME to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_INFO_FRAME, Len: 30, sid: 8A91E8, FC 0xC1
The following is sample output from the debug ncia circuit flow-control command. In this example, the flow control in a session startup sequence is displayed:
Router# debug ncia circuit flow-control NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: no flow control in NDLC_DL_STARTED frame receive Increment Window Op for circuit 8ADE00 ncia_flow_control_in FC 0x81, IW 1 GP 2 CW 2, Client IW 1 grant client more packet by sending Repeat Window Op ncia_flow_control_out FC: 0xC1, IW 1 GP 2 CW 2, Client IW receive FCA for circuit 8ADE00 receive Increment Window Op for circuit 8ADE00 ncia_flow_control_in FC 0xC1, IW 1 GP 5 CW 3, Client IW 1 grant client more packet by sending Repeat Window Op ncia_flow_control_out FC: 0xC1, IW 1 GP 5 CW 3, Client IW receive FCA for circuit 8ADE00 receive Increment Window Op for circuit 8ADE00 ncia_flow_control_in FC 0xC1, IW 1 GP 9 CW 4, Client IW 1 grant client more packet by sending Repeat Window Op ncia_flow_control_out FC: 0xC1, IW 1 GP 8 CW 4, Client IW reduce ClientGrantPacket by 1 (Granted: 8) receive FCA for circuit 8ADE00 receive Increment Window Op for circuit 8ADE00
GP 0 CW 1 1 GP 2 CW 2
GP 2 CW 2 1 GP 5 CW 3
GP 5 CW 3 1 GP 9 CW 4
DB-1890
December 2010
Table 248
Field IW GP CW
Description Initial window size. Granted packet number. Current window size.
The following is sample output from the debug ncia circuit state command. In this example, a session startup sequence is displayed:
Router# debug ncia circuit state NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: pre-server fsm: event CONN_OPENED pre-server fsm: event NDLC_PRIMITIVES server event: WAN - STDL state: CLSOED ncia server fsm action 32 circuit state: CLOSED -> START_DL_RCVD server event: DLU - TestStn.Rsp state: START_DL_RCVD ncia server fsm action 17 circuit state: START_DL_RCVD -> DL_STARTED_SND pre-server fsm: event NDLC_PRIMITIVES server event: WAN - XID state: DL_STARTED_SND ncia server fsm action 33 circuit state: DL_STARTED_SND -> DL_STARTED_SND server event: DLU - ReqOpnStn.Req state: DL_STARTED_SND ncia server fsm action 33 circuit state: DL_STARTED_SND -> OPENED server event: DLU - Id.Rsp state: OPENED ncia server fsm action 11 circuit state: OPENED -> OPENED pre-server fsm: event NDLC_PRIMITIVES server event: WAN - XID state: OPENED ncia server fsm action 33 circuit state: OPENED -> OPENED server event: DLU - Connect.Req state: OPENED ncia server fsm action 6 circuit state: OPENED -> CONNECT_PENDING pre-server fsm: event NDLC_PRIMITIVES server event: WAN - CONR state: CONNECT_PENDING ncia server fsm action 33 --> CLS_CONNECT_CNF sets NciaClsBusy circuit state: CONNECT_PENDING -> CONNECTED server event: DLU - Flow.Req (START) state: CONNECTED ncia server fsm action 25 --> unset NciaClsBusy circuit state: CONNECTED -> CONNECTED server event: DLU - Data.Rsp state: CONNECTED ncia server fsm action 8 circuit state: CONNECTED -> CONNECTED
Field WAN
DB-1891
Table 249
Description Event from upstream moduledependent logical unit (DLU). Administrative event. Timer event.
Related Commands
Command debug dmsp fax-to-doc debug ncia client debug ncia server
Description Enables debugging of DLSw+. Displays debug information for all NCIA client processing that occurs in the router. Displays debug information for the NCIA server and its upstream software modules.
DB-1892
December 2010
Syntax Description
ip-address error
(Optional) The remote client IP address. (Optional) Triggers the recording of messages only when errors occur. The current state and event of an NCIA client are normally included in the message. If you do not specify an IP address, the error messages are logged for all active clients. (Optional) Triggers the recording of messages that describe the current state and eventand sometimes the action that just completedfor the NCIA client. If you do not specify an IP address, the messages are logged for all active clients. (Optional) Triggers the recording of messages that contain up to the first 32 bytes of data in a TCP packet sent to or received from an NCIA client. If you do not specify an IP address, the messages are logged for all active clients.
event
message
Command Modes
Usage Guidelines
NCIA is an architecture developed by Cisco for accessing Systems Network Architecture (SNA) applications. This architecture allows native SNA interfaces on hosts and clients to access TCP/IP backbones. Use the debug ncia client error command to see only certain error conditions that occur. Use the debug ncia client event command to determine the sequences of activities that occur while an NCIA client is in different processing states. Use the debug ncia client message command to see only the first 32 bytes of data in a TCP packet sent to or received from an NCIA client. The debug ncia client command can be used in conjunction with the debug ncia server and debug ncia circuit commands to get a complete picture of NCIA activity.
Examples
The following is sample output from the debug ncia client command. Following the example is a description of each sample output message.
Router# debug ncia client NCIA: NCIA: NCIA: NCIA: NCIA: Passive open 10.2.20.123(1088) -> 1973 index for client hash queue is 27 number of element in client hash queue 27 is 1 event PASSIVE_OPEN, state NCIA_CLOSED for client 10.2.20.123 Rcvd msg type NDLC_CAP_XCHG in tcp packet for client 10.2.20.123
DB-1893
NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA:
First 17 byte of data rcvd: 811200110000000000000400050104080C Sent msg type NDLC_CAP_XCHG in tcp packet to client 10.2.20.123 First 17 byte of data sent: 811200111000000010000400050104080C event CAP_CMD_RCVD, state NCIA_CAP_WAIT, for client 10.2.20.123, cap xchg cmd sent Rcvd msg type NDLC_CAP_XCHG in tcp packet for client 10.2.20.123 First 17 byte of data rcvd: 811200111000000010000000050104080C event CAP_RSP_RCVD, state NCIA_CAP_NEG for client 10.2.20.123 Rcvd msg type NDLC_PEER_TEST_REQ in tcp packet for client 10.2.20.123 First 4 byte of data rcvd: 811D0004 event KEEPALIVE_RCVD, state NCIA_OPENED for client 10.2.20.123 Sent msg type NDLC_PEER_TEST_RSP in tcp packet to client 10.2.20.123 First 4 byte of data sent: 811E0004IA event TIME_OUT, state NCIA_OPENED, for client 10.2.20.123, keepalive_count = 0 Sent msg type NDLC_PEER_TEST_REQ, in tcp packet to client 10.2.20.123 First 4 byte of data sent: 811D0004 Rcvd msg type NDLC_PEER_TEST_RSP in tcp packet for client 10.2.20.123 First 4 byte of data rcvd: 811E0004 event KEEPALIVE_RSP_RCVD, state NCIA_OPENED for client 10.2.20.123
NCIA: Error, event PASIVE_OPEN, state NCIA_OPENED, for client 10.2.20.123, should not have occurred. NCIA: Error, active_open for pre_client_fsm while client 10.2.20.123 is active or not configured, registered.
Messages in lines 1 through 12 show the events that occur when a client connects to the router (the NCIA server). These messages show a passive_open process. Messages in lines 13 to 17 show the events that occur when a TIME_OUT event is detected by a client PC workstation. The workstation sends an NDLC_PEER_TEST_REQ message to the NCIA server, and the router responds with an NDLC_PEER_TEST_RSP message. Messages in lines 18 to 23 show the events that occur when a TIME_OUT event is detected by the router (the NCIA server). The router sends an NDLC_PEER_TEST_REQ message to the client PC workstation, and the PC responds with an NDLC_PEER_TEST_RSP message. When you use the debug ncia client message command, the messages shown on lines 6, 8, 11, 14, 17, 20, and 22 are output in addition to other messages not shown in this example. When you use the debug ncia client error command, the messages shown on lines 24 and 25 are output in addition to other messages not shown in this example.
Related Commands
Description Displays debug information for all NCIA client processing that occurs in the router. Displays debug information for the NCIA server and its upstream software modules.
DB-1894
December 2010
Syntax Description
Command Modes
Usage Guidelines
NCIA is an architecture developed by Cisco for accessing Systems Network Architecture (SNA) applications. This architecture allows native SNA interfaces on hosts and clients to access TCP/IP backbones. The debug ncia server command displays all Cisco Link Services (CLS) messages between the NCIA server and its upstream modules, such as data-link switching (DLSw) and downstream physical units (DSPUs). Use this command when a problem exists between the NCIA server and other software modules within the router. You cannot enable debugging output for a particular client or particular circuit.
Examples
The following is sample output from the debug ncia server command. In this example, a session startup sequence is displayed. Following the example is a description of each group of sample output messages.
Router# debug ncia server NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: NCIA: send CLS_TEST_STN_IND to DLU Receive TestStn.Rsp send CLS_ID_STN_IND to DLU Receive ReqOpnStn.Req send CLS_REQ_OPNSTN_CNF to DLU Receive Id.Rsp send CLS_ID_IND to DLU Receive Connect.Req send CLS_CONNECT_CNF to DLU Receive Flow.Req Receive Data.Req send CLS_DATA_IND to DLU send CLS_DISC_IND to DLU Receive Disconnect.Rsp
In the following messages, the client is sending a test message to the host and the test message is received by the host:
NCIA: send CLS_TEST_STN_IND to DLU NCIA: Receive TestStn.Rsp
DB-1895
In the next message, the server is sending an exchange identification (XID) message to the host:
NCIA: send CLS_ID_STN_IND to DLU
In the next two messages, the host opens the station and the server responds:
NCIA: Receive ReqOpnStn.Req NCIA: send CLS_REQ_OPNSTN_CNF to DLU
In the following two messages, the client is performing an XID exchange with the host:
NCIA: Receive Id.Rsp NCIA: send CLS_ID_IND to DLU
In the next group of messages, the host attempts to establish a session with the client:
NCIA: Receive Connect.Req NCIA: send CLS_CONNECT_CNF to DLU NCIA: Receive Flow.Req
In the next two messages, the host sends data to the client:
NCIA: Receive Data.Req NCIA: send CLS_DATA_IND to DLU
Related Commands
Command debug dmsp fax-to-doc debig mcoa circuit debug ncia client
Description Enables debugging of DLSw+. Displays circuit-related information between the NCIA server and client. Displays debug information for all NCIA client processing that occurs in the router.
DB-1896
December 2010
Syntax Description
Command Modes
Usage Guidelines
For complete information on the NetBIOS process, use the debug netbios packet command along with the debug netbios error command.
Examples
The following is sample output from the debug netbios error command. This example shows that an illegal packet has been received on the asynchronous interface.
Router# debug netbios error Async1 nbf Bad packet
Related Commands
Description Displays name caching activities on a router. Displays general information about NetBIOS packets.
DB-1897
Syntax Description
Command Modes
Usage Guidelines
For complete information on the NetBIOS process, use the debug netbios error command along with the debug netbios packet command.
Examples
The following is sample output from the debug netbios packet and debug netbios error commands. This example shows the Logical Link Control (LLC) header for an asynchronous interface followed by the NetBIOS information. For additional information on the NetBIOS fields, refer to IBM LAN Technical Reference IEEE 802.2.
Router# debug netbios packet Async1 (i) U-format UI C_R=0x0 (i) NETBIOS_ADD_NAME_QUERY Resp_correlator= 0x6F 0x0 Src name=CS-NT-1 Async1 (i) U-format UI C_R=0x0 (i) NETBIOS_ADD_GROUP_QUERY Resp_correlator= 0x6F 0x0 Src name=COMMSERVER-WG Async1 (i) U-format UI C_R=0x0 (i) NETBIOS_ADD_NAME_QUERY Resp_correlator= 0x6F 0x0 Src name=CS-NT-1 Ethernet0 (i) U-format UI C_R=0x0 (i) NETBIOS_DATAGRAM Length= 0x2C 0x0 Dest name=COMMSERVER-WG Src name=CS-NT-3
Related Commands
Description Displays information about NetBIOS protocol errors. Displays name caching activities on a router.
DB-1898
December 2010
debug netbios-name-cache
To display name caching activities on a router, use the debug netbios-name-cache command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug netbios-name-cache no debug netbios-name-cache
Syntax Description
Command Modes
Usage Guidelines
Examine the display to diagnose problems in Network Basic Input/Output System (NetBIOS) name caching.
Examples
Note
The sample display is a composite output. Debugging output that you actually see would not necessarily occur in this sequence. Table 250 describes the significant fields shown in the display.
Table 250 debug netbios-name-cache Field Descriptions
Description NetBIOS name caching debugging output. L means lookup; U means update. MAC address of machine being looked up in NetBIOS name cache.
DB-1899
Table 250
Description Indicates that the name of machine was learned from Token Ring interface number 1; idb is into interface data block. Packet comes from virtual ring number 0. This packet actually comes from a real Token Ring interface, because virtual ring number 0 is not valid. Indicates the way that the router learned about the specified machine. The possible values are as follows:
type=1
1Learned from traffic 2Learned from a remote peer 4Statically entered via the configuration of the router
With the first line of output, the router declares that it has examined the NetBIOS name cache table for the machine name ORINDA and that the packet that prompted the lookup came from virtual ring 0. In this case, this packet comes from a real interfacevirtual ring number 0 is not valid.
NETBIOS: L checking name ORINDA, vrn=0
The following two lines indicate that an invalid NetBIOS entry exists and that the corrupted memory was detected. The invalid memory will be removed from the table; no action is needed.
NetBIOS name cache table corrupted at offset 13 NetBIOS name cache table corrupted at later offset, at location 13
The following line indicates that the router attempted to check the NetBIOS cache table for the name ORINDA with MAC address 1000.4444.5555. This name was obtained from Token Ring interface 1. The type field indicates that the name was learned from traffic.
NETBIOS: U chk name=ORINDA, addr=1000.4444.5555, idb=TR1, vrn=0, type=1
The following line indicates that the NetBIOS name ORINDA is in the name cache table and was updated to the current value:
NETBIOS: U upd name=ORINDA,addr=1000.4444.5555,idb=TR1,vrn=0,type=1
The following line indicates that the NetBIOS name ORINDA is not in the table and must be added to the table:
NETBIOS: U add name=ORINDA,addr=1000.4444.5555,idb=TR1,vrn=0,type=1
The following line indicates that there was insufficient cache buffer space when the router tried to add this name:
NETBIOS: U no memory to add cache entry. name=ORINDA,addr=1000.4444.5555
The following line indicates that the NetBIOS ager detects an invalid memory in the cache. The router clears the entry; no action is needed.
NETBIOS: Invalid structure detected in netbios_name_cache_ager
The following line indicates that the entry for ORINDA was flushed from the cache table:
NETBIOS: flushed name=ORINDA, addr=1000.4444.5555
DB-1900
December 2010
The following line indicates that the entry for ORINDA timed out and was flushed from the cache table:
NETBIOS: expired name=ORINDA, addr=1000.4444.5555
The following line indicates that the router removed the ORINDA entry from its cache table:
NETBIOS: removing entry. name=ORINDA,addr=1000.4444.5555,idb=TR1,vrn=0
The following line indicates that the router discarded a NetBIOS packet of type ADD_NAME, STATUS, NAME_QUERY, or ADD_GROUP. These packets are discarded when multiple copies of one of these packet types are detected during a certain period of time.
NETBIOS: Tossing ADD_NAME/STATUS/NAME/ADD_GROUP frame
The following line indicates that the system could not find a NetBIOS name in the cache:
NETBIOS: Lookup Failed -- not in cache
The following line indicates that the system found the destination NetBIOS name in the cache, but located on the same ring from which the packet came. The router will drop this packet because the packet should not leave this ring.
NETBIOS: Lookup Worked, but split horizon failed
The following line indicates that the system found the NetBIOS name in the cache, but the router could not find the corresponding RIF. The packet will be sent as a broadcast frame.
NETBIOS: Could not find RIF entry
The following line indicates that no buffer was available to create a NetBIOS name cache proxy. A proxy will not be created for the packet, which will be forwarded as a broadcast frame.
NETBIOS: Cannot duplicate packet in netbios_name_cache_proxy
Related Commands
Description Displays information about NetBIOS protocol errors. Displays general information about NetBIOS packets.
DB-1901
debug netconf
To enable debugging of network configuration protocol (NETCONF) sessions, use the debug netconf command in privileged EXEC mode. To turn off NETCONF debugging, use the no form of this command. debug netconf {all | error} no debug netconf {all | error}
Syntax Description
all error
Enables debugging of NETCONF sessions, including NETCONF errors. Enables debugging of NETCONF errors.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(9)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB. This command was integrated into Cisco IOS Release 12.2(33)SXI.
12.2(33)SB 12.2(33)SXI
Usage Guidelines
The debug netconf command issues debug information only when an operational error has happened. In most situations, the NETCONF notifications sent between the NETCONF Network Manager and the client are sufficient to diagnose most NETCONF problems. To view Extensible Markup Language (XML) parsing errors when using NETCONF over SSHv2, you must also configure the debug cns xml all command.
Examples
The following example shows how to enable debugging of all NETCONF sessions:
Router# debug netconf 00:14:03: 00:14:03: 00:14:03: 00:14:03: 00:14:03: 00:14:03: NETCONF-ERROR: could not find user1 NETCONF-ERROR: could not find tftp://samplelocation/samplefile NETCONF: locking 1 by session 646B7038 NETCONF: locking 2 by session 646B7038 NETCONF: locking 1 by session 646B7038 NETCONF-ERROR: invalid session unlock attempt
DB-1902
December 2010
00:14:03: NETCONF: locking 1 by session 646B7038 00:14:03: NETCONF-ERROR: lock already active 00:14:13: NETCONF-ERROR: lock time 1 expired closing session 646B7038
Field NETCONF-ERROR: could not find user1 NETCONF-ERROR: could not find tftp://samplelocation/samplefile NETCONF: locking 1 by session 646B7038 NETCONF-ERROR: invalid session unlock attempt NETCONF-ERROR: lock already active NETCONF-ERROR: lock time 1 expired closing session 646B7038
Description NETCONF could not find the specified username. NETCONF could not find the specified file path. This user is locking NETCONF. Another user is trying to unlock NETCONF without first acquiring the lock. Another user is trying to lock NETCONF while it is currently locked. A locked NETCONF session has been idle longer than the time configured by the netconf lock-time command. The locked NETCONF session is closed.
Related Commands
Command clear netconf debug cns xml netconf lock-time netconf max-sessions netconf ssh show netconf
Description Clears NETCONF statistics counters, NETCONF sessions, and frees associated resources and locks. Turns on debugging messages related to the CNS XML parser. Specifies the maximum time a NETCONF configuration lock is in place without an intermediate operation. Specifies the maximum number of concurrent NETCONF sessions allowed. Enables NETCONF over SSHv2. Displays NETCONF statistics counters and session information.
DB-1903
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. T.38 fax relay call statistics were made available to Call Detail Records (CDRs) through Vendor-Specific Attributes (VSAs) and added to the call log. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
This command debugs digital signal processor (DSP) message exchanges between applications and the DSP.
Examples
DB-1904
December 2010
May 7 21:09:51.803 UTC: np_vsmgr_dispatch_voice_rsp(1/2): VOICE_LINK_INFO_RSP_NTF Received May 7 21:09:51.803 UTC: request_id = 0x01, request_type = 0x0F May 7 21:09:51.803 UTC: VOICE_TRANSMIT_STATS(1/2): num_voice_packets 4 num_sig_packets 0 num_cn_packets 1 transmit_duration 8FC end_point_detection 0 May 7 21:09:51.803 UTC: VOICE_RECEIVE_STATS(1/2): num_voice_packets 4 num_sig_packets 0 num_cn_packets 1 receive_duration 8FC voice_receive_duration 0 num_pos_packets 0 num_bph_packets 0 num_late_packets 0 num_early_packets 0 May 7 21:09:51.803 UTC: VOICE_PLAYOUT_DELAY_STATS(1/2): curr_playout_delay 0 min_playout_delay 0 max_playout_delay 0 clock offset 0 May 7 21:09:51.803 UTC: VOICE_PLAYOUT_ERROR(1/2): pred_conceal 0x0 inter_conceal 0x0 silence_conceal 0x0 buffer_overflow 0x0 endpt_det_error 0x0 May 7 21:09:53.231 UTC: np_vsmgr_dispatch_voice_rsp(1/2): VOICE_LINK_INFO_RSP_NTF Received May 7 21:09:53.231 UTC: request_id = 0x01, request_type = 0x0F May 7 21:09:53.231 UTC: VOICE_TRANSMIT_STATS(1/2): num_voice_packets 1E num_sig_packets 0 num_cn_packets 1 transmit_duration E92 end_point_detection 0 May 7 21:09:53.231 UTC: VOICE_RECEIVE_STATS(1/2): num_voice_packets 4 num_sig_packets 0 num_cn_packets 1 receive_duration E92 voice_receive_duration 0 num_pos_packets 0 num_bph_packets 0 num_late_packets 0 num_early_packets 0 May 7 21:09:53.231 UTC: VOICE_PLAYOUT_DELAY_STATS(1/2): curr_playout_delay 5A min_playout_delay 5A max_playout_delay 5A clock offset 19778906 May 7 21:09:53.231 UTC: VOICE_PLAYOUT_ERROR(1/2): pred_conceal 0x0 inter_conceal 0x0 silence_conceal 0x0 buffer_overflow 0x0 endpt_det_error 0x0 May 7 21:09:56.055 UTC: np_vsmgr_dispatch_voice_rsp(1/2): VOICE_LINK_INFO_RSP_NTF Received May 7 21:09:56.055 UTC: request_id = 0x01, request_type = 0x0F May 7 21:09:56.055 UTC: VOICE_TRANSMIT_STATS(1/2): num_voice_packets 23 num_sig_packets 0 num_cn_packets 2 transmit_duration 19A0 end_point_detection BB8 May 7 21:09:56.055 UTC: VOICE_RECEIVE_STATS(1/2): num_voice_packets 8A num_sig_packets 0 num_cn_packets 1 receive_duration 19A0 voice_receive_duration 0 num_pos_packets 0 num_bph_packets 0 num_late_packets 0 num_early_packets 1 May 7 21:09:56.055 UTC: VOICE_PLAYOUT_DELAY_STATS(1/2): curr_playout_delay 3C min_playout_delay 3C max_playout_delay 64 clock offset 197788E4 May 7 21:09:56.055 UTC: VOICE_PLAYOUT_ERROR(1/2): pred_conceal 0x0 inter_conceal 0x0 silence_conceal 0x0 buffer_overflow 0x1 endpt_det_error 0x0 May 7 21:09:56.855 UTC: vsm(1/2): np_vsmgr_voice_state_change() - state IDLE May 7 21:09:57.907 UTC: vsm(1/2): np_vsmgr_voice_state_change() - state ACTIVE May 7 21:09:57.907 UTC: FAX_RELAY_LINK_INFO_RSP_NTF: slot 1 port 2 timestamp 68137565 fr-entered (20ms) May 7 21:09:57.907 UTC: chan_id [3/1:D] np_vsmgr_fax_relay_link_info_response: May 7 21:10:15.047 UTC: np_fax_relay_t30_decode : Tx Direction May 7 21:10:15.067 UTC: FARELAY_INIT_HS_MOD : 0xC May 7 21:10:51.579 UTC: FAX_RELAY_DATA_PUMP_STATS(1/2) - valid:0x3FFC1F55 state_code:0x0 level:0x18 phase_jitter:0x5 freq_offset:0x0 eqm:0x7FFE jit_depth:0x230 jit_buf_ov:0x0 tx_paks:0x626 rx_pkts:0x5A inv_pkts:0x0 oos_pkts:0x0 hs_mod:0x8 init_hs_mod:0xC tx_pgs:0x1 rx_pgs:0x0 ecm:0x1 nsf_country:0x0 nsf_manuf_len:0x20 nsf_manuf:0031B8EE80C48511DD0D0000DDDD0000DDDD000000000000000022ED00B0A400 encap:0x1 pkt_loss_con:0x0 May 7 21:10:52.463 UTC: vsm(1/2): np_vsmgr_voice_state_change() - state IDLE May 7 21:10:52.463 UTC: vsm(1/2): np_vsmgr_voice_state_change - NULL DSP Interface Handle
DB-1905
May 7 21:09:51.443 UTC: vsm(1/2): np_vsmgr_voice_state_change() - state ACTIVE May 7 21:09:51.467 UTC: np_vsmgr_dispatch_voice_rsp(1/2): VOICE_LINK_INFO_RSP_NTF Received May 7 21:09:51.467 UTC: request_id = 0x01, request_type = 0x0F May 7 21:09:51.467 UTC: VOICE_TRANSMIT_STATS(1/2): num_voice_packets 0 num_sig_packets 0 num_cn_packets 0 transmit_duration 0 end_point_detection 0 May 7 21:09:51.467 UTC: VOICE_RECEIVE_STATS(1/2): num_voice_packets 0 num_sig_packets 0 num_cn_packets 0 receive_duration 0 voice_receive_duration 0 num_pos_packets 0 num_bph_packets 0 num_late_packets 0 num_early_packets 0 May 7 21:09:51.467 UTC: VOICE_PLAYOUT_DELAY_STATS(1/2): curr_playout_delay 0 min_playout_delay 0 max_playout_delay 0 clock offset 0 May 7 21:09:51.467 UTC: VOICE_PLAYOUT_ERROR(1/2): pred_conceal 0x0 inter_conceal 0x0 silence_conceal 0x0 buffer_overflow 0x0 endpt_det_error 0x0 May 7 21:09:53.787 UTC: np_vsmgr_dispatch_voice_rsp(1/2): VOICE_LINK_INFO_RSP_NTF Received May 7 21:09:53.787 UTC: request_id = 0x01, request_type = 0x0F May 7 21:09:53.787 UTC: VOICE_TRANSMIT_STATS(1/2): num_voice_packets 19 num_sig_packets 0 num_cn_packets 1 transmit_duration 910 end_point_detection 0 May 7 21:09:53.787 UTC: VOICE_RECEIVE_STATS(1/2): num_voice_packets 1F num_sig_packets 0 num_cn_packets 2 receive_duration 910 voice_receive_duration 0 num_pos_packets 0 num_bph_packets 0 num_late_packets 0 num_early_packets 0 May 7 21:09:53.787 UTC: VOICE_PLAYOUT_DELAY_STATS(1/2): curr_playout_delay 5A min_playout_delay 5A max_playout_delay 5A clock offset 68877C4 May 7 21:09:53.787 UTC: VOICE_PLAYOUT_ERROR(1/2): pred_conceal 0x0 inter_conceal 0x0 silence_conceal 0x0 buffer_overflow 0x0 endpt_det_error 0x0 May 7 21:09:56.571 UTC: np_vsmgr_dispatch_voice_rsp(1/2): VOICE_LINK_INFO_RSP_NTF Received May 7 21:09:56.571 UTC: request_id = 0x01, request_type = 0x0F May 7 21:09:56.571 UTC: VOICE_TRANSMIT_STATS(1/2): num_voice_packets A5 num_sig_packets 0 num_cn_packets 1 transmit_duration 13F6 end_point_detection 0 May 7 21:09:56.571 UTC: VOICE_RECEIVE_STATS(1/2): num_voice_packets 30 num_sig_packets 0 num_cn_packets 2 receive_duration 13F6 voice_receive_duration 7D0 num_pos_packets 0 num_bph_packets 0 num_late_packets 0 num_early_packets 0 May 7 21:09:56.571 UTC: VOICE_PLAYOUT_DELAY_STATS(1/2): curr_playout_delay 64 min_playout_delay 5A max_playout_delay 64 clock offset 68877D4 May 7 21:09:56.571 UTC: VOICE_PLAYOUT_ERROR(1/2): pred_conceal 0x0 inter_conceal 0x0 silence_conceal 0x0 buffer_overflow 0x0 endpt_det_error 0x0 May 7 21:09:56.807 UTC: VOICE_DET_STATUS_CHANGE_NTF(1/2): detector mask: 1 timestamp 791687D5 May 7 21:09:56.855 UTC: vsm(1/2): np_vsmgr_voice_state_change() - state IDLE May 7 21:09:57.911 UTC: vsm(1/2): np_vsmgr_voice_state_change() - state ACTIVE May 7 21:09:57.911 UTC: FAX_RELAY_LINK_INFO_RSP_NTF: slot 1 port 2 timestamp 65325022 fr-entered (20ms) May 7 21:09:57.911 UTC: chan_id [3/1:D (6)] np_vsmgr_fax_relay_link_info_response: May 7 21:10:15.043 UTC: np_fax_relay_t30_decode : Rx Direction May 7 21:10:15.107 UTC: FARELAY_INIT_HS_MOD : 0x8 May 7 21:10:51.376 UTC: FAX_RELAY_DET_STATUS_CHANGE: slot: 1 port: 2 detector mask 0x2 May 7 21:10:51.404 UTC: FAX_RELAY_DATA_PUMP_STATS(1/2) - valid:0x3FFC1F55 state_code:0x1 level:0x18 phase_jitter:0x0 freq_offset:0x0 eqm:0x7FFE jit_depth:0x39E jit_buf_ov:0x0 tx_paks:0x5A rx_pkts:0x626 inv_pkts:0x0 oos_pkts:0x0 hs_mod:0x8 init_hs_mod:0x8 tx_pgs:0x0 rx_pgs:0x1 ecm:0x1 nsf_country:0x0 nsf_manuf_len:0x20 nsf_manuf:0031B8EE80C48511DD0D0000DDDD0000DDDD000000000000000022ED00B0A400 encap:0x1 pkt_loss_con:0x0 May 7 21:10:52.288 UTC: FAX_RELAY_LINK_INFO_RSP_NTF: slot 1 port 2 timestamp 65760060 fr-end May 7 21:10:52.304 UTC: vsm(1/2): np_vsmgr_voice_state_change() - state IDLE May 7 21:10:52.388 UTC: vsm(1/2): np_vsmgr_voice_state_change() - state ACTIVE May 7 21:10:52.416 UTC: np_vsmgr_dispatch_voice_rsp(1/2): VOICE_LINK_INFO_RSP_NTF Received May 7 21:10:52.416 UTC: request_id = 0x05, request_type = 0x30 May 7 21:10:52.416 UTC: VOICE_LEVELS_STATS(1/2): tx_power FF7E tx_mean FF7F rx_power FDBD rx_mean FB48 bnl FD81 erl FD acom 1EA tx_act 1 rx_act 0 May 7 21:10:52.440 UTC: vsm(1/2): np_vsmgr_voice_state_change() - state IDLE May 7 21:10:52.440 UTC: vsm(1/2): np_vsmgr_voice_state_change - NULL DSP Interface Handle
DB-1906
December 2010
Related Commands
Description Displays details of the DSP API message events with debugging enabled. Creates a voicecap on NextPort platforms. Applies a voicecap on NextPort platforms.
DB-1907
debug nhrp
To enable Next Hop Resolution Protocol (NHRP) debugging, use the debug nhrp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug nhrp {ipv4 | ipv6} [cache | extension | packet | rate] no debug nhrp
Syntax Description(
Specifies the IPv4 overlay address. Specifies the IPv6 overlay address. (Optional) Specifies NHRP cache operations. (Optional) Specifies NHRP extension processing. (Optional) Specifies NHRP activity. (Optional) Specifies NHRP rate limiting.
Command Default
Command Modes
Command History
Release 12.4(20)T
Examples
DB-1908
December 2010
Related Commands
Description Displays DMVPN session debugging information. Displays NHRP error level debugging information.
DB-1909
Syntax Description
(Optional) Specifies a tunnel. (Optional) Displays NHRP information based on a specific interface. (Optional) Specifies the tunnel address for the NHRP peer. (Optional) Specifies an NHRP peer. (Optional) Specifies mapping nonbroadcast multiple access (NBMA). (Optional) The IPv4 address for the NHRP peer. (Optional) Next hop server (NHS) fully qualified domain name (FQDN) string. (Optional) The IPv6 address for the NHRP peer.
Note
Cisco IOS XE Release 2.5 does not support the ipv6-address argument.
vrf vrf-name
(Optional) Specifies debugging information for sessions related to the specified virtual routing and forwarding (VRF) configuration.
Command Modes
Command History
Modification This command was introduced. This command was modified. The ipv6-address argument was added. This command was integrated into Cisco IOS XE Release 2.5 and implemented on the Cisco ASR 1000 Series Aggregation Services Routers. This command was modified. The FQDN-string argument was added.
Examples
The following example shows how to enable conditional NHRP debugging for a specified NBMA address:
Router# debug nhrp condition peer tunnel 192.0.2.1
DB-1910
December 2010
The following example shows how to enable conditional NHRP debugging for a specified FQDN string:
Router# debug nhrp condition peer examplehub.example1.com
Related Commands
Description Displays DMVPN session debugging information. Displays NHRP error level debugging information.
DB-1911
Syntax Description
ipv4 ipv6
Specifies the IPv6 overlay network. Specifies the IPv6 overlay network.
Command Default
Command Modes
Command History
Modification This command was introduced. The ipv4 and ipv6 keywords were added.
Examples
The following example shows how to enable error level debugging for IPv4 NHRP:
Router# debug nhrp ipv4 error NHRP errors debugging is on
Related Commands
Description Displays DMVPN session debugging information. Enables NHRP conditional debugging.
DB-1912
December 2010
Syntax Description
Examples
The following is sample output from the debug nhrp extension command:
Router# debug nhrp extension NHRP extension processing debugging is on Router# Forward Transit NHS Record Extension(4): (C-1) code: no error(0) prefix: 0, mtu: 9180, hd_time: 7200 addr_len: 20(NSAP), subaddr_len: 0(NSAP), proto_len: 4, pref: 0 client NBMA: 47.0091810000000002ba08e101.525354555354.01 client protocol: 135.206.58.54 Reverse Transit NHS Record Extension(5): Responder Address Extension(3): (C) code: no error(0) prefix: 0, mtu: 9180, hd_time: 7200 addr_len: 20(NSAP), subaddr_len: 0(NSAP), proto_len: 4, pref: 0 client NBMA: 47.0091810000000002ba08e101.525354555355.01 client protocol: 135.206.58.55 Forward Transit NHS Record Extension(4): (C-1) code: no error(0) prefix: 0, mtu: 9180, hd_time: 7200 addr_len: 20(NSAP), subaddr_len: 0(NSAP), proto_len: 4, pref: 0 client NBMA: 47.0091810000000002ba08e101.525354555354.01 client protocol: 135.206.58.54 Reverse Transit NHS Record Extension(5): Responder Address Extension(3): Forward Transit NHS Record Extension(4): Reverse Transit NHS Record Extension(5):
DB-1913
Syntax Description
Usage Guidelines
Use this command to show you whether there are problems or error situations with NHRP option processing (for example, unknown options).
Examples
The following is sample output from the debug nhrp options command:
Router# debug nhrp options NHRP-OPT: MASK 4 NHRP-OPT-MASK: FFFFFFFF NHRP-OPT: NETID 4 NHRP-OPT: RESPONDER 4 NHRP-OPT: RECORD 0 NHRP-OPT: RRECORD 0
Descriptions NHRP options debugging output. Number of bytes of information in the destination prefix option. Contents of the destination prefix option. Number of bytes of information in the subnetwork identifier option. Number of bytes of information in the responder address option. Forward record option. Reverse record option.
Related Commands
Description Displays information about NHRP activity. Displays a dump of NHRP packets.
DB-1914
December 2010
Syntax Description
Examples
The following is sample output from the debug nhrp packet command:
Router# debug nhrp packet NHRP activity debugging is on Router# NHRP: Send Purge Request via ATM3/0.1, packet size: 72 src: 135.206.58.55, dst: 135.206.58.56 (F) afn: NSAP(3), type: IP(800), hop: 255, ver: 1 shtl: 20(NSAP), sstl: 0(NSAP) (M) flags: "reply required", reqid: 2 src NBMA: 47.0091810000000002ba08e101.525354555355.01 src protocol: 135.206.58.55, dst protocol: 135.206.58.56 (C-1) code: no error(0) prefix: 0, mtu: 9180, hd_time: 0 addr_len: 0(NSAP), subaddr_len: 0(NSAP), proto_len: 4, pref: 0 client protocol: 135.206.58.130 NHRP: Receive Purge Reply via ATM3/0.1, packet size: 72 (F) afn: NSAP(3), type: IP(800), hop: 254, ver: 1 shtl: 20(NSAP), sstl: 0(NSAP) (M) flags: "reply required", reqid: 2 src NBMA: 47.0091810000000002ba08e101.525354555355.01 src protocol: 135.206.58.55, dst protocol: 135.206.58.56 (C-1) code: no error(0) prefix: 0, mtu: 9180, hd_time: 0 addr_len: 0(NSAP), subaddr_len: 0(NSAP), proto_len: 4, pref: 0 client protocol: 135.206.58.130
DB-1915
Syntax Description
Usage Guidelines
Use this command to verify that the traffic is consistent with the setting of the NHRP commands (such as ip nhrp use and ip max-send commands).
Examples
The following is sample output from the debug nhrp rate command:
Router# debug nhrp rate NHRP-RATE: NHRP-RATE: NHRP-RATE: NHRP-RATE: Sending initial request Retransmitting request (retrans ivl 2) Retransmitting request (retrans ivl 4) Ethernet1: Used 3
Descriptions NHRP rate debugging output. First time an attempt was made to send an NHRP packet to a particular destination. Indicates that the NHRP packet was re-sent, and shows the time interval (in seconds) to wait before the NHRP packet is re-sent again. Interface over which the NHRP packet was sent. Number of packets sent out of the default maximum five (in this case, three were sent).
Related Commands
Description Displays information about NHRP activity. Displays information about NHRP option processing
DB-1916
December 2010
debug ntp
To display debugging messages for Network Time Protocol (NTP) features, use the debug ntp command in prvileged EXEC mode. To disable debugging output, use the no form of this command. debug ntp {adjust | all | authentication | core | events | loopfilter | packet | params | refclock | select | sync | validity} no debug ntp {adjust | all | authentication | core | events | loopfilter | packet | params | refclock | select | sync | validity}
Syntax Description
adjust all authentication core events loopfilter packet params refclock select sync validity
Displays debugging information on NTP clock adjustments. Displays all debugging information on NTP. Displays debugging information on NTP authentication. Displays debugging information on NTP core messages. Displays debugging information on NTP events. Displays debugging information on NTP loop filters. Displays debugging information on NTP packets. Displays debugging information on NTP clock parameters. Displays debugging information on NTP reference clocks. Displays debugging information on NTP clock selection. Displays debugging information on NTP clock synchronization. Displays debugging information on NTP peer clock validity.
Command Default
Command Modes
Command History
Modification This command was introduced in a release prior to Cisco IOS Release 12.1. This command was integrated into Cisco IOS Release 12.2(33)SRA. Support for IPv6 and NTP version 4 was added. The all and core keywords were added. The authentication, loopfilter, params, select, sync and validity keywords were removed. The packets keyword was modified as packet.
Usage Guidelines
Starting from Cisco IOS Release 12.4(20)T, NTP version 4 is supported. In NTP version 4 the debugging options available are adjust, all, core, events, packet, and refclock. In NTP version 3 the debugging options available were events, authentication, loopfilter, packets, params, select, sync and validity.
DB-1917
Examples
The following example shows how to enable all debugging options for NTP:
Router# debug ntp all NTP NTP NTP NTP NTP events debugging is on core messages debugging is on clock adjustments debugging is on reference clocks debugging is on packets debugging is on
Related Commands
Description Configures an external clock source for use with NTP services.
DB-1918
December 2010
debug oam
To display operation and maintenance (OAM) events, use the debug oam command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug oam no debug oam
Syntax Description
Command Modes
Privileged EXEC
Examples
Description Virtual circuit designator (VCD) Special OAM indicator. Descriptor MODE bits for the ATM Interface Processor (AIP). GFC (4 bits). Virtual path identifier (VPI) (8 bits). Virtual channel identifier (VCI )(16 bits). Payload type field (PTI) (4 bits). Header Error Correction (8 bits). OAM Fault mangement cell (4 bits). OAM LOOPBACK indicator (4 bits). Loopback indicator value, always 1 (8 bits). Loopback unique ID, sequence number (32 bits). Fs and 6A required in the remaining cell, per UNI3.0.
DB-1919
Syntax Description
detail
Command Default
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer api command is used to display messages about any configured OER application interface providers or host devices. The OER application interface defines the mode of communication and messaging between applications and the network for the purpose of optimizing the traffic associated with the applications. A provider is defined as an entity outside the network in which the router configured as an OER master controller exists, for example, an ISP, or a branch office of the same company. The provider has one or more host devices running one or more applications that use the OER application interface to communicate with an OER master controller. A provider must be registered with an OER master controller before an application on a host device can interface with OER. Use the api provider command to register the provider, and use the host-address command to configure a host device. After registration, a host device in the provider network can initiate a session with an OER master controller. The application interface provides an automated method for networks to be aware of applications and provides application-aware performance routing.
Caution
When the detail keyword is entered, the amount of detailed output to be displayed can utilize a considerable amount of system resources. Use the detail keyword with caution in a production network.
Examples
The following example enables the display of OER application interface debugging messages and the output shows that an OER policy failed due to a prefix that is not found:
Router# debug oer api
DB-1920
December 2010
OER api debugging is on *May 26 01:04:07.278: OER session id 1, requies2 *May 26 01:04:07.278: OER *May 26 01:04:07.278: OER SrcMask 0.0.0.0 *May 26 01:04:07.278: OER Sport_max 0 Dport_mi0 *May 26 01:04:07.278: OER *May 26 01:04:07.278: OER *May 26 01:04:07.278: OER request id 22, sequence0 *May 26 01:04:07.278: OER API: Data set id received 5, data set len 9, host ip 10.3.3.3, API: Received get current policy, session id 1 request id 22 API: Recvd Appl with Prot 256 DSCP 0 SrcPrefix 0.0.0.0/0 API: DstPrefix 10.2.0.0/24 DstMask 255.255.255.0 Sport_min 0
API: get prefix policy failed - prefix not found API: Get curr policy cmd received. rc 0 API: Received send status response, status 0, session id 1, API: rc for data set 0
Table 255 describes the significant fields shown in the display. The content of the debugging messages depends on the commands that are subsequently entered at the router prompt.
Table 255 debug oer api Field Descriptions
Description Shows that application interface debugging is enabled. Displays an OER application interface message.
Related Commands
Description Registers an application interface provider with an OER master controller and enters OER master controller application interface provider configuration mode. Configures information about a host device used by an application interface provider to communicate with an OER master controller. Enables an OER process and configures a router as an OER border router or as an OER master controller. Displays information about application interface providers registered with OER.
DB-1921
Syntax Description
detail
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer api client command can be entered on a master controller. This command is used to display messages about a configured OER API client. When the detail keyword is entered, the amount of detailed output to be displayed can utilize a considerable amount of system resources. Use the detail keyword with caution in a production network.
Examples
The following example enables the display of OER API client debugging messages:
Router# debug oer api client API Client debugging enabled
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1922
December 2010
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer border command is entered on a border router. This command is used to display debugging information about the OER border process, controlled routes and monitored prefixes.
Examples
DB-1923
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1924
December 2010
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer border active-probe command is entered on a master controller. This command is used to display the status and results of active probes that are configured on the local border router.
Examples
The following example enables the display of active-probe debug information on a border router:
Router# debug oer border active-probe *May 4 23:47:45.633: OER BR ACTIVE PROBE: Attempting to retrieve Probe Statistics. probeType = echo, probeTarget = 10.1.5.1, probeTargetPort = 0 probeSource = Default, probeSourcePort = 0, probeNextHop = Default probeIfIndex = 13 *May 4 23:47:45.633: OER BR ACTIVE PROBE: Completed retrieving Probe Statistics. probeType = echo, probeTarget = 10.1.5.1, probeTargetPort = 0 probeSource = Default, probeSourcePort = 0, probeNextHop = 10.30.30.2 probeIfIndex = 13, SAA index = 15 *May 4 23:47:45.633: OER BR ACTIVE PROBE: Completions 11, Sum of rtt 172, Max rtt 36, Min rtt 12 *May 4 23:47:45.693: OER BR ACTIVE PROBE: Attempting to retrieve Probe Statistics. probeType = echo, probeTarget = 10.1.4.1, probeTargetPort = 0 probeSource = Default, probeSourcePort = 0, probeNextHop = Default
DB-1925
probeIfIndex = 13 *May 4 23:47:45.693: OER BR ACTIVE PROBE: Completed retrieving Probe Statistics. probeType = echo, probeTarget = 10.1.4.1, probeTargetPort = 0 probeSource = Default, probeSourcePort = 0, probeNextHop = 10.30.30.2 probeIfIndex = 13, SAA index = 14
Field OER BR ACTIVE PROBE: Statistics probeType probeTarget probeTargetPort probeSource probeSourcePort probeNextHop probeIfIndex SAA index
Description Indicates debugging information for OER active probes on a border router. The heading for OER active probe statistics. The active probe type. The active probe types that can be displayed are ICMP, TCP, and UDP. The target IP address of the active probe. The target port of the active probe. The source IP address of the active probe. Default is displayed for a locally generated active probe. The source port of the active probe. The next hop for the active probe. The active probe source interface index. The IP SLAs collection index number.
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1926
December 2010
Syntax Description
top number
(Optional) Displays debugging information about the top delay or top throughput prefixes. The number of top delay or throughput prefixes can be specified. The range of prefixes that can be specified is a number from 1 to 65535.
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer border learn command is entered on a border router. This command is used to display debugging information about prefixes learned on the local border router.
Examples
The following example enables the display of active-probe debug information on a border router:
Router# debug oer border learn *May 4 22:51:31.971: OER BR LEARN: Reporting prefix 1: 10.1.5.0, throughput 201 *May 4 22:51:31.971: OER BR LEARN: Reporting 1 throughput learned prefixes *May 4 22:51:31.971: OER BR LEARN: State change, new STOPPED, old STARTED, reason Stop Learn
DB-1927
Description Indicates debugging information for the OER border router learning process.
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1928
December 2010
Syntax Description
bgp static
Displays debugging information for only BGP routes. Displays debugging information for only static routes.
Command Default
No debugging is enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer border routes command is entered on a border router. This command is used to display the debugging information about OER controlled or monitored routes on the local border router.
Examples
The following example enables the display of active-probe debug information on a border router:
Router# debug oer border routes *May *May *May *May 4 4 4 4 22:35:53.239: 22:35:53.239: 22:35:53.239: 22:35:53.239: OER OER OER OER BGP: BGP: BGP: BGP: Control exact prefix 10.1.5.0/24 Walking the BGP table for 10.1.5.0/24 Path for 10.1.5.0/24 is now under OER control Setting prefix 10.1.5.0/24 as OER net#
DB-1929
Table 259
Description Indicates debugging information for OER controlled BGP routes. Indicates debugging information for OER controlled Static routes. (Not displayed in the example output.)
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1930
December 2010
Syntax Description
detail
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer border traceroute reporting command is entered on a border router. This command is used to display the debugging information about traceroute probes sourced on the local border router.
Examples
The following example enables the display of active-probe debug information on a border router:
Router# debug oer border traceroute reporting May 19 03:46:23.807: OER BR TRACE(det): Received start message: msg1 458776, msg2 1677787648, if index 19, host addr 100.1.2.1, flags 1, max ttl 30, protocol 17, probe delay 0 May 19 03:46:26.811: OER BR TRACE(det): Result msg1 458776, msg2 1677787648 num hops 30 sent May 19 03:47:20.919: OER BR TRACE(det): Received start message: msg1 524312, msg2 1677787648, if index 2, host addr 100.1.2.1, flags 1, max ttl 30, protocol 17, probe delay 0 May 19 03:47:23.923: OER BR TRACE(det): Result msg1 524312, msg2 1677787648 num hops 3 sent
DB-1931
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1932
December 2010
debug oer cc
To display OER communication control debugging information for master controller and border router communication, use the debug oer cc command in privileged EXEC mode. To stop the display of OER debugging information, use the no form of this command. debug oer cc [detail] no debug oer cc [detail]
Syntax Description
detail
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer cc command can be entered on a master controller on a border router. This command is used to display messages exchanged between the master controller and the border router. These messages include control commands, configuration commands, and monitoring information. Enabling this command will cause very detailed output to be displayed and can utilize a considerable amount of system resources. This command should be enabled with caution in a production network.
Examples
The following example enables the display of OER communication control debugging messages:
Router# debug oer cc *May 4 23:03:22.527: OER CC: ipflow prefix reset received: 10.1.5.0/24
DB-1933
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1934
December 2010
Syntax Description
ip-address
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer master border command is entered on a master controller. The output displays information related to the events or updates from one or more border routers.
Examples
The following example shows the status of 2 border routers. Both routers are up and operating normally.
Router# debug oer master border OER Master Border Router debugging is on Router# 1d05h: OER MC BR 10.4.9.7: BR I/F update, status 0, rx bw 100000, time, tx ld 0, rx ld 0, rx rate tx bytes 5016033 1d05h: OER MC BR 10.4.9.7: BR I/F update, status 0, rx bw 100000, time, tx ld 0, rx ld 0, rx rate x bytes 1028907 1d05h: OER MC BR 10.4.9.6: BR I/F update, status 0, rx bw 100000, time, tx ld 0, rx ld 0, rx rate x bytes 1027912 1d05h: OER MC BR 10.4.9.6: BR I/F update, status 0, rx bw 100000, time, tx ld 0, rx ld 0, rx rate tx bytes 5013993
UP, line 1 index 1, tx bw 10000 0 rx bytes 3496553, tx rate 0, UP, line 1 index 2, tx bw 10000 0 rx bytes 710149, tx rate 0, t UP, line 1 index 2, tx bw 10000 0 rx bytes 743298, tx rate 0, t UP, line 1 index 1, tx bw 10000 0 rx bytes 3491383, tx rate 0,
DB-1935
Table 262
Description Indicates debugging information for a border router process. The ip-address identifies the border router.
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1936
December 2010
Syntax Description
Displays aggregate active probe results for a given prefix on all border routers that are executing the active probe. (Optional) Displays the active probe results from each target for a given prefix on all border routers that are executing the active probe. (Optional) Displays aggregate active probe results and historical statistics for a given prefix on all border routers that are executing the active probe. Displays information about the passive (NetFlow) measurements received by the master controller for prefixes monitored from the border router.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer master collector command is entered on a master controller. The output displays data collection information for monitored prefixes.
Examples
The following example displays aggregate active probe results for the 10.1.0.0/16 prefix on all border routers that are configured to execute this active probe:
Router# debug oer master collector active-probes *May 4 22:34:58.221: OER MC APC: Probe Statistics Gathered for prefix 10.1.0.0/16 on all exits,notifying the PDP *May 4 22:34:58.221: OER MC APC: Summary Exit Data (pfx 10.1.0.0/16, bdr 10.2.2.2, if 13, nxtHop Default):savg delay 13, lavg delay 14, sinits 25, scompletes 25
DB-1937
*May 4 22:34:58.221: OER MC APC: Summary Prefix Data: (pfx 10.1.0.0/16) sloss 0, lloss 0, sunreach 25, lunreach 25, savg raw delay 15, lavg raw delay 15, sinits 6561, scompletes 6536, linits 6561, lcompletes 6536 *May 4 22:34:58.221: OER MC APC: Active OOP check done
Description Indicates debugging information for active probes from the r OER master collector.
The following example displays aggregate active probe results from each target for the 10.1.0.0/16 prefix on all border routers that are configured to execute this active probe:
Router# debug oer master collector active-probes detail *May 4 22:36:21.945: OER MC APC: Rtrv Probe Stats: BR 10.2.2.2, Type echo, Tgt 10.1.1.1,TgtPt 0, Src Default, SrcPt 0, NxtHp Default, Ndx 13 *May 4 22:36:22.001: OER MC APC: Remote stats received: BR 10.2.2.2, Type echo, Tgt 10.15.1, TgtPt 0, Src Default, SrcPt 0, NxtHp Default, Ndx 13 *May 4 22:36:22.313: OER MC APC: Perf data point (pfx 10.1.0.0/16, bdr 10.2.2.2, if 13, xtHop Default): avg delay 20, loss 0, unreach 0, initiations 2, completions 2, delay sum40, ldelay max 20, ldelay min 12 *May 4 22:36:22.313: OER MC APC: Perf data point (pfx 10.1.0.0/16, bdr 10.2.2.2, if 13, xtHop Default): avg delay 20, loss 0, unreach 0, initiations 2, completions 2, delay sum40, ldelay max 20, ldelay min 12 *May 4 22:36:22.313: OER MC APC: Probe Statistics Gathered for prefix 10.1.0.0/16 on al exits, notifying the PDP *May 4 22:36:22.313: OER MC APC: Active OOP check done
Description Indicates debugging information for active probes from the r OER master collector.
The following example displays aggregate active probe results and historical statistics from each target for the 10.1.0.0/16 prefix on all border routers that are configured to execute this active probe:
Router# debug oer master collector active-probes detail trace *May 4 22:40:33.845: OER MC APC: Rtrv Probe Stats: BR 10.2.2.2, Type echo, Tgt 10.1.5.1, TgtPt 0, Src Default, SrcPt 0, NxtHp Default, Ndx 13 *May 4 22:40:33.885: OER MC APC: Remote stats received: BR 10.2.2.2, Type echo, Tgt 10.1.5.1, TgtPt 0, Src Default, SrcPt 0, NxtHp Default, Ndx 13 *May 4 22:40:34.197: OER MC APC: Remote stats received: BR 10.2.2.2, Type echo, Tgt 10.1.2.1, TgtPt 0, Src Default, SrcPt 0, NxtHp Default, Ndx 13 *May 4 22:40:34.197: OER MC APC: Updating Probe (Type echo Tgt 10.1.2.1 TgtPt 0) Total Completes 1306, Total Attempts 1318 *May 4 22:40:34.197: OER MC APC: All stats gathered for pfx 10.1.0.0/16 Accumulating Stats *May 4 22:40:34.197: OER MC APC: Updating Curr Exit Ref (pfx 10.1.0.0/16,
DB-1938
December 2010
bdr 10.2.2.2, if 13, nxtHop Default) savg delay 17, lavg delay 14, savg loss 0, lavg loss 0, savg unreach 0, lavg unreach 0 *May 4 22:40:34.197: OER MC APC: Probe Statistics Gathered for prefix 10.1.0.0/16 on all exits, notifying the PDP *May 4 22:40:34.197: OER MC APC: Active OOP check done
Description Indicates debugging information for active probes from the r OER master collector.
The following example displays passive monitoring results for the 10.1.5.0/24 prefix:
Router# debug oer master collector netflow *May 4 22:31:45.739: OER MC NFC: Rcvd egress update from BR 10.1.1.2 prefix 10.1.5.0/24 Interval 75688 delay_sum 0 samples 0 bytes 20362 pkts 505 flows 359 pktloss 1 unreach 0 *May 4 22:31:45.739: OER MC NFC: Updating exit_ref; BR 10.1.1.2 i/f Et1/0, s_avg_delay 655, l_avg_delay 655, s_avg_pkt_loss 328, l_avg_pkt_loss 328, s_avg_flow_unreach 513, l_avg_flow_unreach 513 *May 4 22:32:07.007: OER MC NFC: Rcvd ingress update from BR 10.1.1.3 prefix 10.1.5.0/24 Interval 75172 delay_sum 42328 samples 77 bytes 22040 pkts 551 flows 310 pktloss 0 unreach 0
Description Indicates debugging information for the OER master collector from passive monitoring (NetFlow).
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1939
Syntax Description
detail
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer master cost-minimization command is entered on a master controller. The output displays debugging information for cost-minimization policies.
Examples
The following example displays detailed cost optimization policy debug information:
Router# debug oer master cost-minimization detail OER Master cost-minimization Detail debugging is on *May 14 00:38:48.839: OER MC COST: Momentary target utilization for exit 10.1.1.2 i/f Ethernet1/0 nickname ISP1 is 7500 kbps, time_left 52889 secs, cumulative 16 kb, rollup period 84000 secs, rollup target 6000 kbps, bw_capacity 10000 kbps *May 14 00:38:48.839: OER MC COST: Cost OOP check for border 10.1.1.2, current util: 0 target util: 7500 kbps *May 14 00:39:00.199: OER MC COST: ISP1 calc separate rollup ended at 55 ingress Kbps *May 14 00:39:00.199: OER MC COST: ISP1 calc separate rollup ended at 55 egress bytes *May 14 00:39:00.199: OER MC COST: Target utilization for nickname ISP1 set to 6000, rollups elapsed 4, rollups left 24 *May 14 00:39:00.271: OER MC COST: Momentary target utilization for exit 10.1.1.2 i/f Ethernet1/0 nickname ISP1 is 7500 kbps, time_left 52878 secs, cumulative 0 kb, rollup period 84000 secs, rollup target 6000 kbps, bw_capacity 10000 kbps *May 14 00:39:00.271: OER MC COST: Cost OOP check for border 10.1.1.2, current util: 0 target util: 7500 kbps
DB-1940
December 2010
Description Indicates debugging information for cost-based optimization on the master controller.
Related Commands
Description Configures cost-based optimization policies on a master controller. Enables an OER process and configures a router as an OER border router or as an OER master controller. Displays the status of cost-based optimization policies.
DB-1941
Syntax Description
detail
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer master exit command is entered on a master controller. This command is used to display debugging information for master controller exit selection processes.
Examples
The following example shows output form the debug oer master exit command, entered with the detail keyword:
Router# debug oer master exit detail *May *May *May *May *May check *May check *May check 4 4 4 4 4 11:26:51.539: 11:26:52.195: 11:26:55.515: 11:29:14.987: 11:29:35.467: OER OER OER OER OER MC MC MC MC MC EXIT: EXIT: EXIT: EXIT: EXIT: 10.1.1.1, intf Fa4/0 INPOLICY 10.2.2.3, intf Se2/0 INPOLICY 10.1.1.2, intf Se5/0 INPOLICY 7 kbps should be moved from 10.1.1.1, intf Fa4/0 10.1.1.1, intf Fa4/0 in holddown state so skip OOP
4 11:29:35.831: OER MC EXIT: 10.2.2.3, intf Se2/0 in holddown state so skip OOP 4 11:29:39.455: OER MC EXIT: 10.1.1.2, intf Se5/0 in holddown state so skip OOP
DB-1942
December 2010
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1943
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer master learn command is entered on a master controller. This command is used to display debugging information for master controller learning events.
Examples
The following example shows output from the debug oer master learn command. The output an shows OER Top Talker debug events. The master controller is enabling prefix learning for new border router process:
Router# debug oer master learn 06:13:43: OER MC LEARN: Enable type 3, state 0 06:13:43: OER MC LEARN: OER TTC: State change, new RETRY, old DISABLED, reason TT start 06:13:43: OER MC LEARN: OER TTC: State change, new RETRY, old DISABLED, reason TT start request 06:13:43: OER MC LEARN: OER TTC: State change, new RETRY, old DISABLED, reason T T start request 06:14:13: OER MC LEARN: TTC Retry timer expired 06:14:13: OER MC LEARN: OER TTC: State change, new STARTED, old RETRY, reason At least one BR started 06:14:13: %OER_MC-5-NOTICE: Prefix Learning STARTED 06:14:13: OER MC LEARN: MC received BR TT status as enabled 06:14:13: OER MC LEARN: MC received BR TT status as enabled 06:19:14: OER MC LEARN: OER TTC: State change, new WRITING DATA, old STARTED, reason Updating DB
DB-1944
December 2010
06:19:14: OER MC LEARN: OER TTC: State change, new SLEEP, old WRITING DATA, reason Sleep state
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1945
Syntax Description
(Optional) Specifies a single prefix or prefix range. The prefix address and mask are entered with this argument. (Optional) Displays information about prefixes used by applications monitored and controlled by an OER master controller. (Optional) Displays detailed OER prefix processing information.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer master prefix command is entered on a master controller. This command displays debugging information related to prefix monitoring and processing.
Examples
The following example shows the master controller searching for the target of an active probe after the target has become unreachable.
Router# debug oer master prefix OER Master Prefix debugging is on 06:01:28: OER MC PFX 10.4.9.0/24: left assigned and running 06:01:38: OER MC PFX 10.4.9.0/24: 06:02:59: OER MC PFX 10.4.9.0/24: left assigned and running 06:03:08: OER MC PFX 10.4.9.0/24: 06:04:29: OER MC PFX 10.4.9.0/24: left assigned and running 06:04:39: OER MC PFX 10.4.9.0/24:
APC last target deleted for prefix, no targets APC Attempting to probe all exits APC last target deleted for prefix, no targets APC Attempting to probe all exits APC last target deleted for prefix, no targets APC Attempting to probe all exits
DB-1946
December 2010
06:05:59: OER MC PFX 10.4.9.0/24: APC last target deleted for prefix, no targets left assigned and running 06:06:09: OER MC PFX 10.4.9.0/24: APC Attempting to probe all exits
Description Indicates debugging information for OER monitored prefixes. The ip-address identifies the prefix.
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1947
Syntax Description
list-name detail
Specifies a single prefix or prefix range. The prefix address and mask are entered with this argument. (Optional) Displays detailed OER prefix-list processing information.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer master prefix-list command is entered on a master controller. This command displays debugging information related to prefix-list processing.
Examples
The following example shows output from the debug oer master prefix-list command.
Router# debug oer master prefix-list 23:02:16.283: OER 23:02:16.283: OER 23:02:16.283: OER TRUE 23:02:16.283: OER 23:02:16.283: OER 23:02:16.283: OER 50%, notify TRUE 23:02:16.283: OER 23:02:16.283: OER 23:02:16.283: OER MC PFX 10.1.5.0/24: Check PASS REL loss: loss 0, policy 10%, notify TRUE MC PFX 10.1.5.0/24: Passive REL loss in-policy MC PFX 10.1.5.0/24: Check PASS REL delay: delay 124, policy 50%, notify MC PFX 10.1.5.0/24: Passive REL delay in policy MC PFX 10.1.5.0/24: Prefix not OOP MC PFX 10.1.5.0/24: Check PASS REL unreachable: unreachable 0, policy MC PFX 10.1.5.0/24: Passive REL unreachable in-policy MC PFX 10.1.5.0/24: Check PASS REL loss: loss 0, policy 10%, notify TRUE MC PFX 10.1.5.0/24: Passive REL loss in policy
DB-1948
December 2010
Description Indicates debugging information for OER monitored prefixes. The ip-address identifies the prefix.
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1949
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1950
December 2010
Syntax Description
detail
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug oer master traceroute reporting command is entered on a master controller. This command is used to display traceroute events on a master controller.
Examples
DB-1951
Table 273
Related Commands
Command oer
Description Enables an OER process and configures a router as an OER border router or as an OER master controller.
DB-1952
December 2010
debug packet
To display per-packet debugging output, use the debug packet command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug packet [interface number [vcd vcd-number] | vc vpi/vci | vc-name] no debug packet [interface number [vcd vcd-number] | vc vpi/vci | vc-name]
Syntax Description
(Optional) interface or subinterface number. (Optional) Number of the virtual circuit designator (VCD). (Optional) Virtual path identifier (VPI) and virtual channel identifier (VCI) numbers of the VC. (Optional) Name of the PVC or SVC.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Support for Apollo Domain and Banyan VINES was removed. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug packet command displays all process-level packets for both outbound and inbound packets. This command is useful for determining whether packets are being received and sent correctly. The output reports information online when a packet is received or a transmission is attempted. For sent packets, the information is displayed only after the protocol data unit (PDU) is entirely encapsulated and a next hop VC is found. If information is not displayed, the address translation probably failed during encapsulation. When a next hop VC is found, the packet is displayed exactly as it will be presented on the wire. Having a display indicates that the packets are properly encapsulated for transmission. For received packets, information is displayed for all incoming frames. The display can show whether the sending station properly encapsulates the frames. Because all incoming frames are displayed, this information is useful when performing back-to-back testing and corrupted frames cannot be dropped by an intermediary switch. The debug packet command also displays the initial bytes of the actual PDU in hexadecimal. This information can be decoded only by qualified support or engineering personnel.
DB-1953
Caution
Because the debug packet command generates a substantial amount of output for every packet processed, use it only when traffic on the network is low so other activity on the system is not adversely affected.
Examples
Description Indicates the subinterface that generated this packet. Indicates a receive packet. (O) indicates an output packet. Indicates the virtual circuit associated with this packet, where n is some value. Indicates the descriptor mode bits on output only, where nnnn is a hexadecimal value. Displays the encapsulation type for this packet. Displays the total length of the packet including the headers.
The following two lines of output are the binary data, which are the contents of the protocol data unit (PDU) before encapsulation:
4500 002E 0000 0000 0209 92ED 836C A26E FFFF FFFF 1108 006D 0001 0000 0000 A5CC 6CA2 0000 000A 0000 6411 76FF 0100 6C08 00FF FFFF 0003 E805 DCFF 0105
DB-1954
December 2010
Description Name of the Ethernet interface that received the packet. Network could not classify this packet. Examples include packets with unknown link types. Packet uses ARPA-style encapsulation. Possible encapsulation styles vary depending on the media command mode (MCM) and encapsulation style. Ethernet (MCM)Encapsulation Style:
ARP ETHERTALK ISO1 ISO3 LLC2 NOVELL-ETHER SNAP ISO1 ISO3 LLC2 SNAP BRIDGE FRAME-RELAY
DB-1955
Table 275
BFEX25 BRIDGE DDN-X25 DDNX25-DCE ETHERTALK FRAME-RELAY HDLC HDH LAPB LAPBDCE MULTI-LAPB PPP SDLC-PRIMARY SDLC-SECONDARY SLIP SMDS STUN X25 X25-DCE 3COM-TR ISO1 ISO3 MAC LLC2 NOVELL-TR SNAP VINES-TR
MAC address of the node generating the packet. MAC address of the destination node for the packet. Packet type. First 12 bytes of the datagram following the MAC header. Length of the message (in bytes) that the interface received from the wire. Length of the message (in bytes) that the interface received from the wire. Equivalent to the len field.
DB-1956
December 2010
Table 275
compressed TCP/IP TCP header compression is enabled on an interface and the packet is not HDLC packet dropped or X25.
DB-1957
debug packet-capture
To enable packet capture debugs, use the debug packet-capture command in privileged EXEC mode. To disable debugging packet capture, use the no form of this command. debug packet-capture no debug packet-capture
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS 12.2(33)SRE.
Examples
The following example shows output from a successful request when using the debug packet-capture command:
Router# debug packet-capture Buffer Capture Infrastructure debugging is on
Related Commands
DB-1958
December 2010
debug pad
To display debugging messages for all packet assembler/disassembler (PAD) connections, use the debug pad command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug pad no debug pad
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced in a release prior to Cisco IOS Release 12.0. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
Use the debug pad command to gather information to forward to the Cisco Technical Assistance Center (TAC) to assist in troubleshooting a problem that involves PAD connections. The following example shows output of the debug pad and debug x25 event commands for an incoming PAD call destined for a terminal line. The incoming PAD call is rejected by the terminal line because the selected network closed user group (CUG) has not been subscribed to by the caller:
Router# debug pad Router# debug x25 event Serial1/1:X.25 I R1 Call (16) 8 lci 8 From (7):2001534 To (9):200261150 Facilities:(2) Closed User Group (basic):99 Call User Data (4):0x01000000 (pad) pad_svc_announce:destination matched 1 PAD:incoming call to 200261150 on line 130 CUD length 4 !PAD130:Incoming Call packet, Closed User Group (CUG) service protection, selected network CUG not subscribed PAD:CUG service protection Cause:11 Diag:65 Serial1/1:X.25 O R1 Clear (5) 8 lci 8 Cause 0, Diag 65 (DTE originated/Facility code not allowed) Serial1/1:X.25 I R1 Clear Confirm (3) 8 lci 8
DB-1959
The following example shows the output of the debug pad command for an outgoing PAD call initiated from a terminal line with a subscribed CUG that bars outgoing access:
!PAD130:Outgoing Call packet, Closed User Group - CUG service validation, selected CUG !bars outgoing access PAD130:Closing connection to . In 0/0, out 0/0
DB-1960
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on Cisco 803, Cisco 804, and Cisco 813 routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug piafs events command provides debugging information for the PIAFS calls on the router, including the inband negotiation process.
Examples
The debug piafs events command was configured to provide the following information for PIAFS calls:
Router# debug piafs events 02:16:39:PIAFS events debugging is on 02:16:167516180371:PIAFS: RX <- CDAPI :cdapi_route_call Request 02:16:167517398148:PIAFS: RX <- CDAPI :CDAPI_MSG_CONNECT_IND 02:16:171798691839:PIAFS: TX -> CDAPI :CDAPI_MSG_SUBTYPE_ALERT_REQ 02:16:167503724545:PIAFS: TX -> CDAPI :CDAPI_MSG_CONNECT_RESP 02:16:167503765504:PIAFS: TX -> CDAPI :CDAPI_MSG_CONN_ACTIVE_REQ 02:16:167503724544:PIAFS: RX <- CDAPI :CDAPI_MSG_CONN_ACTIVE_IND 02:16:171798691839:PIAFS:Network allotted Channel :B1 02:16:167503765504:PIAFS:Enabling QMC in PIAFS mode for B1 02:16:171798691839:PIAFS:piafs_driver_enable_settings() 02:16:167503765504:PIAFS:The speed is :64 02:16:167503724544:PIAFS:Starting 64 kbps PIAFS Incoming 02:16:39:PIAFS:RX <- NEGO_SYNC_REQUEST[GSN:13 RSN:1 CRSN:1 SISN: 255] 02:16:39:PIAFS:Updating conf resp num 02:16:39:PIAFS:TX -> NEGO_SYNC_RECEPTION[GSN:1 RSN:1 CRSN:13 SISN: 255]
DB-1961
02:16:39:PIAFS:RX <- NEGO_SYNC_REQUEST[GSN:14 RSN:1 CRSN:1 SISN: 255] 02:16:39:PIAFS:TX -> NEGO_SYNC_RECEPTION[GSN:2 RSN:2 CRSN:13 SISN: 255] 02:16:39:PIAFS:RX <- NEGO_SYNC_REQUEST[GSN:15 RSN:1 CRSN:1 SISN: 255] 02:16:39:PIAFS:TX -> NEGO_SYNC_RECEPTION[GSN:3 RSN:3 CRSN:13 SISN: 255] 02:16:39:PIAFS:RX <- NEGO_SYNC_REQUEST[GSN:16 RSN:1 CRSN:1 SISN: 255] 02:16:39:PIAFS:TX -> NEGO_SYNC_RECEPTION[GSN:4 RSN:4 CRSN:13 SISN: 255] 02:16:39:PIAFS:RX <- NEGO_SYNC_REQUEST[GSN:17 RSN:1 CRSN:1 SISN: 255] 02:16:39:PIAFS:TX -> NEGO_SYNC_RECEPTION[GSN:5 RSN:5 CRSN:13 SISN: 255] 02:16:39:PIAFS:RX <- NEGO_SYNC_REQUEST[GSN:18 RSN:1 CRSN:1 SISN: 255] 02:16:39:PIAFS:TX -> NEGO_SYNC_RECEPTION[GSN:6 RSN:6 CRSN:13 SISN: 255] 02:16:39:PIAFS:RX <- NEGO_SYNC_REQUEST[GSN:19 RSN:1 CRSN:1 SISN: 255] 02:16:39:PIAFS:TX -> NEGO_SYNC_RECEPTION[GSN:7 RSN:7 CRSN:13 SISN: 255] 02:16:39:PIAFS:RX <- CONTROL_REQUEST(comm parameter)[Seq No:0] 02:16:39:PIAFS:Rx Parameters: 02:16:39:PIAFS: Data Protocol:Version 1 02:16:39:PIAFS: Control Protocol:Version 1 02:16:39:PIAFS: RTF value:9 02:16:39:PIAFS: Compression:V.42bis 02:16:39:PIAFS: Frame Length:80 02:16:39:PIAFS: Frame Number:63 02:16:39:PIAFS:TX -> CONTROL_RECEPTION[0] 02:16:39:PIAFS:ACKed all the Rx control parameters 02:16:39:PIAFS:Piafs layer up & Main FSM set to DATA 02:16:39:PIAFS:Compression v42bis enabled 02:16:39:PIAFS:V42BIS:v42bis_init() 02:16:39:PIAFS:V42BIS:v42bis_init() 02:16:39:PIAFS:V42BIS:Negotiated Values for P1, P2 are - 4096 , 250 02:16:39:PIAFS:Incoming call invoking ISDN_CALL_CONNECT 02:16:39:%LINK-3-UPDOWN:Interface BRI0:1, changed state to up 02:16:39:PIAFS:RX <- CONTROL_REQUEST(comm parameter)[Seq No:0] 02:16:39:PIAFS:Rx Parameters: 02:16:39:PIAFS: Data Protocol:Version 1 02:16:39:PIAFS: Control Protocol:Version 1 02:16:39:PIAFS: RTF value:9 02:16:39:PIAFS: Compression:V.42bis 02:16:39:PIAFS: Frame Length:80 02:16:39:PIAFS: Frame Number:63 02:16:39:PIAFS:TX -> CONTROL_RECEPTION[0] 02:16:39:PIAFS:ACKed all the Rx control parameters 02:16:39:PIAFS:RX <- CONTROL_REQUEST(comm parameter)[Seq No:0] 02:16:39:PIAFS:Rx Parameters: 02:16:39:PIAFS: Data Protocol:Version 1 02:16:39:PIAFS: Control Protocol:Version 1 02:16:39:PIAFS: RTF value:9 02:16:39:PIAFS: Compression:V.42bis 02:16:39:PIAFS: Frame Length:80 02:16:39:PIAFS: Frame Number:63 02:16:39:PIAFS:TX -> CONTROL_RECEPTION[0] 02:16:39:PIAFS:ACKed all the Rx control parameters 02:16:39:PIAFS:RX <- CONTROL_REQUEST(comm parameter)[Seq No:0] 02:16:39:PIAFS:Rx Parameters: 02:16:39:PIAFS: Data Protocol:Version 1
DB-1962
December 2010
02:16:39:PIAFS: Control Protocol:Version 1 02:16:39:PIAFS: RTF value:9 02:16:39:PIAFS: Compression:V.42bis 02:16:39:PIAFS: Frame Length:80 02:16:39:PIAFS: Frame Number:63 02:16:39:PIAFS:TX -> CONTROL_RECEPTION[0] 02:16:39:PIAFS:ACKed all the Rx control parameters 02:16:39:PIAFS:RX <- CONTROL_REQUEST(comm parameter)[Seq 02:16:39:PIAFS:Rx Parameters: 02:16:39:PIAFS: Data Protocol:Version 1 02:16:39:PIAFS: Control Protocol:Version 1 02:16:39:PIAFS: RTF value:9 02:16:39:PIAFS: Compression:V.42bis 02:16:39:PIAFS: Frame Length:80 02:16:39:PIAFS: Frame Number:63 02:16:39:PIAFS:TX -> CONTROL_RECEPTION[0] 02:16:39:PIAFS:ACKed all the Rx control parameters 02:16:39:PIAFS:RX <- CONTROL_REQUEST(comm parameter)[Seq 02:16:39:PIAFS:Rx Parameters: 02:16:39:PIAFS: Data Protocol:Version 1 02:16:39:PIAFS: Control Protocol:Version 1 02:16:39:PIAFS: RTF value:9 02:16:39:PIAFS: Compression:V.42bis 02:16:39:PIAFS: Frame Length:80 02:16:39:PIAFS: Frame Number:63 02:16:39:PIAFS:TX -> CONTROL_RECEPTION[0] 02:16:39:PIAFS:ACKed all the Rx control parameters 02:16:39:PIAFS:RX <- CONTROL_REQUEST(comm parameter)[Seq 02:16:39:PIAFS:Rx Parameters: 02:16:39:PIAFS: Data Protocol:Version 1 02:16:39:PIAFS: Control Protocol:Version 1 02:16:39:PIAFS: RTF value:9 02:16:39:PIAFS: Compression:V.42bis 02:16:39:PIAFS: Frame Length:80 02:16:39:PIAFS: Frame Number:63 02:16:39:PIAFS:TX -> CONTROL_RECEPTION[0] 02:16:39:PIAFS:ACKed all the Rx control parameters 02:16:39:PIAFS:RX <- CONTROL_REQUEST(comm parameter)[Seq 02:16:39:PIAFS:Rx Parameters: 02:16:39:PIAFS: Data Protocol:Version 1 02:16:39:PIAFS: Control Protocol:Version 1 02:16:39:PIAFS: RTF value:9 02:16:39:PIAFS: Compression:V.42bis 02:16:39:PIAFS: Frame Length:80 02:16:39:PIAFS: Frame Number:63 02:16:39:PIAFS:TX -> CONTROL_RECEPTION[0] 02:16:39:PIAFS:ACKed all the Rx control parameters 02:16:39:PIAFS:piafs_setmap() tx_map FFFFFFFF 02:16:39:PIAFS:piafs_setmap() rx_map 0 02:16:41:PIAFS:PPP:Autoselect sample 7E 02:16:41:PIAFS:PPP:Autoselect sample 7EFF 02:16:41:PIAFS:PPP:Autoselect sample 7EFF7D 02:16:41:PIAFS:PPP:Autoselect sample 7EFF7D23 02:16:41:PIAFS:piafs_setmap() tx_map FFFFFFFF 02:16:41:PIAFS:piafs_setmap() rx_map 0 02:16:42:PIAFS:piafs_setmap() tx_map A0000 02:16:42:PIAFS:piafs_setmap() rx_map 0
No:0]
No:0]
No:0]
No:0]
DB-1963
Description The call distributor application programming interface (CDAPI) in the router receives an ISDN call request from the switch. The CDAPI in the router receives a connection indicator message from the switch. The CDAPI in the router transmits an alert request to the switch. The CDAPI in the router transmits a connect response message to the switch. The CDAPI in the router transmits a connection active request to the switch.
RX <- CDAPI :CDAPI_MSG_CONNECT_IND TX -> CDAPI :CDAPI_MSG_SUBTYPE_ALERT_REQ TX -> CDAPI :CDAPI_MSG_CONNECT_RESP TX -> CDAPI :CDAPI_MSG_CONN_ACTIVE_REQ
RX <-CDAPI:CDAPI_MSG_CONN_ACTIVE_IND The CDAPI in the router receives a connection active indicator from the switch. Enabling QMC in PIAFS mode for B1 QMC (global multichannel parameters) are being enabled in PIAFS mode for the B1 channel. The PIAFS driver is enabling the settings. The speed of the transmission in kbps. In this case, the speed is 64 kbps. The router receives a PIAFS negotiation synchronization request frame from the peer PIAFS device. The frame contains the following: general sequence number (GSN), reception sequence number (RSN), confirmation response sequence number (CRSN), and synchronization initiation sequence number (SISN). The confirmation response number is being updated. The router transmits a PIAFS negotiation synchronization reception message to the peer PIAFS device. The message includes the GSN, RSN, CRSN, and SISN. The router receives a PIAFS control request frame that includes communication parameters. The communication parameters are as follows. The version of the data protocol. The version of the control protocol. Round-trip frame value. The compression standard. The length of the frame, in bytes.
piafs_driver_enable_settings() Starting 64 kbps PIAFS Incoming RX <- NEGO_SYNC_REQUEST[GSN: RSN: CRSN: SISN:]
RX <- CONTROL_REQUEST Rx Parameters Data Protocol Control Protocol RTF value Compression Frame Length
DB-1964
December 2010
Table 276
Field Frame Number TX -> CONTROL_RECEPTION ACKed all the Rx control parameters
Description The number of packets per frame. The router transmits a PIAFS control reception frame. The control reception frame acknowledges all the communication parameters that were received from the peer. The PIAFS protocol is active on the router. The router is ready to receive data from the peer device. The compression protocol v42bis is enabled. The v42bis compression protocol has been initiated. In this example, P1 is the total count of encoded words when v42bis compression is enabled. P2 is the maximum letter line length for the V42bis compression. An incoming ISDN call connection message is received. The PPP layer on the router becomes active and starts to process the PPP frame from the peer PIAFS device.
Compression v42bis enabled V42BIS:v42bis_init() V42BIS:Negotiated Values for P1, P2 are - 4096 , 250
DB-1965
Syntax Description
Enables debug logging for the active processor. Enables debug logging for the standby processor. Displays the event monitoring information pertaining to the processor. Specifies the event monitoring QFP client information for one of the following debug-level options:
datapath
Specifies the event monitoring datapath for one of the following protocols:
Command Default
Command Modes
Command History
Modification This command was introduced on the Cisco ASR 1000 Series Routers.
Examples
The following example shows how to debug the event monitoring datapath for an IPv4 protocol: :
Router# debug platform hardware qfp active feature evtmon datapath ip The selected EVTMON Datapath debugging is on
DB-1966
December 2010
Syntax Description
Enables WCCP QFP client debug logging. Enables WCCP QFP client-library debug logging. Enables all logs. Enables error logs. Enables info logs. Enables trace logs. Enables warning logs. Enables all WCCP QFP datapath debug logging.
Command Default
Command Modes
Command History
Usage Guidelines
When the debug platform hardware qfp active feature wccp command is configured, QFP client debugs are enabled and can be collected from the forwarding processor (FP) from the file cpp_cp_F0-0.log. When the debug platform hardware qfp active feature wccp lib-client all command is configured, QFP lib-client debugs are enabled and can be collected from the FP from the file fman-fp_F0-0.log. When the debug platform hardware qfp active feature wccp datapath all command is configured, QFP datapath debugs are enabled and can be collected from the FP from the file cpp_cp-F0-0.log.
DB-1967
Examples
The following is sample output from the debug platform hardware qfp active feature wccp command:
Router# debug platform hardware qfp active feature wccp
The sequence of messages repeats for each access control entry (ACE) of a merged access control list (ACL):
06/17 10:53:38.792 [(null)]: (debug): cpp_wccp_update_bind_obj_list:idx = 63 bind-info:no.lvl = 1 fobj = 80024000 bind-id = 0 06/17 10:53:38.792 [(null)]: (debug): cpp_wccp_update_bind_obj_list fobj:service-id = 0 type = 0 cache-id = 9action = 2 acl-log = 0 06/17 10:53:38.792 [(null)]: (debug): cpp_wccp_add_dplane_cache_desc service-index = 0, cache_id = 9 06/17 10:53:38.792 [(null)]: (debug): cpp_wccp_get_dplane_cache_index service-index = 0, cache_id = 9 06/17 10:53:38.792 [(null)]: (debug): cpp_wccp_create_dplane_cache_index Cache index = 0 exists for cache-id = 9,service-index = 0 . . .
Debug messages appear for each ACE of the merged ACL for a service group:
06/17 13:15:44.670 [(null)]: 06/17 13:15:44.670 [(null)]: 0service_desc_index 0 06/17 13:15:44.670 [(null)]: index = 0 06/17 13:15:44.670 [(null)]: cache_id = 9 . . . (debug): cpp_wccp_translate_fobj_to_cce_result Entry (debug): cpp_wccp_get_service_index WCCP: service_id 0 vrfid (debug): cpp_wccp_get_service_desc: service-id: 0 type = 0
DB-1968
December 2010
13:24:54.617 [(null)]: (debug): cpp_wccp_get_service_desc: service-id: 0 type = 0 = 0 13:24:54.617 [(null)]: (debug): cpp_wccp_intf_detach_handler:hw_cg_node, ifh = 17 0vrfid = 0 service-index = 0 exists
The following is sample output from the debug platform hardware qfp active feature wccp lib-client all command:
Router# debug platform hardware qfp active feature wccp lib-client all
The set of debug messages repeats for each ACE of the merged ACL of the WCCP service group:
06/17 13:47:29.474 0, ctx: (nil) 06/17 13:47:29.474 bind-id = 0 fobj = 06/17 13:47:29.474 1,ctx: 0x77 . . . [buginf]: (debug): Notification from CGM to WCCP, op:13, tid:0,async:
[buginf]: (debug): cpp_wccp_cgm_notif_handler:cgm BIND num_lvl = 1, 80028000 [buginf]: (debug): Notification from CGM to WCCP, op:2, tid:0,async:
DB-1969
06/17 13:54:30.544 [buginf]: (debug): cpp_wccp_detach_service_from_intf_a: API call from PALservice-type = 0 id = 0 vrfid = 0 if_h = 11 dir = 0 06/17 13:54:30.544 [buginf]: (debug): cpp_wccp_detach_service_from_intf_a:tid el= 0x11338890ifh = 17, dir = 0 id = 0 type = 0 06/17 13:54:30.544 [buginf]: (debug): Notification from CGM to WCCP, op:2, tid:0,async: 1,ctx: 0x79 . . .
The debug messages repeat for each ACE of the merged ACL for the WCCP service group:
06/17 13:56:14.500 0, ctx: (nil) 06/17 13:56:14.500 bind-id = 0 fobj = 06/17 13:56:14.501 1,ctx: 0x7a . . . [buginf]: (debug): Notification from CGM to WCCP, op:14, tid:0,async:
[buginf]: (debug): cpp_wccp_cgm_notif_handler:cgm BIND num_lvl = 1, 80028000 [buginf]: (debug): Notification from CGM to WCCP, op:2, tid:0,async:
The following is sample output from the debug platform hardware qfp active feature wccp datapath all command:
Router# debug platform hardware qfp active feature wccp datapath all
DB-1970
December 2010
. .
Related Commands
Description Removes WCCP statistics (counts) maintained on the router for a particular service. Enables support of the specified WCCP service for participation in a service group.
ip wccp check services Enables enable all WCCP services. all ip wccp outbound-acl-check ip wccp redirect Enables execution of ACL applied on the actual outgoing interface of a packet before a decision is taken to redirect a packet. Enables packet redirection on an outbound or inbound interface using WCCP.
DB-1971
Syntax Description
Enables debug logging for the active processor. Enables debug logging for the standby processor. Displays the Application Level Gateway (ALG) information of the processor. Specifies the ALG QFP client information. One of the following debug level options:
datapath protocol
dns exec ftp h323 http ldap login netbios rtsp shell sip skinny smtp tftp
detail
DB-1972
December 2010
Command Modes
Command History
Modification This command was introduced. This command was modified. Support for the Network Basic Input Output System (NetBIOS) protocol. The following keywords were added: netbios-dgm,netbios-ns,netbios-ssn.
Examples
The following example shows how to debug the ALG datapath for a dns protocol:
Router# debug platform hardware qfp active feature alg datapath dns
Related Commands
DB-1973
Syntax Description
OTN G.709/DWDM driver debug information. Interface driver debug information. Interrupt debug information. Network clocking debug information. Physical layer (PHY) and SerDes debug information. Pluggable optics module information. WAN PHY driver debug information.
Defaults
Command Modes
Command History
Release 12.2(33)SRD
This command applies only to the Cisco 7600 Series Ethernet Services Plus (ES+) line card on the Cisco 7600 series router.
12.2(33)SRD1
Usage Guidelines
Use this command with the remote command command or the attach command in privileged EXEC mode.
Examples
The following examples show the output for both the debug platform link-dc tranceiver command and the debug platform link-dc interrupt command. Notice that the show platform hardware transceiver command shows the status for the port.
Router# remote command module 1 debug platform link-dc tranceiver Link-DC transceiver debugging is on Router# remote command module 1 debug platform link-dc interrupt Link-DC interrupt debugging is on Router# remote command module 1 show debug x40g subsystem: Link-DC transceiver debugging is on
DB-1974
December 2010
Link-DC interrupt debugging is on Router# remote command module 1 show platform hardware transceiver status 1 Show status info for port 1: TenGigabitEthernet1/1: State: Enabled Environmental Information - raw values Temperature: 7616 Tx voltage: 0 in units of 100uVolt Tx bias: 28722 uA Tx power: -2 dBm (5441 in units of 0.1 uW) Rx power: 0 dBm (7712 in units of 0.1 uW) (AUX1) Laser Temperature: 8704 (AUX2) +3.3V Supply Voltage: 32928 XFP TX is enabled. XFP TX is soft enabled. XFP is ready. XFP is not power down. XFP is not soft power down. XFP doesn't have interrupt(s). XFP is not LOS. XFP data is ready. XFP TX path is ready. XFP TX laser is not in fault condition. XFP TX path CDR is locked. XFP RX path is ready. XFP RX path CDR is locked. No active alarms No active warning Router-dfc1# *Aug 15 11:20:26.436 *Aug 15 11:20:26.436 *Aug 15 11:20:26.436 dataptr: 2377A668 *Aug 15 11:20:26.448 dataptr: 21AA028E *Aug 15 11:20:26.452 dataptr: 2377A6A0 *Aug 15 11:20:26.456 dataptr: 2377A6A2
PDT: DFC1: TenGigabitEthernet1/1 XFP: show status PDT: DFC1: TenGigabitEthernet1/1 XFP: show environmental monitoring PDT: DFC1: pluggable optics read - addr: 50, offset: 60, len: 14, PDT: DFC1: pluggable optics read - addr: 50, offset: 6E, len: 2, PDT: DFC1: pluggable optics read - addr: 50, offset: 50, len: 2, PDT: DFC1: pluggable optics read - addr: 50, offset: 52, len: 2,
Note
The following console log is seen when both the debug platform link-dc tranceiver command and the debug platform link-dc interrupt command are entered (as in the preceding example), and there is a transceiver Rx loss of signal (LOS) event.
Router-dfc1# *Aug 15 11:23:52.127 *Aug 15 11:23:52.127 *Aug 15 11:23:52.127 *Aug 15 11:23:52.127 *Aug 15 11:23:52.131 *Aug 15 11:23:52.131 *Aug 15 11:23:52.131 *Aug 15 11:23:52.131 *Aug 15 11:23:52.135 *Aug 15 11:23:52.135
PDT: PDT: PDT: PDT: PDT: PDT: PDT: PDT: PDT: PDT:
DFC1: DFC1: DFC1: DFC1: DFC1: DFC1: DFC1: DFC1: DFC1: DFC1:
x40g_link_dc_interrupt_handler: intr_status 0x8000 x40g_link_xphy_isr: xphy intr intr_st 0x80000 x40g_link_xphy_isr: xphy intr port 1 x40g_xphy_link_status_callout: port 1 link status 0 x40g_link_dc_interrupt_handler: intr_status 0x8000 x40g_link_xphy_isr: xphy intr intr_st 0x80000 x40g_link_xphy_isr: xphy intr port 1 x40g_xphy_link_status_callout: port 1 link status 1 x40g_link_dc_process: interrupt msg_id 6, msg_num 1 x40g_link_dc_interrupt_handler: intr_status 0x8000
DB-1975
*Aug 15 11:23:52.135 PDT: DFC1: x40g_link_xphy_isr: xphy intr intr_st 0x80000 *Aug 15 11:23:52.135 PDT: DFC1: x40g_link_xphy_isr: xphy intr port 1 *Aug 15 11:23:52.135 PDT: DFC1: x40g_xphy_link_status_callout: port 1 link status 0 *Aug 15 11:23:52.135 PDT: DFC1: x40g_link_dc_interrupt_handler: intr_status 0x4000 *Aug 15 11:23:52.135 PDT: DFC1: x40g_link_xcvr_isr: intr_st 0x2, start 0, end 4, type 2,port_offset 0x0 *Aug 15 11:23:52.135 PDT: DFC1: Link xcvr port 1: Rx LOS interrupt *Aug 15 11:23:52.135 PDT: DFC1: x40g_link_dc_process: interrupt msg_id 2, msg_num 1 *Aug 15 11:23:52.135 PDT: DFC1: Port 2: transceiver Rx LOS event *Aug 15 11:23:52.147 PDT: DFC1: x40g_link_dc_process: xcvr oir timer timeout 00:12:37: %LINEPROTO-DFC1-5-UPDOWN: Line protocol on Interface TenGigabitEthernet1/2, changed state to down *Aug 15 11:24:46.576 PDT: DFC1: x40g_link_dc_interrupt_handler: intr_status 0x4000 *Aug 15 11:24:46.576 PDT: DFC1: x40g_link_xcvr_isr: intr_st 0x2, start 0, end 4, type 2,port_offset 0x0 *Aug 15 11:24:46.576 PDT: DFC1: Link xcvr port 1: Rx LOS interrupt *Aug 15 11:24:46.576 PDT: DFC1: x40g_link_dc_process: interrupt msg_id 2, msg_num 1 *Aug 15 11:24:46.576 PDT: DFC1: Port 2: transceiver Rx LOS recovered *Aug 15 11:24:46.580 PDT: DFC1: x40g_link_dc_interrupt_handler: intr_status 0x8000 *Aug 15 11:24:46.580 PDT: DFC1: x40g_link_xphy_isr: xphy intr intr_st 0x80000 *Aug 15 11:24:46.580 PDT: DFC1: x40g_link_xphy_isr: xphy intr port 1 *Aug 15 11:24:46.580 PDT: DFC1: x40g_xphy_link_status_callout: port 1 link status 0 *Aug 15 11:24:46.584 PDT: DFC1: x40g_link_dc_interrupt_handler: intr_status 0x8000 *Aug 15 11:24:46.584 PDT: DFC1: x40g_link_xphy_isr: xphy intr intr_st 0x80000 *Aug 15 11:24:46.584 PDT: DFC1: x40g_link_xphy_isr: xphy intr port 1 *Aug 15 11:24:46.584 PDT: DFC1: x40g_xphy_link_status_callout: port 1 link status 1 *Aug 15 11:24:46.584 PDT: DFC1: x40g_link_dc_process: interrupt msg_id 6, msg_num 1 *Aug 15 11:24:46.600 PDT: DFC1: x40g_link_dc_process: xcvr oir timer timeout 00:13:31: %LINEPROTO-DFC1-5-UPDOWN: Line protocol on Interface TenGigabitEthernet1/2, changed state to up
The following example shows the output for the debug platform link-dc dwdm command.
Router-dfc1# debug platform link-dc dwdm Link-DC OTN G.709/DWDM debugging is on *Jan 28 12:10:38.784 PDT: DFC1: Port 1: OTN Alarm Query, return ptr 228E877C los 1, oof 0, lof 0, mfas 1, lom 0 otuAis 0, otuIae 0-0, otuBdi 0, otuTim 0 oduAis 0, oduBdi 0, oduLck 0, oduOci 0, oduPtim 0 *Jan 28 12:10:38.864 PDT: DFC1: x40g_link_pemaquid_pm_tick_timer_event(1): pm_tick timer timeout *Jan 28 12:10:39.364 PDT: DFC1: x40g_link_pemaquid_pm_tick_timer_event(1): pm_tick timer timeout *Jan 28 12:10:39.840 PDT: DFC1: Port 1: OTN Alarm Query, return ptr 228E877C los 1, oof 0, lof 0, mfas 1, lom 0 otuAis 0, otuIae 0-0, otuBdi 0, otuTim 0 oduAis 0, oduBdi 0, oduLck 0, oduOci 0, oduPtim 0
The following example shows the output for the debug platform link-dc wanphy command.
Router-dfc1# debug platform link-dc wanphy Link-DC WAN PHY debugging is on *Jan 28 11:59:16.184 PDT: DFC1: Port 1 WIS alarms: ser 0, plm_p_far 0, ais_p_far 0, lof 0, los 0 rdi 0, ais_l 0, lcd_p 0, plm_p 0, ais_p 0, lop 0 *Jan 28 11:59:17.184 PDT: DFC1: Port 1 WIS alarms: ser 0, plm_p_far 0, ais_p_far 0, lof 0, los 0 rdi 0, ais_l 0, lcd_p 0, plm_p 0, ais_p 0, lop 0 *Jan 28 11:59:17.184 PDT: DFC1: Port 1 WIS counters: b1 0, b2 0, b3 0, fe_b2 0, fe_b3 0
DB-1976
December 2010
*Jan 28 11:59:17.184 PDT: DFC1: Port 1 WIS J1RX: 0x0000000000000089.0x302E302E302E3000 ... *Jan 28 11:59:22.288 PDT: DFC1: Port 1 WIS alarms: ser 0, plm_p_far 0, ais_p_far 0, lof 0, los 0 rdi 0, ais_l 0, lcd_p 0, plm_p 0, ais_p 0, lop 0 *Jan 28 11:59:22.288 PDT: DFC1: Port 1 WIS counters: b1 0, b2 0, b3 0, fe_b2 0, fe_b3 0 *Jan 28 11:59:22.288 PDT: DFC1: Port 1 WIS J1RX: 0x0000000000000089.0x302E302E302E3000
Related Commands
DB-1977
Syntax Description
configuration
Command Default
Command Modes
Command History
Modification This command was introduced on the Cisco ASR 1000 Series Routers.
Examples
The following example shows how to debug the event monitoring configurations:
Router# debug platform software evtmon configuration evtmon configuration messages debugging is on
DB-1978
December 2010
Syntax Description
all assert
Displays all multicast hardware switching debugging information, including errors, events, and packets for the specified group. Specifies the assert events.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from thedebug platform software multicast command using the all keyword:
PE-3-sp#debug platform software multicast all Global enable but not the periodic debugging is on PE-3-sp# *Oct 30 09:17:26.150 EDT: SP: RELAYED PAK to index 0x0008440B, *Oct 30 09:17:26.770 EDT: SP: hal_timer_event: NRPF-AG *Oct 30 09:17:27.151 EDT: SP: RELAYED PAK to index 0x0008440B, *Oct 30 09:17:28.151 EDT: SP: RELAYED PAK to index 0x0008440B, *Oct 30 09:17:28.395 EDT: SP: hal_timer_event: NRPF-AG *Oct 30 09:17:29.152 EDT: SP: RELAYED PAK to index 0x0008440B, *Oct 30 09:17:30.152 EDT: SP: RELAYED PAK to index 0x0008440B, *Oct 30 09:17:30.248 EDT: SP: hal_timer_event: NRPF-AGun al *Oct 30 09:17:31.153 EDT: SP: RELAYED PAK to index 0x0008440B,
vlan 1035 vlan 1035 vlan 1035 vlan 1035 vlan 1035 vlan 1035
The following example shows output from the debug platform software multicast command using the assert keyword:
PE-3-sp#debug platform software multicast assert Assertion for Layer 2 multicast debugging is on PE-3-sp# PE-3-sp#debug platform software multicast ha l2-sso all Debug for mcast SSO all debugging is on
DB-1979
PE-3-sp#debug platform software multicast ha PE-3-sp#debug platform software multicast ha Debug for mcast SSO error debugging is on PE-3-sp#debug platform software multicast ha PE-3-sp#debug platform software multicast ha Debug for mcast SSO events debugging is on PE-3-sp#debug platform software multicast ha PE-3-sp#debug platform software multicast ha Debug for mcast SSO packets debugging is on PE-3-sp#
l2-sso err l2-sso error l2-sso eve l2-sso event l2-sso pak l2-sso pak
Related Commands
DB-1980
December 2010
Syntax Description
event pak
Specifies the events for the selected group. Specifies the packet information.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast cgmp command using the event keyword:
PE-3-sp#debug platform software multicast cgmp event Router Discovery (CGMP Protocol) event log debugging is on
The following example shows output from the debug platform software multicast cgmp command using the pak keyword:
PE-3-sp#debug platform software multicast cgmp pak Router Discovery (CGMP Protocol) packet log debugging is on
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-1981
Syntax Description
event pak
Specifies the igmp events for the selected group. Specifies the igmp packet information.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast igmp command using the event keyword:
Router# debug platform software multicast igmp event PE-3-sp#debug platform software multicast igmp event IGMP snooping event log debugging is on ...
The following example shows output from the debug platform software multicast igmp command using the pak keyword:
PE-3-sp#debug platform software multicast igmp pak PE-3-sp#debug platform software multicast igmp pak IGMP snooping packet log debugging is on PE-3-sp# *Oct 30 09:26:22.143 EDT: SP: RELAYED PAK to index 0x0008440B, vlan 1035 *Oct 30 09:26:22.143 EDT: SP: Packet dump: 18000070: 0100 5E000016 00000E00 ..^....... 18000080: 02000800 45000028 00000000 400254BC ....E..([email protected]< 18000090: 46000002 E0000016 2200CBF6 00000001 F...`...".Kv.... 180000A0: 01000001 E8000104 28000002 00010203 ....h...(....... 180000B0: 04058C
DB-1982
December 2010
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-1983
Syntax Description
Specifies the mfib IPV4 error information. Specifies the IPv4 shortcut event information. Specifies the IPV4 hardware statistic information for export.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast ip cmfib command using the error keyword:
PE-3-sp#debug platform software multicast ip cmfib cmfib error CMFIB-LC IPv6 error debugging enabled
The following example shows output from the debug platform software multicast ip cmfib command using the event keyword:
PE-3-sp#debug platform software multicast ip cmfib cmfib eve CMFIB-LC IPv6 event debugging enabled
The following example shows output from the debug platform software multicast ip cmfib command using the stats keyword:
PE-3-sp#debug platform software multicast ip cmfib cmfib stats CMFIB-LC IPv6 stats debugging enabled
DB-1984
December 2010
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-1985
Syntax Description
A.B.C.D pending
Specifies the source or group IP address information. Specifies the mfib IPv4 pending entry error information.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast ip cmfib error command:
PE-3-sp#debug platform software multicast ip cmfib error 232.0.1.4 ver PE-3-sp#debug platform software multicast ip cmfib error 232.0.1.4 verbose CMFIB-LC IPv4 verbose error debugging enabled for group 232.0.1.4 PE-3-sp#debug platform software multicast ip cmfib error pending ? <cr> PE-3-sp#debug platform software multicast ip cmfib error pending CMFIB-LC IPv4 error pending debugging enabled
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-1986
December 2010
Syntax Description
Specifies the source or group IP address information. Specifies the mfib IPv4 pending entry information. Specifies the mfib IPv4 ctrl entry events. Specifies the mfib hardware API events. Specifies the mfib IPv4 table events. Specifies the mfib IPv4 table events.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast ip cmfib event command:
PE-3-sp#debug platform software multicast ip cmfib event ctrl CMFIB-LC IPv4 event control debugging enabled PE-3-sp#debug platform software multicast ip cmfib event hwapi CMFIB-LC IPv4 event hwapi debugging enabled PE-3-sp#debug platform software multicast ip cmfib event mdt CMFIB-LC IPv4 event mdt debugging enabled PE-3-sp#debug platform software multicast ip cmfib event pending CMFIB-LC IPv4 event pending debugging enabled PE-3-sp#debug platform software multicast ip cmfib event table CMFIB-LC IPv4 event table debugging enabled
DB-1987
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-1988
December 2010
Syntax Description
Specifies the events for the selected group. Specifies the debugging errors. Specifies the packet information. Specifies the timer information.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast ip hal command using the event keyword:
PE-3-sp#debug platform software multicast ip hal eve PE-3-sp#debug platform software multicast ip hal event Multicast HAL event log debugging is on PE-3-sp# *Oct 30 09:24:48.078 EDT: SP: hal_timer_event: NRPF-AG *Oct 30 09:24:48.790 EDT: SP: hal_timer_event: S-CHECK *Oct 30 09:24:49.754 EDT: SP: hal_timer_event: NRPF-AG *Oct 30 09:24:51.530 EDT: SP: hal_timer_event: NRPF-AG *Oct 30 09:24:53.298 EDT: SP: hal_timer_event: NRPF-AG *Oct 30 09:24:55.154 EDT: SP: hal_timer_event: NRPF-AG
The following example shows output from the debug platform software multicast ip hal command using the error keyword:
PE-3-sp#debug platform software multicast ip Multicast HAL error log debugging is on hal error
DB-1989
The following example shows output from the debug platform software multicast ip hal command using the pak keyword:
PE-3-sp#debug platform software multicast ip PE-3-sp#debug platform software multicast ip Multicast HAL packet log debugging is on hal pak hal pak
The following example shows output from the debug platform software multicast ip hal command using the timer keyword:
PE-3-sp#debug platform software multicast ip PE-3-sp#debug platform software multicast ip Multicast HAL timer log debugging is on hal tim hal timer
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-1990
December 2010
Syntax Description
Displays all multicast hardware switching debugging information, including errors, events, and packets. Displays error messages related to multicast hardware switching for the specified group-address. Displays the run-time sequence of events for multicast hardware switching.
Defaults
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast ipv6 command using the control keyword:
Router# debug platform software multicast ipv6 control
The following example shows output from the debug platform software multicast ipv6 command using the error keyword:
Router# debug mls rp ip multicast error
The following example shows output from the debug platform software multicast ipv6 command using the event keyword:
Router# debug mls rp ip multicast event
DB-1991
Related Commands
Command ipv6 multicast hardware-switching connected ipv6 multicast hardware-switching replication-mode ingress
Description Downloads the interface and mask entry for IPv6 multicast packet.
Configures the ingress hardware replication mode for IPv6 multicast packets.
DB-1992
December 2010
Syntax Description
Specifies the multicast ipv6 mfib errors. Specifies the mfib IPv4 pending entry information. Specifies the hardware statistics export information.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast ipv6 cmfib command:
PE-3-sp#debug platform software multicast ipv6 cmfib error CMFIB-LC IPv6 error debugging enabled PE-3-sp#debug platform software multicast ipv6 cmfib event CMFIB-LC IPv6 event debugging enabled PE-3-sp#debug platform software multicast ipv6 cmfib stats CMFIB-LC IPv6 stats debugging enabled
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-1993
Syntax Description
cmfib hal
Specifies theMFIB IPV6 platform code debugging information. Specifies the HAL IPV6 debug information.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast ipv6 command using the cmfib keyword:
PE-3-sp#debug platform software multicast ipv6 cmfib error CMFIB-LC IPv6 error debugging enabled PE-3-sp#debug platform software multicast ipv6 cmfib eve CMFIB-LC IPv6 event debugging enabled PE-3-sp#debug platform software multicast ipv6 cmfib stats CMFIB-LC IPv6 stats debugging enabled
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-1994
December 2010
Syntax Description
error event
Specifies the multicast ipv6 mfib errors. Specifies the mfib IPv4 pending entry information.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast ipv6 hal command:
PE-3-sp#debug platform software multicast ipv6 hal error CMFIB-LC IPv6 debugging enabled
PE-3-sp#debug platform software multicast ipv6 hal event CMFIB-LC IPv6 IPv6 HAL error debugging enabled
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-1995
Syntax Description
lc
Specifies the line card for which the multicast events are to be displayed.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast lc command:
PE-3-sp#debug platform software multicast lc Debug from mls_mcast_lc library debugging is on
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-1996
December 2010
Syntax Description
event pak
Specifies the mld events for the selected group. Specifies the mld packet information.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast mld command using the event keyword:
PE-3-sp#debug platform software multicast igmp event multicast snooping event log debugging is on
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-1997
Syntax Description
event pak
Specifies the mld events for the selected group. Specifies the mld packet information.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast mrouter command using the event keyword:
PE-3-sp#debug platform software multicast mrouter event Router Discovery (MLD MROUTER Protocol) event log debugging is on
The following example shows output from the debug platform software multicast mrouter command using the pak keyword:
PE-3-sp#debug platform software multicast mrouter pak Router Discovery (MLD MROUTER Protocol) packet log debugging is on
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-1998
December 2010
Syntax Description
Specifies the events for the selected group. Specifies the debugging errors. Specifies the packet information.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast msc command using the error keyword:
PE-3-sp#debug platform software multicast msc error Multicast Shortcuts error log debugging is on
The following example shows output from the debug platform software multicast msc command using the event keyword:
PE-3-sp#debug platform software multicast msc eve Multicast Shortcuts event log debugging is on
The following example shows output from the debug platform software multicast msc command using the pak keyword:
PE-3-sp#debug platform software multicast msc pak Multicast Shortcuts packet log debugging is on
DB-1999
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-2000
December 2010
Syntax Description
events pak
Specifies the events for the selected group. Specifies the packet information.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast rgmp command using the event keyword:
PE-3-sp#debug platform software multicast rgmp event RGMP event log debugging is on
The following example shows output from the debug platform software multicast rgmp command using the pak keyword:
PE-3-sp#debug platform software multicast rgmp pak RGMP packet log debugging is on
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-2001
Syntax Description
events error
Specifies the events for the selected group. Specifies the debugging errors.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast rpdf command using the error keyword:
PE-3-sp#debug platform software multicast rpdf error Multicast Shortcuts error log debugging is on
The following example shows output from the debug platform software multicast rpdf command using the event keyword:
PE-3-sp#debug platform software multicast rpdf eve Multicast Shortcuts event log debugging is on
The following example shows output from the debug platform software multicast rpdf command using the pak keyword:
PE-3-sp#debug platform software multicast rpdf pak Multicast Shortcuts packet log debugging is on
DB-2002
December 2010
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-2003
Syntax Description
events error
Specifies the events for the selected group. Specifies the debugging errors.
Defaults
Debugging is enabled.
Command Modes
Privileged EXEC
Command History
Release 12.2(33)SRE
Usage Guidelines
Examples
The following example shows output from the debug platform software multicast titan command using the error keyword:
PE-3-sp#debug platform software multicast rpdf error Multicast Bidir RP/DF error log debugging is on
The following example shows output from the debug platform software multicast titan command using the event keyword:
PE-3-sp#debug platform software multicast rpdf eve PE-3-sp#debug platform software multicast rpdf event Multicast Bidir RP/DF event log debugging is on
Related Commands
Description Displays the high availability multicast shortcuts debugging errors and events.
DB-2004
December 2010
Syntax Description
Enables configuration related debugs. Enables statistics collection related debugs. Enables detailed debugs for all WCCP related configurations. Enables debugs related to type definition language (TDL) messages being exchanged.
Command Default
Debugging is disabled.
Command Modes
Command History
Modification This command was introduced. This command was modified. The counters keyword was added.
Examples
The following is sample output from the debug platform software wccp configuration command:
Router# debug platform software wccp configuration
DB-2005
*Jun 17 15:41:24.827: FMANRP-WCCP: adjacency 90.20.1.2 (4500.0000.0000), router_id 66.66.66.66 proto=47 *Jun 17 15:41:39.807: FMANRP-WCCP: update mask data, Service Group (0, 0, 0) acl = , propagate_tos = TRUE, mode_is_closed = FALSE definition_is_valid = TRUE, protocol = 6, priority = 240 ass_method = Mask, fwd_method = GRE, ret_method = L2 num_mv_sets = 1, redirection_is_active = TRUE, num_wcs = 1 use_source_port = FALSE, ports_defined = TRUE wc[0] = 90.20.1.2 ports[0] = 80 ports[1] = 0 ports[2] = 0 ports[3] = 0 ports[4] = 0 ports[5] = 0 ports[6] = 0 ports[7] = 0 *Jun 17 15:41:39.808: FMANRP-WCCP: Service Group (0, 0, 0) generate merged acl from IOS *Jun 17 15:41:39.808: FMANRP-WCCP: wccp merged_acl(acl=), p=64 t=64 MCP wccp merged_acl, num_port=1 result_len=64
The following is sample output from debug platform software wccp messages command:
Router# debug platform software wccp messages
DB-2006
December 2010
ports[1] = ports[2] = ports[3] = ports[4] = ports[5] = ports[6] = ports[7] = 17 15:51:29.847: FMANRP-WCCP: 17 15:51:29.886: FMANRP-WCCP: to fman-rp 17 15:51:29.886: FMANRP-WCCP:
0 0 0 0 0 0 0 send out (0, 0, 0) wccp_acl_begin to fman-rp Service Group (0, 0, 0) send out ACL=WCCP_ACL_0x0, 64 send out (0, 0, 0) wccp_acl_end to fman-rp
The following is sample output from the debug platform software wccp detail command:
Router# debug platform software wccp detail
The debug messages appear for each access control entry (ACE) of the merged access control list (ACL) for the service group:
*Jun 17 18:42:30.487: FMANRP-WCCP: Converted adjacency (0x30692230), to ce_addr (90.20.1.2) *Jun 17 18:42:30.487: FMANRP-WCCP: Service Group (0, 0, 0) send out ACL=WCCP_ACL_0x0, ACE=64, obj_id=181 PERMIT, srcopr 5, dstopr 3 to fman-rp *Jun 17 18:42:30.487: FMANRP-WCCP: oce 0x30692230 adj 0x306921C0 handle 0x30692230
DB-2007
The following is sample output from the debug platform software wccp counters command.
Router# debug platform software wccp counters
Related Commands
Description Removes WCCP statistics (counts) maintained on the router for a particular service. Enables support of the specified WCCP service for participation in a service group.
ip wccp check services Enables all WCCP services. all ip wccp outbound-acl-check ip wccp redirect show platform software wccp Enables execution of ACL applied on the actual outgoing interface of a packet before a decision is taken to redirect a packet. Enables packet redirection on an outbound or inbound interface using WCCP. Displays global statistics related to WCCP on Cisco ASR 1000 Series Routers.
DB-2008
December 2010
debug policy-firewall
Note
Effective with Cisco IOS Release 12.4(20)T, the debug policy-firewall command replaces the debug ip inspect command. To display messages about Cisco IOS firewall events, including details about the packets of the protocol, use the debug policy-firewall command in EXEC mode. To disable debugging output, use the no form of this command. debug policy-firewall {function-trace | object-creation | object-deletion | list {access-list | extended-access-list} | events | timers | packet-path | protocol protocol-name | L2-transparent | control-plane | detailed} no debug policy-firewall {function-trace | object-creation | object-deletion | list {access-list | extended-access-list} | events | timers | packet-path | protocol protocol-name | L2-transparent | control-plane | detailed}
Syntax Description
function-trace object-creation
Displays messages about software functions called by the Cisco IOS firewall. Displays messages about software objects being created by the Cisco IOS firewall. Object creation corresponds to the beginning of Cisco IOS firewall-inspected sessions. Displays messages about software objects being deleted by the Cisco IOS firewall. Object deletion corresponds to the closing of Cisco IOS firewall-inspected sessions. Displays messages about policy firewall conditional debugging. Filters the basic list of policy firewall conditional debugging messages. The valid range is from 1 to 199. Filters the extended range of policy firewall conditional debugging messages. The valid range is from 1300 to 2699. Displays messages about Cisco IOS firewall software events, including information about Cisco IOS firewall packet processing or MIB special events. Displays messages about Cisco IOS firewall timer events such as when the Cisco IOS firewall idle timeout is reached. Displays messages about the packet-path functions.
object-deletion
timers packet-path
DB-2009
protocol protocol-name Displays messages about Cisco IOS firewall-inspected protocol events, including details about the packets of the protocol. The supported protocols are as follows:
aolAmerica Online Instant Messenger (IM) cuseemeCU-SeeMe dns-resolverDomain Name System (DNS) resolver dns-timerDomain Name System (DNS) timer ftp-cmdFTP commands and responses ftp-tokenFTP token (enables tracing of the FTP tokens parsed) h225rasH.225 RAS (Registration, Admission, and Status) Configuration h323H.225 Protocol, Version 4 httpHTTP icmpInternet Control Message Protocol (ICMP) icqI Seek You (ICQ) IM imapInternet Message Access Protocol (IMAP) mgcpMedia Gateway Control Protocol (MGCP) msn-msgrMSN Messenger IM protocol msrpcMicrosoft RPC (Remote Procedure Call) (MSRPC) netshowMicrosoft NetShow p2pPeer-to-peer (P2P) protocol pop3Post Office Protocol, Version 3 (POP 3) rcmdUNIX R commands (rlogin, rexec, rsh) realaudioRealAudio rpcRemote Procedure Call (RPC) rtspReal-Time Streaming Protocol (RTSP) sipSession Initiation Protocol (SIP) skinnySkinny Client Control Protocol (SCCP) smtpSimple Mail Transfer Protocol (SMTP) sqlnet Structured Query Language*Net (SQL*Net) streamworks StreamWorks stun-iceSTUN-ICE tcpTransmission Control Protocol (TCP) tftpTrivial File Transfer Protocol (TFTP) udpUser Datagram Protocol (UDP) vdoliveVDOLive winmsgrWindows IM yahooYahoo IM
DB-2010
December 2010
Displays messages about Layer 2 transparent (firewall) bridge mode events. Displays messages about the control-plane routines. Detailed information is displayed for all the other enabled Cisco IOS firewall debug commands. Use this form of the command in conjunction with the other Cisco IOS firewall debug commands.
Command Modes
Command History
Modification This command was introduced. This command replaces the debug ip inspect command. The list and packet-path keywords were added.
Usage Guidelines
The debug policy-firewall command is used to troubleshoot firewall problems. The output of this command can be used to analyze the behavior of the firewall and to diagnose the root cause of the problem.
Examples
The following is sample output from the debug policy-firewall function-trace command:
Router# debug policy-firewall function-trace Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 08:13:43: 08:13:43: 08:13:43: 08:13:43: 08:13:43: 08:13:43: 08:13:43: 08:13:43: 08:13:43: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: 08:13:44: FIREWALL: fw_dp_tcp_init_sis(): FIREWALL: fw_dp_insp_init_sis(): FIREWALL: fw_dp_tcp_inspect(): , i2r = 1 FIREWALL: fw_dp_insp_listen_state(): FIREWALL: fw_dp_insp_ensure_return_traffic(): FIREWALL: fw_dp_insp_process_syn_packet(): FIREWALL: fw_dp_insp_create_tcp_host_entry(): FIREWALL*: fw_dp_tcp_inspect(): , i2r = 0 FIREWALL*: fw_dp_insp_synsent_state(): FIREWALL*: fw_dp_tcp_inspect(): , i2r = 1 FIREWALL*: fw_dp_insp_synrcvd_state(): FIREWALL*: fw_dp_insp_remove_sis_from_host_entry(): FIREWALL*: fw_dp_insp_remove_host_entry(): FIREWALL*: fw_dp_insp_delete_host_entry(): FIREWALL*: fw_dp_insp_handle_icq_control_stream(): FIREWALL*: fw_dp_tcp_inspect(): , i2r = 0 FIREWALL*: fw_dp_insp_estab_state(): FIREWALL*: fw_dp_insp_handle_icq_control_stream(): FIREWALL*: fw_dp_tcp_inspect(): , i2r = 1 FIREWALL*: fw_dp_insp_estab_state(): FIREWALL*: fw_dp_insp_handle_icq_control_stream(): FIREWALL*: fw_dp_tcp_inspect(): , i2r = 0 FIREWALL*: fw_dp_insp_estab_state(): FIREWALL*: fw_dp_insp_handle_icq_control_stream(): FIREWALL*: fw_dp_tcp_inspect(): , i2r = 1 FIREWALL*: fw_dp_insp_estab_state(): FIREWALL*: fw_dp_insp_handle_icq_control_stream(): FIREWALL*: fw_dp_tcp_inspect(): , i2r = 0 FIREWALL*: fw_dp_insp_estab_state(): FIREWALL*: fw_dp_tcp_inspect(): , i2r = 1
DB-2011
Feb 13 08:13:44: FIREWALL*: fw_dp_insp_estab_state(): Feb 13 08:13:44: %APPFW-6-IM_ICQ_SESSION: im-icq text-chat service session initiator sends 77 bytes session 192.168.3.3:36091 192.168.103.3:5190 on zone-pair zp_test_in class test_im appl-class test_icq_1
The date in each line of the output is the timestamp. This output shows the functions called by the Cisco IOS firewall as a session is inspected. Entries with an asterisk (*) after the word FIREWALL are entries when the fast path is used; otherwise, the process path is used. The following is sample output from the debug policy-firewall object-creation, debug policy-firewall object-deletion, debug policy-firewall timers and debug policy-firewall events commands:
Router# Router# Router# Router# debug debug debug debug policy-firewall policy-firewall policy-firewall policy-firewall object-creation object-deletion timers events
Log Buffer (600000 bytes): Feb 13 08:16:17: FIREWALL: FW CCE got packet 0x66030694 in process path Feb 13 08:16:17: FIREWALL: Router gen or router destined pak 0x66030694, let it pass Feb 13 08:16:17: FIREWALL: FW CCE got packet 0x660311F8 in process path Feb 13 08:16:17: FIREWALL: Router gen or router destined pak 0x660311F8, let it pass Feb 13 08:16:17: FIREWALL: FW CCE got packet 0x66030A60 in process path Feb 13 08:16:17: FIREWALL: Router gen or router destined pak 0x66030A60, let it pass Feb 13 08:16:19: FIREWALL: FW CCE got packet 0x660328C0 in process path Feb 13 08:16:19: FIREWALL: Router gen or router destined pak 0x660328C0, let it pass Feb 13 08:16:21: FIREWALL: FW CCE got packet 0x66031D5C in process path Feb 13 08:16:21: FIREWALL: Router gen or router destined pak 0x66031D5C, let it pass Feb 13 08:16:22: FIREWALL: FW CCE got packet 0x66032128 in process path Feb 13 08:16:22: FIREWALL: Router gen or router destined pak 0x66032128, let it pass Feb 13 08:16:22: FIREWALL: FW CCE got packet 0x660324F4 in process path Feb 13 08:16:22: FIREWALL: Router gen or router destined pak 0x660324F4, let it pass Feb 13 08:16:24: FIREWALL: FW CCE got packet 0x66033424 in process path Feb 13 08:16:24: FIREWALL: Router gen or router destined pak 0x66033424, let it pass Feb 13 08:16:25: FIREWALL: fw_dp_insp_handle_timer_event Feb 13 08:16:25: FIREWALL: fw_dp_insp_sample_session_rate Feb 13 08:16:26: FIREWALL: FW CCE got packet 0x66032C8C in process path Feb 13 08:16:26: FIREWALL: Router gen or router destined pak 0x66032C8C, let it pass Feb 13 08:16:26: FIREWALL: FW CCE got packet 0x6602DCD0 in process path Feb 13 08:16:26: FIREWALL: Router gen or router destined pak 0x6602DCD0, let it pass Feb 13 08:16:26: FIREWALL: FW CCE got packet 0x5011DDB4 in process path Feb 13 08:16:26: FIREWALL: Router gen or router destined pak 0x5011DDB4, let it pass Feb 13 08:16:28: FIREWALL: FW CCE got packet 0x5011D9E8 in process path Feb 13 08:16:28: FIREWALL: sis 20491840 : Timer Start: Timer: 20491964 Time: 30000 milisecs Feb 13 08:16:28: FIREWALL: sis 20491840 : Timer Init Leaf Feb 13 08:16:28: FIREWALL: sis 20491840 : Allocating L7 sis extensionL4 protocol = 1, L7 protocol = 62, granular = 5 Feb 13 08:16:28: FIREWALL: sis 20491840 : create host entry 669F3180 addr 192.168.103.3 bucket 12 (vrf 0:0) fwfo 0x507E39C0 Feb 13 08:16:29: FIREWALL*: sis 20491840 : Timer Start: Timer: 20491964 Time: 3600000 milisecs Feb 13 08:16:29: %APPFW-6-IM_ICQ_SESSION: im-icq text-chat service session initiator sends 77 bytes session 192.168.3.3:36091 192.168.103.3:5190 on zone-pair zp_test_in class test_im appl-class test_icq_1 Feb 13 08:16:29: %APPFW-6-IM_ICQ_SESSION: im-icq text-chat service session initiator gets 198 bytes session 192.168.103.3:5190 192.168.3.3:36091 on zone-pair zp_test_in class test_im appl-class test_icq_1 Feb 13 08:16:29: FIREWALL: FW CCE got packet 0x20159864 in process path Feb 13 08:16:29: FIREWALL: Router gen or router destined pak 0x20159864, let it pass Feb 13 08:16:29: FIREWALL: fw_dp_insp_handle_timer_event Feb 13 08:16:29: FIREWALL: delete host entry 669F3180 addr 192.168.103.3 Feb 13 08:16:30: FIREWALL: FW CCE got packet 0x66033058 in process path
DB-2012
December 2010
Feb 13 08:16:30: Feb 13 08:16:31: Feb 13 08:16:31: Feb 13 08:16:31: Feb 13 08:16:31: Feb 13 08:16:34: Feb 13 08:16:34: Feb 13 08:16:35: Feb 13 08:16:35: Feb 13 08:16:36: Feb 13 08:16:36: Feb 13 08:16:36: Feb 13 08:16:36: Feb 13 08:16:38: Feb 13 08:16:38: Feb 13 08:16:38: Feb 13 08:16:38: Feb 13 08:16:39: Feb 13 08:16:39: Feb 13 08:16:40: Feb 13 08:16:40: Feb 13 08:16:40: Feb 13 08:16:40: Feb 13 08:16:43: Feb 13 08:16:43: Feb 13 08:16:44: Feb 13 08:16:44: Feb 13 08:16:44: Feb 13 08:16:44: Feb 13 08:16:45: Feb 13 08:16:45: Feb 13 08:16:48: Feb 13 08:16:48: Feb 13 08:16:48: Feb 13 08:16:48: Feb 13 08:16:49: Feb 13 08:16:49: Feb 13 08:16:50: Feb 13 08:16:50: Feb 13 08:16:50: Feb 13 08:16:50: Feb 13 08:16:52: Feb 13 08:16:52: Feb 13 08:16:53: Feb 13 08:16:53: Feb 13 08:16:54: Feb 13 08:16:54: Feb 13 08:16:55: Feb 13 08:16:55: Feb 13 08:16:57: Feb 13 08:16:57: Feb 13 08:16:57: Feb 13 08:16:57: Feb 13 08:16:59: Feb 13 08:16:59: Feb 13 08:16:59: Feb 13 08:16:59: Feb 13 08:17:00: milisecs Feb 13 08:17:00: milisecs Feb 13 08:17:01: Feb 13 08:17:01: Feb 13 08:17:01:
FIREWALL: Router gen or router destined pak 0x66033058, let it pass FIREWALL: FW CCE got packet 0x660337F0 in process path FIREWALL: Router gen or router destined pak 0x660337F0, let it pass FIREWALL: FW CCE got packet 0x20159C30 in process path FIREWALL: Router gen or router destined pak 0x20159C30, let it pass FIREWALL: FW CCE got packet 0x20159FFC in process path FIREWALL: Router gen or router destined pak 0x20159FFC, let it pass FIREWALL: FW CCE got packet 0x5011E54C in process path FIREWALL: Router gen or router destined pak 0x5011E54C, let it pass FIREWALL: FW CCE got packet 0x665E6304 in process path FIREWALL: Router gen or router destined pak 0x665E6304, let it pass FIREWALL: FW CCE got packet 0x5011E180 in process path FIREWALL: Router gen or router destined pak 0x5011E180, let it pass FIREWALL: fw_dp_insp_handle_timer_event FIREWALL: fw_dp_insp_sample_session_rate FIREWALL: FW CCE got packet 0x2015A3C8 in process path FIREWALL: Router gen or router destined pak 0x2015A3C8, let it pass FIREWALL: FW CCE got packet 0x5011E918 in process path FIREWALL: Router gen or router destined pak 0x5011E918, let it pass FIREWALL: FW CCE got packet 0x665E6E68 in process path FIREWALL: Router gen or router destined pak 0x665E6E68, let it pass FIREWALL: FW CCE got packet 0x2015A794 in process path FIREWALL: Router gen or router destined pak 0x2015A794, let it pass FIREWALL: FW CCE got packet 0x665E7234 in process path FIREWALL: Router gen or router destined pak 0x665E7234, let it pass FIREWALL: FW CCE got packet 0x5011ECE4 in process path FIREWALL: Router gen or router destined pak 0x5011ECE4, let it pass FIREWALL: FW CCE got packet 0x2015AB60 in process path FIREWALL: Router gen or router destined pak 0x2015AB60, let it pass FIREWALL: FW CCE got packet 0x665E7600 in process path FIREWALL: Router gen or router destined pak 0x665E7600, let it pass FIREWALL: FW CCE got packet 0x665E79CC in process path FIREWALL: Router gen or router destined pak 0x665E79CC, let it pass FIREWALL: FW CCE got packet 0x5011F47C in process path FIREWALL: Router gen or router destined pak 0x5011F47C, let it pass FIREWALL: FW CCE got packet 0x6602E468 in process path FIREWALL: Router gen or router destined pak 0x6602E468, let it pass FIREWALL: fw_dp_insp_handle_timer_event FIREWALL: fw_dp_insp_sample_session_rate FIREWALL: FW CCE got packet 0x2015B2F8 in process path FIREWALL: Router gen or router destined pak 0x2015B2F8, let it pass FIREWALL: FW CCE got packet 0x6602E09C in process path FIREWALL: Router gen or router destined pak 0x6602E09C, let it pass FIREWALL: FW CCE got packet 0x6602EC00 in process path FIREWALL: Router gen or router destined pak 0x6602EC00, let it pass FIREWALL: FW CCE got packet 0x6602EFCC in process path FIREWALL: Router gen or router destined pak 0x6602EFCC, let it pass FIREWALL: FW CCE got packet 0x6602F764 in process path FIREWALL: Router gen or router destined pak 0x6602F764, let it pass FIREWALL: FW CCE got packet 0x6602F398 in process path FIREWALL: Router gen or router destined pak 0x6602F398, let it pass FIREWALL: FW CCE got packet 0x6602FB30 in process path FIREWALL: Router gen or router destined pak 0x6602FB30, let it pass FIREWALL: FW CCE got packet 0x66030E2C in process path FIREWALL: Router gen or router destined pak 0x66030E2C, let it pass FIREWALL: FW CCE got packet 0x66030694 in process path FIREWALL: Router gen or router destined pak 0x66030694, let it pass FIREWALL*: sis 20491840 : Timer Start: Timer: 20491964 Time: 5000 FIREWALL*: sis 20491840 : Timer Start: Timer: 20491964 Time: 1000 FIREWALL: fw_dp_insp_handle_timer_event FIREWALL: sis 20491840 : Idle Timer Expires: Timer: 20491964 FIREWALL: sis 20491840 : Delete sis half_open 0
DB-2013
Feb 13 08:17:01: Feb 13 08:17:01: Feb 13 08:17:01: Feb 13 08:17:01: Feb 13 08:17:01: Feb 13 08:17:01: Feb 13 08:17:02: Feb 13 08:17:02: Feb 13 08:17:02: Feb 13 08:17:02: Feb 13 08:17:04: Feb 13 08:17:04: Feb 13 08:17:04: Feb 13 08:17:04: Feb 13 08:17:06: Feb 13 08:17:06: Feb 13 08:17:07: Feb 13 08:17:07: Feb 13 08:17:08: Feb 13 08:17:08: Feb 13 08:17:09: Feb 13 08:17:09: Feb 13 08:17:11: Feb 13 08:17:11: Feb 13 08:17:11: Feb 13 08:17:11: Feb 13 08:17:13: Feb 13 08:17:13: Feb 13 08:17:13: Feb 13 08:17:13: Feb 13 08:17:14: Feb 13 08:17:14: Feb 13 08:17:16: Feb 13 08:17:16: Feb 13 08:17:16: Feb 13 08:17:16: blr6-7200b# blr6-7200b#
FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL: FIREWALL:
sis 20491840 : Timer Stop: Timer: 20491964 sis 20491840 : Delete sis sis 20491840 : session on temporary delete list sis 20491840 : Calling l4 cleanup FW CCE got packet 0x660311F8 in process path Router gen or router destined pak 0x660311F8, let FW CCE got packet 0x66030A60 in process path Router gen or router destined pak 0x66030A60, let fw_dp_insp_handle_timer_event fw_dp_insp_sample_session_rate FW CCE got packet 0x66031990 in process path Router gen or router destined pak 0x66031990, let FW CCE got packet 0x660315C4 in process path Router gen or router destined pak 0x660315C4, let FW CCE got packet 0x660328C0 in process path Router gen or router destined pak 0x660328C0, let FW CCE got packet 0x66031D5C in process path Router gen or router destined pak 0x66031D5C, let FW CCE got packet 0x66033424 in process path Router gen or router destined pak 0x66033424, let FW CCE got packet 0x66032C8C in process path Router gen or router destined pak 0x66032C8C, let FW CCE got packet 0x6602DCD0 in process path Router gen or router destined pak 0x6602DCD0, let FW CCE got packet 0x5011DDB4 in process path Router gen or router destined pak 0x5011DDB4, let FW CCE got packet 0x20159498 in process path Router gen or router destined pak 0x20159498, let FW CCE got packet 0x665E5F38 in process path Router gen or router destined pak 0x665E5F38, let fw_dp_insp_handle_timer_event fw_dp_insp_sample_session_rate FW CCE got packet 0x5011D9E8 in process path Router gen or router destined pak 0x5011D9E8, let FW CCE got packet 0x20159864 in process path Router gen or router destined pak 0x20159864, let
it pass it pass
it pass it pass it pass it pass it pass it pass it pass it pass it pass it pass
it pass it pass
The event debug output declares the packet path from which the firewall got the packet. The packet path can be either the Cisco Express Forwarding (CEF) or the process path. The debug policy-firewall command is used when the firewall sends out a packet acting like a proxy. The timer debug output specifies timer related events. Timers are used to close the sessions created by the firewall. Whenever a timeout happens, the timer debugging output specifies whether it needs to close the session or keep it open for longer. The following is sample output from the debug policy-firewall protocol icq command:
Router# debug policy-firewall protocol icq Apr Apr Apr Apr Apr Apr Apr Apr Apr Apr Apr Apr Apr 2 2 2 2 2 2 2 2 2 2 2 2 2 23:55:21: 23:55:21: 23:55:21: 23:55:21: 23:55:21: 23:55:21: 23:55:21: 23:55:21: 23:55:21: 23:55:21: 23:55:21: 23:55:21: 23:55:21: CCE*: CCE*: CCE*: CCE*: CCE*: CCE*: CCE*: CCE*: CCE*: CCE*: CCE*: CCE*: CCE*: I2R = 1, state_object = 0x0, data_len = 0 ICQ protocol found... cce_dp_named_db_inspect_icq_create_cso I2R = 0, state_object = 0x508A1014, data_len = 10 ICQ:state = 1 ICQ:FLAP Channel = 1 , Packet length = 4 I2R = 1, state_object = 0x508A1014, data_len = 270 ICQ:state = 1 ICQ:FLAP Channel = 1 , Packet length = 264 ICQ:Find the client version ICQ:Get the client string ICQ:Object Type = 6,Object Length = 256 icq_setstate_on_servicetype
DB-2014
December 2010
Apr 2 23:55:21: CCE*: ICQ:Obj Data Skipping :prev state =4 Apr 2 23:55:21: CCE*: ICQ:ICQ Data length = 0,Curr state = 1 , Prev state = 0 Apr 2 23:55:21: CCE*: I2R = 0, state_object = 0x508A1014, data_len = 42 Apr 2 23:55:21: CCE*: ICQ:state = 1 Apr 2 23:55:21: CCE*: ICQ:FLAP Channel = 2 , Packet length = 36 Apr 2 23:55:21: CCE*: ICQ:Family Service Id = 1,Subtype Id = 3 Apr 2 23:55:21: CCE*: ICQ:curr state = 9 Apr 2 23:55:21: CCE*: I2R = 1, state_object = 0x508A1014, data_len = 56 Apr 2 23:55:21: CCE*: ICQ:state = 1 Apr 2 23:55:21: CCE*: ICQ:FLAP Channel = 2 , Packet length = 50 Apr 2 23:55:21: CCE*: ICQ:Family Service Id = 1,Subtype Id = 23 Apr 2 23:55:21: CCE*: ICQ:curr state = 22 Apr 2 23:55:21: CCE*: ICQ:service = 1 , version = 4 Apr 2 23:55:21: CCE*: ICQ:service = 19 , version = 4 Apr 2 23:55:21: CCE*: ICQ:service = 2 , version = 1 Apr 2 23:55:21: CCE*: ICQ:service = 3 , version = 1 Apr 2 23:55:21: CCE*: ICQ:service = 21 , version = 1 Apr 2 23:55:21: CCE*: ICQ:Detected ICQ Protocol Apr 2 23:55:21: CCE*: I2R = 1, state_object = 0x508A1014, data_len = 230 Apr 2 23:55:21: CCE*: ICQ:state = 1 Apr 2 23:55:21: CCE*: ICQ:FLAP Channel = 2 , Packet length = 224 Apr 2 23:55:21: CCE*: ICQ:Family Service Id = 4,Subtype Id = 6 Apr 2 23:55:21: CCE*: ICQ:curr state = 14 Apr 2 23:55:21: CCE*: icq_process_client_message Apr 2 23:55:21: CCE*: ICQ:Message Channel ID = 2 Apr 2 23:55:21: CCE*: icq_skip_client_msg Apr 2 23:55:21: CCE*: ICQ:TLV Service Type = 5 Apr 2 23:55:21: CCE*: ICQ:length = 190,obj length = 186 Apr 2 23:55:21: CCE*: ICQ:ICQ Data length = 4,Curr state = 19 , Prev state = 19 Apr 2 23:55:21: CCE*: ICQ:TLV Service Type = 3 Apr 2 23:55:21: CCE*: ICQ:length = 0,obj length = 0 Apr 2 23:55:21: CCE*: I2R = 1, state_object = 0x508A1014, data_len = 66 Apr 2 23:55:21: CCE*: ICQ:state = 21 Apr 2 23:55:21: CCE*: ICQ:FLAP Channel = 2 , Packet length = 60 Apr 2 23:55:21: CCE*: ICQ:Family Service Id = 4,Subtype Id = 6 Apr 2 23:55:21: CCE*: ICQ:curr state = 14 Apr 2 23:55:21: CCE*: icq_process_client_message Apr 2 23:55:21: CCE*: ICQ:Message Channel ID = 2 Apr 2 23:55:21: CCE*: icq_skip_client_msg Apr 2 23:55:21: CCE*: ICQ:TLV Service Type = 5 Apr 2 23:55:21: CCE*: ICQ:length = 26,obj length = 26 Apr 2 23:55:21: CCE*: ICQ:Obj Data Skipping :prev state =19 Apr 2 23:55:21: CCE*: ICQ:ICQ Data length = 0,Curr state = 1 , Prev state = 0 Apr 2 23:55:21: CCE*: ICQ:service found = 2 Apr 2 23:55:21: CCE*: ICQ: Found IM default service Apr 2 23:55:21: %APPFW-6-IM_ICQ_SESSION: im-icq un-recognized service session initiator sends 66 bytes session 192.168.5.3:25610 63.147.175.30:5190 on zone-pair zp_test_in class test_im appl-class test_icq_1 Apr 2 23:55:21: CCE*: I2R = 0, state_object = 0x508A1014, data_len = 36 Apr 2 23:55:21: CCE*: ICQ:state = 1 Apr 2 23:55:21: CCE*: ICQ:FLAP Channel = 2 , Packet length = 30 Apr 2 23:55:21: CCE*: ICQ:Family Service Id = 4,Subtype Id = 12 Apr 2 23:55:21: CCE*: ICQ:curr state = 9 Apr 2 23:55:21: CCE*: I2R = 0, state_object = 0x508A1014, data_len = 285 Apr 2 23:55:21: CCE*: ICQ:state = 1 Apr 2 23:55:21: CCE*: ICQ:FLAP Channel = 2 , Packet length = 279 Apr 2 23:55:21: CCE*: ICQ:Family Service Id = 4,Subtype Id = 7 Apr 2 23:55:21: CCE*: ICQ:curr state = 14 Apr 2 23:55:21: CCE*: icq_process_client_message Apr 2 23:55:21: CCE*: ICQ:Message Channel ID = 2 Apr 2 23:55:21: CCE*: icq_skip_client_msg Apr 2 23:55:21: CCE*: ICQ:TLV Service Type = 1 Apr 2 23:55:21: CCE*: ICQ:length = 241,obj length = 2 Apr 2 23:55:21: CCE*: ICQ:ICQ Data length = 239,Curr state = 19 , Prev state = 19
DB-2015
Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:55:21: Apr 2 23:56:10: Apr 2 23:56:11: Apr 2 23:56:11: blr2-7200b#
CCE*: ICQ:TLV Service Type = 6 CCE*: ICQ:length = 235,obj length = 4 CCE*: ICQ:ICQ Data length = 231,Curr state = 19 , Prev state = 19 CCE*: ICQ:TLV Service Type = 5 CCE*: ICQ:length = 227,obj length = 4 CCE*: ICQ:ICQ Data length = 223,Curr state = 19 , Prev state = 19 CCE*: ICQ:TLV Service Type = 15 CCE*: ICQ:length = 219,obj length = 4 CCE*: ICQ:ICQ Data length = 215,Curr state = 19 , Prev state = 19 CCE*: ICQ:TLV Service Type = 3 CCE*: ICQ:length = 211,obj length = 4 CCE*: ICQ:ICQ Data length = 207,Curr state = 19 , Prev state = 19 CCE*: ICQ:TLV Service Type = 5 CCE*: ICQ:length = 203,obj length = 190 CCE*: ICQ:ICQ Data length = 13,Curr state = 19 , Prev state = 19 CCE*: ICQ:TLV Service Type = 22 CCE*: ICQ:length = 9,obj length = 4 CCE*: ICQ:ICQ Data length = 5,Curr state = 19 , Prev state = 19 CCE*: ICQ:TLV Service Type = 19 CCE*: ICQ:length = 1,obj length = 1 CCE*: ICQ:Obj Data Skipping :prev state =19 CCE*: ICQ:ICQ Data length = 0,Curr state = 1 , Prev state = 0 CCE*: I2R = 1, state_object = 0x508A1014, data_len = 0 FIREWALL sis 65A1C100: Sis extension deleted CCE: cce_dp_named_db_inspect_icq_delete_cso
The debug output details the different states the state machine sees while parsing the Layer 7 ICQ payload. The sample output from the debug policy-firewall protocol winmsgr command includes information on the IM service. For example, the following lines declare that the type of IM service the user is running is Windows Messenger (WINMSGR):
Apr Apr 3 00:21:46: CCE*: WINMSGR:service found = 2 3 00:21:46: CCE*: WINMSGR: Found IM default service
The following is sample output from the debug policy-firewall protocol winmsgr command:
Router# debug policy-firewall protocol winmsgr Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: WindowsMessenger Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: Apr 3 00:21:46: CCE*: I2R = 1, state_object = 0x0, data_len = 0 CCE*: WINMSGR protocol found... CCE*: cce_dp_named_db_inspect_winmsgr_create_cso CCE*: I2R = 1, state_object = 0x660CF5B4, data_len = 19 CCE*: WINMSGR:datalen=19,matchflag=11,matchlen=19 CCE*: WINMSGR:Initial trafficfound CCE*: I2R = 0, state_object = 0x660CF5B4, data_len = 19 CCE*: WINMSGR:datalen=19,matchflag=11,matchlen=19 CCE*: WINMSGR:Initial trafficfound CCE*: I2R = 1, state_object = 0x660CF5B4, data_len = 82 CCE*: WINMSGR:datalen=82,matchflag=6,matchlen=4 CCE*: WINMSGR:version msg : CVR 31 0x0409 winnt 5.0 i386 MSMSGS 5.1.0701 [email protected] CCE*: I2R = 0, state_object = 0x660CF5B4, data_len = 96 CCE*: WINMSGR:datalen=96,matchflag=6,matchlen=4 CCE*: I2R = 1, state_object = 0x660CF5B4, data_len = 33 CCE*: WINMSGR:datalen=33,matchflag=12,matchlen=33 CCE*: WINMSGR:Initial trafficfound CCE*: I2R = 0, state_object = 0x660CF5B4, data_len = 162 CCE*: I2R = 1, state_object = 0x660CF5B4, data_len = 324 CCE*: I2R = 0, state_object = 0x660CF5B4, data_len = 37 CCE*: WINMSGR:datalen=37,matchflag=12,matchlen=37 CCE*: WINMSGR:Initial trafficfound
DB-2016
December 2010
Apr 3 00:21:46: CCE*: I2R = 1, state_object = 0x660CF5B4, data_len = 307 Apr 3 00:21:46: CCE*: WINMSGR:datalen=307,matchflag=5,matchlen=118 Apr 3 00:21:46: CCE*: WINMSGR:service found = 2 Apr 3 00:21:46: CCE*: WINMSGR: Found IM default service Apr 3 00:21:46: %APPFW-6-IM_WINMSGR_SESSION: im-winmsgr un-recognized service session initiator sends 307 bytes session 192.168.5.3:24601 209.165.200.230:1863 on zone-pair zp_test_in class test_im appl-class test_winmsgr_1 Apr 3 00:21:46: CCE*: I2R = 0, state_object = 0x660CF5B4, data_len = 320 Apr 3 00:21:46: CCE*: I2R = 0, state_object = 0x660CF5B4, data_len = 332 Apr 3 00:21:46: CCE*: WINMSGR:datalen=332,matchflag=5,matchlen=143 Apr 3 00:21:46: CCE*: WINMSGR:service found = 2 Apr 3 00:21:46: CCE*: WINMSGR: Found IM default service Apr 3 00:21:46: %APPFW-6-IM_WINMSGR_SESSION: im-winmsgr un-recognized service session initiator gets 332 bytes session 209.165.200.230:1863 192.168.5.3:24601 on zone-pair zp_test_in class test_im appl-class test_winmsgr_1 Apr 3 00:23:11: CCE*: I2R = 1, state_object = 0x660CF5B4, data_len = 0 Apr 3 00:23:11: FIREWALL sis 65A1D540: Sis extension deleted
The following is sample output from the debug policy-firewall control-plane command:
Router# show debug policy_fw: Policy-Firewall control-plane debugging is on voice-gw-118.03# Syslog logging: enabled (0 messages dropped, 0 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) No Active Message Discriminator. No Inactive Message Discriminator. Console logging: disabled Monitor logging: level debugging, 0 messages logged, xml disabled, filtering disabled Buffer logging: level debugging, 247 messages logged, xml disabled, filtering disabled Logging Exception size (4096 bytes) Count and timestamp logging messages: disabled Persistent logging: disabled Trap logging: level informational, 44 message lines logged Log Buffer (60000000 bytes): FIREWALL CP: fw_cp_prot_num_to_name() l4 1, l7 5, gran 0 FIREWALL CP: fw_cp_get_flow_policy_and_class() Flow policy does not exist FIREWALL CP: fw_cp_check_create_default_l7_policy() Could not retrieve flow policy for L4 policy l4-pmap L4 class l4-cmap FIREWALL CP: fw_classmap_filter_update_in_policymap() Adding filter 0x650187F0 to class l4-cmap in policy l4-pmap FIREWALL CP: fw_policy_action_cmd() PPM create action inspect with params 0x64CAF8E8 FIREWALL CP: fw_inspect_class_params() inspect config-plane CLASS-ADD action 0x66315C5C,params 0x64CAF8E8 FIREWALL CP: fw_validate_class_for_matchprot() Validating protocols in class l4-cmap FIREWALL CP: fw_validate_class_for_matchprot() protocol filter found FIREWALL CP: fw_inspect_class_params() Attached config-plane action_params 0x663BD280 FIREWALL CP: fw_cp_create_attach_flow_policy() FIREWALL CP: fw_cp_get_string_from_random_num() Random number generated is 2697258553 FIREWALL CP: fw_cp_generate_random_string() Allocated random str 2697258553 for policy l4-pmap class l4-cmap FIREWALL CP: fw_cp_get_random_string() Found random string for policy l4-pmap class l4-cmap FIREWALL CP: fw_cp_get_random_string() Found random string for policy l4-pmap class l4-cmap FIREWALL CP: fw_cp_get_random_string() Found random string for policy l4-pmap class l4-cmap FIREWALL CP: fw_cp_prot_num_to_name() l4 2, l7 5, gran 0 FIREWALL CP: fw_inspect_int_class_params() FIREWALL CP: fw_create_attach_template_class()
DB-2017
FIREWALL CP: fw_create_attach_template_class() Creating template class for trigger 15udp_2697258553 in 15_2697258553 FIREWALL CP: fw_create_attach_template_class() Trying to create a PPM filter with id 0x64CA73EC FIREWALL CP: fw_cp_prot_num_to_name() l4 4, l7 5, gran 0 FIREWALL CP: fw_inspect_int_class_params() FIREWALL CP: fw_create_attach_template_class() FIREWALL CP: fw_create_attach_template_class() Creating template class for trigger 15icmp_2697258553 in 15_2697258553 FIREWALL CP: fw_create_attach_template_class() Trying to create a PPM filter with id 0x64CA73EC FIREWALL CP: fw_cp_create_attach_vtcp_classes() Create policy 15 FIREWALL CP: fw_cp_create_tcp_15() FIREWALL CP: fw_cp_vtcp_support_get_tcp_init_class() Creating TCP Class with Pure SYN filter FIREWALL CP: fw_inspect_int_class_params() FIREWALL CP: fw_create_attach_template_class() FIREWALL CP: fw_create_attach_template_class() Creating template class for trigger 15tcp_2697258553 in 15_2697258553 FIREWALL CP: fw_create_attach_template_class() Trying to create a PPM filter with id 0x64CA73A4 FIREWALL CP: fw_cp_create_attach_flow_policy() Success-creating flow policy FIREWALL CP: fw_cp_create_attach_flow_policy() Attach flow policy to trigger class as child policy FIREWALL CP: fw_cp_create_attach_flow_policy() Success- Attached flow policy to trigger class FIREWALL CP: fw_cp_create_attach_flow_policy() Creating P20 & P21 for vtcp FIREWALL CP: fw_cp_generate_random_string() Found random string for policy l4-pmap class l4-cmap FIREWALL CP: fw_cp_get_flow_policy_and_class() Found flow policy 0x64FFC838 FIREWALL CP: fw_cp_get_random_string() Found random string for policy l4-pmap class l4-cmap FIREWALL CP: fw_cp_get_random_string() Found random string for policy l4-pmap class l4-cmap FIREWALL CP: fw_cp_get_flow_policy_and_class() Found flow TCP 0x6585718C and UDP 0x645D1794 classes FIREWALL CP: fw_cp_check_create_default_l7_class() Checking the class l4-cmap FIREWALL CP: fw_reverse_policy_handle_zp_event() FIREWALL CP: fw_reverse_policy_handle_zp_event() Reverse_policy Zone pair add event FIREWALL CP: fw_get_ppm_policy_on_zp() Did not find ppm policy on zp zp p_type 0x7 FIREWALL CP: fw_get_name_type_and_client_of_first_class_in_policy() FIREWALL CP: fw_create_cp_dynamic_class() FIREWALL CP: fw_create_cp_dynamic_class() Trying to create a PPM filter with id 0x10000000 FIREWALL CP: fw_create_cp_dynamic_class() Success FIREWALL CP: fw_drop_class_params() action 0x6637A5C0, cmd_params 0x64CA7550, event 0x21 FIREWALL CP: fw_create_noop_feature_object() FIREWALL CP: fw_create_inspect_feature_object() FIREWALL CP: fw_create_fo_internal() Create FO for class 0xC0000002 target_class 0xA0000000 action CCE_INSPECT_CONFIGURED FIREWALL CP: fw_cp_get_inspect_params() FIREWALL CP: fw_cp_get_inspect_params() Creating the FO with default parameters FIREWALL CP: fw_create_fo_internal() Created FO with id 0xAAAA0006 action CCE_INSPECT_CONFIGURED FIREWALL CP: fw_cp_store_fo_id() Enqueue 0xAAAA0006 to fo_param_list FIREWALL CP: fw_create_noop_feature_object() FIREWALL CP: fw_create_inspect_int_feature_object() FIREWALL CP: fw_create_fo_internal() Create FO for class 0xC0000005 target_class 0xA0000000 action CCE_INSPECT FIREWALL CP: fw_cp_get_inspect_params() FIREWALL CP: fw_cp_get_inspect_params() Creating the FO with default parameters FIREWALL CP: fw_create_fo_internal() Created FO with id 0xAAAA0007 action CCE_INSPECT FIREWALL CP: fw_cp_store_fo_id() Enqueue 0xAAAA0007 to fo_param_list FIREWALL CP: fw_create_noop_feature_object()
DB-2018
December 2010
FIREWALL CP: fw_create_inspect_int_feature_object() FIREWALL CP: fw_create_fo_internal() Create FO for class 0xC0000007 target_class 0xA0000000 action CCE_INSPECT FIREWALL CP: fw_cp_get_inspect_params() FIREWALL CP: fw_cp_get_inspect_params() Creating the FO with default parameters FIREWALL CP: fw_create_fo_internal() Created FO with id 0xAAAA0008 action CCE_INSPECT FIREWALL CP: fw_cp_store_fo_id() Enqueue 0xAAAA0008 to fo_param_list FIREWALL CP: fw_create_noop_feature_object() FIREWALL CP: fw_create_inspect_int_feature_object() FIREWALL CP: fw_create_fo_internal() Create FO for class 0xC0000009 target_class 0xA0000000 action CCE_INSPECT FIREWALL CP: fw_cp_get_inspect_params() FIREWALL CP: fw_cp_get_inspect_params() Creating the FO with default parameters FIREWALL CP: fw_create_fo_internal() Created FO with id 0xAAAA0009 action CCE_INSPECT FIREWALL CP: fw_cp_store_fo_id() Enqueue 0xAAAA0009 to fo_param_list FIREWALL CP: fw_create_drop_feature_object() FIREWALL CP: fw_create_fo_internal() Create FO for class 0xC0000003 target_class 0xA0000000 action CCE_FW_DROP FIREWALL CP: fw_create_fo_internal() Created FO with id 0xAAAA000A action CCE_FW_DROP FIREWALL CP: fw_create_internal_reverse_policy() FIREWALL CP: fw_create_ppm_reverse_policy() FIREWALL CP: fw_get_name_type_and_client_of_first_class_in_policy() FIREWALL CP: fw_create_cp_dynamic_class() FIREWALL CP: fw_create_noop_feature_object() FIREWALL CP: fw_create_noop_feature_object() %SYS-5-CONFIG_I: Configured from console by console FIREWALL CP: fw_cp_prot_num_to_name() l4 1, l7 5, gran 0 FIREWALL CP: fw_drop_class_params() action 0x6637A5C0, cmd_params 0x00000000, event 0x40 FIREWALL CP: fw_get_ppm_policy_on_zp() Found ppm policy l4-pmap on zp zp p_type 0x7
The following is sample output from the debug policy-firewall L2-transparent command:
Router# debug policy-firewall L2-transparent *Apr 4 08:28:23.554: L2FW*:insp_l2_fast_inspection: pak 673DBD90, input-interface FastEthernet1/1, output-interface FastEthernet1/0 *Apr 4 08:28:23.554: L2FW*:Src 17.3.39.1 dst 17.3.39.3 protocol tcp *Apr 4 08:28:23.554: TBAP: Check AuthProxy is configured on idb=FastEthernet1/1 path=1 linktype=38 *Apr 4 08:28:23.554: L2FW:Input ACL not configured or the ACL is bypassed *Apr 4 08:28:23.554: L2FW:Output ACL is not configured or ACL is bypassed *Apr 4 08:28:23.554: L2FW*:IP inspect firewall is not cfged on input or output interface.PASS *Apr 4 08:28:23.554: L2FW* 2:insp_l2_fast_inspection: pak 673DBD90, input-interface FastEthernet1/1, output-interface FastEthernet1/0 *Apr 4 08:28:23.554: CCE L2 FW *Apr 4 08:28:23.554: L2FW* -3:insp_l2_fast_inspection: pak 673DBD90, input-interface FastEthernet1/1, output-interface FastEthernet1/0
DB-2019
The following is sample output from the debug policy-firewall detailed command:
Router# debug policy-firewall detailed Log Buffer (600000 bytes): Feb 13 08:40:01: FIREWALL: ret_val 0 is not FW_DP_INSP_PASS_PAK <snip> Feb 13 08:41:22: FIREWALL: ret_val 0 is not FW_DP_INSP_PASS_PAK Feb 13 08:41:24: FIREWALL: ret_val 0 is not FW_DP_INSP_PASS_PAK Feb 13 08:41:25: FIREWALL*: Searching for FSO in class 0x50793C20class group 0x10000000, target 0x1, cce class type 0x2B Feb 13 08:41:25: FIREWALL*: not found Feb 13 08:41:25: FIREWALL*: Try to create session in fastpath Feb 13 08:41:25: FIREWALL: Searching for FSO in class 0x50793C20class group 0x10000000, target 0x1, cce class type 0x2B Feb 13 08:41:25: FIREWALL: not found Feb 13 08:41:25: FIREWALL: Create FSO Feb 13 08:41:25: FIREWALL: sis 204925C0 : fw_dp_state_object_link Feb 13 08:41:25: FIREWALL: sis 204925C0 : FO class 0x50793C20 class group 0x10000000, target 0x1, FO 0x20255D80 Feb 13 08:41:25: FIREWALL: sis 204925C0 : alert = 1, audit_trail = 0 Feb 13 08:41:25: FIREWALL: sis 204925C0 : l7 protocol 62, granular = 5 Feb 13 08:41:25: FIREWALL: sis 204925C0 : fw_dp_state_object_attach_forward Feb 13 08:41:25: FIREWALL: sis 204925C0 : fw_dp_state_object_create_and_attach_reverse Feb 13 08:41:25: FIREWALL: sis 204925C0 : FSO bind success for reverse class 0x50793C80class group 0x10000000, target 0x1 Feb 13 08:41:25: FIREWALL: sis 204925C0 :Session Info : Feb 13 08:41:25: session->fwfo 0x507E39C0 Feb 13 08:41:25: class type 0x2B, target 0x1, policy id 0x10000000, class id 0x50793C20 Feb 13 08:41:25: class type 0x2B, reverse target 0x1, reverse policy id 0x10000000, reverse class id 0x50793C80 Feb 13 08:41:25: src addr 192.168.3.3, port 36091, vrf id 0 Feb 13 08:41:25: dst addr 192.168.103.3, port 5190, vrf id 0 Feb 13 08:41:25: L4 Protocol : TCP Feb 13 08:41:25: FIREWALL: sis 204925C0 : L4 inspection returned 3 Feb 13 08:41:25: FIREWALL*: FSO feature object 0x204925C0 found Feb 13 08:41:25: FIREWALL*: sis 204925C0 : L4 inspection returned 3 Feb 13 08:41:25: FIREWALL*: FSO feature object 0x204925C0 found Feb 13 08:41:25: FIREWALL*: sis 204925C0 : max_sessions 2147483647; current sessions 0 Feb 13 08:41:25: FIREWALL*: sis 204925C0 : IM : Token set for L7 named-db Feb 13 08:41:25: FIREWALL*: sis 204925C0 : cce_sb 0x66A5BA00, pak 0x50028974, data_len 0 in_fast_path 1, dir = 1 Feb 13 08:41:25: FIREWALL*: sis 204925C0 : p_app_data = C174268, p_data_len = 6p_offset = 0 Feb 13 08:41:25: FIREWALL*: sis 204925C0 : Found particle offset token, data1 = 0 Feb 13 08:41:25: FIREWALL*: sis 204925C0 : Opening 0 channels for icq Feb 13 08:41:25: FIREWALL*: sis 204925C0 : icq L7 inspect result: PASS packet Feb 13 08:41:25: FIREWALL*: sis 204925C0 : L4 inspection returned 3 Feb 13 08:41:25: FIREWALL*: FSO feature object 0x204925C0 found Feb 13 08:41:25: FIREWALL*: sis 204925C0 : cce_sb 0x66A5BA00, pak 0x5004CAC8, data_len 10 in_fast_path 1, dir = 2 Feb 13 08:41:25: FIREWALL*: sis 204925C0 : p_app_data = C210848, p_data_len = Ap_offset = 0 Feb 13 08:41:25: FIREWALL*: sis 204925C0 : Found particle offset token, data1 = 0 Feb 13 08:41:25: FIREWALL*: sis 204925C0 : Opening 0 channels for icq Feb 13 08:41:25: FIREWALL*: sis 204925C0 : icq L7 inspect result: PASS packet Feb 13 08:41:25: FIREWALL*: sis 204925C0 : L4 inspection returned 3 Feb 13 08:41:25: FIREWALL*: FSO feature object 0x204925C0 found Feb 13 08:41:25: FIREWALL*: sis 204925C0 : cce_sb 0x66A5BA00, pak 0x50028974, data_len 270 in_fast_path 1, dir = 1
DB-2020
December 2010
Syntax Description
Turns on debugging for a firewall MIB event. Turns on debugging for a firewall MIB object creation. Turns on debugging for a firewall MIB object deletion. Turns on debugging for a firewall MIB object retrieval.
Command Default
Command History
Release 15.1(1)T
Usage Guidelines
This command provides debug support for MIBs in zone-based policy firewall similar to the Cisco IOS firewall.
Examples
The following is a sample output from the debug policy-firewall mib object-retrieval command:
Router# debug policy-firewall mib object-retrieval Firewall MIB object retrieval debugging is on
DB-2021
Syntax Description
Turns on debugging for all load-balancing operations. Turns on debugging for only manual load-balancing operations. Turns on debugging for only weighted load-balancing operations.
Command Default
Command Modes
Command History
Release 15.0(1)S
Usage Guidelines
Use this command to help troubleshoot load balancing of service instances over port-channel member links.
Examples
The following example shows how to enable debugging for only weighted load-balancing operations:
Router# debug port-channel load-balance weighted Port-channel Load-Balance Weighted debugging is on
DB-2022
December 2010
debug pots
To display information on the telephone interfaces, use the debug pots command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug pots {driver | csm} [1 | 2] no debug pots {driver | csm} [1 | 2]
Syntax Description
driver csm 1 2
Displays driver debug information. Displays Content Switching Module (CSM) debug information. (Optional) Displays information for telephone port 1 only. (Optional) Displays information for telephone port 2 only.
Command Modes
Privileged EXEC
Usage Guidelines
The debug pots command displays driver and CSM debug information for telephone ports 1 and 2.
Examples
The following is sample output from the debug pots driver 1 command. This sample display indicates that the telephone port driver is not receiving caller ID information from the ISDN line. Therefore, the analog caller ID device attached to the telephone port does not display caller ID information.
Router# debug pots driver 1 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:51:POTS 00:01:53:POTS 00:01:53:POTS 00:01:53:POTS 00:01:53:POTS 00:01:55:POTS 00:02:49:POTS 00:02:49:POTS 00:02:49:POTS 00:02:49:POTS 00:02:49:POTS 00:02:49:POTS 00:02:49:POTS DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 activate ringer: cadence=0 callerId=Unknown state=Idle drv_event=RING_EVENT enter_ringing cmd=19 activate disconnect state=Ringing drv_event=DISCONNECT_EVENT cmd=1A enter_idle ts connect: 0 0 cmd=D report onhook activate tone=SILENCE_TONE state=Idle drv_event=TONE_EVENT activate tone=SILENCE_TONE state=Idle drv_event=TONE_EVENT activate ringer: cadence=0 callerId=Unknown state=Idle drv_event=RING_EVENT enter_ringing cmd=19 cmd=1A state=Ringing drv_event=OFFHOOK_EVENT cmd=1A enter_suspend cmd=A report offhook activate connect: endpt=1 calltype=TWO_PARTY_CALL state=Suspend drv_event=CONNECT_EVENT
DB-2023
00:02:49:POTS 00:02:49:POTS 00:02:49:POTS 00:02:49:POTS 00:02:49:POTS 00:02:49:POTS 00:02:49:POTS 00:02:49:POTS 00:02:55:POTS 00:02:55:POTS 00:02:55:POTS 00:02:55:POTS 00:02:55:POTS 00:02:55:POTS 00:02:55:POTS 00:02:55:POTS 00:02:55:POTS
DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER DRIVER
port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1 port=1
enter_connect: endpt=1 calltype=0 cmd=A ts connect: 1 0 activate connect: endpt=1 calltype=TWO_PARTY_CALL state=Connect drv_event=CONNECT_EVENT enter_connect: endpt=1 calltype=0 cmd=A ts connect: 1 0 state=Connect drv_event=ONHOOK_EVENT enter_idle ts connect: 0 0 cmd=D report onhook activate tone=SILENCE_TONE state=Idle drv_event=TONE_EVENT activate tone=SILENCE_TONE state=Idle drv_event=TONE_EVENT
The following is sample output from the debug pots csm 1 command. This sample display indicates that a dial peer contains an invalid destination pattern (555-1111).
Router# debug pots csm 1 01:57:28:EVENT_FROM_ISDN:dchanidb=0x66CB38, call_id=0x11, ces=0x2 bchan=0x0, event=0x1, cause=0x0 01:57:28:Dial peer not found, route call to port 1 01:57:28:CSM_PROC_IDLE:CSM_EVENT_ISDN_CALL, call_id=0x11, port=1 01:57:28:Calling number 5551111 01:57:40:CSM_PROC_RINGING:CSM_EVENT_VDEV_OFFHOOK, call_id=0x11, port=1 01:57:40:EVENT_FROM_ISDN:dchan_idb=0x66CB38, call_id=0x11, ces=0x2 bchan=0x0, event=0x4, cause=0x0 01:57:40:CSM_PROC_CONNECTING:CSM_EVENT_ISDN_CONNECTED, call_id=0x11, port=1 01:57:47:CSM_PROC_CONNECTING:CSM_EVENT_VDEV_ONHOOK, call_id=0x11, port=1 01:57:201863503872: %ISDN-6-DISCONNECT:Interface BRI0:1 disconnected from unknown, call lasted 5485 seconds 01:57:47: %ISDN-6-DISCONNECT:Interface BRI0:1 disconnected from unknown, call lasted 5485 seconds 01:57:47:EVENT_FROM_ISDN:dchan _idb=0x66CB38, call_id=0x11, ces=0x2 bchan=0xFFFFFFFF, event=0x0, cause=0x1 01:57:47:CSM_PROC_NEAR_END_DISCONNECT:CSM_
DB-2024
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 800 series routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
To see debugging messages, enter the logging console global configuration mode command as follows:
Router(config)# logging console Router(config)# exit
Debugging messages are displayed in one of two formats that are relevant to the POTS dial feature:
hh:mm:ss: CSM_STATE: CSM_EVENT, call id = ??, port = ?
or
hh:mm:ss: EVENT_FROM_ISDN:dchan_idb=0x???????, call_id=0x????, ces=? bchan=0x????????, event=0x?, cause=0x??
Command Elements hh:mm:ss CSM_STATE CSM_EVENT call id port EVENT_FROM_ISDN dchan_idb ces
Description Timestamp (in hours, minutes, and seconds). One of the call CSM states listed in Table 278. One of the CSM events listed in Table 279. Hexadecimal value from 0x00 to 0xFF. Telephone port 1 or 2. A CSM event. Table 279 shows a list of CSM events. Internal data structure address. Connection end point suffix used by ISDN.
DB-2025
Table 277
Description Channel used by the call. A value of 0xFFFFFFFF indicates that a channel is not assigned. A hexadecimal value that is translated into a CSM event. Table 280 shows a list of events and the corresponding CSM events. A hexadecimal value that is given to call-progressing events. Table 281 shows a list of cause values and definitions.
CSM State CSM_IDLE_STATE CSM_RINGING CSM_SETUP CSM_DIALING CSM_IVR_DIALING CSM_CONNECTING CSM_CONNECTED CSM_DISCONNECTING CSM_NEAR_END_DISCONNECTING CSM_HARD_HOLD CSM_CONSULTATION_HOLD CSM_WAIT_FOR_HOLD CSM_WAIT_FOR_CONSULTATION_HOLD CSM_CONFERENCE CSM_TRANSFER CSM_APPLIC_DIALING
Description Telephone on the hook. Telephone ringing. Setup for outgoing call in progress. Dialing number of outgoing call. Interactive voice response (IVR) for Japanese telephone dialing. Waiting for carrier to connect the call. Call connected. Waiting for carrier to disconnect the call. Waiting for carrier to disconnect the call. Call on hard hold. Call on consultation hold. Waiting for carrier to put call on hard hold. Waiting for carrier to put call on consultation hold. Waiting for carrier to complete call conference. Waiting for carrier to transfer call. Call initiated from Cisco IOS command-line interface (CLI).
Description Time waiting for dial digits has expired. Near- or far-end disconnect timeout. Incoming call.
DB-2026
December 2010
Table 279
CSM Events CSM_EVENT_ISDN_CONNECTED CSM_EVENT_ISDN_DISCONNECT CSM_EVENT_ISDN_DISCONNECTED CSM_EVENT_ISDN_SETUP CSM_EVENT_ISDN_SETUP_ACK CSM_EVENT_ISDN_PROC CSM_EVENT_ISDN_CALL_PROGRESSING CSM_EVENT_ISDN_HARD_HOLD CSM_EVENT_ISDN_HARD_HOLD_REJ CSM_EVENT_ISDN_CHOLD CSM_EVENT_ISDN_CHOLD_REJ CSM_EVENT_ISDN_RETRIEVED CSM_EVENT_ISDN_RETRIEVE_REJ CSM_EVENT_ISDN_TRANSFERRED CSM_EVENT_ISDN_TRANSFER_REJ CSM_EVENT_ISDN_CONFERENCE CSM_EVENT_ISDN_CONFERENCE_REJ CSM_EVENT_ISDN_IF_DOWN CSM_EVENT_ISDN_INFORMATION CSM_EVENT_VDEV_OFFHOOK CSM_EVENT_VDEV_ONHOOK CSM_EVENT_VDEV_FLASHHOOK CSM_EVENT_VDEV_DIGIT CSM_EVENT_VDEV_APPLICATION_CALL
Description Call connected. Far end disconnected. Call disconnected. Outgoing call requested. Outgoing call accepted. Call proceeding and dialing completed. Call being received in band tone. Call on hard hold. Hold attempt rejected. Call on consultation hold. Consultation hold attempt rejected. Call retrieved. Call retrieval attempt rejected. Call transferred. Call transfer attempt rejected. Call conference started. Call conference attempt rejected. ISDN interface down. ISDN information element received (used by NTT IVR application). Telephone off the hook. Telephone on the hook. Telephone hook switch has flashed. DTMF digit has been detected. Call initiated from Cisco IOS CLI.
Table 280 shows the values for events that are translated into CSM events.
Table 280 Event Values
Hexadecimal Value Event 0x0 0x1 0x2 0x3 0x4 0x5 DEV_IDLE DEV_INCALL DEV_SETUP_ACK DEV_CALL_PROC DEV_CONNECTED DEV_CALL_PROGRESSING
DB-2027
Table 280
Hexadecimal Value Event 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf DEV_HOLD_ACK DEV_HOLD_REJECT DEV_CHOLD_ACK DEV_CHOLD_REJECT DEV_RETRIEVE_ACK DEV_RETRIEVE_REJECT DEV_CONFR_ACK DEV_CONFR_REJECT DEV_TRANS_ACK DEV_TRANS_REJECT
CSM Event CSM_EVENT_ISDN_HARD_HOLD CSM_EVENT_ISDN_HARD_HOLD_REJ CSM_EVENT_ISDN_CHOLD CSM_EVENT_ISDN_CHOLD_REJ CSM_EVENT_ISDN_RETRIEVED CSM_EVENT_ISDN_RETRIEVE_REJ CSM_EVENT_ISDN_CONFERENCE CSM_EVENT_ISDN_CONFERENCE_REJ CSM_EVENT_ISDN_TRANSFERRED CSM_EVENT_ISDN_TRANSFER_REJ
Table 281 shows cause values that are assigned only to call-progressing events.
Table 281 Cause Values
Hexadecimal Value 0x01 0x02 0x03 0x04 0x06 0x07 0x08 0x09 0x0a 0x0b 0x0d 0x10 0x11 0x12 0x13 0x15 0x16 0x1a 0x1b 0x1c 0x1d
Cause Definitions UNASSIGNED_NUMBER NO_ROUTE NO_ROUTE_DEST NO_PREFIX CHANNEL_UNACCEPTABLE CALL_AWARDED CALL_PROC_OR_ERROR PREFIX_DIALED_ERROR PREFIX_NOT_DIALED EXCESSIVE_DIGITS SERVICE_DENIED NORMAL_CLEARING USER_BUSY NO_USER_RESPONDING NO_USER_ANSWER CALL_REJECTED NUMBER_CHANGED NON_SELECTED_CLEARING DEST_OUT_OF_ORDER INVALID_NUMBER_FORMAT FACILITY_REJECTED
DB-2028
December 2010
Table 281
Hexadecimal Value 0x1e 0x1f 0x22 0x26 0x29 0x2a 0x2b 0x2c 0x2d 0x2f 0x32 0x33 0x34 0x36 0x39 0x3a 0x3b 0x3c 0x3e 0x3f 0x41 0x42 0x45 0x46 0x4f 0x51 0x52 0x53 0x54 0x55 0x56 0x58 0x5a 0x5b 0x5c 0x5f
Cause Definitions RESP_TO_STAT_ENQ UNSPECIFIED_CAUSE NO_CIRCUIT_AVAILABLE NETWORK_OUT_OF_ORDER TEMPORARY_FAILURE NETWORK_CONGESTION ACCESS_INFO_DISCARDED REQ_CHANNEL_NOT_AVAIL PRE_EMPTED RESOURCES_UNAVAILABLE FACILITY_NOT_SUBSCRIBED BEARER_CAP_INCOMPAT OUTGOING_CALL_BARRED INCOMING_CALL_BARRED BEARER_CAP_NOT_AUTH BEAR_CAP_NOT_AVAIL CALL_RESTRICTION REJECTED_TERMINAL SERVICE_NOT_ALLOWED SERVICE_NOT_AVAIL CAP_NOT_IMPLEMENTED CHAN_NOT_IMPLEMENTED FACILITY_NOT_IMPLEMENT BEARER_CAP_RESTRICTED SERV_OPT_NOT_IMPLEMENT INVALID_CALL_REF CHAN_DOES_NOT_EXIST SUSPENDED_CALL_EXISTS NO_CALL_SUSPENDED CALL_ID_IN_USE CALL_ID_CLEARED INCOMPATIBLE_DEST SEGMENTATION_ERROR INVALID_TRANSIT_NETWORK CS_PARAMETER_NOT_VALID INVALID_MSG_UNSPEC
DB-2029
Table 281
Hexadecimal Value 0x60 0x61 0x62 0x63 0x64 0x65 0x66 0x67 0x6f 0x7f
Cause Definitions MANDATORY_IE_MISSING NONEXISTENT_MSG WRONG_MESSAGE BAD_INFO_ELEM INVALID_ELEM_CONTENTS WRONG_MSG_FOR_STATE TIMER_EXPIRY MANDATORY_IE_LEN_ERR PROTOCOL_ERROR INTERWORKING_UNSPEC
Examples
This section provides debug output examples for three call scenarios, displaying the sequence of events that occur during a POTS dial call or POTS disconnect call.
Call Scenario 1
In this example call scenario, port 1 is on the hook, the application dial is set to call 4085552221, and the far-end successfully connects.
Router# debug pots csm Router# test pots 1 dial 4085552221# Router#
The following output shows an event indicating that port 1 is being used by the dial application:
01:58:27: CSM_PROC_IDLE: CSM_EVENT_VDEV_APPLICATION_CALL, call id = 0x0, port = 1
The following output shows events indicating that the CSM is receiving the application digits of the number to dial:
01:58:27: 01:58:27: 01:58:27: 01:58:27: 01:58:27: 01:58:27: 01:58:27: 01:58:27: 01:58:27: 01:58:27: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, call call call call call call call call call call id id id id id id id id id id = = = = = = = = = = 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, port port port port port port port port port port = = = = = = = = = = 1 1 1 1 1 1 1 1 1 1
The following output shows that the telephone connected to port 1 is off the hook:
01:58:39: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_OFFHOOK, call id = 0x0, port = 1
The following output shows a call-proceeding event pair indicating that the router ISDN software has sent the dialed digits to the ISDN switch:
01:58:40: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8004, ces=0x1 bchan=0x0, event=0x3, cause=0x0
DB-2030
December 2010
The following output shows the call-progressing event pair indicating that the telephone at the far end is ringing:
01:58:40: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8004, ces=0x1 bchan=0xFFFFFFFF, event=0x5, cause=0x0 01:58:40: CSM_PROC_ENBLOC_DIALING: CSM_EVENT_ISDN_CALL_PROGRESSING, call id = 0x8004, port = 1
The following output shows a call-connecting event pair indicating that the telephone at the far end has answered:
01:58:48: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8004, ces=0x1 bchan=0xFFFFFFFF, event=0x4, cause=0x0 01:58:48: CSM_PROC_CONNECTING: CSM_EVENT_ISDN_CONNECTED, call id = 0x8004, port = 1
The following output shows a call-progressing event pair indicating that the telephone at the far end has hung up and that the calling telephone is receiving an in-band tone from the ISDN switch:
01:58:55: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8004, ces=0x1 bchan=0xFFFFFFFF, event=0x5, cause=0x10 01:58:55: CSM_PROC_CONNECTED: CSM_EVENT_ISDN_CALL_PROGRESSING, call id = 0x8004, port = 1
The following output shows that the telephone connected to port 1 has hung up:
01:58:57: CSM_PROC_CONNECTED: CSM_EVENT_VDEV_ONHOOK, call id = 0x8004, port = 1
The following output shows an event pair indicating that the call has been terminated:
01:58:57: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8004, ces=0x1 bchan=0xFFFFFFFF, event=0x0, cause=0x0 01:58:57: CSM_PROC_NEAR_END_DISCONNECT: CSM_EVENT_ISDN_DISCONNECTED, call id = 0x8004, port = 1 813_local#
Call Scenario 2
In this example scenario, port 1 is on the hook, the application dial is set to call 4085552221, and the destination number is busy.
Router# debug pots csm Router# test pots 1 dial 4085552221# Router#
The following output shows that port 1 is used by the dial application:
01:59:42: CSM_PROC_IDLE: CSM_EVENT_VDEV_APPLICATION_CALL, call id = 0x0, port = 1
The following output shows the events indicating that the CSM is receiving the application digits of the number to call:
01:59:42: 01:59:42: 01:59:42: 01:59:42: 01:59:42: 01:59:42: 01:59:42: 01:59:42: 01:59:42: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, CSM_EVENT_VDEV_DIGIT, call call call call call call call call call id id id id id id id id id = = = = = = = = = 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, port port port port port port port port port = = = = = = = = = 1 1 1 1 1 1 1 1 1
DB-2031
The following output shows an event indicating that the telephone connected to port 1 is off the hook:
01:59:52: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_OFFHOOK, call id = 0x0, port = 1
The following output shows a call-proceeding event pair indicating that the telephone at the far end is busy:
01:59:52: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8005, ces=0x1 bchan=0x0, event=0x3, cause=0x11 01:59:52: CSM_PROC_ENBLOC_DIALING: CSM_EVENT_ISDN_PROC, call id = 0x8005, port = 1
The following output shows a call-progressing event pair indicating that the calling telephone is receiving an in-band busy tone from the ISDN switch:
01:59:58: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8005, ces=0x1 bchan=0xFFFFFFFF, event=0x5, cause=0x0 01:59:58: CSM_PROC_ENBLOC_DIALING: CSM_EVENT_ISDN_CALL_PROGRESSING, call id = 0x8005, port = 1
The following output shows an event indicating that the calling telephone has hung up:
02:00:05: CSM_PROC_ENBLOC_DIALING: CSM_EVENT_VDEV_ONHOOK, call id = 0x8005, port = 1
The following output shows an event pair indicating that the call has been terminated:
02:00:05: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8005, ces=0x1 bchan=0xFFFFFFFF, event=0x0, cause=0x0 02:00:05: CSM_PROC_NEAR_END_DISCONNECT: CSM_EVENT_ISDN_DISCONNECTED, call id = 0x8005, port = 1
Call Scenario 3
In this example call scenario, port 1 is on the hook, the application dial is set to call 4086661112, the far end successfully connects, and the command test pots disconnect terminates the call:
Router# debug pots csm Router# test pots 1 dial 4086661112 Router#
The following output follows the same sequence of events as shown in Call Scenario 1:
1d03h: 1d03h: 1d03h: 1d03h: 1d03h: 1d03h: 1d03h: 1d03h: 1d03h: 1d03h: 1d03h: CSM_PROC_IDLE: CSM_EVENT_VDEV_APPLICATION_CALL, call id = 0x0, port = 1 CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1 CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1 CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1 CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1 CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1 CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1 CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1 CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1 CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1 CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
1d03h: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_OFFHOOK, call id = 0x0, port = 1 1d03h: EVENT_FROM_ISDN:dchan_idb=0x2821F38, call_id=0x8039, ces=0x1 bchan=0x0, event=0x3, cause=0x0 1d03h: CSM_PROC_ENBLOC_DIALING: CSM_EVENT_ISDN_PROC, call id = 0x8039, port = 1 1d03h: EVENT_FROM_ISDN:dchan_idb=0x2821F38, call_id=0x8039, ces=0x1
DB-2032
December 2010
bchan=0xFFFFFFFF, event=0x5, cause=0x0 1d03h: CSM_PROC_ENBLOC_DIALING: CSM_EVENT_ISDN_CALL_PROGRESSING, call id = 0x8039, port = 1 Router# test pots 1 disconnect
The test pots disconnect command disconnects the call before you physically need to put the telephone back on the hook:
1d03h: CSM_PROC_CONNECTING: CSM_EVENT_VDEV_APPLICATION_HANGUP_CALL, call id = 0x8039, port = 1 1d03h: EVENT_FROM_ISDN:dchan_idb=0x2821F38, call_id=0x8039, ces=0x1 bchan=0xFFFFFFFF, event=0x0, cause=0x0 1d03h: CSM_PROC_DISCONNECTING: CSM_EVENT_ISDN_DISCONNECTED, call id = 0x8039, port = 1 1d03h: CSM_PROC_DISCONNECTING: CSM_EVENT_TIMEOUT, call id = 0x8039, port = 1
DB-2033
debug ppp
To display information on traffic and exchanges in an internetwork implementing the Point-to-Point Protocol (PPP), use the debug ppp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ppp {packet | negotiation | error | authentication | compression | cbcp} no debug ppp {packet | negotiation | error | authentication | compression | cbcp}
Syntax Description
Displays PPP packets being sent and received. (This command displays low-level packet dumps.) Displays PPP packets sent during PPP startup, where PPP options are negotiated. Displays protocol errors and error statistics associated with PPP connection negotiation and operation. Displays authentication protocol messages, including Challenge Authentication Protocol (CHAP) packet exchanges and Password Authentication Protocol (PAP) exchanges. Displays information specific to the exchange of PPP connections using Microsoft Point-to-Point Compression (MPPC). This command is useful for obtaining incorrect packet sequence number information where MPPC compression is enabled. Displays protocol errors and statistics associated with PPP connection negotiations using Microsoft Callback (MSCB).
compression
cbcp
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug ppp command when trying to find the following:
The Network Control Protocols (NCPs) that are supported on either end of a PPP connection Any loops that might exist in a PPP internetwork Nodes that are (or are not) properly negotiating PPP connections Errors that have occurred over the PPP connection Causes for CHAP session failures Causes for PAP session failures Information specific to the exchange of PPP connections using the Callback Control Protocol (CBCP), used by Microsoft clients Incorrect packet sequence number information where MPPC compression is enabled
Refer to Internet RFCs 1331, 1332, and 1333 for details concerning PPP-related nomenclature and protocol information.
Caution
The debug ppp compression command is CPU-intensive and should be used with caution. This command should be disabled immediately after debugging.
DB-2034
December 2010
Examples
The following is sample output from the debug ppp packet command as seen from the Link Quality Monitor (LQM) side of the connection. This example depicts packet exchanges under normal PPP operation.
Router# debug ppp packet PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP PPP Serial4(o): lcp_slqr() state Serial4(i): pkt type 0xC025, Serial4(i): lcp_rlqr() state Serial4(i): pkt type 0xC021, Serial4: I LCP ECHOREQ(9) id Serial4: input(C021) state = Serial4: O LCP ECHOREP(A) id Serial4(o): lcp_slqr() state Serial4(i): pkt type 0xC025, Serial4(i): lcp_rlqr() state Serial4(i): pkt type 0xC021, Serial4: I LCP ECHOREQ(9) id Serial4: input(C021) state = Serial4: O LCP ECHOREP(A) id Serial4(o): lcp_slqr() state Serial4(i): pkt type 0xC025, Serial4(i): lcp_rlqr() state Serial4(i): pkt type 0xC021, Serial4: I LCP ECHOREQ(9) id Serial4: input(C021) state = Serial4: O LCP ECHOREP(A) id Serial4(o): lcp_slqr() state Serial4(i): pkt type 0xC025, Serial4(i): lcp_rlqr() state Serial4(i): pkt type 0xC021, Serial4: I LCP ECHOREQ(9) id Serial4: input(C021) state = Serial4: O LCP ECHOREP(A) id Serial4(o): lcp_slqr() state Serial4(i): pkt type 0xC025, Serial4(i): lcp_rlqr() state Serial4(i): pkt type 0xC021, Serial4: I LCP ECHOREQ(9) id Serial4: input(C021) state = Serial4: O LCP ECHOREP(A) id Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len datagramsize 52 = OPEN magic = D3454, len datagramsize 16 3 (C) magic D3454 OPEN code = ECHOREQ(9) id 3 (C) magic D21B4 = OPEN magic = D21B4, len datagramsize 52 = OPEN magic = D3454, len datagramsize 16 4 (C) magic D3454 OPEN code = ECHOREQ(9) id 4 (C) magic D21B4 = OPEN magic = D21B4, len datagramsize 52 = OPEN magic = D3454, len datagramsize 16 5 (C) magic D3454 OPEN code = ECHOREQ(9) id 5 (C) magic D21B4 = OPEN magic = D21B4, len datagramsize 52 = OPEN magic = D3454, len datagramsize 16 6 (C) magic D3454 OPEN code = ECHOREQ(9) id 6 (C) magic D21B4 = OPEN magic = D21B4, len datagramsize 52 = OPEN magic = D3454, len datagramsize 16 7 (C) magic D3454 OPEN code = ECHOREQ(9) id 7 (C) magic D21B4 = OPEN magic = D21B4, len = 48 = 48
= 3 len = 12 = 48 = 48
= 4 len = 12 = 48 = 48
= 5 len = 12 = 48 = 48
= 6 len = 12 = 48 = 48
= 7 len = 12 = 48
Field PPP Serial4 (o), O (i), I lcp_slqr() lcp_rlqr() input (C021) state = OPEN
Description PPP debugging output. Interface number associated with this debugging information. Packet was detected as an output packet. Packet was detected as an input packet. Procedure name; running LQM, send a Link Quality Report (LQR). Procedure name; running LQM, received an LQR. Router received a packet of the specified packet type (in hexadecimal notation). A value of C025 indicates packet of type LQM. PPP state; normal state is OPEN.
DB-2035
Table 282
Description Magic Number for indicated node; when output is indicated, this is the Magic Number of the node on which debugging is enabled. The actual Magic Number depends on whether the packet detected is indicated as I or O. Packet length including header. Identifies the type of packet received. Both forms of the packet, string and hexadecimal, are presented. Packet length without header. ID number per Link Control Protocol (LCP) packet format. Packet type in hexadecimal notation; typical packet types are C025 for LQM and C021 for LCP. Echo Request; value in parentheses is the hexadecimal representation of the LCP type. Echo Reply; value in parentheses is the hexadecimal representation of the LCP type.
datagramsize 52 code = ECHOREQ(9) len = 48 id = 3 pkt type 0xC025 LCP ECHOREQ(9) LCP ECHOREP(A)
To elaborate on the displayed output, consider the partial exchange. This sequence shows that one side is using ECHO for its keepalives and the other side is using LQRs.
Router# debug ppp packet PPP PPP PPP PPP PPP PPP PPP PPP Serial4(o): lcp_slqr() state Serial4(i): pkt type 0xC025, Serial4(i): lcp_rlqr() state Serial4(i): pkt type 0xC021, Serial4: I LCP ECHOREQ(9) id Serial4: input(C021) state = Serial4: O LCP ECHOREP(A) id Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len datagramsize 52 = OPEN magic = D3454, len datagramsize 16 3 (C) magic D3454 OPEN code = ECHOREQ(9) id 3 (C) magic D21B4 = OPEN magic = D21B4, len = 48 = 48
= 3 len = 12 = 48
The first line states that the router with debugging enabled has sent an LQR to the other side of the PPP connection:
PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48
The next two lines indicate that the router has received a packet of type C025 (LQM) and provides details about the packet:
PPP Serial4(i): pkt type 0xC025, datagramsize 52 PPP Serial4(i): lcp_rlqr() state = OPEN magic = D3454, len = 48
The next two lines indicate that the router received an ECHOREQ of type C021 (LCP). The other side is sending ECHOs. The router on which debugging is configured for LQM but also responds to ECHOs.
PPP Serial4(i): pkt type 0xC021, datagramsize 16 PPP Serial4: I LCP ECHOREQ(9) id 3 (C) magic D3454
Next, the router is detected to have responded to the ECHOREQ with an ECHOREP and is preparing to send out an LQR:
PPP Serial4: O LCP ECHOREP(A) id 3 (C) magic D21B4 PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48
DB-2036
December 2010
The following is sample output from the debug ppp negotiation command. This is a normal negotiation, where both sides agree on Network Control Program (NCP) parameters. In this case, protocol type IP is proposed and acknowledged.
Router# debug ppp negotiation ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 3D56CAC ppp: received config for type = 4 (QUALITYTYPE) acked ppp: received config for type = 5 (MAGICNUMBER) value = 3D567F8 acked (ok) PPP Serial4: state = ACKSENT fsm_rconfack(C021): rcvd id 5 ppp: config ACK received, type = 4 (CI_QUALITYTYPE), value = C025 ppp: config ACK received, type = 5 (CI_MAGICNUMBER), value = 3D56CAC ppp: ipcp_reqci: returning CONFACK. (ok) PPP Serial4: state = ACKSENT fsm_rconfack(8021): rcvd id 4
Description PPP debugging output. Router sent a configuration request. Type of LCP configuration option that is being negotiated and a descriptor. A type value of 4 indicates Quality Protocol negotiation; a type value of 5 indicates Magic Number negotiation. For Quality Protocol negotiation, indicates NCP type and reporting period. In the example, C025 indicates LQM; 3E8 is a hexadecimal value translating to about 10 seconds (in hundredths of a second). For Magic Number negotiation, indicates the Magic Number being negotiated. Receiving node has received the proposed option negotiation for the indicated option type. Acknowledgment and acceptance of options. Specific PPP state in the negotiation process. IPCP notification message; sending CONFACK. Procedure fsm_rconfack processes received CONFACKs, and the protocol (8021) is IP.
value = 3D56CAC received config acked state = ACKSENT ipcp_reqci fsm_rconfack (8021)
The first two lines indicate that the router is trying to bring up LCP and will use the indicated negotiation options (Quality Protocol and Magic Number). The value fields are the values of the options themselves. C025/3E8 translates to Quality Protocol LQM. 3E8 is the reporting period (in hundredths of a second). 3D56CAC is the value of the Magic Number for the router.
ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 3D56CAC
DB-2037
The next two lines indicate that the other side negotiated for options 4 and 5 as requested and acknowledged both. If the responding end does not support the options, a CONFREJ is sent by the responding node. If the responding end does not accept the value of the option, a Configure-Negative-Acknowledge (CONFNAK) is sent with the value field modified.
ppp: received config for type = 4 (QUALITYTYPE) acked ppp: received config for type = 5 (MAGICNUMBER) value = 3D567F8 acked (ok)
The next three lines indicate that the router received a CONFAK from the responding side and displays accepted option values. Use the rcvd id field to verify that the CONFREQ and CONFACK have the same ID field.
PPP Serial4: state = ACKSENT fsm_rconfack(C021): rcvd id 5 ppp: config ACK received, type = 4 (CI_QUALITYTYPE), value = C025 ppp: config ACK received, type = 5 (CI_MAGICNUMBER), value = 3D56CAC
The next line indicates that the router has IP routing enabled on this interface and that the IPCP NCP negotiated successfully:
ppp: ipcp_reqci: returning CONFACK.
DB-2038
December 2010
The following is sample output from when the debug ppp packet and debug ppp negotiation commands are enabled at the same time.
router# debug ppp negotiation router# debug ppp packet ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = D4C64 PPP Serial4: O LCP CONFREQ(1) id 4 (12) QUALITYTYPE (8) 192 37 0 0 3 232 MAGICNUMBER (6) 0 13 76 100 PPP Serial4(i): pkt type 0xC021, datagramsize 22 PPP Serial4: I LCP CONFREQ(1) id 4 (12) QUALITYTYPE (8) 192 37 0 0 3 232 MAGICNUMBER (6) 0 13 84 240 PPP Serial4: input(C021) state = REQSENT code = CONFREQ(1) id = 4 len = 18 ppp: received config for type = 4 (QUALITYTYPE) acked ppp: received config for type = 5 (MAGICNUMBER) value = D54F0 acked PPP Serial4: O LCP CONFACK(2) id 4 (12) QUALITYTYPE (8) 192 37 0 0 3 232 MAGICNUMBER (6) 0 13 84 240 (ok) PPP Serial4(i): pkt type 0xC021, datagramsize 22 PPP Serial4: I LCP CONFACK(2) id 4 (12) QUALITYTYPE (8) 192 37 0 0 3 232 MAGICNUMBER (6) 0 13 76 100 PPP Serial4: input(C021) state = ACKSENT code = CONFACK(2) id = 4 len = 18 PPP Serial4: state = ACKSENT fsm_rconfack(C021): rcvd id 4 ppp: config ACK received, type = 4 (CI_QUALITYTYPE), value = C025 ppp: config ACK received, type = 5 (CI_MAGICNUMBER), value = D4C64 ipcp: sending CONFREQ, type = 3 (CI_ADDRESS), Address = 2.1.1.2 PPP Serial4: O IPCP CONFREQ(1) id 3 (10) Type3 (6) 2 1 1 2 PPP Serial4: I IPCP CONFREQ(1) id 3 (10) Type3 (6) 2 1 1 1 PPP Serial4(i): pkt type 0x8021, datagramsize 14 PPP Serial4: input(8021) state = REQSENT code = CONFREQ(1) id = 3 len = 10 ppp Serial4: Negotiate IP address: her address 2.1.1.1 (ACK) ppp: ipcp_reqci: returning CONFACK. PPP Serial4: O IPCP CONFACK(2) id 3 (10) Type3 (6) 2 1 1 1 (ok) PPP Serial4: I IPCP CONFACK(2) id 3 (10) Type3 (6) 2 1 1 2 PPP Serial4: input(8021) state = ACKSENT code = CONFACK(2) id = 3 len = 10 PPP Serial4: state = ACKSENT fsm_rconfack(8021): rcvd id 3 ipcp: config ACK received, type = 3 (CI_ADDRESS), Address = 2.1.1.2 PPP Serial4(o): lcp_slqr() state = OPEN magic = D4C64, len = 48 PPP Serial4(i): pkt type 0xC025, datagramsize 52 PPP Serial4(i): lcp_rlqr() state = OPEN magic = D54F0, len = 48 PPP Serial4(i): pkt type 0xC025, datagramsize 52 PPP Serial4(i): lcp_rlqr() state = OPEN magic = D54F0, len = 48 PPP Serial4(o): lcp_slqr() state = OPEN magic = D4C64, len = 48
S2877
This field shows a decimal representation of the NCP value. This field shows a decimal representation of the reporting period.
This exchange represents a successful PPP negotiation for support of NCP type IPCP.
The following is sample output from the debug ppp negotiation command when the remote side of the connection is unable to respond to LQM requests:
Router# debug ppp negotiation ppp: ppp: ppp: ppp: ppp: ppp: ppp: ppp: ppp: ppp: ppp: ppp: sending sending sending sending sending sending sending sending sending sending sending sending CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, type type type type type type type type type type type type = = = = = = = = = = = = 4 5 4 5 4 5 4 5 4 5 4 5 (CI_QUALITYTYPE), (CI_MAGICNUMBER), (CI_QUALITYTYPE), (CI_MAGICNUMBER), (CI_QUALITYTYPE), (CI_MAGICNUMBER), (CI_QUALITYTYPE), (CI_MAGICNUMBER), (CI_QUALITYTYPE), (CI_MAGICNUMBER), (CI_QUALITYTYPE), (CI_MAGICNUMBER), value value value value value value value value value value value value = = = = = = = = = = = = C025/3E8 44B7010 C025/3E8 44B7010 C025/3E8 44B7010 C025/3E8 44B7010 C025/3E8 44B7010 C025/3E8 44B7010
DB-2039
ppp: ppp: ppp: ppp: ppp: ppp: ppp: ppp: ppp: ppp: ppp: ppp:
sending sending sending sending sending sending sending sending sending sending sending sending
CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ, CONFREQ,
type type type type type type type type type type type type
= = = = = = = = = = = =
4 5 4 5 4 5 4 5 4 5 4 5
(CI_QUALITYTYPE), (CI_MAGICNUMBER), (CI_QUALITYTYPE), (CI_MAGICNUMBER), (CI_QUALITYTYPE), (CI_MAGICNUMBER), (CI_QUALITYTYPE), (CI_MAGICNUMBER), (CI_QUALITYTYPE), (CI_MAGICNUMBER), (CI_QUALITYTYPE), (CI_MAGICNUMBER),
value value value value value value value value value value value value
= = = = = = = = = = = =
C025/3E8 44B7010 C025/3E8 44B7010 C025/3E8 44B7010 C025/3E8 44B7010 C025/3E8 44B7010 C025/3E8 44C1488
The following is sample output when no response is detected for configuration requests (with both the debug ppp negotiation and debug ppp packet commands enabled):
Router# debug ppp negotiation Router# debug ppp packet ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = PPP Serial4: O LCP CONFREQ(1) id 14 (12) QUALITYTYPE (8) MAGICNUMBER (6) 4 77 253 200 ppp: TIMEout: Time= 44E0980 State= 3 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = PPP Serial4: O LCP CONFREQ(1) id 15 (12) QUALITYTYPE (8) MAGICNUMBER (6) 4 77 253 200 ppp: TIMEout: Time= 44E1828 State= 3 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = PPP Serial4: O LCP CONFREQ(1) id 16 (12) QUALITYTYPE (8) MAGICNUMBER (6) 4 77 253 200 ppp: TIMEout: Time= 44E27C8 State= 3 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = PPP Serial4: O LCP CONFREQ(1) id 17 (12) QUALITYTYPE (8) MAGICNUMBER (6) 4 77 253 200 ppp: TIMEout: Time= 44E3768 State= 3 C025/3E8 44DFDC8 192 37 0 0 3 232
The following is sample output from the debug ppp error command. These messages might appear when the Quality Protocol option is enabled on an interface that is already running PPP.
Router# debug ppp error PPP Serial3(i): rlqr receive failure. successes = 15 PPP: myrcvdiffp = 159 peerxmitdiffp = 41091 PPP: myrcvdiffo = 2183 peerxmitdiffo = 1714439 PPP: threshold = 25 PPP Serial4(i): rlqr transmit failure. successes = 15 PPP: myxmitdiffp = 41091 peerrcvdiffp = 159 PPP: myxmitdiffo = 1714439 peerrcvdiffo = 2183 PPP: l->OutLQRs = 1 LastOutLQRs = 1 PPP: threshold = 25 PPP Serial3(i): lqr_protrej() Stop sending LQRs. PPP Serial3(i): The link appears to be looped back.
DB-2040
December 2010
Field PPP Serial3(i) rlqr receive failure myrcvdiffp = 159 peerxmitdiffp = 41091 myrcvdiffo = 2183 peerxmitdiffo = 1714439 threshold = 25
Description PPP debugging output. Interface number associated with this debugging information; indicates that this is an input packet. Request to negotiate the Quality Protocol option is not accepted. Number of packets received over the time period. Number of packets sent by the remote node over this period. Number of octets received over this period. Number of octets sent by the remote node over this period. Maximum error percentage acceptable on this interface. This percentage is calculated by the threshold value entered in the ppp quality number interface configuration command. A value of 100 number (100 minus number) is the maximum error percentage. In this case, a number of 75 was entered. This means that the local router must maintain a minimum 75 percent non-error percentage, or the PPP link will be considered down. Local routers current send LQR sequence number. The last sequence number that the remote node side has seen from the local node.
OutLQRs = 1 LastOutLQRs = 1
The following is sample output from the debug ppp authentication command. Use this command to determine why an authentication fails.
Router# debug ppp authentication Serial0: Unable to authenticate. No name received from peer Serial0: Unable to validate CHAP response. USERNAME pioneer not found. Serial0: Unable to validate CHAP response. No password defined for USERNAME pioneer Serial0: Failed CHAP authentication with remote. Remote message is Unknown name Serial0: remote passed CHAP authentication. Serial0: Passed CHAP authentication with remote. Serial0: CHAP input code = 4 id = 3 len = 48
DB-2041
In general, these messages are self-explanatory. Fields that can show optional output are outlined in Table 285.
Table 285 debug ppp authentication Field Descriptions
Field Serial0 USERNAME pioneer not found. Remote message is Unknown name
Description Interface number associated with this debugging information and CHAP access session in question. The name pioneer in this example is the name received in the CHAP response. The router looks up this name in the list of usernames that are configured for the router. The following messages can appear:
No name received to authenticate Unknown name No secret for given name Short MD5 response received MD compare failed 1Challenge 2Response 3Success 4Failure
code = 4
id = 3 len = 48
The following shows sample output from the debug ppp command using the cbcp keyword. This output depicts packet exchanges under normal PPP operation where the Cisco access server is waiting for the remote PC to respond to the MSCB request. The router also has debug ppp negotiation and service timestamps msec commands enabled.
Router# debug ppp cbcp Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 00:48:11.302: 00:48:11.306: 00:48:11.310: 00:48:11.314: 00:48:13.342: 00:48:13.346: 00:48:13.346: 00:48:13.350: 00:48:15.370: 00:48:15.374: 00:48:15.374: 00:48:15.378: 00:48:17.398: 00:48:17.402: 00:48:17.406: 00:48:17.406: 00:48:19.426: 00:48:19.430: 00:48:19.430: As8 MCB: User mscb Callback Number - Client ANY Async8 PPP: O MCB Request(1) id 1 len 9 Async8 MCB: O 1 1 0 9 2 5 0 1 0 As8 MCB: O Request Id 1 Callback Type Client-Num As8 MCB: Timeout in state WAIT_RESPONSE Async8 PPP: O MCB Request(1) id 2 len 9 Async8 MCB: O 1 2 0 9 2 5 0 1 0 As8 MCB: O Request Id 2 Callback Type Client-Num As8 MCB: Timeout in state WAIT_RESPONSE Async8 PPP: O MCB Request(1) id 3 len 9 Async8 MCB: O 1 3 0 9 2 5 0 1 0 As8 MCB: O Request Id 3 Callback Type Client-Num As8 MCB: Timeout in state WAIT_RESPONSE Async8 PPP: O MCB Request(1) id 4 len 9 Async8 MCB: O 1 4 0 9 2 5 0 1 0 As8 MCB: O Request Id 4 Callback Type Client-Num As8 MCB: Timeout in state WAIT_RESPONSE Async8 PPP: O MCB Request(1) id 5 len 9 Async8 MCB: O 1 5 0 9 2 5 0 1 0
delay 0
delay 0
delay 0
delay 0
DB-2042
December 2010
Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec
17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17
00:48:19.434: 00:48:21.454: 00:48:21.458: 00:48:21.462: 00:48:21.462: 00:48:23.482: 00:48:23.486: 00:48:23.490: 00:48:23.490: 00:48:25.510: 00:48:25.514: 00:48:25.514: 00:48:25.518: 00:48:26.242: 00:48:26.246: 00:48:26.250: 00:48:26.254: 00:48:26.258: 00:48:26.262: 00:48:26.266: 00:48:26.270: 00:48:26.270: 00:48:26.390: 00:48:26.390: 00:48:26.394: 00:48:26.402:
As8 MCB: O Request Id 5 Callback Type Client-Num delay 0 As8 MCB: Timeout in state WAIT_RESPONSE Async8 PPP: O MCB Request(1) id 6 len 9 Async8 MCB: O 1 6 0 9 2 5 0 1 0 As8 MCB: O Request Id 6 Callback Type Client-Num delay 0 As8 MCB: Timeout in state WAIT_RESPONSE Async8 PPP: O MCB Request(1) id 7 len 9 Async8 MCB: O 1 7 0 9 2 5 0 1 0 As8 MCB: O Request Id 7 Callback Type Client-Num delay 0 As8 MCB: Timeout in state WAIT_RESPONSE Async8 PPP: O MCB Request(1) id 8 len 9 Async8 MCB: O 1 8 0 9 2 5 0 1 0 As8 MCB: O Request Id 8 Callback Type Client-Num delay 0 As8 PPP: I pkt type 0xC029, datagramsize 18 Async8 PPP: I MCB Response(2) id 8 len 16 Async8 MCB: I 2 8 0 10 2 C C 1 32 34 39 32 36 31 As8 MCB: Received response As8 MCB: Response CBK-Client-Num 2 12 12, addr 1-2492613 Async8 PPP: O MCB Ack(3) id 9 len 16 Async8 MCB: O 3 9 0 10 2 C C 1 32 34 39 32 36 31 As8 MCB: O Ack Id 9 Callback Type Client-Num delay 12 As8 MCB: Negotiated MCB with peer As8 LCP: I TERMREQ [Open] id 4 len 8 (0x00000000) As8 LCP: O TERMACK [Open] id 4 len 4 As8 MCB: Peer terminating the link As8 MCB: Initiate Callback for mscb at 2492613 using Async
33
33
The following is sample output from the debug ppp compression command with service timestamps enabled and shows a typical PPP packet exchange between the router and Microsoft client where the MPPC header sequence numbers increment correctly:
Router# debug ppp compression 00:04:14: 00:04:14: 00:04:14: 00:04:14: 00:04:14: BR0:1 BR0:1 BR0:1 BR0:1 BR0:1 MPPC: MPPC: MPPC: MPPC: MPPC: Decomp Decomp Decomp Decomp Decomp hdr/exp_cc# hdr/exp_cc# hdr/exp_cc# hdr/exp_cc# hdr/exp_cc# 0x2003/0x0003 0x2004/0x0004 0x2005/0x0005 0x2006/0x0006 0x2007/0x0007
Description Interface enabled with MPPC. Decompression header and bit settings. Expected coherency count. Received sequence number. Expected sequence number.
DB-2043
The following shows sample output from debug ppp negotiation and debug ppp error commands, which can be used to troubleshoot initial PPP negotiation and setup errors. This example shows a virtual interface (virtual interface 1) during normal PPP operation and CCP negotiation.
Router# debug ppp negotiation error Vt1 PPP: Unsupported or un-negotiated protocol. Link arp VPDN: Chap authentication succeeded for p5200 Vi1 PPP: Phase is DOWN, Setup Vi1 VPDN: Virtual interface created for [email protected] Vi1 VPDN: Set to Async interface Vi1 PPP: Phase is DOWN, Setup Vi1 VPDN: Clone from Vtemplate 1 filterPPP=0 blocking Vi1 CCP: Re-Syncing history using legacy method %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up Vi1 PPP: Treating connection as a dedicated line Vi1 PPP: Phase is ESTABLISHING, Active Open Vi1 LCP: O CONFREQ [Closed] id 1 len 25 Vi1 LCP: ACCM 0x000A0000 (0x0206000A0000) Vi1 LCP: AuthProto CHAP (0x0305C22305) Vi1 LCP: MagicNumber 0x000FB69F (0x0506000FB69F) Vi1 LCP: PFC (0x0702) Vi1 LCP: ACFC (0x0802) Vi1 VPDN: Bind interface direction=2 Vi1 PPP: Treating connection as a dedicated line Vi1 LCP: I FORCED CONFREQ len 21 Vi1 LCP: ACCM 0x000A0000 (0x0206000A0000) Vi1 LCP: AuthProto CHAP (0x0305C22305) Vi1 LCP: MagicNumber 0x12A5E4B5 (0x050612A5E4B5) Vi1 LCP: PFC (0x0702) Vi1 LCP: ACFC (0x0802) Vi1 VPDN: PPP LCP accepted sent & rcv CONFACK Vi1 PPP: Phase is AUTHENTICATING, by this end Vi1 CHAP: O CHALLENGE id 1 len 27 from "l_4000" Vi1 CHAP: I RESPONSE id 20 len 37 from "[email protected]" Vi1 CHAP: O SUCCESS id 20 len 4 Vi1 PPP: Phase is UP Vi1 IPCP: O CONFREQ [Closed] id 1 len 10 Vi1 IPCP: Address 15.2.2.3 (0x03060F020203) Vi1 CCP: O CONFREQ [Not negotiated] id 1 len 10 Vi1 CCP: MS-PPC supported bits 0x00000001 (0x120600000001) Vi1 IPCP: I CONFREQ [REQsent] id 1 len 34 Vi1 IPCP: Address 0.0.0.0 (0x030600000000) Vi1 IPCP: PrimaryDNS 0.0.0.0 (0x810600000000) Vi1 IPCP: PrimaryWINS 0.0.0.0 (0x820600000000) Vi1 IPCP: SecondaryDNS 0.0.0.0 (0x830600000000) Vi1 IPCP: SecondaryWINS 0.0.0.0 (0x840600000000) Vi1 IPCP: Using the default pool Vi1 IPCP: Pool returned 11.2.2.5 Vi1 IPCP: O CONFREJ [REQsent] id 1 len 16 Vi1 IPCP: PrimaryWINS 0.0.0.0 (0x820600000000) Vi1 IPCP: SecondaryWINS 0.0.0.0 (0x840600000000) Vi1 CCP: I CONFREQ [REQsent] id 1 len 15 Vi1 CCP: MS-PPC supported bits 0x00000001 (0x120600000001) Vi1 CCP: Stacker history 1 check mode EXTENDED (0x1105000104) Vi1 CCP: Already accepted another CCP option, rejecting this STACKER Vi1 CCP: O CONFREJ [REQsent] id 1 len 9 Vi1 CCP: Stacker history 1 check mode EXTENDED (0x1105000104) Vi1 IPCP: I CONFACK [REQsent] id 1 len 10 Vi1 IPCP: Address 15.2.2.3 (0x03060F020203) Vi1 CCP: I CONFACK [REQsent] id 1 len 10 Vi1 CCP: MS-PPC supported bits 0x00000001 (0x120600000001) Vi1 CCP: I CONFREQ [ACKrcvd] id 2 len 10 Vi1 CCP: MS-PPC supported bits 0x00000001 (0x120600000001)
DB-2044
December 2010
Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1 Vi1
CCP: O CONFACK [ACKrcvd] id 2 len 10 CCP: MS-PPC supported bits 0x00000001 (0x120600000001) CCP: State is Open IPCP: I CONFREQ [ACKrcvd] id 2 len 22 IPCP: Address 0.0.0.0 (0x030600000000) IPCP: PrimaryDNS 0.0.0.0 (0x810600000000) IPCP: SecondaryDNS 0.0.0.0 (0x830600000000) IPCP: O CONFNAK [ACKrcvd] id 2 len 22 IPCP: Address 11.2.2.5 (0x03060B020205) IPCP: PrimaryDNS 171.69.1.148 (0x8106AB450194) IPCP: SecondaryDNS 171.69.2.132 (0x8306AB450284) IPCP: I CONFREQ [ACKrcvd] id 3 len 22 IPCP: Address 11.2.2.5 (0x03060B020205) IPCP: PrimaryDNS 171.69.1.148 (0x8106AB450194) IPCP: SecondaryDNS 171.69.2.132 (0x8306AB450284) IPCP: O CONFACK [ACKrcvd] id 3 len 22 IPCP: Address 11.2.2.5 (0x03060B020205) IPCP: PrimaryDNS 171.69.1.148 (0x8106AB450194) IPCP: SecondaryDNS 171.69.2.132 (0x8306AB450284) IPCP: State is Open IPCP: Install route to 11.2.2.5
DB-2045
Syntax Description
(Optional) Displays local errors. (Optional) Displays information about protocol actions and transitions between action states (pending, waiting, idle) on the link. (Optional) Displays successive steps in negotiations between peers.
Command Modes
Privileged EXEC
Usage Guidelines
Do not use this command when memory is scarce or in very high traffic situations.
Examples
The following types of events generate the debugging messages displayed in the figures in this section:
A dial attempt failed. A BACP group was created. A BACP group was removed. The precedence of the group changed. Attempting to dial a number. Received a BACP message. Discarding a BACP message. Received an unknown code. Cannot find the appropriate BACP group on input. Displaying the response type. Incomplete mandatory options notification. Invalid outgoing message type. Unable to build an output message. Sending a BACP message. Details about the sent message (type of message, its identifier, the virtual access interface that sent it).
DB-2046
December 2010
The following is sample output from the debug ppp bap command:
Router# debug ppp bap BAP Virtual-Access1: group "laudrup" (2) (multilink) without precedence created BAP laudrup: sending CallReq, id 2, len 38 on BRI3:1 to remote BAP Virtual-Access1: received CallRsp, id 2, len 13 BAP laudrup: CallRsp, id 2, ACK BAP laudrup: attempt1 to dial 19995776677 on BRI3 ---> reason BAP - Multilink bundle overloaded BAP laudrup: sending StatusInd, id 2, len 44 on Virtual-Access1 to remote BAP Virtual-Access1: received StatusRsp, id 2, len 1 BAP laudrup: StatusRsp, id 2, ACK
Description Identifier of the virtual access interface in use. Name of the BACP group. Action initiated; in this case, sending a call request. Physical interface being used.
BAP laudrup: attempt1 to dial 19995776677 Call initiated, number being dialed, and physical interface being used. on BRI3 ---> reason BAP - Multilink bundle overloaded Reason for initiating the BACP call.
BAP laudrup: sending StatusInd, id 2, len 44 Details about the sent message: It was a status on Virtual-Access1 to remote indication message, had identifier 2, had a BACP datagram length 44, and was sent on virtual access interface 1. You can display information about the virtual access interface by using the show interfaces virtual-access EXEC command. (The length shown at the end of each negotiated option includes the 2-byte type and length header.) The debug ppp bap event command might show state transitions and protocol actions, in addition to the basic debug ppp bap command. The following is sample output from the debug ppp bap event command:
Router# debug ppp bap event BAP laudrup: Idle --> AddWait BAP laudrup: AddWait --> AddPending BAP laudrup: AddPending --> Idle
DB-2047
The following is sample output from the debug ppp bap event command:
Router# debug ppp bap event Peer does not support a message type No response to a particular request No response to all request retransmissions Not configured to initiate link addition Expected action by peer has not occurred Exceeded number of retries No links available to call out Unable to provide phone numbers for callback Maximum number of links in the group Minimum number of links in the group Unable to process link addition at present Unable to process link removal at present Not configured/unable to initiate link removal Link addition completed notification Link addition failed notification Determination of location of the group config Link with specified discriminator not in group Link removal failed Call failure with status Failed to dial specified number Discarding retransmission Unable to find received identifier Received StatusInd when no call pending Discarding message with no phone delta Unable to send message in particular state Received a zero identifier Request has precedence
The error messages displayed might be added to the basic output when the debug ppp bap error command is used. Because the errors are very rare, you might never see these messages.
Router# debug ppp bap error Unable to find appropriate request for received response Invalid message type of queue Received request is not part of the group Add link attempt failed to locate group Remove link attempt failed to locate group Unable to inform peer of link addition Changing of precedence cannot locate group Received short header/illegal length/short packet Invalid configuration information length Unable to NAK incomplete options Unable to determine current number of links No interface list to dial on Attempt to send invalid data Local link discriminator is not in group Received response type is incorrect for identifier
DB-2048
December 2010
The messages displayed might be added to the basic output when the debug ppp bap negotiation command is used:
Router# debug ppp bap negotiation BAP BAP BAP BAP BAP BAP BAP BAP BAP laudrup: laudrup: laudrup: laudrup: laudrup: laudrup: laudrup: laudrup: laudrup: adding link speed 64 kbps for type 0x1 len 5 adding reason "User initiated addition", len 25 CallRsp, id 4, ACK link speed 64 kbps for types 0x1, len 5 (ACK) phone number "1: 0 2: ", len 7 (ACK) adding call status 0, action 0 len 4 adding 1 phone numbers "1: 0 2: " len 7 adding reason "Successfully added link", len 25 StatusRsp, id 4, ACK
The following shows additional reasons for a particular BAP action that might be displayed in an adding reason line of the debug ppp bap negotiation command output:
"Outgoing add request has precedence" "Outgoing remove request has precedence" "Unable to change request precedence" "Unable to determine valid phone delta" "Attempting to add link" "Link addition is pending" "Attempting to remove link" "Link removal is pending" "Precedence of peer marked CallReq for no action" "Callback request rejected due to configuration" "Call request rejected due to configuration" "No links of specified type(s) available" "Drop request disallowed due to configuration" "Discriminator is invalid" "No response to call requests" "Successfully added link" "Attempt to dial destination failed" "No interfaces present to dial out" "No dial string present to dial out" "Mandatory options incomplete" "Load has not exceeded threshold" "Load is above threshold" "Currently attempting to dial destination" "No response to CallReq from race condition"
DB-2049
Explanation Received a CallRequest or CallbackRequest while we were waiting on a CallResponse or CallbackResponse to a sent request. We are the favored peer from the initial BACP negotiation, so we are issuing a NAK to our peer request. Received a LinkDropQueryRequest while waiting on a LinkDropQueryResponse to a sent request. We are the favored peer from the initial BACP negotiation, therefore we are issuing a NAK to our peer request. Received a CallRequest, CallbackRequest, or LinkDropQueryRequest while waiting on a LinkDropQueryResponse to a sent request. Our peer is deemed to be the favored peer from the initial BACP negotiation and we were unable to change the status of our outgoing request in response to the favored request, so we are issuing a NAK. (This is an internal error and should never be seen.) Received a CallRequest from our peer but are unable to provide the required phone delta for the response, so we are issuing a NAK. (This is an internal error and should never be seen.) Received a LinkDropQueryRequest while attempting to add a link; a NAK is issued. Received a LinkDropQueryRequest, CallRequest, or CallbackRequest while attempting to add a link as the result of a previous operation; a NAK is issued in the response. Received a CallRequest or CallbackRequest while attempting to remove a link; a NAK is issued. Received a CallRequest, CallbackRequest, or LinkDropQueryRequest while attempting to remove a link as the result of a previous operation; a NAK is issued in the response.
Precedence of peer marked CallReq Received an ACK to a previously unfavored CallRequest; we for no action are issuing a CallStatusIndication to inform our peer that there will be no further action on our part as per this response. Callback request rejected due to configuration Call request rejected due to configuration No links of specified type(s) available Drop request disallowed due to configuration Received a CallbackRequest but we are configured not to accept them; a REJect is issued to our peer. Received a CallRequest but we are configured not to accept them; a REJect is issued to our peer. We received a CallRequest but no links of the specified type and speed are available; a NAK is issued. Received a LinkDropQueryRequest but we are configured not to accept them; a NAK is issued to our peer.
DB-2050
December 2010
Table 288
Explanation Received a LinkDropQueryRequest but the local link discriminator is not contained within the bundle; a NAK is issued. After no response to our CallRequest message, a CallStatusIndication is sent to the peer informing that no more action will be taken on behalf of this operation. Sent as part of the CallStatusIndication informing our peer that we successfully completed the addition of a link to the bundle as the result of the transmission of a CallRequest or the reception of a CallbackRequest. Sent as part of the CallStatusIndication informing our peer that we failed in an attempt to add a link to the bundle as the result of the transmission of a CallRequest or the reception of a CallbackRequest. The retry field with the CallStatusIndication informs the peer of our intentions. There are no available interfaces to dial out on to attempt to add a link to the bundle, and we will not retry the dial attempt. We do not have a dial string to dial out with to attempt to add a link to the bundle, and we are not going to retry the dial attempt. (This is an internal error and should never be seen.) Received a CallRequest, CallbackRequest, LinkDropQueryRequest, or CallStatusIndication and the mandatory options are not present, so a NAK is issued in the response. (A CallStatusResponse is an ACK, however). Received a CallRequest or CallbackRequest but we are issuing a NAK in the response. We are monitoring the load of the bundle, and so we determine when links should be added to the bundle. Received a LinkDropQueryRequest but we are issuing a NAK in the response. We are monitoring the load of the bundle, and so we determine when links should be removed from the bundle. Received a CallbackRequest which is a retransmission of one that we previously ACKd and are dialing the number suggested in the request. We are issuing an ACK because we did so previously, even though our peer never saw the previous response. We issued a CallRequest but failed to receive a response, and we are issuing a CallStatusIndication to inform our peer of our intention not to proceed with the operation.
DB-2051
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Caution
Do not use this command when memory is scarce or in very high traffic situations.
Examples
The following is sample output from the debug ppp multilink events command:
Router# debug ppp multilink events MLP laudrup: established BAP group 4 on Virtual-Access1, physical BRI3:1 MLP laudrup: removed BAP group 4
Field MLP laudrup established BAP group 4 Virtual-Access1 physical BRI3:1 removed BAP group 4
Description Name of the multilink group. Internal identifier. The same identifiers are used in the show ppp bap group command output. Dynamic access interface number. Bundle was established from a call on this interface. When the bundle is removed, the associated BACP group (with its ID) is also removed.
DB-2052
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Caution
The debug ppp multilink fragments command has some memory overhead and should not be used when memory is scarce or in very high traffic situations.
Examples
The following is sample output from the debug ppp multilink fragments command when used with the ping EXEC command. The debug output indicates that a multilink PPP packet on interface BRI 0 (on the B channel) is an input (I) or output (O) packet. The output also identifies the sequence number of the packet and the size of the fragment.
Router# debug ppp multilink fragments Router# ping 7.1.1.7 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 7.1.1.7, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 32/34/36 ms Router# 2:00:28: MLP BRI0: B-Channel 1: O seq 80000000: size 58 2:00:28: MLP BRI0: B-Channel 2: O seq 40000001: size 59 2:00:28: MLP BRI0: B-Channel 2: I seq 40000001: size 59 2:00:28: MLP BRI0: B-Channel 1: I seq 80000000: size 58 2:00:28: MLP BRI0: B-Channel 1: O seq 80000002: size 58 2:00:28: MLP BRI0: B-Channel 2: O seq 40000003: size 59 2:00:28: MLP BRI0: B-Channel 2: I seq 40000003: size 59 2:00:28: MLP BRI0: B-Channel 1: I seq 80000002: size 58 2:00:28: MLP BRI0: B-Channel 1: O seq 80000004: size 58 2:00:28: MLP BRI0: B-Channel 2: O seq 40000005: size 59 2:00:28: MLP BRI0: B-Channel 2: I seq 40000005: size 59 2:00:28: MLP BRI0: B-Channel 1: I seq 80000004: size 58 2:00:28: MLP BRI0: B-Channel 1: O seq 80000006: size 58 2:00:28: MLP BRI0: B-Channel 2: O seq 40000007: size 59 2:00:28: MLP BRI0: B-Channel 2: I seq 40000007: size 59 2:00:28: MLP BRI0: B-Channel 1: I seq 80000006: size 58
DB-2053
1: 2: 2: 1:
O O I I
58 59 59 58
DB-2054
December 2010
Effective with release 11.3, the debug ppp multilink negotiation command is not available in Cisco IOS software. To display information about events affecting multilink groups established controlled by Bandwidth Allocation Control Protocol (BACP), use the debug ppp multilink negotiation command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ppp multilink negotiation no debug ppp multilink negotiation
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was removed and is not available in Cisco IOS software. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Do not use this command when memory is scarce or in very high traffic situations.
Examples
The following sample output shows Link Control Protocol (LCP) and Network Control Program (NCP) messages that might appear in debug ppp multilink negotiation command. These messages show information about PPP negotiations between the multilink peers.
Router# debug ppp multilink negotiation ppp: sending CONFREQ, type = 23 (CI_LINK_DISCRIMINATOR), value = 0xF PPP BRI3:1: received config for type = 23 (LINK_DISCRIMINATOR) value = 0xA acked Router# debug ppp multilink negotiation ppp: sending CONFREQ, type = 1 (CI_FAVORED_PEER), value = 0x647BD090 PPP Virtual-Access1: received CONFREQ, type 1, value = 0x382BBF5 (ACK) PPP Virtual-Access1: BACP returning CONFACK ppp: config ACK received, type = 1 (CI_FAVORED_PEER), value = 0x647BD090 PPP Virtual-Access1: BACP up
DB-2055
Field
Description
sending CONFREQ, type = 23 Sending a configuration request and the value of the (CI_LINK_DISCRIMINATOR), value = 0xF link discriminator. Each peer assigns a discriminator value to identify a specific link. The values are significant to each peer individually but do not have to be shared. PPP BRI3:1: CI_FAVORED_PEER Physical interface being used. When the PPP NCP negotiation occurs over the first link in a bundle, the BACP peers use a Magic Number akin to that used by LCP to determine which peer should be favored when both implementations send a request at the same time. The peer that negotiated the higher number is deemed to be favored. That peer should issue a negative acknowledgment to its unfavored peer, which in turn should issue a positive acknowledgment, if applicable according to other link considerations. Returning acknowledgment that BACP is configured. Indicating that the BACP NCP is open.
DB-2056
December 2010
Syntax Description
detailed event
(Optional) Displays detailed debug messages related to specified PPP redundancy events. (Optional) Displays information about protocol actions and transitions between action states (pending, waiting, idle) on the link.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 7500, 10000, and 12000 series Internet routers. This command was integrated into Cisco IOS Release 12.2(18)S on Cisco 7500 series routers. Support was added for the Cisco 7304 router. The Cisco 7500 series router is not supported in Cisco IOS Release 12.2(20)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example displays detailed debug messages related to specified PPP redundancy events:
Router# debug ppp redundancy detailed
DB-2057
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 10000 series routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The CCM provides the capability to facilitate and synchronize session bring up on the standby processor of a dual route processor HA system. Use the debug pppatm redundancy command to display CCM events and messages for PPPoA sessions on HA systems.
Note
The debug pppatm redundancy command does not display output on the active processor during normal synchronization, that is, the command displays output on the active processor only during an error condition. This command is used only by Cisco engineers for internal debugging of CCM processes.
Examples
The following is sample output for the debug pppatm redundancy command from a Cisco 10000 Series router standby processor. No field descriptions are provided because command output is used for Cisco internal debugging purposes only.
Router# debug pppatm redundancy *Dec 3 02:58:40.784: PPPATM HA: [14000001]: Received the first SHDB *Dec 3 02:58:40.784: PPPATM HA: [14000001]: Base hwidb not created > yet, queuing SHDB *Dec 3 02:58:40.784: PPPATM HA: [14000001]: Requesting base vaccess creation
DB-2058
December 2010
debug pppatm
To enable debug reports for PPP over ATM (PPPoA) events, errors, and states, either globally or conditionally, on an interface or virtual circuit (VC), use the debug pppatm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug pppatm {event | error | state} [interface atm interface-number [subinterface-number]] vc {[vpi/vci]vci | virtual-circuit-name} no debug pppatm {event | error | state} [interface atm interface-number [subinterface-number] vc {[vpi/]vci | virtual-circuit-name}
Syntax Description
PPPoA events. PPPoA errors. PPPoA state. (Optional) Specifies a particular ATM interface by interface number and optionally a subinterface number separated by a period. (Optional) Virtual circuit (VC) keyword followed by a virtual path identifier (VPI), virtual channel identifier (VCI), and VC name. A slash mark is required after the VPI.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Each specific PPPoA debug report must be requested on a separate command line; see the Examples section.
Examples
The following is example output of a PPPoA session with event, error, and state debug reports enabled on ATM interface 1/0.10:
Router# debug pppatm event interface atm1/0.10 Router# debug pppatm error interface atm1/0.10 Router# debug pppatm state interface atm1/0.10
DB-2059
00:03:08: 00:03:08: 00:03:08: 00:03:08: 00:03:08: 00:03:08: 00:03:08: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:16: 00:03:27: 00:03:27: 00:03:27: 00:03:27: 00:03:27: 00:03:27: 00:03:27: 00:03:27:
PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM: PPPATM:
ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10 ATM1/0.10
0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101 0/101
[1], [1], [1], [1], [1], [0], [0], [0], [0], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2], [2],
Event Event Event Event Event State Event Event Event Event Event Event Event Event Event Event Event Event State Event State Event State Event Event Event Event Event Event Event State
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
Clear Session Disconnecting AAA gets dynamic attrs AAA gets dynamic attrs SSS Cleanup DOWN Up Pending Up Dequeued Processing Up Access IE allocated Set Pkts to SSS AAA gets retrived attrs AAA gets nas port details AAA gets dynamic attrs AAA gets dynamic attrs AAA unique id allocated No AAA method list set SSS Request NAS_PORT_POLICY_INQUIRY SSS Msg Received = 1 PPP_START PPP Msg Received = 1 LCP_NEGOTIATION PPP Msg Received = 4 HW Switch support FORW = 0 Access IE get nas port AAA gets dynamic attrs AAA gets dynamic attrs PPP Msg Received = 5 Set Pkts to SSS FORWARDED
Description Reports PPPoA events for use by Cisco engineering technical assistance personnel. Reports PPPoA states for use by Cisco engineering technical assistance personnel.
Related Commands
Description Places an ATM subinterface into passive mode. Displays PPPoA session counts.
DB-2060
December 2010
debug pppoe
To display debugging information for PPP over Ethernet (PPPoE) sessions, use the debug pppoe command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug pppoe {{data | errors | events | packets} [rmac remote-mac-address | interface type number [vc {[vpi/]vci | vc-name}] [vlan vlan-id]] | elog} no debug pppoe {{data | errors | events | packets} [rmac remote-mac-address | interface type number [vc {[vpi/]vci | vc-name}] [vlan vlan-id]] | elog}
Syntax Description
data errors
Displays data packets of PPPoE sessions. Displays PPPoE protocol errors that prevent a session from being established, or displays errors that cause an established session to be closed. Displays PPPoE protocol messages about events that are part of normal session establishment or shutdown. Displays each PPPoE protocol packet that is exchanged. (Optional) Remote MAC address. Debugging information for PPPoE sessions sourced from this address will be displayed. (Optional) Interface for which PPPoE session debugging information will be displayed. (Optional) Displays debugging information for PPPoE sessions for a specific permanent virtual circuit (PVC). (Optional) ATM network virtual path identifier (VPI) for the PVC. The vpi value defaults to 0. (Optional) ATM network virtual channel identifier (VCI) for the PVC. (Optional) Name of the PVC. (Optional) IEEE 802.1Q VLAN identifier. Displays PPPoE error logs.
events packets rmac remote-mac-address interface type number vc vpi/ vci vc-name vlan vlan-id elog
Command Modes
Command History
Release 12.2(13)T
Modification This command was introduced. This command replaces the debug vpdn pppoe-data, debug vpdn pppoe-error, debug vpdn pppoe-events, and debug vpdn pppoe-packet commands available in previous Cisco IOS releases. This command was modified to display debugging information on a per-MAC address, per-interface, and per-VC basis. The vlan vlan-id keyword and argument were added. This command was integrated into Cisco IOS Release 12.3(7)XI3.
DB-2061
Modification This command was integrated into Cisco IOS Release 12.2(33)SB This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SRC. This command was implemented on Cisco ASR 1000 series routers.
Examples
The following examples show sample output from the debug pppoe command:
Router# debug pppoe events interface atm 1/0.10 vc 101 PPPoE protocol events debugging is on Router# 00:41:55:PPPoE 0:I PADI R:00b0.c2e9.c470 L:ffff.ffff.ffff 0/101 ATM1/0.10 00:41:55:PPPoE 0:O PADO, R:00b0.c2e9.c470 L:0001.c9f0.0c1c 0/101 ATM1/0.10 00:41:55:PPPoE 0:I PADR R:00b0.c2e9.c470 L:0001.c9f0.0c1c 0/101 ATM1/0.10 00:41:55:PPPoE :encap string prepared 00:41:55:[3]PPPoE 3:Access IE handle allocated 00:41:55:[3]PPPoE 3:pppoe SSS switch updated 00:41:55:[3]PPPoE 3:AAA unique ID allocated 00:41:55:[3]PPPoE 3:No AAA accounting method list 00:41:55:[3]PPPoE 3:Service request sent to SSS 00:41:55:[3]PPPoE 3:Created R:0001.c9f0.0c1c L:00b0.c2e9.c470 0/101 ATM1/0.10 00:41:55:[3]PPPoE 3:State REQ_NASPORT Event MORE_KEYS 00:41:55:[3]PPPoE 3:O PADS R:00b0.c2e9.c470 L:0001.c9f0.0c1c 0/101 ATM1/0.10 00:41:55:[3]PPPoE 3:State START_PPP Event DYN_BIND 00:41:55:[3]PPPoE 3:data path set to PPP 00:41:57:[3]PPPoE 3:State LCP_NEGO Event PPP_LOCAL 00:41:57:PPPoE 3/SB:Sent vtemplate request on base Vi2 00:41:57:[3]PPPoE 3:State CREATE_VA Event VA_RESP 00:41:57:[3]PPPoE 3:Vi2.1 interface obtained 00:41:57:[3]PPPoE 3:State PTA_BIND Event STAT_BIND 00:41:57:[3]PPPoE 3:data path set to Virtual Acess 00:41:57:[3]PPPoE 3:Connected PTA Router# debug pppoe errors interface atm 1/0.10 PPPoE protocol errors debugging is on Router# 00:44:30:PPPoE 0:Max session count(1) on mac(00b0.c2e9.c470) reached. 00:44:30:PPPoE 0:Over limit or Resource low. R:00b0.c2e9.c470 L:ffff.ffff.ffff 0/101 ATM1/0.10
Description PPPoE debug message header. PPPoE session ID. Incoming PPPoE Active Discovery Initiation packet.
DB-2062
December 2010
Table 292
Description Remote MAC address. Local MAC address. VPI VCI of the PVC. Interface type and number. Outgoing PPPoE Active Discovery Offer packet. Incoming PPPoE Active Discovery Request packet. Unique user session ID. The same ID is used for identifying sessions across different applications such as PPPoE, PPP, Layer 2 Tunneling Protocol (L2TP), and Subscriber Service Switch (SSS). The same session ID appears in the output for the show pppoe session, show sss session, and show vpdn session commands. PPPoE session ID. PPPoE session is created. Outgoing PPPoE Active Discovery Session-confirmation packet. PPPoE session is established. PPPoE session is rejected because of per-MAC session limit.
PPPoE 3 Created O PADS Connected PTA Max session count(1) on mac(00b0.c2e9.c470) reached
Related Commands
Command encapsulation aal5autoppp virtual-template pppoe enable protocol pppoe (ATM VC) show pppoe session show sss session show vpdn session
Description Enables PPPoA/PPPoE autosense. Enables PPPoE sessions on an Ethernet interface or subinterface. Enables PPPoE sessions to be established on PVCs. Displays information about active PPPoE sessions. Displays Subscriber Service Switch session status. Displays session information about L2TP, L2F protocol, and PPPoE tunnels in a VPDN.
DB-2063
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The CCM provides the capability to facilitate and synchronize session bring up on the standby processor of a dual route processor HA system.Use the debug pppoe redundancy command to display CCM events and messages for PPPoE sessions. This command is used only by Cisco engineers for internal debugging of CCM processes.
Examples
The following is sample output for the debug pppoe redundancy command from a Cisco 10000 Series router active processor. No field descriptions are provided because command output is used for Cisco internal debugging purposes only.
Router# debug pppoe redundancy Nov Nov Nov Nov Nov Nov Nov Nov Nov Nov Nov Nov Nov Nov 22 22 22 22 22 22 22 22 22 22 22 22 22 22 17:21:11.327: 17:21:11.351: 17:21:11.351: 17:21:11.351: 17:21:11.351: 17:21:11.351: 17:21:11.351: 17:21:11.351: 17:21:11.351: 17:21:11.351: 17:21:11.351: 17:21:11.351: 17:21:11.351: 17:21:11.351: PPPoE PPPoE PPPoE PPPoE PPPoE PPPoE PPPoE PPPoE PPPoE PPPoE PPPoE PPPoE PPPoE PPPoE HA[0xBE000008] HA[0xBE000008] HA[0xBE000008] HA[0xBE000008] HA[0xBE000008] HA[0xBE000008] HA[0xBE000008] HA[0xBE000008] HA[0xBE000008] HA[0xBE000008] HA[0xBE000008] HA[0xBE000008] HA[0xBE000008] HA[0xBE000008] 9: 9: 9: 9: 9: 9: 9: 9: 9: 9: 9: 9: 9: 9: Session ready to sync data code = PADR, length = 58 code = SESSION ID, length = 2 code = SWITCH HDL, length = 4 code = SEGMENT HDL, length = 4 code = PHY SWIDB DESC, length = 20 code = VACCESS DESC, length = 28 Sync collection for ready events code = PADR, length = 58 code = SESSION ID, length = 2 code = SWITCH HDL, length = 4 code = SEGMENT HDL, length = 4 code = PHY SWIDB DESC, length = 20 code = VACCESS DESC, length = 28
DB-2064
December 2010
The following is sample output for the debug pppoe redundancy command from a Cisco 10000 Series router standby processor:
Router# debug pppoe redundancy Nov 22 17:21:11.448: PPPoE HA[0x82000008]: Recreating session: retrieving data Nov 22 17:21:11.464: PPPoE HA[0x82000008] 9: Session ready to sync data
DB-2065
debug presence
To display debugging information about the presence service, use the debug presence command in privileged EXEC mode. To disable debugging messages, use the no form of this command. debug presence {all | asnl | errors | event | info | timer | trace | xml} no debug presence {all | asnl | errors | event | info | timer | trace | xml}
Syntax Description
Displays all presence debugging messages. Displays trace event logs in the Application Subscribe Notify Layer (ASNL). Displays presence error messages. Displays presence event messages. Displays general information about presence service. Displays presence timer information. Displays a trace of all presence activities. Displays messages related to the eXtensible Markup Language (XML) parser for presence service.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.4(15)T.
12.4(15)T
Examples
The following example shows output from the debug presence asnl command:
Router# debug presence asnl *Sep 4 07:15:24.295: *Sep 4 07:15:24.295: send NOTIFY *Sep 4 07:15:24.295: *Sep 4 07:15:24.299: *Sep 4 07:15:24.299: *Sep 4 07:15:24.299: *Sep 4 07:15:24.299: send NOTIFY *Sep 4 07:15:24.299: *Sep 4 07:15:24.299: *Sep 4 07:15:24.299: *Sep 4 07:15:24.299: *Sep 4 07:15:24.299: send NOTIFY //PRESENCE:[17]:/presence_get_sccp_status: line is closed //PRESENCE:[17]:/presence_handle_line_update: line status changes, //PRESENCE:[17]:/presence_set_line_status: new line status [busy ] //PRESENCE:[17]:/presence_asnl_callback: type [5] //PRESENCE:[17]:/presence_asnl_callback: ASNL_RESP_NOTIFY_DONE //PRESENCE:[24]:/presence_get_sccp_status: line is closed //PRESENCE:[24]:/presence_handle_line_update: line status changes, //PRESENCE:[24]:/presence_set_line_status: new line status [busy ] //PRESENCE:[24]:/presence_asnl_callback: type [5] //PRESENCE:[24]:/presence_asnl_callback: ASNL_RESP_NOTIFY_DONE //PRESENCE:[240]:/presence_get_sccp_status: line is closed //PRESENCE:[240]:/presence_handle_line_update: line status changes,
DB-2066
December 2010
*Sep 4 07:15:24.299: *Sep 4 07:15:24.299: *Sep 4 07:15:24.299: send NOTIFY *Sep 4 07:15:24.299: *Sep 4 07:15:24.359: *Sep 4 07:15:24.359: *Sep 4 07:15:24.811: *Sep 4 07:15:24.811: *Sep 4 07:15:26.719: *Sep 4 07:15:26.719: send NOTIFY *Sep 4 07:15:26.719: *Sep 4 07:15:26.719: *Sep 4 07:15:26.719: *Sep 4 07:15:26.719: *Sep 4 07:15:26.719: send NOTIFY *Sep 4 07:15:26.719: *Sep 4 07:15:26.723: *Sep 4 07:15:26.723:
//PRESENCE:[240]:/presence_set_line_status: new line status [busy ] //PRESENCE:[766]:/presence_get_sccp_status: line is closed //PRESENCE:[766]:/presence_handle_line_update: line status changes, //PRESENCE:[766]:/presence_set_line_status: new line status [busy ] //PRESENCE:[766]:/presence_asnl_callback: type [5] //PRESENCE:[766]:/presence_asnl_callback: ASNL_RESP_NOTIFY_DONE //PRESENCE:[240]:/presence_asnl_callback: type [5] //PRESENCE:[240]:/presence_asnl_callback: ASNL_RESP_NOTIFY_DONE //PRESENCE:[17]:/presence_get_sccp_status: line is open //PRESENCE:[17]:/presence_handle_line_update: line status changes, //PRESENCE:[17]:/presence_set_line_status: new line status [idle ] //PRESENCE:[17]:/presence_asnl_callback: type [5] //PRESENCE:[17]:/presence_asnl_callback: ASNL_RESP_NOTIFY_DONE //PRESENCE:[24]:/presence_get_sccp_status: line is open //PRESENCE:[24]:/presence_handle_line_update: line status changes, //PRESENCE:[24]:/presence_set_line_status: new line status [idle ] //PRESENCE:[24]:/presence_asnl_callback: type [5] //PRESENCE:[24]:/presence_asnl_callback: ASNL_RESP_NOTIFY_DONE
The following example shows output from the debug presence event command:
Router# debug presence event *Sep *Sep code *Sep code *Sep code *Sep code *Sep *Sep code *Sep code *Sep code *Sep code 4 07:16:02.715: 4 07:16:02.723: [29] 4 07:16:02.723: [29] 4 07:16:02.791: [17] 4 07:16:02.791: [17] 4 07:16:04.935: 4 07:16:04.943: [29] 4 07:16:04.943: [29] 4 07:16:04.995: [17] 4 07:16:04.999: [17] //PRESENCE:[0]:/presence_sip_line_update: SIP nothing to update //PRESENCE:[17]:/presence_handle_notify_done: sip stack response //PRESENCE:[24]:/presence_handle_notify_done: sip stack response //PRESENCE:[240]:/presence_handle_notify_done: sip stack response //PRESENCE:[766]:/presence_handle_notify_done: sip stack response //PRESENCE:[0]:/presence_sip_line_update: SIP nothing to update //PRESENCE:[17]:/presence_handle_notify_done: sip stack response //PRESENCE:[24]:/presence_handle_notify_done: sip stack response //PRESENCE:[240]:/presence_handle_notify_done: sip stack response //PRESENCE:[766]:/presence_handle_notify_done: sip stack response
The following example shows output from the debug presence info command:
Router# debug presence info *Sep 4 07:16:20.887: //PRESENCE:[17]:/presence_handle_line_update: get line status from ccvdbPtr *Sep 4 07:16:20.887: //PRESENCE:[17]:/presence_get_sccp_status: dn_tag 2 *Sep 4 07:16:20.887: //PRESENCE:[16]:/presence_start_element_handler: line 1: unknown element <presence> *Sep 4 07:16:20.887: //PRESENCE:[16]:/presence_start_element_handler: line 1: unknown element <dm:person> *Sep 4 07:16:20.887: //PRESENCE:[16]:/presence_start_element_handler: line 1: unknown element <status> *Sep 4 07:16:20.887: //PRESENCE:[16]:/presence_start_element_handler: line 1: unknown element <e:activities>
DB-2067
*Sep 4 07:16:20.887: //PRESENCE:[16]:/presence_start_element_handler: line 1: unknown element <tuple> *Sep 4 07:16:20.887: //PRESENCE:[16]:/presence_start_element_handler: line 1: unknown element <status> *Sep 4 07:16:20.887: //PRESENCE:[16]:/presence_start_element_handler: line 1: unknown element <e:activities> *Sep 4 07:16:20.887: *Sep 4 07:16:20.887: ccvdbPtr *Sep 4 07:16:20.887: *Sep 4 07:16:20.891: element <presence> //PRESENCE:[0]:/presence_asnl_free_resp: //PRESENCE:[24]:/presence_handle_line_update: get line status from //PRESENCE:[24]:/presence_get_sccp_status: dn_tag 2 //PRESENCE:[23]:/presence_start_element_handler: line 1: unknown
The following example shows output from the debug presence timer command:
Router# debug presence timer *Sep 3600 *Sep 3600 *Sep 607 *Sep 602 *Sep 3600 *Sep 3600 *Sep 605 *Sep 600 4 07:16:41.271: //PRESENCE:[17]:/presence_asnl_notify_body_handler: expires time 4 07:16:41.271: //PRESENCE:[24]:/presence_asnl_notify_body_handler: expires time 4 07:16:41.271: //PRESENCE:[240]:/presence_asnl_notify_body_handler: expires time 4 07:16:41.275: //PRESENCE:[766]:/presence_asnl_notify_body_handler: expires time 4 07:16:43.331: //PRESENCE:[17]:/presence_asnl_notify_body_handler: expires time 4 07:16:43.331: //PRESENCE:[24]:/presence_asnl_notify_body_handler: expires time 4 07:16:43.331: //PRESENCE:[240]:/presence_asnl_notify_body_handler: expires time 4 07:16:43.331: //PRESENCE:[766]:/presence_asnl_notify_body_handler: expires time
The following example shows output from the debug presence trace command:
Router# debug presence trace *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 07:16:56.191: 07:16:56.191: 07:16:56.191: 07:16:56.191: 07:16:56.199: 07:16:56.199: 07:16:56.199: 07:16:56.199: 07:16:56.199: 07:16:56.199: 07:16:56.199: 07:16:56.199: 07:16:56.199: 07:16:56.199: 07:16:56.199: 07:16:56.199: 07:16:56.199: 07:16:56.203: 07:16:56.203: 07:16:56.203: 07:16:59.743: 07:16:59.743: 07:16:59.743: //PRESENCE:[17]:/presence_line_update: //PRESENCE:[24]:/presence_line_update: //PRESENCE:[240]:/presence_line_update: //PRESENCE:[766]:/presence_line_update: //PRESENCE:[17]:/presence_get_node_by_subid: //PRESENCE:[17]:/presence_handle_line_update: //PRESENCE:[17]:/presence_get_sccp_status: //PRESENCE:[17]:/presence_asnl_notify_body_handler: //PRESENCE:[24]:/presence_get_node_by_subid: //PRESENCE:[24]:/presence_handle_line_update: //PRESENCE:[24]:/presence_get_sccp_status: //PRESENCE:[24]:/presence_asnl_notify_body_handler: //PRESENCE:[240]:/presence_get_node_by_subid: //PRESENCE:[240]:/presence_handle_line_update: //PRESENCE:[240]:/presence_get_sccp_status: //PRESENCE:[240]:/presence_asnl_notify_body_handler: //PRESENCE:[766]:/presence_get_node_by_subid: //PRESENCE:[766]:/presence_handle_line_update: //PRESENCE:[766]:/presence_get_sccp_status: //PRESENCE:[766]:/presence_asnl_notify_body_handler: //PRESENCE:[17]:/presence_line_update: //PRESENCE:[24]:/presence_line_update: //PRESENCE:[240]:/presence_line_update:
DB-2068
December 2010
*Sep
4 07:16:59.743: //PRESENCE:[766]:/presence_line_update:
The following example shows output from the debug presence trace command:
Router# debug presence trace *Sep 4 07:17:17.351: //PRESENCE:[17]:/presence_xml_encode: *Sep 4 07:17:17.355: //PRESENCE:[17]:/xml_encode_presence: keyword = presence *Sep 4 07:17:17.355: //PRESENCE:[17]:/xml_encode_person: keyword = person *Sep 4 07:17:17.355: //PRESENCE:[17]:/xml_encode_generic: keyword = Closed *Sep 4 07:17:17.355: //PRESENCE:[17]:/xml_encode_activities: keyword = activities *Sep 4 07:17:17.355: //PRESENCE:[17]:/xml_encode_otp: keyword = On-the-phone *Sep 4 07:17:17.355: //PRESENCE:[17]:/xml_encode_tuple: keyword = tuple *Sep 4 07:17:17.355: //PRESENCE:[17]:/xml_encode_status: keyword = status *Sep 4 07:17:17.355: //PRESENCE:[17]:/xml_encode_generic: keyword = Closed *Sep 4 07:17:17.355: //PRESENCE:[17]:/xml_encode_otp: keyword = On-the-phone *Sep 4 07:17:17.355: <?xml version="1.0" encoding="UTF-8"?> <presence xmlns="urn:ietf:params:xml:ns:pidf" entity="sip:[email protected]" xmlns:e="urn:ietf:params:xml:ns:pidf:status:rpid" xmlns:dm="urn:ietf:params:xml:ns:pidf:data-model"> <dm:person> <status> <basic>Closed</basic> </status> <e:activities> <e:on-the-phone/> </e:activities> </dm:person> <tuple id="cisco-cme"> <status> <basic>Closed</basic> <e:activities> <e:on-the-phone/> </e:activities> </status> </tuple> </presence>
Related Commands
Command presence presence enable show presence global show presence subscription
Description Enables presence service on the router and enters presence configuration mode. Allows the router to accept incoming presence requests. Displays configuration information about the presence service. Displays information about active presence subscriptions.
DB-2069
debug priority
To display priority queueing output, use the debug priority command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug priority no debug priority
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug priority command when the Frame Relay PVC Interface Priority Queueing (FR PIPQ) feature is configured on serial interface 0:
Router# debug priority 00:49:05:PQ:Serial0 00:49:05:PQ:Serial0 00:49:05:PQ:Serial0 00:49:05:PQ:Serial0 00:49:05:PQ:Serial0 00:49:05:PQ:Serial0 00:49:05:PQ:Serial0 00:49:05:PQ:Serial0 00:49:05:PQ:Serial0 00:49:05:PQ:Serial0 00:49:05:PQ:Serial0 00:49:05:PQ:Serial0 dlci 100 -> high output (Pk size/Q 24/0) dlci 100 -> high output (Pk size/Q 24/0) dlci 100 -> high output (Pk size/Q 24/0) dlci 200 -> medium output (Pk size/Q 24/1) dlci 300 -> normal output (Pk size/Q 24/2) dlci 400 -> low output (Pk size/Q 24/3)
Related Commands
DB-2070
December 2010
debug private-hosts
To enable debug messages for the Private Hosts feature, use the debug private-hosts command in privileged EXEC mode. debug private-hosts {all | events | acl | api}
Syntax Description
Enable debug messages for all Private Hosts errors and events. Enable debug messages for issues related to Private Hosts events. Enable debug messages for issues and events related to ACLs. Enable debug messages for issues related to the application programming interface.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
Related Commands
Command
Description
debug fm private-hosts Enables debug messages for the Private Hosts feature manager.
DB-2071
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Enter the show proxy h323 detail-call EXEC command to see the statistics.
DB-2072
December 2010
debug pvcd
To display the permanent virtual circuit (PVC) Discovery events and Interim Local Management Interface (ILMI) MIB traffic used when discovering PVCs, use the debug pvcd command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug pvcd no debug pvcd
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Examples
DB-2073
PVCD(2/0): Before _update_inheritance() and _create_pvc() VC 0/80: DYNAMIC PVCD: After _create_pvc() VC 0/80: DYNAMIC0/80 on 2/0 : UBR PCR = -1 PVCD: Creating Dynamic PVC 0/99 on 2/0
DB-2074
December 2010
debug pvdm2dm
To view contents of packets flowing through PVDMII-xxDM digital modem devices, use the debug pvdm2dm command in privileged EXEC mode. To disable debug activity, use the no form of this command. debug pvdm2dm packet modem | pvdm slot/port | pvdm slot no debug pvdm2dm
Syntax Description
Debugs packets Debugs modem packets Debugs PVDM packets Router slot for pvdms/modems Modem number PVDM number
Command Default
Disabled
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To debug the contents of modem packets for a specific modem, use the following command:
By removing the specific modem number at the end, one can enable packet debugging for all the modems available on the router:
The following command enables packet debugging for all packets flowing through a particular PVDMII-xxDM device:
The following command enables debugging of packets flowing through any PVDMII-xxDM device:
The following command enables debugging of packets flowing through any PVDMII-xxDM device and any PVDMII-xxDM-based modem channel:
DB-2075
To see what debug flags are set, and to view the contents of debugged packets, use the show debugging command.
Examples
The following example sets debugging for a specific modem. The following show debugging command displays the debug flag that is set, and gives a typical printout for one debugged packet:
Router# debug pvdm2dm packet modem 0/322 Router# show debugging PVDM2 DM: Modem 0/322 packet debugging is on Router# May 24 17:35:16.318: pvdm2_dm_tx_dsp_pak_common: bay 0, dsp 0 May 24 17:35:16.318: pvdm2_dm_dump_pak_hex: pak: 43E1F6FC size 8 May 24 17:35:16.318: 00 08 00 00 00 1C 00 00 May 24 17:35:16.322:
The following example sets debugging for all PVDMII-xxDM modems available on the router.
Router# debug pvdm2dm packet Router# show debugging PVDM2 DM: Modem 0/322 packet debugging Modem 0/323 packet debugging Modem 0/324 packet debugging . . . Modem 0/355 packet debugging Modem 0/356 packet debugging Modem 0/357 packet debugging Router#
is on is on is on
is on is on is on
The following example sets debugging for all PVDMII-xxDM devices in the router.
Router# debug pvdm2dm packet Router# show debugging PVDM2 DM: PVDM2 0/0 packet debugging PVDM2 0/1 packet debugging PVDM2 0/2 packet debugging Router# pvdm
is on is on is on
In all of these examples, the output describing the debugged packets is similar to that of the first example, except that the packet contents will vary.
Related Commands
Description Displays information about the type of debugging enabled for your router.
DB-2076
December 2010
Syntax Description
ac mpls
(Optional) Displays AToM information related to attachment circuit (AC) events. (Optional) Displays AToM information related to MPLS Forwarding Infrastructure (MFI) events.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF AToM AC events debug messages:
Router# debug pxf atom ac PXF ATOM AC debugging is on
Related Commands
Command
Description
show mpls l2transport Displays information about AToM virtual circuits (VCs) that have been enabled to route Layer 2 packets on a router, including platform-independent AToM status and capabilities of a particular interface. show mpls l2transport Displays information about AToM VCs that are enabled to route Layer 2 vc packets on a router. show pxf cpu atom show pxf cpu mpls label Displays PXF AToM information for an interface or VCCI. Displays PXF forwarding information for a label.
show pxf cpu statistics Displays PXF CPU AToM statistics. atom
DB-2077
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF backwalk requests debug messages:
Router# debug pxf backwalks PXF BACKWALK debugging is on
Related Commands
Command
Description
show pxf cpu statistics Displays PXF CPU backwalk requests statistics. backwalk
DB-2078
December 2010
Syntax Description
ac_sh_counter ac_sh_error ac_sh_event elog l2f_startstop_debug l2x_fh_error l2x_fh_event l2x_sh_counter l2x_sh_error l2x_sh_event lt_sh_error lt_sh_event
(Optional) Displays attachment circuit (AC) segment counters. (Optional) Displays AC segment errors. (Optional) Displays AC segment events. (Optional) Displays event logging messages. (Optional) Displays Layer 2 Forwarding (L2F) tunneling events. (Optional) Displays L2F/L2TP (L2x) feature errors. (Optional) Displays L2x feature events. (Optional) Displays L2x segment counters. (Optional) Displays L2x segment errors. (Optional) Displays L2x segment events. (Optional) Displays LT segment errors. (Optional) Displays LT segment events.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display AC segment counters debug messages:
Router# debug pxf bba ac_sh_counter AC segment counters debugging is on *Jan 19 13:18:26.698: c10k_get_ac_segment_counters: pppox vcci 2709 rx pkts = 0 rx byte = 0 tx pkts = 0 tx bytes = 0 *Jan 19 13:18:26.698: c10k_get_ac_segment_counters: pppox vcci 2709 tx drop pkts
DB-2079
drop bytes = 0 13:18:26.698: c10k_get_ac_segment_counters: = 0 tx pkts = 0 tx bytes = 0 13:18:26.698: c10k_get_ac_segment_counters: drop bytes = 0 13:18:36.698: c10k_get_ac_segment_counters: = 0 tx pkts = 0 tx bytes = 0 13:18:36.698: c10k_get_ac_segment_counters: drop bytes = 0 13:18:36.698: c10k_get_ac_segment_counters: = 0 tx pkts = 0 tx bytes = 0
pppox vcci 2710 rx pkts = 0 pppox vcci 2710 tx drop pkts pppox vcci 2709 rx pkts = 0 pppox vcci 2709 tx drop pkts pppox vcci 2710 rx pkts = 0
The following example shows how to display L2F tunneling debug messages:
Router# debug pxf bba l2f_startstop_debug L2F feature debugging is on *Jan 20 12:04:18.976: hwcnts.rx_pkts :0 hwcnts.rx_bytes :0 hwcnts.tx_pkts :0 hwcnts.tx_bytes: 0 hwcnts.tx_drop_pkts :0 hwcnts.tx_drop_bytes: 0 pcntrs->rx_pkts: 0 pcntrs->rx_bytes: 0 pcntrs->tx_pkts: 0 pcntrs->tx_bytes: 0 pcntrs->tx_drop_pkts: 0 pcntrs->tx_drop_bytes: 0 *Jan 20 12:04:18.976: hwcnts.rx_pkts :0 hwcnts.rx_bytes :0 hwcnts.tx_pkts :0 hwcnts.tx_bytes: 0 hwcnts.tx_drop_pkts :0 hwcnts.tx_drop_bytes: 0 pcntrs->rx_pkts: 0 pcntrs->rx_bytes: 0 pcntrs->tx_pkts: 0 pcntrs->tx_bytes: 0 pcntrs->tx_drop_pkts: 0 pcntrs->tx_drop_bytes: 0 . . .
Related Commands
DB-2080
December 2010
Syntax Description
fibroot rpf
Displays PXF CEF Forwarding Information Base (FIB) root information. Displays PXF CEF Reverse Path Forwarding (RPF) information.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF CEF debug messages:
Router# debug pxf cef PXF CEF debugging is on
Related Commands
Description Displays summary information about the FIB entries. Displays PXF CPU memory usage, CEF, and External Column Memory (XCM) information.
DB-2081
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF DMA ASIC debug messages:
Router# debug pxf dma PXF DMA *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 *Jan 4 ASIC debugging is on 08:05:06.314: get ftbb 08:05:06.814: get ftbb 08:05:07.314: get ftbb 08:05:07.814: get ftbb 08:05:08.314: get ftbb 08:05:08.814: get ftbb 08:05:09.314: get ftbb 08:05:09.814: get ftbb 08:05:10.314: get ftbb 08:05:10.814: get ftbb 08:05:11.314: get ftbb 08:05:11.814: get ftbb 08:05:12.314: get ftbb 08:05:12.814: get ftbb 08:05:13.314: get ftbb 08:05:13.814: get ftbb 08:05:14.314: get ftbb 08:05:14.814: get ftbb 08:05:14.982: Entering 08:05:14.982: Packet 08:05:14.982: Header
reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 reg: slot 3, subslot 1 c10k_cobalt_send. decode: datagramstart 0x0A0301BE length 76 decode: Chan 0, VCCI 2515
DB-2082
December 2010
Header decode: flags 0x0001 c10k_cobalt_send: Checked the idb state. c10k_cobalt_send: Checked the FromRP Q count.
Related Commands
Description Displays the current state of the DMA buffers, error counters, and registers on the PXF.
DB-2083
Syntax Description
stats
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF iEdge debug messages:
Router# debug pxf iedge iEdge Feature Debug debugging is on
Related Commands
DB-2084
December 2010
Syntax Description
(Optional) Displays PXF IPv6 access control list (ACL) information. (Optional) Displays PXF Forwarding Information Base (FIB) information. (Optional) Displays PXF IPv6 hash information.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF IPv6 ACL debug messages:
Router# debug pxf ipv6 acl PXF IPV6 ACL debugging is on
Related Commands
Command show ipv6 interface show ipv6 route show pxf cpu ipv6
Description Displays IPv6 interface settings. Displays IPv6 routing table contents. Displays PXF CPU IPv6 statistics.
DB-2085
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The Route Processor (RP) uses the L2less packet handler to handle tunneling encapsulated packets that do not have the original IP and Layer 2 information associated with them. The L2less handler takes the packet with a specific header, updates the statistics (interface packet and byte counts), and enqueues the packet to the IP input queue.
Examples
The following example shows how to display PXF L2less drop packet errors debug messages:
Router# debug pxf l2less-error PXF l2less-error debugging is on
Related Commands
DB-2086
December 2010
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF microcode debug messages:
Router# debug pxf microcode PXF microcode debugging is on
Related Commands
Description Reloads the Cisco IOS image from a line card on a Cisco router. Displays identifying information for the microcode currently loaded on the PXF.
DB-2087
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The mnodes are used in the multiway tree (Mtrie) library. Each mnode has a number of buckets that point to lower level mnodes or to multiway leaves (mleaves). The mleaves can be null leaves which indicate empty buckets.
Examples
The following example shows how to display PXF mnode debug messages:
Router# debug pxf mnode PXF MNODE debugging is on
Related Commands
Description Displays PXF CPU memory usage, Cisco Express Forwarding, and XCM information.
DB-2088
December 2010
Syntax Description
(Optional) Displays PXF Cisco Signaling Controller (CSC) events and statistics. Displays Link State Path Vector (LSPV) debug messages from the PXF MPLS Label Switched Path (LSP) Ping/Traceroute feature.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF MPLS CSC statistics debug messages:
Router# debug pxf mpls csc stats PXF MPLS CSC STATS debugging is on
Related Commands
Command ping mpls show mpls interfaces show pxf cpu mpls trace mpls
Description Checks MPLS LSP connectivity. Displays information about the interfaces that have been configured for label switching. Displays PXF MPLS (FIB) entry information. Discovers MPLS LSP routes that packets will take when traveling to their destinations.
DB-2089
Syntax Description
(Optional) Displays PXF multicast descriptor block (MDB) event messages. (Optional) Displays PXF multicast distribution tree (MDT) messages. (Optional) Displays PXF multicast interface descriptor block (MIDB) messages. (Optional) Displays PXF multicast punted packets information.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF multicast distribution tree (MDT) debug messages:
Router# debug pxf mroute mdt PXF mroute mdt creation debugging is on
Related Commands
Description Deletes entries from the IP multicast routing table. Displays the contents of the IP multicast routing table. Displays PXF multicast routing information for a particular group or range of groups.
DB-2090
December 2010
Syntax Description
(Optional) Displays all PXF multilink messages. (Optional) Displays PXF multilink ATM messages. (Optional) Displays PXF multilink Frame Relay messages. (Optional) Displays PXF Frame Relay Forum FRF.12-based fragmentation information on Frame Relay permanent virtual circuits (PVCs). (Optional) Displays PXF Link Fragmentation and Interleaving (LFI) messages. (Optional) Displays PXF multilink PPP messages. (Optional) Displays PXF multilink queue messages. (Optional) Displays PXF multilink queue rate messages.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF multilink ATM debug messages:
Router# debug pxf multilink atm Router#
Related Commands
Description Enables fragmentation of Frame Relay frames on a Frame Relay map class. Displays bundle information for the MLP bundles. Displays chassis-wide, summary PXF statistics.
DB-2091
Syntax Description
records time
Displays NetFlow PXF records information. Displays NetFlow PXF time synchronization information.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
Related Commands
DB-2092
December 2010
Syntax Description
sacl trace
(Optional) Displays PXF PBR super access control list (ACL) messages. (Optional) Displays PXF PBR trace information.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF PBR trace debug messages:
Router# debug pxf pbr trace PXF PBR Trace debugging is on
Related Commands
Description Displays the PBR actions configured on the PXF for all PBR route maps.
DB-2093
Syntax Description
ipc trace
(Optional) Displays PXF QoS interprocess communication (IPC) information. (Optional) Displays PXF QoS trace information
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF QoS IPC debug messages:
Router# debug pxf qos trace PXF QoS IPC Events debugging is on Router# *Apr 30 *Apr 30 *Apr 30 *Apr 30 *Apr 30 *Apr 30 . . .
c10k_bandwidth_notification_handler: cmdtype=4 event=0x30 acA c10k_priority_notification_handler: cmdtype=4 event=0x30 actA c10k_bandwidth_notification_handler: cmdtype=4 event=0x30 acA c10k_bandwidth_notification_handler: cmdtype=4 event=0x30 acA c10k_priority_notification_handler: cmdtype=4 event=0x30 actA c10k_bandwidth_notification_handler: cmdtype=4 event=0x30 acA
Related Commandss
Description Displays External Column Memory (XCM) contents related to a particular policy. Displays chassiswide, summary PXF statistics.
DB-2094
December 2010
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF statistics debug messages:
Router# debug pxf stats PXF hardware statistics debugging is on
Related Commands
Description Clears PXF counters and statistics. Displays chassis-wide, summary PXF statistics.
DB-2095
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to display PXF bridged subinterfaces (encapsulation type) debug messages:
Router# debug pxf subblocks PXF hardware subblock debugging is on
Related Commands
Description Displays PXF CPU statistics for bridged subinterfaces (encapsulation types).
DB-2096
December 2010
Syntax Description
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB and implemented on the Cisco 10000 series router. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output from the debug pxf tbridge command shows that the Bridge Group Virtual Interface (BVI) 100 has been removed from the Software Mac-address Filter (SMF) table:
Router# debug pxf tbridge *Feb 8 18:39:04.710: rpmxf_tbridge_add_remove_bvi_from_smf: Deleting BVI entry 100 from SMF table. *Feb 8 18:39:04.710: rpmxf_tbridge_add_remove_bvi_from_smf: BVI 100 ICM programming *Feb 8 18:39:04.710: rpmxf_tbridge_add_remove_bvi_from_smf: Successfully removed SMF entry for bvi 100 *Feb 8 18:39:04.710: rpmxf_tbridge_add_remove_bvi_from_smf: Deleting BVI entry 100 from SMF table. *Feb 8 18:39:04.710: rpmxf_tbridge_add_remove_bvi_from_smf: BVI 100 ICM programming *Feb 8 18:39:04.710: rpmxf_tbridge_add_remove_bvi_from_smf: Successfully removed SMF entry for bvi 100 *Feb 8 18:39:05.178: %SYS-5-CONFIG_I: Configured from console by vty0 (CROI_MASTER_000A004B) *Feb 8 18:39:06.710: %LINK-5-CHANGED: Interface BVI100, changed state to administratively down *Feb 8 18:39:07.710:%LINEPROTO-5-UPDOWN: Line protocol on Interface BVI100, changed state to down
The following sample output from the debug pxf tbridge command shows that BVI is configured and that the SMF entry has been updated:
DB-2097
Router# debug pxf tbridge *Feb 8 18:39:16.398: Note: A random mac address of 0000.0ceb.c0f8 has been chosen for BVI in bridge group 100 since there is no mac address associated with the selected interface. *Feb 8 18:39:16.398: Ensure that this address is unique. *Feb 8 18:39:16.398: rpmxf_tbridge_smf_update: SMF update for Switch1.1: BVI 100 Mac Address 0000.0ceb.c0f8 *Feb 8 18:39:16.398: rpmxf_tbridge_smf_update: BVI 100 ICM programming *Feb 8 18:39:16.398: rpmxf_tbridge_smf_update: Successfully updated SMF entry for bvi 100 *Feb 8 18:39:16.398: rpmxf_tbridge_smf_update: SMF update for Switch1.1: BVI 100 Mac Address 0000.0ceb.c0f8 *Feb 8 18:39:16.398: rpmxf_tbridge_smf_update: BVI 100 ICM programming *Feb 8 18:39:16.398: rpmxf_tbridge_smf_update: Successfully updated SMF entry for bvi 100 *Feb 8 18:39:16.886: %SYS-5-CONFIG_I: Configured from console by vty0 (CROI_MASTER_000A004B) *Feb 8 18:39:18.394: %LINK-3-UPDOWN: Interface BVI100, changed state to up *Feb 8 18:39:19.394: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI100, changed state to up
Related Commands
Command show pxf cpu statistics show pxf cpu subblock show pxf cpu tbridge show pxf statistics
Description Displays PXF CPU statistics for a configured router. Displays PXF CPU subblocks for a bridged subinterface. Displays PXF CPU statistics for transparent bridging. Displays chassis-wide, summary PXF statistics.
DB-2098
December 2010
debug qbm
To display debugging output for quality of service (QoS) bandwidth manager (QBM) options, use the debug qbm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug qbm {api | events} no debug qbm {api | events}
Syntax Description
api events
Displays information about QBM client requests and notifications. See the Usage Guidelines section for additional information. Displays information about QBM pool events.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS XE Release 2.6.
Usage Guidelines
Use the debug qbm command to troubleshoot QBM behavior. Examples of client requests are when a client creates or destroys a bandwidth pool and when a client attempts to admit bandwidth into a pool. An example of a notification is when a clients previously admitted bandwidth gets preempted from a pool.
Examples
The following example shows how to enable the debug qbm api command:
Router# debug qbm api QBM client requests and notifications debugging is on
The following example show how to enable the debug qbm events command:
Router# debug qbm events QBM pool events debugging is on
The following example shows how to verify that QBM debugging is enabled:
Router# show debug QoS Bandwidth Manager: QBM client requests and notifications debugging is on QBM pool events debugging is on
DB-2099
Related Commands
Description Displays registered QBM clients. Displays allocated QBM pools and associated objects.
DB-2100
December 2010
Syntax Description
Command Modes
Usage Guidelines
This command helps you track down errors in the QLLC interactions with X.25 networks. Use the debug qllc error command in conjunction with the debug x25 all command to see the connection. The data shown by this command only flows through the router on the X.25 connection. Some forms of this command can generate a substantial amount of output and network traffic.
Examples
The following is sample output from the debug qllc error command:
Router# debug qllc error %QLLC-3-GENERRMSG: qllc_close - bad qllc pointer Caller 00407116 Caller 00400BD2 QLLC 4000.1111.0002: NO X.25 connection. Discarding XID and calling out
The following line indicates that the QLLC connection was closed:
%QLLC-3-GENERRMSG: qllc_close - bad qllc pointer Caller 00407116 Caller 00400BD2
The following line shows the virtual MAC address of the failed connection:
QLLC 4000.1111.0002: NO X.25 connection. Discarding XID and calling out
DB-2101
Syntax Description
Command Modes
Usage Guidelines
Use the debug qllc event command to display primitives that might affect the state of a QLLC connection. An example of these events is the allocation of a QLLC structure for a logical channel indicator when an X.25 call has been accepted with the QLLC call user data. Other examples are the receipt and transmission of LAN explorer and exchange identification (XID) frames.
Examples
The following is sample output from the debug qllc event command:
Router# debug qllc event QLLC: allocating new qllc lci 9 QLLC: tx POLLING TEST, da 4001.3745.1088, sa 4000.1111.0001 QLLC: rx explorer response, da 4000.1111.0001, sa c001.3745.1088, rif 08B0.1A91.1901.A040 QLLC: gen NULL XID, da c001.3745.1088, sa 4000.1111.0001, rif 0830.1A91.1901.A040, dsap 4, ssap 4 QLLC: rx XID response, da 4000.1111.0001, sa c001.3745.1088, rif 08B0.1A91.1901.A040
The following line indicates that a new QLLC data structure has been allocated:
QLLC: allocating new qllc lci 9
The following lines show transmission and receipt of LAN explorer or test frames:
QLLC: tx POLLING TEST, da 4001.3745.1088, sa 4000.1111.0001 QLLC: rx explorer response, da 4000.1111.0001, sa c001.3745.1088, rif 08B0.1A91.1901.A040
DB-2102
December 2010
Syntax Description
Command Modes
Usage Guidelines
This command helps you to track down errors in the QLLC interactions with X.25 networks. The data shown by this command only flows through the router on the X25 connection. Use the debug qllc packet command in conjunction with the debug x25 all command to see the connection and the data that flows through the router.
Examples
The following is sample output from the debug qllc packet command:
Router# debug qllc packet 14:38:05: 14:38:07: 14:38:07: 14:38:08: 14:38:08: 14:38:08: 14:38:08: 14:38:12: 14:38:12: Serial2/5 Serial2/6 Serial2/6 Serial2/6 Serial2/6 Serial2/6 Serial2/6 Serial2/5 Serial2/5 QLLC QLLC QLLC QLLC QLLC QLLC QLLC QLLC QLLC I: I: O: I: I: O: I: I: O: Data Data Data Data Data Data Data Data Data Packet.-RSP Packet.-RSP Packet. 128 Packet.-RSP Packet.-RSP Packet. 128 Packet.-RSP Packet.-RSP Packet. 128 9 bytes. 112 bytes. bytes. 9 bytes. 112 bytes. bytes. 9 bytes. 112 bytes. bytes.
The following lines indicate that a packet was received on the interfaces:
14:38:05: Serial2/5 QLLC I: Data Packet.-RSP 9 bytes. 14:38:07: Serial2/6 QLLC I: Data Packet.-RSP 112 bytes.
The following lines show that a packet was sent on the interfaces:
14:38:07: Serial2/6 QLLC O: Data Packet. 128 bytes. 14:38:12: Serial2/5 QLLC O: Data Packet. 128 bytes.
DB-2103
Syntax Description
Command Modes
Usage Guidelines
Use the debug qllc state command to show when the state of a QLLC connection has changed. The typical QLLC connection goes from states ADM to SETUP to NORMAL. The NORMAL state indicates that a QLLC connection exists and is ready for data transfer.
Examples
The following is sample output from the debug qllc state command:
Router# debug qllc state Serial2 QLLC O: QSM-CMD Serial2: X25 O D1 DATA (5) Q 8 lci 9 PS 4 PR 3 QLLC: state ADM -> SETUP Serial2: X25 I D1 RR (3) 8 lci 9 PR 5 Serial2: X25 I D1 DATA (5) Q 8 lci 9 PS 3 PR 5 Serial2 QLLC I: QUA-RSPQLLC: addr 00, ctl 73 QLLC: qsetupstate: recvd qua rsp QLLC: state SETUP -> NORMAL
The following line indicates that a QLLC connection attempt is changing state from ADM to SETUP:
QLLC: state ADM -> SETUP
The following line indicates that a QLLC connection attempt is changing state from SETUP to NORMAL:
QLLC: state SETUP -> NORMAL
DB-2104
December 2010
Syntax Description
Command Modes
Usage Guidelines
The QLLC process periodically cycles and checks status of itself and its partner. If the partner is not found in the desired state, an LAPB primitive command is re-sent until the partner is in the desired state or the timer expires.
Examples
The following is sample output from the debug qllc timer command:
Router# debug qllc timer 14:27:24: 14:27:34: 14:27:44: 14:27:54: Qllc Qllc Qllc Qllc timer timer timer timer lci lci lci lci 257, 257, 257, 257, state state state state ADM retry count 0 Caller 00407116 Caller 00400BD2 NORMAL retry count 0 NORMAL retry count 1 NORMAL retry count 1
The following line of output shows the state of a QLLC partner on a given X.25 logical channel identifier:
14:27:24: Qllc timer lci 257, state ADM retry count 0 Caller 00407116 Caller 00400BD2
DB-2105
Syntax Description
Command Modes
Usage Guidelines
This command is helpful to track down errors in the QLLC interactions with X.25 networks. Use the debug qllc x25 command in conjunction with the debug x25 events or debug x25 all commands to see the X.25 events between the router and its partner.
Examples
The following is sample output from the debug qllc x25 command:
Router# debug qllc x25 15:07:23: 15:07:23: 15:07:34: 15:07:35: QLLC QLLC QLLC QLLC X25 X25 X25 X25 notify notify notify notify lci lci lci lci 257 257 257 257 event event event event 1 5 3 Caller 00407116 Caller 00400BD2 4
Description Displays the time of day. Indicates that this is a QLLC X25 message. Indicates the type of event, n. Values for n can be as follows:
1Circuit is cleared 2Circuit has been reset 3Circuit is connected 4Circuit congestion has cleared 5Circuit has been deleted
DB-2106
December 2010
debug qos ha
To debug quality of service (QoS) information on the networking device, use the debug qos ha command in privileged EXEC mode. To disable the display of debugging output, use the no form of this command. debug qos ha [detail] no debug qos ha [detail]
Syntax Description
detail
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
DB-2107
debug radius
To enable debugging for Remote Authentication Dial-In User Service (RADIUS) configuration, use the debug radius command in privileged EXEC mode. To disable debugging, use the no form of this command. debug radius [accounting | authentication | brief | elog | failover | retransmit | verbose] no debug radius [accounting | authentication | brief | elog | failover | retransmit | verbose]
Syntax Description
(Optional) Enables debugging of RADIUS accounting collection. (Optional) Enables debugging of RADIUS authentication packets. (Optional) Displays abbreviated debug output. (Optional) Enables RADIUS event logging. (Optional) Enables debugging of packets sent upon failover. (Optional) Enables retransmission of packets. (Optional) Displays detailed debug output.
Defaults
RADIUS event logging and debugging output in ASCII format are enabled.
Command Modes
Command History
Modification This command was introduced. The brief keyword was added. The default output format became ASCII from hexadecimal. The verbose keyword was added. The elog keyword was added. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
RADIUS is a distributed security system that secures networks against unauthorized access. Cisco supports RADIUS under the authentication, authorization, and accounting (AAA) security system. When RADIUS is used on the router, you can use the debug radius command to display debugging and troubleshooting information in ASCII format. Use the debug radius brief command for abbreviated output displaying client/server interaction and minimum packet information. Only the input and output transactions are recorded. Use the debug radius verbose command to include non-essential RADIUS debugs.
DB-2108
December 2010
Examples
DB-2109
10 10 49 43
"00000015" "13.1.0.1"
The following is sample output from the debug radius brief command:
Router# debug radius brief Radius protocol debugging is on Radius packet hex dump debugging is off Radius protocol in brief format debugging is on 00:05:21: RADIUS: Initial Transmit ISDN 0:D:23 id 6 10.0.0.1:1824, Accounting-Request, len 358 00:05:21: %ISDN-6-CONNECT: Interface Serial0:22 is now connected to 4085274206 00:05:26: RADIUS: Retransmit id 6 00:05:31: RADIUS: Tried all servers. 00:05:31: RADIUS: No valid server found. Trying any viable server 00:05:31: RADIUS: Tried all servers. 00:05:31: RADIUS: No response for id 7 00:05:31: RADIUS: Initial Transmit ISDN 0:D:23 id 8 10.0.0.0:1823, Access-Request, len 171 00:05:36: RADIUS: Retransmit id 8 00:05:36: RADIUS: Received from id 8 1.7.157.1:1823, Access-Accept, len 115 00:05:47: %ISDN-6-DISCONNECT: Interface Serial0:22 disconnected from 4085274206, call lasted 26 seconds 00:05:47: RADIUS: Initial Transmit ISDN 0:D:23 id 9 10.0.0.1:1824, Accounting-Request, len 775 00:05:47: RADIUS: Received from id 9 1.7.157.1:1824, Accounting-response, len 20
The following example shows how to enable debugging of RADIUS accounting collection:
Router# debug radius accounting Radius Radius Radius Radius Radius Radius Radius Radius Radius protocol debugging is on protocol brief debugging is off protocol verbose debugging is off packet hex dump debugging is off packet protocol (authentication) debugging is off packet protocol (accounting) debugging is on packet retransmission debugging is off server fail-over debugging is off elog debugging is off
Related Commands
Description Displays information on accountable events as they occur. Displays information on AAA/TACACS+ authentication.
DB-2110
December 2010
Syntax Description
Displays error messages about failed client authentications. Displays error messages about the local authentication server. Displays the content of the RADIUS packets that are sent and received.
Defaults
Command Modes
Command History
Modification This command was introduced on Cisco Aironet Access Point 1200 and Cisco Aironet Access Point 1100. This command was implemented on the following platforms: Cisco 2600XM, Cisco 2691, Cisco 2811, Cisco 2821, Cisco 2851, Cisco 3700, and Cisco 3800 series routers. This command was integrated into Cisco IOS Release 12.4(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.4(2)T 12.2SX
Usage Guidelines
Use this command to control the display of debug messages for the local authentication server.
Examples
The following command shows how to display messages regarding failed client authentication:
Router# debug radius local-server client
Related Commands
Description Clears the statistics display or unblocks a user. Specifies up to 20 SSIDs to be used by a user group.
show radius local-server statistics Displays statistics for a local network access server.
DB-2111
Description Authorizes a user to authenticate using the local authentication server. Specifies a VLAN to be used by members of a user group.
DB-2112
December 2010
debug radius-proxy
To display debugging messages for Intelligent Service Gateway (ISG) RADIUS proxy functionality, use the debug radius-proxy command in privileged EXEC mode. To disable debugging, use the no form of this command. debug radius-proxy {events | errors} no debug radius-proxy {events | errors}
Syntax Description
events errors
Displays debug messages related to ISG RADIUS proxy events. Displays debug messages related to ISG RADIUS proxy errors.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, only use debug commands to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network flows and fewer users.
Examples
The following example shows output for the debug radius-proxy command with the events keyword:
Router# debug radius-proxy events *Nov 7 *Nov 7 *Nov 7 *Nov 7 Name:aa *Nov 7 *Nov 7 *Nov 7 *Nov 7 *Nov 7 07:53:11.411: 07:53:11.411: 07:53:11.411: 07:53:11.411: 07:53:11.411: 07:53:11.411: 07:53:11.411: 07:53:11.411: 07:53:11.411: RP-EVENT: RP-EVENT: RP-EVENT: RP-EVENT: RP-EVENT: RP-EVENT: RP-EVENT: RP-EVENT: RP-EVENT: Parse Parse Parse Found Request: Request: Request: matching Username = 12345679@cisco Caller ID = 12345679@cisco NAS id = localhost context for user Caller ID:12345679@cisco
Received event client Access-Request in state activated User Caller ID:12345679@cisco Name:12 re-authenticating Forwarding Request to method list (handle=1979711512) Sending request to server group EAP State changed activated --> wait for Access-Response
DB-2113
debug rai
To enable debugging for Resource Allocation Indication (RAI), use the debug rai command in privileged EXEC mode. To disable debugging for RAI, use the no form of this command. debug rai no debug rai
Syntax Description
Command Default
Debugging is disabled.
Command Modes
Command History
Release 15.1(2)T
Usage Guidelines
You can use the debug rai command along with the debug ccsip all command to get the complete debugging information for RAI.
Examples
Related Commands
Description Configures periodic reporting parameters for gateway resource entities. Configures the SIP RAI mechanism. Configures parameters for monitoring resources, use the resource command in voice-class configuration mode.
DB-2114
December 2010
Description Displays the resource group configuration information for a specific resource group or all resource groups. Enters voice-class configuration mode and assigns an identification tag number for a resource group.
DB-2115
debug ras
To display the types and addressing of Registration, Admission and Status (RAS) messages sent and received, use the debug ras command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ras no debug ras
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco AS5850 universal access router. This command was integrated into Cisco IOS Release 12.2(11)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug ras command to display the types and addressing of RAS messages sent and received. The debug output lists the message type using mnemonics defined in International Telecommunications Union-Telecommunication (ITU-T) specification H.225.
Examples
In the following output, gateway GW13.cisco.com sends a RAS registration request (RRQ) message to gatekeeper GK15.cisco.com at IP address 10.9.53.15. GW13.cisco.com then receives a registration confirmation (RCF) message from the gatekeeper. If there is no response, it could mean that the gatekeeper is offline or improperly addressed. If you receive a reject (RRJ) message, it could mean that the gatekeeper is unable to handle another gateway or that the registration information is incorrect.
Router# debug ras *Mar 13 19:53:34.231: *Mar 13 19:53:34.231: *Mar 13 19:53:34.247: *Mar 13 19:53:34.251: RASlib::ras_sendto:msg length 105 from 10.9.53.13:8658 to 10.9.53.15:1719 RASLib::RASSendRRQ:RRQ (seq# 36939) sent to 10.9.53.15 RASLib::RASRecvData:successfully rcvd message of length 105 from 10.9.53.15:1719 RASLib::RASRecvData:RCF (seq# 36939) rcvd from [10.9.53.15:1719] on sock [0x6168356C]
DB-2116
December 2010
Syntax Description
Displays debug information about the configuration. Displays information about the redundancy groups configuration errors. Displays information about the redundancy groups configuration. Displays information about the redundancy groups configuration functions entered.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group config all command:
Router# debug redundancy application group config all RG config all debugging is on
Related Commands
Command debug redundancy application group media debug redundancy application group protocol debug redundancy application group rii debug redundancy application group transport debug redundancy application group vp
Displays the redundancy application group RII information. Displays the redundancy application group transport information.
DB-2117
Syntax Description
Displays fault information of a redundancy group. Displays error information of a redundancy groups. Displays event information of a redundancy group. Displays fault events information of a redundancy group. Displays fault functions information of a redundancy group.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group faults error command:
Router# debug redundancy application group faults error RG Faults error debugging is on
Related Commands
Command debug redundancy application group config debug redundancy application group media debug redundancy application group protocol debug redundancy application group rii
DB-2118
December 2010
Command debug redundancy application group transport debug redundancy application group vp
DB-2119
Syntax Description
Displays media information of a redundancy group. Displays media error information of a redundancy group. Displays media events information of a redundancy group. Displays media neighbor (nbr) information of a redundancy group. Displays media packets information of a redundancy group. Displays the incoming packets information. Displays the outgoing packets information. Displays information about redundancy group media timer events.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group media timer command:
Router# debug redundancy application group media timer RG Media timer debugging is on
Related Commands
Command debug redundancy application group config debug redundancy application group protocol debug redundancy application group rii
DB-2120
December 2010
Command debug redundancy application group transport debug redundancy application group vp
DB-2121
Syntax Description
Displays protocol information of a redundancy group. Displays event details of a redundancy group. Displays protocol error information of a redundancy group. Displays protocol events information of a redundancy group. Displays protocol media events information of a redundancy group. Displays protocol peer information of a redundancy group.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group protocol peer command:
Router# debug redundancy application group protocol peer RG Protocol peer debugging is on
Related Commands
Command debug redundancy application group config debug redundancy application group media debug redundancy application group protocol debug redundancy application group rii
DB-2122
December 2010
Command debug redundancy application group transport debug redundancy application group vp
DB-2123
Syntax Description
error event
Displays RII error information of a redundancy group. Displays RII event information of a redundancy group.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group rii event command:
Router# debug redundancy application group rii event RG RII events debugging is on
Related Commands
Command debug redundancy application group config debug redundancy application group media debug redundancy application group protocol debug redundancy application group vp
DB-2124
December 2010
Syntax Description
Displays transport information of a redundancy group. Displays transport error information of a redundancy group. Displays transport event information of a redundancy group. Displays transport packet information of a redundancy group. Displays transport timer information of a redundancy group. Displays transport trace information of a redundancy group.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group transport trace command:
Router# debug redundancy application group transport trace RG Transport trace debugging is on
Related Commands
Command debug redundancy application group config debug redundancy application group media debug redundancy application group protocol debug redundancy application group rii
DB-2125
Syntax Description
error event
Displays VP error information of a redundancy group. Displays VP event information of a redundancy group.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group vp event command:
Router# debug redundancy application group vp event RG VP events debugging is on
Related Commands
Command debug redundancy application group config debug redundancy application group media debug redundancy application group protocol debug redundancy application group rii debug redundancy application group transport
Displays the redundancy application group RII information. Displays the redundancy application group transport information.
DB-2126
December 2010
Syntax Description
Displays redundancy facility (RF) enhanced high system availability (EHSA) information. Displays RF errors. Displays RF feasible successor metrics (FSM) events. Displays RF keepalive events. Displays RF messaging events. Displays RF progression events. Displays RF status events. Displays RF timer events.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was introduced on Cisco 10000 series Internet routers. This command was introduced on Cisco 7500, 10000, and 12000 series Internet routers. This command was integrated into Cisco IOS Release 12.2(18)S on Cisco 7500 series routers. Support was added for the Cisco 7304 router. The Cisco 7500 series router is not supported in Cisco IOS Release 12.2(20)S. Support for this command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-2127
Syntax Description
Displays debug information about configuration. Displays information about the redundancy groups configuration errors. Displays information about the redundancy groups configuration . Displays information about the redundancy groups configuration functions entered.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group config all command:
Router# debug redundancy application group config all RG config all debugging is on
Related Commands
Command debug redundancy application group media debug redundancy application group protocol debug redundancy application group RII debug redundancy application group transport debug redundancy application group VP
Displays the redundancy application group RII information. Displays the redundancy application group transport information.
DB-2128
December 2010
Syntax Description
Displays fault information of a redundancy group. Displays error information of a redundancy groups. Displaysevent information of a redundancy group. Displays fault events information of a redundancy group. Displays fault functions information of a redundancy group.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group faults error command:
Router# debug redundancy application group faults error RG Faults error debugging is on
Related Commands
Command redundancy application group config debug redundancy application group media debug redundancy application group protocol debug redundancy application group rii
DB-2129
Command debug redundancy application group transport debug redundancy application group vp
DB-2130
December 2010
Syntax Description
Displays media information of a redundany group. Displays media errors information of a redundany group. Displays media events information of a redundany group. Displays media neighbor (nbr) information of a redundany group. Displays media packets information of a redundany group. Displays the incoming packets information. Displays the outgoing packets information. Displays media timer events information about redundancy group media timer events.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group media timer command:
Router# debug redundancy application group media timer RG Media timer debugging is on
Related Commands
Command redundancy application group config debug redundancy application group protocol debug redundancy application group rii
DB-2131
Command debug redundancy application group transport debug redundancy application group vp redundancy application group config debug redundancy application group media debug redundancy application group protocol
Displays the redundancy application group VP information. Displays the redundancy group application configuration.
DB-2132
December 2010
Syntax Description
Displays protocol information of a redundancy group. Displays event details of a redundancy group. Displays protocol error information of a redundancy group. Displays protocol events information of a redundancy group. Displays protocol media events information of a redundancy group. Displays protocol peer information of a redundancy group.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group protocol peer command:
Router# debug redundancy application group protocol peer RG Protocol peer debugging is on
Related Commands
Command redundancy application group config debug redundancy application group protocol debug redundancy application group rii debug redundancy application group transport
Displays the redundancy application group RII information. Displays the redundancy application group transport information.
DB-2133
Command debug redundancy application group vp redundancy application group config debug redundancy application group media redundancy application group config debug redundancy application group protocol
Description Displays the redundancy application group VP information. Displays the redundancy group application configuration.
DB-2134
December 2010
Syntax Description
error event
Displays RII errors information about the redundancy groups . Dispalys information about the redundancy groups RII events.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group rii event command:
Router# debug redundancy application group rii event RG RII events debugging is on
Related Commands
Command redundancy application group config debug redundancy application group protocol debug redundancy application group rii debug redundancy application group vp redundancy application group config
Displays the redundancy group application group RII information. Displays the redundancy group application group VP information. Displays the redundancy group application configuration.
DB-2135
Command debug redundancy application group media debug redundancy application group protocol
DB-2136
December 2010
Syntax Description
Displays transport information of a redundancy group. Displays ransport error information of a redundancy group. Displays transport event information of a redundancy group. Displays transport packet information of a redundancy group. Displays transport timer information of a redundancy group. Displays transport trace information of a redundancy group.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group transport trace command:
Router# debug redundancy application group transport trace
Related Commands
Command redundancy application group config debug redundancy application group protocol debug redundancy application group rii debug redundancy application group transport
Displays the redundancy application group RII information. Displays the redundancy application group transport information.
DB-2137
Command redundancy application group config debug redundancy application group media debug redundancy application group protocol
DB-2138
December 2010
Syntax Description
error event
Displays VP errors information of a redundancy group. Displays VP event information of a redundancy group.
Command Modes
Command History
Examples
The following is sample output from the debug redundancy application group vp event command:
Router# debug redundancy application group vp event RG VP events debugging is on
Related Commands
Command redundancy application group config debug redundancy application group protocol debug redundancy application group rii debug redundancy application group transport redundancy application group config debug redundancy application group media
Displays the redundancy application group RII information. Displays the redundancy application group transport information.
DB-2139
Command debug redundancy application group protocol redundancy application group config
DB-2140
December 2010
Syntax Description
Finite-state-machine events. Hardware lines. Master (active rather than standby) route-switch-controller (RSC). RSCs mode: classic-split or handover-split. Redundancy-related client-application information.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(11)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the master form of the command to view redundancy-related debug entries. All debug entries continue to be logged even if you do not specify an option here, and you can always use the show redundancy debug-log command to view them.
Examples
The output from this command consists of event announcements that can be used by authorized troubleshooting personnel.
Related Commands
DB-2141
debug registry
To turn on the debugging output for registry events or errors when Cisco IOS Software Modularity software is running, use the debug registry command in privileged EXEC mode. To turn off debugging output, use the no form of this command or the undebug command. debug registry {events | errors} [process-name | pid] no debug registry {events | errors} [process-name | pid]
Syntax Description
Displays debugging messages about registry event messages. Displays debugging messages about registry error messages. (Optional) Process name. (Optional) Process ID. Number in the range from 1 to 4294967295.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced to support Software Modularity images. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug registry command to troubleshoot Software Modularity registry operations.
Caution
Use any debugging command with caution because the volume of generated output can slow or stop the router operations. We recommend that this command be used only under the supervision of a Cisco engineer.
Examples
The following example turns on debugging messages for Software Modularity registry events for the TCP process:
Router# debug registry events tcp.proc Debug registry events debugging is on
The following example turns on debugging messages for Software Modularity registry errors:
Router# debug registry errors Debug registry errors debugging is on
DB-2142
December 2010
Syntax Description
owner resource-owner-name
Command Default
Disabled
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SB
Examples
The following example shows different instances of the debug resource policy notification command:
Router# debug resource policy notification Enabled notif. debugs on all owners
DB-2143
Enabled notif. debugs on owner 'cpu' Router# no debug resource manager notification owner cpu Disabled notif. debugs on owner 'cpu' Router# debug resource manager notification owner memory Enabled notif. debugs on owner 'memory' Router# no debug resource manager notification owner memory Disabled notif. debugs on owner 'memory' Router# debug resource manager notification owner Buffer Enabled notif. debugs on owner 'Buffer' Router# no debug resource manager notification owner Buffer Disabled notif. debugs on owner 'Buffer' Router# no debug resource manager notification owner Buffer Disabled notif. debugs on owner 'Buffer'
Related Commands
Description Displays the resource policy registration debug information for the ERM resources.
DB-2144
December 2010
Syntax Description
Command Default
Disabled
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SB
Examples
The following example shows output from the debug resource policy registration command:
Router# debug resource policy registration Registrations debugging is on
Related Commands
Description Displays the resource policy notification debug information for the ERM resources.
DB-2145
debug resource-pool
To see and trace resource pool management activity, use the debug resource-pool command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug resource-pool no debug resource-pool
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Enter the debug resource-pool command to see and trace resource pool management activity. Table 294 describes the resource pooling states.
Table 294 Resource Pooling States
Description No call activity. Call waiting for authorization, message sent to authentication, authorization, and accounting (AAA). Call authorized, resource-grp-mgr allocating. Resource allocated, connection acknowledgment sent to signalling state. Call should get connected and become active. Signalling module disconnected call while in RM_RES_AUTHOR. Waiting for authorization response from AAA. Signalling module disconnected call while in RM_RES_ALLOCATING. Waiting for resource allocation response from resource-group manager.
RM_RES_REQ_IDLE
DB-2146
December 2010
Table 294
State RM_DNIS_AUTHOR
Description An intermediate state before proceeding with Route Processor Module (RPM) authorization.
RM_DNIS_AUTH_SUCCEEDED Dialed number identification service (DNIS) authorization succeeded. RM_DNIS_RES_ALLOCATED RM_DNIS_AUTH_REQ_IDLE RM_DNIS_AUTHOR_FAIL RM_DNIS_RES_ALLOC_SUCC ESS RM_DNIS_RES_ALLOC_FAIL RM_DNIS_RPM_REQUEST DNIS resource allocated. DNIS authorization request idle. DNIS authorization failed. DNIS resource allocation succeeded. DNIS resource allocation failed. DNIS resource pool management requested.
You can use the resource pool state to isolate problems. For example, if a call fails authorization in the RM_RES_AUTHOR state, investigate further with AAA authorization debugs to determine whether the problem lies in the resource-pool manager, AAA, or dispatcher.
Examples
The following example shows different instances where you can use the debug resource-pool command:
Router# debug resource-pool RM general debugging is on Router# show debug General OS: AAA Authorization debugging is on Resource Pool: resource-pool general debugging is on Router # Router #ping 21.1.1.10 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 21.1.1.10, timeout is 2 seconds: *Jan 8 00:10:30.358: RM state:RM_IDLE event:DIALER_INCALL DS0:0:0:0:1 *Jan 8 00:10:30.358: RM: event incoming call /* An incoming call is received by RM */ *Jan 8 00:10:30.358: RM state:RM_DNIS_AUTHOR event:RM_DNIS_RPM_REQUEST DS0:0:0:0:1 /* Receives an event notifying to proceed with RPM authorization while in DNIS authorization state */ *Jan *Jan 8 00:10:30.358: RM:RPM event incoming call 8 00:10:30.358: RPM profile cp1 found matching for the incoming call, in
DB-2147
resource
*Jan 8 00:10:30.358: Allocated resource from res_group isdn1 *Jan 8 00:10:30.358: RM:RPM profile "cp1", allocated resource "isdn1" successfully *Jan 8 00:10:30.358: RM state:RM_RPM_RES_ALLOCATING event:RM_RPM_RES_ALLOC_SUCCESS DS0:0:0:0:1 /* Resource allocation sucess event received while attempting to allocate a resource */ *Jan 8 00:10:30.358: Se0:1 AAA/ACCT/RM: doing resource-allocated (local) (nothing to do) *Jan 8 00:10:30.366: %LINK-3-UPDOWN: Interface Serial0:1, changed state to up *Jan 8 00:10:30.370: %LINK-3-UPDOWN: Interface Serial0:1, changed state to down *Jan 8 00:10:30.570: Se0:1 AAA/ACCT/RM: doing resource-update (local) cp1 (nothing to do) *Jan 8 00:10:30.578: %LINK-3-UPDOWN: I.nterface Serial0:0, changed state to up *Jan 8 00:10:30.582: %DIALER-6-BIND: Interface Serial0:0 bound to profile Dialer0... Success rate is 0 percent (0/5) Router # *Jan 8 00:10:36.662: %ISDN-6-CONNECT: Interface Serial0:0 is now connected to 71017 *Jan 8 00:10:52.990: %DIALER-6-UNBIND: Interface Serial0:0 unbound from profile Dialer0 *Jan 8 00:10:52.990: %ISDN-6-DISCONNECT: Interface Serial0:0 disconnected from 71017 , call lasted 22 seconds *Jan 8 00:10:53.206: %LINK-3-UPDOWN: Interface Serial0:0, changed state to down *Jan 8 00:10:53.206: %ISDN-6-DISCONNECT: Interface Serial0:1 disconnected from unknown , call lasted 22 seconds *Jan 8 00:10:53.626: RM state:RM_RPM_RES_ALLOCATED event:DIALER_DISCON DS0:0:0:0:1 /* Received Disconnect event from signalling stack has a resource allocated. */ *Jan 8 00:10:53.626: RM:RPM event call drop for a call which
/* RM processing the disconnect event */ *Jan 8 00:10:53.626: Deallocated resource from res_group isdn1 *Jan 8 00:10:53.626: RM state:RM_RPM_DISCONNECTING event:RM_RPM_DISC_ACK DS0:0:0:0:1 /* An intermediate state while the DISCONNECT event is being processed by external servers, before RM goes back into IDLE state. */
Description Resource manager state that displays no active calls. Resource authorization state.
DB-2148
December 2010
Table 295
Field RES_AUTHOR_SUCCESS DS0: shelf:slot:port:channel Allocated resource from res_group RM profile <x>, allocated resource <x> RM state: RM_RES_ALLOCATING
Description Actual physical resource that is used Physical resource group that accepts the call. Specific customer profile and resource group names used to accept the call. Resource manager state that unifies a call with a physical resource.
DB-2149
debug rif
To display information on entries entering and leaving the routing information field (RIF) cache, use the debug rif command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug rif no debug rif
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
In order to use the debug rif command to display traffic source-routed through an interface, fast switching of source route bridging (SRB) frames must first be disabled with the no source-bridge route-cache interface configuration command.
Examples
The first line of output is an example of a RIF entry for an interface configured for SDLC Logical Link Control (SDLLC) or Local-Ack. Table 296 describes significant fields shown in the display.
Table 296 debug rif Field Descriptions
Description This message describes RIF debugging output. Update checking. The entry is being updated; the timer is set to zero (0). Destination MAC address. Source MAC address. This field contains values of zero (0000.0000.0000) in a non-SDLLC or non-Local-Ack entry.
DB-2150
December 2010
S2559
RIF: U chk da=9000.5a59.04f9,sa=0110.2222.33c1 [4880.3201.00A1.0050] type 8 on static/remote/0 RIF: U chk da=0000.3080.4aed,sa=0000.0000.0000 [] type 8 on TokenRing0/0 RIF: U add 1000.5a59.04f9 [4880.3201.00A1.0050] type 8 RIF: L checking da=0000.3080.4aed, sa=0000.0000.0000 RIF: rcvd TEST response from 9000.5a59.04f9 RIF: U upd da=1000.5a59.04f9,sa=0110.2222.33c1 [4880.3201.00A1.0050] RIF: rcvd XID response from 9000.5a59.04f9 SR1: sent XID response to 9000.5a59.04f9
Table 296
Description RIF string. This field is blank (null RIF) in a non-SDLLC or non-Local-Ack entry. Possible values follow:
0Null entry 1This entry was learned from a particular Token Ring port (interface) 2Statically configured 4Statically configured for a remote interface 8This entry is to be aged 16This entry (which has been learned from a remote interface) is to be aged 32This entry is not to be aged 64This interface is to be used by LAN Network Manager (and is not to be aged)
on static/remote/0
This route was learned from a real Token Ring port, in contrast to a virtual ring.
The following line of output is an example of a RIF entry for an interface that is not configured for SDLLC or Local-Ack:
RIF: U chk da=0000.3080.4aed,sa=0000.0000.0000 [] type 8 on TokenRing0/0
Notice that the source address contains only zero values (0000.0000.0000), and that the RIF string is null ([ ]). The last element in the entry indicates that this route was learned from a virtual ring, rather than a real Token Ring port. The following line shows that a new entry has been added to the RIF cache:
RIF: U add 1000.5a59.04f9 [4880.3201.00A1.0050] type 8
The following line shows that a RIF cache lookup operation has taken place:
RIF: L checking da=0000.3080.4aed, sa=0000.0000.0000
The following line shows that a TEST response from address 9000.5a59.04f9 was inserted into the RIF cache:
RIF: rcvd TEST response from 9000.5a59.04f9
The following line shows that the RIF entry for this route has been found and updated:
RIF: U upd da=1000.5a59.04f9,sa=0110.2222.33c1 [4880.3201.00A1.0050]
The following line shows that an XID response from this address was inserted into the RIF cache:
RIF: rcvd XID response from 9000.5a59.04f9
The following line shows that the router sent an XID response to this address:
SR1: sent XID response to 9000.5a59.04f9
DB-2151
Table 297 explains the other possible lines of debug rif command output.
Table 297 Additional debug rif Field Descriptions
Description Router/bridge wanted to send a packet to address but did not find it in the RIF cache. It sent an XID explorer packet to determine which RIF it should use. The attempted packet is dropped. Similar to the previous description; however, a buffer in which to build the XID packet could not be obtained. Packets RIF was too short to be valid. Packets RIF exceeded the maximum size allowed and was rejected. The maximum size is 18 bytes. RIF entry for this router/bridges interface has been updated. RIF entry that would have updated an interface corresponding to one of this routers interfaces. RIF entry for address has been added to the RIF cache. No memory to add a RIF entry for address. RIF entry for address has been forcibly removed. RIF entry for address has been removed because of a RIF cache flush. RIF entry for address has been aged out of the RIF cache.
RIF: U remote rif too small <rif> RIF: U rej <address> too big <rif> RIF: U upd interface <address> RIF: U ign <address> interface update RIF: U add <address> <rif> RIF: U no memory to add rif for <address> RIF: removing rif entry for <address, type code> RIF: flushed <address> RIF: expired <address>
Related Commands
DB-2152
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is especially helpful for policy routing with dCEF switching. This command displays a summary of one-way IPC messages from the RP to the VIP about NetFlow policy routing. If you execute this command on the RP, the messages are shown as Sent. If you execute this command on the VIP console, the IPC messages are shown as Received.
Examples
The following is sample output from the debug route-map ipc command executed at the RP:
Router# debug route-map ipc Routemap related IPC debugging is on Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# ip cef distributed Router(config)#^Z Router# RM-IPC: RM-IPC: RM-IPC: RM-IPC: RM-IPC: RM-IPC: Clean routemap config in slot 0 Sent clean-all-routemaps; len 12 Download all policy-routing related routemap config to slot 0 Sent add routemap test(seq:10); n_len 5; len 17 Sent add acl 1 of routemap test(seq:10); len 21 Sent add min 10 max 300 of routemap test(seq:10); len 24
DB-2153
preced 1 of routemap test(seq:10); len 17 tos 4 of routemap test(seq:10); len 17 nexthop 50.0.0.8 of routemap test(seq:10); len 20 default nexthop 50.0.0.9 of routemap test(seq:10); len 20 interface Ethernet0/0/3(5) of routemap test(seq:10); len 20 default interface Ethernet0/0/2(4) of routemap test(seq:10); len 20
The following is sample output from the debug route-map ipc command executed at the VIP:
VIP-Slot0# debug route-map ipc Routemap related IPC debugging is on VIP-Slot0# RM-IPC: Rcvd RM-IPC: Rcvd RM-IPC: Rcvd RM-IPC: Rcvd RM-IPC: Rcvd RM-IPC: Rcvd RP-IPC: Rcvd RP-IPC: Rcvd RM-IPC: Rcvd RM-IPC: Rcvd
clean-all-routemaps; len 12 add routemap test(seq:10); n_len 5; len 17 add acl 1 of routemap test(seq:10); len 21 add min 10 max 300 of routemap test(seq:10); len 24 add preced 1 of routemap test(seq:10); len 17 add tos 4 of routemap test(seq:10); len 17 add nexthop 50.0.0.8 of routemap test(seq:10); len 20 add default nexthop 50.0.0.9 of routemap test(seq:10); len 20 add interface Ethernet0/3 of routemap tes; len 20 add default interface Ethernet0/2 of routemap test(seq:10); len 20
DB-2154
December 2010
Syntax Description
Provides information for all calls. Provides information for H.323 calls. Provides information for Session Initiation Protocol (SIP) calls.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows debugging output for two calls. The first is a leg 3 SIP call, and the second is a leg 3 H.323 call:
Router# debug rpms-proc preauth all All RPMS Process preauth tracing is enabled Feb 10 14:00:07.236: Entering rpms_proc_print_preauth_req Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 14:00:07.236: Request = 0 14:00:07.236: Preauth id = 8 14:00:07.236: EndPt Type = 1 14:00:07.236: EndPt = 192.168.80.70 14:00:07.236: Resource Service = 1 14:00:07.236: Call_origin = answer 14:00:07.236: Call_type = voip 14:00:07.236: Calling_num = 2220001 14:00:07.236: Called_num = 1120001 14:00:07.236: Protocol = 1 14:00:07.236:rpms_proc_create_node:Created node with preauth_id = 8 14:00:07.236:rpms_proc_send_aaa_req:uid got is 19 14:00:07.240:rpms_proc_preauth_response:Context is for preauth_id 8, aaa_uid 19 14:00:07.240:rpms_proc_preauth_response:Deleting Tree node for preauth id 8 uid 19 14:00:07.284: Entering rpms_proc_print_preauth_req
DB-2155
Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb
10 10 10 10 10 10 10 10 10 10 10 10 10
14:00:07.284: Preauth id = 9 14:00:07.284: EndPt Type = 1 14:00:07.284: EndPt = 192.168.81.102 14:00:07.284: Resource Service = 1 14:00:07.284: Call_origin = answer 14:00:07.284: Call_type = voip 14:00:07.284: Calling_num = 2210001 14:00:07.284: Called_num = 1#1110001 14:00:07.284: Protocol = 0 14:00:07.288:rpms_proc_create_node:Created node with preauth_id = 9 14:00:07.288:rpms_proc_send_aaa_req:uid got is 21 14:00:07.300:rpms_proc_preauth_response:Context is for preauth_id 9, aaa_uid 21 14:00:07.300:rpms_proc_preauth_response:Deleting Tree node for preauth id 9 uid 21
The following example shows the output for a single leg 3 H.323 call:
Router# debug rpms-proc preauth h323 RPMS Process H323 preauth tracing is enabled Feb 10 14:04:57.867: Entering rpms_proc_print_preauth_req Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb 10 10 10 10 10 10 10 10 10 10 10 10 10 10 14:04:57.867: Request = 0 14:04:57.867: Preauth id = 10 14:04:57.867: EndPt Type = 1 14:04:57.867: EndPt = 192.168.81.102 14:04:57.867: Resource Service = 1 14:04:57.867: Call_origin = answer 14:04:57.867: Call_type = voip 14:04:57.867: Calling_num = 2210001 14:04:57.867: Called_num = 1#1110001 14:04:57.867: Protocol = 0 14:04:57.867:rpms_proc_create_node:Created node with preauth_id = 10 14:04:57.867:rpms_proc_send_aaa_req:uid got is 25 14:04:57.875:rpms_proc_preauth_response:Context is for preauth_id 10, aaa_uid 25 14:04:57.875:rpms_proc_preauth_response:Deleting Tree node for preauth id 10 uid 25
The following example shows output for a single leg 3 SIP call:
Router# debug rpms-proc preauth sip RPMS Process SIP preauth tracing is enabled Feb 10 14:08:02.880: Entering rpms_proc_print_preauth_req Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb 10 10 10 10 10 10 10 10 10 10 10 10 10 10 14:08:02.880: Request = 0 14:08:02.880: Preauth id = 11 14:08:02.880: EndPt Type = 1 14:08:02.880: EndPt = 192.168.80.70 14:08:02.880: Resource Service = 1 14:08:02.880: Call_origin = answer 14:08:02.880: Call_type = voip 14:08:02.880: Calling_num = 2220001 14:08:02.880: Called_num = 1120001 14:08:02.880: Protocol = 1 14:08:02.880:rpms_proc_create_node:Created node with preauth_id = 11 14:08:02.880:rpms_proc_send_aaa_req:uid got is 28 14:08:02.888:rpms_proc_preauth_response:Context is for preauth_id 11, aaa_uid 28 14:08:02.888:rpms_proc_preauth_response:Deleting Tree node for preauth id 11 uid 28
DB-2156
December 2010
Field Request Preauth id EndPt Type EndPt Resource Service Call_origin Call_type Calling_num Called_num Protocol function reports
Description Request Type0 for preauthentication, 1 for disconnect. Identifier for the preauthentication request. Call Origin End Point Type1 for IP address, 2 for Interzone ClearToken (IZCT) value. Call Origin End Point ValueAn IP address or IZCT value. Resource Service Type1 for Reservation, 2 for Query. Answer. Voice over IP (VoIP). Calling party number (calling line identification, or CLID). Called party number (dialed number identification service, or DNIS). 0 for H.323, 1 for SIP. Various identifiers and status reports for executed functions.
DB-2157
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco MC3810 and Cisco 3600 series routers (except the Cisco 3620). This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Be careful when you use this command because it can result in console flooding and reduced voice quality.
Examples
The following example shows a debug trace for RTP SPI errors, sessions, and in/out functions on a gateway:
Router# debug rtpspi all RTP SPI Error, Session and function in/out tracings are enabled. *Mar *Mar *Mar *Mar 1 1 1 1 00:38:59.381:rtpspi_allocate_rtp_port:Entered. 00:38:59.381:rtpspi_allocate_rtp_port:allocated RTP port 16544 00:38:59.381:rtpspi_allocate_rtp_port:Success. port = 16544. Leaving. 00:38:59.381:rtpspi_call_setup_request:entered. Call Id = 5, dest = 0.0.0.0; callInfo: final dest flag = 0, rtp_session_mode = 0x2, local_ip_addrs = 0x5000001,remote_ip_addrs = 0x0, local rtp port = 16544, remote rtp port = 0
DB-2158
December 2010
00:38:59.381:rtpspi_call_setup_request:spi_info copied for rtpspi_app_data_t. 00:38:59.385:rtpspi_call_setup_request:leaving 00:38:59.385:rtpspi_call_setup() entered 00:38:59.385:rtpspi_initialize_ccb:Entered 00:38:59.385:rtpspi_initialize_ccb:leaving 00:38:59.385:rtpspi_call_setup:rtp_session_mode = 0x2 00:38:59.385:rtpspi_call_setup:mode = CC_CALL_NORMAL. destianation number = 0.0.0.0 *Mar 1 00:38:59.385:rtpspi_call_setup:Passed local_ip_addrs=0x5000001 *Mar 1 00:38:59.385:rtpspi_call_setup:Passed local_rtp_port = 16544 *Mar 1 00:38:59.385:rtpspi_call_setup:Saved RTCP Session = 0x1AF57E0 *Mar 1 00:38:59.385:rtpspi_call_setup:Passed remote rtp port = 0. *Mar 1 00:38:59.389:rtpspi_start_rtcp_session:entered. rtp session mode=0x2, rem rtp=0, rem ip=0x0 *Mar 1 00:38:59.389:rtpspi_get_rtcp_mode:entered. rtp_mode = 0x2 *Mar 1 00:38:59.389:rtpspi_start_rtcp_session:Starting RTCP session. Local IP addr = 0x5000001, Remote IP addr = 0x0, Local RTP port = 16544, Remote RTP port = 0, mode = 0x2 *Mar 1 00:38:59.389:rtpspi_start_rtcp_session:RTP Session creation Success. *Mar 1 00:38:59.389:rtpspi_call_setup:RTP Session creation Success. *Mar 1 00:38:59.389:rtpspi_call_setup:calling cc_api_call_connected() *Mar 1 00:38:59.389:rtpspi_call_setup:Leaving. *Mar 1 00:38:59.393:rtpspi_bridge:entered. conf id = 1, src i/f = 0x1859E88, dest i/f = 0x1964EEC, src call id = 5, dest call id = 4 call info = 0x1919140, xmit fn = 0xDA7494, tag = 0 *Mar 1 00:38:59.393:rtpspi_get_rtcp_mode:entered. rtp_mode = 0x2 *Mar 1 00:38:59.393:rtpspi_modify_rtcp_session_parameters():xmit fn=0xDA7494, dstIF=0x1964EEC, dstCallID=4, voip_mode=0x2, rtp_mode=0x2, ssrc_status=0 *Mar 1 00:38:59.393:rtpspi_bridge:Calling cc_api_bridge_done() for 5(0x1AF5400) and 4(0x0). *Mar 1 00:38:59.393:rtpspi_bridge:leaving. *Mar 1 00:38:59.397:rtpspi_caps_ind:Entered. vdb = 0x1859E88 call id = 5, srcCallId = 4 *Mar 1 00:38:59.397:rtpspi_caps_ind:caps from VTSP:codec=0x83FB, codec_bytes=0x50, fax rate=0x7F, vad=0x3 modem=0x0 *Mar 1 00:38:59.397:rtpspi_get_rtcp_session_parameters():CURRENT VALUES: dstIF=0x1964EEC, dstCallID=4, current_seq_num=0x0 *Mar 1 00:38:59.397:rtpspi_get_rtcp_session_parameters():NEW VALUES: dstIF=0x1964EEC, dstCallID=4, current_seq_num=0x261C *Mar 1 00:38:59.397:rtpspi_caps_ind:Caps Used:codec=0x1, codec bytes=80, fax rate=0x1, vad=0x1, modem=0x1, dtmf_relay=0x1, seq_num_start=0x261D *Mar 1 00:38:59.397:rtpspi_caps_ind:calling cc_api_caps_ind(). *Mar 1 00:38:59.397:rtpspi_caps_ind:Returning success *Mar 1 00:38:59.397:rtpspi_caps_ack:Entered. call id = 5, srcCallId = 4 *Mar 1 00:38:59.397:rtpspi_caps_ack:leaving. *Mar 1 00:38:59.618:rtpspi_call_modify:entered. call-id=5, nominator=0x7, params=0x18DD440 *Mar 1 00:38:59.618:rtpspi_call_modify:leaving *Mar 1 00:38:59.618:rtpspi_do_call_modify:Entered. call-id = 5 *Mar 1 00:38:59.622:rtpspi_do_call_modify:Remote RTP port changed. New port=16432 *Mar 1 00:38:59.622:rtpspi_do_call_modify:Remote IP addrs changed. New IP addrs=0x6000001 *Mar 1 00:38:59.622:rtpspi_do_call_modify:new mode 2 is the same as the current mode *Mar 1 00:38:59.622:rtpspi_do_call_modify:Starting new RTCP session. *Mar 1 00:38:59.622:rtpspi_start_rtcp_session:entered. rtp session mode=0x2, rem rtp=16432, rem ip=0x6000001 *Mar 1 00:38:59.622:rtpspi_get_rtcp_mode:entered. rtp_mode = 0x2 *Mar 1 00:38:59.622:rtpspi_start_rtcp_session:Removing old RTCP session. *Mar 1 00:38:59.622:rtpspi_start_rtcp_session:Starting RTCP session. Local IP addr = 0x5000001, Remote IP addr = 0x6000001, Local RTP port = 16544, Remote RTP port = 16432, mode = 0x2 *Mar 1 00:38:59.622:rtpspi_start_rtcp_session:RTCP Timer creation Success. (5)*(5000) *Mar 1 00:38:59.622:rtpspi_start_rtcp_session:RTP Session creation Success. *Mar 1 00:38:59.622:rtpspi_do_call_modify:RTP Session creation Success. *Mar 1 00:38:59.622:rtpspi_do_call_modify:Calling cc_api_call_modify(), result=0x0 *Mar 1 00:38:59.626:rtpspi_do_call_modify:success. leaving
1 1 1 1 1 1 1
DB-2159
*Mar 1 00:39:05.019:rtpspi_call_modify:entered. call-id=5, nominator=0x7, params=0x18DD440 *Mar 1 00:39:05.019:rtpspi_call_modify:leaving *Mar 1 00:39:05.019:rtpspi_do_call_modify:Entered. call-id = 5 *Mar 1 00:39:05.019:rtpspi_do_call_modify:New remote RTP port = old rtp port = 16432 *Mar 1 00:39:05.019:rtpspi_do_call_modify:New remote IP addrs = old IP addrs = 0x6000001 *Mar 1 00:39:05.019:rtpspi_do_call_modify:Mode changed. new = 3, old = 2 *Mar 1 00:39:05.019:rtpspi_get_rtcp_mode:entered. rtp_mode = 0x3 *Mar 1 00:39:05.023:rtpspi_modify_rtcp_session_parameters():xmit fn=0xDA7494, dstIF=0x1964EEC, dstCallID=4, voip_mode=0x3, rtp_mode=0x3, ssrc_status=2 *Mar 1 00:39:05.023:rtpspi_do_call_modify:RTCP Timer start. *Mar 1 00:39:05.023:rtpspi_do_call_modify:Calling cc_api_call_modify(), result=0x0 *Mar 1 00:39:05.023:rtpspi_do_call_modify:success. leaving *Mar 1 00:40:13.786:rtpspi_bridge_drop:entered. src call-id=5, dest call-id=4, tag=0 *Mar 1 00:40:13.786:rtpspi_get_rtcp_mode:entered. rtp_mode = 0x3 *Mar 1 00:40:13.786:rtpspi_modify_rtcp_session_parameters():xmit fn=0x0, dstIF=0x0, dstCallID=0, voip_mode=0x3, rtp_mode=0x3, ssrc_status=2 *Mar 1 00:40:13.786:rtpspi_bridge_drop:leaving *Mar 1 00:40:13.790:rtpspi_call_disconnect:entered. call-id=5, cause=16, tag=0 *Mar 1 00:40:13.790:rtpspi_call_disconnect:leaving. *Mar 1 00:40:13.790:rtpspi_do_call_disconnect:Entered. call-id = 5 *Mar 1 00:40:13.790:rtpspi_do_call_disconnect:calling rtpspi_call_cleanup(). call-id=5 *Mar 1 00:40:13.794:rtpspi_call_cleanup:entered. ccb = 0x1AF5400, call-id=5, rtp port = 16544 *Mar 1 00:40:13.794:rtpspi_call_cleanup:releasing ccb cache. RTP port=16544 *Mar 1 00:40:13.794:rtpspi_store_call_history_entry():Entered. *Mar 1 00:40:13.794:rtpspi_store_call_history_entry():Leaving. *Mar 1 00:40:13.794:rtpspi_call_cleanup:RTCP Timer Stop. *Mar 1 00:40:13.794:rtpspi_call_cleanup:deallocating RTP port 16544. *Mar 1 00:40:13.794:rtpspi_free_rtcp_session:Entered. *Mar 1 00:40:13.794:rtpspi_free_rtcp_session:Success. Leaving *Mar 1 00:40:13.794::rtpspi_call_cleanup freeing ccb (0x1AF5400) *Mar 1 00:40:13.794:rtpspi_call_cleanup:leaving *Mar 1 00:40:13.794:rtpspi_do_call_disconnect:leaving
Related Commands
Command debug rtpspi errors debug rtpspi inout debug rtpspi send-nse debug sgcp errors debug sgcp events debug sgcp packet debug vtsp send-nse
Description Debugs RTP SPI errors. Debugs RTP SPI in/out functions. Triggers the RTP SPI to send a triple redundant NSE. Debugs SGCP errors. Debugs SGCP events. Debugs SGCP packets. Sends and debugs a triple redundant NSE from the DSP to a remote gateway.
DB-2160
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco MC3810 device and Cisco 3600 series routers (except the Cisco 3620). This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Be careful when you use this command because it can result in console flooding and reduced voice quality.
Examples
This example shows a debug trace for RTP SPI errors on two gateways. The following example shows the debug trace on the first gateway:
Router# debug rtpspi errors 00:54:13.272:rtpspi_do_call_modify:new mode 2 is the same as the current mode 00:54:18.738:rtpspi_do_call_modify:New remote RTP port = old rtp port = 16452 00:54:18.738:rtpspi_do_call_modify:New remote IP addrs = old IP addrs = 0x6000001
The following example shows the debug trace on the second gateway:
Router# debug rtpspi errors 00:54:08:rtpspi_process_timers:
DB-2161
00:54:08:rtpspi_process_timers:Timer 00:54:08:rtpspi_process_timers:Timer 00:54:08:rtpspi_process_timers: 00:54:08:rtpspi_process_timers:Timer 00:54:08:rtpspi_process_timers:Timer 00:54:08:rtpspi_process_timers: 00:54:08:rtpspi_process_timers:Timer 00:54:08:rtpspi_process_timers:Timer 00:54:09:rtpspi_process_timers: 00:54:09:rtpspi_process_timers:Timer 00:54:09:rtpspi_process_timers:Timer 00:54:09:rtpspi_process_timers: 00:54:09:rtpspi_process_timers:Timer 00:54:09:rtpspi_process_timers:Timer
0x1A5AF9C expired. expired for callID 0x3 0x1A5AF9C expired. expired for callID 0x3 0x1A5AF9C expired. expired for callID 0x3 0x1A5AFBC expired. expired for callID 0x3 0x1A5B364 expired. expired for callID 0x3
Related Commands
Command debug rtpspi all debug rtpspi inout debug rtpspi send-nse debug sgcp errors debug sgcp events debug sgcp packet debug vtsp send-nse
Description Debugs all RTP SPI errors, sessions, and in/out functions. Debugs RTP SPI in/out functions. Triggers the RTP SPI to send a triple redundant NSE. Debugs SGCP errors. Debugs SGCP events. Debugs SGCP packets. Sends and debugs a triple redundant NSE from the DSP to a remote gateway.
DB-2162
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco MC3810 device and Cisco 3600 series routers (except the Cisco 3620 device). This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Be careful when you use this command because it can result in console flooding and reduced voice quality.
Examples
The following example shows a debug trace for RTP SPI in/out functions on a gateway:
Router# debug rtpspi inout *Mar *Mar *Mar 1 00:57:24.565:rtpspi_allocate_rtp_port:Entered. 1 00:57:24.565:rtpspi_allocate_rtp_port:Success. port = 16520. Leaving. 1 00:57:24.565:rtpspi_call_setup_request:entered. Call Id = 9, dest = 0.0.0.0; callInfo: final dest flag = 0, rtp_session_mode = 0x2, local_ip_addrs = 0x5000001,remote_ip_addrs = 0x0, local rtp port = 16520, remote rtp port = 0 1 00:57:24.565:rtpspi_call_setup_request:spi_info copied for rtpspi_app_data_t. 1 00:57:24.565:rtpspi_call_setup_request:leaving 1 00:57:24.569:rtpspi_call_setup() entered 1 00:57:24.569:rtpspi_initialize_ccb:Entered
DB-2163
*Mar 1 00:57:24.569:rtpspi_initialize_ccb:leaving *Mar 1 00:57:24.569:rtpspi_start_rtcp_session:entered. rtp session mode=0x2, rem rtp=0, rem ip=0x0 *Mar 1 00:57:24.569:rtpspi_get_rtcp_mode:entered. rtp_mode = 0x2 *Mar 1 00:57:24.569:rtpspi_call_setup:Leaving. *Mar 1 00:57:24.573:rtpspi_bridge:entered. conf id = 3, src i/f = 0x1859E88, dest i/f = 0x1964EEC, src call id = 9, dest call id = 8 call info = 0x1919140, xmit fn = 0xDA7494, tag = 0 *Mar 1 00:57:24.573:rtpspi_get_rtcp_mode:entered. rtp_mode = 0x2 *Mar 1 00:57:24.573:rtpspi_bridge:leaving. *Mar 1 00:57:24.573:rtpspi_caps_ind:Entered. vdb = 0x1859E88 call id = 9, srcCallId = 8 *Mar 1 00:57:24.577:rtpspi_caps_ind:Returning success *Mar 1 00:57:24.577:rtpspi_caps_ack:Entered. call id = 9, srcCallId = 8 *Mar 1 00:57:24.577:rtpspi_caps_ack:leaving. *Mar 1 00:57:24.818:rtpspi_call_modify:entered. call-id=9, nominator=0x7, params=0x18DD440 *Mar 1 00:57:24.818:rtpspi_call_modify:leaving *Mar 1 00:57:24.818:rtpspi_do_call_modify:Entered. call-id = 9 *Mar 1 00:57:24.818:rtpspi_start_rtcp_session:entered. rtp session mode=0x2, rem rtp=16396, rem ip=0x6000001 *Mar 1 00:57:24.822:rtpspi_get_rtcp_mode:entered. rtp_mode = 0x2 *Mar 1 00:57:24.822:rtpspi_do_call_modify:success. leaving *Mar 1 00:57:30.296:rtpspi_call_modify:entered. call-id=9, nominator=0x7, params=0x18DD440 *Mar 1 00:57:30.296:rtpspi_call_modify:leaving *Mar 1 00:57:30.300:rtpspi_do_call_modify:Entered. call-id = 9 *Mar 1 00:57:30.300:rtpspi_get_rtcp_mode:entered. rtp_mode = 0x3 *Mar 1 00:57:30.300:rtpspi_do_call_modify:success. leaving *Mar 1 00:58:39.055:rtpspi_bridge_drop:entered. src call-id=9, dest call-id=8, tag=0 *Mar 1 00:58:39.055:rtpspi_get_rtcp_mode:entered. rtp_mode = 0x3 *Mar 1 00:58:39.055:rtpspi_bridge_drop:leaving *Mar 1 00:58:39.059:rtpspi_call_disconnect:entered. call-id=9, cause=16, tag=0 *Mar 1 00:58:39.059:rtpspi_call_disconnect:leaving. *Mar 1 00:58:39.059:rtpspi_do_call_disconnect:Entered. call-id = 9 *Mar 1 00:58:39.059:rtpspi_call_cleanup:entered. ccb = 0x1AF5400, call-id=9, rtp port = 16520 *Mar 1 00:58:39.059:rtpspi_store_call_history_entry():Entered. *Mar 1 00:58:39.059:rtpspi_store_call_history_entry():Leaving. *Mar 1 00:58:39.059:rtpspi_free_rtcp_session:Entered. *Mar 1 00:58:39.059:rtpspi_free_rtcp_session:Success. Leaving *Mar 1 00:58:39.063:rtpspi_call_cleanup:leaving *Mar 1 00:58:39.063:rtpspi_do_call_disconnect:leaving
Related Commands
Command debug rtpspi all debug rtpspi errors debug rtpspi send-nse debug sgcp errors debug sgcp events debug sgcp packet debug vtsp send-nse
Description Debugs all RTP SPI errors, sessions, and in/out functions. Debugs RTP SPI errors. Triggers the RTP SPI to send a triple redundant NSE. Debugs SGCP errors. Debugs SGCP events. Debugs SGCP packets. Sends and debugs a triple redundant NSE from the DSP to a remote gateway.
DB-2164
December 2010
Syntax Description
call-ID NSE-event-ID
Specifies the call ID of the active call. The valid range is from 0 to 65535. Specifies the NSE Event ID. The valid range is from 0 to 255.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco MC3810 device and Cisco 3600 series routers (except the Cisco 3620 router). This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows the RTP SPI software module set to send an NSE:
Router# debug rtpspi send-nse
Related Commands
Command debug rtpspi all debug rtpspi errors debug rtpspi inout debug sgcp errors debug sgcp events debug sgcp packet debug vtsp send-nse
Description Debugs all RTP SPI errors, sessions, and in/out functions. Debugs RTP SPI errors. Debugs RTP SPI in/out functions. Debugs SGCP errors. Debugs SGCP events. Debugs SGCP packets. Sends and debugs a triple redundant NSE from the DSP to a remote gateway.
DB-2165
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco MC3810 device and Cisco 3600 series routers (except the Cisco 3620 router). This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows a debug trace for RTP SPI sessions on a gateway:
Router# debug rtpspi session *Mar *Mar *Mar 1 01:01:51.593:rtpspi_allocate_rtp_port:allocated RTP port 16406 1 01:01:51.593:rtpspi_call_setup:rtp_session_mode = 0x2 1 01:01:51.593:rtpspi_call_setup:mode = CC_CALL_NORMAL. destianation number = 0.0.0.0 *Mar 1 01:01:51.593:rtpspi_call_setup:Passed local_ip_addrs=0x5000001 *Mar 1 01:01:51.593:rtpspi_call_setup:Passed local_rtp_port = 16406 *Mar 1 01:01:51.593:rtpspi_call_setup:Saved RTCP Session = 0x1AFDFBC *Mar 1 01:01:51.593:rtpspi_call_setup:Passed remote rtp port = 0. *Mar 1 01:01:51.598:rtpspi_start_rtcp_session:Starting RTCP session. Local IP addr = 0x5000001, Remote IP addr = 0x0, Local RTP port = 16406, Remote RTP port = 0, mode = 0x2 *Mar 1 01:01:51.598:rtpspi_start_rtcp_session:RTP Session creation Success. *Mar 1 01:01:51.598:rtpspi_call_setup:RTP Session creation Success. *Mar 1 01:01:51.598:rtpspi_call_setup:calling cc_api_call_connected() *Mar 1 01:01:51.598:rtpspi_modify_rtcp_session_parameters():xmit fn=0xDA7494, dstIF=0x1964EEC, dstCallID=10, voip_mode=0x2, rtp_mode=0x2, ssrc_status=0 *Mar 1 01:01:51.598:rtpspi_bridge:Calling cc_api_bridge_done() for 11(0x1AF5400) and 10(0x0). *Mar 1 01:01:51.602:rtpspi_caps_ind:caps from VTSP:codec=0x83FB, codec_bytes=0x50, fax rate=0x7F, vad=0x3 modem=0x0 *Mar 1 01:01:51.602:rtpspi_get_rtcp_session_parameters():CURRENT VALUES: dstIF=0x1964EEC, dstCallID=10, current_seq_num=0x0
DB-2166
December 2010
*Mar 1 01:01:51.602:rtpspi_get_rtcp_session_parameters():NEW VALUES: dstIF=0x1964EEC, dstCallID=10, current_seq_num=0xF1E *Mar 1 01:01:51.602:rtpspi_caps_ind:Caps Used:codec=0x1, codec bytes=80, fax rate=0x1, vad=0x1, modem=0x1, dtmf_relay=0x1, seq_num_start=0xF1F *Mar 1 01:01:51.602:rtpspi_caps_ind:calling cc_api_caps_ind(). *Mar 1 01:01:51.822:rtpspi_do_call_modify:Remote RTP port changed. New port=16498 *Mar 1 01:01:51.822:rtpspi_do_call_modify:Remote IP addrs changed. New IP addrs=0x6000001 *Mar 1 01:01:51.822:rtpspi_do_call_modify:Starting new RTCP session. *Mar 1 01:01:51.822:rtpspi_start_rtcp_session:Removing old RTCP session. *Mar 1 01:01:51.822:rtpspi_start_rtcp_session:Starting RTCP session. Local IP addr = 0x5000001, Remote IP addr = 0x6000001, Local RTP port = 16406, Remote RTP port = 16498, mode = 0x2 *Mar 1 01:01:51.822:rtpspi_start_rtcp_session:RTCP Timer creation Success. (5)*(5000) *Mar 1 01:01:51.826:rtpspi_start_rtcp_session:RTP Session creation Success. *Mar 1 01:01:51.826:rtpspi_do_call_modify:RTP Session creation Success. *Mar 1 01:01:51.826:rtpspi_do_call_modify:Calling cc_api_call_modify(), result=0x0 *Mar 1 01:01:57.296:rtpspi_do_call_modify:Mode changed. new = 3, old = 2 *Mar 1 01:01:57.296:rtpspi_modify_rtcp_session_parameters():xmit fn=0xDA7494, dstIF=0x1964EEC, dstCallID=10, voip_mode=0x3, rtp_mode=0x3, ssrc_status=2 *Mar 1 01:01:57.296:rtpspi_do_call_modify:RTCP Timer start. *Mar 1 01:01:57.296:rtpspi_do_call_modify:Calling cc_api_call_modify(), result=0x0 *Mar 1 01:03:06.108:rtpspi_modify_rtcp_session_parameters():xmit fn=0x0, dstIF=0x0, dstCallID=0, voip_mode=0x3, rtp_mode=0x3, ssrc_status=2 *Mar 1 01:03:06.112:rtpspi_do_call_disconnect:calling rtpspi_call_cleanup(). call-id=11 *Mar 1 01:03:06.112:rtpspi_call_cleanup:releasing ccb cache. RTP port=16406 *Mar 1 01:03:06.112:rtpspi_call_cleanup:RTCP Timer Stop. *Mar 1 01:03:06.112:rtpspi_call_cleanup:deallocating RTP port 16406. *Mar 1 01:03:06.112::rtpspi_call_cleanup freeing ccb (0x1AF5400)
Related Commands
Command debug rtpspi all debug rtpspi errors debug rtpspi inout debug rtpspi send-nse debug sgcp errors debug sgcp events debug sgcp packet sgcp debug vtsp send-nse
Description Debugs all RTP SPI errors, sessions, and in/out functions. Debugs RTP SPI errors. Debugs RTP SPI in/out functions. Triggers the RTP SPI to send a triple redundant NSE. Debugs SGCP errors. Debugs SGCP events. Debugs SGCP packets. Starts and allocates resources for the SCGP daemon. Sends and debugs a triple redundant NSE from the DSP to a remote gateway.
DB-2167
Effective with Cisco IOS Release 12.2(31)SB2, the debug rtr error command is replaced by the debug ip sla monitor error command. Effective with Cisco IOS Release 12.2(33)SRB, the debug rtr error command is replaced by the debug ip sla error command. See the debug ip sla monitor error and debug ip sla error commands for more information. To enable debugging output of Cisco IOS IP Service Level Agreements (SLAs) operation run-time errors, use the debug rtr error command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug rtr error [operation-number] no debug rtr error [operation-number]
Syntax Description
operation-number
(Optional) Identification number of the operation for which debugging output is to be enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified. This command was replaced by the debug ip sla monitor error command. This command was replaced by the debug ip sla monitor error command. This command was replaced by the debug ip sla error command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug rtr error command displays run-time errors. When an operation number other than 0 is specified, all run-time errors for that operation are displayed when the operation is active. When the operation number is 0, all run-time errors relating to the IP SLAs scheduler process are displayed. When no operation number is specified, all run-time errors for all active operations configured on the router are displayed.
Note
Use the debug rtr error command before using the debug rtr trace command because the debug rtr error command generates a lesser amount of debugging output.
DB-2168
December 2010
Examples
The following is sample output from the debug rtr error command. The output indicates failure because the target is not there or because the responder is not enabled on the target. All debugging output for IP SLAs (including the output from the debug rtr trace command) has the format shown in Table 299.
Router# debug rtr error May May May May May May May May May May May 5 5 5 5 5 5 5 5 5 5 5 05:00:35.483: 05:01:35.003: 05:02:34.527: 05:03:34.039: 05:04:33.563: 05:05:33.099: 05:06:32.596: 05:07:32.119: 05:08:31.643: 05:09:31.167: 05:10:30.683: control control control control control control control control control control control message message message message message message message message message message message failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1 failure:1
Field RTR 1 Error Return Code LU0 RTR Probe 1 in echoTarget on call luReceive LuApiReturnCode of InvalidHandle - invalid host name or API handle
Description Number of the operation generating the message. Message identifier indicating the error type (or error itself). Name of the process generating the message. Supplemental messages that pertain to the message identifier.
Related Commands
DB-2169
Effective with Cisco IOS Release 12.2(31)SB2, the debug rtr mpls-lsp-monitor command is replaced by the debug ip sla monitor mpls-lsp-monitor command. Effective with Cisco IOS Release 12.2(33)SRB, the debug rtr mpls-lsp-monitor command is replaced by the debug ip sla mpls-lsp-monitor command. See the debug ip sla monitor mpls-lsp-monitor and debug ip sla mpls-lsp-monitor commands for more information. To enable debugging output for the IP Service Level Agreements (SLAs) label switched path (LSP) Health Monitor, use the debug rtr mpls-lsp-monitor command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug rtr mpls-lsp-monitor [operation-number] no debug rtr mpls-lsp-monitor [operation-number]
Syntax Description
operation-number
(Optional) Number of the LSP Health Monitor operation for which the debugging output will be displayed.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was replaced by the debug ip sla monitor mpls-lsp-monitor command. This command was replaced by the debug ip sla mpls-lsp-monitor command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug rtr mpls-lsp-monitor command. This output shows that three VPNs associated with router 10.10.10.8 (red, blue, and green) were discovered and that this information was added to the LSP Health Monitor scan queue. Also, since router 10.10.10.8 is a newly discovered Border Gateway Protocol (BGP) next hop neighbor, a new IP SLAs operation for router 10.10.10.8 (Probe 100005) is being created and added to the LSP Health Monitor multioperation schedule. Even though router 10.10.10.8 belongs to three VPNs, only one IP SLAs operation is being created.
Router# debug rtr mpls-lsp-monitor
DB-2170
December 2010
SAA MPLSLM debugging for all entries is on *Aug 19 19:59: SAA MPLSLM(1):Next hop 10.10.10.8 added in AddQ *Aug 19 19:59: SAA MPLSLM(1):Next hop 10.10.10.8 added in AddQ *Aug 19 19:59: SAA MPLSLM(1):Next hop 10.10.10.8 added in AddQ *Aug 19 19:59: SAA MPLSLM(1):Adding vrf red into tree entry 10.10.10.8 *Aug 19 19:59: SAA MPLSLM(1):Adding Probe 100005 *Aug 19 19:59: SAA MPLSLM(1):Adding ProbeID 100005 to tree entry 10.10.10.8 (1) *Aug 19 19:59: SAA MPLSLM(1):Adding vrf blue into tree entry 10.10.10.8 *Aug 19 19:59: SAA MPLSLM(1):Duplicate in AddQ 10.10.10.8 *Aug 19 19:59: SAA MPLSLM(1):Adding vrf green into tree entry 10.10.10.8 *Aug 19 19:59: SAA MPLSLM(1):Duplicate in AddQ 10.10.10.8 *Aug 19 19:59: SAA MPLSLM(1):Added Probe(s) 100005 will be scheduled after 26 secs over schedule period 60
Related Commands
Description Begins configuration for an IP SLAs LSP Health Monitor operation and enters SAA MPLS configuration mode.
DB-2171
Effective with Cisco IOS Release 12.2(31)SB2, the debug rtr trace command is replaced by the debug ip sla monitor trace command. Effective with Cisco IOS Release 12.2(33)SRB, the debug rtr trace command is replaced by the debug ip sla trace command. See the debug ip sla monitor trace and debug ip sla trace commands for more information. To trace the execution of a Cisco IOS IP Service Level Agreements (SLAs) operation, use the debug rtr trace command in privileged EXEC mode. To disable trace debugging output, use the no form of this command. debug rtr trace [operation-number] no debug rtr trace [operation-number]
Syntax Description:
operation-number
(Optional) Identification number of the operation for which debugging output is to be enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified. This command was replaced by the debug ip sla monitor trace command. This command was replaced by the debug ip sla monitor trace command. This command was replaced by the debug ip sla trace command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
When an operation number other than 0 is specified, execution for that operation is traced. When the operation number is 0, the IP SLAs scheduler process is traced. When no operation number is specified, all active operations are traced. The debug rtr trace command also enables debug rtr error command for the specified operation. However, the no debug rtr trace command does not disable the debug rtr error command. You must manually disable the command by using the no debug rtr error command. All debuggng output (including debug rtr error command output) has the format shown in the debug rtr error command output example.
DB-2172
December 2010
Note
The debug rtr trace command can generate a large number of debug messages. First use the debug rtr error command, and then use the debug rtr trace on a per-operation basis.
Examples
The following is sample output from the debug rtr trace command. In this example, an operation is traced through a single operation attempt: the setup of a connection to the target, and the attempt at an echo to calculate UDP packet response time.
Router# debug rtr trace Router# RTR 1:Starting An Echo Operation - IP RTR Probe 1 May 5 05:25:08.584:rtt hash insert :3.0.0.3 3383 May 5 05:25:08.584:source=3.0.0.3(3383) dest-ip=5.0.0.1(9) May 5 05:25:08.588:sending control msg: May 5 05:25:08.588: Ver:1 ID:51 Len:52 May 5 05:25:08.592:cmd:command:RTT_CMD_UDP_PORT_ENABLE, ip:5.0.0.1, port:9, duration:5000 May 5 05:25:08.607:receiving reply May 5 05:25:08.607: Ver:1 ID:51 Len:8 May 5 05:25:08.623:local delta:8 May 5 05:25:08.627:delta from responder:1 May 5 05:25:08.627:received <16> bytes and responseTime = 3 (ms) May 5 05:25:08.631:rtt hash remove:3.0.0.3 3383RTR 1:Starting An Echo Operation - IP RTR Probe 1 May 5 05:26:08.104:rtt hash insert :3.0.0.3 2974 May 5 05:26:08.104:source=3.0.0.3(2974) dest-ip=5.0.0.1(9) May 5 05:26:08.108:sending control msg: May 5 05:26:08.108: Ver:1 ID:52 Len:52 May 5 05:26:08.112:cmd:command:RTT_CMD_UDP_PORT_ENABLE, ip:5.0.0.1, port:9, duration:5000 May 5 05:26:08.127:receiving reply May 5 05:26:08.127: Ver:1 ID:52 Len:8 May 5 05:26:08.143:local delta:8 May 5 05:26:08.147:delta from responder:1 May 5 05:26:08.147:received <16> bytes and responseTime = 3 (ms) May 5 05:26:08.151:rtt hash remove:3.0.0.3 2974RTR 1:Starting An Echo Operation - IP RTR Probe 1
Related Commands
DB-2173
debug rtsp
To show the status of the Real-Time Streaming Protocol (RTSP) client or server, use the debug rtsp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug rtsp type [all | api | error | pmh | session | socket] [no] debug rtsp type [all | api | pmh | session | socket]
Syntax Description
type
all(Optional) Displays debug output for all clients or servers. api(Optional) Displays debug output for the client or server API. error(Optional) Displays errors when they are errors otherwise no output is displayed. pmh(Optional) Displays debug output for the Protocol Message Handler (PMH). session(Optional) Displays debug output for the client or server session. socket(Optional) Displays debug output for the client or server socket data.
Defaults
Command Modes
Command History
Modification This command was introduced. The new debug header was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, Cisco 3640, and Cisco 3660 series; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following access servers: Cisco AS5300, and Cisco AS5800; and, on the Cisco MC3810 multiservice access concentrators. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Examples
The following is sample output that displays when the debug rtsp command is entered with the api keyword:
Router# debug rtsp api
DB-2174
December 2010
! RTSP client API debugging is on ! Jan 1 00:23:15.775:rtsp_api_create_session:sess_id=0x61A07C78,evh=0x60D6E62C context=0x61A07B28 Jan 1 00:23:15.775:rtsp_api_request:msg=0x61C2B10C Jan 1 00:23:15.775:rtsp_api_handle_req_set_params:msg=0x61C2B10C Jan 1 00:23:15.775:rtsp_api_free_msg_buffer:msg=0x61C2B10C Jan 1 00:23:15.775:rtsp_api_request:msg=0x61C293CC Jan 1 00:23:15.775:rtsp_api_handle_req_set_params:msg=0x61C293CC Jan 1 00:23:15.775:rtsp_api_free_msg_buffer:msg=0x61C293CC Jan 1 00:23:15.775:rtsp_api_request:msg=0x61C2970C Jan 1 00:23:15.775:rtsp_api_handle_req_set_params:msg=0x61C2970C Jan 1 00:23:15.775:rtsp_api_free_msg_buffer:msg=0x61C2970C ! Jan 1 00:23:15.775:rtsp_api_request:msg=0x61C29A4C ! Jan 1 00:23:22.099:rtsp_api_free_msg_buffer:msg=0x61C29A4C Jan 1 00:23:22.115:rtsp_api_request:msg=0x61C2A40C Jan 1 00:23:22.115:rtsp_api_free_msg_buffer:msg=0x61C2A40C
Related Commands
Command debug rtsp api debug rtsp client session debug rtsp socket
Description Displays debug output for the RTSP client API. Displays debug output for the RTSP client data. Displays debug output for the RTSP client socket data.
DB-2175
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3620, Cisco 3640, and Cisco 3660, Cisco AS5350, Cisco AS5400, Cisco AS5850, Cisco AS5300, Cisco AS5800, and Cisco MC3810. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
We recommend that you log output from the debug rtsp all command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Examples
The following example shows debugging output for the debug rtsp all command. The show debug command shows which RTSP modules are traced.
Router# debug rtsp all All RTSP client debugging is on Router# show debug RTSP: RTSP RTSP RTSP RTSP RTSP
Protocol Error debugging is on Protocol Message Handler debugging is on API debugging is on socket debugging is on session debugging is on
DB-2176
December 2010
Router# Router#!call initiated Router# *Mar 11 03:14:23.471: //-1//RTSP:/rtsp_get_new_scb: *Mar 11 03:14:23.471: //-1//RTSP:/rtsp_initialize_scb: *Mar 11 03:14:23.471: //-1//RTSP:/rtsplib_init_svr_session: 0x63A5FE6C *Mar 11 03:14:23.471: //-1//RTSP:/rtsp_api_create_session: evh=0x6155F0D4 context=0x6345042C *Mar 11 03:14:23.471: //-1//RTSP:/rtsp_get_new_scb: *Mar 11 03:14:23.471: //-1//RTSP:/rtsp_initialize_scb: *Mar 11 03:14:23.471: //-1//RTSP:/rtsplib_init_svr_session: 0x63A5D874 *Mar 11 03:14:23.471: //-1//RTSP:/rtsp_api_create_session: evh=0x6155F204 context=0x6345046C *Mar 11 03:14:23.471: //-1//RTSP:RS45:/rtsp_api_request: msg=0x63A59FB8 *Mar 11 03:14:23.471: //-1//RTSP:RS45:/rtsp_api_handle_req_set_params: msg=0x63A59FB8 *Mar 11 03:14:23.475: //-1//RTSP:RS45:/rtsp_api_free_msg_buffer: msg=0x63A59FB8 *Mar 11 03:14:23.475: //-1//RTSP:RS45:/rtsp_api_request: msg=0x63A5A304 *Mar 11 03:14:23.475: //-1//RTSP:RS45:/rtsp_api_handle_req_set_params: msg=0x63A5A304 *Mar 11 03:14:23.475: //-1//RTSP:RS45:/rtsp_api_free_msg_buffer: msg=0x63A5A304 *Mar 11 03:14:23.475: //-1//RTSP:RS45:/rtsp_api_request: msg=0x63A5A650 *Mar 11 03:14:23.475: //-1//RTSP:RS45:/rtsp_api_handle_req_set_params: msg=0x63A5A650 *Mar 11 03:14:23.475: //166//RTSP:LP:RS45:/rtsp_api_handle_req_set_params: *Mar 11 03:14:23.475: //-1//RTSP:RS45:/rtsp_api_free_msg_buffer: msg=0x63A5A650 *Mar 11 03:14:23.475: //-1//RTSP:RS46:/rtsp_api_request: msg=0x63A5A99C *Mar 11 03:14:23.475: //-1//RTSP:RS46:/rtsp_api_handle_req_set_params: msg=0x63A5A99C *Mar 11 03:14:23.475: //166//RTSP:LP:RS46:/rtsp_api_handle_req_set_params: *Mar 11 03:14:23.475: //-1//RTSP:RS46:/rtsp_api_free_msg_buffer: msg=0x63A5A99C Router# Router#!call answered Router# Router#!digits dialed Router# Router#!call terminated Router# *Mar 11 03:14:51.603: //-1//RTSP:RS45:/rtsp_api_request: msg=0x63A5ACE8 *Mar 11 03:14:51.603: //-1//RTSP:RS46:/rtsp_api_request: msg=0x63A5B034 *Mar 11 03:14:51.607: //-1//RTSP:RS45:/rtsp_control_process_msg: *Mar 11 03:14:51.607: //166//RTSP:/rtsp_control_process_msg: received MSG request of TYPE 0 *Mar 11 03:14:51.607: //166//RTSP:/rtsp_set_event: api_req_msg_type=RTSP_API_REQ_DESTROY *Mar 11 03:14:51.607: //166//RTSP:/rtsp_session_cleanup: *Mar 11 03:14:51.607: //-1//RTSP:/rtsplib_free_svr_session: *Mar 11 03:14:51.607: //-1//RTSP:/rtsplib_stop_timer: timer(0x638D5DDC) stops *Mar 11 03:14:51.611: //166//RTSP:/rtsp_create_session_history: scb=0x63A5FE6C, callID=0xA6 *Mar 11 03:14:51.611: //166//RTSP:/rtsp_create_session_history: No streams in session control block *Mar 11 03:14:51.611: //166//RTSP:/rtsp_session_cleanup: deleting session: scb=0x63A5FE6C *Mar 11 03:14:51.611: //-1//RTSP:RS45:/rtsp_api_free_msg_buffer: msg=0x63A5ACE8 *Mar 11 03:14:51.611: //-1//RTSP:RS46:/rtsp_control_process_msg: *Mar 11 03:14:51.611: //166//RTSP:/rtsp_control_process_msg: received MSG request of TYPE 0 *Mar 11 03:14:51.611: //166//RTSP:/rtsp_set_event: api_req_msg_type=RTSP_API_REQ_DESTROY *Mar 11 03:14:51.611: //166//RTSP:/rtsp_session_cleanup: *Mar 11 03:14:51.611: //-1//RTSP:/rtsplib_free_svr_session: *Mar 11 03:14:51.611: //-1//RTSP:/rtsplib_stop_timer: timer(0x63A60110) stops *Mar 11 03:14:51.611: //166//RTSP:/rtsp_create_session_history: scb=0x63A5D874, callID=0xA6 *Mar 11 03:14:51.611: //166//RTSP:/rtsp_create_session_history: No streams in session control block *Mar 11 03:14:51.611: //166//RTSP:/rtsp_session_cleanup: deleting session: scb=0x63A5D874 *Mar 11 03:14:51.611: //-1//RTSP:RS46:/rtsp_api_free_msg_buffer: msg=0x63A5B034
DB-2177
Description Indicates that the CallEntry ID for the module is unavailable. Identifies the CallEntry ID. Identifies the RTSP module. Identifies the function name.
Related Commands
Command debug rtsp api debug rtsp error debug rtsp pmh debug rtsp socket voice call debug
Description Displays debugging output for the RTSP client API. Displays error message for RTSP data. Displays debugging messages for the PMH. Displays debugging output for the RTSP client socket data. Allows configuration of the voice call debugging output.
DB-2178
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3620, Cisco 3640, and Cisco 3660, Cisco AS5350, Cisco AS5400, Cisco AS5850, Cisco AS5300, Cisco AS5800, and Cisco MC3810. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
We recommend that you log output from the debug rtsp api command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Examples
The following example shows output from the debug rtsp api command:
Router# debug rtsp api RTSP client API debugging is on Router# !call initiated *Mar 11 03:04:41.699: context=0x6345088C *Mar 11 03:04:41.699: context=0x634508CC *Mar 11 03:04:41.699: *Mar 11 03:04:41.699: *Mar 11 03:04:41.699: *Mar 11 03:04:41.699: //-1//RTSP:/rtsp_api_create_session: evh=0x6155F0D4 //-1//RTSP:/rtsp_api_create_session: evh=0x6155F204 //-1//RTSP:RS35:/rtsp_api_request: msg=0x63A59FB8 //-1//RTSP:RS35:/rtsp_api_handle_req_set_params: msg=0x63A59FB8 //-1//RTSP:RS35:/rtsp_api_free_msg_buffer: msg=0x63A59FB8 //-1//RTSP:RS35:/rtsp_api_request: msg=0x63A5A304
DB-2179
*Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar
11 11 11 11 11 11 11 11 11 11
03:04:41.699: 03:04:41.699: 03:04:41.703: 03:04:41.703: 03:04:41.703: 03:04:41.703: 03:04:41.703: 03:04:41.703: 03:04:41.703: 03:04:41.703:
//-1//RTSP:RS35:/rtsp_api_handle_req_set_params: msg=0x63A5A304 //-1//RTSP:RS35:/rtsp_api_free_msg_buffer: msg=0x63A5A304 //-1//RTSP:RS35:/rtsp_api_request: msg=0x63A5A650 //-1//RTSP:RS35:/rtsp_api_handle_req_set_params: msg=0x63A5A650 //146//RTSP:LP:RS35:/rtsp_api_handle_req_set_params: //-1//RTSP:RS35:/rtsp_api_free_msg_buffer: msg=0x63A5A650 //-1//RTSP:RS36:/rtsp_api_request: msg=0x63A5A99C //-1//RTSP:RS36:/rtsp_api_handle_req_set_params: msg=0x63A5A99C //146//RTSP:LP:RS36:/rtsp_api_handle_req_set_params: //-1//RTSP:RS36:/rtsp_api_free_msg_buffer: msg=0x63A5A99C
Router!call answered Router#!digits dialed Router#!call terminated *Mar *Mar *Mar *Mar 11 11 11 11 03:05:15.367: 03:05:15.367: 03:05:15.367: 03:05:15.367: //-1//RTSP:RS35:/rtsp_api_request: msg=0x63A5ACE8 //-1//RTSP:RS36:/rtsp_api_request: msg=0x63A5B034 //-1//RTSP:RS35:/rtsp_api_free_msg_buffer: msg=0x63A5ACE8 //-1//RTSP:RS36:/rtsp_api_free_msg_buffer: msg=0x63A5B034
Description Indicates that the CallEntry ID for the module is unavailable. Identifies the CallEntry ID. Identifies the RTSP module. Identifies the function name.
Related Commands
Command debug rtsp error debug rtsp pmh debug rtsp socket voice call debug
Description Displays error message for RTSP data. Displays debugging messages for the PMH. Displays debugging output for the RTSP client socket data. Allows configuration of the voice call debugging output.
DB-2180
December 2010
Effective with Release 12.3(4), the debug rtsp cleint command is replaced by the debug rtsp session command. See the debug rtsp session command for more information. To display client information and stream information for the stream that is currently active for the Real Time Streaming Protocol (RTSP) client, use the debug rtsp client command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug rtsp client no debug rtsp client
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was replaced by the debug rtsp session command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
We recommend that you log output from the debug rtsp client command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Related Commands
Command debug rtsp api debug rtsp error debug rtsp pmh debug rtsp socket voice call debug
Description Displays debugging output for the RTSP client API. Displays error message for RTSP data. Displays debugging messages for the PMH. Displays debugging output for the RTSP client socket data. Allows configuration of the voice call debugging output.
DB-2181
Effective with Release 12.3(4), the debug rtsp cleint session command is replaced by the debug rtsp session command. See the debug rtsp session command for more information. To display debug messages about the Real Time Streaming Protocol (RTSP) client or the current session, use the debug rtsp command. To disable debugging output, use the no form of this command. debug rtsp [client | session] no debug rtsp [client | session]
Syntax Description
client session
(Optional) Displays client information and stream information for the stream that is currently active. (Optional) Displays cumulative information about the session, packet statistics, and general call information such as call ID, session ID, individual RTSP stream URLs, packet statistics, and play duration.
Defaults
Command History
Modification This command was introduced. This command was replaced by the debug rtsp session command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example displays the debug messages of the RTSP session:
Router# debug rtsp session RTSP client session debugging is on router# Jan 1 00:08:36.099:rtsp_get_new_scb: Jan 1 00:08:36.099:rtsp_initialize_scb: Jan 1 00:08:36.099:rtsp_control_process_msg: Jan 1 00:08:36.099:rtsp_control_process_msg:received MSG request of TYPE 0 Jan 1 00:08:36.099:rtsp_set_event: Jan 1 00:08:36.099:rtsp_set_event:api_req_msg_type=RTSP_API_REQ_PLAY Jan 1 00:08:36.103:rtsp_set_event:url:[rtsp://rtsp-cisco.cisco.com:554/en_welcome.au] Jan 1 00:08:36.103:rtsp_process_async_event:SCB=0x62128F08 Jan 1 00:08:36.103:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_IDLE rtsp_event = RTSP_EV_PLAY_OR_REC Jan 1 00:08:36.103:act_idle_event_play_or_rec_req: Jan 1 00:08:36.103:rtsp_resolve_dns: Jan 1 00:08:36.103:rtsp_resolve_dns:IP Addr = 1.13.79.6:
DB-2182
December 2010
Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan
1 1 1 1 1 1 1 1 1 1 1 1
Jan 1 Jan 1 00:08:36.783:act_ready_event_desc_or_announce_resp:RTSP_STATUS_DESC_OR_ANNOUNCE_RESP_OK Jan 1 00:08:37.287:rtsp_control_main:SOCK= 0 Event=0x1 Jan 1 00:08:37.287:rtsp_process_async_event:SCB=0x62128F08 Jan 1 00:08:37.287:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_READY rtsp_event = RTSP_EV_SVR_SETUP_RESP Jan 1 00:08:37.287:act_ready_event_setup_resp: Jan 1 00:08:37.287:act_ready_event_setup_resp:Remote RTP Port=13344 Jan 1 00:08:37.287:rtsp_rtp_stream_setup:scb=0x62128F08, callID=0x7 record=0 Jan 1 00:08:37.287:rtsp_rtp_stream_setup:Starting RTCP session. Local IP addr = 1.13.79.45, Remote IP addr = 1.13.79.6, Local RTP port = 18748, Remote RTP port = 13344 CallID=8 Jan 1 00:08:37.291:xmit_func = 0x0 vdbptr = 0x61A0FC98 Jan 1 00:08:37.291:rtsp_control_main:CCAPI Queue Event Jan 1 00:08:37.291:rtsp_rtp_associate_done:ev=0x62070E08, callID=0x7 Jan 1 00:08:37.291:rtsp_rtp_associate_done:scb=0x62128F08 Jan 1 00:08:37.291:rtsp_rtp_associate_done:callID=0x7, pVdb=0x61F4FBC8, Jan 1 00:08:37.291: spi_context=0x6214145C Jan 1 00:08:37.291: disposition=0, playFunc=0x60CA2238, Jan 1 00:08:37.291: codec=0x5, vad=0, mediaType=6, Jan 1 00:08:37.291: stream_assoc_id=1 Jan 1 00:08:37.291:rtsp_rtp_modify_session:scb=0x62128F08, callID=0x7 Jan 1 00:08:37.291:rtsp_process_async_event:SCB=0x62128F08 Jan 1 00:08:37.291:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_READY rtsp_event = RTSP_EV_ASSOCIATE_DONE Jan 1 00:08:37.291:act_ready_event_associate_done: Jan 1 00:08:37.291:rtsp_get_stream: Jan 1 00:08:37.783:rtsp_control_main:SOCK= 0 Event=0x1 Jan 1 00:08:37.783:rtsp_process_async_event:SCB=0x62128F08 Jan 1 00:08:37.783:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_READY rtsp_event = RTSP_EV_SVR_PLAY_OR_REC_RESP Jan 1 00:08:37.783:act_ready_event_play_or_rec_resp: Jan 1 00:08:37.783:rtsp_start_timer:timer (0x62128FB0)starts - delay (4249) rtsp-5# Jan 1 00:08:42.035:rtsp_process_timer_events: Jan 1 00:08:42.035:rtsp_process_timer_events:PLAY OR RECORD completed Jan 1 00:08:42.035:rtsp_process_async_event:SCB=0x62128F08 Jan 1 00:08:42.035:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_PLAY_OR_REC rtsp_event = RTSP_EV_PLAY_OR_REC_TIMER_EXPIRED Jan 1 00:08:42.035:act_play_event_play_done: Jan 1 00:08:42.035:act_play_event_play_done:elapsed play time = 4249 total play time = 4249 Jan 1 00:08:42.035:rtsp_send_teardown_to_svr: Jan 1 00:08:42.487:rtsp_control_main:SOCK= 0 Event=0x1 Jan 1 00:08:42.487:rtsp_process_async_event:SCB=0x62128F08 Jan 1 00:08:42.487:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_PLAY_OR_REC rtsp_event = RTSP_EV_SVR_TEARDOWN_RESP Jan 1 00:08:42.487:act_play_event_teardown_resp: Jan 1 00:08:42.487:rtsp_server_closed:
00:08:36.103:rtsp_connect_to_svr: 00:08:36.103:rtsp_connect_to_svr:socket=0, connection_state = 2 00:08:36.103:rtsp_start_timer:timer (0x62128FD0)starts - delay (10000) 00:08:36.107:rtsp_control_main:SOCK= 0 Event=0x1 00:08:36.107:rtsp_stop_timer:timer(0x62128FD0) stops 00:08:36.107:rtsp_process_async_event:SCB=0x62128F08 00:08:36.107:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_IDLE rtsp_event = RTSP_EV_SVR_CONNECTED 00:08:36.107:act_idle_event_svr_connected: 00:08:36.107:rtsp_control_main:SOCK= 0 Event=0x1 00:08:36.783:rtsp_control_main:SOCK= 0 Event=0x1 00:08:36.783:rtsp_process_async_event:SCB=0x62128F08 00:08:36.783:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_READY rtsp_event = RTSP_EV_SVR_DESC_OR_ANNOUNCE_RESP 00:08:36.783:act_ready_event_desc_or_announce_resp:
DB-2183
Jan 1 00:08:42.487:rtsp_send_resp_to_api: Jan 1 00:08:42.487:rtsp_send_resp_to_api:sending RESP=RTSP_STATUS_PLAY_COMPLETE Jan 1 00:08:42.491:rtsp_rtp_teardown_stream:scb=0x62128F08, callID=0x7 Jan 1 00:08:42.491:rtsp_rtp_stream_cleanup:scb=0x62128F08, callID=0x7 Jan 1 00:08:42.491:rtsp_update_stream_stats:scb=0x62128F08, stream=0x61A43350, Jan 1 00:08:42.491:call_info=0x6214C67C, callID=0x7 Jan 1 00:08:42.491:rtsp_update_stream_stats:rx_bytes = 25992 Jan 1 00:08:42.491:rtsp_update_stream_stats:rx_packetes = 82 Jan 1 00:08:42.491:rtsp_reinitialize_scb: Jan 1 00:08:42.503:rtsp_control_process_msg: Jan 1 00:08:42.503:rtsp_control_process_msg:received MSG request of TYPE 0 Jan 1 00:08:42.503:rtsp_set_event: Jan 1 00:08:42.503:rtsp_set_event:api_req_msg_type=RTSP_API_REQ_DESTROY Jan 1 00:08:42.503:rtsp_session_cleanup: Jan 1 00:08:42.503:rtsp_create_session_history:scb=0x62128F08, callID=0x7 Jan 1 00:08:42.503:rtsp_insert_session_history_record:current=0x6214BDC8, callID=0x7 Jan 1 00:08:42.503:rtsp_insert_session_history_record:count = 3 Jan 1 00:08:42.503:rtsp_insert_session_history_record:starting history record deletion_timer of10 minutes Jan 1 00:08:42.503:rtsp_session_cleanup:deleting session:scb=0x62128F08 Router#
Related Commands
Command debug rtsp all debug rtsp pmh debug rtsp socket
Description Displays debugging output for the RTSP client API. Displays debugging messages for the PMH. Displays debugging output for the RTSP client socket data.
DB-2184
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3620, Cisco 3640, and Cisco 3660, Cisco AS5350, Cisco AS5400, Cisco AS5850, Cisco AS5300, Cisco AS5800, and Cisco MC3810. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
We recommend that you log output from the debug rtsp error command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Related Commands
Command debug rtsp api debug rtsp pmh debug rtsp socket voice call debug
Description Displays debugging output for the RTSP client API. Displays debugging messages for the PMH. Displays debugging output for the RTSP client socket data. Allows configuration of the voice call debugging output.
DB-2185
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3620, Cisco 3640, and Cisco 3660, Cisco AS5350, Cisco AS5400, Cisco AS5850, Cisco AS5300, Cisco AS5800, and Cisco MC3810. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
We recommend that you log output from the debug rtsp pmh command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Related Commands
Command debug rtsp api debug rtsp error debug rtsp socket voice call debug
Description Displays debugging output for the RTSP client API. Displays error message for RTSP data. Displays debugging output for the RTSP client socket data. Allows configuration of the voice call debugging output.
DB-2186
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3620, Cisco 3640, and Cisco 3660, Cisco AS5350, Cisco AS5400, Cisco AS5850, Cisco AS5300, Cisco AS5800, and Cisco MC3810. This command replaces the debug rtsp client command and the debug rtsp client session command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.3(4)T 12.2SX
Usage Guidelines
We recommend that you log output from the debug rtsp session command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Examples
The following example shows the display of the debugging messages of the RTSP session:
Router# debug rtsp session RTSP client session debugging is on Router# Router#!call initiated Router# *Mar 11 03:09:58.123: //-1//RTSP:/rtsp_get_new_scb: *Mar 11 03:09:58.123: //-1//RTSP:/rtsp_initialize_scb: *Mar 11 03:09:58.123: //-1//RTSP:/rtsplib_init_svr_session: 0x63A5FE6C *Mar 11 03:09:58.123: //-1//RTSP:/rtsp_get_new_scb:
DB-2187
*Mar 11 03:09:58.123: //-1//RTSP:/rtsp_initialize_scb: *Mar 11 03:09:58.123: //-1//RTSP:/rtsplib_init_svr_session: 0x63A5D874 Router# Router#!call answered Router# Router#!digits dialed Router# Router#!call terminated Router# *Mar 11 03:10:38.139: //-1//RTSP:RS41:/rtsp_control_process_msg: *Mar 11 03:10:38.139: //158//RTSP:/rtsp_control_process_msg: received MSG request of TYPE 0 *Mar 11 03:10:38.139: //158//RTSP:/rtsp_set_event: api_req_msg_type=RTSP_API_REQ_DESTROY *Mar 11 03:10:38.139: //158//RTSP:/rtsp_session_cleanup: *Mar 11 03:10:38.139: //-1//RTSP:/rtsplib_free_svr_session: *Mar 11 03:10:38.139: //-1//RTSP:/rtsplib_stop_timer: timer(0x638D5DDC) stops *Mar 11 03:10:38.143: //158//RTSP:/rtsp_create_session_history: scb=0x63A5FE6C, callID=0x9E *Mar 11 03:10:38.143: //158//RTSP:/rtsp_create_session_history: No streams in session control block *Mar 11 03:10:38.143: //158//RTSP:/rtsp_session_cleanup: deleting session: scb=0x63A5FE6C *Mar 11 03:10:38.143: //-1//RTSP:RS42:/rtsp_control_process_msg: *Mar 11 03:10:38.143: //158//RTSP:/rtsp_control_process_msg: received MSG request of TYPE 0 *Mar 11 03:10:38.143: //158//RTSP:/rtsp_set_event: api_req_msg_type=RTSP_API_REQ_DESTROY *Mar 11 03:10:38.143: //158//RTSP:/rtsp_session_cleanup: *Mar 11 03:10:38.143: //-1//RTSP:/rtsplib_free_svr_session: *Mar 11 03:10:38.143: //-1//RTSP:/rtsplib_stop_timer: timer(0x63A60110) stops *Mar 11 03:10:38.143: //158//RTSP:/rtsp_create_session_history: scb=0x63A5D874, callID=0x9E *Mar 11 03:10:38.143: //158//RTSP:/rtsp_create_session_history: No streams in session control block *Mar 11 03:10:38.143: //158//RTSP:/rtsp_session_cleanup: deleting session: scb=0x63A5D874
Description Indicates that the CallEntry ID for the module is unavailable. Identifies the CallEntry ID. Identifies the RTSP module. Identifies the function name.
Related Commands
Command debug rtsp api debug rtsp error debug rtsp pmh debug rtsp socket voice call debug
Description Displays debugging output for the RTSP client API. Displays error message for RTSP data. Displays debugging messages for the PMH. Displays debugging output for the RTSP client socket data. Allows configuration of the voice call debugging output.
DB-2188
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3620, Cisco 3640, and Cisco 3660, Cisco AS5350, Cisco AS5400, Cisco AS5850, Cisco AS5300, Cisco AS5800, and Cisco MC3810. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
Each Real-Time Streaming Protocol (RTSP) session has a TCP port for control and a UDP (RTP) port for delivery of data. The control connection (TCP socket) is used to exchange a set of messages (request from the RTSP client and the response from the server) for displaying a prompt. The debug rtsp socket command enables the user to debug the message exchanges being done on the TCP control connection.
Note
We recommend that you log output from the debug rtsp socket command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Related Commands
Command debug rtsp api debug rtsp error debug rtsp pmh voice call debug
Description Displays debugging output for the RTSP client API. Displays error message for RTSP data. Displays debugging messages for the PMH. Allows configuration of the voice call debugging output.
DB-2189
debug rudpv1
For debug information for Reliable User Datagram Protocol (RUDP), use the debug rudpv1 command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug rudpv1 {application | performance | retransmit | segment | signal | state | timer | transfer} no debug rudpv1 {application | performance | retransmit | segment | signal | state | timer | transfer}
Syntax Description
Application debugging. Performance debugging. Retransmit/soft reset debugging. Segment debugging. Signals sent to applications. State transitions. Timer debugging. Transfer state information.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco 2600 series, Cisco 3600 series, and Cisco MC3810. This command was implemented on the Cisco AS5350 and Cisco AS5400 universal gateways. This command was implemented on the Cisco AS5850 platform. This command was implemented on Cisco IAD2420 series integrated access devices (IADs). This command was implemented on the Cisco AS5350, Cisco AS5400, and Cisco AS5850 platforms. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
DB-2190
December 2010
Examples
The following is sample output from the debug rudpv1 application command:
Router# debug rudpv1 application Rudpv1:Turning application debugging on *Jan 1 00:20:38.271:Send to appl (61F72B6C), *Jan 1 00:20:48.271:Send to appl (61F72B6C), *Jan 1 00:20:58.271:Send to appl (61F72B6C), *Jan 1 00:21:08.271:Send to appl (61F72B6C), *Jan 1 00:21:18.271:Send to appl (61F72B6C), *Jan 1 00:21:28.271:Send to appl (61F72B6C), *Jan 1 00:21:38.271:Send to appl (61F72B6C), *Jan 1 00:21:48.275:Send to appl (61F72B6C), *Jan 1 00:21:58.275:Send to appl (61F72B6C), *Jan 1 00:22:08.275:Send to appl (61F72B6C), *Jan 1 00:22:18.275:Send to appl (61F72B6C), *Jan 1 00:22:28.275:Send to appl (61F72B6C), *Jan 1 00:22:38.275:Send to appl (61F72B6C), *Jan 1 00:22:48.279:Send to appl (61F72B6C), *Jan 1 00:22:58.279:Send to appl (61F72B6C), *Jan 1 00:23:08.279:Send to appl (61F72B6C), *Jan 1 00:23:18.279:Send to appl (61F72B6C), *Jan 1 00:23:28.279:Send to appl (61F72B6C),
seq seq seq seq seq seq seq seq seq seq seq seq seq seq seq seq seq seq
12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
The following is sample output from the debug rudpv1 performance command:
Router# debug rudpv1 performance Rudpv1:Turning performance debugging on corsair-f# *Jan 1 00:44:27.299: *Jan 1 00:44:27.299:Rudpv1 Sent:Pkts 11, Data Bytes 236, *Jan 1 00:44:27.299:Rudpv1 Rcvd:Pkts 10, Data Bytes 237, *Jan 1 00:44:27.299:Rudpv1 Discarded:0, Retransmitted 0 *Jan 1 00:44:27.299: *Jan 1 00:44:37.299: *Jan 1 00:44:37.299:Rudpv1 Sent:Pkts 11, Data Bytes 236, *Jan 1 00:44:37.299:Rudpv1 Rcvd:Pkts 10, Data Bytes 237, *Jan 1 00:44:37.299:Rudpv1 Discarded:0, Retransmitted 0 *Jan 1 00:44:37.299: *Jan 1 00:44:47.299: *Jan 1 00:44:47.299:Rudpv1 Sent:Pkts 11, Data Bytes 236, *Jan 1 00:44:47.299:Rudpv1 Rcvd:Pkts 11, Data Bytes 236, *Jan 1 00:44:47.299:Rudpv1 Discarded:0, Retransmitted 0 *Jan 1 00:44:47.299:
The following is sample output from the debug rudpv1 retransmit command:
Router# debug rudpv1 retransmit Rudpv1:Turning retransmit/softreset debugging on *Jan 1 00:52:59.799:Retrans timer, set to ack 199 *Jan 1 00:52:59.903:Retrans timer, set to ack 200 *Jan 1 00:53:00.003:Retrans timer, set to ack 201 *Jan 1 00:53:00.103:Retrans timer, set to ack 202 *Jan 1 00:53:00.203:Retrans timer, set to ack 203 *Jan 1 00:53:00.419:Retrans timer, set to ack 97 *Jan 1 00:53:00.503:Retrans handler fired, 203 *Jan 1 00:53:00.503:Retrans:203:205: *Jan 1 00:53:00.503: *Jan 1 00:53:00.607:Retrans timer, set to ack 207 *Jan 1 00:53:00.907:Retrans timer, set to ack 210 *Jan 1 00:53:01.207:Retrans handler fired, 210 *Jan 1 00:53:01.207:Retrans:210:211:212:
DB-2191
*Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan
1 1 1 1 1 1 1 1 1 1 1 1 1 1
00:53:01.207: 00:53:01.207:Retrans timer, set to ack 213 00:53:01.311:Retrans timer, set to ack 214 00:53:01.419:Retrans timer, set to ack 98 00:53:01.611:Retrans timer, set to ack 215 00:53:01.711:Retrans timer, set to ack 218 00:53:01.811:Retrans timer, set to ack 219 00:53:01.911:Retrans timer, set to ack 220 00:53:02.011:Retrans timer, set to ack 221 00:53:02.311:Retrans handler fired, 221 00:53:02.311:Retrans:221: 00:53:02.311: 00:53:02.311:Retrans timer, set to ack 222 00:53:02.415:Retrans timer, set to ack 225
The following is sample output from the debug rudpv1 segment command:
Router# debug rudpv1 segment Rudpv1:Turning segment debugging on *Jan 1 00:41:36.359:Rudpv1: (61F72DAC) *Jan 1 00:41:36.359:Rudpv1: (61F72DAC) *Jan 1 00:41:36.459:Rudpv1: (61F72DAC) *Jan 1 00:41:36.459:Rudpv1: (61F72DAC) *Jan 1 00:41:36.459:Rudpv1: (61F72DAC) *Jan 1 00:41:36.559:Rudpv1: (61F72DAC) *Jan 1 00:41:36.559:Rudpv1: (61F72DAC) *Jan 1 00:41:36.659:Rudpv1: (61F72DAC) *Jan 1 00:41:36.659:Rudpv1: (61F72DAC) *Jan 1 00:41:36.759:Rudpv1: (61F72DAC) *Jan 1 00:41:36.759:Rudpv1: (61F72DAC) *Jan 1 00:41:36.859:Rudpv1: (61F72DAC) *Jan 1 00:41:36.859:Rudpv1: (61F72DAC) *Jan 1 00:41:36.959:Rudpv1: (61F72DAC) *Jan 1 00:41:36.959:Rudpv1: (61F72DAC) *Jan 1 00:41:36.959:Rudpv1: (61F72DAC) *Jan 1 00:41:36.963:Rudpv1: (61F72DAC) *Jan 1 00:41:36.963:Rudpv1: (61F72DAC) *Jan 1 00:41:37.051:Rudpv1: (61F72B6C) *Jan 1 00:41:37.051:Rudpv1: (61F72B6C) *Jan 1 00:41:37.059:Rudpv1: (61F72DAC) *Jan 1 00:41:37.063:Rudpv1: (61F72DAC) *Jan 1 00:41:37.263:Rudpv1: (61F72DAC) *Jan 1 00:41:37.363:Rudpv1: (61F72DAC) *Jan 1 00:41:37.363:Rudpv1: (61F72DAC) *Jan 1 00:41:37.363:Rudpv1: (61F72DAC) *Jan 1 00:41:37.363:Rudpv1: (61F72DAC) *Jan 1 00:41:37.363:Rudpv1: (61F72DAC) *Jan 1 00:41:37.363:Rudpv1: (61F72DAC) *Jan 1 00:41:37.363:Rudpv1: (61F72DAC) *Jan 1 00:41:37.367:Rudpv1: (61F72DAC) *Jan 1 00:41:37.463:Rudpv1: (61F72DAC) *Jan 1 00:41:37.463:Rudpv1: (61F72DAC) *Jan 1 00:41:37.563:Rudpv1: (61F72DAC) *Jan 1 00:41:37.563:Rudpv1: (61F72DAC)
Rcvd Send Rcvd Rcvd Send Rcvd Send Rcvd Send Rcvd Send Rcvd Send Rcvd Rcvd Send Send Rcvd Send Rcvd Rcvd Send Rcvd Send Rcvd Rcvd Send Send Send Send Rcvd Rcvd Send Rcvd Send
ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK ACK
61..198 (32) 199..61 (32) 62..199 (8) 62..199 (32) 200..62 (32) 63..200 (32) 201..63 (32) 64..201 (32) 202..64 (32) 65..202 (32) 203..65 (32) 66..202 (32) 204..66 (32) 67..202 (32) EAK 68..202 (9) 203..67 (32) 205..67 (32) 68..204 (8) NUL 118..96 (8) 97..118 (8) 68..205 (32) 206..68 (32) 70..206 (32) EAK 207..68 (9) 71..206 (32) 69..206 (32) 207..71 (8) 207..71 (32) 208..71 (32) 209..71 (32) 72..209 (8) 72..209 (32) 210..72 (32) 73..210 (32) 211..73 (32)
DB-2192
December 2010
The following is sample output from the debug rudpv1 signal command:
Router# debug rudpv1 signal Rudpv1:Turning signal debugging on *Jan 1 00:39:59.551:Rudpv1:Sent CONN_FAILED to connID 61F72DAC, sess 33 *Jan 1 00:39:59.551: *Jan 1 00:39:59.551:Rudpv1:Sent CONN_TRANS_STATE to connID 61F72B6C, sess 34 *Jan 1 00:39:59.551: *Jan 1 00:39:59.551:Rudpv1:Sent CONN_TRANS_STATE to connID 61F72DAC, sess 33 *Jan 1 00:39:59.551: *Jan 1 00:39:59.551:Rudpv1:Sent CONN_OPEN to connID 61F72B6C, sess 34 *Jan 1 00:39:59.551:Rudpv1:Sent AUTO_RESET to connID 61F72DAC, sess 33 *Jan 1 00:39:59.551: *Jan 1 00:40:00.739:%LINK-5-CHANGED:Interface FastEthernet0, changed state to administratively down *Jan 1 00:40:01.739:%LINEPROTO-5-UPDOWN:Line protocol on Interface FastEthernet0, changed state to down *Jan 1 00:40:04.551:Rudpv1:Sent CONN_RESET to connID 61F72DAC, sess 33 *Jan 1 00:40:04.551: *Jan 1 00:40:05.051:Rudpv1:Clearing conn rec values, index 2, connid 61F72DAC *Jan 1 00:40:10.051:Rudpv1:Sent CONN_RESET to connID 61F72DAC, sess 33 *Jan 1 00:40:10.051: *Jan 1 00:40:10.551:Rudpv1:Clearing conn rec values, index 2, connid 61F72DAC *Jan 1 00:40:15.551:Rudpv1:Sent CONN_RESET to connID 61F72DAC, sess 33 *Jan 1 00:40:15.551: *Jan 1 00:40:16.051:Rudpv1:Clearing conn rec values, index 2, connid 61F72DAC *Jan 1 00:40:21.051:Rudpv1:Sent CONN_RESET to connID 61F72DAC, sess 33 *Jan 1 00:40:21.051: *Jan 1 00:40:21.551:Rudpv1:Clearing conn rec values, index 2, connid 61F72DAC *Jan 1 00:40:25.587:%LINK-3-UPDOWN:Interface FastEthernet0, changed state to up *Jan 1 00:40:26.551:Rudpv1:Sent CONN_RESET to connID 61F72DAC, sess 33 *Jan 1 00:40:26.551: *Jan 1 00:40:26.587:%LINEPROTO-5-UPDOWN:Line protocol on Interface FastEthernet0, changed state to up *Jan 1 00:40:27.051:Rudpv1:Clearing conn rec values, index 2, connid 61F72DAC *Jan 1 00:40:28.051:Rudpv1:Sent CONN_OPEN to connID 61F72DAC, sess 33
The following is sample output from the debug rudpv1 state command:
Router# debug rudpv1 state Rudpv1:Turning state debugging on *Jan 1 00:38:37.323:Rudpv1: (61F72DAC) State Change:OPEN -> CONN_FAILURE *Jan 1 00:38:37.323:Rudpv1: (61F72B6C) State Change:OPEN -> TRANS_STATE *Jan 1 00:38:37.323:Rudpv1: (61F72DAC) State Change:CONN_FAILURE -> TRANS_STATE *Jan 1 00:38:37.323:Rudpv1: (61F72B6C) State Change:TRANS_STATE -> OPEN *Jan 1 00:38:37.323:Rudpv1: (61F72DAC) State Change:TRANS_STATE -> SYN_SENT *Jan 1 00:38:37.455:%LINK-5-CHANGED:Interface FastEthernet0, changed state to administratively down *Jan 1 00:38:38.451:%LINEPROTO-5-UPDOWN:Line protocol on Interface FastEthernet0, changed state to down *Jan 1 00:38:42.323:Rudpv1: (61F72DAC) State Change:SYN_SENT -> CLOSED *Jan 1 00:38:42.823:Rudpv1: (61F72DAC) State Change:INACTIVE -> SYN_SENT
DB-2193
*Jan 1 00:38:47.823:Rudpv1: (61F72DAC) State *Jan 1 00:38:48.323:Rudpv1: (61F72DAC) State *Jan 1 00:38:53.323:Rudpv1: (61F72DAC) State *Jan 1 00:38:53.823:Rudpv1: (61F72DAC) State *Jan 1 00:38:56.411:%LINK-3-UPDOWN:Interface to up *Jan 1 00:38:57.411:%LINEPROTO-5-UPDOWN:Line FastEthernet0, changed state to up *Jan 1 00:38:57.823:Rudpv1: (61F72DAC) State
Change:SYN_SENT -> CLOSED Change:INACTIVE -> SYN_SENT Change:SYN_SENT -> CLOSED Change:INACTIVE -> SYN_SENT FastEthernet0, changed state protocol on Interface Change:SYN_SENT -> OPEN
The following is sample output from the debug rudpv1 timer command:
Router# debug rudpv1 timer Rudpv1:Turning timer debugging on *Jan 1 00:53:40.647:Starting Retrans timer for connP = 61F72B6C, delay = 300 *Jan 1 00:53:40.647:Stopping SentList timer for connP = 61F72B6C *Jan 1 00:53:40.747:Starting NullSeg timer for connP = 61F72B6C, delay = 1000 *Jan 1 00:53:40.747:Stopping Retrans timer for connP = 61F72B6C *Jan 1 00:53:40.747:Starting Retrans timer for connP = 61F72B6C, delay = 300 *Jan 1 00:53:40.747:Stopping SentList timer for connP = 61F72B6C *Jan 1 00:53:40.847:Starting NullSeg timer for connP = 61F72B6C, delay = 1000 *Jan 1 00:53:40.847:Stopping Retrans timer for connP = 61F72B6C *Jan 1 00:53:40.847:Starting Retrans timer for connP = 61F72B6C, delay = 300 *Jan 1 00:53:40.847:Stopping SentList timer for connP = 61F72B6C *Jan 1 00:53:40.947:Starting NullSeg timer for connP = 61F72B6C, delay = 1000 *Jan 1 00:53:40.947:Stopping Retrans timer for connP = 61F72B6C *Jan 1 00:53:40.947:Starting Retrans timer for connP = 61F72B6C, delay = 300 *Jan 1 00:53:40.947:Stopping SentList timer for connP = 61F72B6C *Jan 1 00:53:41.047:Starting NullSeg timer for connP = 61F72B6C, delay = 1000 *Jan 1 00:53:41.147:Starting NullSeg timer for connP = 61F72B6C, delay = 1000 *Jan 1 00:53:41.151:Starting NullSeg timer for connP = 61F72B6C, delay = 1000 *Jan 1 00:53:41.151:Starting NullSeg timer for connP = 61F72B6C, delay = 1000 *Jan 1 00:53:41.151:Stopping Retrans timer for connP = 61F72B6C *Jan 1 00:53:41.151:Starting SentList timer for connP = 61F72B6C, delay = 300 *Jan 1 00:53:41.419:Timer Keepalive (NullSeg) triggered for conn = 61F72DAC *Jan 1 00:53:41.419:Starting Retrans timer for connP = 61F72DAC, delay = 300 *Jan 1 00:53:41.419:Stopping SentList timer for connP = 61F72DAC *Jan 1 00:53:41.419:Starting NullSeg timer for connP = 61F72DAC, delay = 1000 *Jan 1 00:53:41.419:Stopping Retrans timer for connP = 61F72DAC *Jan 1 00:53:41.451:Timer SentList triggered for conn = 61F72B6C *Jan 1 00:53:41.451:Starting SentList timer for connP = 61F72B6C, delay = 300 *Jan 1 00:53:41.451:Starting NullSeg timer for connP = 61F72B6C, delay = 1000 *Jan 1 00:53:41.451:Stopping SentList timer for connP = 61F72B6C *Jan 1 00:53:41.551:Starting NullSeg timer for connP = 61F72B6C, delay = 1000 *Jan 1 00:53:41.551:Starting NullSeg timer for connP = 61F72B6C, delay = 1000 *Jan 1 00:53:41.551:Starting NullSeg timer for connP = 61F72B6C, delay = 1000 *Jan 1 00:53:41.551:Starting NullSeg timer for connP = 61F72B6C, delay = 1000
The following is sample output from the debug rudpv1 transfer command:
Router# debug rudpv1 transfer Rudpv1:Turning transfer debugging on *Jan 1 00:37:30.567:Rudpv1:Send TCS, connId 61F72B6C, old connId 61F72DAC *Jan 1 00:37:30.567:Rudpv1:Initiate transfer state, old conn 61F72DAC to new conn 61F72B6C *Jan 1 00:37:30.567:Rudpv1:Old conn send window 51 .. 52 *Jan 1 00:37:30.567:Rudpv1:New conn send window 255 .. 2 *Jan 1 00:37:30.567:Rudpv1:Rcvd TCS 142, next seq 142 *Jan 1 00:37:30.567:Rudpv1:Rcv'ing trans state, old conn 61F72DAC to new conn 61F72B6C *Jan 1 00:37:30.567:Rudpv1:Seq adjust factor 148 *Jan 1 00:37:30.567:Rudpv1:New rcvCur 142
DB-2194
December 2010
*Jan 1 00:37:30.567:Rudpv1:Send transfer state, old conn 61F72DAC to new conn 61F72B6C *Jan 1 00:37:30.567:Rudpv1:Send TCS, connId 61F72B6C, old connId 61F72DAC, seq adjust 208, indication 0 *Jan 1 00:37:30.567:Rudpv1:Transfer seg 51 to seg 3 on new conn *Jan 1 00:37:30.567:Rudpv1:Finishing transfer state, old conn 61F72DAC to new conn 61F72B6C *Jan 1 00:37:30.567:Rudpv1:Send window 2 .. 4
Related Commands
Description Clears RUDP statistics and failure counters. Displays RUDP failures, parameters, and statistics.
DB-2195
Effective with Cisco IOS Release 12.3(14)T, the debug saa apm command is replaced by the debug ip sla monitor apm command. See the debug ip sla monitor apm command for more information. To enable debugging output for Cisco IOS IP Service Level Agreements (SLAs) Application Performance Monitor (APM) operations, use the debug saa apm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug saa apm no debug saa apm
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was replaced by the debug ip sla monitor apm command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug saa apm command:
Router# debug saa apm Router# configure terminal Router(config)# saa apm operation 123 start ftp://apm/config/iptv.cf 21:40:27: 21:40:29: 21:40:30: 21:40:32: 21:40:32: 21:40:32: 21:40:32: 21:40:32: 21:40:32: 21:40:32: 21:40:32: 21:40:37: 21:40:37: 21:40:37: 21:40:38: 21:40:38: 21:40:38: SAA-APM-123: downloading file (apm/config/iptv.cf) of size (534) SAA-APM-123: downloading file (apm/scheduler/master.sch) of size (2500) SAA-APM-123: downloading file (apm/scripts/iptv.scr) of size (1647) SAA-APM-123: downloading file (apm/data/iptv.dat) of size (118) SAA-APM-123: sending APM_CAPABILITIES_REQUEST message sending control msg: Ver: 1 ID: 29 Len: 48 SAA-APM-123: apm_engine version: major<1>, minor<0> SAA-APM-123: sending APM_SCRIPT_DNLD message sending control msg: Ver: 1 ID: 30 Len: 148 SAA-APM-123: sending APM_SCRIPT_DNLD_STATUS message sending control msg: Ver: 1 ID: 31 Len: 148 SAA-APM-123: starting the operation SAA-APM-123: sending APM_SCRIPT_START message sending control msg:
DB-2196
December 2010
SAA-APM-123: waiting for ageout timer to expire SAA-APM-123: sending APM_SCRIPT_DONE message sending control msg: Ver: 1 ID: 42 Len: 148 SAA-APM-123: operation done
Router(config)# no saa apm 21:55:13: 21:55:13: 21:55:13: 21:55:13: SAA-APM-123: sending APM_SCRIPT_DONE message sending control msg: Ver: 1 ID: 42 Len: 148 SAA-APM-123: operation done
DB-2197
Effective with Cisco IOS Release 12.3(14)T, the debug saa slm command is replaced by the debug ip sla monitor slm command. See the debug ip sla monitor slm command for more information. To enable debugging output of detailed event messages for Cisco IOS IP Service Level Agreements (SLAs) Service Level Monitoring (SLM) Asynchronous Transfer Mode (ATM) operations, use the debug saa slm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug saa slm no debug saa slm
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was replaced by the debug ip sla monitor slm command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
IP SLAs SLM ATM performance statistics cannot be retrieved from Cisco IOS devices using Simple Network Management Protocol (SNMP). The IP SLAs SLM ATM feature was designed to provide data by responding to extensible markup language (XML) requests.
Note
Examples
In the following example, debugging is enabled for the IP SLAs SLM ATM feature and the IP SLAs XML feature for the purposes of debugging the XML requests and responses:
debug saa slm debug saa xml
DB-2198
December 2010
Related Commands
Description Enables debugging output of XML requests and responses for IP SLAs operations.
DB-2199
Effective with Cisco IOS Release 12.3(14)T, the debug saa xml command is replaced by the debug ip sla monitor xml command. See the debug ip sla monitor xml command for more information. To enable debugging output of eXtensible Markup Language (XML) requests and responses for Cisco IOS IP Service Level Agreements (SLAs) operations, use the debug saa xml command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug saa xml no debug saa xml
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was replaced by the debug ip sla monitor xml command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
In the following example, debugging is enabled for the IP SLAs SLM ATM feature and the IP SLAs eXtensible Markup Language (XML) feature for the purposes of debugging the XML requests and responses:
debug saa slm debug saa xml
Related Commands
Description Enables debugging output of detailed event messages for IP SLAs SLM ATM operations.
DB-2200
December 2010
debug sampler
To enable debugging output for Flexible NetFlow samplers, use the debug sampler command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sampler [[name] sampler-name [detailed] [error] | [name] sampler-name sampling samples] no debug sampler [[name] sampler-name [detailed] [error] | [name] sampler-name sampling samples]
Syntax Description
(Optional) The name of a sampler that you previously configured. (Optional) Enables debugging for sampling. (Optional) Number of Samples to debug. (Optional) Enables detailed debugging for sampler elements. (Optional) Enables debugging for sampler errors.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You must have already enabled traffic monitoring with Flexible NetFlow using a sampler before you can use the debug sampler command.
Examples
The following output shows that the debug process obtained the ID for the sampler named SAMPLER-1:
Router# debug sampler detailed *Oct 28 04:14:30.883: Sampler: Sampler(SAMPLER-1: flow monitor NFC-DC-PHOENIX (ip,Et1/0,O) get ID succeeded:1 *Oct 28 04:14:30.971: Sampler: Sampler(SAMPLER-1: flow monitor NFC-DC-PHOENIX (ip,Et0/0,I) get ID succeeded:1
Related Commands
DB-2201
Description Clears the Flexible NetFlow sampler statistics. Enables debugging output for Flexible NetFlow samplers. Configures a packet interval for a Flexible NetFlow sampler. Creates a Flexible NetFlow Sampler Displays Flexible NetFlow sampler status and statistics.
DB-2202
December 2010
debug satellite
To enable debugging output for the Cisco IP VSAT satellite WAN network module (NM-1VSAT-GILAT), use the debug satellite command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug satellite {all | errors | events | hsrp | rbcp} no debug satellite {all | errors | events | hsrp | rbcp}
Syntax Description
Displays all types of satellite debug information. Displays debug information for satellite error events. Displays debug information for software events. Displays debug information for satellite Hot Standby Router Protocol (HSRP) events. Displays debug information for satellite Router Blade Control Protocol (RBCP) messages.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug satellite errors command is useful for catching unusual conditions when troubleshooting unexpected behavior. Because this command typically generates very little output, you can enter the debug satellite errors command every time you troubleshoot satellite network connectivity.
Examples
Sample Output for the debug satellite rbcp Command, page 2204 Sample Output for the debug satellite events Command, page 2204 Sample Output for the debug satellite hsrp Command, page 2204 Combined Sample Output for the debug satellite hsrp and debug standby Commands, page 2205
DB-2203
Every 2 minutes, the NM-1VSAT-GILAT network module sends the router an RBCP message requesting any updates to the routing table. The following example shows how to monitor the route-update messages:
Router# debug satellite rbcp ...
The Cisco IOS software acknowledges that it received the message from the NM-1VSAT-GILAT network module:
*May 16 09:18:54.475:Satellite1/0 RBCP Response msg Sent:IPROUTE_REQ(0x22)
The Cisco IOS software sends the IP route information to the NM-1VSAT-GILAT network module:
*May 16 09:18:54.475:Satellite1/0 RBCP Request msg Sent:IPROUTE_UPD(0x23)
The NM-1VSAT-GILAT network module acknowledges that it received the routing update from the Cisco IOS software:
*May 16 09:18:54.475:Satellite1/0 RBCP Response msg Recd:IPROUTE_UPD(0x23)
The following example shows how to monitor the periodic heartbeats that the NM-1VSAT-GILAT network module sends to the Cisco IOS software:
Router# debug satellite events satellite major software events debugging is on .Dec 16 12:57:52.108:Satellite1/0 FSM transition .Dec 16 12:58:08.888:Satellite1/0 FSM transition .Dec 16 12:58:25.664:Satellite1/0 FSM transition .Dec 16 12:58:42.440:Satellite1/0 FSM transition
The following example shows the debug satellite hsrp command messages that appear when the active router is forced to standby status because the HSRP-tracked satellite interface is shut down:
Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# interface satellite 1/0 Router(config-if)# shutdown Router(config-if)# end Router# 01:03:48:%SYS-5-CONFIG_I:Configured from console by console 01:03:49:%LINK-5-CHANGED:Interface Satellite1/0, changed state to administratively down 01:03:50:%LINEPROTO-5-UPDOWN:Line protocol on Interface Satellite1/0, changed state to down 01:04:22:%HSRP-6-STATECHANGE:FastEthernet0/0 Grp 1 state Active -> Speak 01:04:22:HSRP-sat:IPred group grp-x update state ACTIVE --> SPEAK 01:04:22:Satellite1/0 HSRP-sat:fsm crank ACTIVE-->STANDBY 01:04:22:Satellite1/0 HSRP-sat:send standby msg STANDBY 01:04:32:HSRP-sat:IPred group grp-x update state SPEAK --> STANDBY 01:04:32:Satellite1/0 HSRP-sat:fsm crank STANDBY-->STANDBY 01:04:32:Satellite1/0 HSRP-sat:send standby msg STANDBY 01:04:42:Satellite1/0 HSRP-sat:send standby msg STANDBY 01:04:52:Satellite1/0 HSRP-sat:standby msg STANDBY deferred, not in operational state 01:05:02:Satellite1/0 HSRP-sat:standby msg STANDBY deferred, not in operational state 01:05:12:Satellite1/0 HSRP-sat:standby msg STANDBY deferred, not in operational state
DB-2204
December 2010
01:05:22:Satellite1/0 HSRP-sat:standby msg STANDBY deferred, not in operational state 01:05:32:Satellite1/0 HSRP-sat:standby msg STANDBY not sent, already in state 01:06:47:%VSAT-5-STANDBY_MODE:Satellite1/0 module configured for standby mode 01:09:32:Satellite1/0 HSRP-sat:fsm crank STANDBY-->STANDBY-UP
Combined Sample Output for the debug satellite hsrp and debug standby Commands
The following example shows HSRP-related debug output for both the router and the NM-1VSAT-GILAT network module when the router goes from standby to active state because the HSRP-tracked satellite interface is reenabled:
Router# show debugging SATCOM: satellite HSRP events debugging is on HSRP: HSRP Errors debugging is on HSRP Events debugging is on HSRP Packets debugging is on
The effective HSRP priority of the router changes as the tracked satellite interface comes up:
02:14:37:HSRP:Fa0/0 02:14:39:HSRP:Fa0/0 02:14:39:HSRP:Fa0/0 02:14:39:HSRP:Fa0/0 02:14:39:HSRP:Fa0/0 Router# Grp API Grp Grp Grp 1 Hello in 10.123.96.2 Active pri 90 vIP 10.123.96.100 10.1.0.6 is not an HSRP address 1 Hello out 10.123.96.3 Standby pri 90 vIP 10.123.96.100 1 Track 1 object changed, state Down -> Up 1 Priority 90 -> 100
The router changes from standby to active state because its priority is now highest in the hot standby group, and preemption is enabled:
02:14:40:HSRP:Fa0/0 Grp 1 Hello in 10.123.96.2 Active pri 90 vIP 10.123.96.100 02:14:40:HSRP:Fa0/0 Grp 1 Standby:h/Hello rcvd from lower pri Active router (90/10.123.96.2) 02:14:40:HSRP:Fa0/0 Grp 1 Active router is local, was 10.123.96.2 02:14:40:HSRP:Fa0/0 Grp 1 Standby router is unknown, was local 02:14:40:HSRP:Fa0/0 Redirect adv out, Active, active 1 passive 3 02:14:40:HSRP:Fa0/0 Grp 1 Coup out 10.123.96.3 Standby pri 100 vIP 10.123.96.100 02:14:40:HSRP:Fa0/0 Grp 1 Standby -> Active 02:14:40:%HSRP-6-STATECHANGE:FastEthernet0/0 Grp 1 state Standby -> Active
The HSRP status of the satellite interface also changes from standby to active state because the service-module ip redundancy command was previously entered to link the HSRP status of the satellite interface to the primary HSRP interface, Fast Ethernet 0/0.
02:14:40:HSRP:Fa0/0 Grp 1 Redundancy "grp-x" state Standby -> Active 02:14:40:HSRP-sat:IPred group grp-x update state STANDBY --> ACTIVE 02:14:40:Satellite1/0 HSRP-sat:fsm crank STANDBY-UP-->ACTIVE-COND 02:14:40:HSRP:Fa0/0 Redirect adv out, Active, active 1 passive 2 02:14:40:HSRP:Fa0/0 Grp 1 Hello out 10.123.96.3 Active pri 100 vIP 10.123.96.100 02:14:40:HSRP:Fa0/0 REDIRECT adv in, Passive, active 0, passive 2, from 10.123.96.2 02:14:40:HSRP:Fa0/0 REDIRECT adv in, Passive, active 0, passive 1, from 10.123.96.15 02:14:40:HSRP:Fa0/0 Grp 1 Hello in 10.123.96.2 Speak pri 90 vIP 10.123.96.100
DB-2205
Line protocols come up, and HSRP states become fully active:
02:14:41:%LINK-3-UPDOWN:Interface Satellite1/0, changed state to up 02:14:42:%LINEPROTO-5-UPDOWN:Line protocol on Interface Satellite1/0, changed state to up 02:14:43:HSRP:Fa0/0 Grp 1 Hello out 10.123.96.3 Active pri 100 vIP 10.123.96.100 02:14:43:HSRP:Fa0/0 Grp 1 Redundancy group grp-x state Active -> Active 02:14:43:HSRP-sat:IPred group grp-x update state ACTIVE --> ACTIVE 02:14:43:Satellite1/0 HSRP-sat:fsm crank ACTIVE-COND-->ACTIVE-COND 02:14:43:HSRP:Fa0/0 Grp 1 Hello in 10.123.96.2 Speak pri 90 vIP 10.123.96.100 02:14:46:HSRP:Fa0/0 Grp 1 Hello out 10.123.96.3 Active pri 100 vIP 10.123.96.100 02:14:46:HSRP:Fa0/0 Grp 1 Redundancy group grp-x state Active -> Active 02:14:46:HSRP-sat:IPred group grp-x update state ACTIVE --> ACTIVE 02:14:46:Satellite1/0 HSRP-sat:fsm crank ACTIVE-COND-->ACTIVE-COND 02:14:46:HSRP:Fa0/0 Grp 1 Hello in 10.123.96.2 Speak pri 90 vIP 10.123.96.100 02:14:49:HSRP:Fa0/0 Grp 1 Hello out 10.123.96.3 Active pri 100 vIP 10.123.96.100 02:14:49:HSRP:Fa0/0 Grp 1 Hello in 10.123.96.2 Speak pri 90 vIP 10.123.96.100 02:14:50:HSRP:Fa0/0 Grp 1 Hello in 10.123.96.2 Standby pri 90 vIP 10.123.96.100 02:14:50:HSRP:Fa0/0 Grp 1 Standby router is 10.123.96.2 02:14:51:Satellite1/0 HSRP-sat:send standby msg ACTIVE 02:14:52:HSRP:Fa0/0 Grp 1 Hello out 10.123.96.3 Active pri 100 vIP 10.123.96.100 02:14:53:HSRP:Fa0/0 Grp 1 Hello in 10.123.96.2 Standby pri 90 vIP 10.123.96.100 02:14:55:HSRP:Fa0/0 Grp 1 Hello out 10.123.96.3 Active pri 100 vIP 10.123.96.100
Related Commands
Description Enables debugging output for the Cisco IP VSAT satellite WAN network module (NM-1VSAT-GILAT) firmware. Displays all HSRP errors, events, and packets.
DB-2206
December 2010
Syntax Description
Displays all satellite firmware events. Satellite debug level. The debug level affects what information is displayed for subsequently entered debug satellite firmware commands. See Table 303. One of the following options. See Table 303.
option
bbSatellite backbone events bufSatellite buffer events enSatellite firmware encryption events ipSatellite IP events rbcpSatellite RBCP events rpaSatellite Remote Page Acceleration (RPA) events satSatellite inbound and outbound packet statistics tcpSatellite TCP events trcSatellite backbone traces
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The output from this command is generally useful for diagnostic tasks performed by technical support. The level number affects which debug messages the system displays for subsequently entered debug satellite firmware commands. Table 303 describes what each command option displays at each debug level.
DB-2207
Note
Level 3 debugging produces significant amounts of output that may negatively impact the performance of both the NM-1VSAT-GILAT network module and the router. When you enter debug level 3, a warning message and confirmation prompt appear.
Table 303
Level 1 Output Backbone link information Buffer information Satellite firmware-based encryption events IP statistics Number of transmitted and received RBCP messages RPA statistics TCP statistics Inbound and outbound packet statistics
Level 2 Output Frame statistics for the backbone link to the hub Buffer owners Tunnel connect and disconnect events TCP connection information Inbound and outbound packet statistics
Level 3 Output Driver transmission statistics Satellite Control Protocol (SCP) message summaries TCP statistics and TCP connection information Inbound and outbound packet statistics Backbone receive and transmit traces
Examples
This section provides the following sample output for the debug satellite firmware command:
Sample Output for the debug satellite firmware all Command, page 2209 Sample Output for the bb Option at Level 1, page 2209 Sample Output for the bb Option at Level 2, page 2210 Sample Output for the buf Option at Level 1, page 2210 Sample Output for the buf Option at Level 2, page 2210 Sample Output for the ip Option at Level 1, page 2211 Sample Output for the rbcp Option at Level 1, page 2211 Sample Output for the rpa Option at Level 1, page 2211 Sample Output for the rpa Option at Level 2, page 2211 Sample Output for the sat Option at All Levels, page 2212 Sample Output for the tcp Option at Level 1, page 2212 Sample Output for the tcp Option at Level 2, page 2212 Sample Output for the tcp Option at Level 3, page 2212 Sample Output for the trc Option at Level 3, page 2213
DB-2208
December 2010
The following example shows all satellite firmware events and statistics:
Router# debug satellite firmware all 2d06h: Satellite2/0 buffers 4856 min 4486 list_str 683798 list_end 6885c8 emp 686030 fil 685de0 start 6885c8 end fb4fe8 2d06h: Satellite2/0 TCP stats: NetRXBytes=223 NetTXBytes=4775126 NetRxPkts=104213 ToIOSPkts=104166 2d06h: Satellite2/0 SAT stats: OUTbound_pkts=114131, INbound_pkts=182347 2d06h: Satellite2/0 RBCP statistics: TXcount=975 RXCount=975 2d06h: Satellite2/0 RPA stats: ToTunnel=0 FromTunnel=0 TunnelGets=0 TunnelNotGets=0 BlksUsed=0 BlksIn-Use=0 Max=300 2d06h: Satellite2/0 EN: RX encrypted bytes received = 0 RX: compressed=0 -> Uncompressed=0 TX: compressed=0 -> Uncompressed=0 2d06h: Satellite2/0 BB 6 LINK state=INFO_STATE Status = 0x79, LOW NOT READY, HI PRI READY RSP Q free=230, Max HI=228, Max LOW=224, Max DG=232 IN RA mode Curr DG BW=50000, HighDG BW=100000, Curr BW=98094 MaxDG BW=1250000, Max BW=2500000 PD Queue lengths: q_wtog=0, q_wtos=57, q_wtos_high=0, q_defrag=d DG Queue lengths: q_dg_wtos=0, q_dg_wtos_hi=0, q_dg_defrag=0 Congestion Levels: TX LOCAL = 7, TX NET = 0 2d06h: Satellite2/0 IP stats: ToIOS_Pkts=234193, ToIOS_Bytes=183444492 FromIOS_Pkts=143 From_IOS_Bytes=12204 2d06h: Satellite2/0 NO Trace at levels 1 or 2 2d06h: Satellite2/0 NO Trace at levels 1 or 2
DB-2209
MaxDG BW=1250000, Max BW=2500000 PD Queue lengths: q_wtog=0, q_wtos=95, q_wtos_high=0, q_defrag=d DG Queue lengths: q_dg_wtos=0, q_dg_wtos_hi=0, q_dg_defrag=0 Congestion Levels: TX LOCAL = 7, TX NET = 0 2d06h: Satellite2/0 BB 6 LINK state=INFO_STATE Status = 0x7b, LOW READY, HI PRI READY RSP Q free=27, Max HI=228, Max LOW=224, Max DG=232 IN RA mode Curr DG BW=50000, HighDG BW=100000, Curr BW=92376 MaxDG BW=1250000, Max BW=2500000 PD Queue lengths: q_wtog=0, q_wtos=24, q_wtos_high=0, q_defrag=d DG Queue lengths: q_dg_wtos=0, q_dg_wtos_hi=0, q_dg_defrag=0 Congestion Levels: TX LOCAL = 4, TX NET = 0
The following example shows frame statistics for the backbone link to the hub:
Router# debug satellite firmware level 2 Router# debug satellite firmware bb satellite BackBone events debugging is on Router# 2d06h: Satellite2/0 BB link statistics Frame Type # Received # Transmitted --------------------------------INFORMATION 00096238 00184811 UNNUMBERED 00000000 00000067 RETRANSMITTED 00000000 00000000 POLLS 00000000 00000000 ACKS 00006640 00000455 NAKS 00000000 00000000 PACKS 00000000 00000000 UA 00000001 00000000 SABME 00000000 00000001 DISC 00000000 00000000
DB-2210
December 2010
0x 0 Count = 49 with BB Rel only with in lower layer set with do not transmit set on BB retransmit queues
The following example shows the number of RBCP messages transmitted and received since the most recent reset of the Cisco IOS software on the router or the VSAT software on the NM-1VSAT-GILAT network module:
Router# debug satellite firmware level 1 Router# debug satellite firmware rbcp RBCP statistics:TXcount=301154 RXCount=301155
DB-2211
The following example shows inbound and outbound packet statistics. Note that for all levels, the debug output is the same for the sat option.
Router# debug satellite firmware level 1 Router# debug satellite firmware sat satellite related trace events debugging is on Router# 1d16h: Satellite2/0 SAT stats: OUTbound_pkts=25660796, INbound_pkts=3235932 1d16h: Satellite2/0 SAT stats: OUTbound_pkts=25660800, INbound_pkts=3235934 1d16h: Satellite2/0 SAT stats: OUTbound_pkts=25660803, INbound_pkts=3235934 1d16h: Satellite2/0 SAT stats: OUTbound_pkts=25660803, INbound_pkts=3235934
DB-2212
December 2010
Router# 2d06h: Satellite2/0 TCP stats: NetRXBytes=279 NetTXBytes=9436111 NetRxPkts=64991 ToIOSPkts=64999 2d06h: ID=48, ID=49, ID=62, Satellite2/0 TCP connections: locIP=192.168.107.2 remIP=172.25.1.2, locP=2962, remP=21 state=7 iosQ=0 locIP=192.168.107.2 remIP=172.25.1.2, locP=2963, remP=20 state=7 iosQ=0 locIP=192.168.107.2 remIP=172.25.1.28, locP=2976, remP=21 state=7 iosQ=0
2d06h: Satellite2/0 TCP stats: NetRXBytes=382 NetTXBytes=9582924 NetRxPkts=64993 ToIOSPkts=65001 2d06h: ID=48, ID=49, ID=62, Satellite2/0 TCP connections: locIP=192.168.107.2 remIP=172.25.1.2, locP=2962, remP=21 state=17 iosQ=0 locIP=192.168.107.2 remIP=172.25.1.2, locP=2963, remP=20 state=17 iosQ=0 locIP=192.168.107.2 remIP=172.25.1.28, locP=2976, remP=21 state=7 iosQ=0
The following example shows detailed receive and transmit traces for the backbone link:
Router# debug satellite firmware level 3 Output may be extensive and affect performance. Continue? [yes]: yes Router# debug satellite firmware trc satellite BackBone trace debugging is on Router# 2d06h: Satellite2/0 strrec 0, rec 0, count 256, trc 1a6dd78, str 1a5c600, end 1a 74600 count 4096, emp 1a6dd78, fil 1a6d8b0, lnknum=6 0 xmt 6 len 951 9 pd con 0 PF 3 ns 169 nr 15 a c12 0 0.000 1 xmt 6 len 951 9 pd con 0 PF 3 ns 170 nr 15 a c12 0 0.010 2 xmt 6 len 951 9 pd con 0 PF 3 ns 171 nr 15 a c12 0 0.010 3 xmt 6 len 951 9 pd con 0 PF 3 ns 172 nr 15 a c12 0 0.010 4 xmt 6 len 951 9 pd con 0 PF 3 ns 173 nr 15 a c12 0 0.030 5 xmt 6 len 2d06h: Satellite2/0 951 2d06h: Satellite2/0 9 pd con 0 PF 3 ns 174 nr 15 a c12 0 0.010 6 xmt 6 len 951 9 pd con 0 PF 3 ns 175 nr 15 a c12 0 0.010 7 xmt 6 len 951 9 pd con 0 PF 3 ns 176 nr 15 a c12 0 0.010 8 xmt 6 len 951 9 pd con 0 PF 3 ns 177 nr 15 a c12 0 0.010 9 xmt 6 len 951 9 pd con 0 PF 3 ns 178 nr 15 a c12 0 0.010 10 xmt 6 len 951 9 pd con 0 PF 3 ns 179 nr 15 a c12 0 0.010 11 xmt 6 len 951 9 pd con 0 PF 3 ns 180 nr 15 a c12 0 0.010
Related Commands
Description Enables debugging output for the Cisco IP VSAT satellite WAN network module (NM-1VSAT-GILAT).
DB-2213
debug sccp
To display debugging information for Simple Client Control Protocol (SCCP) and its related applications (transcoding and conferencing), use the debug sccp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sccp {all | errors | events | packets | parser} no debug sccp
Syntax Description
All SCCP debug-trace information. SCCP errors. SCCP events. SCCP packets. SCCP parser and builder.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco VG200. This command was implemented on the Cisco 2600 series, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 3700 series. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The router on which this command is used must be equipped with one or more digital T1/E1 packet voice trunk network modules (NM-HDVs) or high-density voice (HDV) transcoding and conferencing digital signal processor (DSP) farms (NM-HDV-FARMs) to provide DSP resources. Debugging is turned on for all DSP farm service sessions. You can debug multiple sessions simultaneously, with different levels of debugging for each.
Examples
The following is sample output from the debug sccp events command:
Router# debug sccp events Skinny Client Control Protocol events debugging is on *Mar count *Mar *Mar *Mar *Mar count 1 0 1 1 1 1 0 00:46:29: sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1, 00:46:29: 00:46:29: 00:46:29: 00:46:30: sccp_keepalive: send keepalive id 0, len 4 sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4 sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256 sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2,
DB-2214
December 2010
*Mar 1 00:46:30: sccp_keepalive: send keepalive id 0, len 4 *Mar 1 00:46:30: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 *Mar 1 00:46:30: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256 *Mar 1 00:46:37: sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1, count 0 *Mar 1 00:46:37: sccp_keepalive: send keepalive id 0, len 4 *Mar 1 00:46:37: sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4 *Mar 1 00:46:37: sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256 *Mar 1 00:46:37: sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2, count 0 *Mar 1 00:46:37: sccp_keepalive: send keepalive id 0, len 4 *Mar 1 00:46:38: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 *Mar 1 00:46:38: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256 *Mar 1 00:46:43: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 *Mar 1 00:46:43: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 28, offset 36, msg_id 261 *Mar 1 00:46:43: xapp_open_receive_chnl: SCCP orc_msg - 6248FC8C, appl - 6248FC10 *Mar 1 00:46:43: xapp_search_for_chnl_rec: sess_id 27, conn_id 2769 *Mar 1 00:46:43: xapp_add_chnl_rec: chnl 631142BC *Mar 1 00:46:43: xapp_add_sess_rec: Add sess_rec (63114360) record *Mar 1 00:46:43: xapp_open_receive_chnl: stat 0, eve 0, sid 27, cid 2769, codec 1, pkt-period 20 *Mar 1 00:46:43: xapp_open_chnl_request: chnl_rec 631142BC *Mar 1 00:46:43: xapp_open_chnl_request: chnl_rec 631142BC, sess_id 27, conn_id 2769, cstate 0, nstate 1 *Mar 1 00:46:43: xapp_dequeue_and_process_dspf_events: chnl_rec 631142BC, state 1, eve_id 1 *Mar 1 00:46:43: xapp_open_chnl_success: chnl_rec 631142BC *Mar 1 00:46:43: xapp_open_chnl_success: chnl_rec 631142BC, sess_id 27, conn_id 2769, cstate 1, nstate 2, lc_ipaddr 10.10.1.1, lport 21066 *Mar 1 00:46:43: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 *Mar 1 00:46:43: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 28, offset 36, msg_id 261 *Mar 1 00:46:43: xapp_open_receive_chnl: SCCP orc_msg - 6248FC8C, appl - 6248FC10 *Mar 1 00:46:43: xapp_search_for_chnl_rec: sess_id 27, conn_id 2785 *Mar 1 00:46:43: xapp_add_chnl_rec: chnl 631142E4 *Mar 1 00:46:43: xapp_open_receive_chnl: stat 0, eve 0, sid 27, cid 2785, codec 1, pkt-period 20 *Mar 1 00:46:43: xapp_open_chnl_request: chnl_rec 631142E4 *Mar 1 00:46:43: xapp_open_chnl_request: chnl_rec 631142E4, sess_id 27, conn_id 2785, cstate 0, nstate 1 *Mar 1 00:46:43: xapp_dequeue_and_process_dspf_events: chnl_rec 631142E4, state 1, eve_id 1 *Mar 1 00:46:43: xapp_open_chnl_success: chnl_rec 631142E4 *Mar 1 00:46:43: xapp_open_chnl_success: chnl_rec 631142E4, sess_id 27, conn_id 2785, cstate 1, nstate 2, lc_ipaddr 10.10.1.1, lport 25706 *Mar 1 00:46:43: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 *Mar 1 00:46:43: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 44, offset 52, msg_id 138 *Mar 1 00:46:43: xapp_start_media_transmission: SCCP stmt_msg - 6248FC8C, appl - 6248FC10 *Mar 1 00:46:43: xapp_search_for_chnl_rec: sess_id 27, conn_id 2769 *Mar 1 00:46:43: xapp_start_media_transmission: chnl_rec 631142BC, stat 2, sid 27, cid 2769, ripaddr 10.10.1.5, rport 32148, codec 1, pkt-period 20, pre 11, silen 16777500, mfpp 1 *Mar 1 00:46:43: xapp_modify_chnl_request: chnl_rec 631142BC *Mar 1 00:46:43: xapp_modify_chnl_request: chnl_rec 631142BC, sess_id 27, conn_id 2769, cstate 2, nstate 2 *Mar 1 00:46:43: xapp_dequeue_and_process_dspf_events: chnl_rec 631142BC, state 2, eve_id 4 *Mar 1 00:46:43: xapp_modify_chnl_success: chnl_rec 631142BC, sess_id 27, conn_id 2769, cstate 2 *Mar 1 00:46:43: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 *Mar 1 00:46:43: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 44, offset 52, msg_id 138 *Mar 1 00:46:43: xapp_start_media_transmission: SCCP stmt_msg - 6248FC8C, appl - 6248FC10 *Mar 1 00:46:43: xapp_search_for_chnl_rec: sess_id 27, conn_id 2785
DB-2215
*Mar 1 00:46:43: xapp_start_media_transmission: chnl_rec 631142E4, stat 2, sid 27, cid 2785, ripaddr 10.10.1.7, rport 16422, codec 1, pkt-period 20, pre 11, silen 16777501, mfpp 1 *Mar 1 00:46:43: xapp_modify_chnl_request: chnl_rec 631142E4 *Mar 1 00:46:43: xapp_modify_chnl_request: chnl_rec 631142E4, sess_id 27, conn_id 2785, cstate 2, nstate 2 *Mar 1 00:46:43: xapp_dequeue_and_process_dspf_events: chnl_rec 631142E4, state 2, eve_id 4 *Mar 1 00:46:43: xapp_modify_chnl_success: chnl_rec 631142E4, sess_id 27, conn_id 2785, cstate 2 *Mar 1 00:46:44: sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1, count 0 *Mar 1 00:46:44: sccp_keepalive: send keepalive id 0, len 4 *Mar 1 00:46:45: sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4 *Mar 1 00:46:45: sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256 *Mar 1 00:46:45: sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2, count 0 *Mar 1 00:46:45: sccp_keepalive: send keepalive id 0, len 4 *Mar 1 00:46:46: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 *Mar 1 00:46:46: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256 *Mar 1 00:46:47: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 *Mar 1 00:46:47: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 28, offset 36, msg_id 261 *Mar 1 00:46:47: xapp_open_receive_chnl: SCCP orc_msg - 6248FC8C, appl - 6248FC10 *Mar 1 00:46:47: xapp_search_for_chnl_rec: sess_id 27, conn_id 2817 *Mar 1 00:46:47: xapp_add_chnl_rec: chnl 6311430C *Mar 1 00:46:47: xapp_open_receive_chnl: stat 0, eve 0, sid 27, cid 2817, codec 1, pkt-period 20 *Mar 1 00:46:47: xapp_open_chnl_request: chnl_rec 6311430C *Mar 1 00:46:47: xapp_open_chnl_request: chnl_rec 6311430C, sess_id 27, conn_id 2817, cstate 0, nstate 1 *Mar 1 00:46:47: xapp_dequeue_and_process_dspf_events: chnl_rec 6311430C, state 1, eve_id 1 *Mar 1 00:46:47: xapp_open_chnl_success: chnl_rec 6311430C *Mar 1 00:46:47: xapp_open_chnl_success: chnl_rec 6311430C, sess_id 27, conn_id 2817, cstate 1, nstate 2, lc_ipaddr 10.10.1.1, lport 16730 *Mar 1 00:46:47: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 *Mar 1 00:46:47: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 44, offset 52, msg_id 138 *Mar 1 00:46:47: xapp_start_media_transmission: SCCP stmt_msg - 6248FC8C, appl - 6248FC10 *Mar 1 00:46:47: xapp_search_for_chnl_rec: sess_id 27, conn_id 2817 *Mar 1 00:46:47: xapp_start_media_transmission: chnl_rec 6311430C, stat 2, sid 27, cid 2817, ripaddr 10.10.1.6, rport 18160, codec 1, pkt-period 20, pre 11, silen 16777502, mfpp 1 *Mar 1 00:46:47: xapp_modify_chnl_request: chnl_rec 6311430C *Mar 1 00:46:47: xapp_modify_chnl_request: chnl_rec 6311430C, sess_id 27, conn_id 2817, cstate 2, nstate 2 *Mar 1 00:46:47: xapp_dequeue_and_process_dspf_events: chnl_rec 6311430C, state 2, eve_id 4 *Mar 1 00:46:47: xapp_modify_chnl_success: chnl_rec 6311430C, sess_id 27, conn_id 2817, cstate 2 *Mar 1 00:46:52: sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1, count 0 *Mar 1 00:46:52: sccp_keepalive: send keepalive id 0, len 4 *Mar 1 00:46:52: sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4 *Mar 1 00:46:52: sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256 *Mar 1 00:46:53: sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2, count 0 *Mar 1 00:46:53: sccp_keepalive: send keepalive id 0, len 4 *Mar 1 00:46:54: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 *Mar 1 00:46:54: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256 *Mar 1 00:46:59: sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1, count 0 *Mar 1 00:46:59: sccp_keepalive: send keepalive id 0, len 4 *Mar 1 00:47:00: sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4 *Mar 1 00:47:00: sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256
DB-2216
December 2010
*Mar count *Mar *Mar *Mar *Mar count *Mar *Mar *Mar *Mar count *Mar *Mar *Mar *Mar count *Mar *Mar *Mar *Mar count *Mar *Mar *Mar *Mar count *Mar *Mar *Mar *Mar count *Mar *Mar *Mar *Mar count *Mar *Mar *Mar *Mar count *Mar *Mar *Mar
1 0 1 1 1 1 0 1 1 1 1 0 1 1 1 1 0 1 1 1 1 0 1 1 1 1 0 1 1 1 1 0 1 1 1 1 0 1 1 1 1 0 1 1 1
00:47:01: sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2, 00:47:01: 00:47:01: 00:47:01: 00:47:07: 00:47:07: 00:47:07: 00:47:07: 00:47:08: 00:47:08: 00:47:09: 00:47:09: 00:47:14: 00:47:14: 00:47:15: 00:47:15: 00:47:16: 00:47:16: 00:47:16: 00:47:16: 00:47:22: 00:47:22: 00:47:22: 00:47:22: 00:47:23: 00:47:23: 00:47:24: 00:47:24: 00:47:29: 00:47:29: 00:47:30: 00:47:30: 00:47:31: sccp_keepalive: send keepalive id 0, len 4 sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256 sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1, sccp_keepalive: send keepalive id 0, len 4 sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4 sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256 sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2, sccp_keepalive: send keepalive id 0, len 4 sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256 sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1, sccp_keepalive: send keepalive id 0, len 4 sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4 sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256 sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2, sccp_keepalive: send keepalive id 0, len 4 sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256 sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1, sccp_keepalive: send keepalive id 0, len 4 sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4 sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256 sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2, sccp_keepalive: send keepalive id 0, len 4 sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256 sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1, sccp_keepalive: send keepalive id 0, len 4 sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4 sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256 sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2,
00:47:31: sccp_keepalive: send keepalive id 0, len 4 00:47:31: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84 00:47:31: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256
Related Commands
Command debug frame-relay vc-bundle dspfarm (DSP farm) sccp show sccp
Description Sets debugging levels for the DSP-farm service. Enables DSP-farm service. Enables SCCP and its associated transcoding and conferencing applications. Displays the SCCP configuration information and current status.
DB-2217
Syntax Description
Displays all SCCP auto-config debug trace. Displays SCCP auto-config errors. Displays SCCP auto-config events. Displays SCCP auto-config parser.
Command Default
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Communication Media Module. This command was integrated into Cisco IOS Release 12.3(14)T. This command was integrated into Cisco IOS Release 12.4(3). This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows the debug sccp config command used to enable SCCP event debugging and to display SCCP auto-configuration events:
Router# debug sccp config events ... Feb 8 02:17:31.119: mp_auto_cfg_request(req_id=2, prof=995, ccm_group_id=0) Feb 8 02:17:31.123: mp_auto_cfg_is_up: SCCP auto-config is enabled & registered ...
DB-2218
December 2010
Field prof=995
Description Indicates the profile ID. If generated by media processor auto-configuration, profile IDs are preceded by 99. Indicates the registration of sccp when auto-config is complete.
Related Commands
Description Enables auto-configuration or enters auto-config application configuration mode for the SCCP application. Enables debugging for auto-configuration applications. Displays the current status of auto-configuration applications.
DB-2219
Syntax Description
identifier
Requests that only keepalive traffic from a specific CCM be reported, for more granular debugging.
Command Modes
Command History
Modification This command was introduced. The output for this command was modified to identify which CCM the keepalives are being sent to and received from to help users distinguish which devices have proper connectivity and which do not. Prior to this modification there was no information as to which devices keepalive messages were being exchanged between.
Examples
The following example shows output from the debug sccp keepalive command:
Router# debug sccp keepalive Skinny Client Control Protocol keepalive messages debugging is on May May May May May May May May May May May May 18 18 18 18 18 18 18 18 18 18 18 18 13:53:39.242 13:53:39.242 13:53:39.570 13:53:39.570 13:54:09.243 13:54:09.243 13:54:09.571 13:54:09.571 13:54:39.243 13:54:39.243 13:54:39.571 13:54:39.571 EDT: EDT: EDT: EDT: EDT: EDT: EDT: EDT: EDT: EDT: EDT: EDT: SCCP:send SCCP:rcvd SCCP:send SCCP:rcvd SCCP:send SCCP:rcvd SCCP:send SCCP:rcvd SCCP:send SCCP:rcvd SCCP:send SCCP:rcvd KeepAliveMessage to KeepAliveAckMessage KeepAliveMessage to KeepAliveAckMessage KeepAliveMessage to KeepAliveAckMessage KeepAliveMessage to KeepAliveAckMessage KeepAliveMessage to KeepAliveAckMessage KeepAliveMessage to KeepAliveAckMessage ccm identifier 1 from ccm identifier ccm identifier 2 from ccm identifier ccm identifier 1 from ccm identifier ccm identifier 2 from ccm identifier ccm identifier 1 from ccm identifier ccm identifier 2 from ccm identifier
1 2 1 2 1 2
DB-2220
December 2010
Related Commands
Description Displays debugging information for SCCP and its related applications (transcoding and conferencing). Enables SCCP and its associated transcoding and conferencing applications.
DB-2221
debug sdlc
To display information on Synchronous Data Link Control (SDLC) frames received and sent by any router serial interface involved in supporting SDLC end station functions, use the debug sdlc command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sdlc no debug sdlc
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Note
Because the debug sdlc command can generate many messages and alter timing in the network node, use it only when instructed by authorized support personnel.
Examples
The following line of output indicates that the router is sending a Receiver Ready packet at location 4 in the code:
SDLC: Sending RR at location 4
DB-2222
December 2010
Description Interface type and unit number reporting the frame event. Protocol providing the information. Command mode of frame event. Possible values are as follows:
04 CONNECT
SDLC address of the SDLC connection. State of the protocol when the frame event occurred. Possible values are as follows:
CONNECT DISCONNECT DISCSENT (disconnect sent) ERROR (FRMR frame sent) REJSENT (reject frame sent) SNRMSENT (SNRM frame sent) USBUSY THEMBUSY BOTHBUSY
(285) IFRAME
Size of the frame (in bytes). Frame type name. Possible values are as follows:
DISCDisconnect DMDisconnect mode FRMRFrame reject IFRAMEInformation frame REJReject RNRReceiver not ready RRReceiver ready SIMSet Initialization mode command SNRMSet Normal Response Mode TESTTest frame UAUnnumbered acknowledgment XIDEXchange ID
DB-2223
Table 305
Field P/F
FFinal (printed for Response frames) PPoll (printed for Command frames) P/FPoll/Final (printed for RR, RNR, and REJ frames, which can be either Command or Response frames)
Description SDLC address. Traffic engineering type. Poll bit P is on. Receive count; range: 0 to 7. Send count; range: 0 to 7.
Description Interface type and unit number reporting the frame event. Protocol providing the information. Timer has expired. SDLC address of this SDLC connection.
DB-2224
December 2010
Table 307
Field CONNECT
Description State of the protocol when the frame event occurred. Possible values are as follows:
BOTHBUSY CONNECT DISCONNECT DISCSENT (disconnect sent) ERROR (FRMR frame sent) REJSENT (reject frame sent) SNRMSENT (SNRM frame sent) THEMBUSY USBUSY
0x9CB69E8 0
Related Commands
DB-2225
Syntax Description
number
(Optional) Frame-type that you want to monitor. See the Usage Guidelines section.
Command Modes
Privileged EXEC
Usage Guidelines
You can select the frame types you want to monitor; the frame types correspond to bit flags. You can select 1, 2, 4, or 7, which is the decimal value of the bit flag settings. If you select 1, the octet is set to 00000001. If you select 2, the octet is set to 0000010. If you select 4, the octet is set to 00000100. If you want to select all frame types, select 7; the octet is 00000111. The default is 7 for all events. Table 308 defines these bit flags.
Table 308 debug sdlc local-ack Debugging Levels
Debug Command debug sdlc local-ack 1 debug sdlc local-ack 2 debug sdlc local-ack 4 debug sdlc local-ack 7
Meaning Only U-Frame events Only I-Frame events Only S-Frame events All Synchronous Data Link Control (SDLC) Local-Ack events (default setting)
Caution
Because using this command is processor intensive, it is best to use it after hours, rather than in a production environment. It is also best to use this command by itself, rather than in conjunction with other debugging commands.
DB-2226
December 2010
Examples
The following is sample output from the debug sdlc local-ack command:
router# debug sdlc local-ack 1
SLACK (Serial3): Input = Network, LinkupRequest SLACK (Serial3): Old State = AwaitSdlcOpen SLACK (Serial3): Output = SDLC, SNRM
SLACK (Serial3): Input = SDLC, UA SLACK (Serial3): Old State = AwaitSdlcOpen SLACK (Serial3): Output = Network, LinkResponse
The first line shows the input to the SDLC local acknowledgment state machine:
SLACK (Serial3): Input = Network, LinkupRequest
Description SDLC local acknowledgment feature is providing the information. Interface type and unit number reporting the event. Source of the input. Op code. A LinkupRequest is an example of possible values.
The second line shows the change in the SDLC local acknowledgment state machine. In this case the AwaitSdlcOpen state is an internal state that has not changed while this display was captured.
SLACK (Serial3): Old State = AwaitSdlcOpen New State = AwaitSdlcOpen
The third line shows the output from the SDLC local acknowledgment state machine:
SLACK (Serial3): Output = SDLC, SNRM
DB-2227
Syntax Description
max-bytes
(Optional) Limits the number of bytes of data that are printed to the display.
Command Modes
Privileged EXEC
Usage Guidelines
This command requires intensive CPU processing; therefore, we recommend not using it when the router is expected to handle normal network loads, such as in a production environment. Instead, use this command when network response is noncritical. We also recommend that you use this command by itself, rather than in conjunction with other debug commands.
Examples
The following is sample output from the debug sdlc packet command with the packet display limited to 20 bytes of data:
Router# debug sdlc packet 20 Serial3 SDLC Output 00000 C3842C00 02010010 019000C5 C5C5C5C5 Cd.........EEEEE 00010 C5C5C5C5 EEEE Serial3 SDLC Output 00000 C3962C00 02010011 039020F2 Co.........2 Serial3 SDLC Output 00000 C4962C00 0201000C 039020F2 Do.........2 Serial3 SDLC Input 00000 C491 Dj
DB-2228
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
If the show interface serial EXEC command shows that the line and protocol are down, you can use the debug serial interface command to isolate a timing problem as the cause of a connection failure. If the keepalive values in the mineseq, yourseen, and myseen fields are not incrementing in each subsequent line of output, there is a timing or line problem at one end of the connection.
Caution
Although the debug serial interface command typically does not generate a substantial amount of output, nevertheless use it cautiously during production hours. When Switched Multimegabit Data Service (SMDS) is enabled, for example, it can generate considerable output. The output of the debug serial interface command can vary, depending on the type of WAN configured for an interface: Frame Relay, High-Level Data Link Control (HDL) , High-Speed Serial Interface (HSSI), SMDS, or X.25. The output also can vary depending on the type of encapsulation configured for that interface. The hardware platform also can affect debug serial interface output.
Examples
The following sections show and describe sample debug serial interface output for various configurations.
Debug Serial Interface for Frame Relay Encapsulation
The following message is displayed if the encapsulation for the interface is Frame Relay (or HDLC) and the router attempts to send a packet containing an unknown packet type:
Illegal serial link type code xxx
The following is sample output from the debug serial interface command for an HDLC connection when keepalives are enabled. This output shows that the remote router is not receiving all the keepalives the router is sending. When the difference in the values in the myseq and mineseen fields exceeds three, the line goes down and the interface is reset.
DB-2229
router# debug serial interface Serial1: Serial1: Serial1: Serial1: Serial1: Serial1: Serial1: Serial1: HDLC HDLC HDLC HDLC HDLC HDLC HDLC HDLC myseq myseq myseq myseq myseq myseq myseq myseq 636119, 636120, 636121, 636122, 636123, 636124, 636125, 636126, mineseen mineseen mineseen mineseen mineseen mineseen mineseen mineseen 636119, 636120, 636121, 636122, 636123, 636124, 636125, 636126, yourseen yourseen yourseen yourseen yourseen yourseen yourseen yourseen 515032, 515033, 515034, 515035, 515036, 515037, 515038, 515039, line line line line line line line line up up up up up up up up
1 missed keepalive 3 missed keepalives; line goes down and interface is reset
Serial1: HDLC myseq 636127, mineseen 636127, yourseen 515040, line up Serial1: HDLC myseq 636128, mineseen 636127, yourseen 515041, line up Serial1: HDLC myseq 636129, mineseen 636129, yourseen 515042, line up Serial1: Serial1: Serial1: Serial1: Serial1: Serial1: Serial1: HDLC HDLC HDLC HDLC HDLC HDLC HDLC myseq myseq myseq myseq myseq myseq myseq 636130, 636131, 636132, 636133, 636127, 636128, 636129, mineseen mineseen mineseen mineseen mineseen mineseen mineseen 636130, 636130, 636130, 636130, 636127, 636127, 636129, yourseen yourseen yourseen yourseen yourseen yourseen yourseen 515043, 515044, 515045, 515046, 515040, 515041, 515042, line line line line line line line up up up down up up up
Description Interface through which the serial connection is taking place. Serial connection is an HDLC connection. Myseq counter increases by one each time the router sends a keepalive packet to the remote router. Value of the mineseen counter reflects the last myseq sequence number the remote router has acknowledged receiving from the router. The remote router stores this value in its yourseen counter and sends that value in a keepalive packet to the router. Yourseen counter reflects the value of the myseq sequence number the router has received in a keepalive packet from the remote router. Connection between the routers is maintained. Value changes to line down if the values of the myseq and myseen fields in a keepalive packet differ by more than three. Value returns to line up when the interface is reset. If the line is in loopback mode, (looped) appears after this field.
Table 311 describes additional error messages that the debug serial interface command can generate for HDLC.
DB-2230
December 2010
S2561
Table 311
Field Illegal serial link type code <xxx>, PC = 0xnnnnnn Illegal HDLC serial type code <xxx>, PC = 0xnnnnn Serial 0: attempting to restart
Description Router attempted to send a packet containing an unknown packet type. Unknown packet type is received. Interface is down. The hardware is then reset to correct the problem, if possible.
Serial 0: Received bridge packet Bridge packet is received over a serial interface configured for sent to <nnnnnnnnn> HDLC, and bridging is not configured on that interface.
Debug Serial Interface for HSSI
On an HSSI interface, the debug serial interface command can generate the following additional error message:
HSSI0: Reset from 0xnnnnnnn
This message indicates that the HSSI hardware has been reset. The 0xnnnnnnn variable is the address of the routine requesting that the hardware be reset; this value is useful only to development engineers.
Debug Serial Interface for ISDN Basic Rate
Table 312 describes error messages that the debug serial interface command can generate for ISDN Basic Rate.
Table 312 debug serial interface Error Messages for ISDN Basic Rate
Message BRI: D-chan collision Received SID Loss of Frame Alignment int. Unexpected IMP int: ipr = 0xnn
Description Collision on the ISDN D channel has occurred; the software will retry transmission. ISDN hardware has lost frame alignment. This usually indicates a problem with the ISDN network. ISDN hardware received an unexpected interrupt. The 0xnn variable indicates the value returned by the interrupt register.
BRI(d): RX Frame Length Violation. Any of these messages can be displayed when a receive error occurs on one of the ISDN channels. The (d) indicates which Length=n channel it is on. These messages can indicate a problem with BRI(d): RX Nonoctet Aligned Frame the ISDN network connection. BRI(d): RX Abort Sequence BRI(d): RX CRC Error BRI(d): RX Overrun Error BRI(d): RX Carrier Detect Lost BRI0: Reset from 0xnnnnnnn BRI hardware has been reset. The 0xnnnnnnn variable is the address of the routine that requested that the hardware be reset; it is useful only to development engineers.
DB-2231
Table 312
debug serial interface Error Messages for ISDN Basic Rate (continued)
Description
Any of these messages can be displayed if the ISDN hardware is not in the proper state. The hardware is then reset. If the message is displayed constantly, it usually indicates a BRI(d): Bad state in SCONs scon1=x hardware problem. scon2 =x scon3=x Packet is received, but the encapsulation used for the packet is not recognized. The interface might be misconfigured.
Table 313 describes the additional error messages that the debug serial interface command can generate for an MK5025 device.
Table 313 debug serial interface Error Messages for an MK5025 Device
Description Hardware has been reset. The 0xnnnnnnn variable is the address of the routine that requested that the hardware be reset; it is useful only to development engineers. Packet is received, but the encapsulation used for the packet is not recognized. Interface might be misconfigured. Serial driver attempted to get a buffer (memory) and was unable to do so. This message is displayed if the hardware is not in the proper state. The hardware is reset. If this message is displayed constantly, it usually indicates a hardware problem. Hardware has interrupted the software. It displays the state that the hardware is reporting. If the interrupt indicates that the state of carrier has changed, one of these messages is displayed to indicate the current state of DCD.
MK5(d): Illegal packet encapsulation=n MK5(d): No packet available for packet realignment MK5(d): Bad state in CSR0=(x)
MK5(d): New serial state=n MK5(d): DCD is down. MK5(d): DCD is up.
When encapsulation is set to SMDS, the debug serial interface command displays SMDS packets that are sent and received, and any error messages resulting from SMDS packet transmission. The error messages that the debug serial interface command can generate for SMDS follow. The following message indicates that a new protocol requested SMDS to encapsulate the data for transmission. SMDS is not yet able to encapsulate the protocol.
SMDS: Error on Serial 0, encapsulation bad protocol = x
The following message indicates that SMDS was asked to encapsulate a packet, but no corresponding destination E.164 SMDS address was found in any of the static SMDS tables or in the ARP tables:
SMDS send: Error in encapsulation, no hardware address, type = x
DB-2232
December 2010
The following message indicates that a protocol such as Connectionless Network Service (CLNS) or IP has been enabled on an SMDS interface, but the corresponding multicast addresses have not been configured. The n variable displays the link type for which encapsulation was requested.
SMDS: Send, Error in encapsulation, type=n
The following messages can occur when a corrupted packet is received on an SMDS interface. The router expected x, but received y.
SMDS: Invalid packet, Reserved NOT ZERO, x y SMDS: Invalid packet, TAG mismatch x y SMDS: Invalid packet, Bad TRAILER length x y
The following messages can indicate an invalid length for an SMDS packet:
SMDS: SMDS: SMDS: SMDS: Invalid Invalid Invalid Invalid packet, packet, packet, packet, Bad Bad Bad Bad BA length x header extension length x header extension type x header extension value x
The following messages are displayed when the debug serial interface command is enabled:
Interface Serial 0 Sending SMDS L3 packet: SMDS: dgsize:x type:0xn src:y dst:z
If the debug serial interface command is enabled, the following message can be displayed when a packet is received on an SMDS interface, but the destination SMDS address does not match any on that interface:
SMDS: Packet n, not addressed to us
DB-2233
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the following platforms: Cisco 2610XM, Cisco 2611XM, Cisco 2620XM, Cisco 2621XM, Cisco 2650XM, Cisco 2651XM, Cisco 2691, Cisco 3631, Cisco 3660, Cisco 3725, and Cisco 3745 routers. This command was integrated into Cisco IOS Release 12.3(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To control which port is to be reported and therefore reduce the risk of flooding the console screen with debug information, enter the debug condition interface serial slot/port command after using the debug serial lead-transition command to set the condition.
Caution
To avoid having the debug message flood the console screen with debug information, use these commands only when traffic on the IP network is low, so other activity on the system is not adversely affected.
Examples
The following example shows the serial control leads reported for slot 1, port 1:
Router# debug serial lead-transition Router# debug condition interface serial 1/1 *Mar *Mar *Mar 1 00:17:15.040:slot(1) Port(1):DSR/DTR is Deasserted 1 00:17:15.040:slot(1) Port(1):CTS/RTS is Deasserted 1 00:17:47.955:slot(1) Port(1):DCD/Local Loop is Deasserted
DB-2234
December 2010
*Mar *Mar
Router# no shut down serial 1/1 *Mar *Mar *Mar *Mar *Mar 1 00:16:52.298:slot(1) Port(1):DSR/DTR is Asserted 1 00:16:52.298:slot(1) Port(1):CTS/RTS is Asserted 1 00:16:31.648:slot(1) Port(1):DCD/Local Loop is Asserted 1 00:16:31.648:slot(1) Port(1):DSR/DTR is Asserted 1 00:16:31.648:slot(1) Port(1):CTS/RTS is Asserted
Description The DSR or DTE signal is activated or inactivated. The CTS or RTS signal is activated or inactivated. The DCD or Local Loopback signal is activated or inactivated.
Related Commands
DB-2235
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug serial packet command generates output that is dependent on the type of serial interface and the encapsulation running on that interface. The hardware platform also can impact debug serial packet output. The debug serial packet command displays output for only Switched Multimegabit Data Service (SMDS) encapsulations.
Examples
The following is sample output from the debug serial packet command when SMDS is enabled on the interface:
Router# debug serial packet Interface Serial2 Sending SMDS L3 packet: SMDS Header: Id: 00 RSVD: 00 BEtag: EC Basize: 0044 Dest:E18009999999FFFF Src:C12015804721FFFF Xh:04030000030001000000000000000000 SMDS LLC: AA AA 03 00 00 00 80 38 SMDS Data: E1 19 01 00 00 80 00 00 0C 00 38 1F 00 0A 00 80 00 00 0C 01 2B 71 SMDS Data: 06 01 01 0F 1E 24 00 EC 00 44 00 02 00 00 83 6C 7D 00 00 00 00 00 SMDS Trailer: RSVD: 00 BEtag: EC Length: 0044
As the output shows, when encapsulation is set to SMDS, the debug serial packet command displays the entire SMDS header (in hexadecimal notation), and some payload data on transmit or receive. This information is useful only when you have an understanding of the SMDS protocol. The first line of the output indicates either Sending or Receiving.
DB-2236
December 2010
debug service-group
To enable debugging of service-group events and errors, use the debug service-group command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug service-group {all | error | feature | group | interface | ipc | member | qos | stats} no debug service-group {all | error | feature | group | interface | ipc | member | qos | stats}
Syntax Description
All service-group debugging. Service-group errors. Service-group features. Service-group events. Service-group interface events. Service-group Inter-Process Communication (IPC) messaging. Service-group member events. Service-group Quality of Service (QoS). Service-group statistics.
Command Modes
Command History
Release 12.2(33)SRE
Examples
In the following example, service-group debugging for service-group member events has been enabled:
Router> enable Router# debug service-group member %Service Group membership debugging is on
DB-2237
debug service-module
To display debugging information that monitors the detection and clearing of network alarms on the integrated channel service unit/data service unit (CSU/DSU) modules, use the debug service-module command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug service-module no debug service-module
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Use this command to enable and disable debug logging for the serial 0 and serial 1 interfaces when an integrated CSU/DSU is present. This command enables debugging on all interfaces. Network alarm status can also be viewed through the use of the show service-module command.
Note
The debug output varies depending on the type of service module installed in the router.
Examples
DB-2238
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Use this command only when the sgbp dial-bids command has been configured.
Examples
The following is sample output from the debug sgbp dial-bids command:
Router# debug sgbp dial-bids *Jan 1 00:25:03.643: SGBP-RES: New bid add request: 4B0 8 2 1 DAC0 1 1 This indicates a new dialout bid has started. *Jan 1 00:25:03.643: SGBP-RES: Sent Discover message to ID 7B09B71E 49 bytes The bid request has been sent. *Jan 1 00:25:03.647: SGBP-RES: Received Message of 49 length: *Jan 1 00:25:03.647: SGBP-RES: header 5 30 0 31 2 0 0 2D 0 0 0 0 0 0 0 3 0 0 0 1 1E AF 3A 41 7B 9 B7 1E 3 2 C 6 0 0 DA C0 D 4 0 0 E 3 1 F 3 1 *Jan 1 00:25:03.647: *Jan 1 00:25:03.647: SGBP RES: Scan: Message type: Offer *Jan 1 00:25:03.647: SGBP RES: Scan: Len is 45 *Jan 1 00:25:03.647: SGBP RES: Scan: Transaction ID: 3 *Jan 1 00:25:03.647: SGBP RES: Scan: Message ID: 1 *Jan 1 00:25:03.647: SGBP RES: Scan: Client ID: 1EAF3A41 *Jan 1 00:25:03.651: SGBP RES: Scan: Server ID: 7B09B71E *Jan 1 00:25:03.651: SGBP RES: Scan: Resource type 8 length 21 *Jan 1 00:25:03.651: SGBP RES: Scan: Phy-Port Media type: ISDN *Jan 1 00:25:03.651: SGBP RES: Scan: Phy-Port Min BW: 56000 *Jan 1 00:25:03.651: SGBP RES: Scan: Phy-Port Num Links: 0 *Jan 1 00:25:03.651: SGBP RES: Scan: Phy-Port User class: 1 *Jan 1 00:25:03.651: SGBP RES: Scan: Phy-Port Priority: 1 *Jan 1 00:25:03.651: SGBP-RES: received 45 length Offer packet *Jan 1 00:25:03.651: SGBP-RES: Offer from 7B09B71E for Transaction 3 accepted *Jan 1 00:25:03.651: SGBP RES: Server is uncongested. Immediate win An alternate network access server has responded and won the bid. *Jan 1 00:25:03.651: SGBP-RES: Bid Succeeded handle 7B09B71E Server-id 4B0 *Jan 1 00:25:03.651: SGBP-RES: Sent Dial-Req message to ID 7B09B71E 66 bytes The primary network access server has asked the alternate server to dial. *Jan 1 00:25:04.651: SGBP-RES: QScan: Purging entry *Jan 1 00:25:04.651: SGBP-RES: deleting entry 6112E204 1EAF3A41 from list...
15
DB-2239
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Enter the debug sgbp error command to enable the display of debugging messages about routing problems between members of a stack group.
Note
In unusual cases you may see debugging messages that are not documented on this command reference page. These debugging messages are intended for expert diagnostic interpretation by the Cisco Technical Assistance Center (TAC).
Examples
One common configuration error is setting a source IP address for a stack member that does not match the locally defined IP address for the same stack member. The following debugging output shows the error message that results from this misconfiguration:
Systema# debug sgbp error %SGBP-7-DIFFERENT - systemb's addr 10.1.1.2 is different from hello's addr 10.3.4.5
This error means that the source IP address of the Stack Group Bidding Protocol (SGBP) hello message received from systemb does not match the IP address configured locally for systemb (through the sgbp member command). Correct this configuration error by going to systemb and checking for multiple interfaces by which the SGBP hello can send the message. Another common error message is:
Systema# debug sgbp error %SGBP-7-MISCONF, Possible misconfigured member routerk (10.1.1.6)
DB-2240
December 2010
This error message means that routerk is not defined locally, but is defined on another stack member. Correct this configuration error by defining routerk across all members of the stack group using the sgbp member command. The following error message indicates that an SGBP peer is leaving the stack group:
Systema# debug sgbp error %SGBP-7-LEAVING:Member systemc leaving group stack1
This error message indicates that the peer systemc is leaving the stack group. Systemc could be leaving the stack group intentionally, or a connectivity problem may exist. The following error message indicates that an SGBP event was detected from an unknown peer:
Systema# debug sgbp error %SGBP-7-UNKNOWPEER:Event 0x10 from peer at 172.21.54.3
An SGBP event came from a network host that was not recognizable as an SGBP peer. Check to see if a network media error could have corrupted the address, or if peer equipment is malfunctioning to generate corrupted packets. Depending on the network topology and firewall of your network, SGBP packets from a nonpeer host could indicate probing and attempts to breach security.
Note
If there is a chance your network is under attack, obtain knowledgeable assistance from TAC.
Related Commands
Command debug sgbp hellos sgbp group sgbp member show sgbp username
Description Displays debugging messages for authentication between stack group members. Defines a named stack group and makes this router a member of that stack group. Specifies the hostname and IP address of a router or access server that is a peer member of a stack group. Displays the status of the stack group members. Establishes a username-based authentication system.
DB-2241
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug sgbp hellos command to enable the display of debugging messages for authentication between routers configured as members of a stack group.
Note
In unusual cases you may see debugging messages that are not documented on this command reference page. These debugging messages are intended for expert diagnostic interpretation by the Cisco Technical Assistance Center (TAC).
Examples
The following output from the debug sgbp hellos command shows systema sending a successful Challenge Handshake Authentication Protocol (CHAP) challenge to and receiving a response from systemb. Similarly, systemb sends out a challenge and receives a response from systema.
systema# debug sgbp hellos %SGBP-7-CHALLENGE: Send Hello Challenge to systemb group stack1 %SGBP-7-CHALLENGED: Hello Challenge message from member systemb (10.1.1.2) %SGBP-7-RESPONSE: Send Hello Response to systemb group stack1 %SGBP-7-CHALLENGE: Send Hello Challenge to systemb group stack1 %SGBP-7-RESPONDED: Hello Response message from member systemb (10.1.1.2) %SGBP-7-AUTHOK: Send Hello Authentication OK to member systemb (10.1.1.2) %SGBP-7-INFO: Addr = 10.1.1.2 Reference = 0xC347DF7 %SGBP-5-ARRIVING: New peer event for member systemb
This debug output is self-explanatory. If authentication fails, you may see one of the following messages in your debug output:
%SGBP-7-AUTHFAILED - Member systemb failed authentication
DB-2242
December 2010
This error message means that the remote systemb password for the stack group does not match the password defined on systema. To correct this error, make sure that both systema and systemb have the same password defined using the username command.
%SGBP-7-NORESP -Fail to respond to systemb group stack1, may not have password.
This error message means that systema does not have a username or password defined. To correct this error, define a common group password across all stack members using the username command.
Related Commands
Command debug sgbp error sgbp group sgbp member show sgbp username
Description Displays debugging messages about routing problems between members of a stack group. Defines a named stack group and makes this router a member of that stack group. Specifies the hostname and IP address of a router or access server that is a peer member of a stack group. Displays the status of the stack group members. Establishes a username-based authentication system.
DB-2243
debug sgcp
To debug the Simple Gateway Control Protocol (SGCP), use the debug sgcp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sgcp {errors | events | packet} no debug sgcp {errors | events | packet}
Syntax Description
Displays debug information about SGCP errors. Displays debug information about SGCP events. Displays debug information about SGCP packets.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Support for this command was extended to the Cisco uBR924 cable access router. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
See the following examples to enable and disable debugging at the specified level:
Router# debug sgcp errors Simple Gateway Control Protocol errors debugging is on Router# no debug sgcp errors Simple Gateway Control Protocol errors debugging is off Router# Router# debug sgcp events Simple Gateway Control Protocol events debugging is on Router# no debug sgcp events Simple Gateway Control Protocol events debugging is off Router# Router# debug sgcp packet Simple Gateway Control Protocol packets debugging is on Router# no debug sgcp packet Simple Gateway Control Protocol packets debugging is off
DB-2244
December 2010
Related Commands
Command sgcp
DB-2245
Syntax Description
endpoint string
(Optional) Specifies the endpoint string if you want to debug SGCP errors for a specific endpoint. On the Cisco MC3810 router, the endpoint string syntax takes the following forms:
On the Cisco 3600 router, the endpoint string syntax takes the following forms:
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 access server in a private release that was not generally available. Support for this command was extended to the Cisco MC3810 and the Cisco 3600 series routers (except for the Cisco 3620). Also, the endpoint keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Examples
The following example shows the debugging of SGCP errors being enabled:
Router# debug sgcp errors Simple Gateway Control Protocol errors debugging is on no errors since call went through successfully.
DB-2246
December 2010
The following example shows a debug trace for SGCP errors on a specific endpoint:
Router# debug sgcp errors endpoint DS1-0/1 End point name for error debug:DS1-0/1 (1) 00:08:41:DS1 = 0, DS0 = 1 00:08:41:Call record found 00:08:41:Enable error end point debug for (DS1-0/1)
Related Commands
Command debug rtpspi all debug rtpspi errors debug rtpspi inout debug rtpspi send-nse debug sgcp events debug sgcp packet debug vtsp send-nse
Description Debugs all RTP SPI errors, sessions, and in/out functions. Debugs RTP SPI errors. Debugs RTP SPI in/out functions. Triggers the RTP SPI to send a triple redundant NSE. Debugs SGCP events. Debugs SGCP packets. Sends and debugs a triple redundant NSE from the DSP to a remote gateway.
DB-2247
Syntax Description
endpoint string
(Optional) Specifies the endpoint string if you want to debug SGCP errors for a specific endpoint. On the Cisco MC3810 router, the endpoint string syntax takes the following forms:
On the Cisco 3600 router, the endpoint string syntax takes the following forms:
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 access server in a private release that was not generally available. Support for this command was extended to the Cisco MC3810 and the Cisco 3600 series routers (except for the Cisco 3620 router). Also, the endpoint keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Examples
The following example shows a debug trace for SGCP events on a specific endpoint:
Router# debug sgcp events endpoint DS1-0/1 End point name for event debug:DS1-0/1 (1) 00:08:54:DS1 = 0, DS0 = 1 00:08:54:Call record found 00:08:54:Enable event end point debug for (DS1-0/1)
DB-2248
December 2010
The following example shows a debug trace for all SGCP events on a gateway:
Router# debug sgcp events *Mar 1 01:13:31.035:callp :19196BC, state :0, call ID :-1, event :23
*Mar 1 01:13:31.035:voice_if->call_agent_ipaddr used as Notify entityNotify entity available for Tx SGCP msg NTFY send to ipaddr=1092E01 port=2427 *Mar 1 01:13:31.039:Push msg into SGCP wait ack queue* (1)[25] *Mar 1 01:13:31.039:Timed Out interval [1]:(2000) *Mar 1 01:13:31.039:Timed Out interval [1]:(2000)(0):E[25] *Mar 1 01:13:31.075:Removing msg : NTFY 25 ds1-1/13@mc1 SGCP 1.1 X:358258758 O:hd *Mar *Mar *Mar *Mar *Mar 1 01:13:31.075:Unqueue msg from SGCP wait ack q** (0)[25]DS1 = 1, DS0 = 13 1 01:13:31.091:callp :19196BC, vdbptr :1964EEC, state :1 1 01:13:31.091:Checking ack (trans ID 237740140) :
1 01:13:31.091:is_capability_ok:caps.codec=5, caps.pkt=10, caps.nt=8 1 01:13:31.091:is_capability_ok:supported signal=0x426C079C, signal2=0x80003, event=0x6003421F, event2=0x3FD requested signal=0x0, signal2=0x0, event=0x20000004, event2=0xC *Mar 1 01:13:31.091:Same digit map is download (ds1-1/13@mc1) *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar 1 01:13:31.091:R:requested trans_id (237740140) 1 01:13:31.091:process_signal_ev:seizure possible=1, signal mask=0x4, mask2=0x0 1 01:13:32.405:SGCP Session Appl:ignore CCAPI event 10 1 01:13:32.489:callp :19196BC, state :1, call ID :16, event :9 1 01:13:32.610:SGCP Session Appl:ignore CCAPI event 10 1 01:13:32.670:callp :19196BC, state :1, call ID :16, event :9 1 01:13:32.766:SGCP Session Appl:ignore CCAPI event 10 1 01:13:32.810:callp :19196BC, state :1, call ID :16, event :9 1 01:13:32.931:SGCP Session Appl:ignore CCAPI event 10 1 01:13:32.967:callp :19196BC, state :1, call ID :16, event :9 1 01:13:33.087:SGCP Session Appl:ignore CCAPI event 10 1 01:13:33.132:callp :19196BC, state :1, call ID :16, event :9 1 01:13:33.240:SGCP Session Appl:ignore CCAPI event 10 1 01:13:33.280:callp :19196BC, state :1, call ID :16, event :9 1 01:13:33.389:SGCP Session Appl:ignore CCAPI event 10 1 01:13:33.433:callp :19196BC, state :1, call ID :16, event :9 1 01:13:33.537:SGCP Session Appl:ignore CCAPI event 10 1 01:13:33.581:callp :19196BC, state :1, call ID :16, event :9
DB-2249
*Mar *Mar
1 01:13:33.702:SGCP Session Appl:ignore CCAPI event 10 1 01:13:33.742:callp :19196BC, state :1, call ID :16, event :9
*Mar 1 01:13:33.742:voice_if->call_agent_ipaddr used as Notify entityNotify entity available for Tx SGCP msg NTFY send to ipaddr=1092E01 port=2427 *Mar 1 01:13:33.742:Push msg into SGCP wait ack queue* (1)[26] *Mar 1 01:13:33.742:Timed Out interval [1]:(2000) *Mar 1 01:13:33.742:Timed Out interval [1]:(2000)(0):E[26] *Mar 1 01:13:33.786:Removing msg : NTFY 26 ds1-1/13@mc1 SGCP 1.1 X:440842371 O:k0, 4081037, s0 *Mar *Mar *Mar *Mar *Mar 1 01:13:33.786:Unqueue msg from SGCP wait ack q** (0)[26]DS1 = 1, DS0 = 13 1 01:13:33.802:callp :19196BC, vdbptr :1964EEC, state :1 1 01:13:33.802:Checking ack (trans ID 698549528) :
1 01:13:33.802:is_capability_ok:caps.codec=5, caps.pkt=10, caps.nt=8 1 01:13:33.802:is_capability_ok:supported signal=0x426C079C, signal2=0x80003, event=0x6003421F, event2=0x3FD requested signal=0x0, signal2=0x0, event=0x4, event2=0x0 *Mar 1 01:13:33.802:R:requested trans_id (698549528) *Mar *Mar *Mar 1 01:13:33.802:set_up_voip_call_leg:peer_addr=0, peer_port=0. 1 01:13:33.806:call_setting_crcx:Enter CallProceeding state rc = 0, call_id=16 1 01:13:33.806:callp :19196BC, state :4, call ID :16, event :31
*Mar 1 01:13:33.810:callp :1AF5798, state :2, call ID :17, event :8 call_pre_bridge! *Mar *Mar *Mar *Mar 1 01:13:33.810:send_oc_create_ack:seizure_possiblle=1, ack-lready-sent=0, ack_send=0 1 01:13:33.814:callp :1AF5798, state :4, call ID :17, event :28 1 01:13:33.814:Call Connect:Raw Msg ptr=0x1995360, no-offhook=0; call-id=17 1 01:13:33.814:SGCP Session Appl:ignore CCAPI event 37
*Mar 1 01:13:33.947:callp :19196BC, state :5, call ID :16, event :32 process_nse_on_orig DS1 = 1, DS0 = 13 *Mar *Mar *Mar *Mar 1 01:13:34.007:callp :19196BC, vdbptr :1964EEC, state :5 1 01:13:34.007:Checking ack (trans ID 123764791) :
1 01:13:34.007:is_capability_ok:caps.codec=5, caps.pkt=10, caps.nt=8 1 01:13:34.007:is_capability_ok:supported signal=0x426C079C, signal2=0x80003, event=0x6003421F, event2=0x3FD requested signal=0x0, signal2=0x0, event=0x4, event2=0x0 *Mar 1 01:13:34.007:R:requested trans_id (123764791) *Mar *Mar *Mar *Mar *Mar *Mar 1 1 1 1 1 1 01:13:34.007:process_signal_ev:seizure possible=1, signal mask=0x0, mask2=0x0 01:13:34.007:modify_connection:echo_cancel=1. 01:13:34.007:modify_connection:vad=0. 01:13:34.007:modify_connection:peer_addr=6000001, peer_port=0->16500. 01:13:34.007:modify_connection:conn_mode=2. 01:13:34.011:callp :19196BC, state :5, call ID :16, event :31
*Mar 1 01:13:34.011:callp :1AF5798, state :5, call ID :17, event :31 process_nse_event
DB-2250
December 2010
*Mar
*Mar 1 01:13:34.051:call_id=16, ignore_ccapi_ev:ignore 19 for state 5 DS1 = 1, DS0 = 13 *Mar *Mar *Mar *Mar 1 01:13:39.497:callp :19196BC, vdbptr :1964EEC, state :5 1 01:13:39.497:Checking ack (trans ID 553892443) :
1 01:13:39.497:is_capability_ok:caps.codec=5, caps.pkt=10, caps.nt=8 1 01:13:39.497:is_capability_ok:supported signal=0x426C079C, signal2=0x80003, event=0x6003421F, event2=0x3FD requested signal=0x8, signal2=0x0, event=0x4, event2=0x0 *Mar 1 01:13:39.497:R:requested trans_id (553892443) *Mar *Mar *Mar *Mar *Mar *Mar *Mar 1 1 1 1 1 1 01:13:39.497:process_signal_ev:seizure possible=1, signal mask=0x0, mask2=0x0 01:13:39.497:modify_connection:echo_cancel=1. 01:13:39.497:modify_connection:vad=0. 01:13:39.497:modify_connection:peer_addr=6000001, peer_port=16500->16500. 01:13:39.497:modify_connection:conn_mode=3. 01:13:39.497:callp :19196BC, state :5, call ID :16, event :31
*Mar 1 01:14:03.883:Removing ack (trans ID 698549528) : 200 698549528 OK I:7 v=0 c=IN IP4 5.0.0.1 m=audio 16400 RTP/AVP 0
*Mar 1 01:14:04.087:Removing ack (trans ID 123764791) : 200 123764791 OK I:7 v=0 c=IN IP4 5.0.0.1 m=audio 16400 RTP/AVP 0
*Mar 1 01:14:09.573:Removing ack (trans ID 553892443) : 200 553892443 OK I:7 v=0 c=IN IP4 5.0.0.1 m=audio 16400 RTP/AVP 0 *Mar 1 01:14:48.091:callp :19196BC, state :5, call ID :16, event :12
*Mar 1 01:14:48.091:voice_if->call_agent_ipaddr used as Notify entityNotify entity available for Tx SGCP msg NTFY send to ipaddr=1092E01 port=2427 *Mar 1 01:14:48.091:Push msg into SGCP wait ack queue* (1)[27] *Mar 1 01:14:48.091:Timed Out interval [1]:(2000) *Mar 1 01:14:48.091:Timed Out interval [1]:(2000)(0):E[27] *Mar 1 01:14:48.128:Removing msg :
DB-2251
NTFY 27 ds1-1/13@mc1 SGCP 1.1 X:97849341 O:hu *Mar *Mar *Mar *Mar *Mar 1 01:14:48.128:Unqueue msg from SGCP wait ack q** (0)[27]DS1 = 1, DS0 = 13 1 01:14:48.212:callp :19196BC, vdbptr :1964EEC, state :5 1 01:14:48.212:Checking ack (trans ID 79307869) :
1 01:14:48.212:is_capability_ok:caps.codec=5, caps.pkt=10, caps.nt=8 1 01:14:48.212:is_capability_ok:supported signal=0x426C079C, signal2=0x80003, event=0x6003421F, event2=0x3FD requested signal=0x4, signal2=0x0, event=0x0, event2=0x0 *Mar 1 01:14:48.212:delete_call:callp:19196BC, call ID:16 *Mar 1 01:14:48.212:sgcp delete_call:Setting disconnect_by_dlcx to 1 *Mar 1 01:14:48.216:callp :1AF5798, state :6, call ID :17, event :29 *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar 13 *Mar *Mar *Mar *Mar 1 1 1 1 1 1 01:14:48.216:Call disconnect:Raw Msg ptr = 0x0, call-id=17 01:14:48.216:disconnect_call_leg O.K. call_id=17 01:14:48.216:SGCP:Call disconnect:No need to send onhook 01:14:48.216:Call disconnect:Raw Msg ptr = 0x19953B0, call-id=16 01:14:48.216:disconnect_call_leg O.K. call_id=16 01:14:48.220:callp :1AF5798, state :7, call ID :17, event :13
1 01:14:48.220:Processing DLCX signal request :4, 0, 0 1 01:14:48.220:call_disconnected:call_id=17, peer 16 is not idle yet.DS1 = 1, DS0 =
1 01:14:48.272:is_capability_ok:caps.codec=5, caps.pkt=10, caps.nt=8 1 01:14:48.272:is_capability_ok:supported signal=0x426C079C, signal2=0x80003, event=0x6003421F, event2=0x3FD requested signal=0x0, signal2=0x0, event=0x8, event2=0x0 *Mar 1 01:14:48.272:R:requested trans_id (75540355) *Mar *Mar *Mar *Mar 1 01:14:48.272:process_signal_ev:seizure possible=1, signal mask=0x4, mask2=0x0 1 01:14:49.043:callp :19196BC, state :7, call ID :16, event :27 1 01:14:49.043:process_call_feature:Onhook event 1 01:14:49.043:callp :19196BC, state :7, call ID :16, event :13
*Mar 1 01:15:18.288:Removing ack (trans ID 79307869) : 250 79307869 OK *Mar 1 01:15:18.344:Removing ack (trans ID 75540355) : 200 75540355 OK
DB-2252
December 2010
Related Commands
Command debug rtpspi all debug rtpspi errors debug rtpspi inout debug rtpspi send-nse debug sgcp errors debug sgcp packet debug vtsp send-nse
Description Debugs all RTP SPI errors, sessions, and in/out functions. Debugs RTP SPI errors. Debugs RTP SPI in/out functions. Triggers the RTP SPI to send a triple redundant NSE. Debugs SGCP errors. Debugs SGCP packets. Sends and debugs a triple redundant NSE from the DSP to a remote gateway.
DB-2253
Syntax Description
endpoint string
(Optional) Specifies the endpoint string if you want to debug SGCP errors for a specific endpoint. On the Cisco MC3810, the endpoint string syntax takes the following forms:
On the Cisco 3600, the endpoint string syntax takes the following forms:
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 in a private release that was not generally available. Support for this command was extended to the Cisco MC3810 and the Cisco 3600 series routers (except for the Cisco 3620). Also, the endpoint keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Examples
The following example shows a debug trace for SGCP packets on a specific endpoint:
Router# debug sgcp packet endpoint DS1-0/1 End point name for packet debug:DS1-0/1 (1) 00:08:14:DS1 = 0, DS0 = 1 00:08:14:Enable packet end point debug for (DS1-0/1)
DB-2254
December 2010
The following example shows a debug trace for all SGCP packets on a gateway:
Router# debug sgcp packet *Mar 1 01:07:45.204:SUCCESS:Request ID string building is OK *Mar 1 01:07:45.204:SUCCESS:Building SGCP Parameter lines is OK *Mar 1 01:07:45.204:SUCCESS:SGCP message building OK *Mar 1 01:07:45.204:SUCCESS:END of building *Mar 1 01:07:45.204:SGCP Packet sent ---> NTFY 22 ds1-1/13@mc1 SGCP 1.1 X:550092018 O:hd <--*Mar *Mar 200 22 *Mar *Mar *Mar 1 01:07:45.244:SUCCESS:SGCP Header parsing was OK 1 01:07:45.244:SUCCESS:END of Parsing 1 01:07:45.256:Packet received 1 01:07:45.204:NTFY Packet sent successfully. 1 01:07:45.240:Packet received -
RQNT 180932866 ds1-1/13@mc1 SGCP 1.1 X:362716780 R:hu,k0(A),s0(N),[0-9T](A) (D) D:(9xx|xxxxxxx) *Mar 1 01:07:45.256:SUCCESS:SGCP Header parsing was OK *Mar 1 01:07:45.256:SUCCESS:Request ID string(362716780) parsing is OK *Mar 1 01:07:45.260:SUCCESS:Requested Event parsing is OK *Mar 1 01:07:45.260:SUCCESS:Digit Map parsing is OK *Mar 1 01:07:45.260:SUCCESS:END of Parsing *Mar 1 01:07:45.260:SUCCESS:SGCP message building OK *Mar 1 01:07:45.260:SUCCESS:END of building *Mar 1 01:07:45.260:SGCP Packet sent ---> 200 180932866 OK <--*Mar 1 01:07:47.915:SUCCESS:Request ID string building is OK *Mar 1 01:07:47.915:SUCCESS:Building SGCP Parameter lines is OK *Mar 1 01:07:47.919:SUCCESS:SGCP message building OK *Mar 1 01:07:47.919:SUCCESS:END of building *Mar 1 01:07:47.919:SGCP Packet sent ---> NTFY 23 ds1-1/13@mc1 SGCP 1.1 X:362716780 O:k0, 4081037, s0 <--*Mar *Mar 200 23 *Mar *Mar *Mar 1 01:07:47.955:SUCCESS:SGCP Header parsing was OK 1 01:07:47.955:SUCCESS:END of Parsing 1 01:07:47.971:Packet received 1 01:07:47.919:NTFY Packet sent successfully. 1 01:07:47.955:Packet received -
DB-2255
R:hu C:6 *Mar 1 01:07:47.971:SUCCESS:SGCP Header parsing was OK *Mar 1 01:07:47.971:SUCCESS:Connection Mode parsing is OK *Mar 1 01:07:47.971:SUCCESS:Packet period parsing is OK *Mar 1 01:07:47.971:SUCCESS:Echo Cancellation parsing is OK *Mar 1 01:07:47.971:SUCCESS:Silence Supression parsing is OK *Mar 1 01:07:47.971:SUCCESS:CODEC strings parsing is OK *Mar 1 01:07:47.971:SUCCESS:Local Connection option parsing is OK *Mar 1 01:07:47.971:SUCCESS:Requested Event parsing is OK *Mar 1 01:07:47.975:SUCCESS:Call ID string(6) parsing is OK *Mar 1 01:07:47.975:SUCCESS:END of Parsing *Mar 1 01:07:47.979:SUCCESS:Conn ID string building is OK *Mar 1 01:07:47.979:SUCCESS:Building SGCP Parameter lines is OK *Mar 1 01:07:47.979:SUCCESS:SGCP message building OK *Mar 1 01:07:47.979:SUCCESS:END of building *Mar 1 01:07:47.979:SGCP Packet sent ---> 200 938694984 OK I:6 v=0 c=IN IP4 5.0.0.1 m=audio 16538 RTP/AVP 0 <--*Mar 1 01:07:48.188:Packet received -
MDCX 779665338 ds1-1/13@mc1 SGCP 1.1 I:6 M:recvonly L:p:10,e:on,s:off,a:G.711u R:hu C:6 v=0 c=IN IP4 6.0.0.1 m=audio 16392 RTP/AVP 0 *Mar 1 01:07:48.188:SUCCESS:SGCP Header parsing was OK *Mar 1 01:07:48.188:SUCCESS:Conn ID string(6) parsing is OK *Mar 1 01:07:48.192:SUCCESS:Connection Mode parsing is OK *Mar 1 01:07:48.192:SUCCESS:Packet period parsing is OK *Mar 1 01:07:48.192:SUCCESS:Echo Cancellation parsing is OK *Mar 1 01:07:48.192:SUCCESS:Silence Supression parsing is OK *Mar 1 01:07:48.192:SUCCESS:CODEC strings parsing is OK *Mar 1 01:07:48.192:SUCCESS:Local Connection option parsing is OK *Mar 1 01:07:48.192:SUCCESS:Requested Event parsing is OK *Mar 1 01:07:48.192:SUCCESS:Call ID string(6) parsing is OK *Mar 1 01:07:48.192:SUCCESS:SDP Protocol version parsing OK *Mar 1 01:07:48.192:SUCCESS:SDP Conn Data OK *Mar 1 01:07:48.192:SUCCESS:END of Parsing *Mar 1 01:07:48.200:SUCCESS:Conn ID string building is OK *Mar 1 01:07:48.200:SUCCESS:Building SGCP Parameter lines is OK *Mar 1 01:07:48.200:SUCCESS:SGCP message building OK *Mar 1 01:07:48.200:SUCCESS:END of building *Mar 1 01:07:48.200:SGCP Packet sent ---> 200 779665338 OK I:6 v=0 c=IN IP4 5.0.0.1 m=audio 16538 RTP/AVP 0
DB-2256
December 2010
MDCX 177780432 ds1-1/13@mc1 SGCP 1.1 I:6 M:sendrecv X:519556004 L:p:10,e:on, s:off,a:G.711u C:6 R:hu S:hd v=0 c=IN IP4 6.0.0.1 m=audio 16392 RTP/AVP 0 *Mar 1 01:07:53.674:SUCCESS:SGCP Header parsing was OK *Mar 1 01:07:53.674:SUCCESS:Conn ID string(6) parsing is OK *Mar 1 01:07:53.674:SUCCESS:Connection Mode parsing is OK *Mar 1 01:07:53.674:SUCCESS:Request ID string(519556004) parsing is OK *Mar 1 01:07:53.678:SUCCESS:Packet period parsing is OK *Mar 1 01:07:53.678:SUCCESS:Echo Cancellation parsing is OK *Mar 1 01:07:53.678:SUCCESS:Silence Supression parsing is OK *Mar 1 01:07:53.678:SUCCESS:CODEC strings parsing is OK *Mar 1 01:07:53.678:SUCCESS:Local Connection option parsing is OK *Mar 1 01:07:53.678:SUCCESS:Call ID string(6) parsing is OK *Mar 1 01:07:53.678:SUCCESS:Requested Event parsing is OK *Mar 1 01:07:53.678:SUCCESS:Signal Requests parsing is OK *Mar 1 01:07:53.678:SUCCESS:SDP Protocol version parsing OK *Mar 1 01:07:53.678:SUCCESS:SDP Conn Data OK *Mar 1 01:07:53.678:SUCCESS:END of Parsing *Mar 1 01:07:53.682:SUCCESS:Conn ID string building is OK *Mar 1 01:07:53.682:SUCCESS:Building SGCP Parameter lines is OK *Mar 1 01:07:53.682:SUCCESS:SGCP message building OK *Mar 1 01:07:53.682:SUCCESS:END of building *Mar 1 01:07:53.682:SGCP Packet sent ---> 200 177780432 OK I:6 v=0 c=IN IP4 5.0.0.1 m=audio 16538 RTP/AVP 0 <--*Mar 1 01:09:02.401:SUCCESS:Request ID string building is OK *Mar 1 01:09:02.401:SUCCESS:Building SGCP Parameter lines is OK *Mar 1 01:09:02.401:SUCCESS:SGCP message building OK *Mar 1 01:09:02.401:SUCCESS:END of building *Mar 1 01:09:02.401:SGCP Packet sent ---> NTFY 24 ds1-1/13@mc1 SGCP 1.1 X:519556004 O:hu <--*Mar *Mar 200 24 *Mar 1 01:09:02.441:SUCCESS:SGCP Header parsing was OK 1 01:09:02.401:NTFY Packet sent successfully. 1 01:09:02.437:Packet received -
DB-2257
*Mar *Mar
DLCX 865375036 ds1-1/13@mc1 SGCP 1.1 C:6 S:hu *Mar 1 01:09:02.541:SUCCESS:SGCP Header parsing was OK *Mar 1 01:09:02.541:SUCCESS:Call ID string(6) parsing is OK *Mar 1 01:09:02.541:SUCCESS:Signal Requests parsing is OK *Mar 1 01:09:02.541:SUCCESS:END of Parsing *Mar 1 01:09:02.545:SUCCESS:SGCP message building OK *Mar 1 01:09:02.545:SUCCESS:END of building *Mar 1 01:09:02.545:SGCP Packet sent ---> 250 865375036 OK <--*Mar 1 01:09:02.577:Packet received -
RQNT 254959796 ds1-1/13@mc1 SGCP 1.1 X:358258758 R:hd *Mar 1 01:09:02.577:SUCCESS:SGCP Header parsing was OK *Mar 1 01:09:02.577:SUCCESS:Request ID string(358258758) parsing is OK *Mar 1 01:09:02.577:SUCCESS:Requested Event parsing is OK *Mar 1 01:09:02.581:SUCCESS:END of Parsing *Mar 1 01:09:02.581:SUCCESS:SGCP message building OK *Mar 1 01:09:02.581:SUCCESS:END of building *Mar 1 01:09:02.581:SGCP Packet sent ---> 200 254959796 OK
Related Commands
Command debug rtpspi all debug rtpspi errors debug rtpspi inout debug rtpspi send-nse debug sgcp errors debug sgcp events debug vtsp send-nse
Description Debugs all RTP SPI errors, sessions, and in/out functions. Debugs RTP SPI errors. Debugs RTP SPI in/out functions. Triggers the RTP SPI to send a triple redundant NSE. Debugs SGCP errors. Debugs SGCP events. Sends and debugs a triple redundant NSE from the DSP to a remote gateway.
DB-2258
December 2010
debug shared-line
To display debugging information about SIP shared lines, use the debug shared-line command in privileged EXEC mode. To disable debugging messages, use the no form of this command. debug shared-line {all | errors | events | info} no debug shared-line {all | errors | events | info}
Syntax Description
Displays all shared-line debugging messages. Displays shared-line error messages. Displays shared-line event messages. Displays general information about shared lines.
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.4(24)T.
12.4(24)T
Examples
The following example shows output from the debug shared-line all command:
Router# debug shared-line all Aug 21 21:56:56.949: //Shared-Line/EVENT/shrl_validate_newcall_outgoing:Outgoing call validation request from AFW for user = 20143, usrContainer = 4A7CFBDC .Aug 21 21:56:56.949: //Shared-Line/INFO/shrl_find_ccb_by_dn:Searching Shared-Line table for dn '20143' .Aug 21 21:56:56.949: //Shared-Line/INFO/shrl_find_ccb_by_dn:Entry not found for dn '20143' .Aug 21 21:56:56.949: //Shared-Line/INFO/shrl_find_ccb_by_demote_dn:Demoted dn: 20143 .Aug 21 21:56:56.949: //Shared-Line/INFO/shrl_validate_newcall_outgoing:User '20143' doesn't exist in Shared-Line table .Aug 21 21:56:56.957: //Shared-Line/EVENT/shrl_validate_newcall_incoming:Incominging call validation request from AFW for user = 20141 .Aug 21 21:56:56.957: //Shared-Line/INFO/shrl_find_ccb_by_dn:Searching Shared-Line table for dn '20141' .Aug 21 21:56:56.957: //Shared-Line/INFO/shrl_find_ccb_by_dn:Entry found [ccb = 4742EAD4] for dn '20141' .Aug 21 21:56:56.957: //Shared-Line/INFO/shrl_validate_newcall_incoming:User '20141' found: ccb = 4742EAD4, mem_count = 2 .Aug 21 21:56:56.957: //Shared-Line/EVENT/shrl_validate_newcall_incoming:Obtained call instance inst: 0 for incoming call, incoming leg (peer_callid): 5399) .Aug 21 21:56:56.957: //Shared-Line/INFO/shrl_update_barge_calltype:Updating shared-line call -1 with calltype = 1
DB-2259
.Aug 21 21:56:56.961: //Shared-Line/INFO/shrl_find_ccb_by_dn:Searching Shared-Line table for dn '20141' .Aug 21 21:56:56.961: //Shared-Line/INFO/shrl_find_ccb_by_dn:Entry found [ccb = 4742EAD4] for dn '20141' .Aug 21 21:56:56.961: //Shared-Line/INFO/shrl_find_ccb_by_dn:Searching Shared-Line table for dn '20141' .Aug 21 21:56:56.961: //Shared-Line/INFO/shrl_find_ccb_by_dn:Entry found [ccb = 4742EAD4] for dn '20141' .Aug 21 21:57:01.689: %IPPHONE-6-REG_ALARM: 24: Name=SEP00141C48E126 Load=8.0(5.0) Last=Phone-Reg-Rej .Aug 21 21:57:04.261: //Shared-Line/EVENT/shrl_app_event_notify_handler:Event notification received: event = 9, callID = 5401, dn = 20141 .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_find_ccb_by_dn:Searching Shared-Line table for dn '20141' .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_find_ccb_by_dn:Entry found [ccb = 4742EAD4] for dn '20141' .Aug 21 21:57:04.261: //Shared-Line/EVENT/shrl_process_connect:called with state = 3, callID = 5401, peer callID = 5399, dn = 20141, usrContainer = 4A7CACA4 .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_connect_upd_callinfo:Parsed To: [email protected], to-tag: 2ed5b927-6ad6 .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_connect_upd_callinfo:Parsed Contact: [email protected] for sipCallId: [email protected] .Aug 21 21:57:04.261: //Shared-Line/EVENT/shrl_connect_upd_callinfo:Obtained call instance inst: 0 .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_connect_upd_callinfo:CONNECT from shared line for incoming shared-line call. .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_find_peer_by_ipaddr:Trying to match peer for member [email protected] .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_find_peer_by_ipaddr:Matching peer [40002] session target parsed = 15.6.0.2 .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_connect_upd_callinfo:Matching member found: [email protected] .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_update_remote_name:Updating shared-line call dialog info 5401 .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_process_connect:Updated callinfo for callid: 5401, member: '[email protected]', peer-tag: 40002 .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_process_connect:Notify remote users about CALL-CONNECT. .Aug 21 21:57:04.261: //Shared-Line/EVENT/shrl_send_dialog_notify:Sending NOTIFY to remote user: [email protected] .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_send_dialog_notify:Sending NOTIFY to remote user: [email protected] about state 3 on incoming call from [email protected] privacy OFF .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_send_dialog_notify:Dialog msg: dir: 1, orient: 2, local_tag: 2ed5b927-6ad6, remote_tag: 89DCF0-139B, local_uri: [email protected], remote_uri: [email protected] .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_send_dialog_notify:Dialog notify sent successfully .Aug 21 21:57:04.261: //Shared-Line/INFO/shrl_process_connect:Shared-Line '20141': Successfully sent notify for callid: 5401 .Aug 21 21:57:04.265: //Shared-Line/INFO/shrl_find_ccb_by_dn:Searching Shared-Line table for dn '20141' .Aug 21 21:57:04.265: //Shared-Line/INFO/shrl_find_ccb_by_dn:Entry found [ccb = 4742EAD4] for dn '20141' .Aug 21 21:57:04.265: //Shared-Line/INFO/shrl_find_ccb_by_dn:Searching Shared-Line table for dn '20143' .Aug 21 21:57:04.265: //Shared-Line/INFO/shrl_find_ccb_by_dn:Entry not found for dn '20143' .Aug 21 21:57:04.269: //Shared-Line/INFO/shrl_find_ccb_by_demote_dn:Demoted dn: 20143 .Aug 21 21:57:04.269: //Shared-Line/INFO/shrl_update_totag:Shared-Line not enabled for '20143' .Aug 21 21:57:04.269: //Shared-Line/EVENT/shrl_app_event_notify_handler:Event notification received: event = 21, callID = 5401, dn = 20141
DB-2260
December 2010
.Aug 21 21:57:04.269: //Shared-Line/INFO/shrl_find_ccb_by_dn:Searching Shared-Line table for dn '20141' .Aug 21 21:57:04.269: //Shared-Line/INFO/shrl_find_ccb_by_dn:Entry found [ccb = 4742EAD4] for dn '20141' .Aug 21 21:57:04.269: //Shared-Line/EVENT/shrl_process_callerid_update:called with state = 7, callID = 5401, peer callID = 5399, dn = 20141 .Aug 21 21:57:04.269: //Shared-Line/INFO/shrl_process_callerid_update:Updated callinfo for callid: 5401, member: '[email protected]', peer-tag: 40002 .Aug 21 21:57:04.269: //Shared-Line/EVENT/shrl_is_outbound:Check for shared line call type callid 5401for user = 20141 .Aug 21 21:57:04.269: //Shared-Line/INFO/shrl_find_ccb_by_dn:Searching Shared-Line table for dn '20141' .Aug 21 21:57:04.269: //Shared-Line/INFO/shrl_find_ccb_by_dn:Entry found [ccb = 4742EAD4] for dn '20141' .Aug 21 21:57:04.269: //Shared-Line/EVENT/shrl_barge_type:Check for shared line call type callid 5401for user = 20141 .Aug 21 21:57:04.269: //Shared-Line/INFO/shrl_find_ccb_by_dn:Searching Shared-Line table for dn '20141' .Aug 21 21:57:04.269: //Shared-Line/INFO/shrl_find_ccb_by_dn:Entry found [ccb = 4742EAD4] for dn '20141' .Aug 21 21:57:04.273: //Shared-Line/INFO/shrl_find_ccb_by_dn:Searching Shared-Line table for dn '20141' .Aug 21 21:57:04.273: //Shared-Line/INFO/shrl_find_ccb_by_dn:Entry found [ccb = 4742EAD4] for dn '20141' .Aug 21 21:57:04.281: //Shared-Line/EVENT/shrl_notify_done_handler:NOTIFY_DONE received for subID: 5 respCode: 17 .Aug 21 21:57:04.281: //Shared-Line/INFO/shrl_find_ccb_by_subid:Search ccb for subid: 5 .Aug 21 21:57:04.281: //Shared-Line/INFO/shrl_find_ccb_by_subid:Found the entry ccb: 4742EAD4 member: [email protected] .Aug 21 21:57:04.281: //Shared-Line/INFO/shrl_free_spi_respinfo:Free ASNL resp info for subID = 5
Related Commands
Description Creates a directory number to be shared by multiple SIP phones. Displays information about active calls using SIP shared lines.
DB-2261
Syntax Description
Command History
10.0 12.2(13)T
This command was introduced. This command is no longer supported in Cisco IOS Mainline releases or in Technology-based (T-train) releases. It might continue to appear in 12.2S-family releases. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
Because the debug smrp all command displays all SMRP debugging output, it is processor intensive and should not be enabled when memory is scarce or in very high traffic situations. For general debugging, use the debug smrp all command and turn off excessive transactions with the no debug smrp transaction command. This combination of commands will display various state changes and events without displaying every transaction packet. For debugging a specific feature such as a routing problem, use the debug smrp route and debug smrp transaction commands to learn if packets are sent and received and which specific routes are affected. The show smrp traffic EXEC command is highly recommended as a troubleshooting method because it displays the SMRP counters. For examples of the type of output you may see, refer to each of the commands listed in the Related Commands section.
Related Commands
Command debug smrp group debug smrp mcache debug smrp neighbor debug smrp port debug smrp route debug smrp transaction
Description Displays information about SMRP group activity. Displays information about SMRP multicast fast-switching cache entries. Displays information about SMRP neighbor activity. Displays information about SMRP port activity. Displays information about SMRP routing activity. Displays information about SMRP transactions.
DB-2262
December 2010
Syntax Description
Command History
10.0 12.2(13)T
This command was introduced. This command is no longer supported in Cisco IOS Mainline releases or in Technology-based (T-train) releases. It might continue to appear in 12.2S-family releases. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug smrp group command displays information when a group is created or deleted and when a forwarding entry for a group is created, changed, or deleted. For more information, refer to the show smrp group command described in the Cisco IOS AppleTalk and Novell IPX Command Reference.
Examples
The following is sample output from the debug smrp group command showing a port being created and deleted on group AT 20.34. (AT signifies that this is an AppleTalk network group.)
Router# debug smrp group SMRP: Group AT 20.34, created on port 20.1 by 20.2 SMRP: Group AT 20.34, deleted on port 20.1
Table 315 lists the messages that may be generated with the debug smrp group command concerning the forwarding table.
Table 315 debug smrp group Message Descriptions
Messages Group <address>, deleted on port <address> Group <address>, forward state changed from state to state Group <address>, deleted forward entry Group <address>, created on port <address> by <address>
Descriptions Group entry was deleted from the group table for the specified port. State of the group changed. States are join, forward, and leave.
Group was deleted from the forwarding table. Group entry was created in the table for the specified port.
DB-2263
Table 315
Descriptions Secondary router has added this group to its group table.
Group <address>, discard join Discard Join Group request if the router is not the primary router on request from <address>, not the local connected network or if it is not the port parent of the route. responsible Group <address>, join request Request to join the group was received. from <address> Group <address>, forward is found Group <address>, forward state is already joining, ignored Forward entry for the group was found in the forwarding table. Request to join the group is in progress, so the second request was discarded.
Group <address>, no forward Forward entry for the group was not found in the forwarding table. found Group <address>, join request Request to join the group was discarded because the parent port is not discarded, fw discarded, fwd available. parent port not operational Group <address>, created forward entry - parent <address> child <address> Group <address>, creator no longer up on <address> Group <address>, pruning duplicate path on <address> Forward entry was created in the forwarding table for the parent and child address. Group creator has not been heard from for a specified time and is deemed no longer available. Duplicate path was removed. If we are forwarding and we are a child port, and our port parent address is not pointing to our own port address, we are in a duplicate path.
Group <address>, member no Group member has not been heard from for a specified time and is longer up on <address> deemed no longer available. Group <address>, no more child ports in forward entry Forward entry for group no longer has any child ports. As a result, the forward entry is no longer necessary.
Related Commands
Command
Description
debug sgbp dial-bids Displays large-scale dial-out negotiations between the primary NAS and alternate NASs.
DB-2264
December 2010
Syntax Description
Command History
10.0 12.2(13)T
This command was introduced. This command is no longer supported in Cisco IOS Mainline releases or in Technology-based (T-train) releases. It might continue to appear in 12.2S-family releases. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
Use the show smrp mcache EXEC command (described in the Cisco IOS AppleTalk and Novell IPX Command Reference to display the entries in the SMRP multicast cache, and use the debug smrp mcache command to learn whether the cache is being populated and invalidated.
Examples
The following is sample output from the debug smrp mcache command. In this example, the cache is created and populated for group AT 11.124. (AT signifies that this is an AppleTalk network group.)
Router# debug smrp mcache SMRP: Cache created SMRP: Cache populated for group AT 11.124 mac - 090007400b7c00000c1740d9 net - 001fef7500000014ff020a0a0a SMRP: Forward cache entry created for group AT 11.124 SMRP: Forward cache entry validated for group AT 11.124 SMRP: Forward cache entry invalidated for group AT 11.124 SMRP: Forward cache entry deleted for group AT 11.124
DB-2265
Table 316 lists all the messages that can be generated with the debug smrp mcache command concerning the multicast cache.
Table 316 debug smrp mcache Message Descriptions
Descriptions SMRP packet was received on a parent port that has fast switching enabled. As a result, the cache was created and the MAC and network headers were stored for all child ports that have fast switching enabled. Use the show smrp port appletalk EXEC command with the optional interface type and number to display the switching path. Memory was allocated for the multicast cache. Forward cache entry for the group was added to or deleted from the cache.
Cache memory allocated Forward cache entry created/deleted for group <address>
Forward cache entry validated Forward cache entry is validated and is now ready for fast switching. for group <address> Forward cache entry invalidated for group <address> Cache entry is invalidated because some change (such as port was shut down) occurred to one of the ports.
Related Commands
Description Displays large-scale dial-out negotiations between the primary NAS and alternate NASs.
DB-2266
December 2010
Syntax Description
Command History
10.0 12.2(13)T
This command was introduced. This command is no longer supported in Cisco IOS Mainline releases or in Technology-based (T-train) releases. It might continue to appear in 12.2S-family releases. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug smrp neighbor command displays information when a neighbor operating state changes. A neighbor is an adjacent router. For more information, refer to the show smrp neighbor EXEC command described in the Cisco IOS AppleTalk and Novell IPX Command Reference.
Examples
The following is sample output from the debug smrp neighbor command. In this example, the neighbor on port 30.02 has changed state from normal operation to secondary operation.
Router# debug smrp neighbor SMRP: Neighbor 30.2, state changed from normal op to secondary op
Table 317 lists all the messages that can be generated with the debug smrp neighbor command concerning the neighbor table.
Table 317 debug smrp neighbor Message Descriptions
Messages Neighbor <address>, state changed from state to state Neighbor <address>, neighbor added/deleted SMRP neighbor up/down Neighbor <address>, no longer up
Descriptions State of the neighbor changed. States are primary operation, secondary operation, normal operation, primary negotiation, secondary negotiation, and down. Neighbor was added to or removed from the neighbor table. Neighbor is available for service or unavailable. Neighbor is unavailable because it has not been heard from for a specified duration.
DB-2267
Related Commands
Description Displays large-scale dial-out negotiations between the primary NAS and alternate NASs.
DB-2268
December 2010
Syntax Description
Command History
10.0 12.2(13)T
This command was introduced. This command is no longer supported in Cisco IOS Mainline releases or in Technology-based (T-train) releases. It might continue to appear in 12.2S-family releases. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug smrp port command displays information when a port operating state changes. For more information, refer to the show smrp port command described in the Cisco IOS AppleTalk and Novell IPX Command Reference.
Examples
The following is sample output from the debug smrp port command. In this example, port 30.1 has changed state from secondary negative to secondary operation to primary negative:
Router# debug smrp port SMRP: Port 30.1, state changed from "secondary neg" to "secondary op" SMRP: Port 30.1, secondary router changed from 0.0 to 30.1 SMRP: Port 30.1, state changed from "secondary op" to "primary neg"
Table 318 lists all the messages that can be generated with the debug smrp port command concerning the port table.
Table 318 debug smrp port Message Descriptions
Messages Port <address>, port created/deleted Port <address>, line protocol changed to state
Descriptions Port entry was added to or removed from the port table. Line protocol for the port is up or down.
DB-2269
Table 318
Messages
Descriptions
Port <address>, state changed State of the port changed. States are primary operation, from state to state secondary operation, normal operation, primary negotiation, secondary negotiation, and down. Port <address>, primary/secondary router changed from <address> to <address> Primary or secondary port address of the router changed.
Related Commands
Description Displays large-scale dial-out negotiations between the primary NAS and alternate NASs.
DB-2270
December 2010
Syntax Description
Command History
10.0 12.2(13)T
This command was introduced. This command is no longer supported in Cisco IOS Mainline releases or in Technology-based (T-train) releases. It might continue to appear in 12.2S-family releases. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
For more information, refer to the show smrp route EXEC command described in the Cisco IOS AppleTalk and Novell IPX Command Reference.
Examples
The following is sample output from the debug smrp route command. In this example, poison notification is received from port 30.2. Poison notification is the receipt of a poisoned route on a nonparent port.
Router# debug smrp route SMRP: Route AT 20-20, poison notification from 30.2 SMRP: Route AT 30-30, poison notification from 30.2
Table 319 lists all the messages that can be generated with the debug smrp route command concerning the routing table. In Table 319, the term route does not refer to an address but rather to a network range.
Table 319 debug smrp route Message Descriptions
Messages
Descriptions
Route address, deleted/created Route entry was removed from or added to the routing table. as local network Route address, from address has invalid distance value Route entry from the specified address has an incorrect distance value and was ignored.
Route address, unknown route Route entry received from the specified address is bad and was poisoned by address ignored ignored. Route address, created via address - hop number tunnel number New route entry added to the routing table with the specified number of hops and tunnels.
DB-2271
Table 319
Messages Route address, from address overlaps existing route Route address, poisoned by address Route address, poison notification from address Route address, worsened by parent address
Descriptions Route entry received from the specified address overlaps an existing route and was ignored. Route entry has been poisoned by neighbor. Poisoned routes have distance of 255. Poisoned route is received from a nonparent port. Distance to the route has worsened (become higher), received from the parent neighbor.
Route address, improved via Distance to the route has improved (become lower), received from a address - number -> number neighbor. hop, number -> number tunnel Route address, switched to address - higher address than address Route address, parent port changed address -> address SMRP bad distance vector Route address, has been poisoned Tie condition exists, and because this router had the highest network address, it was used to forward the packet. Parent port address change occurred. The parent port address of a physical network segment determines which router should handle Join Group and Leave Group requests. Packet has an invalid distance vector and was ignored. Route has been poisoned. Poisoned routes are purged from the routing table after a specified time.
Related Commands
Description Displays large-scale dial-out negotiations between the primary NAS and alternate NASs.
DB-2272
December 2010
Syntax Description
Examples
The following is sample output from the debug smrp transaction command. In this example, a secondary node request is sent out to all routers on port 30.1.
Router# debug smrp transaction SMRP: SMRP: SMRP: SMRP: Transaction Transaction Transaction Transaction for for for for port port port port 30.1, 30.1, 30.1, 30.1, secondary secondary secondary secondary node node node node request request request request (seq (seq (seq (seq 8435) 8435) 8435) 8435) sent sent sent sent to to to to all all all all routers routers routers routers
Table 320 lists all the messages that can be generated with the debug smrp route command.
Table 320 debug smrp Transaction Message Descriptions
Messages Transaction for port address, packet-type command-type (grp/sec number) sent to/received from address Transaction for group address on port address, (seq number) sent to/received from address Unrecognized transaction for port address Discarded incomplete request Response in wrong state in HandleRequest SMRP bad packet type Packet discarded, Check Packet failed
Descriptions Port message concerning a packet or command was sent to or received from the specified address.
Group message for a specified port was sent to or received from the specified address. Unrecognized message was received and ignored by the port. Incomplete message was received and ignored. Message was received with the wrong state and was ignored. SMRP packet was received with a bad packet type and was ignored. Packet was received with a failed check packet and was ignored.
Packet discarded, Bad Port ID Packet was received with a bad port ID and was ignored.
Related Commands
Description Displays large-scale dial-out negotiations between the primary NAS and alternate NASs.
DB-2273
Syntax Description
detail
Indicates that in addition to a one-line description of the frame being displayed, an entire hexadecimal dump of the frame will follow.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
The debug snasw dlc command displays the same trace information available via the snasw dlctrace command. The snasw dlctrace command is the preferred method for gathering this trace information because it is written to a capture buffer instead of directly to the console. The debug snasw dlc command should only be used when it is certain that the output will not cause excessive data to be output to the console.
Examples
The following shows sample output from the debug snasw dlc command:
Router# debug snasw dlc Sequence Number Link 343 344 345 346 347 348 349 MVSD MVSD @I000002 MVSD @I000002 @I000002 @I000002 In Out Out Out In In In
Size of ISR/ SNA BTU HPR Description of frame sz:134 sz:12 sz:18 sz:273 sz:9 sz:12 sz:29 ISR ISR ISR ISR ISR ISR ISR fmh5 DLUR Rq ActPU NETA.APPNRA29 +Rsp IPM slctd nws:0008 Rq ActPU fmh5 TOPOLOGY UPDATE +Rsp Data +Rsp IPM slctd nws:0002 +Rsp ActPU
DB-2274
December 2010
fmh5 DLUR +Rsp ActPU +Rsp IPM slctd nws:0007 fmh5 DLUR Rq ActLU NETA.MARTLU1 fmh5 REGISTER Rq ActLU NETA.MARTLU1
Related Commands
Description Filters frames traced by the snasw dlctrace or debug snasw dlc command. Captures trace frames entering and leaving the SNA Switching Services feature.
DB-2275
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
The debug snasw ips command displays the same trace information available via the snasw ipstrace command. Output from this debug command can be large. The snasw ipstrace command is the preferred method for gathering this trace information because it is written to a capture buffer instead of directly to the console. The debug snasw ips command should only be used when it is certain that the output will not cause excessive data to be output to the console. The debug snasw dlc command displays the same trace information available via the snasw dlctrace command.
Examples
Sending Process
Receiving Process
Queue
DEALLOCATE_RCB : --(0) -> RM(2130000) Q 4 RCB_DEALLOCATED : RM(2130000) -> PS(22E0000) Q 2 RCB_DEALLOCATED : --(0) -> PS(22E0000) Q 2 VERB_SIGNAL : PS(22E0000) -> DR(20F0000) Q 2 FREE_SESSION : --(0) -> RM(2130000) Q 2 BRACKET_FREED : RM(2130000) -> HS(22FB0001) Q 2 BRACKET_FREED : --(0) -> HS(22FB0001) Q 2 VERB_SIGNAL : --(0) -> DR(20F0000) Q 2
DB-2276
December 2010
11265 : DLC_MU : DLC(2340000) -> PC(22DD0001) Q 2 11266 : DLC_MU : --(0) -> PC(22DD0001) Q 2
Related Commands
DB-2277
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(2)T. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SB
Usage Guidelines
This command is intended primarily for Cisco support personnel. Debugging output for the Periodic MIB Data Collection and Transfer Mechanism (Bulk Statistics feature) includes messages for data collection, local file generation, and transfer attempts.
Examples
In the following example, debugging command output is enabled for the Periodic MIB Data Collection and Transfer Mechanism (Bulk Statistics feature). Note that the references to a VFile indicate a local bulk statistics file, usually followed by the filename. The filename uses the format specified-filename_device-name_date_time-stamp.
Router# debug snmp 00:17:38:BULKSTAT-DC:Poll timer fired for ifmib 00:17:38:BULKSTAT-DC:In pollDataGroup 00:17:38:BULKSTAT-DC:creating new file vfile:IfMIB_objects_ios108_030307_101119739 00:17:38:BULKSTAT-DC:Too small state buffer for ifmib 102 00:17:38:BULKSTAT-DC:Increased buffer state to 1024 00:17:38:BULKSTAT-DC:Interface type data group 00:17:38:BULKSTAT-DC:polling done 00:18:38:BULKSTAT-DC:Poll timer fired for ifmib
DB-2278
December 2010
00:18:38:BULKSTAT-DC:In pollDataGroup 00:18:38:BULKSTAT-DC:Interface type data group 00:18:38:BULKSTAT-DC:polling done 00:19:26: BULKSTAT-DC:Collection timer fired for IfMIB_objects 00:19:26:BULKSTAT-TP:Transfer request for vfile:IfMIB_objects_ios108_030307_101119739 00:19:30:BULKSTAT-TP:written vfile IfMIB_objects_ios108_030307_101119739 00:19:30:BULKSTAT-TP:retained vfile vfile:IfMIB_objects_ios108_030307_101119739 00:19:38:BULKSTAT-DC:Poll timer fired for ifmib 00:19:38:BULKSTAT-DC:In pollDataGroup 00:19:38:BULKSTAT-DC:creating new file vfile:IfMIB_objects_ios108_030307_101319739 00:19:38:BULKSTAT-DC:Interface type data group 00:19:38:BULKSTAT-DC:polling done 00:20:38:BULKSTAT-DC:Poll timer fired for ifmib 00:20:38:BULKSTAT-DC:In pollDataGroup 00:20:38:BULKSTAT-DC:Interface type data group 00:20:38:BULKSTAT-DC:polling done 00:21:38:BULKSTAT-DC:Poll timer fired for ifmib 00:21:38:BULKSTAT-DC:In pollDataGroup 00:21:38:BULKSTAT-DC:Interface type data group 00:21:38:BULKSTAT-DC:polling done 00:22:26: BULKSTAT-DC:Collection timer fired for IfMIB_objects 00:22:26:BULKSTAT-TP:Transfer request for vfile:IfMIB_objects_ios108_030307_101319739 00:22:26:BULKSTAT-TP:written vfile IfMIB_objects_ios108_030307_101319739 00:22:26:BULKSTAT-TP:retained vfile vfile:IfMIB_objects_ios108_030307_101319739 00:22:38:BULKSTAT-DC:Poll timer fired for ifmib 00:22:38:BULKSTAT-DC:In pollDataGroup 00:22:38:BULKSTAT-DC:creating new file vfile:IfMIB_objects_ios108_030307_101619739 00:22:38:BULKSTAT-DC:Interface type data group 00:22:38:BULKSTAT-DC:polling done 00:23:38:BULKSTAT-DC:Poll timer fired for ifmib 00:23:38:BULKSTAT-DC:In pollDataGroup 00:23:38:BULKSTAT-DC:Interface type data group 00:23:38:BULKSTAT-DC:polling done 00:24:38:BULKSTAT-DC:Poll timer fired for ifmib 00:24:38:BULKSTAT-DC:In pollDataGroup 00:24:38:BULKSTAT-DC:Interface type data group 00:24:38:BULKSTAT-DC:polling done 00:25:26: BULKSTAT-DC:Collection timer fired for IfMIB_objects 00:25:26:BULKSTAT-TP:Transfer request for vfile:IfMIB_objects_ios108_030307_101619739 00:25:26:BULKSTAT-TP:written vfile IfMIB_objects_ios108_030307_101619739 00:25:26:BULKSTAT-TP:retained vfile vfile:IfMIB_objects_ios108_030307_101619739 00:25:38:BULKSTAT-DC:Poll timer fired for ifmib 00:25:38:BULKSTAT-DC:In pollDataGroup 00:25:38:BULKSTAT-DC:creating new file vfile:IfMIB_objects_ios108_030307_101919739 00:25:38:BULKSTAT-DC:Interface type data group 00:25:38:BULKSTAT-DC:polling done 00:26:38:BULKSTAT-DC:Poll timer fired for ifmib
DB-2279
Related Commands
Command
Description
show snmp mib bulkstat transfer Displays the transfer status of files generated by the Periodic MIB Data Collection and Transfer Mechanism. snmp mib bulkstat transfer Names a bulk statistics transfer configuration and enters Bulk Statistics Transfer configuration mode.
DB-2280
December 2010
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRE.
Usage Guidelines
Before running the debug snmp detail command, connect the device to the Network Management System (NMS). The command output displays the debug messages for errors occurred during SNMP operations. The debug messages help in identifying and debugging errors.
Examples
The following is sample output from the debug snmp detail command:
Router# debug snmp detail SNMP Detail Debugs debugging is on process_mgmt_req_int: UDP packet being de-queued findContextInfo: Authentication failure, bad community string SrDoSnmp: Bad Community name. process_mgmt_req_int: UDP packet being de-queued SrParseV3SnmpMessage: No matching Engine ID. SrParseV3SnmpMessage: Failed. SrDoSnmp: authentication failure, Unknown Engine ID process_mgmt_req_int: UDP packet being de-queued ParseSequence, Unexpected type: 4 SrParseV3SnmpMessage: ParseSequence: SrParseV3SnmpMessage: Failed. SrDoSnmp: authentication failure, Unsupported security modelQ:
DB-2281
Related Commands
Description Displays information about every SNMP packet sent or received by the router.
DB-2282
December 2010
Syntax Description
Displays messages about SNMP NHRP MIB error events, including error information about packet processing or MIB special events. Displays messages about SNMP NHRP MIB events, from the NHRP MIB tree data-structures and SNMP query-related events. Displays messages about SNMP NHRP MIB engineering events. Displays debug messages related to SNMP NHRP MIB notification events. (Optional) Displays detailed messages related to SNMP NHRP MIB notification events.
Command Modes
Command History
Modification This command was introduced. This command was modified. The notif and detail keywords were added.
Usage Guidelines
The debug snmp mib nhrp internal command can generate many output messages. Due to the increased command processing and its effect on system usage, the use of this command is not advisable under normal circumstances.
Examples
The following is sample output from the debug snmp mib nhrp notif command:
*May 10 12:52:01.245: NHRP_SNMP-NOTIF[1488]: Retrieved values from instrumentation *May 10 12:52:01.245: NHRP_SNMP-NOTIF[1646]: Varbind list created *May 10 12:52:01.245: NHRP_SNMP-NOTIF[1665]: NHRP trap queued: cneNotifNextHopRegClientUp
The following is sample output from the debug snmp mib nhrp notif detail command:
*May 10 12:52:44.461: NHRP_SNMP-NOTIF[695]: Address parameters' extraction for local and remote endpoints successful *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1488]: Retrieved values from instrumentation *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1589]: Instance OIDs populated *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1608]: Value types and values populated *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1625]: Varbind created for nhrpServerInternetworkAddrType *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1643]: Varbind created for nhrpServerInternetworkAddr *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1643]: Varbind created for nhrpServerNbmaAddrType
DB-2283
*May 10 12:52:44.461: NHRP_SNMP-NOTIF[1643]: *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1643]: *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1643]: nhrpServerNhcInternetworkAddrType *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1643]: nhrpServerNhcInternetworkAddr *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1643]: *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1643]: *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1643]: *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1643]: *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1643]: *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1643]: *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1646]: *May 10 12:52:44.461: NHRP_SNMP-NOTIF[1665]:
Varbind created for nhrpServerNbmaAddr Varbind created for nhrpServerNbmaSubaddr Varbind created for Varbind created for Varbind created for nhrpServerNhcNbmaAddrType Varbind created for nhrpServerNhcNbmaAddr Varbind created for nhrpServerNhcNbmaSubaddr Varbind created for nhrpServerNhcPrefixLength Varbind created for nhrpServerNhcInUse Varbind created for nhrpServerCacheUniqueness Varbind list created NHRP trap queued: cneNotifNextHopRegClientUp
The following is sample output from the debug snmp mib nhrp events command:
Router# debug snmp mib nhrp events *Apr 10 13:34:46.175: NHRP_SNMP-EVE[2097]: ClientIndex [0] NHS [0] Req [1] *Apr 10 13:34:46.175: NHRP_SNMP-EVE[2148]: *Apr 10 13:34:46.175: NHRP_SNMP-EVE[1050]: *Apr 10 13:34:46.223: NHRP_SNMP-EVE[2097]: ClientIndex [2] NHS [0] Req [1] *Apr 10 13:34:46.223: NHRP_SNMP-EVE[2140]: *Apr 10 13:34:46.223: NHRP_SNMP-EVE[2097]: ClientIndex [0] NHS [0] Req [1] *Apr 10 13:34:46.223: NHRP_SNMP-EVE[2148]: *Apr 10 13:34:46.223: NHRP_SNMP-EVE[1050]: In Get nhrpClientEntry for VRFID [0] In here as expected. In Extract Client Entry Info In Get nhrpClientEntry for VRFID [0] Could not find the Node In Get nhrpClientEntry for VRFID [0] In here as expected. In Extract Client Entry Info
The following is sample output from the debug snmp mib nhrp internal command:
Router# debug snmp mib nhrp internal *Apr 10 13:36:33.267: NHRP_SNMP-INTR[2089]: In nhrpClientEntry *Apr 10 13:36:33.323: NHRP_SNMP-INTR[2089]: In nhrpClientEntry *Apr 10 13:36:33.323: NHRP_SNMP-INTR[2089]: In nhrpClientEntry
Description Indicates output from the debug snmp mib nhrp error command. Indicates output from the debug snmp mib nhrp events command. Indicates output from the debug snmp mib nhrp internal command. Indicates output from the debug snmp mib nhrp notif command.
Related Commands
Description Indicates the status of the NHRP MIB and whether the NHRP MIB is enabled or disabled.
DB-2284
December 2010
Syntax Description
Command Default
Command Modes
Command History
Release 12.2(33)SRE
Examples
The following is sample output from the debug snmp overhead command:
Router# debug snmp overhead SNMP overhead debugging is on *Nov 11 16:35:02.579 PDT: Process exceeds 1000ms threshold (200ms IOS quantum) *Nov 11 16:35:02.579 PDT: GETNEXT of ciscoFlashFileEntry.2.1.1.1--result ciscoFlashFileEntry.2.1.1.2
Field Process exceeds 1000ms threshold 200ms IOS quantum GETNEXT of ciscoFlashFileEntry.2.1.1.1 result ciscoFlashFileEntry.2.1.1.2
Description Processing time for the SNMP get-next operation is more than 1000 milliseconds. Threshold time in milliseconds. The OID ciscoFlashFileEntry.2.1.1.1 is queried using the get-next operation. The result of the get-next operation is ciscoFlashFileEntry.2.1.1.2, which is the next value of the OID being queried.
DB-2285
Syntax Description
Command Default
Command Modes
Command History
Release 12.0(24)S 12.3(2)T 12.2(33)SRA 12.2(33)SXH 12.2(33)SB Cisco IOS XE Release 2.5
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(2)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS Release 12.2(33)SB. This command was implemented on Cisco ASR 1000 series routers.
Examples
The following is sample output from the debug snmp packet command. In this example, the router receives a get-next request from the host at 192.10.2.10 and responds with the requested information.
Router# debug snmp packet SNMP: Packet received via UDP from 192.10.2.10 on Ethernet0 SNMP: Get-next request, reqid 23584, errstat 0, erridx 0 sysUpTime = NULL TYPE/VALUE system.1 = NULL TYPE/VALUE system.6 = NULL TYPE/VALUE SNMP: Response, reqid 23584, errstat 0, erridx 0 sysUpTime.0 = 2217027 system.1.0 = Cisco Internetwork Operating System Software system.6.0 = SNMP: Packet sent via UDP to 192.10.2.10
Based on the kind of packet sent or received, the output may vary. For get-bulk requests, a line similar to the following is displayed:
SNMP: Get-bulk request, reqid 23584, nonrptr 10, maxreps 20
DB-2286
December 2010
Description Indicates what type of SNMP protocol data unit (PDU) the packet is. Possible types are as follows:
Get request Get-next request Response Set request V1 Trap Get-bulk request Inform request V2 Trap
Depending on the type of PDU, the rest of this line displays different fields. The indented lines following this line list the MIB object names and corresponding values. reqid errstat Request identification number. This number is used by the SNMP manager to match responses with requests. Error status. All PDU types other than response will have an errstat of 0. If the agent encounters an error while processing the request, it will set errstat in the response PDU to indicate the type of error. Error index. This value will always be 0 in all PDUs other than responses. If the agent encounters an error, the erridx will be set to indicate which varbind in the request caused the error. For example, if the agent had an error on the second varbind in the request PDU, the response PDU will have an erridx equal to 2. Nonrepeater value. This value and the maximum repetition value are used to determine how many varbinds are returned. Refer to RFC 1905 for details. Maximum repetition value. This value and the nonrepeater value are used to determine how many varbinds are returned. Refer to RFC 1905 for details. Enterprise object identifier. Refer to RFC 1215 for details. Generic trap value. Refer to RFC 1215 for details. Specific trap value. Refer to RFC 1215 for details.
erridx
nonrptr
maxreps
DB-2287
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug snmp requests command:
Router# debug snmp requests SNMP Manager API: request dest: 171.69.58.33.161, community: public retries: 3, timeout: 30, mult: 2, use session rtt userdata: 0x0
Field SNMP Manager API dest community retries timeout mult use session rtt userdata
Description Indicates that the router sent an SNMP request. Destination of the request. Community string sent with the request. Number of times the request has been re-sent. Request timeout, or how long the router will wait before resending the request. Timeout multiplier. The timeout for a re-sent request will be equal to the previous timeout multiplied by the timeout multiplier. Indicates that the average round-trip time of the session should be used in calculating the timeout value. Internal Cisco IOS software data.
DB-2288
December 2010
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(18)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug snmp sync command can be used to debug SNMP synchronization and faults in synchronization. The standby Route Processor (RP) may sometimes reset as a result of synchronization faults. If the fault occurs when SNMP activities such as SNMP sets are in progress, enter the debug snmp sync command to identify whether a synchronization fault caused the reset. SNMP synchronizations (dynamic and bulk) are performed only if the router is configured to be in stateful switchover (SSO) mode.
Examples
Related Commands
Description Displays information about every SNMP packet sent or received by the networking device. Configures the redundancy mode of operation.
DB-2289
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(15)T. This command was integrated into Cisco IOS Release 12.2(33)SB1. This command was integrated into Cisco IOS Release 12.2(44)SG. This command was integrated into Cisco IOS Release XE 2.1.
Usage Guidelines
Use the debug snmp tunnel-mib command to verify whether a tunnel is created or deleted.
Examples
The following is sample output from the debug snmp tunnel-mib command. The output shows that a tunnel is created through SNMP.
Router# debug snmp tunnel-mib SNMP TUNNEL-MIB debugging is on k_tunnelInetConfigEntry_get: Entering k_tunnelInetConfigEntry_get: Exact search tim_client_tunnel_endpoint_data_get: Entering tim_client_tunnel_endpoint_data_get: Exact search tim_client_tunnel_endpoint_data_get: No element found k_tunnelInetConfigEntry_get: Client service failed k_tunnelInetConfigEntry_test: Entering k_tunnelInetConfigEntry_test: Completed k_tunnelInetConfigEntry_set: Entering tim_client_tunnel_endpoint_data_get: Entering tim_client_tunnel_endpoint_data_get: Exact search tim_client_tunnel_endpoint_data_get: No element found k_tunnelInetConfigEntry_set: Calling tunnel create tim_client_tunnel_create: Entering tim_client_tunnel_create: Completed
DB-2290
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug sntp adjust command when an offset to the time reported by the configured NTP server is calculated. The offset indicates the difference between the router time and the actual time (as kept by the server) and is displayed in milliseconds. The clock time is then successfully changed to the accurate time by adding the offset to the current router time.
Router# debug sntp adjust Delay calculated, offset 3.48 Clock slewed.
The following is sample output from the debug sntp adjust command when an offset to the time reported by a broadcast server is calculated. Because the packet is a broadcast packet, no transmission delay can be calculated. However, in this case, the offset is too large, so the clock is reset to the correct time.
Router# debug sntp adjust No delay calculated, offset 11.18 Clock stepped.
DB-2291
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug sntp packets command when a message is received:
Router# debug sntp packets Received SNTP packet from 172.16.186.66, length 48 leap 0, mode 1, version 3, stratum 4, ppoll 1024 rtdel 00002B00, rtdsp 00003F18, refid AC101801 (172.16.24.1) ref B7237786.ABF9CDE5 (23:28:06.671 UTC Tue May 13 1997) org 00000000.00000000 (00:00:00.000 UTC Mon Jan 1 1900) rec 00000000.00000000 (00:00:00.000 UTC Mon Jan 1 1900) xmt B7237B5C.A7DE94F2 (23:44:28.655 UTC Tue May 13 1997) inp AF3BD529.810B66BC (00:19:53.504 UTC Mon Mar 1 1993)
The following is sample output from the debug sntp packets command when a message is sent:
Router# debug sntp packets Sending SNTP packet to 172.16.25.1 xmt AF3BD455.FBBE3E64 (00:16:21.983 UTC Mon Mar 1 1993)
Field length leap mode version stratum ppoll rtdel rtdsp refid
Description Length of the SNTP packet. Indicates if a leap second will be added or subtracted. Indicates the mode of the router relative to the server sending the packet. SNTP version number of the packet. Stratum of the server. Peer polling interval. Total delay along the path to the root clock. Dispersion of the root path. Address of the server that the router is currently using for synchronization.
DB-2292
December 2010
Table 325
Description Reference time stamp. Originate time stamp. This value indicates the time the request was sent by the router. Receive time stamp. This value indicates the time the request was received by the SNTP server. Transmit time stamp. This value indicates the time the reply was sent by the SNTP server. Destination time stamp. This value indicates the time the reply was received by the router.
DB-2293
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug sntp select command. In this example, the router will synchronize its time to the server at 172.16.186.66.
Router# debug sntp select SNTP: Selected 172.16.186.66
DB-2294
December 2010
Syntax Description
Enables the display of all debugging output related to software authentication envelope events. Enables the display of all debugging output related to software authentication errors. Enables the display of all debugging output related to software authentication key events. Enables the display of all debugging output related to software authentication revocation events. Enables the display of all debugging output related to the show software authenticity file, show software authenticity keys, and show software authenticity running commands. Enables the display of all debugging output related to software authentication errors and events.
verbose
Command Modes
Command History
Modification This command was introduced for the Cisco 1941, 2900, and 3900 routers. This command was modified. The revocation keyword was added. This command was integrated into Cisco IOS Release 15.1(1)T.
Usage Guidelines
Use the debug software authenticity command to enable debugging related to software authentication events. Use the command in conjunction with the show software authenticity file, show software authenticity keys, show software authenticity running, and show software authenticity upgrade-status commands in order to display the debugging-related messages. For further information on these commands, see the Cisco IOS Master Command List, All Releases.
Examples
The following example enables the display of debugging output related to software authentication errors:
Router# debug software authenticity errors
DB-2295
The following example enables the display of debugging output related to software authentication key errors, and the output from the show software authenticity keys command displays the key information related to software authentication debugging:
Router# debug software authenticity key Software Authenticity Key debugging is on Router# show software authenticity keys Public Key #1 Information ------------------------Key Type : Release (Primary) Public Key Algorithm : RSA Modulus : CC:CA:40:55:8C:71:E2:4A:3A:B6:9D:5C:94:1D:02:BA: ..... 26:04:6B:33:EB:70:2B:18:24:C7:D9:31:3E:77:24:85 Exponent : xxx Key *May 14 23:23:13.988: code_sign_parse_key_record: START. list offset:(0), tlv tag: 0xAE, tlv len: 281 *May 14 23:23:13.988: code_sign_parse_key_record: Tag (0xAE) found at offset: 0, list_offset: 0 *May 14 23:23:13.988: code_sign_parse_key_record: key_rec_len: 281, pub key size: 288, offset: 3 *May 14 23:23:13.988: code_sign_parse_key_record: Key Start magic: 0xxxxxxxD, at offset: 3 *May 14 23:23:13.988: code_sign_validate_key_end_magic: End Magic (0xBEEFCAFE) found at the end of the key record (292) *May 14 23:23:13.988: code_sign_parse_key_record: Tlv start offset: 7, pub key size: 288 *May 14 23:23:13.988: code_sign_parse_key_record: Tag (Key Type:(0x1) found at offset: 7 *May 14 23:23:13.988: code_sign_parse_key_record: We increment offset by sizeof tlv: 3, size of len: 2 *May 14 23:23:13.988: code_sign_parse_key_record: Key Type: 0x1, offset: 11 *May 14 23:23:13.988: code_sign_parse_key_record: Tag (Signature Algorithm:(0x2) found at offset: 11 *May 14 23:23:13.988: code_sign_parse_key_record: We increment offset by sizeof tlv: 3, size of len: 2 *May 14 23:23:13.988: code_sign_parse_key_record: Signature Algo: 0x1, offset: 15 *May 14 23:23:13.988: code_sign_parse_key_record: Tag (Key Info Length:(0x3) found at offset: 15 *May 14 23:23:13.988: code_sign_parse_key_record: We increment offset by sizeof tlv: 3, size of len: 2 *May 14 23:23:13.988: code_sign_parse_key_record:Length (266) for type (Key Info Length), offset: 18 *May 14 23:23:13.988: code_sign_parse_key_record: Key Info Len: 266, offset: 18 *May 14 23:23:13.988: code_sign_parse_key_record: Tag (Modulus:(xxx) found at offset: 18 *May 14 23:23:13.988: code_sign_parse_key_record: We increment offset by sizeof tlv: 3, size of len: 2 *May 14 23:23:13.988: code_sign_parse_key_record: offset: 277, Modulus size: (xxx) CCCA40558C71E24A3AB69D5C941D02BA63CDF0202FC6CBC1D73E8F27E3DA6DC615EB2FD0A66643D82BE17F3CE8 ..... 47AE5135955C58B164320B925608DA4002B75FB01EFEC2691B188D6FB2E3AFE8F453888FE063B4304DDC2EB25B *May 14 23:23:13.988: code_sign_parse_key_record: Tag (Public Exponent:(xxx) found at offset: 277 *May 14 23:23:13.988: code_sign_parse_key_record: We increment offset by sizeof tlv: 3, size of len: 2 *May 14 23:23:13.988: code_sign_parse_key_record: offset: 284, Public Exponent size: (xxx), public exponent: xxx
DB-2296
December 2010
*May 14 23:23:13.988: 284 *May 14 23:23:13.988: size of len: 2 *May 14 23:23:13.988: *May 14 23:23:13.988: (0x3F)Version
code_sign_parse_key_record: Tag (Key Version:(0x6) found at offset: code_sign_parse_key_record: We increment offset by sizeof tlv: 3, code_sign_parse_key_record: Key Version: 0x41, offset: 288 code_sign_parse_key_record: END. offset (292), bitlist: : A
The following example enables the display of debugging output related to software authentication errors and events (the full range of messages), and the output from the show software authenticity file command displays the file information related to software authentication debugging:
Router# debug software authenticity verbose Software Authenticity Verbose debugging is on Router# show software authenticity file flash0:c3900-universalk9-mz.SSA ################## Signature Envelope Version 1.xxx hdr_length xxx signer_id_len xxx signer_name CN=CiscoSystems;OU=C3900;O=CiscoSystems ca serial num len xxx ca_serial_num xxx ca_name CN=CiscoSystems;OU=C3900;O=CiscoSystems digest_algo xxx sign_algo xxx mod_size xxx key_type xxx key_version 0xx1 signature length xxx signature TLV offset xxx signature 4F94AC7EAA7B9B9EAE66EFA8BF426C3BFE622D7C651A35F686F7DD7FBF329317B269CAEADB5679834B93BF2C91 ..... F160EF79B82AB41176975D024D1DA9EB75499BC139BFED9AF8D3F4DFAE35BFC0CDA1519F7CD9C8EB08D8D09D18 --More-*May 28 08:05:44.487: code_sign_get_image_type: filename:flash0:c3900-universalk9-mz.SSA *May 28 08:05:44.487: cs_open: Opened file flash0:c3900-universalk9-mz.SSA with fd=13 *May 28 08:05:44.491: code_sign_get_image_type: image type found: image (elf) (3) *May 28 08:05:44.491: code_sign_get_image_envelope Start, fd(13) *May 28 08:05:44.491: code_sign_get_number_of_sections num_sections: 7 *May 28 08:05:44.547: code_sign_get_image_envelope:SHA2 Note Section found at iter: 6 *May 28 08:05:44.547: code_sign_get_image_envelope: Note name len(n_namesz): 13, Signature Env Len(n_descz): 388 *May 28 08:05:44.547: code_sign_get_image_envelope: sizeof elf_note_hdr: 12, size of Elf32_Nhdr: 12 *May 28 08:05:44.547: code_sign_get_image_envelope: Note Name:(CISCO SYSTEMS) fo ################## File Name Image type Signer Information Common Name Organization Unit Organization Name Certificate Serial Number Hash Algorithm Signature Algorithm Key Version : flash0:c3900-universalk9-mz.SSA : Development : : : : : : : xxx xxx xxx xxx SHA512 2048-bit RSA A
DB-2297
Related Commands
Command show software authenticity file show software authenticity keys show software authenticity running show software authenticity upgrade-status
Description Displays information related to software authentication for the loaded image file. Displays the software public keys that are in the storage with the key types. Displays software authenticity information for the current ROMmon and Cisco IOS image used for booting. Displays software authenticity information indicating if the digitally signed software has been signed with a new production key after a production key revocation.
DB-2298
December 2010
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug source bridge command for peer bridges using TCP as a transport mechanism. The remote source-route bridging (RSRB) network configuration has ring 2 and ring 1 bridged together through remote peer bridges. The remote peer bridges are connected via a serial line and use TCP as the transport mechanism.
Router# debug source bridge RSRB: RSRB: RSRB: RSRB: RSRB: RSRB: RSRB: RSRB: remote explorer to 5/192.108.250.1/1996 srn 2 [C840.0021.0050.0000] Version/Ring XReq sent to peer 5/192.108.250.1/1996 Received version reply from 5/192.108.250.1/1996 (version 2) DATA: 5/192.108.250.1/1996 Ring Xchg Rep, trn 2, vrn 5, off 18, len 10 added bridge 1, ring 1 for 5/192.108.240.1/1996 DATA: 5/192.108.250.1/1996 Explorer trn 2, vrn 5, off 18, len 69 DATA: 5/192.108.250.1/1996 Forward trn 2, vrn 5, off 0, len 92 DATA: forward Forward srn 2, br 1, vrn 5 to peer 5/192.108.250.1/1996
The following line indicates that a remote explorer frame has been sent to IP address 192.108.250.1 and, like all RSRB TCP connections, has been assigned port 1996. The bridge belongs to ring group 5. The explorer frame originated from ring 2. The routing information field (RIF) descriptor has been generated by the local station and indicates that the frame was sent out via bridge 1 onto virtual ring 5.
RSRB: remote explorer to 5/192.108.250.1/1996 srn 2 [C840.0021.0050.0000]
The following line indicates that a request for remote peer information has been sent to IP address 192.108.250.1, TCP port 1996. The bridge belongs to ring group 5.
RSRB: Version/Ring XReq sent to peer 5/192.108.250.1/1996
The following line is the response to the version request previously sent. The response is sent from IP address 192.108.250.1, TCP port 1996. The bridge belongs to ring group 5.
RSRB: Received version reply from 5/192.108.250.1/1996 (version 2)
The following line is the response to the ring request previously sent. The response is sent from IP address 192.108.250.1, TCP port 1996. The target ring number is 2, virtual ring number is 5, the offset is 18, and the length of the frame is 10 bytes.
RSRB: DATA: 5/192.108.250.1/1996 Ring Xchg Rep, trn 2, vrn 5, off 0, len 10
DB-2299
The following line indicates that bridge 1 and ring 1 were added to the source-bridge table for IP address 192.108.250.1, TCP port 1996:
RSRB: added bridge 1, ring 1 for 5/192.108.250.1/1996
The following line indicates that a packet containing an explorer frame came across virtual ring 5 from IP address 192.108.250.1, TCP port 1996. The packet is 69 bytes in length. This packet is received after the Ring Exchange information was received and updated on both sides.
RSRB: DATA: 5/192.108.250.1/1996 Explorer trn 2, vrn 5, off 18, len 69
The following line indicates that a packet containing data came across virtual ring 5 from IP address 192.108.250.1 over TCP port 1996. The packet is being placed on the local target ring 2. The packet is 92 bytes in length.
RSRB: DATA: 5/192.108.250.1/1996 Forward trn 2, vrn 5, off 0, len 92
The following line indicates that a packet containing data is being forwarded to the peer that has IP address 192.108.250.1 address belonging to local ring 2 and bridge 1. The packet is forwarded via virtual ring 5. This packet is sent after the Ring Exchange information was received and updated on both sides.
RSRB: DATA: forward Forward srn 2, br 1, vrn 5 to peer 5/192.108.250.1/1996
The following is sample output from the debug source bridge command for peer bridges using direct encapsulation as a transport mechanism. The RSRB network configuration has ring 1 and ring 2 bridged together through peer bridges. The peer bridges are connected via a serial line and use TCP as the transport mechanism.
Router# debug source bridge RSRB: RSRB: RSRB: RSRB: RSRB: remote explorer to 5/Serial1 srn 1 [C840.0011.0050.0000] Version/Ring XReq sent to peer 5/Serial1 Received version reply from 5/Serial1 (version 2) IFin: 5/Serial1 Ring Xchg, Rep trn 0, vrn 5, off 0, len 10 added bridge 1, ring 1 for 5/Serial1
The following line indicates that a remote explorer frame was sent to remote peer Serial1, which belongs to ring group 5. The explorer frame originated from ring 1. The RIF descriptor 0011.0050 was generated by the local station and indicates that the frame was sent out via bridge 1 onto virtual ring 5.
RSRB: remote explorer to 5/Serial1 srn 1 [C840.0011.0050.0000]
The following line indicates that a request for remote peer information was sent to Serial1. The bridge belongs to ring group 5.
RSRB: Version/Ring XReq sent to peer 5/Serial1
The following line is the response to the version request previously sent. The response is sent from Serial 1. The bridge belongs to ring group 5 and the version is 2.
RSRB: Received version reply from 5/Serial1 (version 2)
The following line is the response to the ring request previously sent. The response is sent from Serial1. The target ring number is 2, virtual ring number is 5, the offset is 0, and the length of the frame is 39 bytes.
RSRB: IFin: 5/Serial1 Ring Xchg Rep, trn 2, vrn 5, off 0, len 39
The following line indicates that bridge 1 and ring 1 were added to the source-bridge table for Serial1:
RSRB: added bridge 1, ring 1 for 5/Serial1
DB-2300
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug source error command displays some output also found in the debug source bridge output. See the debug source bridge command for other possible output.
Examples
In all of the following examples of debug source error command messages, the variable number is the Token Ring interface. For example, if the line of output starts with SRB1, the output relates to the Token Ring 1 interface. SRB indicates a source-route bridging message. RSRB indicates a remote source-route bridging message. SRTLB indicates a source-route translational bridging (SR/TLB) message. In the following example, a packet of protocol protocol-type was dropped:
SRBnumber drop: Routed protocol protocol-type
In the following example, an Address Resolution Protocol (ARP) packet was dropped. ARP is defined in RFC 826.
SRBnumber drop:TYPE_RFC826_ARP
In the following example, the current Cisco IOS version does not support Qualified Logical Link Control (QLLC). Reconfigure the router with an image that has the IBM feature set.
RSRB: QLLC not supported in version version Please reconfigure.
In the following example, the packet was dropped because the outgoing interface of the router was down:
RSRB IF: outgoing interface not up, dropping packet
In the following example, the router received an out-of-sequence IP sequence number in a Fast Sequenced Transport (FST) packet. FST has no recovery for this problem like TCP encapsulation does.
RSRB FST: bad sequence number dropping.
In the following example, the router was unable to locate the virtual interface:
RSRB: couldn't find virtual interface
In the following example, the TCP queue of the peer router is full. TCPD indicates that this is a TCP debug.
RSRB TCPD: tcp queue full for peer
DB-2301
In the following example, the router was unable to send data to the peer router. A result of 1 indicates that the TCP queue is full. A result of 1 indicates that the RSRB peer is closed.
RSRB TCPD: tcp send failed for peer result
In the following example, the routing information identifier (RII) was not set in the explorer packet going forward. The packet will not support SRB, so it is dropped.
vrforward_explorer - RII not set
In the following example, a packet sent to a virtual bridge in the router did not include a routing information field (RIF) to tell the router which route to use:
RSRB: no RIF on packet sent to virtual bridge
The following example indicates that the RIF did not contain any information or the length field was set to zero:
RSRB: RIF length of zero sent to virtual bridge
The following message occurs when the local service access point (LSAP) is out of range. The variable lsap-out is the value, type is the type of RSRB peer, and state is the state of the RSRB peer.
VRP: rsrb_lsap_out = lsap-out, type = type, state = state
In the following message, the router is unable to find another router with which to exchange bridge protocol data units (BPDUs). BPDUs are exchanged to set up the spanning tree and determine the forwarding path.
RSRB(span): BPDU's peer not found
Related Commands
Description Displays information about packets and frames transferred across a source-route bridge. Displays information on SRB activity.
DB-2302
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Some of the output from the debug source bridge and debug source error commands is identical to the output of this command.
Note
In order to use the debug source event command to display traffic source-routed through an interface, you first must disable fast switching of SRB frames with the no source bridge route-cache interface configuration command.
Examples
The following is sample output from the debug source event command:
Router# debug source event RSRB0: forward (srn 5 [0800.3201.00A1.0050] RSRB0: forward (srn 5 [0800.3201.00A1.0050] RSRB0: forward (srn 5 [0800.3201.00A1.0050] RSRB0: forward (srn 5 [0800.3201.00A1.0050] RSRB0: forward (srn 5 [0800.3201.00A1.0050] bn 1 trn 10), src: 8110.2222.33c1 dst: 1000.5a59.04f9 bn 1 trn 10), src: 8110.2222.33c1 dst: 1000.5a59.04f9 bn 1 trn 10), src: 8110.2222.33c1 dst: 1000.5a59.04f9 bn 1 trn 10), src: 8110.2222.33c1 dst: 1000.5a59.04f9 bn 1 trn 10), src: 8110.2222.33c1 dst: 1000.5a59.04f9
Field RSRB0:
Description Indication that this routing information field (RIF) cache entry is for the Token Ring interface 0, which has been configured for remote source-route bridging (SRB). (SRB1, in contrast, would indicate that this RIF cache entry is for Token Ring 1, configured for SRB.) Forward (normal data) packet, in contrast to a control packet containing proprietary Cisco bridging information. Ring number of the source ring of the packet.
forward srn 5
DB-2303
Table 326
Description Bridge number of the bridge this packet traverses. Ring number of the target ring of the packet. Source address of the route in this RIF cache entry. Destination address of the route in this RIF cache entry. RIF string in this RIF cache entry.
In the following example messages, SRBnumber or RSRBnumber denotes a message associated with interface Token Ring number. A number of 99 denotes the remote side of the network.
SRBnumber: no path, s: source-MAC-addr d: dst-MAC-addr rif: rif
In the preceding example, a bridgeable packet came in on interface Token Ring number but there was nowhere to send it. This is most likely a configuration error. For example, an interface has source bridging turned on, but it is not connected to another source bridging interface or a ring group. In the following example, a bridgeable packet has been forwarded from Token Ring number to the target ring. The two interfaces are directly linked.
SRBnumber: direct forward (srn ring bn bridge trn ring)
In the following examples, a proxy explorer reply was not generated because the address could not be reached from this interface. The packet came from the node with the first address.
SRBnumber: SRBnumber: SRBnumber: SRBnumber: SRBnumber: SRBnumber: br br br br br br dropped dropped dropped dropped dropped dropped proxy proxy proxy proxy proxy proxy XID, address for address, wrong vring (rem) TEST, address for address, wrong vring (rem) XID, address for address, wrong vring (local) TEST, address for address, wrong vring (local) XID, address for address, no path TEST, address for address, no path
In the following example, an appropriate proxy explorer reply was generated on behalf of the second address. It is sent to the first address.
SRBnumber: br sent proxy XID, address for address[rif] SRBnumber: br sent proxy TEST, address for address[rif]
The following example indicates that the broadcast bits were not set, or that the routing information indicator on the packet was not set:
SRBnumber: illegal explorer, s: source-MAC-addr d: dst-MAC-addr rif: rif
The following example indicates that the direction bit in the RIF field was set, or that an odd packet length was encountered. Such packets are dropped.
SRBnumber: bad explorer control, D set or odd
The following example indicates that a spanning explorer was dropped because the spanning option was not configured on the interface:
SRBnumber: span dropped, input off, s: source-MAC-addr d: dst-MAC-addr rif: rif
The following example indicates that a spanning explorer was dropped because it had traversed the ring previously:
SRBnumber: span violation, s: source-MAC-addr d: dst-MAC-addr rif: rif
DB-2304
December 2010
The following example indicates that an explorer was dropped because the maximum hop count limit was reached on that interface:
SRBnumber: max hops reached - hop-cnt, s: source-MAC-addr d: dst-MAC-addr rif: rif
The following example indicates that the ring exchange request was sent to the indicated peer. This request tells the remote side which rings this node has and asks for a reply indicating which rings that side has.
RSRB: sent RingXreq to ring-group/ip-addr
The following example indicates that a message was sent to the remote peer. The label variable can be AHDR (active header), PHDR (passive header), HDR (normal header), or DATA (data exchange), and op can be Forward, Explorer, Ring Xchg, Req, Ring Xchg, Rep, Unknown Ring Group, Unknown Peer, or Unknown Target Ring.
RSRB: label: sent op to ring-group/ip-addr
The following example indicates that the remote bridge and ring pair were removed from or added to the local ring group table because the remote peer changed:
RSRB: removing bn bridge rn ring from ring-group/ip-addr RSRB: added bridge bridge, ring ring for ring-group/ip-addr
The following example shows miscellaneous remote peer connection establishment messages:
RSRB: RSRB: RSRB: RSRB: RSRB: peer ring-group/ip-addr closed [last state n] passive open ip-addr(remote port) -> local port CONN: opening peer ring-group/ip-addr, attempt n CONN: Remote closed ring-group/ip-addr on open CONN: peer ring-group/ip-addr open failed, reason[code]
The following example shows that an explorer packet was propagated onto the local ring from the remote ring group:
RSRBn: sent local explorer, bridge bridge trn ring, [rif]
The following messages indicate that the RSRB code found that the packet was in error:
RSRBn: ring group ring-group not found RSRBn: explorer rif [rif] not long enough
The following example indicates that a buffer could not be obtained for a ring exchange packet (this is an internal error):
RSRB: couldnt get pak for ringXchg
The following example indicates that a ring exchange packet was received that had an incorrect length (this is an internal error):
RSRB: XCHG: req/reply badly formed, length pak-length, peer peer-id
The following example indicates that a ring entry was removed for the peer; the ring was possibly disconnected from the network, causing the remote router to send an update to all its peers.
RSRB: removing bridge bridge ring ring from peer-id ring-type
The following example indicates that a ring entry was added for the specified peer; the ring was possibly added to the network, causing the other router to send an update to all its peers.
RSRB: added bridge bridge, ring ring for peer-id
DB-2305
The following example indicates that no memory was available to add a ring number to the ring group specified (this is an internal error):
RSRB: no memory for ring element ring-group
The following example indicates that memory was corrupted for a connection block (this is an internal error):
RSRB: CONN: corrupt connection block
The following example indicates that a connector process started, but that there was no packet to process (this is an internal error):
RSRB: CONN: warning, no initial packet, peer: ip-addr peer-pointer
The following example indicates that a packet was received with a version number different from the one pre-sent on the router:
RSRB: IF New version. local=local-version, remote=remote-version,pak-op-code peer-id
The following example indicates that a packet with a bad op code was received for a direct encapsulation peer (this is an internal error):
RSRB: IFin: bad op op-code (op code string) from peer-id
The following example indicates that the virtual ring header will not fit on the packet to be sent to the peer (this is an internal error):
RSRB: vrif_sender, hdr won't fit
The following example indicates that the specified peer is being opened. The retry count specifies the number of times the opening operation is attempted.
RSRB: CONN: opening peer peer-id retry-count
The following example indicates that the router, configured for FST encapsulation, received a version reply to the version request packet it had sent previously:
RSRB: FST Rcvd version reply from peer-id (version version-number)
The following example indicates that the router, configured for FST encapsulation, sent a version request packet to the specified peer:
RSRB: FST Version Request. op = opcode, peer-id
The following example indicates that the router received a packet with a bad op code from the specified peer (this is an internal error):
RSRB: FSTin: bad op opcode (op code string) from peer-id
The following example indicates that the TCP connection between the router and the specified peer is being aborted:
RSRB: aborting ring-group/peer-id (vrtcpd_abort called)
The following example indicates that an attempt to establish a TCP connection to a remote peer timed out:
RSRB: CONN: attempt timed out
The following example indicates that a packet was dropped because the ring group number in the packet did not correlate with the ring groups configured on the router:
RSRBnumber: ring group ring-group not found
DB-2306
December 2010
debug span
To display information on changes in the spanning-tree topology when debugging a transparent bridge, use the debug span command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug span no debug span
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command is useful for tracking and verifying that the spanning-tree protocol is operating correctly.
Examples
The following is sample output from the debug span command for an IEEE bridge protocol data unit (BPDU) packet:
Router# debug span ST: Ether4 0000000000000A080002A02D6700000000000A080002A02D6780010000140002000F00
Description Indication that this is a spanning tree packet. Interface receiving the packet. Indication that this is an IEEE BPDU packet. Version. Command mode:
00 indicates config BPDU. 80 indicates the Topology Change Notification (TCN) BPDU. 00 indicates no change. 80 indicates a change notification.
(D) 00
(E) 000A
Root priority.
DB-2307
Table 327
Field (F) 080002A02D67 (G) 00000000 (H) 000A (I) 080002A02D67 (J) 80 (K) 01 (L) 0000 (M) 1400 (N) 0200 (O) 0F00
Description Root ID. Root path cost (0 means the sender of this BPDU packet is the root bridge). Bridge priority. Bridge ID. Port priority. Port Number 1. Message age in 256ths of a second (0 seconds, in this case). Maximum age in 256ths of a second (20 seconds, in this case). Hello time in 256ths of a second (2 seconds, in this case). Forward delay in 256ths of a second (15 seconds, in this case).
The following is sample output from the debug span command for a DEC BPDU packet:
Router# debug span ST: Ethernet4 E1190100000200000C01A2C90064008000000C0106CE0A01050F1E6A
Description Indication that this is a spanning tree packet. Interface receiving the packet. Indication that this is a DEC BPDU packet. Indication that this is a DEC hello packet. Possible values are as follows:
(C) 01 (D) 00
DEC version. Flag that is a bit field with the following mapping:
DB-2308
December 2010
Table 328
Field (G) 0064 (H) 0080 (I) 00000C0106CE (J) 0A (K) 01 (L) 05 (M) 0F (N) 1E (O) 6A
Description Root path cost (translated as 100 in decimal notation). Bridge priority. Bridge ID. Port ID (in contrast to interface number). Message age (in seconds). Hello time (in seconds). Maximum age (in seconds). Forward delay (in seconds). Not applicable.
DB-2309
debug spanning-tree
To debug spanning-tree activities, use the debug spanning-tree command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug spanning-tree {all | backbonefast | bpdu | bpdu-opt | config | etherchannel | events | exceptions | general | pvst+ | root | snmp | uplinkfast} no debug spanning-tree {all | backbonefast | bpdu | bpdu-opt | config | etherchannel | events | exceptions | general | pvst+ | root | snmp | uplinkfast}
Syntax Description
all backbonefast bpdu bpdu-opt config etherchannel events exceptions general pvst+ root snmp uplinkfast
Displays all spanning-tree debugging messages. Displays debugging messages for BackboneFast events. Displays debugging messages for spanning-tree Bridge Protocol Data Units (BPDUs). Displays debugging messages for optimized BPDU handling. Displays debugging messages for spanning-tree configuration changes. Displays debugging messages for EtherChannel support. Displays debugging messages for spanning-tree topology events. Displays debugging messages for spanning-tree exceptions. Displays debugging messages for general spanning-tree activity. Displays debugging messages for per-VLAN Spanning Tree Plus (PVST+) events. Displays debugging messages for spanning-tree root events. Displays debugging messages for spanning-tree Simple Network Management Protocol (SNMP) handling. Displays debugging messages for UplinkFast events.
Defaults
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.3(4)T on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers.
DB-2310
December 2010
Modification This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is supported only by the Supervisor Engine and can be entered only from the switch console. The undebug spanning-tree command is the same as the no debug spanning-tree command.
Related Commands
Description Displays information about the types of debugging that are enabled. Displays spanning-tree state information.
DB-2311
Use this command only if told to do so by your Cisco representative. To initiate Signaling System 7 (SS7) Message Transfer Part Level 1 (MTP1) debugging, enter the debug ss7 mtp1 command in global configuration mode during a low-traffic period. To disable debugging output, use the no form of this command. debug ss7 mtp1 [mtp2 | ipc | link-state | oir | rx | scc-regs | siram | tdm-info | tx] no debug ss7 mtp1
Syntax Description
(Optional) Initiates SS7 MTP2 debugging. (Optional) Initiates SS7 MTP1 debugging for HOST/FW IPC. (Optional) Initiates SS7 MTP1 debugging for link-state transitions. (Optional) Initiates SS7 MTP1 trunk dial feature card (DFC) online insertion and removal (OIR) debugging. (Optional) Initiates SS7 MTP1 debugging for receive events. Not used in Release 12.2(11)T. (Optional) Initiates SS7 MTP1 debugging for SCC registers. Not used in Release 12.2(11)T. (Optional) Initiates SS7 MTP1 debugging for siram values. Not used in Release 12.2(11)T. (Optional) Initiates SS7 MTP1 debugging for time-division multiplexing (TDM) information. (Optional) Initiates SS7 MTP1 debugging for transmission events. Not used in Release 12.2(11)T.
Defaults
Debug is disabled.
Command Modes
Global configuration
Command History
Modification This command was introduced on the Cisco AS5350 and Cisco AS5400 Signaling Link Terminal (SLT). This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-2312
December 2010
Usage Guidelines
debug ss7 mtp1 rx debug ss7 mtp1 tx debug ss7 mtp1 scc-regs debug ss7 mtp1 siram
Examples
To turn on message tracing between the host processor and the trunk firmware for each trunk card inserted, use the debug ss7 mtp1 ipc command. For example, there is a digital link in slot 7, trunk 0, channel-group 0 (therefore, timeslot 1). When you enter show ss7 mtp1 links, the following output is displayed:
Router# show ss7 mtp1 links SS7 MTP1 Links [num = 1, platform max = 4]: session type SCC state ------------digital 7/3 STOPPED
interface --------7/0:0
channel ------0
Notice that the link is stopped in this example. Enter the following commands:
Router# debug ss7 mtp1 ipc Router# configure terminal Router(config)# interface serial 7/0:0 Router(config-if)# no shutdown Router(config-if)# end
In this case, the output means that for the SS7 link that is using SCC3 on the trunk card in slot 7 (link 7/0:0), the host processor has told the board firmware to STOP then START. To show low-level (MTP1) state changes for the internal state-machine implemented for each SS7 link, use the debug ss7 mtp1 link-state command. The following output shows the different MTP1 states link Serial 7/0:0 goes through during shutdown, no shutdown, and debug. For example, if you stopped the SS7 link 7/0:0 (shutdown), then restarted it (no shutdown), you could see MTP1 state changes by enabling debugging, as follows:
Router# debug ss7 mtp1 link-state Router# configure terminal Router(config)# interface serial 7/0:0 Router(config-if)# shutdown 01:02:20:%TRUNK_SERIAL-3-STATE_GENERIC: At ../src-7k-as5400/as5400_ss7_link.c:511 [Serial7/0:0]:STOP: STARTED -> STOP_PENDING ss7_link_ll_stop 7/0:0:Tx shadow ring has 0 unsent buffers 01:02:20:%TRUNK_SERIAL-3-STATE_GENERIC: At ../src-7k-as5400/as5400_ss7_link.c:1010 [Serial7/0:0]: FW_STOPPED: STOP_PENDING -> STOPPED
DB-2313
To show detailed information about how TDM timeslots on the DFC trunk card on the host backplane are allocated and deallocated based on link configuration activity, use the debug ss7 mtp1 tdm-info command. For example, if you wanted to create a digital SS7 link on timeslot 1 of trunk 0 for an 8PRI board in slot 7, and you would like to see traces of the TDM resources allocated, you would enable TDM debugging using the debug ss7 mtp1 tdm-info command then create the new SS7 link as described above, as in the following example:
Router# debug ss7 mtp1 tdm-info Router# configure terminal Router(config)# controller t1 7/0 Router(config-controller)# channel-group 0 timeslots 1 Router(config-controller)# exit Router(config)# interface serial 7/0:0 Router(config-if)# encapsulation ss7
DB-2314
December 2010
= = = =
0 4 7 3
bp_ts->vdev_slot *->channel.
When you later remove the SS7 link, other information is displayed showing how resources are cleaned up.
Related Commands
DB-2315
Syntax Description
(Optional) Initiates alignment Error Rate Monitor events. (Optional) Initiates trace backhaul control messages. The channel argument represents a logical channel number. Valid values are from 0 to 3. (Optional) Initiates congestion Control events. (Optional) Initiates initial Alignment Control events. (Optional) Initiates Link State Control events. (Optional) Initiates trace backhaul LSSU messages. (Optional) Initiates trace backhaul MSU messages (use during low traffic only). (Optional) Initiates low-level MTP2 packet tracing. If you do not specify a channel number or enter the all keyword, the command displays information for channel 0. (Optional) Displays information about SS7 MTP2 receiver state machine events and transitions. (Optional) Displays information about SS7 MTP2 Signal Unit Error Rate Monitor (SUERM) state machine events and transitions. (Optional) Displays information about SS7 MTP2 timer starts and stops. (Optional) Displays information about SS7 MTP2 transmit state machine events and transitions. (Optional) The channel argument represents a logical channel number. Valid values are from 0 to 3.
Defaults
Debug is disabled.
Command Modes
Global configuration
DB-2316
December 2010
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(1)T. This command was implemented on the Cisco AS5350 and Cisco AS5400 Cisco Signaling Link Terminal (SLT). This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
If you do not specify a channel number with each keyword, the command displays information for channel 0.
Examples
The following is sample output from the debug ss7 mtp2 aerm command. See the MTP2 specification tables for details:
Router# debug ss7 mtp2 aerm 0 *Mar *Mar 8 08:59:30.991:itu2AERM_Start chnl=0 MTP2AERM_IDLE 8 08:59:35.070:itu2AERM_Stop chnl=0 MTP2AERM_MONITORING
The following is an example of debug ss7 mtp2 backhaul command output for channel 0:
Router# debug ss7 mtp2 backhaul 0 *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 03:08:04.433: 03:08:04.433: 03:08:08.721: 03:08:10.311: 03:08:10.311: 03:08:20.440: 03:08:20.444: 03:08:24.719: 03:08:36.438: 03:08:36.438: 03:08:40.312: 03:08:40.312: 03:08:40.721: 03:08:52.444: 03:08:52.444: 03:08:56.719: 03:09:08.438: 03:09:08.438: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: MTP2: send send rcvd rcvd send send send rcvd send send rcvd send rcvd send send rcvd send send Disc Ind ch=0 reason=0x14-T2 expired waiting for SIO LSC Ind ch=0 event=0x8-lost link alignment cause=0x0 Conn Req - Normal ch=0 Statistics Req-Send&Reset ch=0 Stats Cfm ch=0 Disc Ind ch=0 reason=0x14-T2 expired waiting for SIO LSC Ind ch=0 event=0x8-lost link alignment cause=0x0 Conn Req - Normal ch=0 Disc Ind ch=0 reason=0x14-T2 expired waiting for SIO LSC Ind ch=0 event=0x8-lost link alignment cause=0x0 Statistics Req-Send&Reset ch=0 Stats Cfm ch=0 Conn Req - Normal ch=0 Disc Ind ch=0 reason=0x14-T2 expired waiting for SIO LSC Ind ch=0 event=0x8-lost link alignment cause=0x0 Conn Req - Normal ch=0 Disc Ind ch=0 reason=0x14-T2 expired waiting for SIO LSC Ind ch=0 event=0x8-lost link alignment cause=0x0
The following is an example of debug ss7 mtp2 cong command output. See the MTP2 specification tables for details:
Router# debug ss7 mtp2 cong 0 *Mar 8 09:10:56.219:itu2CongestionOnset chnl=0 MTP2CONGESTION_IDLE *Mar 8 09:10:59.332:itu2CongestionAbatement chnl=0 MTP2CONGESTION_ACTIVE *Mar 8 09:11:01.143:itu2CongestionAbatement chnl=0 MTP2CONGESTION_IDLE
DB-2317
The following is an example of debug ss7 mtp2 iac command output. See the MTP2 specification tables for details:
Router# debug ss7 mtp2 iac 0 *Mar *Mar *Mar *Mar *Mar 8 8 8 8 8 09:17:58.367:itu2IAC_Start chnl=0 MTP2IAC_IDLE 09:17:58.739:itu2IAC_Rcvd_SIO chnl=0 MTP2IAC_NOT_ALIGNED 09:17:58.739:itu2IAC_Rcvd_SIN chnl=0 MTP2IAC_ALIGNED 09:17:58.739:itu2IAC_Rcvd_SIN chnl=0 MTP2IAC_PROVING 09:18:02.814:itu2IAC_T4_TMO chnl=0 MTP2IAC_PROVING
The following is an example of debug ss7 mtp2 lsc command output. See the MTP2 specification tables for details:
Router# debug ss7 mtp2 lsc 0 *Mar 8 09:20:21.105:itu2LSC_Rcvd_SIOS chnl=0 MTP2LSC_INSERVICE *Mar 8 09:20:21.121:itu2LSC_Retrieve_BSNT chnl=0 MTP2LSC_OOS *Mar 8 09:20:22.058:itu2LSC_SetEmergency chnl=0 MTP2LSC_OOS *Mar 8 09:20:22.058:itu2LSC_Start chnl=0 MTP2LSC_OOS *Mar 8 09:20:33.785:itu2LSC_AlignmentNotPossible chnl=0 MTP2LSC_INITIAL_ALIGNMENT *Mar 8 09:20:38.758:itu2LSC_SetEmergency chnl=0 MTP2LSC_OOS *Mar 8 09:20:38.758:itu2LSC_Start chnl=0 MTP2LSC_OOS *Mar 8 09:20:44.315:itu2LSC_Rcvd_SIO chnl=0 MTP2LSC_INITIAL_ALIGNMENT *Mar 8 09:20:44.315:itu2LSC_Rcvd_SIO chnl=0 MTP2LSC_INITIAL_ALIGNMENT *Mar 8 09:20:44.319:itu2LSC_Rcvd_SIE chnl=0 MTP2LSC_INITIAL_ALIGNMENT *Mar 8 09:20:44.319:itu2LSC_Rcvd_SIE chnl=0 MTP2LSC_INITIAL_ALIGNMENT *Mar 8 09:20:48.397:itu2LSC_AlignmentComplete chnl=0 MTP2LSC_INITIAL_ALIGNMENT
The following is an example of debug ss7 mtp2 msu command output for channel 2. The output for this command can slow traffic under busy conditions, so enter it when there is low traffic. See the MTP2 specification tables for details about the command output:
Router# debug ss7 mtp2 msu 2 *Mar *Mar 1 01:01:12.447: MTP2: send MSU Ind 1 01:01:12.455: MTP2: rcvd MSU Req ch=2 ch=2 len=25 len=252
Caution
Use this command only for testing problems in a controlled environment. This command can generate significant amounts of output. If there is any significant amount of traffic flow when you issue the command, the processor may slow down so much that RUDP connections fail. This command is recommended for field support personnel only, and is not recommended for use without prior recommendation from Cisco. The following is an example of debug ss7 mtp2 packet command output for channel 0:
Router# debug ss7 mtp2 packet 0 *Mar 1 00:53:00.052: MTP2 incoming trace enabled on channel 0. *Mar 1 00:53:00.052: MTP2 outgoing trace enabled on channel 0. *Mar 1 00:53:07.220: ---- Incoming Rudp msg (20 bytes) ---SM_msg_type 0x00008000 protocol_type 0x0001 msg_ID 0x0001 msg_type 0x0044 channel_ID 0x0000 bearer_ID 0x0000 length 0x0004 data 0x00000001
DB-2318
December 2010
*Mar 1 00:53:07.224: ---- Outgoing Rudp msg (132 bytes) ---SM_msg_type 0x00008000 protocol_type 0x0001 msg_ID 0x0001 msg_type 0x0045 channel_ID 0x0000 bearer_ID 0x0000 length 0x0074 data 0x0000001E 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000002 0x00000000 0x00008317 0x00000000 0x00000002 0x00000000 0x00000008 0x009B5C97 0x00000000 0x0032A2A7 0x0000061C 0x000000BF 0x00000000 0x00000000 0x00000006 0x00000000 0x000000ED *Mar 1 00:53:11.343: ---- Outgoing Rudp msg (41 bytes) ---SM_msg_type 0x00008000 protocol_type 0x0001 msg_ID 0x0000 msg_type 0x0011 channel_ID 0x0000 bearer_ID 0x0000 length 0x0019 data 0x8201190A 0x03190A00 0x11F01122 0x33445566 0x778899AA 0xBBCCDDEE *Mar 1 00:53:11.351: ---- Incoming Rudp msg (41 bytes) ---SM_msg_type 0x00008000 protocol_type 0x0001 msg_ID 0x0001 msg_type 0x0010 channel_ID 0x0000 bearer_ID 0x0000 length 0x0019 data 0xB203190A 0x01190A00 0x21F01122 0x33445566 0x778899AA 0xBBCCDDEE *Mar 1 00:53:13.739: ---- Incoming Rudp msg (27 bytes) ---SM_msg_type 0x00008000 protocol_type 0x0001 msg_ID 0x0001 msg_type 0x0010 channel_ID 0x0000 bearer_ID 0x0000 length 0x000B data 0x9503190A 0x01190A00
The following is an example of debug ss7 mtp2 rcv command output. See the MTP2 specification tables for details:
Router# debug ss7 mtp2 rcv 0 *Mar *Mar *Mar 8 09:22:35.160:itu2RC_Stop chnl=0 MTP2RC_INSERVICE 8 09:22:35.164:itu2RC_Start chnl=0 MTP2RC_IDLE 8 09:22:52.565:BSNR not in window bsnr=2 bibr=0x80 fsnr=66 fibr=0x80 fsnf=0 fsnl=127 fsnt=127 8 09:22:52.569:BSNR not in window bsnr=2 bibr=0x80 fsnr=66 fibr=0x80 fsnt=127 8 09:22:52.569:AbnormalBSN_flag == TRUE
fsnx=0
*Mar
fsnf=0
fsnl=127
fsnx=0
*Mar
DB-2319
*Mar *Mar
The following is an example of debug ss7 mtp2 suerm command output. See the MTP2 specification tables for details:
Router# debug ss7 mtp2 suerm 0 *Mar *Mar 8 09:33:51.108:itu2SUERM_Stop chnl=0 MTP2SUERM_MONITORING 8 09:34:00.155:itu2SUERM_Start chnl=0 MTP2SUERM_IDLE
Caution
Use this command only for testing problems in a controlled environment. This command can generate significant amounts of output. If there is any significant amount of traffic flow when you issue the command, the processor may slow down so much that RUDP connections fail. This command is recommended for field support personnel only, and is not recommended for use without prior recommendation from Cisco. The following is an example of debug ss7 mtp2 timer command output for channel 0:
Router# debug ss7 mtp2 timer 0 *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar 1 1 1 1 1 1 1 1 1 1 1 1 01:08:13.738: 01:08:13.762: 01:08:13.786: 01:08:13.810: 01:08:43.819: 01:08:43.843: 01:08:48.603: 01:08:48.627: 01:09:13.784: 01:09:13.808: 01:09:13.885: 01:09:13.909: Timer Timer Timer Timer Timer Timer Timer Timer Timer Timer Timer Timer T7 T7 T7 T7 T7 T7 T7 T7 T7 T7 T7 T7 (ex (ex (ex (ex (ex (ex (ex (ex (ex (ex (ex (ex delay) delay) delay) delay) delay) delay) delay) delay) delay) delay) delay) delay) Start Stop Start Stop Start Stop Start Stop Start Stop Start Stop chnl=0 chnl=0 chnl=0 chnl=0 chnl=0 chnl=0 chnl=0 chnl=0 chnl=0 chnl=0 chnl=0 chnl=0
Caution
Use this command only for testing problems in a controlled environment. This command can generate significant amounts of output. If there is any significant amount of traffic flow when you issue the command, the processor may slow down so much that RUDP connections fail. This command is recommended for field support personnel only, and is not recommended for use without prior recommendation from Cisco. The following is an example of debug ss7 mtp2 txc command output for channel 2. The transmission control is functioning and updating backward sequence numbers (BSNs). See the MTP2 specification for details:
Router# debug ss7 mtp2 txc 2 *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar 1 1 1 1 1 1 1 1 1 1 1 1 01:10:13.831: 01:10:13.831: 01:10:13.831: 01:10:13.839: 01:10:13.863: 01:10:13.863: 01:10:23.603: 01:10:23.627: 01:10:23.627: 01:10:23.631: 01:10:23.631: 01:10:23.635: itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_PDU2xmit chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_PDU2xmit chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE
DB-2320
December 2010
1 1 1 1 1 1
itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_PDU2xmit chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVICE itu2TXC_bsn_update chnl=2 MTP2TXC_INSERVIC
The following MTP2 specification tables explain codes that appear in the command output. Backhaul Debug Event Codes 0x0 0x1 0x2 0x3 0x4 0x5 0x7 0x8 0x9 0xa 0xc 0xd 0xe 0xf Description Local processor outage Local processor outage recovered Entered a congested state Exited a congested state Physical layer up Physical layer down Protocol error (see cause code) Link alignment lost Retransmit buffer full Retransmit buffer no longer full Remote entered congestion Remote exited congestion Remote entered processor outage Remote exited processor outage
Description Cause unknowndefault Management initiated Abnormal BSN (backward sequence number) Abnormal FIB (Forward Indicator Bit) Congestion discard
Backhaul Debug Reason Codes 0x0 0x1 0x2 0x3 0x4 0x5
Description Layer management request SUERM (Signal Unit Error Monitor) failure Excessively long alignment period T7 timer expired Physical interface failure Two or three invalid BSNs
DB-2321
Backhaul Debug Reason Codes 0x6 0x7 0x13 0x14 0x15 0x16 0x17 0x18 0x19 0x20 0x25
Description Two or three invalid FIBs LSSU (Link Status Signal Unit) condition SIOs (Service Information Octets) received in Link State Control (LSC) Timer T2 expired waiting for SIO Timer T3 expired waiting for SIE/SIN SIO received in initial alignment control (IAC) Proving period failure Timer T1 expired waiting for FISU (Fill-In Signal Unit) SIN received in the in-service state CTS lost No resources
Related Commands
DB-2322
December 2010
debug ss7 sm
To display debugging messages for an Signaling System 7 (SS7) Session Manager, use the debug ss7 sm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ss7 sm [session session-id | set | timer] no debug ss7 sm session
Syntax Description
(Optional) Sets Session Manager session debug. (Optional) Specifies a session ID number from 0 to 3. (Optional) Sets Session Manager debug. (Optional) Sets Session Manager timer debug.
Defaults
Debug is disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(1)T. This command replaces the debug ss7 sm session command. This command was modified with the session, set, and timer keywords. This command was also modified to support up to four Session Manager sessions. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
Use this command to watch the Session Manager and Reliable User Data Protocol (RUDP) sessions. The Session Manager is responsible for establishing the RUDP connectivity to the Virtual Switch Controller (VSC). Support for up to four Session Manager sessions was added. Session Manager sessions are now numbered 0 to 3. This feature changes the CLI syntax, and adds sessions 2 and 3.
Examples
The following is an example of debug ss7 sm command output using the session keyword. The Session Manager has established the connection (RUDP_CONN_OPEN_SIG) for session 3.
Router# debug ss7 sm session 3 *Mar *Mar 8 09:37:52.119:SM:rudp signal RUDP_SOFT_RESET_SIG, session = 3 8 09:37:58.129:SM:rudp signal RUDP_CONN_RESET_SIG, session = 3
DB-2323
*Mar *Mar
The following is an example of debug ss7 sm session command output for session 0. The Session Manager has established the connection (RUDP_CONN_OPEN_SIG):
Router# debug ss7 sm session 0 *Mar *Mar *Mar *Mar 8 8 8 8 09:37:52.119:SM:rudp signal RUDP_SOFT_RESET_SIG, session = 0 09:37:58.129:SM:rudp signal RUDP_CONN_RESET_SIG, session = 0 09:37:58.129:SM:Opening session[0] to 10.5.0.4:8060 09:37:58.137:SM:rudp signal RUDP_CONN_OPEN_SIG, session = 0
Related Commands
Description Assigns a channel group and selects the DS0 time slots desired for SS7 links.
DB-2324
December 2010
debug sse
To display information for the silicon switching engine (SSE) processor, use the debug sse command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sse no debug sse
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug sse command to display statistics and counters maintained by the SSE.
Examples
The following line indicates that the SSE cache is being updated due to a change in the IP fast-switching cache:
SSE: IP number of cache entries changed 273 274
The following line indicates that bridging functions were enabled on the SSE:
SSE: bridging enabled
The following lines indicate that the SSE is now loaded with information about the interfaces:
SSE: SSE: SSE: SSE: SSE: SSE: SSE: interface interface interface interface interface interface interface Ethernet0/0 Ethernet0/1 Ethernet0/2 Ethernet0/3 Ethernet0/4 Ethernet0/5 Hssi1/0 icb icb 0x30 addr 0x29 status 0x21A040 protos 0x11 icb 0x33 addr 0x29 status 0x21A040 protos 0x11 icb 0x36 addr 0x29 status 0x21A040 protos 0x10 icb 0x39 addr 0x29 status 0x21A040 protos 0x11 icb 0x3C addr 0x29 status 0x21A040 protos 0x10 icb 0x3F addr 0x29 status 0x21A040 protos 0x11 0x48 addr 0x122 status 0x421E080 protos 0x11
The following line indicates that the SSE took 316 ms of processor time to update the SSE cache. The value of 320 ms represents the total time elapsed while the cache updates were performed.
SSE: cache update took 316ms, elapsed 320ms
DB-2325
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 6400 node route processor. This command was integrated into Cisco IOS Release 12.2(4)B. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to show error messages for the control modules. These modules include all those that manage the user authentication and service login and logout (RADIUS, PPP, Subblock, and Accounting). An error message is the result of an error detected during normal execution.
Examples
The following output is generated by using the debug ssg ctrl-errors command when a host logs in to and logs out of a service:
Router# debug ssg ctrl-errors Mar 29 13:51:30 [192.168.5.1.15.21] 59:00:15:38:%VPDN-6-AUTHORERR:L2F NAS LowSlot6 cannot locate a AAA server for Vi6 user User1 Mar 29 13:51:31 [192.168.5.1.15.21] 60:00:15:39:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access6, changed state to down
Related Commands
Description Displays all event messages for control modules. Displays packet contents handled by control modules.
DB-2326
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 6400 node route processor. This command was integrated into Cisco IOS Release 12.2(4)B. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command displays event messages for the control modules, which include all modules that manage the user authentication and service login and logout (RADIUS, PPP, Subblock, and Accounting). An event message is an informational message generated during normal execution.
Examples
The following output is generated by the debug ssg ctrl-events command when a host logs in to a service:
Router# debug ssg ctrl-events Mar 16 16:20:30 [192.168.6.1.7.141] 799:02:26:51:SSG-CTL-EVN:Service logon is accepted. Mar 16 16:20:30 [192.168.6.1.7.141] 800:02:26:51:SSG-CTL-EVN:Send cmd 11 to host 172.16.6.13. dst=192.168.100.24:36613
Related Commands
Description Displays packet contents handled by control modules. Displays all error messages for control modules.
DB-2327
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 6400 node route processor. This command was integrated into Cisco IOS Release 12.2(4)B. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to show packet messages for the control modules. These modules include all those that manage the user authentication and service login and logout (RADIUS, PPP, Subblock, and Accounting). A packet message displays the contents of a package.
Examples
The following output is generated by using the debug ssg ctrl-packets command when a host logs out of a service:
Router# debug ssg ctrl-packets Mar Mar Mar Mar 16 16 16 16 16:23:38 16:23:38 16:23:39 16:23:39 [192.168.6.1.7.141] [192.168.6.1.7.141] [192.168.6.1.7.141] [192.168.6.1.7.141] 968:02:30:00:SSG-CTL-PAK:Received Packet: 980:02:30:00:SSG-CTL-PAK:Sent packet: 991:02:30:00:SSG-CTL-PAK: 992:Received Packet:
DB-2328
December 2010
Related Commands
Description Displays all event messages for control modules. Enables NRP-SSG to forward packets locally.
DB-2329
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 6400 node route processor. This command was integrated into Cisco IOS Release 12.2(4)B. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ssg data command shows packets for the data modules. These modules include all those that forward data packets (Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), tunneling, fast switching, IP stream, and multicast).
Examples
The following output is generated by using the debug ssg data command when a host logs in to and out of a service:
Router# debug ssg data Mar 29 13:45:16 [192.168.5.1.15.21] 45:00:09:24: SSG-DATA:PS-UP-SetPakOutput=1(Vi6:172.16.5.50->199.199.199.199) Mar 29 13:45:16 [192.168.5.1.15.21] 46:00:09:24: SSG-DATA:PS-DN-SetPakOutput=1(Fa0/0/0:171.69.2.132->172.16.5.50) Mar 29 13:45:16 [192.168.5.1.15.21] 47:00:09:24: SSG-DATA:FS-UP-SetPakOutput=1(Vi6:172.16.5.50->171.69.43.34) Mar 29 13:45:16 [192.168.5.1.15.21] 48:00:09:24:
DB-2330
December 2010
Related Commands
DB-2331
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 6400 node route processor. This command was integrated into Cisco IOS Release 12.2(4)B. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ssg data-nat command displays packets for the data modules. These modules include all those that forward NAT data packets.
Examples
The following output is generated by using the debug ssg data-nat command when a host logs in to and out of a service:
Router# debug ssg data-nat Mar 29 13:43:14 [192.168.5.1.15.21] 199.199.199.199->171.69.2.132 Mar 29 13:43:14 [192.168.5.1.15.21] 171.69.2.132->199.199.199.199 Mar 29 13:43:30 [192.168.5.1.15.21] 199.199.199.199->171.69.2.132 Mar 29 13:43:30 [192.168.5.1.15.21] 171.69.2.132->199.199.199.199 35:00:07:21:SSG-DATA:TranslateIP Dst 36:00:07:21:SSG-DATA:TranslateIP Src 39:00:07:38:SSG-DATA:TranslateIP Dst 40:00:07:38:SSG-DATA:TranslateIP Src
DB-2332
December 2010
Related Commands
DB-2333
Syntax Description
Enables the display of SSG-DHCP control error information. Enables the display of SSG-DHCP control events information. (Optional) Limits the display of information to the specified IP address.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows user login events when DHCP intercept is enabled using the ssg intercept dhcp command.
debug ssg dhcp 01:01:03: DHCPD: remote id 020a000005010101100000000000 01:01:03: DHCPD: circuit id 00000000 01:01:03: SSG-DHCP-EVN: DHCP-DISCOVER event received. SSG-dhcp awareness feature enabled 01:01:03: DHCPD: DHCPDISCOVER received from client 0063.6973.636f.2d30.3030.632e.3331.6561.2e61.3963.312d.4661.302f.31 on interface FastEthernet1/0. 01:01:03: DHCPD: Seeing if there is an internally specified pool class: 01:01:03: DHCPD: htype 1 chaddr 000c.31ea.a9c1 01:01:03: DHCPD: remote id 020a000005010101100000000000 01:01:03: DHCPD: circuit id 00000000 01:01:03: SSG-DHCP-EVN: Get pool name called for 000c.31ea.a9c1. No hostobject 01:01:03: SSG-DHCP-EVN: Get pool class called, class name = 01:01:03: DHCPD: No internally specified class returned 01:01:03: DHCPD: Sending DHCPOFFER to client 0063.6973.636f.2d30.3030.632e.3331.6561.2e61.3963.312d.4661.302f.31 (5.1.1.2). 01:01:03: DHCPD: child pool: 5.1.1.0 / 255.255.255.0 (Default-pool) 01:01:03: DHCPD: pool Default-pool has no parent.
DB-2334
December 2010
01:01:03: DHCPD: child pool: 5.1.1.0 / 255.255.255.0 (Default-pool) 01:01:03: DHCPD: pool Default-pool has no parent. 01:01:03: DHCPD: child pool: 5.1.1.0 / 255.255.255.0 (Default-pool) 01:01:03: DHCPD: pool Default-pool has no parent. 01:01:03: DHCPD: broadcasting BOOTREPLY to client 000c.31ea.a9c1. 01:01:03: DHCPD: DHCPREQUEST received from client 0063.6973.636f.2d30.3030.632e.3331.6561.2e61.3963.312d.4661.302f.31. 01:01:03: DHCPD: Sending notification of ASSIGNMENT: 01:01:03: DHCPD: address 5.1.1.2 mask 255.255.255.0 01:01:03: DHCPD: htype 1 chaddr 000c.31ea.a9c1 01:01:03: DHCPD: lease time remaining (secs) = 180 01:01:03: SSG-DHCP-EVN:5.1.1.2: IP address notification received. 01:01:03: SSG-DHCP-EVN:5.1.1.2: HostObject not present 01:01:03: DHCPD: No default domain to append - abort update 01:01:03: DHCPD: Sending DHCPACK to client 0063.6973.636f.2d30.3030.632e.3331.6561.2e61.3963.312d.4661.302f.31 (5.1.1.2). 01:01:03: DHCPD: child pool: 5.1.1.0 / 255.255.255.0 (Default-pool) 01:01:03: DHCPD: pool Default-pool has no parent. 01:01:03: DHCPD: child pool: 5.1.1.0 / 255.255.255.0 (Default-pool) 01:01:03: DHCPD: pool Default-pool has no parent. 01:01:03: DHCPD: child pool: 5.1.1.0 / 255.255.255.0 (Default-pool) 01:01:03: DHCPD: pool Default-pool has no parent. 01:01:03: DHCPD: broadcasting BOOTREPLY to client 000c.31ea.a9c1.
The following example shows user login errors when a user tries to log into two different services that require IP addresses to be assigned from different pools.
debug ssg dhcp error 01:21:58: SSG-CTL-EVN: Checking maximum service count. 01:21:58: SSG-CTL-EVN: Service logon is accepted. 01:21:58: SSG-CTL-EVN: Activating the ConnectionObject. 01:21:58: SSG-DHCP-ERR:6.2.1.2: DHCP pool name of this service is different from, already logged in service DHCP pool name 01:21:58: SSG-CTL-EVN: Connection Activation Failed for host 6.2.1.2 01:21:58: SSG-CTL-EVN: Send cmd 11 to host S6.2.1.2. dst=10.76.86.90:42412 01:21:58: SSG-CTL-PAK: Sent packet: 01:21:58: RADIUS: id= 0, code= Access-Reject, len= 79 users
Related Commands
DB-2335
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 6400 node route processor. This command was integrated into Cisco IOS Release 12.2(4)B. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ssg errors command displays error messages for the system modules, which include the basic Cisco IOS and other support modules (such as Object Model, Timeout, and Initialization). An error message is the result of an error detected during normal execution.
Examples
The following output is generated by using the debug ssg errors command when a PPP over Ethernet (PPPoE) client logs in with an incorrect password:
Router# debug ssg errors Mar 16 08:46:20 [192.168.6.1.7.141] 225:00:16:06:SSG:SSGDoAccounting: reg_invoke_do_acct returns FALSE
Related Commands
Description Displays event messages for system modules. Displays packet contents handled by system modules.
DB-2336
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 6400 node route processor. This command was integrated into Cisco IOS Release 12.2(4)B. This command was integrated into Cisco IOS Release 12.2(8)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ssg events command displays event messages for the system modules, which include the basic Cisco IOS modules and other support modules (such as Object Model, Timeout, and Initialization). An event message is an informational message that appears during normal execution.
Examples
The following output is generated by using the debug ssg events command when a PPP over Ethernet (PPPoE) client logs in with the username username and the password cisco:
Router# debug ssg events Mar 16 08:39:39 [192.168.6.1.7.141] 167:00:09:24:%LINK-3-UPDOWN: Interface Virtual-Access3, changed state to up Mar 16 08:39:39 [192.168.6.1.7.141] 168:00:09:25:%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to up Mar 16 08:39:40 [192.168.6.1.7.141] 169:00:09:26:%VPDN-6-AUTHORERR:L2F NAS LowSlot7 cannot locate a AAA server for Vi3 user username Mar 16 08:39:40 [192.168.6.1.7.141] 170:HostObject::HostObject:size = 256 Mar 16 08:39:40 [192.168.6.1.7.141] 171:HostObject::Reset Mar 16 08:39:40 [192.168.6.1.7.141] 172:Service List: Mar 16 08:39:40 [192.168.6.1.7.141] 175:Service = isp-1
DB-2337
Related Commands
Description Displays all error messages for the system modules. Displays packet contents handled by system modules.
DB-2338
December 2010
Effective with Release 12.2(13)T, the debug ssg packets command is replaced by the debug ssg tcp-redirect command. See the debug ssg tcp-redirect command for more information. To display packet contents handled by system modules, use the debug ssg packets command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ssg packets no debug ssg packets
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 6400 node route processor. This command was integrated into Cisco IOS Release 12.2(4)B. This command was integrated into Cisco IOS Release 12.2(8)T. This command was replaced by the debug ssg tcp-redirect command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug ssg packets command displays packet messages for the system modules, which include the basic Cisco IOS and other support modules (such as Object Model, Timeout, Initialization). A packet message displays the contents of a package.
Examples
The following output is generated by using the debug ssg packets command when a user is running a Telnet session to 192.168.250.12 and pinging 192.168.250.11:
Router# debug ssg packets 19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi2:172.16.17.71->192.168.250.12) 19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi2:172.16.17.71->192.168.250.12) 19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi3:172.16.17.72->192.168.250.12) 19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi2:172.16.17.71->192.168.250.12) 19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi2:172.16.17.71->192.168.250.12)
DB-2339
19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi2:172.16.17.71->192.168.250.12) 19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi3:172.16.17.72->192.168.250.11)
Related Commands
Description Displays all error messages for the system modules. Displays event messages for system modules.
DB-2340
December 2010
Syntax Description
events packets
Displays messages for port-map events: create and remove. Displays port-map packet contents and port address translations.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 6400 series. This command was integrated into Cisco IOS Release 12.2(2)XB. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command displays debugging messages for the creation of port maps.
Examples
Using the debug ssg port-map command generates the following output when a subscriber logs in to a service:
Router# debug ssg port-map events SSG port-map events debugging is on Router# show debug SSG: SSG port-map events debugging is on Router# 00:46:09:SSG-PMAP:Changing state of port-bundle 70.13.60.3:65 from FREE to RESERVED 00:46:09:SSG-PMAP:Changing state of port-bundle 70.13.60.3:65 from RESERVED to INUSE 00:46:10:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access2, changed state to up Router# 00:46:25:SSG-PMAP:Allocating new port-mapping:[4148<->1040] for port-bundle 70.13.60.3:65
DB-2341
Router# debug ssg port-map packets SSG port-map packets debugging is on Router# 00:51:55:SSG-PMAP:forwarding non-TCP packet 00:51:55:SSG-PMAP:forwarding packet 00:51:55:SSG-PMAP:forwarding non-TCP packet 00:51:55:SSG-PMAP:forwarding packet 00:51:55:SSG-PMAP:forwarding non-TCP packet 00:52:06:SSG-PMAP:srcip:70.13.6.100 srcport:8080 dstip:70.13.60.3 dstport:1044 00:52:06:SSG-PMAP:TCP flags:5011 Seq no:1162897784 Ack no:-1232234715 00:52:06:SSG-PMAP:received TCP-FIN packet 00:52:10:SSG-PMAP:cef:packet bound for default n/w 00:52:10:SSG-PMAP:Checking port-map ACLs 00:52:10:SSG-PMAP:Port-map ACL check passed 00:52:10:SSG-PMAP:cef:punting TCP-SYN packet to process 00:52:10:SSG-PMAP:packet bound for default n/w 00:52:10:SSG-PMAP:fast:punting TCP-SYN packet to process 00:52:10:SSG-PMAP:packet bound for default n/w 00:52:10:SSG-PMAP:translating source address from 10.3.6.1 to 70.13.60.3 00:52:10:SSG-PMAP:translating source port from 4158 to 1040 00:52:10:SSG-PMAP:srcip:70.13.6.100 srcport:8080 dstip:70.13.60.3 dstport:1040 00:52:10:SSG-PMAP:TCP flags:6012 Seq no:1186352744 Ack no:-1232047701 00:52:10:SSG-PMAP:translating destination address from 70.13.60.3 to 10.3.6.1 00:52:10:SSG-PMAP:translating destination port from 1040 to 4158
Related Commands
Description Displays information on a particular port bundle. Displays information on port bundles.
DB-2342
December 2010
Syntax Description
Displays redirection information and any changes made to a packet when it is due for redirection. Displays any SSG TCP redirect errors. Displays any major SSG TCP redirect events or state changes.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated in Cisco IOS Release 12.2(2)XB. This command was integrated into Cisco IOS Release 12.2(13)T. This command replaces the debug ssg packets command. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to turn on debug information for the SSG TCP Redirect for Services feature. Use the packet keyword to display redirection information and any changes made to a packet when it is due for redirection. Use the error keyword to display any SSG TCP redirect errors. Use the event keyword to display any major SSG TCP redirect events or state changes.
Examples
The following example shows how to display redirection information and any changes made to a packet when it is due for redirection:
Router# debug ssg tcp-redirect packet
Direction of the packet -Up indicates upstream packets from an SSG user, while -Down indicates downstream packets sent to a user:
07:13:15:SSG-REDIR-PKT:-Up:unauthorised user at 111.0.0.2 redirected to 9.2.36.253,8080
DB-2343
07:13:15:SSG-REDIR-PKT:-Down:TCP-RST Rxd for user at 111.0.0.2, port 11114 07:13:15:SSG-REDIR-PKT:-Down:return remap for user at 111.0.0.2 redirected from 9.2.36.25
The following example shows how to display any SSG TCP redirect errors:
Router# debug ssg tcp-redirect error 07:15:20:SSG-REDIR-ERR:-Up:Packet from 172.0.0.2:11114 has different destination from stored connection
The following example shows how to display any major SSG TCP redirect events or state changes:
Router# debug ssg tcp-redirect event
Related Commands
Description Displays information about the captive portal groups and the networks associated with the captive portal groups. Displays information about the TCP redirect mappings for hosts within your system.
DB-2344
December 2010
Description Enables SSG. Enables SSG TCP redirect and enters SSG-redirect mode.
DB-2345
Syntax Description
Displays any SSG transparent login errors. Displays significant SSG transparent login events or state changes. (Optional) Displays events or errors for a specified IP address.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(3)B. This command was integrated into Cisco IOS Release 12.3(7)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command when troubleshooting SSG for problems related to transparent autologon users.
Examples
The following examples show sample output from the debug ssg transparent login command. The output is self-explanatory.
Unidentified (NR) User Example
*Jan 15 12:34:47.847:SSG-TAL-EVN:100.0.0.2 *Jan 15 12:34:47.847:SSG-TAL-EVN:100.0.0.2 *Jan 15 12:34:47.847:SSG-TAL-EVN:100.0.0.2 *Jan 15 12:35:09.711:SSG-TAL-EVN:100.0.0.2 *Jan 15 12:35:09.711:SSG-TAL-EVN:100.0.0.2 unidentified *Jan 15 12:35:09.711:%SSG-5-SSG_TAL_NR:SSG might be down or overloaded. *Jan 15 12:35:09.711:SSG-TAL-EVN:100.0.0.2 :Added entry successfully :Attempting authorization :Attempting to send authorization request :Authorization response received :Authorization timedout. User statechanged to TAL :No response from AAA server. AAA server :Start SP/NR entry timeout timer for 10 mins
DB-2346
December 2010
15 15 15 15 15
:Parsing profile for TP attribute :TP attribute found - Transparent user :Stop SP/NR timer :Idle timer started for 0 secs :Session timer started for 0 secs
The following is sample output for the debug ssg transparent login command when used after all transparent autologon users have been cleared by using the clear ssg user transparent all command.
*Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan 15 15 15 15 15 15 15 15 15 15 15 15 12:47:08.943:SSG-TAL-EVN:10.10.10.10 :Entry removed 12:47:08.943:SSG-TAL-EVN:10.10.10.10 :Stop SP/NR timer 12:47:08.943:SSG-TAL-EVN:10.10.10.10 :Stop Idle timer 12:47:08.943:SSG-TAL-EVN:10.10.10.10 :Stop session timer 12:47:08.943:SSG-TAL-EVN:10.11.11.11 :Entry removed 12:47:08.943:SSG-TAL-EVN:10.11.11.11 :Stop SP/NR timer 12:47:08.943:SSG-TAL-EVN:10.11.11.11 :Stop Idle timer 12:47:08.943:SSG-TAL-EVN:10.11.11.11 :Stop session timer 12:47:08.943:SSG-TAL-EVN:10.0.0.2 :Entry removed 12:47:08.943:SSG-TAL-EVN:10.0.0.2 :Stop SP/NR timer 12:47:08.943:SSG-TAL-EVN:10.0.0.2 :Stop Idle timer 12:47:08.943:SSG-TAL-EVN:10.0.0.2 :Stop session timer
Related Commands
DB-2347
debug ssl
To display information about Secure Socket Layer (SSL) and Transport Layer Security (TLS) applications, use the debug ssl command in privileged EXEC mode. To turn off debugging, use the no form of this command. debug ssl {error | event | hdshake | traffic | openssl {errors | msg | states}} no debug ssl {error | event | hdshake | traffic | openssl {errors | msg | states}}
Syntax Description
Displays any errors during control (negotiation) and data phases. Displays SSL negotiation events. Displays SSL HandShake protocol information. Displays SSL traffic messages. Displays TLS/SSL debugging of the OpenSSL toolkit. Displays protocol errors, such as a bad packet or authentication failure. Displays hex dumps of the protocol packets. Displays protocol state transitions.
Command Default
Command Modes
Command History
Modification This command was introduced. The openssl keyword was added. The error, event, hdshake, and traffic keywords were removed.
Usage Guidelines
To display information about SSL and TLS applications, you should first try the debug ssl openssl errors command because it will display any obvious failures that are reported by the protocol layer. Next, try the debug ssl openssl states command to display problems that are caused by system flow issues that do not produce an error message. If you need more information, you should try the debug ssl openssl msg command. This output will be verbose and is rarely useful, but in some circumstances, it can provide a binary dump of the protocol packets. If the problem requires debugging at the level of the packet dumps, it is usually better to use a protocol analyzer (for example, Wireshark).
Note
The options available for the debug ssl command depend on the version of Cisco IOS software release. See the Command History table for the supported Cisco IOS software releases.
DB-2348
December 2010
Note
It is suggested that when setting debugging, you first enable the debug ssl openssl errors command, debug ssl openssl states command, and a subset of one of the debug crypto pki commands. If you still do not see the problem, you might use a protocol analyzer. The debug ssl openssl msg command should probably be used only if you cannot get a packet trace off the wire or if you suspect that the problem is between the wire and the protocol stack.
Examples
The following example shows that the debug ssl openssl errors command has been configured:
Router# debug ssl openssl errors
Related Commands
Command debug crypto pki messages debug crypto pki server debug crypto pki transactions
Description Displays debugging messages for the details of the interaction (message dump) between the CA and the router. Enables debugging for a crypto PKI certificate server. Displays debugging messages for the trace of interaction (message type) between the CA and the router.
DB-2349
Syntax Description
Displays protocol errors, such as a bad packet or authentication failure. Displays hex dumps of the protocol packets. Displays protocol state transitions.
Command Default
Command Modes
Command History
Release 12.4(22)T
Usage Guidelines
To display information about SSL and TLS applications, you must use he debug ssl openssl errors command, because it will display any obvious failures that are reported by the protocol layer. Next, you must use the debug ssl openssl states command to display problems that are caused by system flow issues that do not produce an error message. If you need more information, you must use the debug ssl openssl msg command. This output will be verbose and is rarely useful, but in some circumstances, it can provide a binary dump of the protocol packets. If the problem requires debugging at the level of the packet dumps, it is usually recommended to use a protocol analyzer (for example, Wireshark).
Examples
The following example shows how to enable the debug ssl openssl errors command :
Router# debug ssl openssl errors TLS errors debugging is on
Related Commands
Command debug crypto pki messages debug crypto pki server debug crypto pki transactions
Description Displays debugging messages for the details of the interaction (message dump) between the CA and the router. Enables debugging for a crypto PKI certificate server. Displays debugging messages for the trace of interaction (message type) between the CA and the router.
DB-2350
December 2010
debug ssm
To display diagnostic information about the Segment Switching Manager (SSM) for switched Layer 2 segments, use the debug ssm command in privileged EXEC mode. To disable debugging, use the no form of this command. debug ssm {cm errors | cm events | fhm errors | fhm events | sm errors | sm events | sm counters | xdr} no debug ssm {cm errors | cm events | fhm errors | fhm events | sm errors | sm events | sm counters | xdr}
Syntax Description
cm errors cm events fhm errors fhm events sm errors sm events sm counters xdr
Displays Connection Manager (CM) errors. Displays CM events. Displays Feature Handler Manager (FHM) errors. Displays FHM events. Displays Segment Handler Manager (SM) errors. Displays SM events. Displays SM counters. Displays external data representation (XDR) messages related to traffic sent across the backplane between Router Processors and line cards.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated to Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.4(11)T. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The SSM manages the data-plane component of the Layer 2 Virtual Private Network (L2VPN) configuration. The CM tracks the connection-level errors and events that occur on an xconnect. The SM tracks the per-segment events and errors on the xconnect. Use the debug ssm command to troubleshoot problems in bringing up the data plane. This command is generally used only by Cisco engineers for internal debugging of SSM processes.
DB-2351
Examples
The following example shows sample output for the debug ssm xdr command:
Router# debug ssm xdr SSM xdr debugging is on 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: 2w5d: SSM XDR: [4096] deallocate segment, len 16 SSM XDR: [8193] deallocate segment, len 16 %LINK-3-UPDOWN: Interface FastEthernet2/1, changed state %LINK-3-UPDOWN: Interface FastEthernet2/1, changed state SSM XDR: [4102] provision segment, switch 4101, len 106 SSM XDR: [4102] update segment status, len 17 SSM XDR: [8199] provision segment, switch 4101, len 206 SSM XDR: [4102] update segment status, len 17 %SYS-5-CONFIG_I: Configured from console by console %LINK-3-UPDOWN: Interface FastEthernet2/1, changed state SSM XDR: [4102] update segment status, len 17 %LINK-3-UPDOWN: Interface FastEthernet2/1, changed state SSM XDR: [4102] deallocate segment, len 16 SSM XDR: [8199] deallocate segment, len 16 SSM XDR: [4104] provision segment, switch 4102, len 106 SSM XDR: [4104] update segment status, len 17 SSM XDR: [8201] provision segment, switch 4102, len 206 SSM XDR: [4104] update segment status, len 17 SSM XDR: [4104] update segment status, len 17 %SYS-5-CONFIG_I: Configured from console by console
to down to up
to down to up
The following example shows the events that occur on the segment manager when an Any Transport over MPLS (AToM) virtual circuit (VC) configured for Ethernet over MPLS is shut down and then enabled:
Router# debug ssm sm events SSM Connection Manager events debugging is on Router(config)# interface fastethernet 0/1/0.1 Router(config-subif)# shutdown 09:13:38.159: 09:13:38.159: 09:13:38.159: 09:13:38.159: 09:13:38.159: 09:13:38.159: 09:13:38.159: 09:13:38.159: SSM SSM SSM SSM SSM SSM SSM SSM SM: SM: SM: SM: SM: SM: SM: SM: [SSS:AToM:36928] event Unprovison segment [SSS:Ethernet Vlan:4146] event Unbind segment [SSS:AToM:36928] free segment class [SSS:AToM:36928] free segment [SSS:AToM:36928] event Free segment last segment class freed [SSS:Ethernet Vlan:4146] segment ready [SSS:Ethernet Vlan:4146] event Found segment data
Router(config-subif)# no shutdown 09:13:45.815: 09:13:45.815: 09:13:45.815: 09:13:45.815: 09:13:45.815: 09:13:45.815: SSM SM: [SSS:AToM:36929] event Provison segment label_oce_get_label_bundle: flags 14 label 16 SSM SM: [SSS:AToM:36929] segment ready SSM SM: [SSS:AToM:36929] event Found segment data SSM SM: [SSS:AToM:36929] event Bind segment SSM SM: [SSS:Ethernet Vlan:4146] event Bind segment
The following example shows the events that occur on the CM when an AToM VC configured for Ethernet over MPLS is shut down and then enabled:
Router(config)# interface fastethernet 0/1/0.1 Router(config-subif)# shutdown 09:17:20.179: SSM CM: [AToM] unprovision segment, id 36929 09:17:20.179: SSM CM: CM FSM: state Open - event Free segment 09:17:20.179: SSM CM: [SSS:AToM:36929] unprovision segment 1
DB-2352
December 2010
[SSS:AToM] shQ request send unprovision complete event [SSS:Ethernet Vlan:4146] unbind segment 2 [SSS:Ethernet Vlan] shQ request send ready event SM msg event send unprovision complete event SM msg event send ready event
Router(config-subif)# no shutdown 09:17:35.879: 09:17:35.879: 09:17:35.879: 09:17:35.879: 09:17:35.879: 09:17:35.879: 09:17:35.883: 09:17:35.883: SSM SSM SSM SSM SSM SSM SSM SSM CM: CM: CM: CM: CM: CM: CM: CM: Query AToM to Ethernet Vlan switching, enabled [AToM] provision second segment, id 36930 CM FSM: state Down - event Provision segment [SSS:AToM:36930] provision segment 2 [AToM] send client event 6, id 36930 [SSS:AToM] shQ request send ready event SM msg event send ready event [AToM] send client event 3, id 36930
The following example shows the events that occur on the CM and SM when an AToM VC is provisioned and then unprovisioned:
Router# debug ssm cm events SSM Connection Manager events debugging is on Router# debug ssm sm events SSM Segment Manager events debugging is on Router# configure terminal Router(config)# interface ethernet1/0 Router(config-if)# xconnect 10.55.55.2 101 pw-class mpls 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: 16:57:34: SSM CM: provision switch event, switch id 86040 SSM CM: [Ethernet] provision first segment, id 12313 SSM CM: CM FSM: state Idle - event Provision segment SSM CM: [SSS:Ethernet:12313] provision segment 1 SSM SM: [SSS:Ethernet:12313] event Provison segment SSM CM: [SSS:Ethernet] shQ request send ready event SSM CM: SM msg event send ready event SSM SM: [SSS:Ethernet:12313] segment ready SSM SM: [SSS:Ethernet:12313] event Found segment data SSM CM: Query AToM to Ethernet switching, enabled SSM CM: [AToM] provision second segment, id 16410 SSM CM: CM FSM: state Down - event Provision segment SSM CM: [SSS:AToM:16410] provision segment 2 SSM SM: [SSS:AToM:16410] event Provison segment SSM CM: [AToM] send client event 6, id 16410 label_oce_get_label_bundle: flags 14 label 19 SSM CM: [SSS:AToM] shQ request send ready event SSM CM: SM msg event send ready event SSM SM: [SSS:AToM:16410] segment ready SSM SM: [SSS:AToM:16410] event Found segment data SSM SM: [SSS:AToM:16410] event Bind segment SSM SM: [SSS:Ethernet:12313] event Bind segment SSM CM: [AToM] send client event 3, id 16410
Router# configure terminal Router(config)# interface e1/0 Router(config-if)# no xconnect 16:57:26: 16:57:26: 16:57:26: 16:57:26: SSM SSM SSM SSM CM: CM: CM: SM: [Ethernet] unprovision segment, id 16387 CM FSM: state Open - event Free segment [SSS:Ethernet:16387] unprovision segment 1 [SSS:Ethernet:16387] event Unprovison segment
DB-2353
16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26: 16:57:26:
SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM SSM
CM: CM: SM: CM: SM: SM: SM: SM: CM: CM: CM: SM: CM: CM: CM: SM: CM: CM: SM: SM: SM: SM:
[SSS:Ethernet] shQ request send unprovision complete event [SSS:AToM:86036] unbind segment 2 [SSS:AToM:86036] event Unbind segment SM msg event send unprovision complete event [SSS:Ethernet:16387] free segment class [SSS:Ethernet:16387] free segment [SSS:Ethernet:16387] event Free segment last segment class freed unprovision switch event, switch id 12290 [SSS:AToM] shQ request send unready event SM msg event send unready event [SSS:AToM:86036] event Unbind segment [AToM] unprovision segment, id 86036 CM FSM: state Down - event Free segment [SSS:AToM:86036] unprovision segment 2 [SSS:AToM:86036] event Unprovison segment [SSS:AToM] shQ request send unprovision complete event SM msg event send unprovision complete event [SSS:AToM:86036] free segment class [SSS:AToM:86036] free segment [SSS:AToM:86036] event Free segment last segment class freed
Related Commands
DB-2354
December 2010
Effective with Cisco IOS Release 15.0(1)S, the debug sss aaa authorization event command is replaced by the debug subscriber aaa authorization event command. See the debug subscriber aaa authorization event command for more information. To display messages about authentication, authorization, and accounting (AAA) authorization events that are part of normal call establishment, use the debug sss aaa authorization event command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sss aaa authorization event no debug sss aaa authorization event
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was replaced by the debug subscriber aaa authorization event command.
15.0(1)S
Examples
The following is sample output of several Subscriber Service Switch (SSS) debug commands including the debug sss aaa authorization event command. The reports from these commands should be sent to technical personnel at Cisco Systems for evaluation.
Router# Router# Router# Router# Router# SSS: SSS SSS SSS SSS SSS debug debug debug debug debug sss sss sss sss sss event error state aaa authorization event aaa authorization fsm
events debugging is on error debugging is on fsm debugging is on AAA authorization event debugging is on AAA authorization FSM debugging is on
DB-2355
*Mar 4 21:33:18.248: SSS INFO: Element type is Access-Type, long value is 3 *Mar 4 21:33:18.248: SSS INFO: Element type is Switch-Id, long value is -1509949436 *Mar 4 21:33:18.248: SSS INFO: Element type is Nasport, ptr value is 6396882C *Mar 4 21:33:18.248: SSS INFO: Element type is AAA-Id, long value is 7 *Mar 4 21:33:18.248: SSS INFO: Element type is AAA-ACCT_ENBL, long value is 1 *Mar 4 21:33:18.248: SSS INFO: Element type is AccIe-Hdl, ptr value is 78000006 *Mar 4 21:33:18.248: SSS MGR [uid:7]: Event service-request, state changed from wait-for-req to wait-for-auth *Mar 4 21:33:18.248: SSS MGR [uid:7]: Handling Policy Authorize (1 pending sessions) *Mar 4 21:33:18.248: SSS PM [uid:7]: Need the following key: Unauth-User *Mar 4 21:33:18.248: SSS PM [uid:7]: Received Service Request *Mar 4 21:33:18.248: SSS PM [uid:7]: Event <need keys>, State: initial-req to need-init-keys *Mar 4 21:33:18.248: SSS PM [uid:7]: Policy reply - Need more keys *Mar 4 21:33:18.248: SSS MGR [uid:7]: Got reply Need-More-Keys from PM *Mar 4 21:33:18.248: SSS MGR [uid:7]: Event policy-or-mgr-more-keys, state changed from wait-for-auth to wait-for-req *Mar 4 21:33:18.248: SSS MGR [uid:7]: Handling More-Keys event *Mar 4 21:33:20.256: SSS INFO: Element type is Unauth-User, string value is [email protected] *Mar 4 21:33:20.256: SSS INFO: Element type is AccIe-Hdl, ptr value is 78000006 *Mar 4 21:33:20.256: SSS INFO: Element type is AAA-Id, long value is 7 *Mar 4 21:33:20.256: SSS INFO: Element type is Access-Type, long value is 0 *Mar 4 21:33:20.256: SSS MGR [uid:7]: Event service-request, state changed from wait-for-req to wait-for-auth *Mar 4 21:33:20.256: SSS MGR [uid:7]: Handling Policy Authorize (1 pending sessions) *Mar 4 21:33:20.256: SSS PM [uid:7]: Received More Initial Keys *Mar 4 21:33:20.256: SSS PM [uid:7]: Event <rcvd keys>, State: need-init-keys to check-auth-needed *Mar 4 21:33:20.256: SSS PM [uid:7]: Handling Authorization Check *Mar 4 21:33:20.256: SSS PM [uid:7]: Event <send auth>, State: check-auth-needed to authorizing *Mar 4 21:33:20.256: SSS PM [uid:7]: Handling AAA service Authorization *Mar 4 21:33:20.256: SSS PM [uid:7]: Sending authorization request for 'example.com' *Mar 4 21:33:20.256: SSS AAA AUTHOR [uid:7]:Event <make request>, state changed from idle to authorizing *Mar 4 21:33:20.256: SSS AAA AUTHOR [uid:7]:Authorizing key xyz.com *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:AAA request sent for key example.com *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:Received an AAA pass *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:Event <found service>, state changed from authorizing to complete *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:Found service info for key example.com *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:Event <free request>, state changed from complete to terminal *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:Free request *Mar 4 21:33:20.264: SSS PM [uid:7]: Event <found>, State: authorizing to end *Mar 4 21:33:20.264: SSS PM [uid:7]: Handling Service Direction *Mar 4 21:33:20.264: SSS PM [uid:7]: Policy reply - Forwarding *Mar 4 21:33:20.264: SSS MGR [uid:7]: Got reply Forwarding from PM *Mar 4 21:33:20.264: SSS MGR [uid:7]: Event policy-start-service-fsp, state changed from wait-for-auth to wait-for-service *Mar 4 21:33:20.264: SSS MGR [uid:7]: Handling Connect-Forwarding-Service event *Mar 4 21:33:20.272: SSS MGR [uid:7]: Event service-fsp-connected, state changed from wait-for-service to connected *Mar 4 21:33:20.272: SSS MGR [uid:7]: Handling Forwarding-Service-Connected event
DB-2356
December 2010
Related Commands
Command debug sss aaa authorization fsm debug sss error debug sss event debug sss fsm
Description Displays information about AAA authorization state changes. Displays diagnostic information about errors that may occur during Subscriber Service Switch call setup. Displays diagnostic information about Subscriber Service Switch call setup events. Displays diagnostic information about the Subscriber Service Switch call setup state.
DB-2357
Effective with Cisco IOS Release 15.0(1)S, the debug sss aaa authorization fsm command is replaced by the debug subscriber aaa authorization fsm command. See the debug subscriber aaa authorization fsm command for more information. To display information about authentication, authorization, and accounting (AAA) authorization state changes, use the debug sss aaa authorization fsm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sss aaa authorization fsm no debug sss aaa authorization fsm
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was replaced by the debug subscriber aaa authorization fsm command.
15.0(1)S
Examples
The following example shows how to enter this command. See the Examples section of the debug sss aaa authorization event command page for an example of output.
Router# debug sss aaa authorization fsm
Related Commands
Description Displays messages about AAA authorization events that are part of normal call establishment. Displays diagnostic information about errors that may occur during Subscriber Service Switch call setup.
DB-2358
December 2010
Description Displays diagnostic information about Subscriber Service Switch call setup events. Displays diagnostic information about the Subscriber Service Switch call setup state.
DB-2359
Effective with Cisco IOS Release 15.0(1)S, the debug sss error command is replaced by the debug subscriber error command. See the debug subscriber error command for more information. To display diagnostic information about errors that may occur during Subscriber Service Switch (SSS) call setup, use the debug sss error command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sss error no debug sss error
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was replaced by the debug subscriber error command.
15.0(1)S
Examples
The following example shows how to enter this command. See the Examples section of the debug ssg transparent login command page for an example of output.
Router# debug sss error
Related Commands
Command debug sss aaa authorization event debug sss aaa authorization fsm
Description Displays messages about AAA authorization events that are part of normal call establishment. Displays information about AAA authorization state changes.
DB-2360
December 2010
Description Displays diagnostic information about Subscriber Service Switch call setup events. Displays diagnostic information about the Subscriber Service Switch call setup state.
DB-2361
Effective with Cisco IOS Release 15.0(1)S, the debug sss event command is replaced by the debug subscriber event command. See the debug subscriber event command for more information. To display diagnostic information about Subscriber Service Switch (SSS) call setup events, use the debug sss event command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sss event no debug sss event
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was replaced by the debug subscriber event command.
15.0(1)S
Examples
The following example shows how to enter this command. See the Examples section of the debug sss aaa authorization event command page for an example of output.
Router# debug sss event
Related Commands
Command debug sss aaa authorization event debug sss aaa authorization fsm
Description Displays messages about AAA authorization events that are part of normal call establishment. Displays information about AAA authorization state changes.
DB-2362
December 2010
Description Displays diagnostic information about errors that may occur during Subscriber Service Switch call setup. Displays diagnostic information about the Subscriber Service Switch call setup state.
DB-2363
Effective with Cisco IOS Release 15.0(1)S, the debug sss fsm command is replaced by the debug subscriber fsm command. See the debug subscriber fsm command for more information. To display diagnostic information about the Subscriber Service Switch (SSS) call setup state, use the debug sss fsm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sss fsm no debug sss fsm
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was replaced by the debug subscriber fsm command.
15.0(1)S
Examples
The following example shows how to enter this command. See the Examples section of the debug sss aaa authorization event command page for an example of output.
Router# debug sss fsm
Related Commands
Command debug sss aaa authorization event debug sss aaa authorization fsm
Description Displays messages about AAA authorization events that are part of normal call establishment. Displays information about AAA authorization state changes.
DB-2364
December 2010
Description Displays diagnostic information about errors that may occur during Subscriber Service Switch call setup. Displays diagnostic information about the Subscriber Service Switch call setup events.
DB-2365
debug standby
To display Hot Standby Router Protocol (HSRP) state changes, use the debug standby command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug standby [terse] no debug standby [terse]
Syntax Description
terse
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug standby command displays Hot Standby Protocol state changes and debugging information regarding transmission and receipt of Hot Standby Protocol packets. Use this command to determine whether hot standby routers recognize one another and take the proper actions.
Examples
DB-2366
December 2010
out 192.168.72.20 Active pri 100 hel 3 hol in 192.168.72.21 Speak pri 90 hel 3 hol 10 out 192.168.72.20 Active pri 100 hel 3 hol in 192.168.72.21 Speak pri 90 hel 3 hol 10 out 192.168.72.20 Active pri 100 hel 3 hol
10 ip 10 ip 10
Field SB Ethernet0 Hello in Hello out pri hel hol ip address state Coup out address
Description Abbreviation for standby. Interface on which a Hot Standby packet was sent or received. Hello packet received from the specified IP address. Hello packet sent from the specified IP address. Priority advertised in the hello packet. Hello interval advertised in the hello packet. Hold-down interval advertised in the hello packet. Hot Standby group IP address advertised in the hello packet. Transition from one state to another. Coup packet sent by the router from the specified IP address.
The following line indicates that the router is initiating the Hot Standby Protocol. The standby ip interface configuration command enables Hot Standby.
SB: Starting up hot standby process
The following line indicates that a state transition occurred on the interface:
SB: Ethernet0 state Listen -> Speak
Related Commands
Command debug condition standby debug standby errors debug standby events debug standby events icmp debug standby packets
Description Filters the output of the debug standby command on the basis of HSRP group number. Displays error messages related to HSRP. Displays events related to HSRP. Displays debugging messages for the HSRP ICMP redirects filter. Displays debugging information for packets related to HSRP.
DB-2367
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You can filter the debug output using interface and HSRP group conditional debugging. To enable interface conditional debugging, use the debug condition interface command. To enable HSRP conditional debugging, use the debug condition standby command.
Examples
Related Commands
Command debug condition standby debug standby debug standby events debug standby events icmp debug standby packets
Description Filters the output of the debug standby command on the basis of HSRP group number. Displays HSRP state changes. Displays events related to HSRP. Displays debugging messages for the HSRP ICMP redirects filter. Displays debugging information for packets related to HSRP.
DB-2368
December 2010
Syntax Description
all api arp ha internal data init state timer protocol redundancy terse track detail
(Optional) Displays all HSRP events. (Optional) Displays HSRP application programming interface (API) events. (Optional) Displays HSRP Address Resolution Protocol (ARP) events. (Optional) Displays High availability (HA) events. (Optional) Displays Internal HSRP events. (Optional) Displays HSRP data events. (Optional) Displays HSRP startup and shutdown events. (Optional) Displays HSRP state events. (Optional) Displays HSRP timer events. (Optional) Displays HSRP protocol events. (Optional) Displays HSRP redundancy events. (Optional) Displays all HSRP packets, except hellos and advertisements. (Optional) Displays HSRP tracking events. (Optional) Displays detailed debugging information.
Command Modes
Command History
Release 12.1 12.2(8)T 12.4(4)T 12.2(25)S 12.2(28)SB 12.2(33)SRA 12.2(33)SXH 12.2(33)SXI 12.4(24)T 12.2(33)SXI1 Cisco IOS XE Release 2.1
Modification This command was introduced. The api keyword was added. The ha keyword was added. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(33)SXH. The arp keyword was added. This command was modified. The init keyword was added. This command was modified. The init keyword was added. This command was integrated into Cisco IOS XE Release 2.1.
DB-2369
Usage Guidelines
You can filter the debug output using interface and HSRP group conditional debugging. To enable interface conditional debugging, use the debug condition interface command. To enable HSRP conditional debugging, use the debug condition standby command.
Examples
The following example shows how to enable the debugging of the active and standby Route Processors (RPs) on an active RP console. The HSRP group is configured on the active RP, and the HSRP state is active.
Router# debug standby events ha
Grp 101 send ok Grp 101 send ok Grp 101 Grp 101 send ok send ok
RF Encode state Listen into sync buffer RF Encode state Speak into sync buffer RF Encode state Standby into sync buffer RF Encode state Active into sync buffer
!Standby RP *Apr 27 04:11:21.011: *Apr 27 04:11:21.011: *Apr 27 04:11:31.011: *Apr 27 04:11:31.011: *Apr 27 04:11:41.071: *Apr 27 04:11:41.071: *Apr 27 04:11:41.071: *Apr 27 04:11:41.071:
RF CF client 32, entity Gi0/0/1 Grp 101 RF sync RF CF client 32, entity Gi0/0/1 Grp 101 RF sync RF CF client 32, entity RF CF client 32, entity Gi0/0/1 Grp 101 RF sync Gi0/0/1 Grp 101 RF sync
msg len 24 Init -> Listen msg len 24 Listen -> Speak msg len 24 msg len 24 Speak -> Standby Standby -> Active
Field RF CF
Description Redundancy facilityInternal mechanism that makes Stateful Switchover (SSO) work. Checkpoint facilityInternal mechanism that makes SSO work.
The following sample shows HSRP debug information when HSRP is configured to send gratuitous ARP packets every four seconds:
Router# debug standby event arp detail HSRP Events debugging is on (arp) *Jun 27 14:15:51.795: HSRP: Et0/0 Grp 1 Send grat ARP 10.0.0.1 mac 0000.0c07.ac01 (use vMAC) *Jun 27 14:15:55.755: HSRP: Et0/0 Grp 1 Send grat ARP 10.0.0.1 mac 0000.0c07.ac01 (use vMAC) *Jun 27 14:15:59.407: HSRP: Et0/0 Grp 1 Send grat ARP 10.0.0.1 mac 0000.0c07.ac01 (use vMAC)
DB-2370
December 2010
Note
Debug messages for gratuitous ARP packets are seen only if the detail keyword is entered. Table 331 describes the significant fields shown in the display.
Table 331 debug standby events detail Field Descriptions
Description IP address to which HSRP sends gratuitous ARP packets. MAC address of the host router to which HSRP sends gratuitous ARP packets.
The following examples show the output of the debug standby event internal init command when the IP address of an interface is changed and HSRP makes an internal evaluation to see if the added address permits the currently configured standby address to remain valid.
Router# debug standby events internal init HSRP: Ethernet0/0 vIP intf primary subnet 172.24.1.0 added . . . HSRP: Ethernet0/0 vIP 172.24.1.254 matches intf primary subnet 172.24.1.0 Router# debug standby events internal init HSRP: Ethernet0/0 vIP intf secondary subnet 172.24.1.0 added . . . HSRP: Ethernet0/0 vIP 172.24.1.254 matches intf secondary subnet 172.24.1.0
Router# debug standby events internal init HSRP: Ethernet0/0 vIP intf secondary subnet 172.24.1.0 deleted . . . HSRP: Ethernet0/0 vIP 172.24.1.254 matches no intf subnets
Related Commands
Command debug condition interface debug condition standby debug standby debug standby errors debug standby events icmp debug standby packets
Description Limits output for some debug commands on the basis of the interface, VC, or VLAN. Filters the output of the debug standby command on the basis of HSRP group number. Displays HSRP state changes. Displays error messages related to HSRP. Displays debugging messages for the HSRP ICMP redirects filter. Displays debugging information for packets related to HSRP.
DB-2371
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS XE Release 2.1.
Usage Guidelines
This command helps you determine whether HSRP is filtering an outgoing ICMP redirect message.
Examples
The following is sample output from the debug standby events icmp command:
Router# debug standby events icmp 10:35:20: SB: changing ICMP redirect sent to 20.0.0.4 for dest 30.0.0.2 10:35:20: SB: gw 20.0.0.2 -> 20.0.0.12, src 20.0.0.11 10:35:20: SB: Use HSRP virtual address 20.0.0.11 as ICMP src
If the router being redirected to is passive (HSRP enabled but no active groups), the following debugging message is displayed:
10:41:22: SB: ICMP redirect not sent to 20.0.0.4 for dest 40.0.0.3 10:41:22: SB: 20.0.0.3 does not contain an active HSRP group
If HSRP could not uniquely determine the gateway used by the host, then the following message is displayed:
10:43:08: SB: ICMP redirect not sent to 20.0.0.4 for dest 30.0.0.2 10:43:08: SB: could not uniquely determine IP address for mac 00d0.bbd3.bc22
The following messages are also displayed if the debug ip icmp command is enabled, in which case the message prefix is changed:
10:39:09: 10:39:09: 10:39:09: 10:39:09: ICMP: HSRP changing redirect sent to 20.0.0.4 for dest 30.0.0.2 ICMP: gw 20.0.0.2 -> 20.0.0.12, src 20.0.0.11 ICMP: Use HSRP virtual address 20.0.0.11 as ICMP src ICMP: redirect sent to 20.0.0.4 for dest 30.0.0.2, use gw 20.0.0.12
DB-2372
December 2010
Related Commands
DB-2373
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You can filter the debug output using interface and HSRP group conditional debugging. To enable interface conditional debugging, use the debug condition interface command. To enable HSRP conditional debugging, use the debug condition standby command.
Examples
In this example, two HSRP routers are configured as neighbors, supporting BFD peering with the debug standby events neighbor command configured. The following example shows the debug output that appears when an additional HSRP group is added to Router A:
Router A
RouterA# debug standby event neighbor HSRP Events debugging is on (neighbor) *Oct 3 02:57:48.587: HSRP: Fa2/0 Grp 2 Standby router is local 01:03:49: %HSRP-5-STATECHANGE: FastEthernet2/0 Grp 2 state Speak -> Standby *Oct 3 02:57:49.087: HSRP: Fa2/0 Grp 2 Active router is local *Oct 3 02:57:49.087: HSRP: Fa2/0 Grp 2 Standby router is unknown, was local 01:03:50: %HSRP-5-STATECHANGE: FastEthernet2/0 Grp 2 state Standby -> Active
Router B
RouterB# debug standby event neighbor
DB-2374
December 2010
HSRP Events debugging is on (neighbor) *Oct 3 10:00:28.503: HSRP: Fa2/0 Grp 2 Active router is 10.0.0.1 (no local config) *Oct 3 10:00:28.503: HSRP: Fa2/0 Nbr 10.0.0.1 active for group 2
The following example shows the debug output when an additional HSRP group is added to Router B:
Router B
*Oct 3 10:02:28.067: HSRP: Fa2/0 Nbr 10.0.0.1 no longer active for group 2 (Disabled) *Oct 3 10:02:28.503: HSRP: Fa2/0 Grp 2 Active router is 10.0.0.1 *Oct 3 10:02:28.503: HSRP: Fa2/0 Nbr 10.0.0.1 active for group 2 *Oct 3 10:02:48.071: HSRP: Fa2/0 Grp 2 Standby router is local 00:44:28: %HSRP-5-STATECHANGE: FastEthernet2/0 Grp 2 state Speak -> Standby
Router A
*Oct *Oct 3 03:00:08.655: HSRP: Fa2/0 Grp 2 Standby router is 10.0.0.2 3 03:00:08.655: HSRP: Fa2/0 Nbr 10.0.0.2 standby for group 2
The following is sample debug output showing a possible network outage (the loss of signal between the ports of Router A and B):
Router B
*Oct 3 10:09:07.651: HSRP: Fa2/0 Grp 1 Active router is local, was 10.0.0.1 *Oct 3 10:09:07.651: HSRP: Fa2/0 Nbr 10.0.0.1 no longer active for group 1 (Standby) *Oct 3 10:09:07.651: HSRP: Fa2/0 Grp 1 Standby router is unknown, was local 00:50:48: %HSRP-5-STATECHANGE: FastEthernet2/0 Grp 1 state Standby -> Active *Oct 3 10:09:08.959: HSRP: Fa2/0 Grp 2 Active router is local, was 10.0.0.1 *Oct 3 10:09:08.959: HSRP: Fa2/0 Nbr 10.0.0.1 no longer active for group 2 (Standby) *Oct 3 10:09:08.959: HSRP: Fa2/0 Nbr 10.0.0.1 Was active or standby - start passive holddown *Oct 3 10:09:08.959: HSRP: Fa2/0 Grp 2 Standby router is unknown, was local 00:50:49: %HSRP-5-STATECHANGE: FastEthernet2/0 Grp 2 state Standby -> Active
Related Commands
Command debug bfd debug condition debug condition standby show bfd neighbor show standby show standby neighbors standby bfd all-interfaces standby ip
Description Displays debugging messages about BFD. Limits the output for some debug commands based on specified conditions. Limits the debugging output of HSRP state changes. Displays a line-by-line listing of existing BFD adjacencies. Displays HSRP information. Displays information about HSRP neighbors. Reenables HSRP BFD peering on all interfaces if it has been disabled. Activates HSRP.
DB-2375
Syntax Description
(Optional) Specifies HSRP advertisement packets. (Optional) Specifies all HSRP packets. (Optional) Specifies all HSRP packets, except hellos and advertisements. (Optional) Specifies HSRP coup packets. (Optional) Specifies HSRP hello packets. (Optional) Specifies HSRP resign packets. (Optional) Specifies HSRP packets in detail.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The advertise keyword was added. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You can filter the debug output using interface and HSRP group conditional debugging. To enable interface conditional debugging, use the debug condition interface command. To enable HSRP conditional debugging, use the debug condition standby command.
Note
HSRP advertisement packets are packets that are related to HSRP interfaces. Other packet types, including, hello, coup, and resign packets relate to an HSRP group.
DB-2376
December 2010
Examples
The following example show how to enable the display of all HSRP packets:
Router# debug standby packets all HSRP Packets debugging is on.
Related Commands
Command debug condition interface debug condition standby debug standby debug standby errors debug standby events
Description Limits output for some debugging commands based on the interfaces. Filters the output of the debug standby command on the basis of HSRP group number. Displays HSRP state changes. Displays error messages related to HSRP. Displays events related to HSRP.
debug standby events icmp Displays debugging messages for the HSRP ICMP redirects filter.
DB-2377
Syntax Description
group address
(Optional) A decimal integer assigned to a group. Using this option limits output to packets associated with the specified STUN group. (Optional) The output is further limited to only those packets containing the specified STUN address. The address argument is in the appropriate format for the STUN protocol running for the specified group.
Command Modes
Privileged EXEC
Usage Guidelines
Because using this command is processor intensive, it is best to use it after regular business hours, rather than in a production environment. It is also best to turn this command on by itself, rather than use it in conjunction with other debug commands.
Examples
The following is sample output from the debug stun packet command:
router# debug stun packet
X3 type of packet
STUN STUN STUN STUN STUN STUN STUN STUN STUN STUN STUN STUN STUN STUN STUN STUN STUN STUN STUN STUN
sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc: sdlc:
0:00:04 0:00:04 0:00:01 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00 0:00:00
Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3 Serial3
NDI: NDI: SDI: SDI: SDI: SDI: SDI: SDI: SDI: SDI: SDI: SDI: SDI: SDI: NDI: SDI: SDI: SDI: SDI: SDI:
(0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008) (0C2/008)
U: U: U: S: S: S: S: S: S: S: S: S: S: S: I: I: S: S: S: S:
SNRM SNRM UA RR RR RR RR RR RR RR RR RR RR RR
RR RR RR RR
PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1 PF:1
NR:000 NR:000 NR:000 NR:000 NR:000 NR:000 NR:000 NR:000 NR:000 NR:000 NR:000 NR:000 NR:001 NR:001 NR:001 NR:001 NR:001
NS:000 NS:000
DB-2378
December 2010
S2563
Table 332 describes the significant fields in this line of debug stun packet output.
Table 332 debug stun packet Field Descriptions
Description Indication that the STUN feature is providing the information. Time elapsed since receipt of the previous packet. Interface type and unit number reporting the event. Type of cloud separating the Synchronous Data Link Control (SDL) end nodes. Possible values are as follows:
SDLC address of the SDLC connection. Modulo value of 8. Frame type followed by the command or response type. In this case it is an Unnumbered frame that contains a Set Normal Response Mode (SNRM) command. The possible frame types are as follows:
IInformation frame SSupervisory frame. The possible commands and responses are: RR (Receive Ready), RNR (Receive Not Ready), and REJ (Reject). UUnnumbered frame. The possible commands are: UI (Unnumbered Information), SNRM, DISC/RD (Disconnect/Request Disconnect), SIM/RIM, XID Exchange Identification), TEST. The possible responses are UA (unnumbered acknowledgment), DM (Disconnected Mode), and FRMR (Frame Reject Mode) 0Off 1On
PF:1
All the fields in the previous line of output match those for an X1 type of packet, except the last field, which is additional. NR:000 indicates a receive count of 0; the range for the receive count is 0 to 7. The following line of output describes an X3 type of packet:
STUN sdlc: 0:00:00 Serial3 SDI: (0C2/008) S:I PF:1 NR:000 NS:000
All fields in the previous line of output match those for an X2 type of packet, except the last field, which is additional. NS:000 indicates a send count of 0; the range for the send count is 0 to 7.
DB-2379
Syntax Description
event fsm
Display information about AAA authorization events that occur during ISG session establishment. Display information about AAA authorization state changes for ISG subscriber sessions.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output of several debug subscriber commands, including the debug subscriber aaa authorization command. The reports from these commands should be sent to technical personnel at Cisco Systems for evaluation.
Router# Router# Router# Router# Router# SSS: SSS SSS SSS SSS SSS *Mar *Mar *Mar *Mar *Mar debug debug debug debug debug subscriber subscriber subscriber subscriber subscriber event error state aaa authorization event aaa authorization fsm
events debugging is on error debugging is on fsm debugging is on AAA authorization event debugging is on AAA authorization FSM debugging is on 4 4 4 4 4 21:33:18.248: 21:33:18.248: 21:33:18.248: 21:33:18.248: 21:33:18.248: SSS SSS SSS SSS SSS INFO: INFO: INFO: INFO: INFO: Element Element Element Element Element type type type type type is is is is is Access-Type, long value is 3 Switch-Id, long value is -1509949436 Nasport, ptr value is 6396882C AAA-Id, long value is 7 AAA-ACCT_ENBL, long value is 1
DB-2380
December 2010
*Mar 4 21:33:18.248: SSS INFO: Element type is AccIe-Hdl, ptr value is 78000006 *Mar 4 21:33:18.248: SSS MGR [uid:7]: Event service-request, state changed from wait-for-req to wait-for-auth *Mar 4 21:33:18.248: SSS MGR [uid:7]: Handling Policy Authorize (1 pending sessions) *Mar 4 21:33:18.248: SSS PM [uid:7]: Need the following key: Unauth-User *Mar 4 21:33:18.248: SSS PM [uid:7]: Received Service Request *Mar 4 21:33:18.248: SSS PM [uid:7]: Event <need keys>, State: initial-req to need-init-keys *Mar 4 21:33:18.248: SSS PM [uid:7]: Policy reply - Need more keys *Mar 4 21:33:18.248: SSS MGR [uid:7]: Got reply Need-More-Keys from PM *Mar 4 21:33:18.248: SSS MGR [uid:7]: Event policy-or-mgr-more-keys, state changed from wait-for-auth to wait-for-req *Mar 4 21:33:18.248: SSS MGR [uid:7]: Handling More-Keys event *Mar 4 21:33:20.256: SSS INFO: Element type is Unauth-User, string value is [email protected] *Mar 4 21:33:20.256: SSS INFO: Element type is AccIe-Hdl, ptr value is 78000006 *Mar 4 21:33:20.256: SSS INFO: Element type is AAA-Id, long value is 7 *Mar 4 21:33:20.256: SSS INFO: Element type is Access-Type, long value is 0 *Mar 4 21:33:20.256: SSS MGR [uid:7]: Event service-request, state changed from wait-for-req to wait-for-auth *Mar 4 21:33:20.256: SSS MGR [uid:7]: Handling Policy Authorize (1 pending sessions) *Mar 4 21:33:20.256: SSS PM [uid:7]: Received More Initial Keys *Mar 4 21:33:20.256: SSS PM [uid:7]: Event <rcvd keys>, State: need-init-keys to check-auth-needed *Mar 4 21:33:20.256: SSS PM [uid:7]: Handling Authorization Check *Mar 4 21:33:20.256: SSS PM [uid:7]: Event <send auth>, State: check-auth-needed to authorizing *Mar 4 21:33:20.256: SSS PM [uid:7]: Handling AAA service Authorization *Mar 4 21:33:20.256: SSS PM [uid:7]: Sending authorization request for 'xyz.com' *Mar 4 21:33:20.256: SSS AAA AUTHOR [uid:7]:Event <make request>, state changed from idle to authorizing *Mar 4 21:33:20.256: SSS AAA AUTHOR [uid:7]:Authorizing key xyz.com *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:AAA request sent for key xyz.com *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:Received an AAA pass *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:Event <found service>, state changed from authorizing to complete *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:Found service info for key xyz.com *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:Event <free request>, state changed from complete to terminal *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:Free request *Mar 4 21:33:20.264: SSS PM [uid:7]: Event <found>, State: authorizing to end *Mar 4 21:33:20.264: SSS PM [uid:7]: Handling Service Direction *Mar 4 21:33:20.264: SSS PM [uid:7]: Policy reply - Forwarding *Mar 4 21:33:20.264: SSS MGR [uid:7]: Got reply Forwarding from PM *Mar 4 21:33:20.264: SSS MGR [uid:7]: Event policy-start-service-fsp, state changed from wait-for-auth to wait-for-service *Mar 4 21:33:20.264: SSS MGR [uid:7]: Handling Connect-Forwarding-Service event *Mar 4 21:33:20.272: SSS MGR [uid:7]: Event service-fsp-connected, state changed from wait-for-service to connected *Mar 4 21:33:20.272: SSS MGR [uid:7]: Handling Forwarding-Service-Connected event
Related Commands
Command debug sss error debug sss event debug sss fsm
Description Displays diagnostic information about errors that may occur during Subscriber Service Switch call setup. Displays diagnostic information about Subscriber Service Switch call setup events. Displays diagnostic information about the Subscriber Service Switch call setup state.
DB-2381
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output for the debug subscriber error command indicates that the session is stale since the session handle has already been destroyed.
Router# debug subscriber error *Sep 20 22:39:49.455: SSS MGR: Session handle [EF000002] destroyed already
Related Commands
Command debug sss aaa authorization event debug sss event debug sss fsm
Description Displays messages about AAA authorization events that are part of normal call establishment. Displays diagnostic information about Subscriber Service Switch call setup events. Displays diagnostic information about the Subscriber Service Switch call setup state.
DB-2382
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output for the debug subscriber event commands indicates that the system has determined that the session should be locally terminated. The local termination module determines that an interface description block (IDB) is not required for this session, and it sets up the data plane for packet switching.
Router# debug subscriber event *Sep 20 *Sep 20 *Sep 20 service *Sep 20 service *Sep 20 22:21:08.223: SSS MGR [uid:2]: Handling Connect Local Service action 22:21:08.223: SSS LTERM [uid:2]: Processing Local termination request 22:21:08.223: SSS LTERM [uid:2]: L3 session - IDB not required for setting up 22:21:08.223: SSS LTERM [uid:2]: Interface already present or not required for 22:21:08.223: SSS LTERM [uid:2]: Segment provision successful
Related Commands
Command debug sss aaa authorization event debug sss error debug sss fsm
Description Displays messages about AAA authorization events that are part of normal call establishment. Displays diagnostic information about errors that may occur during Subscriber Service Switch call setup. Displays diagnostic information about the Subscriber Service Switch call setup state.
DB-2383
Syntax Description
all detail
Displays information about all features. The detail keyword can be used in one of the following three ways:
If used with no other keywords, displays detailed information about all features If a feature name is specified with the name name-of-feature keyword and argument, displays detailed information about the specific feature. The detail keyword can be used with the following name-of-feature values:
accounting compression modem-on-hold policing traffic-classification
If used with the packet keyword, displays a partial dump of packets as ISG features are being applied to the packets.
Displays information about errors for all features or a specified feature. Displays information about events for all features or a specified feature. Displays information about a specific feature.
DB-2384
December 2010
name-of-feature
access-list accounting compression filter idle-timer interface-config ip-config l4redirect modem-on-hold policing portbundle prepaid-idle session-timer static-routes time-monitor traffic-classification volume-monitor
packet
Displays information about packets as ISG features are being applied to the packets. If a feature name is specified with the name name-of-feature keyword and argument, packet information about the specific feature is displayed. The packet keyword can be used with the following name-of-feature values:
full
(Optional) Displays a full dump of a packet as ISG features are being applied to it.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-2385
Examples
The following sample output for the debug subscriber feature command indicates that the idle timeout feature has been successfully installed on the inbound segment.
Router# debug subscriber feature event *Sep 20 22:28:57.903: SSF[myservice/uid:6/Idle Timeout]: Group feature install *Sep 20 22:28:57.903: SSF[uid:6/Idle Timeout]: Adding feature to inbound segment(s)
DB-2386
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output for the debug subscriber fsm command indicates that the session has been disconnected by the client, and the system is cleaning up the session by disconnecting the network service and removing any installed features.
Router# debug subscriber fsm *Sep 20 22:35:10.495: SSS MGR [uid:5]: Event client-disconnect, state changed from connected to disconnecting-fsp-feat
DB-2387
Syntax Description
Displays a partial dump of packets as they traverse the SSS path. Displays any packet-switching errors that occur when a packet traverses the SSS path. Displays packet-switching events that occur when a packet traverses the SSS path. Displays a full dump of packets as they traverse the SSS path.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example show sample output for the debug subscriber packet command with the full keyword. This output is for a PPPoE session configured with forwarding.
SSS Switch: Pak encap size, old: 60, new: 24 SSS Switch: Pak 0285C458 sz 66 encap 14 *Feb 9 15:47:13.659: 000000 AA BB CC 00 0B 01 *Feb 9 15:47:13.659: 000008 CC 00 0C 01 08 00 *Feb 9 15:47:13.659: 000010 00 34 00 28 00 00 *Feb 9 15:47:13.659: 000018 F2 9D AC 12 B8 E7 *Feb 9 15:47:13.659: 000020 B8 E6 06 A5 06 A5 *Feb 9 15:47:13.659: 000028 00 00 C0 01 02 00 *Feb 9 15:47:13.659: 000030 00 01 00 18 00 00 *Feb 9 15:47:13.659: 000038 2E B3 FF 03 C2 23 *Feb 9 15:47:13.659: 000040 00 04 SSS Switch: Pak encap size, old: 60, new: 24 SSS Switch: Pak 0285C458 sz 72 encap 14 *Feb 9 15:47:13.691: 000000 AA BB CC 00 0B 01 *Feb 9 15:47:13.691: 000008 CC 00 0C 01 08 00 *Feb 9 15:47:13.691: 000010 00 3A 00 2A 00 00 *Feb 9 15:47:13.691: 000018 F2 95 AC 12 B8 E7 *Feb 9 15:47:13.691: 000020 B8 E6 06 A5 06 A5 *Feb 9 15:47:13.691: 000028 00 00 C0 01 02 00 *Feb 9 15:47:13.691: 000030 00 01 00 1E 00 00 *Feb 9 15:47:13.691: 000038 2E B3 FF 03 80 21
AA 45 FE AC 00 00 FC 03
BB 00 11 12 20 02 A7 01
AA 45 FE AC 00 00 FC 01
BB 00 11 12 26 02 A7 01
DB-2388
December 2010
*Feb 9 15:47:13.691: 000040 00 0A 03 06 3A 3A SSS Switch: Pak encap size, old: 24, new: 46 SSS Switch: Pak 027A5BE8 sz 36 encap 18 *Feb 9 15:47:13.691: 000000 AA BB CC 00 0B 00 *Feb 9 15:47:13.691: 000008 CC 00 0A 00 81 00 *Feb 9 15:47:13.691: 000010 88 64 11 00 00 01 *Feb 9 15:47:13.691: 000018 80 21 01 01 00 0A *Feb 9 15:47:13.691: 000020 00 00 00 00 SSS Switch: Pak encap size, old: 60, new: 24 SSS Switch: Pak 0285C458 sz 72 encap 14 *Feb 9 15:47:13.691: 000000 AA BB CC 00 0B 01 *Feb 9 15:47:13.691: 000008 CC 00 0C 01 08 00 *Feb 9 15:47:13.691: 000010 00 3A 00 2C 00 00 *Feb 9 15:47:13.691: 000018 F2 93 AC 12 B8 E7 *Feb 9 15:47:13.691: 000020 B8 E6 06 A5 06 A5 *Feb 9 15:47:13.691: 000028 00 00 C0 01 02 00 *Feb 9 15:47:13.691: 000030 00 01 00 1E 00 00 *Feb 9 15:47:13.691: 000038 2E B3 FF 03 80 21 *Feb 9 15:47:13.691: 000040 00 0A 03 06 09 00
3A 3A
....::::
AA 01 00 03
BB 41 0C 06
AA 45 FE AC 00 00 FC 03 00
BB 00 11 12 26 02 A7 01 1F
Related Commands
Description Displays diagnostic information about the installation and removal of ISG features on subscriber sessions.
DB-2389
Syntax Description
all detail error event fsm prepaid condition idmgr profile push rule service dpm webportal
Displays information about all policies. Displays detailed information about all policies or the specified type of policy. Displays policy execution errors for all policies or the specified type of policy. Displays policy execution events for all policies or the specified type of policy. Displays information about state changes during policy execution. Displays information about ISG prepaid policy execution. Displays information related to the evaluation of ISG control class maps. Displays information about policy execution related to identity. Displays information about the policy manager subscriber profile database. Displays policy information about dynamic updates to subscriber profiles from policy servers. Displays information about control policy rules. Displays policy information about service profile database events for subscriber sessions. Displays information about Dynamic Host Configuration Protocol (DHCP) in relation to subscriber sessions. Displays policy information about the web portal in relation to subscriber sessions.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-2390
December 2010
Examples
The following example shows sample output for the debug subscriber policy command with the events keyword. This output indicates the creation of a new session. Updated key list indicates important attributes and information associated with the session.
*Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 0 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 0 *Feb 7 *Feb 7 Request *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 *Feb 7 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS PM PM PM PM PM PM PM PM PM PM PM PM PM PM PM PM PM PM PM PM PM PM PM PM PM [0413FC58]: Create [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: context 0413FC58 Authen status update; is now "unauthen" Updated NAS port for AAA ID 14 Updated key list: Access-Type = 15 (IP) Protocol-Type = 4 (IP) Media-Type = 2 (IP) IP-Address = 10.0.0.2 (0A000002) IP-Address-VRF = IP 10.0.0.2:0 source-ip-address = 037FBB78 Mac-Address = aabb.cc00.6500 Final = 1 (YES) Authen-Status = 1 (Unauthenticated) Nasport = PPPoEoE: slot 0 adapter 0 port
[uid:4][0413FC58]: Updated key list: [uid:4][0413FC58]: Access-Type = 15 (IP) [uid:4][0413FC58]: Protocol-Type = 4 (IP) [uid:4][0413FC58]: Media-Type = 2 (IP) [uid:4][0413FC58]: IP-Address = 10.0.0.2 (0A000002) [uid:4][0413FC58]: IP-Address-VRF = IP 10.0.0.2:0 [uid:4][0413FC58]: source-ip-address = 037FBB78 [uid:4][0413FC58]: Mac-Address = aabb.cc00.6500 [uid:4][0413FC58]: Final = 1 (YES) [uid:4][0413FC58]: Authen-Status = 1 (Unauthenticated) [uid:4][0413FC58]: Nasport = PPPoEoE: slot 0 adapter 0 port
18:58:24.519: SSS PM [uid:4][0413FC58]: Session-Handle = 486539268 (1D000004) 18:58:24.519: SSS PM [uid:4][0413FC58]: SM Policy invoke - Service Selection 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.519: 18:58:24.523: 18:58:24.523: SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS SSS PM PM PM PM PM PM PM PM PM PM PM [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: [uid:4][0413FC58]: Access type IP Access type IP: final key Received Service Request Handling Authorization Check SIP [IP] can NOT provide more keys SIP [IP] can NOT provide more keys Handling Default Service Providing Service Policy reply - Local Terminate SM Policy invoke - Apply Config Success Handling Apply Config; SUCCESS
DB-2391
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug subscriber service command to diagnose problems with service profiles or service policy maps.
Examples
The following example shows sample output for the debug subscriber service command. This output indicates that a service logon has occurred for the service prep_service.
*Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb *Feb 1->0 *Feb 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 18:52:31.067: 18:52:31.067: 18:52:31.067: 18:52:31.067: 18:52:31.067: 18:52:31.127: 18:52:31.127: 18:52:31.127: 18:52:31.127: 18:52:31.127: 18:52:31.127: 18:52:31.127: 18:52:31.127: 18:52:31.127: 18:52:31.131: 18:52:31.131: 18:52:31.131: 18:52:31.131: 18:52:31.131: 18:52:31.131: 18:52:31.131: SVM SVM SVM SVM SVM SVM SVM SVM SVM SVM SVM SVM SVM SVM SVM SVM SVM SVM SVM SVM SVM [prep_service]: needs downloading [D6000000/prep_service]: allocated version 1 [D6000000/prep_service]: [8A000002]: client queued [D6000000/prep_service]: [PM-Download:8A000002] locked 0->1 [D6000000/prep_service]: [AAA-Download:040DD9D0] locked 0->1 [D6000000/prep_service]: TC feature info found [D0000001/prep_service]: added child [D6000000/prep_service]: [TC-Child:040DD130] locked 0->1 [D0000001/CHILD/prep_service]: [TC-Parent:040DD1A8] locked 0->1 [D6000000/prep_service]: TC flow feature info not found [D6000000/prep_service]: downloaded first version [D6000000/prep_service]: [8A000002]: client download ok [D6000000/prep_service]: [SVM-to-client-msg:8A000002] locked 0->1 [D6000000/prep_service]: [AAA-Download:040DD9D0] unlocked 1->0 [D6000000/prep_service]: alloc feature info [D6000000/prep_service]: [SVM-Feature-Info:040E2E80] locked 0->1 [D6000000/prep_service]: has Policy info [D6000000/prep_service]: [PM-Info:0416BAB0] locked 0->1 [D6000000/prep_service]: populated client [D6000000/prep_service]: [PM-Download:8A000002] unlocked 1->0 [D6000000/prep_service]: [SVM-to-client-msg:8A000002] unlocked
DB-2392
December 2010
*Feb 7 18:52:31.131: 0->1 *Feb 7 18:52:31.131: *Feb 7 18:52:31.131: 1->0 *Feb 7 18:52:31.139: *Feb 7 18:52:31.139: 0->1 *Feb 7 18:52:31.159: *Feb 7 18:52:31.159: unlocked 1->0 *Feb 7 18:52:31.159: 1->0
SVM [D0000001/CHILD/prep_service]: [SM-SIP-Apply:D0000001] locked SVM [D6000000/prep_service]: [FM-Bind:82000002] locked 0->1 SVM [D6000000/prep_service]: [SVM-Feature-Info:040E2E80] unlocked SVM [D0000001/CHILD/prep_service]: alloc feature info SVM [D0000001/CHILD/prep_service]: [SVM-Feature-Info:040E2E80] locked SVM [D0000001/CHILD/prep_service]: [FM-Bind:2C000003] locked 0->1 SVM [D0000001/CHILD/prep_service]: [SVM-Feature-Info:040E2E80] SVM [D0000001/CHILD/prep_service]: [SM-SIP-Apply:D0000001] unlocked
DB-2393
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows the configuration of the debug subscriber testing command:
Router# debug subscriber testing
DB-2394
December 2010
debug sw56
To display debugging information for switched 56K services, use the debug sw56 command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sw56 no debug sw56
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-2395
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Examples
The following is sample output from the debug syscon perfdata command. In this example, the CallFail poll group is configured and applied to shelf 1111. The system determines when the next polling cycle should occur and polls the shelf at the appropriate time. The data is stored in the file CallFail.891645120, and an older file is deleted.
Router# debug syscon perfdata PERF: PERF: PERF: PERF: PERF: PERF: PERF: PERF: PERF: Applying 'CallFail' to shelf 1111 Setting up objects for SNMP polling: 'CallFail', shelf 1111 year hours mins secs msecs = 1998 15 11 1 5 Start 'CallFail' timer, next cycle in 0 mins, 59 secs Timer event: CallFail, 4 minutes Polling 'CallFail', shelf 1111, pc 60AEFDF0 SNMP resp: Type 6, 'CallFail', shelf 1111, error_st 0 Logged polled data to disk0:/performance/shelf-1111/CallFail.891645120 Deleted disk0:/performance/shelf-1111/CallFail.891637469
DB-2396
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Use this command to display information about SDP packets exchanged between the shelf and the system controller.
Examples
The following sample output from the debug syscon sdp command shows the system controller discovering a managed shelf. In the first few lines, the system controller receives a hello packet from shelf 99 at 172.23.66.106. The system controller responds with a hello packet. When the shelf sends another hello packet, the system controller resets the timer and sends another packet.
Syscon# debug syscon sdp SYSCTLR: Hello packet received via UDP from 172.23.66.106 %SYSCTLR-6-SHELF_ADD: Shelf 99 discovered located at address 172.23.66.106 Hello packet sent to the RS located at 172.23.66.106 SYSCTLR: Hello packet received via UDP from 172.23.66.106 Timer for shelf 99 updated, shelf is alive Hello packet sent to the RS located at 172.23.66.106
The following sample output from the debug syscon sdp command shows the shelf contacting the system controller. The shelf sends a hello packet to the system controller at 172.23.66.111. The system controller responds with the autoconfiguration commands. The remaining lines show the Hello packets were exchanged between the shelf and the system controller.
Shelf# debug syscon sdp SYSCTLR: Hello packet sent to the SYSCTLR at 172.23.66.111 SYSCTLR: Command packet received from SYSCTLR Feb 24 17:24:16.713: %SHELF-6-SYSCTLR_ESTABLISHED: Configured via system controller located at 172.23.66.111 SYSCTLR: Rcvd HELLO from SYSCTLR at 172.23.66.111 SYSCTLR: Hello packet sent to the SYSCTLR at 172.23.66.111 SYSCTLR: Rcvd HELLO from SYSCTLR at 172.23.66.111
DB-2397
debug syslog-server
To display information about the syslog server process, use the debug syslog-server command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug syslog-server no debug syslog-server
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command outputs a message every time the syslog server receives a message. It also displays information about subfile creation, removal, and renaming. Use this command when subfiles are not being created as configured or data is not being written to subfiles. This command is also useful for detecting syslog file size mismatches.
Examples
The following is sample output from the debug syslog-server command. The sample output shows when the following command has been added to the configuration:
logging syslog-server 10 3 syslogs
This example shows the files being created. Use the dir disk0:/syslogs.dir command to display the contents of the newly created directory.
Router# debug syslog-server SYSLOG_SERVER:Syslog file syslogs SYSLOG_SERVER:Directory disk0:/syslogs.dir created. SYSLOG_SERVER:Syslog file syslogs created successfully.
When a syslog message is received, the router checks to determine if the current file will be too large when the new data is added. In this example, two messages are added to the file.
SYSLOG_SERVER: Configured size : 10240 bytes Current size : 0 bytes Data size : 68 bytes New size : 68 bytes SYSLOG_SERVER: Wrote 68 bytes successfully. SYSLOG_SERVER: Configured size : 10240 bytes Current size : 68 bytes Data size : 61 bytes New size : 129 bytes SYSLOG_SERVER: Wrote 61 bytes successfully.
DB-2398
December 2010
Table 333
Description Maximum subfile size, as set in the logging syslog-server command. Size of the current subfile before the new message is added. Size of the syslog message. Size of the current subfile after the syslog message is added.
The following output indicates that the current file is too full to fit the next syslog message. The oldest subfile is removed, and the remaining files are renamed. A new file is created and opened for writing syslog messages.
SYSLOG_SERVER:Last archive subfile disk0:/syslogs.dir/syslogs.2 removed. SYSLOG_SERVER: Subfile disk0:/syslogs.dir/syslogs.1 renamed as disk0:/syslogs.dir/syslogs.2. SYSLOG_SERVER:subfile disk0:/syslogs.dir/syslogs.cur renamed as disk0:/syslogs.dir/syslogs.1. SYSLOG_SERVER:Current subfile disk0:/syslogs.dir/syslogs.cur has been opened.
DB-2399
debug tacacs
To display information associated with TACACS, use the debug tacacs command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug tacacs no debug tacacs
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
TACACS is a distributed security system that secures networks against unauthorized access. Cisco supports TACACS under the authentication, authorization, and accounting (AAA) security system. Use the debug aaa authentication command to get a high-level view of login activity. When TACACS is used on the router, you can use the debug tacacs command for more detailed debugging information.
Examples
The following is sample output from the debug aaa authentication command for a TACACS login attempt that was successful. The information indicates that TACACS+ is the authentication method used.
Router# debug aaa authentication 14:01:17: 14:01:17: 14:01:17: 14:01:17: AAA/AUTHEN (567936829): Method=TACACS+ TAC+: send AUTHEN/CONT packet TAC+ (567936829): received authen response status = PASS AAA/AUTHEN (567936829): status = PASS
The following is sample output from the debug tacacs command for a TACACS login attempt that was successful, as indicated by the status PASS:
Router# debug tacacs 14:00:09: 14:00:09: 14:00:09: 14:00:09: 14:00:10: 14:00:10: 14:00:10: 14:00:10: 14:00:14: 14:00:14: 14:00:14: 14:00:14: 14:00:14: TAC+: Opening TCP/IP connection to 192.168.60.15 using source 10.116.0.79 TAC+: Sending TCP/IP packet number 383258052-1 to 192.168.60.15 (AUTHEN/START) TAC+: Receiving TCP/IP packet number 383258052-2 from 192.168.60.15 TAC+ (383258052): received authen response status = GETUSER TAC+: send AUTHEN/CONT packet TAC+: Sending TCP/IP packet number 383258052-3 to 192.168.60.15 (AUTHEN/CONT) TAC+: Receiving TCP/IP packet number 383258052-4 from 192.168.60.15 TAC+ (383258052): received authen response status = GETPASS TAC+: send AUTHEN/CONT packet TAC+: Sending TCP/IP packet number 383258052-5 to 192.168.60.15 (AUTHEN/CONT) TAC+: Receiving TCP/IP packet number 383258052-6 from 192.168.60.15 TAC+ (383258052): received authen response status = PASS TAC+: Closing TCP/IP connection to 192.168.60.15
DB-2400
December 2010
The following is sample output from the debug tacacs command for a TACACS login attempt that was unsuccessful, as indicated by the status FAIL:
Router# debug tacacs 13:53:35: TAC+: Opening TCP/IP connection to 192.168.60.15 using source 192.48.0.79 13:53:35: TAC+: Sending TCP/IP packet number 416942312-1 to 192.168.60.15 (AUTHEN/START) 13:53:35: TAC+: Receiving TCP/IP packet number 416942312-2 from 192.168.60.15 13:53:35: TAC+ (416942312): received authen response status = GETUSER 13:53:37: TAC+: send AUTHEN/CONT packet 13:53:37: TAC+: Sending TCP/IP packet number 416942312-3 to 192.168.60.15 (AUTHEN/CONT) 13:53:37: TAC+: Receiving TCP/IP packet number 416942312-4 from 192.168.60.15 13:53:37: TAC+ (416942312): received authen response status = GETPASS 13:53:38: TAC+: send AUTHEN/CONT packet 13:53:38: TAC+: Sending TCP/IP packet number 416942312-5 to 192.168.60.15 (AUTHEN/CONT) 13:53:38: TAC+: Receiving TCP/IP packet number 416942312-6 from 192.168.60.15 13:53:38: TAC+ (416942312): received authen response status = FAIL 13:53:40: TAC+: Closing TCP/IP connection to 192.168.60.15
Related Commands
Description Displays information on accountable events as they occur. Displays information on AAA/TACACS+ authentication.
DB-2401
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug tacacs events command only in response to a request from service personnel to collect data when a problem has been reported.
Caution
Use the debug tacacs events command with caution because it can generate a substantial amount of output. The TACACS protocol is used on routers to assist in managing user accounts. TACACS+ enhances the TACACS functionality by adding security features and cleanly separating out the authentication, authorization, and accounting (AAA) functionality.
Examples
The following is sample output from the debug tacacs events command. In this example, the opening and closing of a TCP connection to a TACACS+ server are shown, and the bytes read and written over the connection and the TCP status of the connection:
Router# debug tacacs events %LINK-3-UPDOWN: Interface Async2, changed state to up 00:03:16: TAC+: Opening TCP/IP to 192.168.58.104/1049 timeout=15 00:03:16: TAC+: Opened TCP/IP handle 0x48A87C to 192.168.58.104/1049 00:03:16: TAC+: periodic timer started 00:03:16: TAC+: 192.168.58.104 req=3BD868 id=-1242409656 ver=193 handle=0x48A87C (ESTAB) expire=14 AUTHEN/START/SENDAUTH/CHAP queued 00:03:17: TAC+: 192.168.58.104 ESTAB 3BD868 wrote 46 of 46 bytes 00:03:22: TAC+: 192.168.58.104 CLOSEWAIT read=12 wanted=12 alloc=12 got=12 00:03:22: TAC+: 192.168.58.104 CLOSEWAIT read=61 wanted=61 alloc=61 got=49 00:03:22: TAC+: 192.168.58.104 received 61 byte reply for 3BD868 00:03:22: TAC+: req=3BD868 id=-1242409656 ver=193 handle=0x48A87C (CLOSEWAIT) expire=9 AUTHEN/START/SENDAUTH/CHAP processed 00:03:22: TAC+: periodic timer stopped (queue empty) 00:03:22: TAC+: Closing TCP/IP 0x48A87C connection to 192.168.58.104/1049 00:03:22: TAC+: Opening TCP/IP to 192.168.58.104/1049 timeout=15 00:03:22: TAC+: Opened TCP/IP handle 0x489F08 to 192.168.58.104/1049 00:03:22: TAC+: periodic timer started 00:03:22: TAC+: 192.168.58.104 req=3BD868 id=299214410 ver=192 handle=0x489F08 (ESTAB) expire=14 AUTHEN/START/SENDPASS/CHAP queued
DB-2402
December 2010
00:03:23: TAC+: 192.168.58.104 ESTAB 3BD868 wrote 41 of 41 bytes 00:03:23: TAC+: 192.168.58.104 CLOSEWAIT read=12 wanted=12 alloc=12 got=12 00:03:23: TAC+: 192.168.58.104 CLOSEWAIT read=21 wanted=21 alloc=21 got=9 00:03:23: TAC+: 192.168.58.104 received 21 byte reply for 3BD868 00:03:23: TAC+: req=3BD868 id=299214410 ver=192 handle=0x489F08 (CLOSEWAIT) expire=13 AUTHEN/START/SENDPASS/CHAP processed 00:03:23: TAC+: periodic timer stopped (queue empty)
The TACACS messages are intended to be self-explanatory or for consumption by service personnel only. However, the messages shown are briefly explained in the following text. The following message indicates that a TCP open request to host 192.168.58.104 on port 1049 will time out in 15 seconds if it gets no response:
00:03:16: TAC+: Opening TCP/IP to 192.168.58.104/1049 timeout=15
The following message indicates a successful open operation and provides the address of the internal TCP handle for this connection:
00:03:16: TAC+: Opened TCP/IP handle 0x48A87C to 192.168.58.104/1049
The following message indicates that a TACACS+ request has been queued:
00:03:16: TAC+: 192.168.58.104 req=3BD868 id=-1242409656 ver=193 handle=0x48A87C (ESTAB) expire=14 AUTHEN/START/SENDAUTH/CHAP queued
Server that the request is destined for Internal address of the request TACACS+ ID of the request TACACS+ version number of the request Internal TCP handle the request uses (which will be zero for a single-connection server) TCP status of the connectionwhich is one of the following:
CLOSED LISTEN SYNSENT SYNRCVD ESTAB FINWAIT1 FINWAIT2 CLOSEWAIT LASTACK CLOSING TIMEWAIT
The following message indicates that all 46 bytes were written to address 192.168.58.104 for request 3BD868:
00:03:17: TAC+: 192.168.58.104 ESTAB 3BD868 wrote 46 of 46 bytes
DB-2403
The following message indicates that 12 bytes were read in reply to the request:
00:03:22: TAC+: 192.168.58.104 CLOSEWAIT read=12 wanted=12 alloc=12 got=12
The following message indicates that 49 more bytes were read, making a total of 61 bytes in all, which is all that was expected:
00:03:22: TAC+: 192.168.58.104 CLOSEWAIT read=61 wanted=61 alloc=61 got=49
The following message indicates that a complete 61-byte reply has been read and processed for request 3BD868:
00:03:22: TAC+: 192.168.58.104 received 61 byte reply for 3BD868 00:03:22: TAC+: req=3BD868 id=-1242409656 ver=193 handle=0x48A87C (CLOSEWAIT) expire=9 AUTHEN/START/SENDAUTH/CHAP processed
The following message indicates that the TACACS+ server helper process switched itself off when it had no more work to do:
00:03:22: TAC+: periodic timer stopped (queue empty)
Related Commands
Command debug aaa accounting debug aaa authentication debug aaa authorization debug sw56
Description Displays information on accountable events as they occur. Displays information on AAA/TACACS+ authentication. Displays information on AAA/TACACS+ authorization. Displays debugging information for switched 56K services.
DB-2404
December 2010
DB-2405
DB-2406
December 2010
DB-2407
DB-2408
December 2010
DB-2409
DB-2410
December 2010
DB-2411
DB-2412
December 2010
DB-2413
DB-2414
December 2010
DB-2415
DB-2416
December 2010
DB-2417
DB-2418
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
TDP sessions are supported by data structures and state machines at three levels:
TransportThe transport level establishes and maintains TCP connections used to support TDP sessions. ProtocolThe protocol level implements the TDP session setup protocol. The construction and parsing of TDP PDUs and PIEs occur at this level. Tag distributionThe tag distribution level uses TDP sessions to exchange tags with TDP peer devices.
The debug tag-switching tdp transport command provides visibility of activity at the transport level, the debug tag-switching tdp session command at the protocol level, and the debug tag-switching tdp peer command at the tag distribution level.
Examples
The following is sample output from the debug tag-switching tdp transport timers command:
Router# debug tag-switching tdp transport timers tdp: tdp: tdp: tdp: tdp: tdp: Start Start Start Start Start Start holding holding holding holding holding holding timer; timer; timer; timer; timer; timer; adj adj adj adj adj adj 0x60D5BC10, 0x60EA9360, 0x60D5BC10, 0x60EA9360, 0x60D5BC10, 0x60EA9360, 200.26.0.4 10.105.0.9 200.26.0.4 10.105.0.9 200.26.0.4 10.105.0.9
Description Identifies the source of the message as TDP. Identifies the data structure used to represent the peer device at the transport level. Network address of the peer device.
DB-2419
Related Commands
Description Prints information about the events related to the TDP peer discovery mechanism, which is used to determine the devices with which to establish TDP sessions.
DB-2420
December 2010
DB-2421
DB-2422
December 2010
DB-2423
DB-2424
December 2010
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows that the tag application on a session is to be displayed:
Router# debug tag-template event
Related Commands
DB-2425
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
For complete information on the TARP process, use the debug tarp packets command along with the debug tarp events command. Events are usually related to error conditions.
Examples
The following is sample output from the debug tarp events and debug tarp packets commands after the tarp resolve command was used to determine the network service access point (NSAP) address for the TARP target identifier (TID) named artemis.
Router# debug tarp events Router# debug tarp packets Router# tarp resolve artemis Type escape sequence to abort. Sending TARP type 1 PDU, timeout 15 seconds... NET corresponding to TID artemis is 49.0001.1111.1111.1111.00 *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 00:43:59: TARP-PA: Propagated TARP packet, type 1, out on Ethernet0 00:43:59: Lft = 100, Seq = 11, Prot type = 0xFE, URC = TRUE 00:43:59: Ttid len = 7, Stid len = 8, Prot addr len = 10 00:43:59: Destination NSAP: 49.0001.1111.1111.1111.00 00:43:59: Originator's NSAP: 49.0001.3333.3333.3333.00 00:43:59: Target TID: artemis 00:43:59: Originator's TID: cerd 00:43:59: TARP-EV: Packet not propagated to 49.0001.4444.4444.4444.00 on interface Ethernet0 (adjacency is not in UP state) 00:43:59: TARP-EV: No route found for TARP static adjacency 55.0001.0001.1111.1111.1111.1111.1111.1111.1111.00 - packet not sent 00:43:59: TARP-PA: Received TARP type 3 PDU on interface Ethernet0 00:43:59: Lft = 100, Seq = 5, Prot type = 0xFE, URC = TRUE 00:43:59: Ttid len = 0, Stid len = 7, Prot addr len = 10 00:43:59: Packet sent/propagated by 49.0001.1111.1111.1111.af 00:43:59: Originator's NSAP: 49.0001.1111.1111.1111.00 00:43:59: Originator's TID: artemis 00:43:59: TARP-PA: Created new DYNAMIC cache entry for artemis
DB-2426
December 2010
Table 335
Field Sending TARP type 1 PDU timeout NET corresponding to *Mar 1 00:43:59 TARP-PA: Propagated Lft Seq Prot type URC Ttid len Stid len Prot addr len Destination NSAP Originators NSAP Target TID Originators TID TARP-EV: Packet not propagated TARP-EV: No route found TARP-PA: Received TARP Packet sent/propagated by TARP-PA: Created new DYNAMIC cache entry
Descriptions Protocol data unit (PDU) requesting the NSAP of the specified TID. Number of seconds the router will wait for a response from the Type 1 PDU. The timeout is set by the tarp t1-response-timer command. NSAP address (in this case, 49.0001.1111.1111.1111.00) for the specified TID. Debug time stamp. TARP packet: A Type 1 PDU was sent out on Ethernet interface 0. Lifetime of the PDU (in hops). Sequence number of the PDU. Protocol type of the PDU. Update remote cache bit. Destination TID length. Source TID length. Protocol address length (bytes). NSAP address that the PDU is being sent to. NSAP address that the PDU was sent from. TID that the PDU is being sent to. TID that the PDU was sent from. TARP event: The Type 1 PDU was not propagated on Ethernet interface 0 because the adjacency is not up. TARP event: The Type 1 PDU was not sent because no route was available. TARP packet: A Type 3 PDU was received on Ethernet interface 0. NSAP address of the router that sent or propagated the PDU. TARP packet: A dynamic entry was made to the local TID cache.
Related Commands
Description Displays general information on TARP packets received, generated, and propagated on the router.
DB-2427
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
For complete information on the TARP process, use the debug tarp events command along with the debug tarp packet command. Events are usually related to error conditions.
Examples
The following is sample output from the debug tarp packet command after the tarp query command was used to determine the TARP target identifier (TID) for the NSAP address 49.0001.3333.3333.3333.00:
Router# debug tarp packets Router# debug tarp events Router# tarp query 49.0001.3333.3333.3333.00 Type escape sequence to abort. Sending TARP type 5 PDU, timeout 40 seconds... TID corresponding to NET 49.0001.3333.3333.3333.00 is cerdiwen *Mar 2 03:10:11: TARP-PA: Originated TARP packet, type 5, to destination 49.0001.3333.3333.3333.00 *Mar 2 03:10:11: TARP-PA: Received TARP type 3 PDU on interface Ethernet0 *Mar 2 03:10:11: Lft = 100, Seq = 2, Prot type = 0xFE, URC = TRUE *Mar 2 03:10:11: Ttid len = 0, Stid len = 8, Prot addr len = 10 *Mar 2 03:10:11: Packet sent/propagated by 49.0001.3333.3333.3333.af *Mar 2 03:10:11: Originator's NSAP: 49.0001.3333.3333.3333.00 *Mar 2 03:10:11: Originator's TID: cerdiwen *Mar 2 03:10:11: TARP-PA: Created new DYNAMIC cache entry for cerdiwen
Descriptions Protocol data unit (PDU) requesting the TID of the specified NSAP. Number of seconds the router will wait for a response from the Type 5 PDU. The timeout is set by the tarp arp-request-timer command.
DB-2428
December 2010
Table 336
Field TID corresponding to NET *Mar 2 03:10:11 TARP-PA: Originated TARP packet TARP P-A: Received TARP Lft Seq Prot type URC Ttid len Stid len Prot addr len Packet sent/propagated Originators NSAP Originators TID TARP-PA: Created new DYNAMIC cache entry
Descriptions TID (in this case cerdiwen) for the specified NSAP address. Debug time stamp. TARP packet: A Type 5 PDU was sent. TARP packet: A Type 3 PDU was received. Lifetime of the PDU (in hops). Sequence number of the PDU. Protocol type of the PDU. The update remote cache bit. Destination TID length. Source TID length. Protocol address length (in bytes). NSAP address of the router that sent or propagated the PDU. NSAP address that the PDU was sent from. TID that the PDU was sent from. TARP packet: A dynamic entry was made to the local TID cache.
Related Commands
DB-2429
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug tbridge virtual-port command:
Router# debug tbridge virtual-port Transparent Bridging Virtual Port Events debugging is on Router# vBridge-Port: Received packet (vLAN 100) on FastEthernet0/0 matches with lw-vLAN range. Set packet input interface to vBridgePort2/1.
Description Identifies the message as a Transparent Bridging Virtual Port debug message. The VLAN ID of the packet. The interface the packet is to be bridged to.
DB-2430
December 2010
debug tcam_mgr
To debug the ternary content addressable memory (TCAM) manager, use the debug tcam_mgr command in privileged EXEC configuration mode. debug tcam_mgr {error | event | profile} no debug tcam_mgr {error | event | profile}
Syntax Description
Enables debug messages related to TCAM manager errors. Enables debug messages for TCAM manager events. Enables debug messages about the amount of time it takes to add and remove entries from the TCAM regions.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(20)S2. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug tcam_mgr command is intended for use by Cisco Systems technical support personnel.
Caution
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Examples
The following example enables TCAM manager event debug messages. It shows the messages associated with shutting down and restarting an interface on the the 4-Port 10/100 Fast Ethernet SPA located in the top subslot (0) of the MSC that is installed in slot 4 of the Cisco 7304 router:
Router# debug tcam_mgr event TCAM Manager Events debugging is on Router# conf t Enter configuration commands, one per line.
DB-2431
Router(config)# int fast 4/0/0 Router(config-if)# shut Router(config-if)# 4d01h: %LINK-5-CHANGED: Interface FastEthernet4/0/0, changed state to administratively down 4d01h: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet4/0/0, changed state to down Router(config-if)# Router(config-if)# no shut Router(config-if)# 4d01h: Freeing VC at 0 from mask at 0 4d01h: Freeing VC at 1 from mask at 0 4d01h: Freeing VC at 0 from mask at 8 4d01h: Found Mbu at offset 0 index 0 4d01h: Allocated mbu at offset 0 index 0, vc_index 0 region 0 4d01h: Found Mbu at offset 0 index 0 4d01h: Allocated mbu at offset 0 index 0, vc_index 1 region 0 4d01h: Found Mbu at offset 0 index 1 4d01h: Allocated mbu at offset 0 index 1, vc_index 0 region 0 4d01h: %LINK-3-UPDOWN: Interface FastEthernet4/0/0, changed state to up 4d01h: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet4/0/0, changed state to up
DB-2432
December 2010
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Release
Modification This command was introduced. This command was integrated into Release 12.1(2)T and Release 12.1(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
Use this command with caution, because it displays every packet that the D channel transmits to the packet network and to the PBX. This command is CPU-intensive and should be used only as a last resort. Use this command to debug a transparent CCS connection in the following cases:
Observe the results of the ccs connect command results when you configure the setup. Observe CCS traffic at run time; the output shows the actual CCS packets received at run time and the number of packets received and sent.
Examples
The following shows sample output from the command on both the originating and terminating sides:
Router# debug tccs signaling TCCS Domain packet debugging is on mazurka-4# 01:37:12: 1 tccs packets received from the port. 01:37:12: 1 tccs packets received from the nework. 01:37:12: tx_tccs_fr_pkt:pkt rcvd from network->tx_start
DB-2433
01:37:12: tx_tccs_fr_pkt: dlci=37, cid=100, payld-type =0, payld-length=162, cid_type=424 01:37:12: datagramsize=26 01:37:12: [0] A4 40 C0 0 01:37:12: [4] 86 86 86 86 01:37:12: [8] 86 86 86 86 01:37:12: [12] 86 86 86 86 01:37:12: [16] 86 86 86 86 01:37:12: [20] 86 86 86 86 01:37:12: [24] 86 86 11 48 01:37:12: 2 tccs packets received from the port. 01:37:12: 1 tccs packets received from the nework. 01:37:12: pri_tccs_rx_intr:from port->send_sub_channel 01:37:12: tccs_db->vcd = 37, tccs_db->cid = 100 01:37:12: pak->datagramsize=25 01:37:12: [0] A4 40 C0 0 01:37:12: [4] 42 43 43 43 01:37:12: [8] 43 43 43 43 01:37:12: [12] 43 43 43 43 01:37:12: [16] 43 43 43 43 01:37:12: [20] 43 43 43 43 01:37:12: [24] 43 43 43 0 Router# debug tccs signaling 00:53:26: 00:53:26: 00:53:26: 00:53:26: 00:53:26: 00:53:26: 00:53:26: 00:53:27: 00:53:27: 00:53:27: 00:53:27: 00:53:27: 00:53:27: 00:53:27: 00:53:28: 00:53:28: 00:53:28: 00:53:28: 00:53:28: 00:53:28: 00:53:28: 00:53:29: 00:53:29: 61 tccs packets received from the port. 53 tccs packets received from the nework. pri_tccs_rx_intr:from port->send_sub_channel tccs_db->vcd = 37, tccs_db->cid = 100 pak->datagramsize=7 [0] A4 40 C0 0 [4] 0 1 7F 64 62 tccs packets received from the port. 53 tccs packets received from the nework. pri_tccs_rx_intr:from port->send_sub_channel tccs_db->vcd = 37, tccs_db->cid = 100 pak->datagramsize=7 [0] A4 40 C0 0 [4] 0 1 7F 64 63 tccs packets received from the port. 53 tccs packets received from the nework. pri_tccs_rx_intr:from port->send_sub_channel tccs_db->vcd = 37, tccs_db->cid = 100 pak->datagramsize=7 [0] A4 40 C0 0 [4] 0 1 7F 64 64 tccs packets received from the port. 53 tccs packets received from the nework.
DB-2434
December 2010
debug tdm
To display time-division multiplexing (TDM) bus connection information each time a connection is made on Cisco AS5300 access servers, use the debug tdm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug tdm [api | detail | dynamic | pri | test | tsi | vdev] no debug tdm [api | detail | dynamic | pri | test | tsi | vdev]
Syntax Description
api
(Optional) Displays a debugging message whenever the TDM subsystem application programming interface (API) is invoked from another subsystem. (Optional) Displays detailed messages (i.e., trace messages) whenever the TDM software executes. (Optional) Displays TDM debugging information whenever a backplane timeslot is allocated or deallocated. (Optional) Routes modem back-to-back connections from the modem-to-PRI board to modem board. By default, the modem back-to-back connections route from modem board to motherboard to modem board. (Optional) Simulates the failure of allocating a TDM timeslot. Verifies that the software and TDM hardware recover from the failure. (Optional) Displays debugging information about the TSI Chip MT8980/MT90820 driver. (Optional) TDM per voice device debug <0-2> slot and port number (that is, 0/1). Displays debugging information whenever a modem board TDM connection is made.
Command Modes
Privileged EXEC
Usage Guidelines
The debug tdm command output is to be used primarily by a Cisco technical support representative. The debug tdm command enables display of debugging messages for specific areas of code that execute.
Examples
The following examples show the turning on of the debug option, performing a modem call, and turning off the debug option:
Router# debug tdm api TDM API debugging is on Router# 23:16:04: TDM(vdev reg: 0x3C500100/PRI reg: 0x3C400100): two way connection requested. 23:16:04: TDM(reg: 0x3C500100): Close connection to STo8, channel 1 23:16:04: TDM(reg: 0x3C500100): Connect STi4, channel 1 to STo8, channel 1 23:16:04: TDM(reg: 0x3C500100): Close connection to STo4, channel 1 23:16:04: TDM(reg: 0x3C500100): Connect STi8, channel 1 to STo4, channel 1 23:16:04: TDM(reg: 0x3C400100): Close connection to STo12, channel 31 23:16:04: TDM(reg: 0x3C400100): Close connection to STo8, channel 31
DB-2435
23:16:04: 23:16:04: 23:18:22: 23:18:22: 23:18:22: 23:18:22: 23:18:22: 23:18:22: 23:18:22: 23:18:22: 23:18:22: 23:18:22: 23:18:22: 23:18:22:
TDM(reg: TDM(reg: TDM(reg: TDM(reg: TDM(reg: TDM(reg: TDM(reg: TDM(reg: TDM(reg: TDM(reg: TDM(reg: TDM(reg: TDM(reg: TDM(reg:
0x3C400100): 0x3C400100): 0x3C500100): 0x3C500100): 0x3C500100): 0x3C500100): 0x3C500100): 0x3C500100): 0x3C400100): 0x3C400100): 0x3C400100): 0x3C400100): 0x3C400100): 0x3C400100):
Connect STi12, channel 31 to STo4, channel 1 Connect STi4, channel 1 to STo12, channel 31 default RX connection requested. Close connection to STo8, channel 1 default TX connection requested. Close connection to STo4, channel 1 Close connection to STo8, channel 1 Close connection to STo4, channel 1 default RX connection requested. Close connection to STo4, channel 1 Connect STi12, channel 31 to STo8, channel 31 default TX connection requested. Close connection to STo12, channel 31 Connect STi8, channel 31 to STo12, channel 31
Router# no debug tdm api TDM API debugging is off Router# debug tdm detail TDM Detail Debug debugging is on router_2#show tdm pool
DB-2436
December 2010
Router# no debug tdm test TDM Unit Test debugging is off Router# debug tdm tsi TDM TSI debugging is on Router# 23:56:40: MT90820(reg: 0x3C500100): 23:56:40: MT90820(reg: 0x3C500100): 23:56:40: MT90820(reg: 0x3C500100): 23:56:40: MT90820(reg: 0x3C500100): 23:56:40: MT90820(reg: 0x3C400100): 23:56:40: MT90820(reg: 0x3C400100): 23:56:40: MT90820(reg: 0x3C400100): 23:56:40: MT90820(reg: 0x3C400100): 23:57:03: MT90820(reg: 0x3C500100): 23:57:03: MT90820(reg: 0x3C500100): 23:57:03: MT90820(reg: 0x3C500100): 23:57:03: MT90820(reg: 0x3C500100): 23:57:03: MT90820(reg: 0x3C400100): 23:57:03: MT90820(reg: 0x3C400100): 23:57:03: MT90820(reg: 0x3C400100): 23:57:03: MT90820(reg: 0x3C400100): Router# Router# no debug tdm tsi TDM TSI debugging is off Router# debug tdm vdev ? <0-2> Slot/port number (i.e. 0/1) Router# debug tdm vdev 1/8 Enabling TDM debug for voice device in slot 0 port 1 Router# 23:55:00: TDM(vdev reg: 0x3C500100/PRI reg: 0x3C400100): two way connection requested. 23:55:00: tdm_allocate_bp_ts(), slot# 1, chan# 8 23:55:00: TDM(reg: 0x3C500100): Open Modem RX ST8, CH8 to BP ST4 CH9 23:55:00: TDM(reg: 0x3C500100): Open Modem TX ST8, CH8 to BP ST4 CH9 23:55:00: TDM Backplane Timeslot Dump @ 0x60E6D2D4, tdm_free_bptsCount[1] = 127 vdev_slot : 0x01 bp_stream : 0x04 vdev_channel : 0x08 bp_channel : 0x09 freeQueue : 0x60CB6B40 23:55:00: TDM(PRI:0x3C400100):Close PRI framer st12 ch31 23:55:00: TDM(PRI:0x3C400100):Close HDLC controller st8 ch31 23:55:31: TDM(reg: 0x3C500100): default RX connection requested. 23:55:31: TDM(reg: 0x3C500100): default TX connection requested. 23:55:31: tdm_deallocate_bp_ts(), slot# 1, chan# 8 23:55:31: TDM(reg: 0x3C500100):Close Modem RX ST8, CH8 to BP ST4 CH9 23:55:31: TDM(reg: 0x3C500100):Close Modem TX ST8, CH8 to BP ST4 CH9 23:55:31: TDM Backplane Timeslot Dump @ 0x60E6D2D4, tdm_free_bptsCount[1] = 128 vdev_slot : 0x01 bp_stream : 0x04 vdev_channel : 0x08 bp_channel : 0x09 freeQueue : 0x60CB6B40 Router# Router# no debug tdm vdev 1/8 Disabling TDM debug for voice device in slot 0 port 1 Router#
Close connection to STi8, channel 9 Connect STi4, channel 10 to STo8, channel 9 Close connection to STi4, channel 10 Connect STi8, channel 9 to STo4, channel 10 Close connection to STi12, channel 31 Close connection to STi8, channel 31 Connect STi12, channel 31 to STo4, channel 10 Connect STi4, channel 10 to STo12, channel 31 Close connection to STi8, channel 9 Close connection to STi4, channel 10 Close connection to STi8, channel 9 Close connection to STi4, channel 10 Close connection to STi4, channel 10 Connect STi12, channel 31 to STo8, channel 31 Close connection to STi12, channel 31 Connect STi8, channel 31 to STo12, channel 31
DB-2437
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug cable telco-return msg command:
ubr7223# debug cable telco-return msg CMTS telco-return msg debugging is on
DB-2438
December 2010
debug telnet
To display information about Telnet option negotiation messages for incoming Telnet connections to a Cisco IOS Telnet server, use the debug telnet command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug telnet no debug telnet
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-2439
*Oct 28 21:31:12.059:TCP1/00:Telnet sent DONT WINDOW-SIZE (31) *Oct 28 21:31:12.059:Telnet1/00:recv SB 24 0 *Oct 28 21:31:12.091:Telnet1/00:recv SB 44 10 TTY1/00:Telnet COMPORT rcvd bad suboption:0xA/0x1E *Oct 28 21:31:12.091:Telnet1/00:recv SB 44 1 *Oct 28 21:31:12.091:Telnet_CP-1/00 baudrate index 0 *Oct 28 21:31:12.091:Telnet1/00:Sent SB 44 101 X.dctBXctBXctBX`W`P`> *Oct 28 21:31:12.091:Telnet1/00:recv SB 44 2 *Oct 28 21:31:12.091:Telnet_CP-1/00 datasize index 8 8 *Oct 28 21:31:12.091:Telnet1/00:Sent SB 44 102X.dctBXctBXctBX`W`P`> *Oct 28 21:31:12.091:Telnet1/00:recv SB 44 3 *Oct 28 21:31:12.091:Telnet_CP-1/00 parity index 1 0 *Oct 28 21:31:12.091:Telnet1/00:Sent SB 44 103 X.dctBXctBXctBX`W`P`> *Oct 28 21:31:12.091:Telnet1/00:recv SB 44 4 *Oct 28 21:31:12.091:Telnet_CP-1/00 stopbits index 1 *Oct 28 21:31:12.091:Telnet1/00:Sent SB 44 104 X.dctBXctBXctBX`W`P`> *Oct 28 21:31:12.091:Telnet1/00:recv SB 44 5 *Oct 28 21:31:12.091:Telnet_CP-1/00 HW flow on *Oct 28 21:31:12.091:Telnet1/00:Sent SB 44 105 X.dctBXctBXctBX`W`P`> *Oct 28 21:31:12.091:Telnet1/00:recv SB 44 11 nTTY1/00:Telnet COMPORT rcvd ba d suboption:0xB/0xEE *Oct 28 21:31:12.091:Telnet1/00:recv SB 44 5 *Oct 28 21:31:12.091:Telnet_CP-1/00 unimplemented option 0x10 *Oct 28 21:31:12.091:Telnet1/00:Sent SB 44 105 *Oct 28 21:31:12.091:Telnet1/00:recv SB 44 5 *Oct 28 21:31:12.091:Telnet_CP-1/00 DTR on *Oct 28 21:31:12.091:Telnet1/00:Sent SB 44 105X.dctBXctBXctBX`W`P`> *Oct 28 21:31:12.091:TCP1/00:Telnet received WONT WINDOW-SIZE (31) *Oct 28 21:31:12.099:Telnet1/00:Sent SB 44 107 3 *Oct 28 21:31:12.099:COMPORT1/00:sending notification 0x33
Description Untranslated decimal option negotiations that are sent. 1/00 denotes the line number that the Telnet server is operating on. Symbolically decoded option negotiations. 1/00 denotes the line number that the Telnet server is operating on. Telnet option negotiations are defined in the following RFCs:
TCP1/00:
RFC 854Telnet Protocol Specification RFC 856Telnet Binary Transmission RFC 858Telnet Suppress Go Ahead Option RFC 1091Telnet Terminal-Type Option RFC 1123, sec. 3Requirements for Internet HostsApplication and Support RFC 2217Telnet Com Port Control Option
DB-2440
December 2010
Related Commands
Description Displays information on significant TCP transactions such as state changes, retransmissions, and duplicate packets. Displays modem line activity on an access server.
DB-2441
debug text-to-fax
To show information relating to the off-ramp text-to-fax conversion, use the debug text-to-fax command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug text-to-fax no debug text-to-fax
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-2442
December 2010
debug tftp
To display Trivial File Transfer Protocol (TFTP) debugging information when encountering problems netbooting or using the copy tftp system:running-config or copy system:running-config tftp commands, use the debug tftp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug tftp no debug tftp
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug tftp command from the copy system:running-config tftp EXEC command:
Router# debug tftp TFTP: TFTP: TFTP: TFTP: TFTP: TFTP: msclock msclock msclock msclock msclock msclock 0x292B4; 0x2A63C; 0x2A6DC; 0x2A6DC; 0x2A6DC; 0x2A6E4; Sending write request (retry 0), socket_id 0x301DA8 Sending write request (retry 1), socket_id 0x301DA8 Received ACK for block 0, socket_id 0x301DA8 Received ACK for block 0, socket_id 0x301DA8 Sending block 1 (retry 0), socket_id 0x301DA8 Received ACK for block 1, socket_id 0x301DA8
Table 339 describes the significant fields in the first line of output.
Table 339 debug tftp Field Descriptions
Message TFTP: msclock 0x292B4; Sending write request (retry 0) socket_id 0x301DA8
Description TFTP packet. Internal timekeeping clock (in milliseconds). TFTP operation. Unique memory address for the socket for the TFTP connection.
DB-2443
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
There is always a performance penalty when using debug commands. The We already have connection with such itad/tripid combo in progress message appears when an error occurs where two location servers with the same Internet Telephony Administrative Domain (ITAD), and TripID initiate a Telephony Routing over IP (TRIP) connection to the gateway. When the second OPEN message arrives at the gateway, the debug trip error command displays the message.
Examples
The following shows sample output from the debug tgrep error command:
Errors Errors Errors Errors : : : : Process Process Process Process socket socket socket socket event event event event has has has has an an an an invalid invalid invalid invalid fd fd fd fd to to to to work work work work on on on on
After the errors are reported, the open dump begins. The ITAD is identified in the dump.
------------------------ OPEN DUMP BEGINS -----------------------0x1 0xFFFFFFFF 0x0 0xFFFFFFB4 0x0 0x0 0x4 0x58 0x6 0x7 0xFFFFFF98 0xFFFFFFA9 0x0 0xC 0x0 0x1 0x0 0x8 0x0 0x2 0x0 0x4 0x0 0x0 0x0 0x3 Version :1
DB-2444
December 2010
Option Paramater #1 Param Type: Capability Length 8 Cap Code :Send Receive Capability Cap Len :4 Send Rec Cap: RCV ONLY MODE -->All route types supported ------------------------ OPEN DUMP ENDS ------------------------
The We already have connection with such itad/tripid combo in progress message appears when an error occurs where two location servers with the same ITAD and TripID initiate a TRIP connection to the gateway.
We already have connection with such itad/tripid combo in progress NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet Errors : Process socket event has an invalid fd to work on Error: Active connection to the nbr failed NBR:16.1.1.203 Errors : Process socket event has an invalid fd to work on Errors : Process socket event has an invalid fd to work on NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet Errors : Process socket event has an invalid fd to work on Errors : Process socket event has an invalid fd to work on NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet Errors : Process socket event has an invalid fd to work on
Related Commands
Command debug tgrep events debug tgrep fsm debug tgrep io debug tgrep messages debug tgrep msgdump debug tgrep timer-event debug tgrep timers debug tgrep tripr debug voip eddri
Description Turns on debugging for main events occurring throughout the subsystem. Turns on debugging for FSM activity. Turns on debugging for detailed socket level activities. Turns on debugging for the movement of TGREP messages. Turns on debugging for the dump of the details of TGREP messages. Turns on debugging for events that are related to the timer. Turns on debugging for timer activity. Turns on debugging for the TRIP Reporter. Turns on debugging for the EDDRI.
DB-2445
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following example shows output from the debug tgrep events command:
tgrep-gw-1-02#Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time
Field Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time
Description This event shows that a TGREP update timer timeout event occurred. This event indicates the size of bulk sync queue. This event indicates the size of TGREP queue.
DB-2446
December 2010
Related Commands
Command debug tgrep error debug tgrep fsm debug tgrep io debug tgrep messages debug tgrep msgdump debug tgrep timer-event debug tgreptimers debug tgrep tripr debug voip eddri
Description Turns on debugging for any errors in functioning. Turns on debugging for FSM activity. Turns on debugging for detailed socket level activities. Turns on debugging for the movement of TGREP messages. Turns on debugging for the dump of the details of TGREP messages. Turns on debugging for events that are related to the timer. Turns on debugging for timer activity. Turns on debugging for the TRIP Reporter. Turns on debugging for the EDDRI.
DB-2447
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following shows sample output from the debug tgrep fsm command:
Generic routes combined : 0x61FA38B4, 13 bytes ++++++++++++++++++++++++++++++++++++++ 0x0 0x2 0x0 0x9 0x0 0x5 0x0 0x0 0x0 0x3 0x6D 0x63 0x69 ----------------------------------+++++++++++++++++++++++++++++++++++++ NEXT HOP SERVER : 0x61FA38C1, 10 bytes ++++++++++++++++++++++++++++++++++++++ 0x0 0x3 0x0 0x6 0x0 0x0 0x4 0xFFFFFFD2 0x0 0x0 ----------------------------------+++++++++++++++++++++++++++++++++++++ AD RD PATH : 0x61FA38CB, 10 bytes ++++++++++++++++++++Getting a major event 4 on I/O
Here, a write event occurs. Note how the finite state machine details each step of the writing process.
Received a TRIP_IO_WRITEQ_BOOLEAN event 313 The peer connection check for fd 1 is success Writing some pending stuff first NBR:14.1.1.210 Moving ahead with more reading rc = 4 -->Starting regular write for nbr NBR:14.1.1.210
DB-2448
December 2010
The queuesize before we start is 1 Selected primary socket for NBR:14.1.1.210 The peer connection check for fd 1 is success Dequeued 1 message (left 0) for NBR:14.1.1.210 for writing to socket A socket has gulped all that we fed it NBR:14.1.1.210 -- 92 bytes Dequeued 0 message (left 0) for NBR:14.1.1.210 for writing to socket Wrote out the whole socket buffer or Q in 2 attempts NBR:14.1.1.210 rc 4 was NBR:14.1.1.210 Starting keepalive timer after writing something Getting a major event 512 on I/O Received an event on a socket for some nbr Received Mask event of 0x1 for fd 1 Looking for fd match on nbr NBR:14.1.1.210
Now a read event occurs. After this event, the total number of TRIP messages read is displayed.
Recieved READ_EVENT for nbr NBR:14.1.1.210 Read 3 bytes from that network for nbr NBR:14.1.1.210 +++++++++++++++++++++++++++++++++++++ This is what we READ : 0x63E79090, 3 bytes ++++++++++++++++++++++++++++++++++++++ 0x0 0x3 0x4 ----------------------------------NBR:14.1.1.210 Re-starting hold timer after a message is read tmsg malloc total memory allocated is 95 Allocated another buffer for TRIP message TRIP Messages Read so far 1 +++++++++++++++++++++++++++++++++++++ Enqueing this tmsg : 0x691D09DC, 3 bytes ++++++++++++++++++++++++++++++++++++++ 0x0 0x3 0x4 ----------------------------------Enqueuing a message into the ReadQ of nbr: NBR:14.1.1.210 Read -1 bytes from that network for nbr NBR++++++++++++++++++ 0x0 0x4 0x0 0x6 0x2 0x1 0x0 0x0 0x4 0xFFFFFFD2 -----------------------------------
Statistics for available circuits, total circuits, and call success rate are displayed.
+++++++++++++++++++++++++++++++++++++ AD RD PATH : 0x61FA38D5, 10 bytes ++++++++++++++++++++++++++++++++++++++ 0x0 0x5 0x0 0x6 0x2 0x1 0x0 0x0 0x4 0xFFFFFFD2 ----------------------------------+++++++++++++++++++++++++++++++++++++ LOCAL PREF : 0x61FA38DF, 8 bytes ++++++++++++++++++++++++++++++++++++++ 0x0 0x7 0x0 0x4 0x0 0x0 0x0 0x5 ----------------------------------+++++++++++++++++++++++++++++++++++++ Available Ckts : 0x61FA38E7, 8 bytes ++++++++++++++++++++++++++++++++++++++ 0x0 0xF 0x0 0x4 0x0 0x0 0x0 0x17 ----------------------------------+++++++++++++++++++++++++++++++++++++ TOTAL CIRCUITS : 0x61FA38EF, 8 bytes ++++++++++++++++++++++++++++++++++++++ 0x0 0x10 0x0 0x4 0x0 0x0 0x0 0x17 ----------------------------------+++++++++++++++++++++++++++++++++++++
DB-2449
CALL SUCCESS RATE : 0x61FA38F7, 12 bytes ++++++++++++++++++++++++++++++++++++++ 0x0 0x11 0x0 tgrep-gw-1-02# tgrep-gw-1-02#und al:14.1.1.210 Getting a major event 512 on I/O Errors : Process socket event has an invalid fd to work on l 0x8 0x0 0x0 0x0 0x78 0x0 0x0 0x0 0x7F ----------------------------------+++++++++++++++++++++++++++++++++++++ PREFIX_ATTRIBUTE : 0x61FA3903, 64 bytes ++++++++++++++++++++++++++++++++++++++
Related Commands
Command debug tgrep error debug tgrep events debug tgrep io debug tgrep messages debug tgrep msgdump debug tgrep timer-event debug tgrep timers debug tgrep tripr debug voip eddri
Description Turns on debugging for any errors in functioning. Turns on debugging for main events occurring throughout the subsystem. Turns on debugging for detailed socket level activities. Turns on debugging for the movement of TGREP messages. Turns on debugging for the dump of the details of TGREP messages. Turns on debugging for events that are related to the timer. Turns on debugging for timer activity. Turns on debugging for the TRIP Reporter. Turns on debugging for the EDDRI.
DB-2450
December 2010
debug tgrep io
To turn on debugging for detailed socket-level activities, use the debug tgrep io command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug tgrep io no debug tgrep io
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following shows sample output from the debug tgrep io command:
Dispatching a TRIP_EV_NBR_IO_ASYNC_RESET to I/O for NBR:16.1.1.202 Dispatching a TRIP_EV_NBR_IO_ASYNC_RESET to I/O for NBR:16.1.1.203 A socket has gulped all that we fed it NBR:16.1.1.202 -- 5 bytes Closing all the fds for NBR:16.1.1.202 NBR:16.1.1.202 is not eligible to write, no non(-1) fd yet NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet A Socket error has caused a write failure NBR:16.1.1.203 errno 13 Closing all the fds for NBR:16.1.1.203 NBR:16.1.1.202 is not eligible to write, no non(-1) fd yet NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet
DB-2451
Received Mask event of 0x1 for fd 1 Recieved READ_EVENT for nbr NBR:16.1.1.202 Read -1 bytes from that network for nbr NBR:16.1.1.202 Received Mask event of 0x1 for fd 1 Recieved READ_EVENT for nbr NBR:16.1.1.202 Read 3 bytes from that network for nbr NBR:16.1.1.202 Read -1 bytes from that network for nbr NBR:16.1.1.202
After the errors are detected, a dump occurs. The Internet Telephony Administrative Domain (ITAD) and Telephony Routing over IP (TRIP) ID are displayed.
------------------------ OPEN DUMP BEGINS -----------------------0x1 0xFFFFFFFF 0x0 0xFFFFFFB4 0x0 0x0 0x4 0x58 0x6 0x7 0xFFFFFF98 0xFFFFFFA9 0x0 0xC 0x0 0x1 0x0 0x8 0x0 0x2 0x0 0x4 0x0 0x0 0x0 0x3 Version Hold Time My ITAD TRIP ID :1 :180 :1112 :101161129
Option Paramater #1 Param Type: Capability Length 8 Cap Code :Send Receive Capability Cap Len :4 Send Rec Cap: RCV ONLY MODE -->All route types supported ------------------------ OPEN DUMP ENDS -----------------------Doing fd reassignment for nbr NBR:16.1.1.202 Moving ahead with more reading rc = 4 A socket has gulped all that we fed it NBR:16.1.1.202 -- 3 bytes Wrote out the whole socket buffer or Q in 2 attempts NBR:16.1.1.202 rc 4 was NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet Received Mask event of 0x1 for fd 1 Recieved READ_EVENT for nbr NBR:16.1.1.202 Read 3 bytes from that network for nbr NBR:16.1.1.202 Read -1 bytes from that network for nbr NBR:16.1.1.202 Moving ahead with more reading rc = 4 A socket has gulped all that we fed it NBR:16.1.1.202 -- 598 bytes Wrote out the whole socket buffer or Q in 2 attempts NBR:16.1.1.202 rc 4 was NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet Errors : Process socket event has an invalid fd to work on Received Mask event of 0x1 for fd 1 Recieved READ_EVENT for nbr NBR:16.1.1.202 Read 3 bytes from that network for nbr NBR:16.1.1.202 Read -1 bytes from that network for nbr NBR:16.1.1.202 Errors : Process socket event has an invalid fd to work on Received Mask event of 0x1 for fd 1 Recieved READ_EVENT for nbr NBR:16.1.1.202 Read 15 bytes from that network for nbr NBR:16.1.1.202
DB-2452
December 2010
Read -1 bytes from that network for nbr NBR:16.1.1.202 Errors : Process socket event has an invalid fd to work on Going to initiate a connect to 16.1.1.203 Called a socket_connect with errno 11, confirmation later Initiated a Async connect call for nbr NBR:16.1.1.203 fd 2 Received Mask event of 0x1 for fd 2 Recieved WRITE_EVENT for nbr NBR:16.1.1.203 The Active connect never succeeded, no passive yet, resetting NBR:16.1.1.203 Error: Active connection to the nbr failed NBR:16.1.1.203 A Socket error has caused a write failure NBR:16.1.1.203 errno 13 Closing all the fds for NBR:16.1.1.203 Post connect succeeded for the nbr NBR:16.1.1.203, fd -1 Moving ahead with more reading rc = 4 NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet Errors : Process socket event has an invalid fd to work on Going to initiate a connect to 16.1.1.203 Called a socket_connect with errno 11, confirmation later Initiated a Async connect call for nbr NBR:16.1.1.203 fd 2 Received Mask event of 0x1 for fd 2
Errors continue to occur. Note that the router still attempts to write, but the connection is not active.
Recieved WRITE_EVENT for nbr NBR:16.1.1.203 The Active connect never succeeded, no passive yet, resetting NBR:16.1.1.203 Error: Active connection to the nbr failed NBR:16.1.1.203 A Socket error has caused a write failure NBR:16.1.1.203 errno 13 Closing all the fds for NBR:16.1.1.203 Post connect succeeded for the nbr NBR:16.1.1.203, fd -1 Moving ahead with more reading rc = 4 NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet Errors : Process socket event has an invalid fd to work on Received Mask event of 0x1 for fd 1 Recieved READ_EVENT for nbr NBR:16.1.1.202 Read 3 bytes from that network for nbr NBR:16.1.1.202 Read -1 bytes from that network for nbr NBR:16.1.1.202 Errors : Process socket event has an invalid fd to work on Going to initiate a connect to 16.1.1.203 Called a socket_connect with errno 11, confirmation later Initiated a Async connect call for nbr NBR:16.1.1.203 fd 2 Received Mask event of 0x1 for fd 2 Recieved WRITE_EVENT for nbr NBR:16.1.1.203 The Active connect never succeeded, no passive yet, resetting NBR:16.1.1.203 Error: Active connection to the nbr failed NBR:16.1.1.203 A Socket error has caused a write failure NBR:16.1.1.203 errno 13 Closing all the fds for NBR:16.1.1.203 Post connect succeeded for the nbr NBR:16.1.1.203, fd -1 Moving ahead with more reading rc = 4 NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet Errors : Process socket event has an invalid fd to work on
Related Commands
Command debug tgrep error debug tgrep events debug tgrep fsm debug tgrep messages debug tgrep msgdump
Description Turns on debugging for any errors in functioning. Turns on debugging for main events occurring throughout the subsystem. Turns on debugging for FSM activity. Turns on debugging for the movement of TGREP messages. Turns on debugging for the dump of the details of TGREP messages.
DB-2453
Command debug tgrep timer-event debug tgrep timers debug tgrep tripr debug voip eddri
Description Turns on debugging for events that are related to the timer. Turns on debugging for timer activity. Turns on debugging for the TRIP Reporter. Turns on debugging for the EDDRI.
DB-2454
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following shows sample output from the debug tgrep messages command:
tgrep-gw(config-tgrep)#Received an OPEN NBR:14.1.1.210 ------------------------ OPEN DUMP BEGINS -----------------------0x1 0x0 0x0 0xFFFFFFB4 0x0 0x0 0x0 0x19 0x0 0x0 0x45 0x67 0x0 0x0 Version Hold Time My ITAD TRIP ID :1 :180 :25 :17767
No optional parameters -- hence all route types supported. Send-Recv capability in effect ------------------------ OPEN DUMP ENDS ------------------------
After the dump occurs, the TRGREP messages are displayed. In this case, keepalive messages are being received by this gateway.
Enqueued a Keepalive for NBR:14.1.1.210
DB-2455
Received an KEEPALIVE NBR:14.1.1.210 Received Keepalive for NBR:14.1.1.210 Received an KEEPALIVE NBR:14.1.1.210
Related Commands
Command debug tgrep error debug tgrep events debug tgrep fsm debug tgrep io debug tgrep msgdump debug tgrep timer-event debug tgrep timers debug tgrep tripr debug voip eddri
Description Turns on debugging for any errors in functioning. Turns on debugging for main events occurring throughout the subsystem. Turns on debugging for FSM activity. Turns on debugging for detailed socket level activities. Turns on debugging for the dump of the details of TGREP messages. Turns on debugging for events that are related to the timer. Turns on debugging for timer activity. Turns on debugging for the TRIP Reporter. Turns on debugging for the EDDRI.
DB-2456
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following shows sample output from the debug tgrep msgdump command:
tgrep-gw-1-02#Received an KEEPALIVE NBR:14.1.1.210 +++++++++++++++++++++++++++++++++++++ TMSG datagramstart : 0x69188648, 150 bytes ++++++++++++++++++++++++++++++++++++++ 0x0 0xFFFFFF96 0x2 0x0 0x1 0x0 0x0 0x0 0x2 0x0 0x9 0x0 0x5 0x0 0x0 0x0 0x3 0x6D 0x63 0x69 0x0 0x3 0x0 0x6 0x0 0x0 0x4 0xFFFFFFD2 0x0 0x0 0x0 0x4 0x0 0x6 0x2 0x1 0x0 0x0 0x4 0xFFFFFFD2 0x0 0x5 0x0 0x6 0x2 0x1 0x0 0x0 0x4 0xFFFFFFD2 0x0 0x7 0x0 0x4 0x0 0x0 0x0 0x5 0x0 0xF 0x0 0x4 0x0 0x0 0x0 0x16 0x0 0x10 0x0 0x4 0x0 0x0 0x0 0x17 0x0 0x11 0x0 0x8 0x0 0x0 0x0 0x74 0x0 0x0 0x0
DB-2457
0x7B 0x0 0x12 0x0 0x3C 0x0 0x4 0x31 0x31 0x32 0x38 0x0 0x4 0x31 0x31 0x32 0x37 0x0 0x4 0x31 0x31 0x32 0x36 0x0 0x4 0x31 0x31 0x32 0x35 0x0 0x4 0x31 0x31 0x32 0x34 0x0 0x4 0x31 0x31 0x32 0x33 0x0 0x4 0x31 0x31 0x32 0x32 0x0 0x5 0x39 0x39 0x39 0x39 0x39 0x0 0x9 0x31 0x32 0x33 0x34 0x35 0x36 0x37 0x38 0x39
After each event occurs, a dump of the message appears. The entire dump of each keepalive is being displayed.
----------------------------------Received an KEEPALIVE NBR:14.1.1.210 +++++++++++++++++++++++++++++++++++++ TMSG datagramstart : 0x691B0CA0, 92 bytes ++++++++++++++++++++++++++++++++++++++ 0x0 0x5C 0x2 0x0 0x1 0x0 0x0 0x0 0x2 0x0 0xF 0x0 0x3 0x0 0x0 0x0 0x9 0x31 0x32 0x33 0x34 0x35 0x36 0x37 0x38 0x39 0x0 0x3 0x0 0x6 0x0 0x0 0x4 0xFFFFFFD2 0x0 0x0 0x0 0x4 0x0 0x6 0x2 0x1 0x0 0x0 0x4 0xFFFFFFD2 0x0 0x5 0x0 0x6 0x2 0x1 0x0 0x0 0x4 0xFFFFFFD2 0x0 0x7 0x0 0x4 0x0 0x0 0x0 0x5 0x0 0xF 0x0 0x4 0x0 0x0 0x0 0x17 0x0 0x10 0x0 0x4 0x0 0x0 0x0 0x17 0x0 0x11 0x0 0x8 0x0 0x0 0x0 0x75 0x0 0x0 0x0 0x78 ----------------------------------+++++++++++++++++++++++++++++++++++++ TMSG datagramstart : 0x691885EC, 150 bytes ++++++++++++++++++++++++++++++++++++++ 0x0 0xFFFFFF96 0x2 0x0 0x1 0x0 0x0 0x0 0x2 0x0 0x9 0x0 0x5 0x0 0x0 0x0 0x3 0x6D 0x63 0x69 0x0 0x3 0x0 0x6 0x0 0x0 0x4 0xFFFFFFD2 0x0 0x0 0x0 0x4 0x0 0x6 0x2 0x1 0x0 0x0 0x4 0xFFFFFFD2 0x0 0x5 0x0 0x6 0x2 0x1 0x0 0x0 0x4 0xFFFFFFD2 0x0 0x7 0x0 0x4 0x0 0x0 0x0 0x5 0x0 0xF 0x0 0x4 0x0 0x0 0x0 0x16 0x0 0x10 0x0 0x4 0x0 0x0 0x0 0x17 0x0 0x11 0x0 0x8 0x0 0x0 0x0 0x75 0x0 0x0 0x0 0x7C 0x0 0x12 0x0 0x3C 0x0 0x4 0x31 0x31 0x32
DB-2458
December 2010
0x38 0x0 0x4 0x31 0x31 0x32 0x37 0x0 0x4 0x31 0x31 0x32 0x36 0x0 0x4 0x31 0x31 0x32 0x35 0x0 0x4 0x31 0x31 0x32 0x34 0x0 0x4 0x31 0x31 0x32 0x33 0x0 0x4 0x31 0x31 0x32 0x32 0x0 0x5 0x39 0x39 0x39 0x39 0x39 0x0 0x9 0x31 0x32 0x33 0x34 0x35 0x36 0x37 0x38 0x39 ----------------------------------Received an KEEPALIVE NBR:14.1.1.210 Received an KEEPALIVE NBR:14.1.1.210
Related Commands
Command debug tgrep error debug tgrep events debug tgrep fsm debug tgrep io debug tgrep messages debug tgrep timer-event debug tgrep timers debug tgrep tripr debug voip eddri
Description Turns on debugging for any errors in functioning. Turns on debugging for main events occurring throughout the subsystem. Turns on debugging for FSM activity. Turns on debugging for detailed socket level activities. Turns on debugging for the movement of TGREP messages. Turns on debugging for events that are related to the timer. Turns on debugging for timer activity. Turns on debugging for the TRIP Reporter. Turns on debugging for the EDDRI.
DB-2459
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following shows sample output from the debug tgrep timer-event command:
Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry
The Telephony Routing over IP (TRIP) timer registers timeouts until the next event occurs. Here, the timers are reset.
Entering trip_reset_nbr_timers to reset timers Starting the CONNECT timer for nbr NBR:16.1.1.202 for value of 30 seconds Stopping hold timer and keepalive timer while resetting NBR:16.1.1.202 Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 3 at this time The tgrepQ size is 0 at this time
DB-2460
December 2010
Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 3 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry
Here, the TRIP neighbor is cleared, which causes the timer to reset.
Router#clear trip nei * Router#Entering trip_reset_nbr_timers to reset timers Starting the CONNECT timer for nbr NBR:16.1.1.202 for value of 30 seconds Stopping hold timer and keepalive timer while resetting NBR:16.1.1.202 Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 3 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 3 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 3 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 3 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 3 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 3 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 3 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 3 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry IO_CONNECT TIMER for nbr NBR:16.1.1.202 has expired NBR:16.1.1.202 -Restarting the connect timer NBR:16.1.1.202 starting the holder timer after post connect with large value ------------------------ OPEN DUMP BEGINS -----------------------0x1 0xFFFFFFFF 0x0 0xFFFFFFB4 0x0 0x0 0x4 0x58 0x6 0x7
DB-2461
0xFFFFFF98 0xFFFFFFA9 0x0 0xC 0x0 0x1 0x0 0x8 0x0 0x2 0x0 0x4 0x0 0x0 0x0 0x3 Version Hold Time My ITAD TRIP ID :1 :180 :1112 :101161129
Option Paramater #1 Param Type: Capability Length 8 Cap Code :Send Receive Capability Cap Len :4 Send Rec Cap: RCV ONLY MODE -->All route types supported ------------------------ OPEN DUMP ENDS -----------------------NBR:16.1.1.202 Starting keepalive timer after writing something NBR:16.1.1.202 Re-starting hold timer after a message is read Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPNBR:16.1.1.202 Starting keepalive timer after writing so mething NBR:16.1.1.202 Re-starting hold timer after a message is read D timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIIO_CONNECT TIMER for nbr NBR:16.1.1.202 has expired NBR:16.1.1.202 -Stopping the connect timer, no need anymore MER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry NBR:16.1.1.202 Re-starting hold timer after a message is read
DB-2462
December 2010
Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry
Related Commands
Command debug tgrep error debug tgrep events debug tgrep fsm debug tgrep io debug tgrep messages debug tgrep msgdump debug tgrep timers debug tgrep tripr debug voip eddri
Description Turns on debugging for any errors in functioning. Turns on debugging for main events occurring throughout the subsystem. Turns on debugging for FSM activity. Turns on debugging for detailed socket level activities. Turns on debugging for the movement of TGREP messages. Turns on debugging for the dump of the details of TGREP messages. Turns on debugging for timer activity. Turns on debugging for the TRIP Reporter. Turns on debugging for the EDDRI.
DB-2463
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Examples
The following shows sample output from the debug tgrep timers command:
tgrep-gw-1-02#Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time Restarting the router UPD timer after expiry
Field Received a TGREP_UPD_TIMER timeout The bulkSyncQ size is 0 at this time The tgrepQ size is 0 at this time
Description This indicates that a timeout was received. This indicates the size of the bulk sync queue. This indicates the size of the TGREP queue.
Restarting the router UPD timer after This indicates that the timer has been reset. expiry
DB-2464
December 2010
Related Commands
Command debug tgrep error debug tgrep events debug tgrep fsm debug tgrep io debug tgrep messages debug tgrep msgdump debug tgrep timer-event debug tgrep tripr debug voip eddri
Description Turns on debugging for any errors in functioning. Turns on debugging for main events occurring throughout the subsystem. Turns on debugging for FSM activity. Turns on debugging for detailed socket level activities. Turns on debugging for the movement of TGREP messages. Turns on debugging for the dump of the details of TGREP messages. Turns on debugging for events that are related to the timer. Turns on debugging for the TRIP Reporter. Turns on debugging for the EDDRI.
DB-2465
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
There is always a performance penalty when using debug commands. A watched queue is used to inform the TRIPR process about changes in any of the interesting attributes of dial peer that potentially could trigger TRIP update. A dial peer attribute change manifests into a prefix attribute change and is deposited into the watched queue of TRIPR by the Event Dispatcher. The trunk group system also does the same.
Examples
The following shows sample output from the debug tgrep tripr command:
20:51:11: tripr_build_triprtr_prefix_destination_ev 1 advertise 0x2prefix 1128 addrFam 4 20:51:11: tripr_build_triprtr_prefix_destination_ev 20:51:11: tripr_build_triprtr_prefix_destination_ev 20:51:11: 20:51:11: -------------------------------20:51:11: attrib 0x4002 20:51:11: ******* REACHABLE ROUTE ****** 20:51:11: TRIP_AF_E164 1128 20:51:11: ac: 22 20:51:11: 20:51:11: ======================================= 20:51:11: tripr_build_triprtr_prefix_destination_ev 1 advertise 0x27prefix 123456789 addrFam 4 20:51:11: tripr_build_triprtr_prefix_destination_ev 20:51:11: tripr_build_triprtr_prefix_destination_ev : got the ev id 1 reason 64 num_prefix ac 22 tc 23 ac_avg 22 csr success 0 total 0
: got the ev id 1 reason 64 num_prefix ac 22 tc 23 ac_avg 22 csr success 117 total 120
DB-2466
December 2010
20:51:11: tg mci cc mci 20:51:11: tripr_build_triprtr_prefix_destination_ev 20:51:11: 20:51:11: -------------------------------20:51:11: attrib 0x1C002 20:51:11: ******* REACHABLE ROUTE ****** 20:51:11: TRIP_AF_E164 123456789 20:51:11: csr: tot 120 succ 117 20:51:11: ac: 22tc: 23 20:51:11: 20:51:11: ======================================= 20:51:11: tripr_build_triprtr_prefix_destination_ev 1 advertise 0x27prefix 99999 addrFam 4 20:51:11: tripr_build_triprtr_prefix_destination_ev 20:51:11: tripr_build_triprtr_prefix_destination_ev 20:51:11: tg mci cc mci 20:51:11: tripr_build_triprtr_prefix_destination_ev 20:51:11: 20:51:11: -------------------------------20:51:11: attrib 0x1C002 20:51:11: ******* REACHABLE ROUTE ****** 20:51:11: TRIP_AF_E164 99999 20:51:11: csr: tot 0 succ 0 20:51:11: ac: 22tc: 23 20:51:11: 20:51:11: =======================================
: got the ev id 1 reason 64 num_prefix ac 22 tc 23 ac_avg 22 csr success 0 total 0 tg mci cic 0 carrier mci
DB-2467
Field ev id
1Prefix regular event 2Trunk group regular event 3Carrier regular event 4Prefix sync event 5Trunk group sync event 6Carrier sync event 7Null sync event 1Prefix down 2Prefix up 4Prefix trunk group attribute changed 8Prefix available circuits changed 16Prefix total circuits changed 32Prefix CSR changed 64Prefix AC interesting point 128Prefix carrier attributes changed 256Prefix stop advertise configured 512Prefix start advertise configured
DB-2468
December 2010
Table 342
1Trunk group down 2Trunk group up 4Trunk group prefix attribute changed 8Trunk group available circuits changed 16Trunk group total circuits changed 32Trunk group CSR changed 64Trunk group AC interesting point 128Trunk group stop advertise configured 256Trunk group start advertise configured 1Carrier down 2Carrier up 4Carrier prefix attribute changed 8Carrier available circuits changed 16Carrier total circuits changed 32Carrier CSR changed 64Carrier AC interesting point 128Carrier stop advertise configured 256Carrier start advertise configured
Related Commands
Command debug tgrep error debug tgrep events debug tgrep fsm debug tgrep io debug tgrep messsages debug tgrep msgdump debug tgrep timer-event debug tgrep timers debug voip eddri
Description Turns on debugging for any errors in functioning. Turns on debugging for main events occurring throughout the subsystem. Turns on debugging for FSM activity. Turns on debugging for detailed socket level activities. Turns on debugging for the movement of TGREP messages. Turns on debugging for the dump of the details of TGREP messages. Turns on debugging for events that are related to the timer. Turns on debugging for timer activity. Turns on debugging for the EDDRI.
DB-2469
debug tgrm
To display debugging messages for all trunk groups, use the debug tgrm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug tgrm [all | default | detail | error [call [informational] | software [informational]] | function | inout | service] no debug tgrm
Syntax Description
all default detail error call informational software function inout service
(Optional) Displays all TGRM debugging messages. (Optional) Displays detail, error, and inout information. This option also runs if no keywords are added. (Optional) Displays non-inout information related to call processing, such as call updates or call acceptance checking. (Optional) Displays TGRM error messages. (Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software errors. (Optional) Displays TGRM functions. (Optional) Displays information from the functions that form the external interfaces of TGRM to other modules or subsystems. (Optional) Displays TGRM services.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco AS5850 platform. This command was implemented on the Cisco AS5850 platform. The all, default, detail, error, call, informational, software, function, inout, and service keywords were added to this command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Because the debug tgrm command causes a large amount of messages to be generated, router performance can be affected.
DB-2470
December 2010
Caution
The debug tgrm command can impact the performance of your router. This command should only be used during low traffic periods.
Examples
The following is sample output from the debug tgrm all command for an incoming CAS call on a trunk group that is rejected because of the max-calls command:
Router# debug tgrm all 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_accept_call: Timeslot=11, CallType=Voice, CallDirection=Incoming, Slot=2, SubUnit=1, Port=1, DS0-Group=1 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_member_core: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_trunk_member: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_trunk_equal: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_trunk_member: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_trunk_equal: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_member_trunk_internal: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_member_core: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_trunk_member: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_trunk_equal: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_trunk_member: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_trunk_equal: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_trunk_equal: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_trunk_channel_active: Trunk=2/1:1 (TG 211), Timeslot=11, CallType=Voice, CallDirection=Incoming 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_trunk_channel_delete: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_trunk_channel_delete_queue: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_call_count_update: CallDirection=Incoming, Increment call count 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_call_count_update_no_crm: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_call_count_update_no_crm: CountType=TGRM_COUNT_VOICE, CallDirection=Incoming, Increment call count Updated values: CallCount=1, FreeTimeslots=23 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_call_count_update_crm: CallType=Voice, CallDirection=Incoming, Increment the call count 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_info: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_info_internal: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_info_internal: TG 211 found 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_info: TG 211 found 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_status: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_info_internal: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_info_internal: TG 211 found 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_allow_call: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_allow_call: TG 211; CallType=Voice CallDirection=Incoming 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_allow_call: Call denied; CallType=Voice CallDirection=Incoming; MaxAllowed=0 Current=1 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_accept_call: Call Rejected; Reason - Maximum voice calls exceeded 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_info: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_info_internal: 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_info_internal: TG 211 found 03:53:56: //-1/xxxxxxxxxxxx/TGRM/tgrm_tg_info: TG 211 found
DB-2471
CallEntry ID is -1. This indicates that a call leg has not been identified. GUID is xxxxxxxxxxxx. This indicates that the GUID information is unavailable. TGRM is the module name. The tgrm_accept_call field shows that the trunk group is accepting a call.
Timeslot=11, CallType=Voice, CallDirection=Incoming, Slot=2, SubUnit=1, Port=1, DS0-Group=1 tgrm_trunk_channel_active: Trunk=2/1:1 (TG 211), Timeslot=11, CallType=Voice, CallDirection=Incoming tgrm_tg_call_count_update: CallDirection=Incoming, Increment call count tgrm_tg_call_count_update_no_crm: CountType=TGRM_COUNT_VOICE, CallDirection=Incoming, Increment call count Updated values: CallCount=1, FreeTimeslots=23 tgrm_allow_call: TG 211; CallType=Voice CallDirection=Incoming tgrm_allow_call: Call denied; CallType=Voice CallDirection=Incoming; MaxAllowed=0 Current=1 tgrm_accept_call: Call Rejected; Reason - Maximum voice calls exceeded
Shows information about the call, including timeslot, call type and direction, and port information. Shows information for the active trunk group, including the port, timeslot, and call type and direction.
Indicates that the call counter for the trunk group has been incremented. Indicates that the call counter for the trunk group has been updated outside of the Carrier Resource Manager (CRM). This field contains more data than a call counter increment message that uses the CRM.
Shows that a call was rejected on this trunk group due to a maximum number of voice calls being received.
DB-2472
December 2010
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following debug example displays information about the off-ramp TIFF reader.
Router# debug tiff reader *Jan 1 18:59:13.683: tiff_reader_data_handler: new context *Jan 1 18:59:13.683: tiff_reader_data_handler: resolution: standard *Jan 1 18:59:13.683: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() ENGINE_START/DONE gggg(pl 616E9994) *Jan 1 18:59:13.691: tiff_reader_data_handler: buffer size: 1524 *Jan 1 18:59:13.699: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) *Jan 1 18:59:13.703: tiff_reader_put_buffer: START_OF_FAX_PAGEi>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.711: tiff_reader_data_handler: buffer size: 1524 *Jan 1 18:59:13.719: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.727: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.735: tiff_reader_data_handler: buffer size: 1524 *Jan 1 18:59:13.743: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg
DB-2473
*Jan 1 18:59:13.751: tiff_reader_data_handler: buffer size: 1524 *Jan 1 18:59:13.759: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.767: tiff_reader_data_handler: buffer size: 1524 *Jan 1 18:59:13.775: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.787: tiff_reader_data_handler: buffer size: 1524 *Jan 1 18:59:13.795: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.803: tiff_reader_data_handler: buffer size: 1524 *Jan 1 18:59:13.811: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.819: tiff_reader_data_handler: buffer size: 1524 *Jan 1 18:59:13.827: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.835: tiff_reader_data_handler: buffer size: 1524 *Jan 1 18:59:13.843: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.851: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.863: tiff_reader_data_handler: buffer size: 1524 *Jan 1 18:59:13.871: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.879: tiff_reader_data_handler: buffer size: 1524 *Jan 1 18:59:13.887: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.895: tiff_reader_data_handler: buffer size: 1524 *Jan 1 18:59:13.903: tiff_reader_data_handler: buffer size: 1524i>> tiff_reader_engine() case FAX_EBUFFER pppp(pl 616E9994) i>> tiff_reader_engine() case FAX_EBUFFER gggg *Jan 1 18:59:13.907: tiff_reader_data_handler: buffer size: 311i>> tiff_r_finish() END_OF_FAX_PAGE pppp *Jan 1 18:59:13.907: progress *Jan 1 18:59:13.907: *Jan 1 18:59:13.907: *Jan 1 18:59:13.907: tiff_reader_put_buffer: END_OF_FAX_PAGE. Dial now ...if not in tiff_reader_data_handler: END_OF_DATA tiff_reader_data_handler: BUFF_END_OF_PART tiff_reader_data_handler: Dispose context
Related Commands
DB-2474
December 2010
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following debug example shows information about the off-ramp TIFF writer.
Router# debug tiff writer *Jan 1 18:54:59.419: tiff_writer_data_process: START_OF_CONNECTION 18:55:10: %FTSP-6-FAX_CONNECT: Reception *Jan 1 18:55:14.903: tiff_writer_data_process: START_OF_FAX_PAGE *Jan 1 18:55:14.903: tiff_writer_data_process: tiff file created = 2000:01:01 18:55:14 18:55:21: %FTSP-6-FAX_DISCONNECT: Reception *Jan 1 18:55:19.039: tiff_writer_data_process: END_OF_CONNECTION or ABORT_CONNECTION *Jan 1 18:55:19.039: tiff_writer_put_buffer: END_OF_FAX_PAGE *Jan 1 18:55:19.039: send TIFF_PAGE_READY *Jan 1 18:55:19.039: send TIFF_PAGE_READY 18:55:21: %LINK-3-UPDOWN: Interface Serial2:0, changed state to down
Related Commands
DB-2475
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug time-range ipc command. In the following example, the time ranges sent to the line card are monitored:
Router# debug time-range ipc 00:14:19:TRANGE-IPC:Sent Time-range t1 ADD to all slots 00:15:22:TRANGE-IPC:Sent Time-range t1 ADD to all slots
In the following example, the time ranges deleted from the line card are monitored:
Router# debug time-range ipc 00:15:42:TRANGE-IPC:Sent Time-range t1 DEL to all slots 00:15:56:TRANGE-IPC:Sent Time-range t1 DEL to all slots
Related Commands
Description Displays the statistics about the time-range ipc messages between the Route Processor and line card.
DB-2476
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
This command reports several lines of information for each packet sent or received and is intended for low traffic, detailed debugging. The Token Ring interface records provide information regarding the current state of the ring. These messages are only displayed when the debug token events command is enabled. The debug token ring command invokes verbose Token Ring hardware debugging. This includes detailed displays as traffic arrives and departs the unit.
Caution
It is best to use this command only on routers and bridges with light loads.
Examples
The following is sample output from the debug token ring command:
Router# debug token ring TR0: TR0: TR0: TR0: TR0: TR0: TR0: TR0: TR0: TR0: TR0: TR0: TR0: TR0: TR0: Interface is alive, phys. addr 5000.1234.5678 in: MAC: acfc: 0x1105 Dst: c000.ffff.ffff Src: 5000.1234.5678 bf: 0x45 in: riflen 0, rd_offset 0, llc_offset 40 out: MAC: acfc: 0x0040 Dst: 5000.1234.5678 Src: 5000.1234.5678 bf: 0x00 out: LLC: AAAA0300 00009000 00000100 AAC00000 00000802 50001234 ln: 28 in: MAC: acfc: 0x1140 Dst: 5000.1234.5678 Src: 5000.1234.5678 bf: 0x09 in: LLC: AAAA0300 00009000 00000100 AAC0B24A 4B4A6768 74732072 ln: 28 in: riflen 0, rd_offset 0, llc_offset 14 out: MAC: acfc: 0x0040 Dst: 5000.1234.5678 Src: 5000.1234.5678 bf: 0x00 out: LLC: AAAA0300 00009000 00000100 D1D00000 FE11E636 96884006 ln: 28 in: MAC: acfc: 0x1140 Dst: 5000.1234.5678 Src: 5000.1234.5678 bf: 0x09 in: LLC: AAAA0300 00009000 00000100 D1D0774C 4DC2078B 3D000160 ln: 28 in: riflen 0, rd_offset 0, llc_offset 14 out: MAC: acfc: 0x0040 Dst: 5000.1234.5678 Src: 5000.1234.5678 bf: 0x00 out: LLC: AAAA0300 00009000 00000100 F8E00000 FE11E636 96884006 ln: 28
Table 344 describes the significant fields shown in the second line of output.
DB-2477
Table 344
Description Name of the interface associated with the Token Ring event. Indication of whether the packet was input to the interface (in) or output from the interface (out). Type of packet, as follows:
Access Control, Frame Control bytes, as defined by the IEEE 802.5 standard. Destination address of the frame. Source address of the frame. Bridge flags for internal use by technical support staff.
Table 345 describes the significant fields shown in the third line of output.
Table 345 debug token ring Field Descriptions
Description Name of the interface associated with the Token Ring event. Indication of whether the packet was input to the interface (in) or output from the interface (out). Length of the routing information field (RIF) in bytes. Offset (in bytes) of the frame pointing to the start of the RIF field. Offset in the frame pointing to the start of the LLC field.
Table 346 describes the significant fields shown in the fifth line of output.
Table 346 debug token ring Field Descriptions
Description Name of the interface associated with the Token Ring event. Indication of whether the packet was input to the interface (in) or output from the interface (out). Type of frame, as follows:
AAAA0300 ln: 28
This and the octets that follow it indicate the contents (hex) of the frame. The length of the information field (in bytes).
DB-2478
December 2010
debug topology
To enable debugging for topology related events, use the debug topology command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug topology {accounting | all | cache | db | event | ha | interface | locking | sb | state | topoid | vrf} no debug topology {accounting | all | cache | db | event | ha | interface | locking | sb | state | topoid | vrf}
Syntax Description
Enables debugging for topology accounting. Enables debugging for all topology routing events. Enables debugging for topology ID cache activity. Enables debugging for topology DB events. Enables debugging for topology notification events. Enables debugging for topology High Availability (HA) events. Enables debugging for topology interface association. Enables debugging for topology client locking activity. Enables debugging for topology sub-block. Enables debugging for topology state change events. Enables debugging for topology ID management events. Enables debugging for topology VRF association.
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to enable debugging for topology HA events:
Router# debug topology ha
DB-2479
Related Commands
Description Displays status and configuration information for topologies configured with MTR.
DB-2480
December 2010
debug track
To display tracking activity for tracked objects, use the debug track command in privileged EXEC mode. To turn off output, use the no form of this command. debug track no debug track
Syntax Description
Command Modes
Command History
Release 12.2(15)T 12.3(8)T 12.2(25)S 12.2(28)SB 12.2(33)SRA Cisco IOS XE Release 2.1
Modification This command was introduced. The output was enhanced to include the track-list objects. This command was integrated into Cisco IOS Release 12.2(25)S. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS XE Release 2.1.
Usage Guidelines
Use this command to display activity for objects being tracked by the tracking process. These objects can be the state of IP routing, the line-protocol state of an interface, the IP-route reachability, and the IP-route threshold metric.
Examples
The following example shows that object number 100 is being tracked and that the state of IP routing on Ethernet interface 0/2 is down:
Router# debug track Feb Feb Feb Feb 26 26 26 26 19:56:23.247:Track:100 Adding interface object 19:56:23.247:Track:Initialise 19:56:23.247:Track:100 New interface Et0/2, ip routing Down 19:56:23.247:Track:Starting process
The following example shows that object number 100 is being tracked and that the state of IP routing on Ethernet interface 0/2 has changed and is back up:
Router# debug track Feb 26 19:56:41.247:Track:100 Change #2 interface Et0/2, ip routing Down->Up 00:15:07:%LINK-3-UPDOWN:Interface Ethernet0/2, changed state to up 00:15:08:%LINEPROTO-5-UPDOWN:Line protocol on Interface Ethernet0/2, changed state to up
DB-2481
Related Commands
DB-2482
December 2010
debug tsp
Note
Effective with release 12.3(8)T, the debug tsp command is replaced by the debug voip tsp command. See the debug voip tsp command for more information. To display information about the telephony service provider (TSP), use the debug tsp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug tsp {all | call | error | port} no debug tsp {all | call | error | port}
Syntax Description
Enables all TSP debugging (except statistics). Enables call debugging. Error debugging. Port debugging.
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was replaced by the debug voip tsp command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following shows sample output from the debug tsp all command:
Router# debug tsp all 01:04:12:CDAPI TSP RX ===> callId=(32 ), Msg=(CDAPI_MSG_CONNECT_IND,1 ) Sub=(CDAPI_MSG_SUBTYPE_NULL,0 )cdapi_tsp_connect_ind 01:04:12:TSP CDAPI:cdapi_free_msg returns 1 01:04:13:tsp_process_event:[0:D, 0.1 , 3] tsp_cdapi_setup_ack tsp_alert 01:04:13:tsp_process_event:[0:D, 0.1 , 5] tsp_alert_ind 01:04:13:tsp_process_event:[0:D, 0.1 , 10] 01:04:14:tsp_process_event:[0:D, 0.1 , 10] 01:04:17:CDAPI TSP RX ===> callId=(32 ), Msg=(CDAPI_MSG_DISCONNECT_IND,7 ) Sub=(CDAPI_MSG_SUBTYPE_NULL,0 )cdapi_tsp_disc_ind 01:04:17:TSP CDAPI:cdapi_free_msg returns 1 01:04:17:tsp_process_event:[0:D, 0.1 , 27] cdapi_tsp_release_indtsp_disconnet_tdm 01:04:17:tsp_process_event:[0:D, 0.4 , 7] cdapi_tsp_release_comp
DB-2483
Related Commands
Description Displays information about the telephony service provider. Displays the raw message owner, length, and pointer.
DB-2484
December 2010
Syntax Description
(Optional) Displays debugging messages about RBSCP ACK splitting. (Optional) Displays detailed debugging messages about RBSCP. (Optional) Displays debugging messages about the RBSCP messages. (Optional) Displays debugging messages about RBSCP round-trip times (RTTs) and retransmission timeouts (RTOs). (Optional) Displays debugging messages about the RBSCP states. (Optional) Displays debugging messages about RBSCP window stuffing.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug tunnel rbscp command in privileged EXEC mode to troubleshoot RBSCP command operations.
Caution
Use any debugging command with caution as the volume of output generated can slow or stop the router operations. We recommend that this command be used only under the supervision of a Cisco engineer.
Examples
DB-2485
Note
The debug output will vary depending on what the router is configured to do after the debug command is entered. Table 347 describes the significant fields shown in the display.
Table 347 debug tunnel rbscp msg Field Descriptions
Description The router has received and is processing a FWD_TSN message from a peer with a sequence number of 20 hex and a Transport Sequence Number (TSN) of 0 hex. The router is sending a FWD_TSN message to the peer with a TSN of 0 hex, a sequence number of 0D hex and it is for a heartbeat (equivalent of a keepalive).
rbscp_output_a_fwdtsn
The following example turns on debugging messages about RBSCP round-trip times and retransmission timeouts:
Router# debug tunnel rbscp rto Tunnel RBSCP RTT/RTO debugging is on router# *Mar 1 05:36:50.927: update_rtt: cur_rtt:549 ms:548 delay:0 *Mar 1 05:36:50.927: New RTT est:549 RTO:703 *Mar 1 05:37:00.327: update_rtt: cur_rtt:549 ms:548 delay:0 *Mar 1 05:37:00.327: New RTT est:549 RTO:703 *Mar 1 05:37:09.727: update_rtt: cur_rtt:549 ms:548 delay:0 *Mar 1 05:37:09.727: New RTT est:549 RTO:703
Description Displays the updated, previous, and current RTT, in milliseconds, and a number that represents the amount of additional delay from queuing. Displays the estimated new RTT, in milliseconds. Displays the new retransmission timeout, in milliseconds.
Related Commands
DB-2486
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output of debug tunnel route-via command displays the outgoing interface for the tunnel transport.
Router# debug tunnel route-via Tunnel route-via debugging is on *May 22 11:54:34.803: TUN-VIA: Tunnel0 candidate route-via Ethernet0/0, next hop 10.73.2.1 *May 22 11:54:34.803: TUN-VIA: Tunnel0 route-via action is forward Router# no debug tunnel route-via undebug tunnel route-via Tunnel route-via debugging is off
Related Commands
Description Displays information about the physical output tunnel interface. Specifies the outgoing interface of the tunnel transport.
DB-2487
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows the immediate output of the debug txconn all command. For examples of specific debugging messages, see the examples provided for the debug txconn appc, debug txconn config, debug txconn data, debug txconn event, debug txconn tcp, and debug txconn timer commands.
Router# debug txconn all All possible TXConn debugging has been turned on
Related Commands
Command debug snasw debug txconn appc debug txconn config debug txconn data debug txconn event
Description Displays debugging information related to SNA Switching Services. Displays APPC-related trace or error messages for communications with CICS. Displays trace or error messages for CTRC configuration and control blocks for CICS communications. Displays CICS client and host data being handled by CTRC, in hexadecimal notation. Displays trace or error messages for CTRC events related to CICS communications.
DB-2488
December 2010
Displays error messages or traces for TCP/IP communications with CICS. Displays performance information related to CICS communications. Displays the state of each debugging option.
DB-2489
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following shows sample APPC debugging output from the debug txconn appc command:
Router# debug txconn appc 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: 01:18:05: TXCONN-APPC-622ADF38: Verb block = TXCONN-APPC-622ADF38: 0001 0200 0300 0000 0400 0000 0000 0000 TXCONN-APPC-622ADF38: 0000 00FC 0000 0000 0000 0000 0000 0000 TXCONN-APPC-622ADF38: 0000 0000 0840 0007 0000 0000 0000 0000 TXCONN-APPC-622ADF38: 7BC9 D5E3 C5D9 4040 07F6 C4C2 4040 4040 TXCONN-APPC-622ADF38: 4040 4040 4040 4040 4040 4040 4040 4040 TXCONN-APPC-622ADF38: 4040 4040 4040 4040 4040 4040 4040 4040 TXCONN-APPC-622ADF38: 4040 4040 4040 4040 4040 4040 4040 4040 TXCONN-APPC-622ADF38: 4040 4040 4040 4040 0000 0000 0000 0000 TXCONN-APPC-622ADF38: 0000 0000 0000 0000 0000 0000 0000 0000 TXCONN-APPC-622ADF38: 0000 0000 0000 0000 0000 0000 0000 0000 TXCONN-APPC-622ADF38: 00E2 E3C1 D9E6 4BC7 C1E9 C5D3 D3C5 4040 TXCONN-APPC-622ADF38: 4040 0000 0000 0000 0000 0000 TXCONN-APPC-621E5730: Verb block = TXCONN-APPC-621E5730: 0001 0200 0300 0000 0400 0000 0000 0000 TXCONN-APPC-621E5730: 0000 00FD 0000 0000 0000 0000 0000 0000 TXCONN-APPC-621E5730: 0000 0000 0840 0007 0000 0000 0000 0000 TXCONN-APPC-621E5730: C9C2 D4D9 C4C2 4040 07F6 C4C2 4040 4040 TXCONN-APPC-621E5730: 4040 4040 4040 4040 4040 4040 4040 4040 TXCONN-APPC-621E5730: 4040 4040 4040 4040 4040 4040 4040 4040 TXCONN-APPC-621E5730: 4040 4040 4040 4040 4040 4040 4040 4040 TXCONN-APPC-621E5730: 4040 4040 4040 4040 0000 0000 0000 0000
DB-2490
December 2010
0000 0000 0000 0000 0000 0000 D3D3 C140 4040 0000
Related Commands
Command debug snasw debug txconn all debug txconn config debug txconn data debug txconn event debug txconn tcp debug txconn timer show debugging
Description Displays debugging information related to SNA Switching Services. Displays all CTRC debugging information related to communications with CICS. Displays trace or error messages for CTRC configuration and control blocks for CICS communications. Displays CICS client and host data being handled by CTRC, in hexadecimal notation. Displays trace or error messages for CTRC events related to CICS communications. Displays error messages or traces for TCP/IP communications with CICS. Displays performance information related to CICS communications. Displays the state of each debugging option.
DB-2491
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following shows sample output from the debug txconn config command:
Router# debug txconn config 22:11:37: 22:11:37: 22:11:37: 22:11:44: 22:11:44: 22:11:44: 22:11:48: 22:11:53: 22:11:54: TXCONN-CONFIG: TXCONN-CONFIG: TXCONN-CONFIG: TXCONN-CONFIG: TXCONN-CONFIG: TXCONN-CONFIG: TXCONN-CONFIG: TXCONN-CONFIG: TXCONN-CONFIG: deleting transaction 61FCE414 deleting connection 61FB5CB0 server 62105D6C releases connection 61FB5CB0 new connection 61FB64A0 server 6210CEB4 takes connection 61FB64A0 new transaction 61E44B9C deleting transaction 61E44B9C new transaction 61E44B9C deleting transaction 61E44B9C
DB-2492
December 2010
Related Commands
Command debug snasw debug txconn all debug txconn appc debug txconn data debug txconn event debug txconn tcp debug txconn timer show debugging
Description Displays debugging information related to SNA Switching Services. Displays all CTRC debugging information related to communications with CICS. Displays APPC-related trace or error messages for communications with CICS. Displays CICS client and host data being handled by CTRC, in hexadecimal notation. Displays trace or error messages for CTRC events related to CICS communications. Displays error messages or traces for TCP/IP communications with CICS. Displays performance information related to CICS communications. Displays the state of each debugging option.
DB-2493
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following shows selected output from the debug txconn data command when a connection is established, data is received from the client via TCP/IP, data is sent to the client, and then the connection is closed.
Router# debug txconn data TXConn DATA debugging is on 00:04:50: 00:04:50: 00:04:50: 00:04:50: 00:06:27: 00:06:53: TXConn(62197464) TXConn(62197464) TXConn(62197464) TXConn(62197464) TXConn(62197464) TXConn(62175024) Created State(0) MsgID(0) -> nextState(1) Client->0000 003A 0000 0002 000B 90A0 Received LL 58 for session(0 0 2). Client<-0000 0036 0000 0003 000B 8001 0707 0864 Deleted
The following lines show output when data is sent to the host:
00:04:50: 00:04:50: 00:04:50: sec(0) 00:04:50: 00:04:50: TXTrans(id:62197910 conn:62197464 addr:2) LL(58) FMH5(0) CEBI(0) TXTrans(id:62197910 conn:62197464 addr:2) State(0) MsgID(7844) -> nextState(1) TXTrans(id:62197910 conn:62197464 addr:2) conversationType(mapped) syncLevel(1) TXTrans(id:62197910 conn:62197464 addr:2) TPName CCIN TXTrans(id:62197910 conn:62197464 addr:2) apDataLength(32) GDSID(12FF)
DB-2494
December 2010
00:04:50: TXTrans(id:62197910 conn:62197464 addr:2) ->Host 0000 0008 03F4 F3F7 0000 0008 0401 0000
The following lines show output when data is received from the host:
00:05:01: TXTrans(id:62197910 conn:62197464 addr:2) <-Host 0000 0002 0092 12FF 0000 000C 0102 0000
The following lines show CTRC generating an FMH7 error message indicating that a CICS transaction has failed at the host or has been cleared by a router administrator:
00:06:27: TXTrans(id:6219853C conn:62197464 addr:3) Generating FMH7. 00:06:27: %TXCONN-3-TXEXCEPTION: Error occurred from transaction 3 of client 157.151.241.10 connected to server CICSC, exception type is 9
The following line shows CTRC responding to an FMH7 error message sent by the CICS client program:
00:07:11: TXTrans(id:62197910 conn:62197464 addr:2) Generating FMH7 +RSP.
Related Commands
Command debug snasw debug txconn all debug txconn appc debug txconn config debug txconn event debug txconn tcp debug txconn timer show debugging
Description Displays debugging information related to SNA Switching Services. Displays all CTRC debugging information related to communications with CICS. Displays APPC-related trace or error messages for communications with CICS. Displays trace or error messages for CTRC configuration and control blocks for CICS communications. Displays trace or error messages for CTRC events related to CICS communications. Displays error messages or traces for TCP/IP communications with CICS. Displays performance information related to CICS communications. Displays the state of each debugging option.
DB-2495
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following shows sample output from the debug txconn event command:
Router# debug txconn event TXConn event debugging is on Router# 22:15:08: TXCONN-EVENT: [*] Post to 61FC6170, msgid 0x6372 'cr', buffer 22:15:08: TXCONN-EVENT: Dispatch to msgid 6372 'cr', buffer 6211289C. 22:15:08: TXCONN-EVENT: [*] Post to 621164D0, msgid 0x7844 'xD', buffer 22:15:08: TXCONN-EVENT: [*] Post to 61FC6170, msgid 0x6347 'cG', buffer 22:15:08: TXCONN-EVENT: Dispatch to msgid 7844 'xD', buffer 0. 22:15:08: TXCONN-EVENT: Dispatch to msgid 6347 'cG', buffer 0. 22:15:08: TXCONN-EVENT: [*] Post to 61FC6170, msgid 0x6372 'cr', buffer 22:15:08: TXCONN-EVENT: Dispatch to msgid 6372 'cr', buffer 6211289C. 22:15:08: TXCONN-EVENT: [*] Post to 61FBFBF4, msgid 0x7844 'xD', buffer 22:15:08: TXCONN-EVENT: [*] Post to 61FC6170, msgid 0x6347 'cG', buffer
62146464(cn), from 6211E744(tc), msg 6211289C. 62146464, from 6211E744, msg 61FC6170, 61E44BA0(sn), from 62146464(cn), msg 0. 6211E744(tc), from 62146464(cn), msg 0. 61E44BA0, from 62146464, msg 621164D0, 6211E744, from 62146464, msg 61FC6170, 62146464(cn), from 6211E744(tc), msg 6211289C. 62146464, from 6211E744, msg 61FC6170, 61E44BA0(sn), from 62146464(cn), msg 0. 6211E744(tc), from 62146464(cn), msg 0.
DB-2496
December 2010
22:15:08: TXCONN-EVENT: Dispatch to msgid 7844 'xD', buffer 0. 22:15:08: TXCONN-EVENT: [*] Post to 621164D0, msgid 0x634F 'cO', buffer 22:15:08: TXCONN-EVENT: Dispatch to msgid 6347 'cG', buffer 0.
61E44BA0, from 62146464, msg 61FBFBF4, 61FC6394(ap), from 61E44BA0(sn), msg 0. 6211E744, from 62146464, msg 61FC6170,
Related Commands
Command debug snasw debug txconn all debug txconn appc debug txconn config debug txconn data debug txconn tcp debug txconn timer show debugging
Description Displays debugging information related to SNA Switching Services. Displays all CTRC debugging information related to communications with CICS. Displays APPC-related trace or error messages for communications with CICS. Displays trace or error messages for CTRC configuration and control blocks for CICS communications. Displays CICS client and host data being handled by CTRC, in hexadecimal notation. Displays error messages or traces for TCP/IP communications with CICS. Displays performance information related to CICS communications. Displays the state of each debugging option.
DB-2497
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following shows sample output from the debug txconn tcp command:
Router# debug txconn tcp TXCONN-TCP-63528473: tcpdriver_passive_open returned NULL TXCONN-TCP-63528473: (no memory) tcp_reset(63829482) returns 4 TXCONN-TCP: tcp_accept(74625348,&error) returns tcb 63829482, error 4 TXCONN-TCP: (no memory) tcp_reset(63829482) returns 4 TXCONN-TCP-63528473: (open) tcp_create returns 63829482, error = 4 TXCONN-TCP-63528473: tcb_connect(63829482,1.2.3.4,2010) returns 4 TXCONN-TCP-63528473: (open error) tcp_reset(63829482) returns 4 TXCONN-TCP-63528473: tcp_create returns 63829482, error = 4 TXCONN-TCP-63528473: tcb_bind(63829482,0.0.0.0,2001) returns 4 TXCONN-TCP-63528473: tcp_listen(63829482,,) returns 4 TXCONN-TCP-63528473: (errors) Calling tcp_close (63829482)
DB-2498
December 2010
Related Commands
Command debug ip debug snasw debug txconn all debug txconn appc debug txconn config debug txconn data debug txconn event debug txconn timer show debugging
Description Displays debugging information related to TCP/IP communications. Displays debugging information related to SNA Switching Services. Displays all CTRC debugging information related to communications with CICS. Displays APPC-related trace or error messages for communications with CICS. Displays trace or error messages for CTRC configuration and control blocks for CICS communications. Displays CICS client and host data being handled by CTRC, in hexadecimal notation. Displays trace or error messages for CTRC events related to CICS communications. Displays performance information related to CICS communications. Displays the state of each debugging option.
DB-2499
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows turnaround time and host response time in milliseconds for a CICS transaction requested through CTRC. Turnaround time is measured from when CTRC receives the first request packet for the transaction until CTRC sends the last response packet of the transaction to the client. Host response time is measured from when CTRC sends the last request packet for a transaction to the host until CTRC receives the first response packet from the host for that transaction.
Router# debug txconn timer TXConn timer debugging is on 00:04:14: TXTrans(id:622F4350 conn:62175024 addr:1) Turnaround Time = 4536(msec) HostResponseTime = 120(msec)
Related Commands
Command debug snasw debug txconn all debug txconn appc debug txconn config
Description Displays debugging information related to SNA Switching Services. Displays all CTRC debugging information related to communications with CICS. Displays APPC-related trace or error messages for communications with CICS. Displays trace or error messages for CTRC configuration and control blocks for CICS communications.
DB-2500
December 2010
Command debug txconn data debug txconn event debug txconn tcp show debugging
Description Displays CICS client and host data being handled by CTRC, in hexadecimal notation. Displays trace or error messages for CTRC events related to CICS communications. Displays error messages or traces for TCP/IP communications with CICS. Displays the state of each debugging option.
DB-2501
debug udptn
To display debug messages for UDP Telnet (UDPTN) events, use the debug udptn command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug udptn no debug udptn
Syntax Description
Defaults
Disabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
Related Commands
Description Enables transmission or reception of UDP packets. Defines the protocol that can be used for outgoing connections from a line.
DB-2502
December 2010
Syntax Description
transfer transfer-method
(Optional) Specifies the type of transfer method for which messages are to be displayed on the console. One of the following options: interrupt, bulk, or control.
Command Default
None
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into the Cisco 7200VXR NPE-G2 platform. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug usb driver command produces a large amount of data that might slow down your system, so use this command with caution.
Examples
The following sample debug output is produced when the debug usb driver command with the transfer and control keywords is issued and when an eToken is unplugged and plugged back in:
Router# debug usb driver transfer bulk USB Driver Bulk Transfer debugging is on Router# debug usb driver transfer control USB Driver Control Transfer debugging is on Router# debug usb stack Stack debugging is on Router# Router# *Dec 22 06:18:29.399:%USB_HOST_STACK-6-USB_DEVICE_DISCONNECTED:A USB device has been removed from port 1. *Dec 22 06:18:29.499:Detached:
DB-2503
*Dec 22 06:18:29.499:Host: 1 *Dec 22 06:18:29.499:Address: 18 *Dec 22 06:18:29.499:Manufacturer: AKS *Dec 22 06:18:29.499:Product: eToken Pro 4254 *Dec 22 06:18:29.499:Serial Number: Router# *Dec 22 06:18:29.499:%USB_TOKEN_FILESYS-6-USB_TOKEN_REMOVED:USB Token device removed:usbtoken1. *Dec 22 06:18:29.499:%CRYPTO-6-TOKENREMOVED:Cryptographic token eToken removed from usbtoken1 Router# Router# Router# Router# Router# *Dec 22 06:18:38.063:%USB_HOST_STACK-6-USB_DEVICE_CONNECTED:A Low speed USB device has been inserted in port 1. *Dec 22 06:18:38.683:ATTACHED===>Class-driver activated *Dec 22 06:18:38.683:Host: 1 *Dec 22 06:18:38.683:Address: 19 *Dec 22 06:18:38.683:Manufacturer: AKS *Dec 22 06:18:38.683:Product: eToken Pro 4254 *Dec 22 06:18:38.683:Serial Number: *Dec 22 06:18:39.383:Control Transfer Device Handle:0x3010000 Direction:0x0 Request:0x1 Type:0x40 Recipient:0x0 ValueDesc:0x0 ValueIndex:0x0 Index:0x0 *Dec 22 06:18:39.383:Control Transfer Device Handle:0x3010000 Direction:0x80 Request:0x81 Type:0x40 Recipient:0x0 ValueDesc:0x0 ValueIndex:0x0 Index:0x0 *Dec 22 06:18:39.407:Control Transfer Device Handle:0x3010000 Direction:0x0 Request:0x3 Type:0x40 Recipient:0x0 ValueDesc:0x0 ValueIndex:0x0 Index:0x0 *Dec 22 06:18:39.407:Control Transfer Device Handle:0x3010000 Direction:0x80 Request:0 my3825#x83 Type:0x40 Recipient:0x0 ValueDesc:0x0 ValueIndex:0x0 Index:0x0
DB-2504
December 2010
*Dec 22 06:18:39.503:Control Transfer Device Handle:0x3010000 Direction:0x0 Request:0x2 Type:0x40 Recipient:0x0 ValueDesc:0x0 ValueIndex:0x0 Index:0x0 *Dec 22 06:18:39.507:Control Transfer Device Handle:0x3010000 Direction:0x80 Request:0x82 Type:0x40 Recipient:0x0 ValueDesc:0x0 ValueIndex:0x0 Index:0x0 *Dec 22 06:18:39.507:%USB_TOKEN_FILESYS-6-USB_TOKEN_INSERTED:USB Token device inserted:usbtoken1. *Dec 22 06:18:39.515:Control Transfer Device Handle:0x3010000 Direction:0x0 Request:0x6 Type:0x40 Recipient:0x0 ValueDesc:0x0 ValueIndex:0x0 Index:0x0 *Dec 22 06:18:39.515:%USB_TOKEN_FILESYS-6-REGISTERING_WITH_IFS:Registering USB Token File System usbtoken1:might take a while... *Dec 22 06:18:39.515:Control Transfer Device Handle:0x3010000 Direction:0x80 Request:0x86 Type:0x40 Recipient:0x0 ValueDesc:0x0 ValueIndex:0x0 Index:0x0 *Dec 22 06:18:39.543:Control Transfer Device Handle:0x3010000 Direction:0x0 Request:0x6 Type:0x40 Recipient:0x0 ValueDesc:0x0 ValueIndex:0x0 Index:0x0 . . .
DB-2505
debug user-group
To display information about the user group, use the debug user-group command in privileged EXEC mode. To disable this feature, use the no form of this command. debug user-group {additions | all | api | database | deletions} no debug user-group {additions | all | api | database | deletions}
Syntax Description
Displays debugging information about additions to the user-group. Displays all debugging information about the user-group. Displays debugging information about the user-group Application Programming Interface (API). Displays debugging information about the user-group database of associated source IP addresses. Displays debugging information about deletions from the user-group.
Command Modes
Command History
Release 12.4(20)T
Usage Guidelines
Examples
Related Commands
Command user-group
DB-2506
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
V.120 is an ITU specification that allows for reliable transport of synchronous, asynchronous, or bit transparent data over ISDN bearer channels. For complete information on the V.120 process, use the debug v120 packet command along with the debug v120 event command. V.120 events are activity events rather than error conditions.
Examples
The following is sample output from the debug v120 event command of V.120 starting up and stopping. Also included is the interface that V.120 is running on (BR 0) and where the V.120 configuration parameters are obtained from (default).
Router# debug v120 event 0:01:47: BR0:1-v120 started - Setting default V.120 parameters 0:02:00: BR0:1:removing v120
Related Commands
Description Displays general information on all incoming and outgoing V.120 packets.
DB-2507
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug v120 packet command shows every packet on the V.120 session. You can use this information to determine whether incompatibilities exist between Ciscos V.120 implementation and other vendors V.120 implementations. V.120 is an ITU specification that allows for reliable transport of synchronous, asynchronous, or bit transparent data over ISDN bearer channels. For complete information on the V.120 process, use the debug v120 events command along with the debug v120 packet command.
Examples
The following is sample output from the debug v120 packet command for a typical session startup:
Router# debug v120 packet 0:03:27: BR0:1: I SABME:lli 256 C/R 0 P/F=1 0:03:27: BR0:1: O UA:lli 256 C/R 1 P/F=1 0:03:27: BR0:1: O IFRAME:lli 256 C/R 0 N(R)=0 N(S)=0 P/F=0 len 43 0x83 0xD 0xA 0xD 0xA 0x55 0x73 0x65 0x72 0x20 0x41 0x63 0x63 0x65 0x73 0x73 0:03:27: BR0:1: I RR:lli 256 C/R 1 N(R)=1 P/F=0 0:03:28: BR0:1: I IFRAME:lli 256 C/R 0 N(R)=1 N(S)=0 P/F=0 len 2 0x83 0x63 0:03:28: BR0:1: O RR:lli 256 C/R 1 N(R)=1 P/F=0 0:03:29: BR0:1: I IFRAME:lli 256 C/R 0 N(R)=1 N(S)=1 P/F=0 len 2 0x83 0x31 0:03:29: BR0:1: O RR:lli 256 C/R 1 N(R)=2 P/F=0 %LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0: B-Channel 1, changed state to up 0:03:31: BR0:1: I IFRAME:lli 256 C/R 0 N(R)=1 N(S)=2 P/F=0 len 2 0x83 0x55 0:03:32: BR0:1: I IFRAME:lli 256 C/R 0 N(R)=1 N(S)=3 P/F=0 len 3 0x83 0x31 0x6F 0:03:32: BR0:1: O RR:lli 256 C/R 1 N(R)=3 P/F=0 0:03:32: BR0:1: I IFRAME:lli 256 C/R 0 N(R)=1 N(S)=4 P/F=0 len 2 0x83 0x73 0:03:32: BR0:1: O RR:lli 256 C/R 1 N(R)=5 P/F=0 0:03:32: BR0:1: I IFRAME:lli 256 C/R 0 N(R)=1 N(S)=5 P/F=0 len 2 0x83 0xA 0:03:32: BR0:1: O IFRAME:lli 256 C/R 0 N(R)=6 N(S)=1 P/F=0 len 9 0x83 0xD 0xA 0x68 0x65 0x66 0x65 0x72 0x3E
DB-2508
December 2010
Descriptions Interface number associated with this debugging information. Packet going into or out of the interface. V120 packet type:
SABMESet asynchronous balanced mode, extended USUnnumbered acknowledgment IFRAMEInformation frame RRReceive ready
Logical link identifier number. Command or response. Poll final. Number received. Number sent. Number of data bytes in the packet. Up to 16 bytes of data.
Related Commands
DB-2509
debug vg-anylan
To monitor error information and 100VG-AnyLAN port adapter connection activity, use the debug vg-anylan command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vg-anylan no debug vg-anylan
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
Examples
Table 350 lists the messages that could be generated by this command.
Table 350 debug vg-anylan Message Descriptions
Description Lost carrier debug message. The VG controller detects that the link to the hub is down due to cable, hub, or VG controller problem.
Action Check, repair, or replace the cable or hub. If you determine that the cable and hub are functioning normally, repair or replace the 100VG-AnyLAN port adapter. Check, repair, or replace the cable or hub. If you determine that the cable and hub are functioning normally, repair or replace the 100VG-AnyLAN port adapter.
%HP100VG-5-CABLEE Bad cable error messages. RR: HP100VG(2/0), cable Cable did not pass training.1 error, training failed
No cable attached error Check, repair, or replace the cable or message. The VG MAC cannot hub. If you determine that the cable and hear tones from the hub.1 hub are functioning normally, repair or replace the 100VG-AnyLAN port adapter.
DB-2510
December 2010
Table 350
Description Training to the VG network failed. Login to the hub rejected by the hub.1
%HP100VG-1-DUPMAC: HP100VG(2/0), A duplicate MAC address has been detected. HP100VG-1-LANCNF: HP100VG(2/0), Configuration is not compatible with the network. %HP100VG-1-ACCESS: HP100VG(2/0), Access to network is not allowed.
Duplicate MAC address on the Check the router configuration to make sure that no duplicate MAC address is same VG network. Two VG configured. devices on the same LAN segment have the same MAC address. Check that the configuration of the hub for Frame Format, Promiscuous, and Repeater bit indicates the proper configuration. Check the configuration of the hub.
%HP100VG-1-LANCNF: Configuration of the router is not compatible to the network. HP100VG(2/0), Configuration is not compatible with the network %HP100VG-1-ACCESS: Access to the VG network is HP100VG(2/0), Access to denied by the hub. network is not allowed
%HP100VG-3-NOTHP10 Could not find the 100VG PCI Make sure the 100VG-AnyLAN port 0VG: Device reported device on a 100VG-AnyLAN adapter is properly seated in the slot. port adapter. Otherwise repair or replace the 0x5101A 100VG-AnyLAN port adapter. %HP100VG-1-DISCOVE No 100VG interface detected R: Only found 0 interfaces on a 100VG-AnyLAN port adapter in a slot. on bay 2, shutting down bay Make sure the 100VG-AnyLAN port adapter is properly seated in the slot. Otherwise repair or replace the 100VG-AnyLAN port adapter.
1. This message might be displayed when the total load on the cascaded hub is high. Wait at least 20 seconds before checking to determine if the training really failed. Check if the protocol is up after 20 seconds before starting troubleshooting.
DB-2511
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was modified. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following shows sample output when you use the debug video vicm command. Comments are enclosed in asterisks (*).
Router# debug video vicm Video ViCM FSM debugging is on ***** Starting Video call ***** Router# SVC HANDLE in rcvd:0x80001B: 00:42:55:ViCM - current state = Idle, Codec Ready 00:42:55:ViCM - current event = SVC Setup 00:42:55:ViCM - new state = Call Connected 00:42:55:ViCM - current state = Call Connected 00:42:55:ViCM - current event = SVC Connect Ack 00:42:55:ViCM - new state = Call Connected *****Video Call Disconnecting***** Router# 00:43:54:ViCM - current state = Call Connected 00:43:54:ViCM - current event = SVC Release 00:43:54:ViCM - new state = Remote Hangup
DB-2512
December 2010
00:43:54:ViCM - current state = Remote Hangup 00:43:54:ViCM - current event = SVC Release Complete 00:43:54:ViCM - new state = Remote Hangup mc3810_video_lw_periodic:Codec is not ready mc3810_video_lw_periodic:sending message 00:43:55:ViCM - current state = Remote Hangup 00:43:55:ViCM - current event = DTR Deasserted 00:43:55:ViCM - new state = Idle mc3810_video_lw_periodic:Codec is ready mc3810_video_lw_periodic:sending message 00:43:55:ViCM - current state = Idle 00:43:55:ViCM - current event = DTR Asserted 00:43:55:ViCM - new state = Idle, Codec Ready
DB-2513
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug vlan packet command displays only packets with a VLAN identifier that the router is not configured to support. This command allows you to identify other VLAN traffic on the network. Virtual LAN packets that the router is configured to route or switch are counted and indicated when you use the show vlans command.
Examples
The following is sample output from the debug vlan packet output. In this example, a VLAN packet with a VLAN ID of 1000 was received on FDDI interface 0 and this interface was not configured to route or switch this VLAN packet:
Router# debug vlan packet vLAN: IEEE 802.10 packet bearing vLAN ID 1000 received on interface Fddi0 which is not configured to route/switch ID 1000.
DB-2514
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug voice aaa asnl command is a subset of the debug voice aaa command. It displays only events and error information related to the Accounting Server Connectivity Failure and Recovery Detection feature.
Examples
The following output is displayed when the debug voice aaa asnl command is entered:
Router# debug voice aaa asnl 01:39:15:voip_aaa_accounting_pthru_send:Method List Name:ml1, aaa_av_list 0x62D69FCC, acct_rec_type 3 01:39:15:voip_aaa_search_mlist_node_by_name:Method List Name:ml15 01:39:15:voip_aaa_accounting_pthru_send:Accounting Probe UID=1, adb = 629977A0 01:39:15:voip_aaa_accounting_pthru_send(1):increment num_acct_sent counter
DB-2515
Description Accounting record type: START (1), UPDATE (2), STOP (3), ACCT_ON (4). ID of the accounting probe record. Method list name.
DB-2516
December 2010
Syntax Description
slot/port
(Optional) The slot and port number of the voice port. If the slot and port arguments are entered, only debugging information for that voice port is displayed. If the slot and port are not entered, debugging information for all voice ports is displayed.
Command Modes
Privileged EXEC
Usage Guidelines
Examples
The debug voice all command output provides debug output for all the debug commands for the Voice Call Manager compiled into one display. For sample output of the individual commands, see the sample displays for the debug voice cp, debug voice eecm, debug voice protocol, debug voice signaling, and debug voice tdsm commands.
Related Commands
Command debug voice eecm debug voice protocol debug voice signaling debug voice tdsm debug voice ccapi
Description Displays debugging information for the Voice End-to-End Call Manager. Displays debugging information for the Voice Line Protocol State machine. Displays debugging information for the voice port signaling. Displays debugging information for the voice tandem switch. Debugs the call control API.
DB-2517
debug voice cp
To display debugging information for the Voice Call Processing State Machine, use the debug voice cp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug voice cp [slot/port] no debug voice cp [slot/port]
Syntax Description
slot/port
(Optional) The slot and port number of the voice port. If the slot and port arguments are entered, only debugging information for that voice port is displayed.
Command Modes
Privileged EXEC
Usage Guidelines
Examples
DB-2518
December 2010
Related Commands
Command debug voice all debug voice eecm debug voice protocol debug voice signaling debug voice tdsm
Description Displays debugging information for all components of the Voice Call Manager. Displays debugging information for the Voice End-to-End Call Manager. Displays debugging information for the Voice Line protocol State machine. Displays debugging information for the voice port signaling. Displays debugging information for the voice tandem switch.
DB-2519
Syntax Description
details
(Optional) Displays debugging information for the crash dump feature details. There is no debug output until there is one DSP crash. When the crash dump feature is turned on, the detailed debug messages are displayed. (Optional) Displays debugging information for the crash dump feature keepalives. Confirms that a crash dump file has been written to the specified destination.
keepalives
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
DSP resource management (DSPRM) sends a debug message to the console that confirms that a crash dump file has been written to the specified destination.
Caution
Enabling this debug feature adds extra time for the DSP to recover. The keepalive and detail keywords produce large volumes of output and should not be used except under the direction of a Cisco engineer. You can also use the undebug all command to disable debugging output.
Examples
The following example shows a debug message that confirms that a crash dump file has been written to the specified destination. The stack is displayed on the console, and the DSPware version, complexity (image set), and Cisco IOS software version is also displayed.
Router# debug voice dsp crash-dump keepalives *Mar *Mar *Mar 8 03:42:19.505:Got back DSP status 0x12 0x0 for dsp 9 slot 1 8 03:42:19.509:Got back DSP status 0x12 0x0 for dsp 10 slot 1 8 03:42:19.509:Got back DSP status 0x12 0x0 for dsp 11 slot 1
DB-2520
December 2010
8 8 8 8 8 8 8 8 8
03:42:19.509:Got back DSP status 0x12 03:42:19.509:Got back DSP status 0x12 03:42:19.509:Got back DSP status 0x12 03:42:21.509:status cleared done, dsp 03:42:21.513:status cleared done, dsp 03:42:21.513:status cleared done, dsp 03:42:21.513:status cleared done, dsp 03:42:21.513:status cleared done, dsp 03:42:21.513:status cleared done, dsp
0x0 for dsp 12 slot 1 0x0 for dsp 13 slot 1 0x0 for dsp 14 slot 1 9 slot 1 10 slot 1 11 slot 1 12 slot 1 13 slot 1 14 slot 1
The following command disables all the debugging output on the screen to stop the output from the debug voice dsp crash-dump keepalives command:
Router# undebug all
The following example shows the debug voice dsp crash-dump details command entry when no DSP crash is present. There is no debugging output until there is one DSP crash. When the crash dump feature is turned on, the detailed debug messages are displayed.
Router# debug voice dsp crash-dump details
Related Commands
Description Displays voice dsp crash dump information. Enables the crash dump feature and specifies the destination file and the file limit.
DB-2521
Syntax Description
slot/port
(Optional) Slot and port number of the voice port. If the slot and port arguments are entered, only debugging information for that voice port is displayed.
Command Modes
Privileged EXEC
Usage Guidelines
Examples
The following is sample output from the debug voice eecm command:
Router# debug voice eecm 1/1: EECM(in), ST_NULL EV_ALLOC_DSP 1/1: EECM(in), ST_DIGIT_COLLECT EV_PARSE_DIGIT 1/1: EECM(in), ST_DIGIT_COLLECT EV_PARSE_DIGIT 1/1: EECM(in), ST_DIGIT_COLLECT EV_PARSE_DIGIT 1/1: EECM(in), ST_DIGIT_COLLECT EV_PARSE_DIGIT 1/1: EECM(in), ST_ADDRESS_DONE EV_OUT_SETUP -1/-1: EECM(out), ST_NULL EV_IN_SETUP 1/1: EECM(in), ST_OUT_REQUEST EV_IN_PROCEED 1/2: EECM(out), ST_SEIZE EV_ALLOC_DSP 1/2: EECM(out), ST_SEIZE EV_OUT_ALERT 1/1: EECM(in), ST_OUT_REQUEST EV_IN_ALERT 1/1: EECM(in), ST_OUT_REQUEST EV_OUT_ALERT_ACK 1/2 EECM(out), ST_IN_PENDING EV_OUT_CONNECT 1/1: EECM(in), ST_WAIT_FOR_ANSWER EV_IN_CONNECT 1/2: EECM(out), ST_ACTIVE EV_OUT_REL 1/1: EECM(in), ST_ACTIVE EV_IN_REL 1/1: EECM(in), ST_DISCONN_PENDING EV_OUT_REL_ACK
3 7 0 2
Related Commands
Command debug voice all debug voice protocol debug voice signaling debug voice tdsm debug voice ccapi
Description Displays debugging information for all components of the Voice Call Manager. Displays debugging information for the Voice Line protocol State machine. Displays debugging information for the voice port signaling. Displays debugging information for the voice tandem switch. Debugs the call control API.
DB-2522
December 2010
Syntax Description
detail summary
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Disable console logging and use buffered logging before using the debug voice enum command. Using the debug voice enum command generates a large volume of debugs, which can affect router performance.
Examples
The following is sample output from the debug voice enum detail command. The output shows the match number as 5108891234, ENUM table as 10. Rule 1 in table 10 matched the pattern and after applying the replacement rule, the resulting string is 5108891234. The ENUM query is sent out for the domain 4.3.2.1.9.8.8.0.1.5.e164.cisco.com. The output then shows the matching Naming Authority Pointer (NAPTR) records obtained in the response. The records are then processed and the final URLs (contact lists) are shown toward the end.
Router# debug voice enum detail enum_resolve_domain:match_num 5108891234 table_indx 10 enum_resolve_domain:rule 1 result string 5108891234 generate_enum_search_string :search string 4.3.2.1.9.8.8.0.1.5.e164.cisco.com enum_dns_query:name = 4.3.2.1.9.8.8.0.1.5.e164.cisco.com type = 35, ns_server = 0 order 100 pref 10 service sip+E2U flag U regexp /^.*$/sip:[email protected]/ replacement order 200 pref 10 service h323+E2U flag U regexp /^.*$/h323:[email protected]/ replacement num_elem = 2 NAPTR Record :order 100 pref 10 service sip+E2U
DB-2523
flags U regexp /^.*$/sip:[email protected]/ replacement NAPTR Record :order 200 pref 10 service h323+E2U flags U regexp /^.*$/h323:[email protected]/ replacement decode_naptr_record :re_string ^.*$ decode_naptr_record :re_substitution_string sip:[email protected] decode_naptr_record :re_flags_string U_FLAG case, stopping query new_e164_user sip:[email protected] decode_naptr_record :re_string ^.*$ decode_naptr_re tahoe13#cord :re_substitution_string h323:[email protected] decode_naptr_record :re_flags_string U_FLAG case, stopping query new_e164_user h323:[email protected] contact_list : sip:[email protected] contact_list : h323:[email protected] enum_resolve_domain:contact_list 64558450
A sample output of the debug voice enum summary command is shown below. The output shows the matching number, the ENUM table used and the rule in the table that matched the number along with the resulting string. Note that this output is a subset of the output from debug voice enum detail command.
Router# debug voice enum summary enum_resolve_domain:match_num 5108891234 table_indx 10 enum_resolve_domain:rule 1 result string 5108891234
Table 352 provides an alphabetical listing of the debug voice enum command fields and a description of each field.
Table 352 debug voice enum Field Descriptions
Field contact_list flag match_num name ns_server num_elem order pref regexp replacement
Description Final list of URLs that the gateway will try to contact as an attempt to place the call. Flag value of a NAPTR record as defined in RFC 2915. Number to be used for matching against the ENUM match table. Fully qualified domain name sent out to DNS server. Address of the DNS server. If 0, the Domain Name System (DNS) server configured on the gateway is used. Number of records received in the response. Order in the record, as defined in RFC 2915. Preference of the record, as defined in RFC 2915. Regular expression of the record, as defined in RFC 2915. Replacement string of the record, as defined in RFC 2915.
DB-2524
December 2010
Table 352
Field re_flags_string
Description Flag indicating whether matching and replacement should be case sensitive:
The first part of the regexp, delimited by "/". This is used to match the incoming string. Refer to RFC 2915. The second part of regexp, delimited by "/". String that results when match_num is taken through the ENUM match table for a match. This string will be used to form a fully qualified domain name (FQDN). Rule number that matched match_num in the enum match table. String sent out to the DNS server. Service field of the NAPTR record. Refer to RFC 2915. Index of the ENUM match table picked for this call. Type of record requested in the query: 35 = NAPTR 33 = DNS Service (SRV)
Related Commands
Command rule (ENUM configuration) show voice enum-match-table test enum voice enum-match-table
Description Defines the rule pattern for an ENUM match table. Displays the ENUM match table rules. Tests the ENUM match table rules. Initiates the ENUM match table definition.
DB-2525
Syntax Description
invalidate slot/port
(Optional) Turns on debugging for fastpath cache invalidation. (Optional) Slot and port to be debugged. Slash mark is required.
Command Default
Command Modes
Command History
Release 12.4(21)
Modification This command was introduced on the Cisco AS5400XM and AS5350XM.
Usage Guidelines
The debug voice fastpath command displays the details on every packet that is being switched via fastpath. The debug voice fastpath invalidate command displays the details of cache invalidation and cache update. The debug voice fastpath command and its options are interchangeable with the debug voip fastpath command. Voice fastpath is enabled by default. In order to disable it, issue the no voice-fastpath enable command in global configuration mode. When voice fastpath is enabled, the IP address and User Datagram Protocol (UDP) port number information for the logical channel that is opened for a specific call are cached. Voice fastpath prevents the RTP stream from reaching the application layer. Instead, the packets are forwarded at a lower layer to help reduce CPU utilization in high call-volume scenarios. When supplementary services such as hold or transfer are used, voice fastpath causes the router to stream the audio to the cached IP address and UDP port. The new logical channel information (generated after a call on hold is resumed or after a transfer is completed) is disregarded. Traffic must go to the application layer constantly so that redefinition of the logical channel is considered and audio is streamed to the new IP address and UDP port pair. Therefore, be sure to disable voice-fastpath in order to support supplementary services.
Note
The debug voice fastpath command should be enabled only when there is light traffic on the gateway. Enabling this command can affect the functionality of the gateway.
DB-2526
December 2010
Examples
The following example shows how to turn on voice fastpath debugging, shows how to use the show debug command to display what debugging functions are enabled, and provides sample output for the debugging function:
Router# debug voice fastpath Fastpath related debugging is on Router# show debug fastpath: Fastpath related debugging is on Router# *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 08:22:35.971: NP VPD(2/01): pak sent via fastpath,part=0x652DEE80 ret=0x000003 08:22:35.987: NP VPD(2/01): pak sent via fastpath,part=0x652DEEC0 ret=0x000003 08:22:36.011: NP VPD(2/01): pak sent via fastpath,part=0x652DEF00 ret=0x000003 08:22:36.031: NP VPD(2/01): pak sent via fastpath,part=0x652DEF40 ret=0x000003 08:22:36.051: NP VPD(2/01): pak sent via fastpath,part=0x652DEF80 ret=0x000003 08:22:36.071: NP VPD(2/01): pak sent via fastpath,part=0x652DEFC0 ret=0x000003 08:22:36.095: NP VPD(2/01): pak sent via fastpath,part=0x652DF000 ret=0x000003 08:22:36.111: NP VPD(2/01): pak sent via fastpath,part=0x652DF040 ret=0x000003 08:22:36.131: NP VPD(2/01): pak sent via fastpath,part=0x652DF080 ret=0x000003 08:22:36.151: NP VPD(2/01): pak sent via fastpath,part=0x652DF0C0 ret=0x000003 08:22:36.171: NP VPD(2/01): pak sent via fastpath,part=0x652DF100 ret=0x000003 08:22:36.195: NP VPD(2/01): pak sent via fastpath,part=0x652DF140 ret=0x000003 08:22:36.207: NP VPD(2/01): pak sent via fastpath,part=0x652DF180 ret=0x000003 08:22:36.231: NP VPD(2/01): pak sent via fastpath,part=0x652DF1C0 ret=0x000003 08:22:36.251: NP VPD(2/01): pak sent via fastpath,part=0x652DF200 ret=0x000003 08:22:36.271: NP VPD(2/01): pak sent via fastpath,part=0x652DF240 ret=0x000003 08:22:36.291: NP VPD(2/01): pak sent via fastpath,part=0x652DF280 ret=0x000003 08:22:36.315: NP VPD(2/01): pak sent via fastpath,part=0x652DF2C0 ret=0x000003 08:22:36.331: NP VPD(2/01): pak sent via fastpath,part=0x652DF300 ret=0x000003 08:22:36.351: NP VPD(2/01): pak sent via fastpath,part=0x652DF340 ret=0x000003 08:22:36.371: NP VPD(2/01): pak sent via fastpath,part=0x652DF380 ret=0x000003 08:22:36.391: NP VPD(2/01): pak sent via fastpath,part=0x652DF3C0 ret=0x000003
The following example shows how to use the debug voice fastpath command slot/port command to debug slot 2, port 13 on the router:
DB-2527
Router# debug voice fastpath 2/013 Fastpath related debugging is on *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 08:28:00.623: NP VPD(2/13): pak sent via fastpath,part=0x652DFFC0 ret=0x000003 08:28:00.643: NP VPD(2/13): pak sent via fastpath,part=0x652E0000 ret=0x000003 08:28:00.659: NP VPD(2/13): pak sent via fastpath,part=0x652E0080 ret=0x000003 08:28:00.831: NP VPD(2/13): pak sent via fastpath,part=0x652E0280 ret=0x000003 08:28:00.855: NP VPD(2/13): pak sent via fastpath,part=0x652E0300 ret=0x000003 08:28:00.867: NP VPD(2/13): pak sent via fastpath,part=0x652E0380 ret=0x000003 08:28:01.031: NP VPD(2/13): pak sent via fastpath,part=0x652E0540 ret=0x000003 08:28:01.051: NP VPD(2/13): pak sent via fastpath,part=0x652E0580 ret=0x000003 08:28:01.075: NP VPD(2/13): pak sent via fastpath,part=0x652E0640 ret=0x000003 08:28:01.231: NP VPD(2/13): pak sent via fastpath,part=0x652E0840 ret=0x000003 08:28:01.251: NP VPD(2/13): pak sent via fastpath,part=0x652E07C0 ret=0x000003 08:28:01.271: NP VPD(2/13): pak sent via fastpath,part=0x652E0900 ret=0x000003 08:28:01.439: NP VPD(2/13): pak sent via fastpath,part=0x652E0AC0 ret=0x000003 08:28:01.463: NP VPD(2/13): pak sent via fastpath,part=0x652E0B40 ret=0x000003 08:28:01.483: NP VPD(2/13): pak sent via fastpath,part=0x652E0BC0 ret=0x000003
The following example shows how to enable debugging for fastpath cache invalidation on slot 2, port 17, and shows how to display sample output for the debugging function:
Router# debug voice fastpath invalidate 2/17 Fastpath cache invalidation related Router# show voice call summary PORT CODEC VAD VTSP STATE VPM STATE ============== ======== === ==================== ====================== 6/4:0.20 g729r8 y S_CONNECT CSM_OC6_CONNECTED 6/4:0.21 g729r8 y S_CONNECT CSM_OC6_CONNECTED Router# show spe | i a Country code config : default T1 (u Law) Country code setting: e1-default Port state: (s)shutdown (r)recovery (t)test (a)active call (b)busiedout (d)download (B)bad (p)busyout pending Call type : (m)modem (d)digital (v)voice (f)fax-relay (_)not in use Summary : Ports : Total 540 In-use 2 Free 514 Disabled 24 Calls : Modem 0 Digital 0 Voice 2 Fax-relay 0 SPE SPE SPE SPE Port Call SPE# Port # State Busyout Shut Crash State Type 2/02 0012-0017 ACTIVE 0 0 0 _____a _____v debugging is on
DB-2528
December 2010
2/03
0018-0023
ACTIVE
0 a_____
v_____
Router# show logging Syslog logging: enabled (274 messages dropped, 20 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) Console logging: disabled Monitor logging: level debugging, 0 messages logged, xml disabled, filtering disabled Buffer logging: level debugging, 1018 messages logged, xml disabled, filtering disabled Logging Exception size (8192 bytes) Count and timestamp logging messages: disabled Trap logging: level informational, 133 message lines logged Log Buffer (1000000 bytes): *Nov 14 08:40:36.499: NP VPD (2/17): Cached header parameter values: header size : 28, payload size : 13, ssrc : 0x24DB1F03, udp chksum : 0x0 *Nov 14 08:40:36.499: NP VPD (2/17): Cached IP/UDP pkt details: dest-ip: 31.31.31.1 src-ip: 31.31.31.3 dport: 0x4070 sport: 0x43A6 *Nov 14 08:40:40.851: NP VPD (2/17): Cached header parameter values: header size : 28, payload size : 32, ssrc : 0x24DB1F03, udp chksum : 0x0 *Nov 14 08:40:40.851: NP VPD (2/17): Cached IP/UDP pkt details: dest-ip: 31.31.31.1 src-ip: 31.31.31.3 dport: 0x4070 sport: 0x43A6 *Nov 14 08:40:40.939: NP VPD (2/17): Cache being cleared due to change in payload size old payload size : 32 new rx payload size : 13 cached ssrc : 24DB1F03
Related Commands
Command debug voip fastpath show voice call voice fastpath enable
Description Turns on debugging to monitor VoIP fastpath packets. Displays the call status information for voice ports. Turns on voice fastpath.
DB-2529
Syntax Description
all default error error [call] error [call [informational]] error [software] error [software [informational]] function individual inout raw raw [decode]
(Optional) Enables all H.221 debugging, except the raw option. (Optional) Activates function, inout, error call, and software debugging. (Optional) Enables H.221 call error and software error debugging. (Optional) Enables H.221 major call processing error debugs related to the H.221 subsystem. (Optional) Enables H.221 major and informational call processing error debugs related to the H.221 subsystem. (Optional) Enables H.221 major software error debugs related to the H.221 subsystem. (Optional) Enables H.221 major and informational software error debugs related to the H.221 subsystem. (Optional) Enables procedure tracing. (Optional) Activates individual H.221 debugging. (Optional) Enables subsystem inout debugging. (Optional) Displays raw BAS messages. (Optional) Decodes raw BAS data.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command enables debugging for H.221 message events (voice telephony call control information).
Note
This command provides the same results as the debug voip h221 command.
DB-2530
December 2010
Caution
We recommend that you log the output from the debug voice h221 all command to a buffer, rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway. Use the debug voice h221 individual x command, (where x is an index number for a debug category), to activate a single debug, selected by index number instead of entering a group of debug commands. See Table 353 for a list of debug categories and corresponding index numbers.
Table 353 Indexes and Categories for the debug voice h221 individual command
Index Number 1, 2, 30, 31, 32 5, 6, 14, 15, 16, 22 7, 10, 12, 13, 17, 28 8, 9, 23 11, 24, 33 18 19, 20, 21 3, 4, 25, 27, 42, 43 26 29 34, 35, 36, 37, 38, 39, 40, 41
Debug Category Secondary number exchange Audio mode/caps Video mode/caps B-channel mode/caps Miscellaneous command exchange Bandwidth calculations DSP configuration General caps/internal Non-standard caps/command Loop request BAS squelch
Examples
The raw keyword displays the raw BAS information coming from or to the DSP. It is displayed in a hexadecimal octet format. The decode option decodes the BAS information into a readable English format. The following is sample output from the debug voice h221 raw decode command:
BAS=81:1 BAS=82:1 BAS=84:1 BAS=85:1 BAS=F9:1 BAS=02:0 BAS=0A:0 BAS=8A:1 BAS=8A:BAS=8A:BAS=8A:0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 1 1 0 0 1 1 0 0 0 0 0 1 0 0 0 1 1 1 1: 0: 0: 1: 1: 0: 0: -: -: -: 0: AUDIO CAPS=g711 a-law AUDIO CAPS=g711 u-law AUDIO CAPS=g722 48k AUDIO CAPS=g728 H.242 MBE start indication H.242 MBE length=2 H.242 MBE type=H.263 caps Always 1 H.263 MPI=1 H.263 FORMAT=h.263_cif No additional options
Related Commands
Description Enables debugging for the call control application programming interface (CCAPI) contents. Enables debugging for Real-Time Transport Protocol (RTP) named event packets.
DB-2531
Syntax Description
all default error error [call] error [call [informational]] error [software] error [software [informational]] function individual inout message number
(Optional) Enables all H.324 debugging except raw and raw decode. (Optional) Activates function, inout, error call, and software debugging. (Optional) Enables H.324 call error and software error debugging. (Optional) Enables H.324 major call processing error debugs related to the H.324 subsystem. (Optional) Enables H.324 major and informational call processing error debugs related to the H.324 subsystem. (Optional) Enables H.324 major software error debugs related to the H.324 subsystem. (Optional) Enables H.324 major and informational software error debugs related to the H.324 subsystem. (Optional) Enables procedure tracing. (Optional) Activates individual H.324 debugging. (Optional) Enables subsystem inout debugging. (Optional) Enables H.245 message display to/from H.324. Only displays message types, for message detail, use debug h245 asn1. Index number. Number of debug category. See Table 354.
Command Modes
Command History
Release 12.4(22)T
Usage Guidelines
This command enables debugging for H.324 message events (video call control information).
Note
Caution
We recommend that you log the output from the debug voice h324 all command to a buffer, rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
DB-2532
December 2010
Use the debug voice h324 individual index-number command, where index number is a debug category, to activate a single debug. This is helpful when trying to see a specific problem, without having a large number of debug output being generated. For example, the user could select the command debug voice h324 individual 4 to see calls where no video caps arrived from the IP side of the call (SIP to H.324 direction). Multiple debug output can be activated using this command, one at a time. These are not additional debug output to the ones enabled by the command debug voice h324 all, just another way to selectively see specific information, without generating large amounts of debug output.
Table 354 Index Numbers and Descriptions for the debug voice h324 Command
Description Shows incoming H.245 message type Shows MSD master/slave determination upon receiving MSD from peer Warns that no audio caps were found from IP leg (not necessarily an error). Warns that no video caps were found from IP leg (not necessarily an error). Shows MSD master/slave determination when sending MSDack. Displays media type being sent (audio/video), when sending MES message. Displays H.223 parameters when sending TCS. Displays OLC information, when sending audio OLC. Displays OLC information, when sending video OLC. Displays OLCack information, when sending OLCack. Displays OLCrej information, when sending OLCrej. Displays digit begin sent, when sending USER INPUT message. Displays internal status bits of h245 messages sent/received in the h324 subsystem. No user data is provided. Displays master/slave determination when MSDack is received. Displays media type when MESack is received. Displays media type when MESrej is received. Displays OLC information, when receiving audio OLC. Displays OLC information, when receiving video OLC. Displays media type when OLCack is received. Displays media type when OLCrej is received. Displays message type, when an H.245 miscellaneous message is received (for example FastVideoUpdate). Displays digit begin received, when receiving USER INPUT message. Displays message type, when an H.245 miscellaneous message is sent (for example FastVideoUpdate). Displays outgoing message command type. No user data provided with this debug. Displays the initial H.223 mux level received from the peer, reported by the DSP. Displays information about either OLCack or OLCrej being sent in response to an OLC request.
DB-2533
Table 354
Index Numbers and Descriptions for the debug voice h324 Command
Description Displays the audio codec being opened with the IP leg. Displays the video codec being opened with the IP leg. Should always be the same as the video codec with the H.324 leg. Displays when IOS is sending the DSP either the H.223 mux table, or AL information. No user data is provided. Indicates the digit being sent to the IP leg, through the RFC 2833 procedure. Displays the parameters being sent to the DSP to configure either audio or video. Displays information about the H.223 multiplex table being sent to the DSP. Displays information about the H.223 AL configuration being sent to the DSP. Indicates message arriving from IP leg. No user data is provided. Displays information when receiving VENDOR ID message. This may show the type of equipment being connected to on the H.324 leg, if the peer adds the information to the message. Displays the new H.223 multiplex level being configured. Displays the new H.223 maximum PDU size being configured. Indicates when the internal video capability memory has been released. No user data is provided. Indicates when an empty capability set (ECS) has arrived from the IP leg of the call. Indicates when a new capability set has arrived from the IP leg after an ECS has arrived. Displays the dynamic payload number from the IP leg (H.324 to IP direction).
40 41 42 43 44 45
DB-2534
December 2010
Syntax Description
(Optional) Enables all MLPP debugging. (Optional) Enables error, function, and inout debugging. This is the default option if no keywords are used. (Optional) Displays detailed trace messages of the MLPP subsystem. (Optional) Enables MLPP call error debugging. (Optional) Enables tracing of the functions called by the MLPP subsystem. (Optional) Enables function in and out debugging.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(24)T.
Usage Guidelines
Examples
The following is sample output from the debug voice mlpp command. This example shows output for the following call scenario:
Ephone 1 is connected to ephone 3 (nonMLPP call). Ephone 4 makes an MLPP call to ephone 3. The preemption tone is played to both ephone 1 and 3. Ephone 3 is disconnected after the preemption tone timeout and precedence ringing. Ephone 3 answers the MLPP call and is connected to ephone 4.
Router# debug voice mlpp Sep Sep 5 14:24:49.492: //299/E4F8A0AE814C/VOIP-MLPP/voice_mlpp_call_update: 5 14:24:49.492: //299/E4F8A0AE814C/VOIP-MLPP/voice_mlpp_get_preemptInfo: Peer=20005 Sep 5 14:24:49.492: //299/E4F8A0AE814C/VOIP-MLPP/voice_mlpp_get_preemptInfo: mlpp_ephone_find_call is successful Sep 5 14:24:49.492: //299/E4F8A0AE814C/VOIP-MLPP/voice_mlpp_get_preemptInfo: A mlpp channel is selected PeerTag[20005] preemptorCallID[299] preemptCallID[297] Sep 5 14:24:49.496: //299/E4F8A0AE814C/VOIP-MLPP/voice_mlpp_call_add:
DB-2535
Sep
5 14:24:49.496: //299/E4F8A0AE814C/VOIP-MLPP/voice_mlpp_call_add: Unsupported Voice Interface Type; Interface Type=26DtPreemptionTone Sep 5 14:24:54.500: //296/DD8862EE8146/VOIP-MLPP/voice_mlpp_resource_reserve_req: Call not preempted, No reservation necessary Sep 5 14:24:54.500: //296/DD8862EE8146/VOIP-MLPP/voice_mlpp_call_delete: Unsupported Voice Interface Type; Interface Type=26 Sep 5 14:24:54.500: //297/DD8862EE8146/VOIP-MLPP/voice_mlpp_call_delete: Unsupported Voice Interface Type; Interface Type=26 Sep 5 14:24:54.508: //301/E4F8A0AE814C/VOIP-MLPP/voice_mlpp_call_add: Sep 5 14:24:54.508: //301/E4F8A0AE814C/VOIP-MLPP/voice_mlpp_call_add: Unsupported Voice Interface Type; Interface Type=26 Sep 5 14:24:59.947: //301/E4F8A0AE814C/VOIP-MLPP/voice_mlpp_call_add: Sep 5 14:24:59.947: //301/E4F8A0AE814C/VOIP-MLPP/voice_mlpp_call_add: Unsupported Voice Interface Type; Interface Type=26 Sep 5 14:24:59.951: //299/E4F8A0AE814C/VOIP-MLPP/voice_mlpp_call_add: Sep 5 14:24:59.951: //299/E4F8A0AE814C/VOIP-MLPP/voice_mlpp_call_add: Unsupported Voice Interface Type; Interface Type=26
Related Commands
Command debug ephone mlpp mlpp indication mlpp max-precedence mlpp preemption
Description Displays debugging information for MLPP calls to phones in a Cisco Unified CME system. Enables MLPP indication on an SCCP phone or analog FXS port. Sets the maximum precedence (priority) level that a phone user can specify when making an MLPP call. Enables preemption capability on an SCCP phone or analog FXS port.
DB-2536
December 2010
Syntax Description
slot/port
(Optional) Slot and port number of the voice port. If the slot and port arguments are entered, only debugging information for that voice port is displayed.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
In the debugging display, the following abbreviations are used for the different signaling protocols:
LFXSFXS trunk loop start protocol LFXOFXO trunk loop start protocol GFXSFXS trunk ground start protocol GFXOFXO trunk ground start protocol E&ME&M trunk protocol
Examples
The following is sample output from the debug voice protocol command:
Router# debug voice protocol Voice Line protocol State machine debugging is on 1/1: 1/1: 1/1: 1/1: 1/1: 1/1: 1/1: 1/1: 1/1: 1/1: 1/1: 1/2: 1/2: 1/2: 1/2: 1/2: LFXS( ), idle gets event offhook LFXS( ), idle ==> seize LFXS(in), seize gets event ready LFXS(in), seize ==> dial_tone LFXS(in), dial_tone gets event digit LFXS(in), dial_tone ==> collect LFXS(in), collect gets event digit LFXS(in), collect gets event digit LFXS(in), collect gets event digit LFXS(in), collect gets event addr_done LFXS(in), collect ==> call_progress LFXS( ), idle gets event seize LFXS( ), idle ==> ringing LFXS(out), ringing gets event dial_tone LFXS(out), ringing gets event offhook LFXS(out), ringing ==> connected
DB-2537
1/1: 1/1: 1/2: 1/2: 1/2: 1/2: 1/1: 1/2: 1/2: 1/2: 1/2: 1/2: 1/2: 1/1: 1/1: 1/2: 1/2:
LFXS(in), call_progress gets event answer LFXS(in), call_progress ==> connected LFXS(out), connected gets event onhook LFXS(out), connected ==> disconnect_wait LFXS(out), disconnected_wait gets event disconnect LFXS(out), disconnect_wait ==> cpc LFXS(in), connected gets event disconnect LFXS(out), connected ==> cpc LFXS(out), cpc gets event offhook LFXS(out), cpc gets event timer1 LFXS(out), cpc ==> cpc_recover LFXS(out), cpc gets event timer1 LFXS(out), cpc_recover ==> offhook_wait LFXS(in), offhook_wait gets event onhook LFXS(in), offhook_wait ==> idle LFXS(out), offhook_wait gets event onhook LFXS(out), offhook_wait ==> idle
Related Commands
Command debug voice all debug voice eecm debug voice signaling debug voice tdsm debug voice ccapi
Description Displays debugging information for the voice tandem switch. Displays debugging information for the Voice End-to-End Call Manager. Displays debugging information for the voice port signaling. Displays debugging information for the voice tandem switch. Debugs the call control API.
DB-2538
December 2010
Syntax Description
Command Default
Disabled
Command Modes
Command History
Modification This command was introduced for Cisco SIP SRST 3.0 This command was integrated into Cisco IOS Release 12.3(4)T for Cisco SIP SRST 3.0. This command was added to Cisco Unified CME 3.4 and Cisco SIP SRST 3.4. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Registration errors include failure to match pools or any internal errors that happen during registration.
Examples
The following is sample output for this command for a registration request with authentication enabled:
*May 6 18:07:26.971: VOICE_REG_POOL: Register request for (4901) from (10.5.49.83) *May 6 18:07:26.971: VOICE_REG_POOL: key(9499C07A000036A3) added to nonce table *May 6 18:07:26.975: VOICE_REG_POOL: Contact doesn't match any pools *May 6 18:07:26.975: //4/89D7750A8005/SIP/Error/ccsip_spi_register_incoming_registration: Registration Authorization failed with authorization header=
If there are no voice register pools configured for a particular registration request, the message Contact doesnt match any pools is displayed. When authentication is enabled and if the phone requesting registration cannot be authenticated, the message Registration Authorization failed with authorization header is displayed.
DB-2539
If there are no voice register pools configured for a particular registration request, the message Contact doesnt match any pools is displayed. If the max registrations command is configured, when registration requests reach the maximum limit, the Maximum registration threshold for pool (x) hit message is displayed for the particular pool. Table 355 describes the significant fields shown in the display.
Table 355 debug voice register errors Field Descriptions
Description Contact refers to the location of the SIP devices and the IP address. Unique MAC address of a locally available individual SIP phone used to support a degree of authentication in Cisco Unified CME.
Register request for (telephone number) The unique key for each registration is the telephone number. from (IP address). Registration Authorization (failed with Registration Authorization message is displayed when authorization header) authenticate command is configured in Cisco Unified CME.
Related Commands
Description Displays debug information on voice register module events during SIP phone registrations in a Cisco Unified CME or Cisco Unified SIP SRST environment.
DB-2540
December 2010
Syntax Description
Command Default
Disabled
Command Modes
Command History
Modification This command was introduced for Cisco SIP SRST 3.0 This command was integrated into Cisco IOS Release 12.3(4)T for Cisco SIP SRST 3.0. This command was added to Cisco CME 3.4 and Cisco SIP SRST 3.4. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Using the debug voice register events command should suffice to view registration activity. Registration activity includes matching of pools, registration creation, and automatic creation of dial peers. For more details and error conditions, you can use the debug voice register errors command. Cisco Unified CME The following example shows output from this command:
*May 6 18:07:27.223: VOICE_REG_POOL: Register request for (4901) from (1.5.49.83) *May 6 18:07:27.223: VOICE_REG_POOL: Contact matches pool 1 number list 1 *May 6 18:07:27.223: VOICE_REG_POOL: key(4901) contact(10.5.49.83) add to contact table *May 6 18:07:27.223: VOICE_REG_POOL: No entry for (4901) found in contact table *May 6 18:07:27.223: VOICE_REG_POOL: key(4901) contact(10.5.49.83) added to contact tableVOICE_REG_POOL pool->tag(1), dn->tag(1), submask(1) *May 6 18:07:27.223: VOICE_REG_POOL: Creating param container for dial-peer 40001. *May 6 18:07:27.223: VOICE_REG_POOL: Created dial-peer entry of type 0 *May 6 18:07:27.223: VOICE_REG_POOL: Registration successful for 4901, registration id is 2 ...
DB-2541
The phone number 4901 associated with voice register pool 1, voice register dn 1, registered successfully. A dynamic normal (type 0) VoIP dial peer has been created for entry 4901. The dial peer can be verified using the show voice register dial-peers and show sip-ua status registrar commands.
Cisco Unified SIP SRST
The phone number 91011 registered successfully, and type 1 is reported in the debug, which means that there is a preexisting VoIP dial peer.
Apr 22 10:50:38.119 Apr 22 10:50:38.119 Apr 22 10:50:38.123 table Apr 22 10:50:38.123 Apr 22 10:50:38.123 updated Apr 22 10:50:38.123 Apr 22 10:50:38.123 id is 258 PDT: VOICE_REG_POOL: Register request for (91021) from (192.168.0.3) PDT: VOICE_REG_POOL: Contact matches pool 2 PDT: VOICE_REG_POOL: key(91021) contact(192.168.0.3) add to contact PDT: VOICE_REG_POOL: key(91021) exists in contact table PDT: VOICE_REG_POOL: contact(192.168.0.3) exists in contact table, ref PDT: VOICE_REG_POOL: Created dial-peer entry of type 1 PDT: VOICE_REG_POOL: Registration successful for 91021, registration
A dynamic VoIP dial peer has been created for entry 91021. The dial peer can be verified using the show voice register dial-peers and show sip-ua status registrar commands.
Apr 22 10:51:08.971 Apr 22 10:51:08.971 Apr 22 10:51:08.971 table Apr 22 10:51:08.971 Apr 22 10:51:08.975 table Apr 22 10:51:08.979 Apr 22 10:51:08.979 id is 259 Apr 22 10:51:09.019 Apr 22 10:51:09.019 Apr 22 10:51:09.019 table Apr 22 10:51:09.019 Apr 22 10:51:09.023 table Apr 22 10:51:09.027 Apr 22 10:51:09.027 id is 260 Apr 22 10:51:09.071 Apr 22 10:51:09.071 Apr 22 10:51:09.071 table Apr 22 10:51:09.071 Apr 22 10:51:09.075 table Apr 22 10:51:09.079 PDT: VOICE_REG_POOL: Register request for (95021) from (10.2.161.50) PDT: VOICE_REG_POOL: Contact matches pool 3 PDT: VOICE_REG_POOL: key(95021) contact(10.2.161.50) add to contact PDT: VOICE_REG_POOL: No entry for (95021) found in contact table PDT: VOICE_REG_POOL: key(95021) contact(10.2.161.50) added to contact PDT: VOICE_REG_POOL: Created dial-peer entry of type 0 PDT: VOICE_REG_POOL: Registration successful for 95021, registration PDT: VOICE_REG_POOL: Register request for (95012) from (10.2.161.50) PDT: VOICE_REG_POOL: Contact matches pool 3 PDT: VOICE_REG_POOL: key(95012) contact(10.2.161.50) add to contact PDT: VOICE_REG_POOL: No entry for (95012) found in contact table PDT: VOICE_REG_POOL: key(95012) contact(10.2.161.50) added to contact PDT: VOICE_REG_POOL: Created dial-peer entry of type 0 PDT: VOICE_REG_POOL: Registration successful for 95012, registration PDT: VOICE_REG_POOL: Register request for (95011) from (10.2.161.50) PDT: VOICE_REG_POOL: Contact matches pool 3 PDT: VOICE_REG_POOL: key(95011) contact(10.2.161.50) add to contact PDT: VOICE_REG_POOL: No entry for (95011) found in contact table PDT: VOICE_REG_POOL: key(95011) contact(10.2.161.50) added to contact PDT: VOICE_REG_POOL: Created dial-peer entry of type 0
DB-2542
December 2010
Apr 22 10:51:09.079 PDT: VOICE_REG_POOL: Registration successful for 95011, registration id is 261 Apr 22 10:51:09.123 PDT: VOICE_REG_POOL: Register request for (95500) from (10.2.161.50) Apr 22 10:51:09.123 PDT: VOICE_REG_POOL: Contact matches pool 3 Apr 22 10:51:09.123 PDT: VOICE_REG_POOL: key(95500) contact(10.2.161.50) add to contact table Apr 22 10:51:09.123 PDT: VOICE_REG_POOL: No entry for (95500) found in contact table Apr 22 10:51:09.127 PDT: VOICE_REG_POOL: key(95500) contact(10.2.161.50) added to contact table Apr 22 10:51:09.131 PDT: VOICE_REG_POOL: Created dial-peer entry of type 0 Apr 22 10:51:09.131 PDT: VOICE_REG_POOL: Registration successful for 95500, registration id is 262 *Apr 22 11:52:54.523 PDT: VOICE_REG_POOL: Contact doesn't match any pools *Apr 22 11:52:54.539 PDT: VOICE_REG_POOL: Register request for (33015) from (10.2.152.39) *Apr 22 11:52:54.539 PDT: VOICE_REG_POOL: Contact doesn't match any pools *Apr 22 11:52:54.559 PDT: VOICE_REG_POOL: Register request for (33017) from (10.2.152.39)
Field Contact contact table key multiple contact no entry type 0 type 1 type 2 type 3 type 4 type 5 type 6 type 7 un-registration successful
Description Indicates the location of the SIP devices and may indicate the IP address. The table that maintains the location of the SIP devices. The phone number is used as the unique key to maintain registrations of SIP devices. More than one registration matches the same phone number. The incoming registration was not found. Normal dial peer. Existing normal dial peer. Proxy dial peer. Existing proxy dial peer. Dial-plan dial peer. Existing dial-plan dial peer. Alias dial peer. Existing alias dial peer. The incoming unregister was successful.
Register request/registration id number The internal unique number for each registration; useful for debugging particular registrations.
Related Commands
Description Displays debug information on voice register module errors during registration in a Cisco Unified CME or Cisco Unified SIP SRST environment.
DB-2543
Description Displays all the SIP endpoints that are currently registered with the contact address. Displays details of Cisco Unified SIP SRST configuration and of all dynamically created VoIP dial peers.
DB-2544
December 2010
Syntax Description
slot/port
(Optional) Slot and port number of the voice port. If the slot and port arguments are entered, only debugging information for that voice port is displayed.
Command Modes
Privileged EXEC
Usage Guidelines
Examples
The following is sample output from the debug voice signaling command:
Router# debug voice signaling 1/1: 1/2: 1/2: 1/2: 1/2: 1/2: 1/2: 1/2: 1/2: 1/2: 1/2: 1/2: 1/1: 1/2: 1/2: 1/1: 1/1: 1/2: 1/1: 1/1: 1/2: 1/1: 1/1: 1/2: 1/1: 1/2: 1/1: 1/2: 1/1: 1/2: TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, TIU, report_local_hook=1 set ring cadence=1 ringer on ringer off ringer on report_local_hook=1 turning off ringer due to SW ringtrip ringer off set ring cadence=0 ringer off set reverse battery=1 set reverse battery=1 report_local_hook=0 set reverse battery=0 set loop disabled=1 set reverse battery=0 set loop disabled=1 report_local_hook=1 report_lead_gnd grounded=1 report_lead_gnd grounded=0 set loop disabled=0 set loop disabled=0 report_local_hook=0 report_local_hook=0 report_local_hook=1 report_local_hook=1 report_local_hook=0 report_local_hook=0 set reverse battery=0 set reverse battery=0
DB-2545
Related Commands
Command debug voice all debug voice eecm debug voice protocol debug voice tdsm debug voice ccapi
Description Displays debugging information for all components of the Voice Call Manager. Displays debugging information for the Voice End-to-End Call Manager. Displays debugging information for the Voice Line protocol State machine. Display debugging information for the voice tandem switch. Debugs the call control API.
DB-2546
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Disable console logging and use buffered logging before using the debug voice source-group command. Using the debug voice source-group command generates a large volume of debugs, which can affect router performance.
Examples
A sample output of the debug voice source-group command is shown below. The output shows that the hash table key for source ip group is 1.
00:30:49:SIPG:sipg_get() - idString=0x63BE1C28, hashkey=1 00:30:49:SIPG:sipg_find_key - hashkey=1,idstring=0x63BE1C28
Description Hash table index of the source IP group. Value of the pointer to the source IP group name, which is used to make sure that it is not null.
DB-2547
Related Commands
Command carrier-id (voice source group) show voice source-group test source-group translation-profile (source group) trunk-group-label (voice source group) voice source-group
Description Specifies the carrier handling incoming source VoIP calls (for carrier ID routing). Displays the details of one or more source IP groups. Tests the definition of a source IP group. Associates a translation profile with the source IP group. Specifies the trunk group handling incoming source VoIP calls (for trunk group label routing). Initiates the source IP group definition.
DB-2548
December 2010
Syntax Description
Signaling voice call statistics records collection is debugged. Generic statistics collection is debugged. Voice accounting CSR collection is debugged.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows the collection of records that is occurring in between intervals:
Router# debug voice statistics accounting vstats_timer_handle_interval_event():Between Intervals! 04:52:37: vstats_acct_interval_end: interval_tag = 4 04:52:37: vstats_acct_interval_end: pushing out, tag=3 04:52:37: vstats_acct_clean_history_stats: 04:52:37: vstats_acct_clean_history_stats: stats (tag=3) not to be deleted 04:52:37: vstats_acct_clean_history_stats: stats (tag=2) not to be deleted 04:52:37: vstats_acct_create_empty_stats: 04:52:37: vstats_acct_create_new_rec_list: 04:52:37: vstats_acct_create_new_rec_list: add acct rec: methodlist=h323, acct-criteria=2 04:52:37: vstats_acct_create_new_rec: 04:52:37: vstats_acct_add_rec_entry: 04:52:37: vstats_acct_add_stats_entry: 04:52:37: vstat_push_driver_file_open():Cannot open ftp://sgcp:sgcp@abc-pc:21//ftp_files/vstats.5400-GW.2003-02-13T162000Z. errno=65540=Unknown error 65540 vstat_push_drv_activate_ftp_file_tx():open file (ftp://sgcp:sgcp@jeremy-pc:21//ftp_files/vstats.5400-GW.2003-02-13T162000Z)=(ftp://sgcp:sg cp@abc-pc:21//ftp_files/vstats.5400-GW.2003-02-13T162000Z)failed! vstats_push_api_push_formatted_text():Start CMD error!
The following example shows a voice call going through the gateway:
Router# debug voice statistics csr 04:55:07: EM: Notify the producer not to produce
DB-2549
04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07:
RADIUS(00000019): Storing nasport 0 in rad_db RADIUS(00000019): Config NAS IP: 0.0.0.0 RADIUS(00000019): sending RADIUS/ENCODE: Best Local IP-Address 1.6.43.101 for Radius-Server 1.6.10.203 RADIUS(00000019): Send Accounting-Request to 1.6.10.203:1646 id 21645/49,len 496 RADIUS: authenticator C5 B8 AA 2E C3 AF 02 93 - 45 0B AE E5 B6 B2 99 1F RADIUS: Acct-Session-Id [44] 10 "00000020" RADIUS: Vendor, Cisco [26] 57 RADIUS: h323-setup-time [25] 51 "h323-setup-time=*16:22:30.994 UTC Thu Feb 13 2003" RADIUS: Vendor, Cisco [26] 27 RADIUS: h323-gw-id [33] 21 "h323-gw-id=5400-GW." RADIUS: Vendor, Cisco [26] 56 RADIUS: Conf-Id [24] 50 "h323-conf-id=2F4ED2E3 3EA611D7 800E0002 B935C142" RADIUS: Vendor, Cisco [26] 31 RADIUS: h323-call-origin [26] 25 "h323-call-origin=answer" RADIUS: Vendor, Cisco [26] 32 RADIUS: h323-call-type [27] 26 "h323-call-type=Telephony" RADIUS: Vendor, Cisco [26] 65 RADIUS: Cisco AVpair [1] 59 "h323-incoming-conf-id=2F4ED2E3 3EA611D7 800E0002 B935C142" RADIUS: Vendor, Cisco [26] 30 RADIUS: Cisco AVpair [1] 24 "subscriber=RegularLine" RADIUS: Vendor, Cisco [26] 35 RADIUS: Cisco AVpair [1] 29 "gw-rxd-cdn=ton:0,npi:0,#:11" RADIUS: Vendor, Cisco [26] 32 RADIUS: Cisco AVpair [1] 26 "calling-party-category=9" RADIUS: Vendor, Cisco [26] 33 RADIUS: Cisco AVpair [1] 27 "transmission-medium-req=0" RADIUS: User-Name [1] 4 "22" RADIUS: Acct-Status-Type [40] 6 Start [1] RADIUS: NAS-Port-Type [61] 6 Async [0] RADIUS: Vendor, Cisco [26] 20 RADIUS: cisco-nas-port [2] 14 "ISDN 6/0:D:1" RADIUS: NAS-Port [5] 6 0 RADIUS: Calling-Station-Id [31] 4 "22" RADIUS: Called-Station-Id [30] 4 "11" RADIUS: Service-Type [6] 6 Login [1] RADIUS: NAS-IP-Address [4] 6 1.6.43.101 RADIUS: Acct-Delay-Time [41] 6 0 RADIUS(0000001A): Config NAS IP: 0.0.0.0 RADIUS(0000001A): sending RADIUS/ENCODE: Best Local IP-Address 1.6.43.101 for Radius-Server 1.6.10.203 RADIUS(0000001A): Send Accounting-Request to 1.6.10.203:1646 id 21645/50, len427 RADIUS: authenticator E4 98 06 8C 48 63 4F AA - 56 4F 40 12 33 F0 F5 99 RADIUS: Acct-Session-Id [44] 10 "00000021" RADIUS: Vendor, Cisco [26] 57 RADIUS: h323-setup-time [25] 51 "h323-setup-time=*16:22:31.006 UTC Thu Feb 13 2003" RADIUS: Vendor, Cisco [26] 27 RADIUS: h323-gw-id [33] 21 "h323-gw-id=5400-GW." RADIUS: Vendor, Cisco [26] 56 RADIUS: Conf-Id [24] 50 "h323-conf-id=2F4ED2E3 3EA611D7 800E0002 B935C142" RADIUS: Vendor, Cisco [26] 34 RADIUS: h323-call-origin [26] 28 "h323-call-origin=originate" RADIUS: Vendor, Cisco [26] 27 RADIUS: h323-call-type [27] 21 "h323-call-type=VoIP" RADIUS: Vendor, Cisco [26] 65 RADIUS: Cisco AVpair [1] 59 "h323-incoming-conf-id=2F4ED2E3 3EA611D7 800E0002 B935C142" RADIUS: Vendor, Cisco [26] 30 RADIUS: Cisco AVpair [1] 24 "subscriber=RegularLine"
DB-2550
December 2010
04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:07: 04:55:08: 04:55:08: 04:55:08: 04:55:09: 04:55:09: 04:55:09: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:10: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13:
RADIUS: Vendor, Cisco [26] 30 RADIUS: Cisco AVpair [1] 24 "session-protocol=cisco" RADIUS: Vendor, Cisco [26] 35 RADIUS: Cisco AVpair [1] 29 "gw-rxd-cdn=ton:0,npi:0,#:11" RADIUS: User-Name [1] 4 "22" RADIUS: Acct-Status-Type [40] 6 Start [1] RADIUS: Calling-Station-Id [31] 4 "22" RADIUS: Called-Station-Id [30] 4 "11" RADIUS: Service-Type [6] 6 Login [1] RADIUS: NAS-IP-Address [4] 6 1.6.43.101 RADIUS: Acct-Delay-Time [41] 6 0 EM: No consumer registered for event type NEWINFO EM: Notify the producer not to produce EM: No consumer registered for event type NEWINFO EM: Notify the producer not to produce RADIUS: no sg in radius-timers: ctx 0x65BAB1BC sg 0x0000 RADIUS: Retransmit to (1.6.10.203:1645,1646) for id 21645/50 RADIUS: acct-delay-time for 403963FC (at 403965A1) now 1 RADIUS: no sg in radius-timers: ctx 0x65ADB8EC sg 0x0000 RADIUS: Retransmit to (1.6.10.203:1645,1646) for id 21645/49 RADIUS: acct-delay-time for 40389BFC (at 40389DE6) now 1 RADIUS: no sg in radius-timers: ctx 0x65BAB1BC sg 0x0000 RADIUS: Fail-over to (1.8.159.105:1645,1645) for id 21645/51 RADIUS: acct-delay-time for 403963FC (at 403965A1) now 2 RADIUS/ENCODE: Best Local IP-Address 1.6.43.101 for Radius-Server 1.8.159.105 RADIUS: Received from id 21645/53 1.8.159.105:1645, Accounting-response, len 20 RADIUS: authenticator 57 EF DD 90 0F 88 76 EA - A5 3D A7 44 0D 90 66 16 vstats_acct_rsp_handler: methodlist=h323, rsp_type=0x1 acct_rsp_status=1 callid= 26, incoming=0, leg=2 vstats_acct_rsp_handler: last acct msg not sent yet. methodlist: h323 RADIUS: no sg in radius-timers: ctx 0x65ADB8EC sg 0x0000 RADIUS: Fail-over to (1.8.159.105:1645,1645) for id 21645/52 RADIUS: acct-delay-time for 40389BFC (at 40389DE6) now 2 RADIUS/ENCODE: Best Local IP-Address 1.6.43.101 for Radius-Server 1.8.159.105 RADIUS: Received from id 21645/54 1.8.159.105:1645, Accounting-response, len 20 RADIUS: authenticator 97 88 6C BA DA 22 E7 5E - 73 EC 21 C6 36 1B 93 18 vstats_acct_rsp_handler: methodlist=h323, rsp_type=0x1 acct_rsp_status=callid= 25, incoming=1, leg=1 vstats_acct_rsp_handler: last acct msg not sent yet. methodlist: h323 RADIUS(0000001A): Config NAS IP: 0.0.0.0 RADIUS(0000001A): sending RADIUS/ENCODE: Best Local IP-Address 1.6.43.101 for Radius-Server 1.6.10.203 RADIUS(0000001A): Send Accounting-Request to 1.6.10.203:1646 id 21645/55, len885 RADIUS: authenticator F8 4F F1 30 7E 8B 5B 46 - EF AE 17 2D 5C BA 36 E5 RADIUS: Acct-Session-Id [44] 10 "00000021" RADIUS: Vendor, Cisco [26] 57 RADIUS: h323-setup-time [25] 51 "h323-setup-time=*16:22:31.006 UTC Thu Feb 13 2003" RADIUS: Vendor, Cisco [26] 27 RADIUS: h323-gw-id [33] 21 "h323-gw-id=5400-GW." RADIUS: Vendor, Cisco [26] 56 RADIUS: Conf-Id [24] 50 "h323-conf-id=2F4ED2E3 3EA611D7 800E0002 B935C142" RADIUS: Vendor, Cisco [26] 34 RADIUS: h323-call-origin [26] 28 "h323-call-origin=originate" RADIUS: Vendor, Cisco [26] 27 RADIUS: h323-call-type [27] 21 "h323-call-type=VoIP" RADIUS: Vendor, Cisco [26] 65 RADIUS: Cisco AVpair [1] 59 "h323-incoming-conf-id=2F4ED2E3 3EA611D7 800E0002 B935C142" RADIUS: Vendor, Cisco [26] 30 RADIUS: Cisco AVpair [1] 24 "subscriber=RegularLine" RADIUS: Vendor, Cisco [26] 30
DB-2551
RADIUS: Cisco AVpair RADIUS: Vendor, Cisco RADIUS: Cisco AVpair RADIUS: Vendor, Cisco RADIUS: h323-connect-time Thu Feb 13 2003" 04:55:13: RADIUS: Acct-Input-Octets 04:55:13: RADIUS: Acct-Output-Octets 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13:
24 35 29 59 53 6 6
RADIUS: Acct-Input-Packets [47] 6 113 RADIUS: Acct-Output-Packets [48] 6 5 RADIUS: Acct-Session-Time [46] 6 5 RADIUS: Vendor, Cisco [26] 62 RADIUS: h323-disconnect-tim[29] 56 "h323-disconnect-time=*16:22:36.070 UTC Thu Feb 13 2003" RADIUS: Vendor, Cisco [26] 32 RADIUS: h323-disconnect-cau[30] 26 "h323-disconnect-cause=10" RADIUS: Vendor, Cisco [26] 38 RADIUS: h323-remote-address[23] 32 "h323-remote-address=14.0.0.110" RADIUS: Vendor, Cisco [26] 24 RADIUS: Cisco AVpair [1] 18 "release-source=1" RADIUS: Vendor, Cisco [26] 29 RADIUS: h323-voice-quality [31] 23 "h323-voice-quality=-1" RADIUS: Vendor, Cisco [26] 57 RADIUS: Cisco AVpair [1] 51 "alert-timepoint=*16:22:31.030 UTC Thu Feb 13 2003" RADIUS: Vendor, Cisco [26] 39 RADIUS: Cisco AVpair [1] 33 "remote-media-address=14.0.0.110" RADIUS: Vendor, Cisco [26] 44 RADIUS: Cisco AVpair [1] 38 "gw-final-xlated-cdn=ton:0,npi:0,#:11" RADIUS: Vendor, Cisco [26] 44 RADIUS: Cisco AVpair [1] 38 "gw-final-xlated-cgn=ton:0,npi:1,#:22" RADIUS: User-Name [1] 4 "22" RADIUS: Acct-Status-Type [40] 6 Stop [2] RADIUS: Calling-Station-Id [31] 4 "22" RADIUS: Called-Station-Id [30] 4 "11" RADIUS: Service-Type [6] 6 Login [1] RADIUS: NAS-IP-Address [4] 6 1.6.43.101 RADIUS: Acct-Delay-Time [41] 6 0 RADIUS(00000019): Using existing nas_port 0 RADIUS(00000019):Config NAS IP: 0.0.0.0 RADIUS(00000019):sending RADIUS/ENCODE: Best Local IP-Address 1.6.43.101 for Radius-Server 1.6.10.203 RADIUS(00000019): Send Accounting-Request to 1.6.10.203:1646 id 21645/56, len766 RADIUS: authenticator 61 60 EB 92 29 5C DE B4 - CE 40 1C AB E3 A1 C8 F7 RADIUS: Acct-Session-Id [44] 10 "00000020" RADIUS: Vendor, Cisco [26] 57 RADIUS: h323-setup-time [25] 51 "h323-setup-time=*16:22:30.994 UTC Thu Feb 13 2003" RADIUS: Vendor, Cisco [26] 27 RADIUS: h323-gw-id [33] 21 "h323-gw-id=5400-GW." RADIUS: Vendor, Cisco [26] 56 RADIUS: Conf-Id [24] 50 "h323-conf-id=2F4ED2E3 3EA611D7 800E0002 B935C142" RADIUS: Vendor, Cisco [26] 31 RADIUS: h323-call-origin [26] 25 "h323-call-origin=answer" RADIUS: Vendor, Cisco [26] 32 RADIUS: h323-call-type [27] 26 "h323-call-type=Telephony" RADIUS: Vendor, Cisco [26] 65 RADIUS: Cisco AVpair [1] 59 "h323-incoming-conf-id=2F4ED2E3 3EA611D7 800E0002 B935C142" RADIUS: Vendor, Cisco [26] 30 RADIUS: Cisco AVpair [1] 24 "subscriber=RegularLine" RADIUS: Vendor, Cisco [26] 35
DB-2552
December 2010
RADIUS: Cisco AVpair RADIUS: Vendor, Cisco RADIUS: Cisco AVpair RADIUS: Vendor, Cisco RADIUS: Cisco AVpair RADIUS: Vendor, Cisco RADIUS: h323-connect-time Feb 13 2003" 04:55:13: RADIUS: Acct-Input-Octets 04:55:13: RADIUS: Acct-Output-Octets 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:13: 04:55:14: 04:55:14: 04:55:14: 04:55:14: 04:55:14: 04:55:14: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15: 04:55:15:
29 32 26 33 27 59 53 6 6
RADIUS: Acct-Input-Packets [47] 6 5 RADIUS: Acct-Output-Packets [48] 6 113 RADIUS: Acct-Session-Time [46] 6 5 RADIUS: Vendor, Cisco [26] 62 RADIUS: h323-disconnect-tim[29] 56 "h323-disconnect-time=*16:22:36.064 UTC Thu Feb 13 2003" RADIUS: Vendor, Cisco [26] 32 RADIUS: h323-disconnect-cau[30] 26 "h323-disconnect-cause=10" RADIUS: Vendor, Cisco [26] 35 RADIUS: Cisco AVpair [1] 29 "h323-ivr-out=Tariff:Unknown" RADIUS: Vendor, Cisco [26] 24 RADIUS: Cisco AVpair [1] 18 "release-source=1" RADIUS: Vendor, Cisco [26] 28 RADIUS: h323-voice-quality [31] 22 "h323-voice-quality=0" RADIUS: User-Name [1] 4 "22" RADIUS: Acct-Status-Type [40] 6 Stop [2] RADIUS: NAS-Port-Type [61] 6 Async [0] RADIUS: Vendor, Cisco [26] 20 RADIUS: cisco-nas-port [2] 14 "ISDN 6/0:D:1" RADIUS: NAS-Port [5] 6 0 RADIUS: Calling-Station-Id [31] 4 "22" RADIUS: Called-Station-Id [30] 4 "11" RADIUS: Service-Type [6] 6 Login [1] RADIUS: NAS-IP-Addres [4] 6 1.6.43.101 RADIUS: Acct-Delay-Time [41] 6 0 RADIUS: no sg in radius-timers: ctx 0x65BAB070 sg 0x0000 RADIUS: Retransmit to (1.6.10.203:1645,1646) for id 21645/55 RADIUS: acct-delay-time for 40553934 (at 40553CA3) now 1 RADIUS: no sg in radius-timers: ctx 0x65BA8284 sg 0x0000 RADIUS: Retransmit to (1.6.10.203:1645,1646) for id 21645/56 RADIUS: acct-delay-time for 405546C4 (at 405549BC) now 1 RADIUS: no sg in radius-timers: ctx 0x65BAB070 sg 0x0000 RADIUS: Fail-over to (1.8.159.105:1645,1645) for id 21645/57 RADIUS: acct-delay-time for 40553934 (at 40553CA3) now 2 RADIUS/ENCODE: Best Local IP-Address 1.6.43.101 for Radius-Server 1.8.159.105 RADIUS: no sg in radius-timers: ctx 0x65BA8284 sg 0x0000 RADIUS: Fail-over to (1.8.159.105:1645,1645) for id 21645/58 RADIUS: acct-delay-time for 405546C4 (at 405549BC) now 2 RADIUS/ENCODE: Best Local IP-Address 1.6.43.101 for Radius-Server 10.8.159.105 RADIUS: Received from id 21645/59 1.8.159.105:1645, Accounting-response, len 20 RADIUS: authenticator B1 C4 5E FC DB FA 74 A4 - 05 E2 34 52 1A 11 26 06 vstats_acct_rsp_handler: methodlist=h323, rsp_type=0x4 acct_rsp_status=1 callid= 26, incoming=0, leg=2 vstats_acct_rsp_handler: increment since-reset counter vstats_acct_rsp_handler: increment interval counter RADIUS: Received from id 21645/60 10.8.159.105:1645, Accounting-response, len 20 RADIUS: authenticator 0E 70 74 2F E5 D8 EE 98 - B9 C0 DA 66 74 ED 84 77 vstats_acct_rsp_handler: methodlist=h323, rsp_type=0x4 acct_rsp_status=1 callid= 25, incoming=1, leg=1 vstats_acct_rsp_handler: increment since-reset counter vstats_acct_rsp_handler: increment interval counter
DB-2553
The following example shows the collection of records that is in between intervals:
Router# debug voice statistics accounting Translating "abc-pc"...domain server (255.255.255.255) vstats_timer_handle_interval_event():Between Intervals! 04:57:37: vstats_acct_interval_end: interval_tag = 5 04:57:37: vstats_acct_interval_end: pushing out, tag=4 04:57:37: vstats_acct_clean_history_stats: 04:57:37: vstats_acct_clean_history_stats: stats (tag=4) not to be deleted 04:57:37: vstats_acct_clean_history_stats: stats (tag=3) not to be deleted 04:57:37: vstats_acct_clean_history_stats: stats (tag=2) not to be deleted 04:57:37: vstats_acct_create_empty_stats: 04:57:37: vstats_acct_create_new_rec_list: 04:57:37: vstats_acct_create_new_rec_list: add acct rec: methodlist=h323, acct-criteria=2 04:57:37: vstats_acct_create_new_rec: 04:57:37: vstats_acct_add_rec_entry: 04:57:37: vstats_acct_add_stats_entry: 04:57:37: vstat_push_driver_file_open():Can not open ftp://sgcp:sgcp@abc-pc:21//ftp_files/vstats.5400-GW.2003-02-13T162500Z. errno=65540=Unknown error 65540 vstat_push_drv_activate_ftp_file_tx():open file (ftp://sgcp:sgcp@abc-pc:21//ftp_files/vstats.5400-GW.2003-02-13T162500Z)=(ftp://sgcp:sgcp@ abc-pc:21//ftp_files/vstats.5400-GW.2003-02-13T162500Z) failed! vstats_push_api_push_formatted_text():Start CMD error!
Related Commands
DB-2554
December 2010
Syntax Description
slot/port
(Optional) Slot and port number of the voice port. If the slot and port arguments are entered, only debugging information for that voice port is displayed.
Command Modes
Privileged EXEC
Usage Guidelines
Examples
The following is sample output from the debug voice tdsm command:
Router# debug voice tdsm Voice tandem switch debugging is on -1/-1: TDSM(out), ref= -1, state NULL gets event OUT_SETUP 1/1: TDSM(in), ref=6, state CALL_INITIATED gets event IN_CALLPROC 1/1: TDSM(in), ref=6, state OUTG_CALLPROC gets event IN_ALERTING 1/1: TDSM(in), ref=6, state CALL_DELIVERED gets event IN_CONNECT 1/1: TDSM(out),ref=6, state CALL_ACTIVE send out conn. ack 1/1: TDSM(out),ref=6, state CALL_ACTIVE send out release, cause LOCAL_ONHOOK 1/1: TDSM(in), ref=6, state RELEASE_REQ gets event IN_REL_COMP, cause REMOTE_ONHOOK -1/-1: TDSM(in), ref=-1, state NULL gets event IN_SETUP -1/-1: TDSM(out), ref=6, state INC_CALLPROC gets event OUT_ALERTING 1/1: TDSM(out),ref=6, state CALL_RECEIVED gets event OUT_CONNECT 1/1: TDSM(in), ref-6, state CONNECT_REQ gets event IN_CONN_ACK 1/1: TDSM(out),ref-6, state CALL_ACTIVE send out release, cause LOCAL_ONHOOK 1/1: TDSM(in), ref=6, state RELEASE_REQ gets event IN_REL_COMP, cause REMOTE_ONHOOK -1/-1:TDSM(out), ref=-1, state NULL gets event OUT_SETUP 1/1: TDSM(in), ref=7, state CALL_INITIATED gets event IN_CALLPROC 1/1: TDSM(in), ref=7, state OUTG_CALLPROC gets event IN_ALERTING 1/1: TDSM(in), ref=7, state CALL_DELIVERED gets event IN_CONNECT 1/1: TDSM(out),ref=7, state CALL_ACTIVE send out conn.ack 1/1: TDSM(out),ref=7, state CALL_ACTIVE send out release, cause LOCAL_ONHOOK -1/-1: TDSM(in), ref=-1, state NULL gets event IN_SETUP -1/-1: TDSM(out), ref=7, state INC_CALLPROC gets event OUT_ALERTING 1/1: TDSM(out),ref=7. state CALL_RECEIVED gets event OUT_CONNECT 1/1: TDSM(in), ref=7, state CONNECT_REQ gets event IN_CONN_ACK 1/1: TDSM(in), ref=7, state CALL_ACTIVE send out release, cause LOCAL_ONHOOK 1/1: TDSM(in), ref=7, state RELEASE_REQ gets event IN_REL_COMP, cause REMOTE_ONHOOK -1/-1: TDSM(out), ref=-1, state NULL gets event OUT_SETUP 1/1: TDSM(in), ref=8, state CALL_INITIATED gets event IN_CALLPROC 1/1: TDSM(in), ref=8, state OUTG_CALLPROC gets event IN_ALERTINGbug all
DB-2555
Related Commands
Command debug voice all debug voice eecm debug voice protocol debug voice signaling debug voice ccapi
Description Displays debugging information for all components of the Voice Call Manager. Displays debugging information for the Voice End-to-End Call Manager. Displays debugging information for the Voice Line protocol State machine. Displays debugging information for the voice port signaling. Debugs the call control API.
DB-2556
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Disable console logging and use buffered logging before using the debug voice translation command. Using the debug voice translation command generates a large volume of debugs, which can affect router performance.
Examples
Sample output from the debug voice translation command is shown below. The output shows the details of the original number following regxrule_profile_translate. Following regxrule_profile_match, the output shows that rule 1 in the translation rule 1001 was a match; then the details of the SED substitution are shown. Then the output shows the details of the translated number following regxrule_profile_translate. In this example, because there was no called number or redirect number translation configured on the translation profile, corresponding errors were generated with a message that no match was found. Following regxrule_dp_translate, the output indicates that there is no translation profile for outgoing direction, then it prints the numbers sent to the outgoing SPI.
Router# 00:51:56:regxrule_get_profile_from_trunkgroup:Voice port 0x64143DA8 does not belong to any trunk group 00:51:56:regxrule_get_profile_from_trunkgroup:Voice port 0x64143DA8 does not belong to any trunk group 00:51:56:regxrule_stack_pop_RegXruleNumInfo:stack=0x63DECAF4; count=1 00:51:56:regxrule_stack_push_RegXruleNumInfo:stack=0x63DECAF4; count=0
DB-2557
00:51:56:regxrule_profile_translate:number=4088880101 type=unknown plan=unknown numbertype=calling 00:51:56:regxrule_profile_match:Matched with rule 1 in ruleset 1001 00:51:56:regxrule_profile_match:Matched with rule 1 in ruleset 1001 00:51:56:sed_subst:Successful substitution; pattern=4088880101 matchPattern=^.* replacePattern=5551212 replaced pattern=5551212 00:51:56:regxrule_subst_num_type:Match Type = none, Replace Type = none Input Type = unknown 00:51:56:regxrule_subst_num_plan:Match Plan = none, Replace Plan = none Input Plan = unknown 00:51:56:regxrule_profile_translate:xlt_number=5551212 xlt_type=unknown xlt_plan=unknown 00:51:56:regxrule_profile_translate:number= type=UNKNOWN plan=UNKNOWN numbertype=redirect-called 00:51:56:regxrule_get_RegXrule:Invalid translation ruleset tag=0 00:51:56:regxrule_profile_match:Error:ruleset for redirect-called number not found 00:51:56:regxrule_profile_translate:No match:number= type=UNKNOWN plan=UNKNOWN 00:51:56:regxrule_profile_translate:number=5108880101 type=unknown plan=unknown numbertype=called 00:51:56:regxrule_get_RegXrule:Invalid translation ruleset tag=0 00:51:56:regxrule_profile_match:Error:ruleset for called number not found 00:51:56:regxrule_profile_translate:No match:number=5108880101 type=unknown plan=unknown 00:51:56:regxrule_stack_push_RegXruleNumInfo:stack=0x63DECAF4; count=1 00:51:56:regxrule_dp_translate:No profile found in peer 5108888 for outgoing direction 00:51:56:regxrule_dp_translate:calling_number=5551212 calling_octet=0x0 called_number=5108880101 called_octet=0x80 redirect_number= redirect_type=4294967295 redirect_plan=4294967295 00:51:56:regxrule_stack_pop_RegXruleNumInfo:stack=0x63DECAF4; count=2 00:51:56:regxrule_stack_push_RegXruleNumInfo:stack=0x63DECAF4; count=1
Table 358 provides an alphabetical listing of the debug voice translation command fields and a description of each field.
Table 358 debug voice translation Field Descriptions
Field called_number called_octet calling_number calling_octect count Input Plan Input Type matchPattern Match Plan Match Type number numbertype pattern plan redirect_number redirect_plan
Description Called number dialed number identification service (DNIS). Octect3 of called IE. Calling number automatic number identifier (ANI). Octect3 of calling IE. Number of elements in the translation stack. Numbering plan of the input. Numbering type of the input. Regular exp used for matching. Numbering plan in the translation rule. Numbering type in the translation rule. Incoming number for translation. Type of number: calling, called, or redirect. Input string to the regular expression for matching. Numbering plan. Redirect number. Numbering plan in the redirect number.
DB-2558
December 2010
Table 358
Field redirect_type replaced pattern replacePattern Replace Plan Replace Type stack tag type xlt_number xlt_plan xlt_type
Description Numbering type in the redirect number. Final string after applying replacement rule of translation rule. Replacement pattern in the translation rule. Replacement numbering plan in the translation rule. Replacement numbering type in the translation rule. Value of the translation rule stack. Tag of the translation rule. Numbering type in the translation rule. Number after translation. Numbering plan after translation. Numbering type after translation.
Related Commands
Command rule (voice translation-rule) show voice translation-rule test voice translation-rule voice translation-rule
Description Defines the translation rule parameters for matching and replacing call number patterns. Displays a voice translation rule. Tests a voice translation rule. Initiates the translation rule definition.
DB-2559
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to see which URI voice class and dial peer is matched for a Session Initiation Protocol (SIP) or telephone (TEL) URI.
Examples
The following examples show output from the debug voice uri command. Comments are imbedded in the examples.
Router# debug voice uri
The following output displays when an outbound dial peer match fails for the URL sip:[email protected]?Subject=sip_e164_headers_plus.tcl&AccountInfo=12345&Priority=Urgent
*Jul 11 05:20:44.759:vuri_match_class:tag (767)
The first dial peer in the list is 767, which contains the destination uri 767 command. 767 is a TELURI class, so it does not match the above URL.
*Jul 11 05:20:44.759:vuri_match_class:tag (766)
The next dial peer, 766, contains the destination uri 766 command.
*Jul 11 05:20:44.759:vuri_match_class_sip:sip:[email protected]?Subject=sip_e164_headers_plus.tc l&AccountInfo=12345&Priority=Urgent did not match pattern
DB-2560
December 2010
766 is a SIP URI class and contains only the pattern command. The regex does not match the pattern, so there is no match.
*Jul 11 05:20:44.759:vuri_match_class:tag (999)
The next dial peer, 999, contains the destination uri 999 command.
*Jul 11 05:20:44.759:vuri_match_class_sip:Match with phone context *Jul 11 05:20:44.759:vuri_match_class_sip:input ()
If the phone context command is not present in the URI class, it is skipped.
*Jul 11 05:20:44.759:vuri_match_class_sip:Match with host *Jul 11 05:20:44.759:vuri_match_class_sip:input (sip.tgw.com)
Try to match with the user-id portion of the URL, which is 9991234.
*Jul 11 05:20:44.759:vuri_match_class_sip:Match failed
The following debugging output is displayed when an outbound dial peer match is done for the URL sip:[email protected]:
*Jul 11 06:06:30.119:vuri_match_class:tag (767)
The first dial peer in the list is 767 and it contains the destination uri 767 command. 767 is a TEL URI class, so it does not match with the above URL.
*Jul 11 06:06:30.119:vuri_match_class:tag (766)
The next dial peer, 766, contains the destination uri 766 command. Verify if the URL matches URI class 766.
*Jul 11 06:06:30.119:vuri_match_class_sip:sip:[email protected] did not match pattern
The next dial peer, 999, contains the destination uri 999 command.
*Jul 11 06:06:30.119:vuri_match_class_sip:Match with phone context *Jul 11 06:06:30.119:vuri_match_class_sip:input ()
If the user-id command is not configured, the user-id portion from the URL is driver.
*Jul 11 06:06:30.119:vuri_match_class_sip:driver matched; match length (6)
There is a match with the configured pattern. The number of characters that matched is 6.
DB-2561
Related Commands
Command destination uri incoming uri show dialplan incall uri show dialplan uri voice class uri
Description Specifies the voice class used to match the dial peer to the destination URI for an outgoing call. Specifies the voice class that a VoIP dial peer uses to match the URI of an incoming call. Displays which dial peer is matched for a specific URI in an incoming call. Displays which outbound dial peer is matched for a specific destination URI. Creates or modifies a voice class for matching dial peers to a SIP or TEL URI.
DB-2562
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command applies to Cisco trunks and FRF.11 trunks only; it does not apply to switched calls. This command applies to VoFR, VoATM, and VoHDLC dial peers on the Cisco MC3810 device.
Examples
The following example shows sample output from the debug voice vofr command for a Cisco trunk:
Router# debug voice vofr 1d05h: 1/1:VOFR, unconf ==> pending_start 1d05h: 1/1:VOFR,create VOFR 1d05h: 1/1:VOFR,search dial-peer 7100 preference 0 1d05h: 1/1:VOFR, pending_start ==> start 1d05h: 1/1:VOFR, 1d05h:voice_configure_perm_svc: 1d05h:dial-peer 7100 codec = G729A payload size = 30 vad = off dtmf relay = on seq num = off 1d05h:voice-port 1/1 codec = G729A payload size = 30 vad = off dtmf relay = on seq num = off 1d05h: 1/1:VOFR,SIGNAL-TYPE = cept 1d05h:init_frf11 tcid 0 master 0 signaltype 2 1d05h:Going Out Of Service on tcid 0 with sig state 0001 1d05h: 1/1:VOFR, start get event idle 1d05h: 1/1:VOFR, start get event 1d05h: 1/1:VOFR, start get event set up 1d05h: 1/1:VOFR, start ==> pending_connect 1d05h: 1/1:VOFR, pending_connect get event connect 1d05h: 1/1:VOFR, pending_connect ==> connect 1d05h: 1/1:VOFR,SIGNAL-TYPE = cept 1d05h:init_frf11 tcid 0 master 1 signaltype 2 1d05h:start_vofr_polling on port 0 signaltype 2
DB-2563
The following example shows sample output from the debug voice vofr command for an FRF.11 trunk:
Router# debug voice vofr 1d05h: 1/1:VOFR,search dial-peer 7200 preference 2 1d05h: 1/1:VOFR,SIGNAL-TYPE = cept 1d05h:Launch Voice Trunk:signal-type 2 1d05h:calculated bandwidth = 10, coding = 6, size = 30 1d05h:%Voice-port 1/1 is down. 1d05h: 1/1:VOFR, pending_start get event idle 1d05h:Codec Type = 6 Payload Size = 30 Seq# off 1d05h:%Voice-port 1/1 is up. 1d05h:init_frf11 tcid 0 master 1 signaltype 2 1d05h:status OK :cid = 100 1d05h: 1/1:VOFR, 1d05h:start FRF11 1d05h: 1/1:VOFR, pending_start ==> frf11 1d05h: 1/1:VOFR,SIGNAL-TYPE = cept
Related Commands
Command debug ccfrf11 session debug ccsip all debug ccswvoice vofr-session debug frame-relay fragment debug vpm error debug vtsp port debug vtsp vofr subframe
Description Displays the ccfrf11 function calls during call setup and teardown. Displays the ccswvoice function calls during call setup and teardown. Displays the ccswvoice function calls during call setup and teardown. Displays information related to Frame Relay fragmentation on a PVC. Displays the behavior of the Holst state machine. Displays the behavior of the VTSP state machine. Displays the first 10 bytes (including header) of selected VoFR subframes for the interface.
DB-2564
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco AS5850 in the Cisco IOS Release 12.2(2)XB. This command was integrated into Cisco IOS Release 12.2(11)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug voip aaa command:
Router# debug voip aaa VoIP AAA debugging is enabled Router# show debug voip aaa: voip aaa debugging is on
DB-2565
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug voip ais command:
Router# debug voip ais voip AIS debugging is on Router# *Jul 18 22:18:30.947: ais_appinst_create_record: new app inst record is created for sid=10, app_name=generic, stats:avail, elog:avail *Jul 18 22:18:30.947: ais_appinst_insert_record_to_active: app inst sid=A is inserted to active tree *Jul 18 22:18:30.963: ais_be_server_get_record_from_url: Incoming url = tftp://172.19.139.245/audio/ch_welcome.au *Jul 18 22:18:30.963: ais_be_server_get_record_from_url: Found server name or ip = 172.19.139.245 *Jul 18 22:18:30.963: ais_be_server_get_record_from_url: AIS BE server record located (6644ECCC) Router# *Jul 18 22:18:46.468: ais_be_server_get_record_from_url: Incoming url = tftp://172.19.139.245/audio/ch_welcome.au *Jul 18 22:18:46.468: ais_be_server_get_record_from_url: Found server name or ip = 172.19.139.245 *Jul 18 22:18:46.468: ais_be_server_get_record_from_url: AIS BE server record located (6644ECCC) Router# *Jul 18 22:18:51.520: ais_be_server_get_record_from_url: Incoming url = tftp://172.19.139.245/audio/ch_welcome.au *Jul 18 22:18:51.520: ais_be_server_get_record_from_url: Found server name or ip = 172.19.139.245 *Jul 18 22:18:51.520: ais_be_server_get_record_from_url: AIS BE server record located (6644ECCC) Router# *Jul 18 22:18:56.573: ais_be_server_get_record_from_url: Incoming url = tftp://172.19.139.245/audio/ch_welcome.au
DB-2566
December 2010
*Jul 18 22:18:56.573: ais_be_server_get_record_from_url: Found server name or ip = 172.19.139.245 *Jul 18 22:18:56.573: ais_be_server_get_record_from_url: AIS BE server record located (6644ECCC) Router# *Jul 18 22:19:01.625: ais_be_server_get_record_from_url: Incoming url = tftp://172.19.139.245/audio/ch_welcome.au *Jul 18 22:19:01.625: ais_be_server_get_record_from_url: Found server name or ip = 172.19.139.245 *Jul 18 22:19:01.625: ais_be_server_get_record_from_url: AIS BE server record located (6644ECCC) *Jul 18 22:19:01.949: propagate_history_stats: stats for app inst 10 is propagated to application (generic) and gateway level *Jul 18 22:19:01.949: ais_appinst_move_record_active_to_history: session record (sid=A) is moved to history repository
Related Commands
Command call application event-log call application stats debug voip event-log
Description Enables event logging for voice application instances. Enables statistics collection for voice applications. Enables debugging of the event log module.
DB-2567
Syntax Description
accounting all callfeature callsetup core datastruct digitcollect error linking media oodrefer redirect script session settlement states supplementary-service tclcommands
(Optional) Displays Voice over IP (VoIP) accounting messages. (Optional) Displays all application debug messages. (Optional) Displays call feature debugs. (Optional) Displays the call setup being processed. (Optional) Displays debug messages for the Application Framework (AFW) core libraries. (Optional) Displays debug messages for AFW data structures. (Optional) Displays digits collected during the call. (Optional) Displays application errors. (Optional) Displays script linking debugs. (Optional) Displays debug traces for application media events. (Optional) Displays debug messages for the Out-of-Dialog REFER (OOD-R) feature. (Optional) Displays call redirection handler debugs. (Optional) Displays script debugs. (Optional) Displays default session application debugs. (Optional) Displays debug messages for application settlement activities. (Optional) Displays debug traces for application states. (Optional) Provides application layer tracing related to the processing of supplementary services requests. (Optional) Displays debug messages for Tool Command Language (Tcl) commands used in application scripts.
Command Modes
Privileged EXEC
DB-2568
December 2010
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(4)T. This command replaces the debug voip ivr applib, debug voip ivr callsetup, debug voip ivr digitcollect, debug voip ivr redirect, and debug voip ivr supplementary-service commands. Reporting of H.450 capabilities was introduced. The callfeature keyword was added. The accounting keyword was added. The accounting keyword was integrated into Cisco IOS Release 12.4(9)T The oodrefer keyword was added. The oodrefer keyword was integrated into Cisco IOS Release 12.4(15)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
If you do not use any keywords, the debug voip application command displays application programming interface (API) libraries being processed. The debug voip application all command differs from the debug voip ivr all command. The debug voip application all command enables all application framework debugs. The debug voip ivr all command enables both Application Framework Session debugs and interactive voice response (IVR) debugs.
Examples
The following is sample output from the debug voip application callsetup command:
Router# debug voip application callsetup ivr call setup debugging is on Router# *Mar 7 22:08:40.032://7//APPL:/afsSettlementValidateCall:target=, tokenp=0x0 *Mar 7 22:08:41.864://-1//PCM :LP:HN23A698CC:HN23A691A4:/InitiateCallSetup:Mode 1 RedirectMode 6 Incoming leg[-1] AlertTime -1 Destinations(1) [ 405 ] *Mar 7 22:08:41.868://-1//PCM :HN23A698D0:/InitiateCallSetup:Destination 0 guid :231D511B.1A5F11CC.800BB191.E9DE175D *Mar 7 22:08:41.868: incoming_guid :00000000.00000000.00000000.00000000 *Mar 7 22:08:41.868://-1//PCM :HN23A698D0:/DNInitiate:Destination[405] *Mar 7 22:08:41.868://-1//PCM :HN23A698D0:/DNMatchDialPeer: *Mar 7 22:08:41.868: src carrier id:, tgt carrier id: *Mar 7 22:08:41.868://-1//PCM :HN23A698D0:/DNQueuePeers:Matched peers(1) *Mar 7 22:08:41.868://-1//PCM :HN23A698D0:/DNSetupPeer: Destination 0x6221092C *Mar 7 22:08:41.872://-1//PCM :HN23A698D0:/DNSetupPeer:dialpeer tags for Rotary = 400 *Mar 7 22:08:41.872://-1//PCM :HN23A698D0:/DNSetupPeer: *Mar 7 22:08:41.872:Destination SetupPeer cid(-1), destPat(405), match(2), prefix(), peer(630D95B0) *Mar 7 22:08:41.872://-1//PCM :HN23A698D0:/DNSettlementMatrixCheck:retcode=1 cid(-1) trans=0x0, provider=0 No settle-call present *Mar 7 22:08:41.940://8//PCM :/DNHandler:(DN_SETTING[2])--(CC_EV_CALL_PROCEEDING[25])--IGNORED-->>(DN_SETTING[2]) *Mar 7 22:08:41.940://8//PCM :/CS_Setting_PROCEED:
DB-2569
*Mar 7 22:08:41.940://8//PCM :/CSPopLegAndWait: *Mar 7 22:08:41.940://8//PCM :/CallSetupHandler:(CS_SETTING[0]) -----(CS_EV_PROCEEDING[3])------->>>(CS_SETTING[0]) *Mar 7 22:08:41.948://-1//PCM :HN23A698CC:/CSInterceptEvent:CallSetup[0x6320B998] handlercount=1 Waits=1 #Objects=2 (CS_SETTING) *Mar 7 22:08:41.948://8//PCM :/CSInterceptEvent:(CS_SETTING[0]) intercepting CS_EV_PROGRESS leg 8 (Mask=12) *Mar 7 22:08:41.948://-1//PCM :HN23A698CC:/CSInterceptEvent:CallSetup[0x6320B998] handlercount=1 Waits=1 #Objects=2 (CS_SETTING) *Mar 7 22:08:41.952://-1//PCM :HN23A698CC:/CallSetupContinueEvent:CallSetup[0x6320B998] handlercount=1 Waits=1 #Objects=2 (CS_SETTING) *Mar 7 22:08:41.956://8//PCM :/CS_CutProgress: *Mar 7 22:08:41.956://8//PCM :/CSPopLegAndWait: *Mar 7 22:08:41.956://8//PCM :/CallSetupContinueEvent:(CS_SETTING[0]) -----(CS_EV_PROGRESS[15])------->>>(CS_CONFEDALERT[5]) *Mar 7 22:08:41.956://-1//PCM :HN23A698CC:/CallSetupHandleQueueEvents: *Mar 7 22:08:41.956://8//PCM :/CallSetupContinueEvent: *** Leaving function ***CallSetup[0x6320B998] handlercount=1 Waits=1 #Objects=2 (CS_CONFEDALERT) *Mar 7 22:08:43.864://8//PCM :/CS_ConfedAlert_CONNECTED:no of Destinations:1 *Mar 7 22:08:43.864://-1//PCM :HN23A698CC:/CSDiscReturnAndEmptyLegALL: *Mar 7 22:08:43.864://8//PCM :/CSPopLegAndWait: *Mar 7 22:08:43.864://-1//PCM :HN23A698CC:/CSReturnIFDone:CallSetup[0x6320B998] handlercount=1 Waits=1 #Objects=2 (CS_CONFED) *Mar 7 22:08:43.864:CallSetupDump:CallSetup[0x6320B998] State:CS_CONFED[3] #Handler=1 #Waits=1#Objects=2 *Mar 7 22:08:43.864:All Destinations: *Mar 7 22:08:43.864:DestinationDump:Destination[0x6221092C]:DN_SETTING[2] Holding[0] Leg[8] *Mar 7 22:08:43.864:settlement_in_use:0 settlement_transaction:0x0 settlement_provider:0 settlement_type:0 settlement_callvalid:1 busyRotary:0 *Mar 7 22:08:43.864:WaitList of Destinations:{HAN[DN_HAND ][CS_HAND ]( )} *Mar 7 22:08:43.868:Handler Tree{HAN[CS_HAND ][AFS_HAND]( HAN[DN_HAND][CS_HAND ][FALSE] [UC=1 ]LEG[8 ][CS_HAND ][LEG_OUTCONNECTED(8)][Cause(0)][UC=1 ])} *Mar 7 22:08:43.868:{HAN[DN_HAND ][CS_HAND ]( )} *Mar 7 22:08:43.868: *Mar 7 22:08:43.868:Handler Tree Trace *Mar 7 22:08:43.868://-1//PCM :HN23A698D0:/DNCleanup:Terminate=TRUE Status DN_SUCCESS Leg[8] *Mar 7 22:08:43.868://-1//PCM :HN23A698D0:/DNSettlementCleanup:cid(-1) trans=0x0, provider=0 *Mar 7 22:08:43.868://-1//PCM :HN23A698D0:/DNSetFree: *Mar 7 22:08:43.868://-1//PCM :HN23A698CC:/CSReturnIFDone:CallSetup[0x6320B998] handlercount=0 #Waits=0 #Objects=1 (CS_CONFED) *Mar 7 22:08:43.872://-1//PCM :HN23A698CC:/CSReturnIFDone: decoupled extern connection *Mar 7 22:08:43.872://-1//PCM :HN23A698CC:/CSReturnIFDone:CallSetup Returning(ls_000 Status CS_ACTIVE) *Mar 7 22:08:43.872://8//PCM :/CallSetupHandler:(CS_CONFEDALERT[5]) -----(CS_EV_CONNECTED[5])------->>>(CS_CONFED[3]) *Mar 7 22:08:43.872://-1//PCM :HN23A698CC:/CallSetupCleanup:Terminate=FALSE *Mar 7 22:08:43.876://-1//PCM :HN23A698CC:/CallSetupCleanup:State CS_CONFED
The following is sample output from the debug voip application digitcollect command:
Router# debug voip application digitcollect ivr digit collect debugging is on Router# *Mar 7 22:09:08.108://9//DCM :/DigitCollect:DialPlan=TRUE AbortKey= TermKey=# NumPatts=0 Enable=FALSE InterruptPrompt=FALSE maxDigits=0 DialPlanTerm=FALSE *Mar 7 22:09:08.108://9//APPL:/AppTypeAheadGetDigit:no chars in buffer. *Mar 7 22:09:08.112://9//DCM :/act_DCRunning_RDone:callid=9 Enable succeeded.enable=0 matchDialplan=1 numPatterns=0matchDialplanTerm=0 *Mar 7 22:09:11.428://9//APPL:/AppVcrControlEvent:VCR Control, not enabled.--*Mar 7 22:09:11.428://9//APPL:/AppTypeAheadEvent:Passing, not enabled.---
DB-2570
December 2010
*Mar 7 22:09:11.428://9//DCM :/act_DCRunning_Digit::pLeg 9 Digit 4 Tone Mode 0 *Mar 7 22:09:11.428://9//DCM :/DCTreatDigit: *Mar 7 22:09:11.428://-1//DCM :HN23A6FF50:/DCTreatDigit: *Mar 7 22:09:11.428: src carrier id:, tgt carrier id: *Mar 7 22:09:11.428://-1//DCM :HN23A6FF50:/DCTreatDigit:Match single infotype *Mar 7 22:09:11.676://9//APPL:/AppVcrControlEvent:VCR Control, not enabled.--*Mar 7 22:09:11.676://9//APPL:/AppTypeAheadEvent:Passing, not enabled.--*Mar 7 22:09:11.676://9//DCM :/act_DCRunning_Digit::pLeg 9 Digit 0 Tone Mode 0 *Mar 7 22:09:11.676://9//DCM :/DCTreatDigit: *Mar 7 22:09:11.680://-1//DCM :HN23A6FF50:/DCTreatDigit: *Mar 7 22:09:11.680: src carrier id:, tgt carrier id: *Mar 7 22:09:11.680://-1//DCM :HN23A6FF50:/DCTreatDigit:Match single infotype *Mar 7 22:09:11.908://9//APPL:/AppVcrControlEvent:VCR Control, not enabled.--*Mar 7 22:09:11.908://9//APPL:/AppTypeAheadEvent:Passing, not enabled.--*Mar 7 22:09:11.908://9//DCM :/act_DCRunning_Digit::pLeg 9 Digit 5 Tone Mode 0 *Mar 7 22:09:11.908://9//DCM :/DCTreatDigit: *Mar 7 22:09:11.908://-1//DCM :HN23A6FF50:/DCTreatDigit: *Mar 7 22:09:11.908: src carrier id:, tgt carrier id: *Mar 7 22:09:11.908://-1//DCM :HN23A6FF50:/DCTreatDigit:Match single infotype *Mar 7 22:09:11.912://9//DCM :/act_DCRunning_RDone:callid=9 Reporting disabled. *Mar 7 22:09:11.912://-1//DCM :HN23A6FF50:/DigitCollectComplete:Status 4=DC_MATCHED_DIALPLAN. Digits=405 *Mar 7 22:09:11.916://-1//DCM :HN23A6FF50:/DCHandlerCleanup:
The following is sample output from the debug voip application session command:
Router# debug voip application session applib session debugging is on *Apr 4 23:57:08.054://-1//APPL:HN04B2BC78:LG35:/AFS_CALLSETUPIND:Calling #(4155550154), Called #(52984), peer_tag(1) *Apr 4 23:57:08.054://-1//APPL:HN04B2BC78:LG35:/afsSetupCall:Called #(52984) *Apr 4 23:57:08.058://-1//APPL:HN04B2BC78:LG35:/afsMsgHandler:(CALLINIT)--(CC_EV_CALL_SETUP_IND)->>(CONTACTINGDEST) *Apr 4 23:57:08.466://-1//APPL:HN04B2BC78:LG36:/AFS_ContactingDest_ALERT: *Apr 4 23:57:08.470://-1//APPL:HN04B2BC78:LG36:/AFS_ContactingDest_ALERT:inID(35), outID(36), outbnd peer_tag(6), prog_ind(8) *Apr 4 23:57:08.470://-1//APPL:HN04B2BC78:LG36:/afsMsgHandler:(CONTACTINGDEST)--(CC_EV_CALL_ALERT )-->>(CONFINGALERT) *Apr 4 23:57:08.470://-1//APPL:HN04B2BC78:CN11:/AFS_ConfingAlert_CREATEDONE: {HAN[AFS_HAND][NULL ]( LEG[35 ][AFS_HAND][LEG_INCALERTING(4)][Cause(0)][UC=1 ]HAN[CS_HAND][AFS_HAND][FALSE] [UC=1 ]LEG[36 ][CS_HAND ][LEG_OUTINIT(6)][Cause(0)][UC=1 ]CON[11 ][AFS_HAND][CONNECTION_CONFED(2)] [UC=1 ])} *Apr 4 23:57:08.470://-1//APPL:HN04B2BC78:CN11:/afsMsgHandler:(CONFINGALERT)--(CC_EV_CONF_CREATE_ DONE)-->>(CONFEDALERT) *Apr 4 23:57:08.478://-1//APPL:HN04B2BC78:LG35:/afsMsgHandler:(CONFEDALERT)--(CC_EV_VOICE_MODE_DO NE)-->>(CONFEDALERT) *Apr 4 23:57:24.162://-1//APPL:HN04B2BC78:HN04B2BC78:/AFS_ConfedAlert_SETUPDONE: *Apr 4 23:57:24.162://-1//APPL:HN04B2BC78:HN04B2BC78:/afsAppHandlerCleanup:CS_HAND *Apr 4 23:57:24.162://-1//APPL:HN04B2BC78:/afsMsgHandler:(CONFEDALERT)--(APP_EV_CALLSETUP_DONE)->>(CALLACTIVE) *Apr 4 23:57:24.182://-1//APPL:HN04B2BC78:LG35:/afsMsgHandler:(CALLACTIVE)--(CC_EV_VOICE_MODE_DON E)-->>(CALLACTIVE) *Apr 4 23:57:34.838://-1//APPL:HN04B2BC78:LG35:/AFS_DISCONNECT: *Apr 4 23:57:34.838://-1//APPL:HN04B2BC78:LG35:/afsMsgHandler:(CALLACTIVE)--(CC_EV_CALL_DISCONNEC TED)-->>(CALLDISCONNECT) *Apr 4 23:57:34.838://-1//APPL:/afsCallProcess: [HANDLERDONE_EVENT_END]
DB-2571
*Apr 4 23:57:34.838://-1//APPL:HN04B2BC78:/afsHNDCleanup:Terminate TRUE Terminated FALSE{HAN[AFS_HAND][NULL ]( LEG[35 ][AFS_HAND][LEG_INCCONNECTED(5)][Cause(16)][UC=1 ]LEG[36 ][AFS_HAND][LEG_OUTCONNECTED(8)][Cause(0)][UC=1 ]CON[11 ][AFS_HAND][CONNECTION_CONFED(2)] [UC=1 ])} *Apr 4 23:57:34.838://-1//APPL:HN04B2BC78:CN11:/afsMsgHandler:(CC_EV_CONF_DESTROY_DONE) *Apr 4 23:57:34.854://-1//APPL:HN04B2BC78:LG35:/afsMsgHandler:(CC_EV_CALL_DISCONNECT_DONE) *Apr 4 23:57:34.862://-1//APPL:HN04B2BC78:LG36:/afsMsgHandler:(CC_EV_CALL_DISCONNECT_DONE) *Apr 4 23:57:34.862://-1//APPL:/afsCallProcess: [HANDLERDONE_EVENT_END] *Apr 4 23:57:34.862://-1//APPL:HN04B2BC78:/afsHNDCleanup:Terminate TRUE Terminated TRUE{HAN[AFS_HAND][NULL ]( )} *Apr 4 23:57:34.862://-1//APPL:HN04B32530:/afsFreeHND:Hndlr returned to the free queue
The following sample output shows an inbound call on a system with H.450.2, H.450.3, and H.450.12 capabilities enabled:
Router# debug voip application supplementary-service supplementary service debugging is on Jan 21 01:12:21.433://-1//APPL:/SSProcessH450CommonInfoEvent: CI_INFORM featureList=0xC0000000 featureValue[0][0] featureControl=0x0 Jan 21 01:12:21.433://-1//APPL:/AppStoreCommonInfoToLeg:Leg peer_tag=8100 Jan 21 01:12:21.433://-1//APPL:/AppStoreCommonInfoToLeg:Received ciInform, store ss_support=0xE000 to leg. Jan 21 01:12:21.433://-1//APPL:/AppPrepareCommonInfo:Not voip dialpeer, no common info sent. Jan 21 01:12:21.437://-1//APPL:/AppPrepareCommonInfoRequestReceived:Leg peer_tag=8100 Jan 21 01:12:21.437://-1//APPL:/AppPrepareCommonInfo:Global H450_2=1 H450_3=1 H450_12_ADV=1 H450_12_USAGE=1 Jan 21 01:12:21.437://-1//APPL:/AppPrepareCommonInfoContent:SS_CI ss_evt=18 featureList=0xC0000000 featureValues=[0][0][0][0] featureControl=0x0
Table 359 describes the significant fields shown in the displays above.
Table 359 debug voip application Field Descriptions
Field Called #
Description Called # may not appear in the initial /AFS_CALLSETUPIND message; it appears later in the /afsSetupCall message. Dial peer tag. Verifies that the application completed properly. A value of 0 indicates that H.450.2 capabilities are disabled. A value of 1 indicates that H.450.2 capabilities are enabled. A value of 0 indicates that H.450.3 capabilities are disabled. A value of 1 indicates that H.450.3 capabilities are enabled. H.450.12 capabilities are disabled. H.450.12 capabilities are enabled in advertise-only mode. H.450.12 capabilities are enabled.
peer_tag /afsFreeHND H450_2 H450_3 H450_12_ADV= 0 and H450_12_USAGE = 0 H450_12_ADV= 1 and H450_12_USAGE = 0 H450_12_ADV= 1 and H450_12_USAGE = 1
DB-2572
December 2010
The following is sample output from the debug voip application accounting command:
Router# debug voip application accounting *Jan 6 19:34:22.535: //-1//Dest:/DestSetup: *Jan 6 19:34:22.535: :DestSetup iw inc guid is 0-0-0-0 *Jan 6 19:34:22.535: //-1//Dest:/DestSetup: *Jan 6 19:34:22.535: :DestSetup iw guid is 45AB9E05-7E2211DA-8088D216-195F6285 *Jan 6 19:34:22.535: :DestSetup iw guid is 45AB9E05-7E2211DA-8088D216-195F6285 *Jan 6 19:34:22.539: //-1//Dest:/DestSetup: *Jan 6 19:34:22.539: :DestSetup setup inc guid is 0-0-0-0 *Jan 6 19:34:22.539: //-1//Dest:/DestSetup: *Jan 6 19:34:22.539: :DestSetup setup guid is 45AB9E05-7E2211DA-8088D216-195F6285 *Jan 6 19:34:45.667: //-1//Dest:/DestSetup: *Jan 6 19:34:45.667: :DestSetup iw inc guid is 0-0-0-0 *Jan 6 19:34:45.667: //-1//Dest:/DestSetup: *Jan 6 19:34:45.671: :DestSetup iw guid is 527B07DA-7E2211DA-808DD216-195F6285 *Jan 6 19:34:45.671: :DestSetup iw guid is 527B07DA-7E2211DA-808DD216-195F6285 *Jan 6 19:34:45.671: //-1//Dest:/DestSetup: *Jan 6 19:34:45.671: :DestSetup setup inc guid is 0-0-0-0 *Jan 6 19:34:45.671: //-1//Dest:/DestSetup: *Jan 6 19:34:45.671: :DestSetup setup guid is 527B07DA-7E2211DA-808DD216-195F6285 *Jan 6 19:35:04.975: %VOIPAAA-5-VOIP_CALL_HISTORY: CallLegType 1, ConnectionId 45AB9E05 7E2211DA 8088D216 195F6285, SetupTime *19:34:22.535 UTC Fri Jan 6 2006, PeerAddress 1011011007, PeerSubAddress , DisconnectCause 10 , DisconnectText normal call clearing (16), ConnectTime *19:34:25.135 UTC Fri Jan 6 2006, DisconnectTime *19:35:04.975 UTC Fri Jan 6 2006, CallOrigin 1, ChargedUnits 0, InfoType 2, TransmitPackets 0, TransmitBytes 0, ReceivePackets 0, ReceiveBytes 0 *Jan 6 19:35:04.991: %VOIPAAA-5-VOIP_CALL_HISTORY: CallLegType 1, ConnectionId 527B07DA 7E2211DA 808DD216 195F6285, SetupTime *19:34:43.861 UTC Fri Jan 6 2006, PeerAddress 1011011007, PeerSubAddress , DisconnectCause 10 , DisconnectText normal call clearing (16), ConnectTime *19:34:46.451 UTC Fri Jan 6 2006, DisconnectTime *19:35:04.991 UTC Fri Jan 6 2006, CallOrigin 2, ChargedUnits 0, InfoType 2, TransmitPackets 0, TransmitBytes 0, ReceivePackets 0, ReceiveBytes 0 *Jan 6 19:36:05.627: %VOIPAAA-5-VOIP_CALL_HISTORY: CallLegType 1, ConnectionId 45AB9E05 7E2211DA 8088D216 195F6285, SetupTime *19:34:22.377 UTC Fri Jan 6 2006, PeerAddress 1011011006, PeerSubAddress , DisconnectCause 10 , DisconnectText normal call clearing (16), ConnectTime *19:34:25.137 UTC Fri Jan 6 2006, DisconnectTime *19:36:05.627 UTC Fri Jan 6 2006, CallOrigin 2, ChargedUnits 0, InfoType 2, TransmitPackets 0, TransmitBytes 0, ReceivePackets 0, ReceiveBytes 0 *Jan 6 19:36:05.631: %VOIPAAA-5-VOIP_CALL_HISTORY: CallLegType 1, ConnectionId 527B07DA 7E2211DA 808DD216 195F6285, SetupTime *19:34:45.671 UTC Fri Jan 6 2006, PeerAddress 1011011008, PeerSubAddress , DisconnectCause 10 , DisconnectText normal call clearing (16), ConnectTime *19:34:46.451 UTC Fri Jan 6 2006, DisconnectTime *19:36:05.631 UTC Fri Jan 6 2006, CallOrigin 1, ChargedUnits 0, InfoType 2, TransmitPackets 0, TransmitBytes 0, ReceivePackets 0, ReceiveBytes 0 *Jan 6 19:36:12.287: %IPPHONE-6-UNREGISTER_NORMAL: ephone-6:SEP111100011006 IP:10.3.32.56 Socket:1 DeviceType:Phone has unregistered normally. *Jan 6 19:36:12.287: %IPPHONE-6-UNREGISTER_NORMAL: ephone-7:SEP111100011007 IP:10.3.32.56 Socket:2 DeviceType:Phone has unregistered normally. *Jan 6 19:36:12.295: %IPPHONE-6-UNREGISTER_NORMAL: ephone-8:SEP111100011008 IP:10.3.32.56 Socket:3 DeviceType:Phone has unregistered normally. *Jan 6 19:36:13.227: %SYS-5-CONFIG_I: Configured from console by console
The following is sample output from the debug voip application oodrefer command:
Router# debug voip application oodrefer Aug 22 18:16:21.625: //-1//AFW_:/C_ServiceThirdParty_Event_Handle: Aug 22 18:16:21.625: //-1//AFW_:/AFW_ThirdPartyCC_New: Aug 22 18:16:21.625: //-1//AFW_:EE461DC520000:/C_PackageThirdPartyCC_NewReq: ThirdPartyCC module listened by TclModule_45F39E28_0_91076048 Aug 22 18:16:21.625: //-1//AFW_:EE461DC520000:/OCOpen_SetupRequest: Refer Dest1: 1011, Refer Dest2: 1001; ReferBy User: root
DB-2573
Aug 22 18:16:21.693: //-1//AFW_:EE461DC520000:/OCHandle_SignalEvent_1: Aug 22 18:16:21.693: //-1//AFW_:/Third_Party_CC_Send_Notify: Third_Party_CC_Send_Notify: sending notify respStatus=2, final=FALSE, failureCause=16 Aug 22 18:16:21.693: //-1//AFW_:/Third_Party_CC_Send_Notify: AppNotify successful! Aug 22 18:16:26.225: //-1//AFW_:EE461DC520000:/OCHandle_SignalEvent_1: Aug 22 18:16:26.229: //-1//AFW_:EE461DC520000:/OCHandle_SignalEvent_1: Aug 22 18:16:26.249: //-1//AFW_:EE461DC520000:/OCHandle_SignalEvent_2: Aug 22 18:16:29.341: //-1//AFW_:EE461DC520000:/OCHandle_SignalEvent_2: Aug 22 18:16:29.341: //-1//AFW_:/Third_Party_CC_Send_Notify: Third_Party_CC_Send_Notify: sending notify respStatus=4, final=TRUE, failureCause=16 Aug 22 18:16:29.341: //-1//AFW_:/Third_Party_CC_Send_Notify: AppNotify successful! Aug 22 18:16:29.349: //-1//AFW_:EE461DC520000:/OCHandle_Handoff: BAG contains: Aug 22 18:16:29.349: LEG[895 ][LEG_INCCONNECTED(5)][Cause(0)] Aug 22 18:16:29.349: CON[7 ][CONNECTION_CONFED(2)] {LEG[895 ][LEG_INCCONNECTED(5)][Cause(0)],LEG[896 ][LEG_OUTCONNECTED(10)][Cause(0)]} Aug 22 18:16:29.349: LEG[896 ][LEG_OUTCONNECTED(10)][Cause(0)] Aug 22 18:16:29.365: //-1//AFW_:EE461DC520000:/OCAnyState_IgnoreEvent: Event Ignored Aug 22 18:16:29.365: //-1//AFW_:/C_ServiceThirdParty_Event_Handle: Aug 22 18:16:29.365: //-1//AFW_:EE461DC520000:/C_ServiceThirdParty_Event_Handle: Received event APP_EV_NOTIFY_DONE[174] in Main Loop Aug 22 18:16:29.365: //-1//AFW_:EE461DC520000:/OCAnyState_IgnoreEvent: Event Ignored Aug 22 18:16:29.365: //-1//AFW_:/C_ServiceThirdParty_Event_Handle: Aug 22 18:16:29.365: //-1//AFW_:EE461DC520000:/C_ServiceThirdParty_Event_Handle: Received event APP_EV_NOTIFY_DONE[174] in Main Loop Aug 22 18:16:29.369: //-1//AFW_:EE461DC520000:/OCHandle_SubscribeCleanup: Aug 22 18:16:29.369: //-1//AFW_:EE461DC520000:/Third_Party_CC_Cleaner: Aug 22 18:16:29.453: //-1//AFW_:EE461DC520000:/OCClosing_AnyEvent: Aug 22 18:16:29.453: //-1//AFW_:EE461DC520000:/Third_Party_CC_Cleaner: Aug 22 18:16:29.453: //-1//AFW_:EE461DC520000:/OCClosing_AnyEvent: Aug 22 18:16:29.453: //-1//AFW_:EE461DC520000:/Third_Party_CC_Cleaner:
Related Commands
supplementary-service h450.2 (dial-peer) Enables H.450.2 capabilities for call transfers for an individual dial peer. supplementary-service h450.2 (voice-service) Globally enables H.450.2 capabilities for call transfers.
supplementary-service h450.3 (dial-peer) Enables H.450.3 capabilities for call forwarding for an individual dial peer. supplementary-service h450.3 (voice-service) supplementary-service h450.12 (dial-peer) supplementary-service h450.12 (voice-service) Globally enables H.450.3 capabilities for call forwarding. Enables H.450.12 capabilities for an individual dial peer. Globally enables H.450.12 capabilities.
DB-2574
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced. Command output was enhanced to display codec capabilities for modem transport. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. Command output was enhanced to display fax relay, RFC 2833 DTMF digit relay, dial tone after remote onhook, call control feature mode and visual message waiting indicator (VMWI) information for skinny client control protocol (SCCP) analog ports. This command was integrated into Cisco IOS Release 12.4(11)T.
12.4(6)XE
12.4(11)T
Usage Guidelines
The debug voip application stcapp all command provides debugging output for all the STCAPP debug commands compiled into one display.
Examples
The following is sample output from the debug voip application stcapp all command for a Cisco VG 224 voice gateway in Cisco IOS Release 12.4(6)XE showing call control feature mode messages for the drop last active call feature. Port 2/0 calls port 2/1, performs a hook flash to a get dial tone while port 2/1 is on hold, and calls port 2/3. Ports 2/0 and 2/3 are active, while port 2/1 is on hold.
Router# debug voip application stcapp all Port 2/0 performs a hook flash to activate the drop last call feature. Mar 3 20:41:07.022: 2/0 Mar 3 20:41:07.022: 2/0 Mar 3 20:41:07.022: 2/0 Mar 3 20:41:07.022: 2/0 lcb->state=ACTIVE (8) Mar 3 20:41:07.022: 2/0 Mar 3 20:41:07.022: 2/0 lcb->state=8 : stcapp_screen_api_event : event:STCAPP_CC_EV_CALL_FEATURE_HOOKFLASH received. : stcapp_screen_call_feature_hookflash : lcb->num_ccbs=2, lcb->mode=CALL_TRANSFER(1), : : lcb->fm_mode=CALL_FM_NONE(0), ACTIVE call_state=5, lcb->mode=CALL_TRANSFER(1),
DB-2575
Mar 3 20:41:07.022: lcb->state=8 Mar 3 20:41:07.022: Mar 3 20:41:07.022: Mar 3 20:41:07.022: Mar 3 20:41:07.022:
: enter FM: set event id to STCAPP_EV_FEATURE_MODE(143) : ==> Received event:STCAPP_EV_FEATURE_MODE for CallId: 63 : Call State:ACTIVE : stcapp_feature_mode_eh
The following lines show port 2/0 dialing the feature access code (FAC) #1 to drop the last active call
Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 20:41:11.234: 20:41:11.234: 20:41:11.234: 20:41:11.234: 20:41:11.234: 20:41:11.234: 20:41:11.234: 20:41:11.234: 20:41:11.234: 20:41:11.234: 20:41:11.238: 20:41:12.346: 20:41:12.346: 20:41:12.346: 20:41:12.346: 20:41:12.346: 20:41:12.346: 20:41:12.346: 20:41:12.346: htsp_digit_ready(2/0): digit = # STCAPP:Receive CC event:: call_id=63, ccb=0x64A5059C 2/0 : ==> Received event:STCAPP_CC_EV_CALL_DIGIT_END for CallId: 63 2/0 : Call State:FM_DIGIT_COLLECT 2/0 : stcapp_fm_dc_digit_end_eh 2/0 : Digit received is (#) 2/0 : lcb->fm_mode = CALL_FM_TRANSF_FT_ON(4) 2/0 : Sending ccGenerateTone(0x0) 2/0 : set lcb->fm_mode to CALL_FM_TRANSF_FT_OFF (5) 2/0 : So far the fm feature code =#, fm_string_idx=1 2/0 : No state change htsp_digit_ready(2/0): digit = 1 STCAPP:Receive CC event:: call_id=63, ccb=0x64A5059C 2/0 : ==> Received event:STCAPP_CC_EV_CALL_DIGIT_END for CallId: 63 2/0 : Call State:FM_DIGIT_COLLECT 2/0 : stcapp_fm_dc_digit_end_eh 2/0 : Digit received is (1) 2/0 : lcb->fm_mode = CALL_FM_TRANSF_FT_OFF(5) 2/0 : So far the fm feature code =#1, fm_string_idx=2
The following lines show the SCCP gateway processing FAC #1 messages.
Mar 3 20:41:12.346: 2/0 : stcapp_handle_fm_feature_id Mar 3 20:41:12.346: 2/0 : lcb->fm_mode = CALL_FM_TRANSF_FT_OFF(5), Mar 3 20:41:12.346: 2/0 : STANDBY call_state=8 Mar 3 20:41:12.346: 2/0 : stcapp_send_softkey_event Mar 3 20:41:12.346: 2/0 : Sending dcDeviceSoftKeyEvent(EndCall: event=9) for device id: 1, call_ref: 16810780 Mar 3 20:41:12.346: 2/0 : stcapp_send_softkey_event Mar 3 20:41:12.346: 2/0 : Sending dcDeviceSoftKeyEvent(Resume: event=10) for device id: 1, call_ref: 16810777 Mar 3 20:41:12.346: 2/0 : set lcb->fm_mode to CALL_FM_NONE (0) Mar 3 20:41:12.346: 2/0 : No state change Mar 3 20:41:12.366: 2/0 : ==> Received event:STCAPP_DC_EV_MEDIA_CLOSE_RCV_CHNL Mar 3 20:41:12.366: 2/0 : Call State:FM_DIGIT_COLLECT Mar 3 20:41:12.366: 2/0 : stcapp_close_rcv_chnl_eh Mar 3 20:41:12.366: 2/0 : stcapp_disconnect_call_leg Mar 3 20:41:12.366: 2/0 : Sending ccCallDisconnect for VoIP_LEG with call id:70 Mar 3 20:41:12.366: 2/0 : No state change Mar 3 20:41:12.370: 2/0 : ==> Received event:STCAPP_DC_EV_MEDIA_CLOSE_XMT_CHNL Mar 3 20:41:12.370: 2/0 : Call State:FM_DIGIT_COLLECT Mar 3 20:41:12.370: 2/0 : stcapp_active_close_xmt_chnl_eh Mar 3 20:41:12.370: 2/0 : New State = ONHOOK_PEND
The following is sample output from the debug voip application stcapp all command for a Cisco VG224 voice gateway in Cisco IOS Release 12.4(6)XE showing call control feature mode messages for the call transfer feature:
DB-2576
December 2010
Router# debug voip application stcapp all Mar 3 21:00:56.014: 2/0 : stcapp_handle_fm_feature_id Mar 3 21:00:56.014: 2/0 : lcb->fm_mode = CALL_FM_TRANSF_FT_OFF(5), Mar 3 21:00:56.014: 2/0 : set lcb->mode to CALL_TRANSFER (1) Mar 3 21:00:56.014: 2/0 : stcapp_send_softkey_event Mar 3 21:00:56.014: 2/0 : Sending dcDeviceSoftKeyEvent(Transfer: event=4) for device id: 1, call_ref: 16810789 Mar 3 21:00:56.014: 2/0 : set lcb->fm_mode to CALL_FM_NONE (0) Mar 3 21:00:56.014: 2/0 : No state change Mar 3 21:00:56.034: 2/0 : ==> Received event:STCAPP_DC_EV_MEDIA_CLOSE_RCV_CHNL Mar 3 21:00:56.034: 2/0 : Call State:FM_DIGIT_COLLECT Mar 3 21:00:56.038: 2/0 : stcapp_close_rcv_chnl_eh Mar 3 21:00:56.038: 2/0 : stcapp_disconnect_call_leg Mar 3 21:00:56.038: 2/0 : No state change Mar 3 21:00:56.042: 2/0 : ==> Received event:STCAPP_DC_EV_MEDIA_CLOSE_XMT_CHNL Mar 3 21:00:56.042: 2/0 : Call State:FM_DIGIT_COLLECT Mar 3 21:00:56.042: 2/0 : stcapp_active_close_xmt_chnl_eh Mar 3 21:00:56.042: 2/0 : New State = ONHOOK_PEND
The following is sample output in Cisco IOS 12.4(6)XE from the debug voip application stcapp all command showing call control feature mode messages for the call conference feature:
Router# debug voip application stcapp all Mar 3 21:18:54.258: 2/0 : stcapp_handle_fm_feature_id Mar 3 21:18:54.258: 2/0 : lcb->fm_mode = CALL_FM_TRANSF_FT_OFF(5), Mar 3 21:18:54.258: 2/0 : stcapp_send_softkey_event Mar 3 21:18:54.258: 2/0 : Sending dcDeviceSoftKeyEvent(Conference: event=13) for device id: 1, call_ref: 16810798 Mar 3 21:18:54.258: 2/0 : set lcb->fm_mode to CALL_FM_NONE (0) Mar 3 21:18:54.258: 2/0 : No state change Mar 3 21:18:54.298: 2/0 : ==> Received event:STCAPP_DC_EV_MEDIA_CLOSE_RCV_CHNL Mar 3 21:18:54.298: 2/0 : Call State:FM_DIGIT_COLLECT Mar 3 21:18:54.298: 2/0 : stcapp_close_rcv_chnl_eh Mar 3 21:18:54.298: 2/0 : stcapp_disconnect_call_leg Mar 3 21:18:54.298: 2/0 : No state change Mar 3 21:18:54.302: 2/0 : ==> Received event:STCAPP_DC_EV_MEDIA_CLOSE_XMT_CHNL Mar 3 21:18:54.302: 2/0 : Call State:FM_DIGIT_COLLECT Mar 3 21:18:54.302: 2/0 : stcapp_active_close_xmt_chnl_eh Mar 3 21:18:54.302: 2/0 : New State = ONHOOK_PEND
The following is sample output n Cisco IOS 12.4(6)XE from the debug voip application stcapp all command showing call control feature mode messages for the drop last conferee feature:
Router# debug voip application stcapp all Mar 3 21:27:05.170: 2/0 : stcapp_handle_fm_feature_id Mar 3 21:27:05.170: 2/0 : lcb->fm_mode = CALL_FM_CONF_FT_OFF(7), Mar 3 21:27:05.170: 2/0 : stcapp_send_softkey_event Mar 3 21:27:05.170: 2/0 : Sending dcDeviceSoftKeyEvent(DropLastConferee: event=19) for device id: 1, call_ref: 16810795 Mar 3 21:27:05.170: 2/0 : set lcb->fm_mode to CALL_FM_NONE (0) Mar 3 21:27:05.170: 2/0 : No state change Mar 3 21:27:05.194: 2/0 : ==> Received event:STCAPP_DC_EV_DEVICE_CALL_INFO Mar 3 21:27:05.194: 2/0 : Call State:FM_DIGIT_COLLECT Mar 3 21:27:05.194: 2/0 : stcapp_conn_call_info_eh Mar 3 21:27:05.194: 2/0 : No state change Mar 3 21:27:05.194: 2/0 : ==> Received event:STCAPP_DC_EV_MEDIA_CLOSE_RCV_CHNL Mar 3 21:27:05.194: 2/0 : Call State:FM_DIGIT_COLLECT Mar 3 21:27:05.194: 2/0 : stcapp_close_rcv_chnl_eh Mar 3 21:27:05.198: 2/0 : stcapp_disconnect_call_leg Mar 3 21:27:05.198: 2/0 : No state change Mar 3 21:27:05.198: 2/0 : ==> Received event:STCAPP_DC_EV_MEDIA_CLOSE_XMT_CHNL Mar 3 21:27:05.198: 2/0 : Call State:FM_DIGIT_COLLECT Mar 3 21:27:05.202: 2/0 : stcapp_active_close_xmt_chnl_eh
DB-2577
Mar
3 21:27:05.202: 2/0
The following is sample output in Cisco IOS 12.4(6)XE from the debug voip application stcapp all command showing call control feature mode messages for the toggle feature:
Router# debug voip application stcapp all Mar 3 21:37:11.650: 2/0 : stcapp_handle_fm_feature_id Mar 3 21:37:11.650: 2/0 : lcb->fm_mode = CALL_FM_TRANSF_FT_OFF(5), Mar 3 21:37:11.650: 2/0 : STANDBY call_state=8 Mar 3 21:37:11.650: 2/0 : stcapp_send_softkey_event Mar 3 21:37:11.650: 2/0 : Sending dcDeviceSoftKeyEvent(Hold: event=3) for device id: 1, call_ref: 16810811 Mar 3 21:37:11.650: 2/0 : stcapp_send_softkey_event Mar 3 21:37:11.650: 2/0 : Sending dcDeviceSoftKeyEvent(Resume: event=10) for device id: 1, call_ref: 16810808 Mar 3 21:37:11.650: 2/0 : set new lcb->fm_mode=CALL_FM_NONE (0) Mar 3 21:37:11.650: 2/0 : in toggle: (1) Mar 3 21:37:11.650: 2/0 : No state change Mar 3 21:37:11.654: 2/0 : ==> Received event:STCAPP_DC_EV_MEDIA_CLOSE_RCV_CHNL Mar 3 21:37:11.658: 2/0 : Call State:FM_DIGIT_COLLECT Mar 3 21:37:11.658: 2/0 : stcapp_close_rcv_chnl_eh Mar 3 21:37:11.658: 2/0 : stcapp_disconnect_call_leg Mar 3 21:37:11.658: 2/0 : No state change Mar 3 21:37:11.674: 2/0 : ==> Received event:STCAPP_DC_EV_MEDIA_CLOSE_XMT_CHNL Mar 3 21:37:11.674: 2/0 : Call State:FM_DIGIT_COLLECT Mar 3 21:37:11.674: 2/0 : stcapp_active_close_xmt_chnl_eh Mar 3 21:37:11.674: 2/0 : New State = ONHOOK_PEND
The following is sample output from the debug voip application stcapp all command for a Cisco VG224 voice gateway in Cisco IOS Release 12.4(6)XE showing T.38 fax relay messages:
Router# debug voip application stcapp all 01:10:40: //68/xxxxxxxxxxxx/CCAPI/cc_api_set_fax_mode: Destination Interface=0x464EDDFC, Destination Call Id=68, Source Call Id=67 01:10:40: [1185752428]CNFSM: new_container:fax_t38_container 01:10:40: [1185752428]CNFSM: next_state:S_DSMP_GW_FAX_T38_CONNECTED 01:10:40: STCAPP:Receive CC event:: call_id=68, ccb=0x46B264C4 01:10:40: 1/0/0: ==> Received event:STCAPP_CC_EV_CALL_FEATURE_T38_CODEC for CallId: 68 01:10:40: 1/0/0: Call State:ACTIVE 01:10:40: 1/0/0: stcapp_t38_remote_codec_dnld_done_eh 01:10:40: //68/xxxxxxxxxxxx/CCAPI/ccCallFeature: Feature Type=39, Call Id=68 01:10:40: //67/xxxxxxxxxxxx/CCAPI/cc_api_remote_codec_dnld_done: Destination Interface=0x4631148C, Destination Call Id=67, Source Call Id=68, Xmit Function=0x4230E4D4 01:10:40: //-1/xxxxxxxxxxxx/DSM:():-1/dsp_stream_mgr_remote_dnld_done:
The following is sample output from the debug voip application stcapp all command for a voice gateway in Cisco IOS Release 12.4(4)T showing device modem transport capability:
Router# debug voip application stcapp all 01:10:40: //68/xxxxxxxxxxxx/CCAPI/cc_api_set_fax_mode: Destination Interface=0x464EDDFC, Destination Call Id=68, Source Call Id=67 01:10:40: [1185752428]CNFSM: new_container:fax_t38_container 01:10:40: [1185752428]CNFSM: next_state:S_DSMP_GW_FAX_T38_CONNECTED 01:10:40: STCAPP:Receive CC event:: call_id=68, ccb=0x46B264C4 01:10:40: 1/0/0: ==> Received event:STCAPP_CC_EV_CALL_FEATURE_T38_CODEC for CallId: 68 01:10:40: 1/0/0: Call State:ACTIVE 01:10:40: 1/0/0: stcapp_t38_remote_codec_dnld_done_eh 01:10:40: //68/xxxxxxxxxxxx/CCAPI/ccCallFeature: Feature Type=39, Call Id=68 01:10:40: //67/xxxxxxxxxxxx/CCAPI/cc_api_remote_codec_dnld_done: Destination Interface=0x4631148C, Destination Call Id=67, Source Call Id=68, Xmit Function=0x4230E4D4
DB-2578
December 2010
01:10:40: //-1/xxxxxxxxxxxx/DSM:():-1/dsp_stream_mgr_remote_dnld_done:
The following is sample output from the debug voip application stcapp all command showing modem transport device capability:
Router# debug voip application stcapp all *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan 11 11 11 11 11 11 11 11 11 11 11 11 11 12:24:18.443: 12:24:18.443: 12:24:18.443: 12:24:18.443: 12:24:18.443: 12:24:18.443: 12:24:18.443: 12:24:18.443: 12:24:18.443: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: stcapp_start stcapp process started stcapp_init_symphony CCAPI successfully initialized stcapp_init_rtp stcapp_vp_shut stcapp_port_up_down RTP successfully brought in service stcapp_create_dcbs_from_dialpeers 1/1/0: stcapp_create_device 1/1/0: Endpoint base name generated->AN0D65D8DD40280 1/1/0: New dialpeer id: 999110 1/1/0: Analog device is ready to be registered
The following lines show the codec subtype, which indicates the modem transport method, 0=None, 1=V.150.1 (modem relay), 2=VBD (modem pass-through):
*Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan with *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 CM 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.447: 12:24:18.455: 12:24:18.455: 12:24:18.455: 12:24:18.455: 12:24:18.455: 12:24:18.455: 12:24:18.455: 12:24:18.455: 12:24:18.455: 12:24:18.455: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: reg caps including codec=5 (g711ulaw) subtype=2 reg caps including codec=1 (g729ar8) subtype=2 reg caps including codec=5 (g711ulaw) subtype=1 reg caps including codec=1 (g729ar8) subtype=1 reg caps including codec=5 (g711ulaw) subtype=0 reg caps including codec=6 (g711alaw) subtype=0 reg caps including codec=1 (g729ar8) subtype=0 reg caps including codec=2 (g726r16) subtype=0 reg caps including codec=3 (g726r24) subtype=0 reg caps including codec=4 (g726r32) subtype=0 reg caps including codec=7 (g728) subtype=0 reg caps including codec=8 (g723r63) subtype=0 reg caps including codec=9 (g723r53) subtype=0 reg caps including codec=12 (g729br8) subtype=0 reg caps including codec=14 (g723ar63) subtype=0 reg caps including codec=15 (g723ar53) subtype=0 Device: AN0D65D8DD40280 Id: 7 successfully registered
==> Received event:STCAPP_DC_EV_DEVICE_REGISTER_DONE 1/1/0: Device State:OOS 1/1/0: stcapp_dev_default_eh 1/1/0: New State = INIT ==> Received event:STCAPP_DC_EV_DEVICE_CAP_REQ 1/1/0: Device State:INIT 1/1/0: stcapp_cap_req_eh 1/1/0: Sending dcDeviceHeadsetStatus for devID:7 1/1/0: Sending dcDeviceButtonTemplateReq for devID:7 1/1/0: No state change ==> Received event:STCAPP_DC_EV_DEVICE_BUTTON_TEMP_RES 1/1/0: Device State:INIT 1/1/0: stcapp_button_templ_res_eh 1/1/0: Sending dcDeviceLineStatReq for devID:7 1/1/0: No state change ==> Received event:STCAPP_DC_EV_DEVICE_FORWARD_STAT_RES 1/1/0: Device State:INIT 1/1/0: stcapp_forward_stat_res_eh 1/1/0: lineNumber: 1 1/1/0: forwardAllActive: 0 1/1/0: forwardBusyActive: 0 1/1/0: forwardNoAnswerActive: 0
DB-2579
*Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan
11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11
12:24:18.651: 12:24:18.651: 12:24:18.651: 12:24:18.651: 12:24:18.455: 12:24:18.455: 12:24:18.455: 12:24:18.455: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.647: 12:24:18.651: 12:24:18.651: 12:24:18.651: 12:24:18.651: 12:24:18.651: 12:24:18.651: 12:24:18.651: 12:24:18.651: 12:24:18.651: 12:24:18.651: 12:24:18.651: 12:24:18.823: 12:24:18.827: 12:24:18.827: 12:24:18.827: 12:24:18.827: 12:24:18.827: 12:24:18.827: 12:24:18.827: 12:24:18.827: 12:24:18.827: 12:24:18.827: 12:24:18.827:
1/1/0: ForwardAllDirNumber: 1/1/0: No state change ==> Received event:STCAPP_DC_EV_DEVICE_LINE_STAT_RES 1/1/0: Device State:INIT 1/1/0: stcapp_cap_req_eh 1/1/0: Sending dcDeviceHeadsetStatus for devID:7 1/1/0: Sending dcDeviceButtonTemplateReq for devID:7 1/1/0: No state change ==> Received event:STCAPP_DC_EV_DEVICE_BUTTON_TEMP_RES 1/1/0: Device State:INIT 1/1/0: stcapp_button_templ_res_eh 1/1/0: Sending dcDeviceLineStatReq for devID:7 1/1/0: No state change ==> Received event:STCAPP_DC_EV_DEVICE_FORWARD_STAT_RES 1/1/0: Device State:INIT 1/1/0: stcapp_forward_stat_res_eh 1/1/0: lineNumber: 1 1/1/0: forwardAllActive: 0 1/1/0: forwardBusyActive: 0 1/1/0: forwardNoAnswerActive: 0 1/1/0: ForwardAllDirNumber: 1/1/0: No state change ==> Received event:STCAPP_DC_EV_DEVICE_LINE_STAT_RES 1/1/0: Device State:INIT 1/1/0: stcapp_line_stat_eh 1/1/0: lineNumber: 1 1/1/0: lineDirNumber: 5902 1/1/0: display name: 5902 1/1/0: Sending dcDeviceRegAvailableLines for devID:7 1/1/0: Sending dcDeviceDateTimeReq for devID:7 1/1/0: No state change ==> Received event:STCAPP_DC_EV_DEVICE_DEFINE_DATE_TIME_RES 1/1/0: Device State:INIT 1/1/0: stcapp_define_date_time_eh 1/1/0: New State = IS ==> Received event:STCAPP_DC_EV_DEVICE_DISPLAY_PROMPT_STATUS 1/1/0: Device State:IS 1/1/0: stcapp_display_prompt_status_eh 1/1/0: lineNumber: 0 1/1/0: call reference: 0 1/1/0: promptStatus: Your current options 1/1/0: device control type: 3 1/1/0: No state change
The following is sample output from the debug voip application stcapp all command during call setup:
Router# debug voip application stcapp all
The following lines show the voice gateway beginning call setup:
*Jan 9 06:48:06.947: ==> Received event:STCAPP_CC_EV_CALL_SETUP_IND (evId:CC_EV_CALL_SETUP_IND) for CallId: 5 *Jan 9 06:48:06.947: 1/0/0: Call State:IDLE *Jan 9 06:48:06.947: 1/0/0: stcapp_setup_ind_eh *Jan 9 06:48:06.947: 1/0/0: Acquired CCB 0x66F12558 for device id:4 *Jan 9 06:48:06.947: 1/0/0: Voice Setup: callID:5, vdb_ptr:66CA57B4
The voice gateway notifies the Cisco Unified Communications Manager of the endpoint device (phone) in the offhook condition.
*Jan *Jan 9 06:48:06.947: 1/0/0: 9 06:48:06.947: 1/0/0: Sending StationOffHook to CallManager Sending ccCallSetupAck to Symphony for voice call id:5
DB-2580
December 2010
New State = OFFHOOK No line (line=0) found... most likely old Call Ref: event
The following lines show that the Cisco Unified Communications Manager acknowledged the offhook condition:
*Jan 9 06:48:06.955: ==> Received event:STCAPP_DC_EV_DEVICE_CALL_STATE_OFFHOOK (evID:DC_EV_DEVICE_CALL_STATE_OFFHOOK) *Jan 9 06:48:06.955: 1/0/0: Call State:OFFHOOK *Jan 9 06:48:06.955: 1/0/0: stcapp_cs_offhook_eh *Jan 9 06:48:06.955: 1/0/0: No state change
The voice gateway receives the Cisco Unified Communications Manager notification to send dial tone to the phone.
*Jan 9 06:48:06.955: ==> Received event:STCAPP_DC_EV_DEVICE_START_TONE (evID:DC_EV_DEVICE_START_TONE) *Jan 9 06:48:06.955: 1/0/0: Call State:OFFHOOK *Jan 9 06:48:06.955: 1/0/0: stcapp_start_tone_eh
The voice gateway generates dial tone and prepares to collect dialed digits.
*Jan *Jan *Jan 9 06:48:06.955: 1/0/0: 9 06:48:06.955: 1/0/0: 9 06:48:06.955: 1/0/0: Sending ccGenerateTone(8(0x8)) Sending ccCallReportDigits No state change
Related Commands
Command debug voip application stcapp error debug voip application stcapp events debug voip application stcapp functions debug voip application stcapp port
Description Displays STCAPP error log contents. Traces STCAPP call flow events. Displays STCAPP entry and exit function calls for all voice ports. Displays debugging information for the components of the STCAPP for a specified port.
DB-2581
Syntax Description
Enables logging for all analog voice ports. Enables logging for only the specified analog voice port.
Note
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command enables logging of call flow events and device events, including registering and unregistering. You can use the event log to help troubleshoot performance problems and isolate faults related to analog endpoints. To display the records in the event log, use the show sctapp buffer-history command. A maximum of 2000 records are saved for each analog port. The event log uses a circular buffer that stores the 2000 most recent records. To clear the buffer, you can disable logging with the no debug voip application stcapp buffer-history command. The event log uses approximately 64 KB of memory for each port, or approximately 1.5 MB of memory if logging is enabled for all 24 ports.
Note
The debug voip application stcapp all command has no impact on event logging. Enabling or disabling STCAPP debug output is separate from the event logging feature.
Examples
The following example enables event logging for analog port 2/3. To display the events, you must use the show sctapp buffer-history command.
Router# debug voip application stcapp buffer-history port 2/3 stcapp buffer-history logging for port 2/3 is on
DB-2582
December 2010
Related Commands
Command debug voip application stcapp all debug voip application stcapp error debug voip application stcapp events debug voip application stcapp functions debug voip application stcapp port show stcapp buffer-history
Description Displays debug output for all the debug commands for the STCAPP compiled into one display. Displays STCAPP error log contents. Traces STCAPP call flow events. Displays STCAPP entry and exit function calls for all voice ports. Displays STCAPP debug output for a specific port. Displays event logs for STCAPP analog voice ports.
DB-2583
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug voip application stcapp error command traces application error logs. STCAPP error logs are generated during normal call processing, when there are insufficient resources, or when there are problems in the underlying application code. This command shows error events or unexpected behavior in system software. Usually no events are generated.
Examples
The following example shows the error log contents when STCAPP debugging is enabled:
Router# debug voip application stcapp error STCAPP error debugging is on Router# *Jan 9 06:54:07.583: stcapp_process_queue_events:ERROR:STCAPP_DCB_ACCESS_ERR from state machine
Related Commands
Command debug voip application stcapp all debug voip application stcapp events debug voip application stcapp functions debug voip application stcapp port
Description Displays debug output for all the debug commands for the STCAPP compiled into one display. Traces STCAPP call flow events. Displays STCAPP entry and exit function calls for all voice ports. Displays debug information for the components of the STCAPP for a specified port.
DB-2584
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to debug call flow events for all ports controlled by the STCAPP.
Examples
The following lines show the application running on the voice gateway receiving notice to stop dial tone generation, following the onhook condition of the endpoint device (phone):
*Jan 9 06:48:55.011: ==> Received event:STCAPP_DC_EV_DEVICE_STOP_TONE (evID:DC_EV_DEVICE_STOP_TONE) *Jan 9 06:48:55.011: 1/0/1: Call State:REM_ONHOOK_PEND *Jan 9 06:48:55.011: 1/0/1: stcapp_stop_tone_eh *Jan 9 06:48:55.011: 1/0/1: Sending ccGenerateTone(NULL) *Jan 9 06:48:55.015: 1/0/1: No state change
The application receives the call disconnect notice and proceeds to tear down the telephony call leg.
*Jan 9 06:48:58.903: ==> Received event:STCAPP_CC_EV_CALL_DISCONNECTED (evId:CC_EV_CALL_DISCONNECTED) for CallId: 6 *Jan 9 06:48:58.903: 1/0/1: Call State:REM_ONHOOK_PEND *Jan 9 06:48:58.903: 1/0/1: stcapp_loc_onhook_eh *Jan 9 06:48:58.903: 1/0/1: Sending StationOnHook to CallManager
DB-2585
9 9 9 9 9 9 9 9
1/0/1: stcapp_call_cleanup 1/0/1: stcapp_set_ring_mode 1/0/1: SCCP ring mode:1 1/0/1: Invoking Feature:33. Mode:0 for callid:6 1/0/1: stcapp_disconnect_call_leg 1/0/1: Sending ccCallDisconnect for call id:6 1/0/1: CCB 0x65CF3EC4 unlinked 1/0/1: New State = IDLE
Related Commands
Command debug voip application stcapp all debug voip application stcapp error debug voip application stcapp functions debug voip application stcapp port
Description Displays debug output for all the debug commands for the STCAPP compiled into one display. Displays STCAPP error log contents. Displays STCAPP entry and exit function calls for all voice ports. Displays debug information for the components of the STCAPP for a specified port.
DB-2586
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use this command to display STCAPP entry and exit function calls for all voice ports.
Examples
The following example displays function calls for STCAPP ports 1/0/0 and 1/0/1:
Router# debug voip application stcapp functions STCAPP function debugging is *Jan 9 06:55:27.583: 1/0/0: *Jan 9 06:55:27.591: 1/0/0: *Jan 9 06:55:27.591: 1/0/0: *Jan 9 06:55:27.591: 1/0/0: *Jan 9 06:55:28.923: 1/0/0: *Jan 9 06:55:28.927: 1/0/0: *Jan 9 06:55:29.063: 1/0/0: *Jan 9 06:55:29.203: 1/0/0: *Jan 9 06:55:29.343: 1/0/0: *Jan 9 06:55:29.355: 1/0/0: *Jan 9 06:55:29.359: 1/0/0: *Jan 9 06:55:29.359: 1/0/0: *Jan 9 06:55:29.359: 1/0/0: *Jan 9 06:55:29.359: 1/0/1: *Jan 9 06:55:29.359: 1/0/1: on stcapp_setup_ind_eh stcapp_cs_offhook_eh stcapp_start_tone_eh stcapp_report_digits_done_eh stcapp_digit_end_eh stcapp_stop_tone_eh stcapp_digit_end_eh stcapp_digit_end_eh stcapp_digit_end_eh stcapp_cs_proceed_eh stcapp_proceed_call_info_eh stcapp_start_tone_eh stcapp_proceed_call_info_eh stcapp_cs_ringin_eh stcapp_call_info_eh
DB-2587
Related Commands
Command debug voip application stcapp all debug voip application stcapp error debug voip application stcapp events debug voip application stcapp port
Description Displays debug output for all the debug commands for the STCAPP compiled into one display. Displays STCAPP error log contents. Traces STCAPP call flow events. Displays debug information for the components of the STCAPP for a specified port.
DB-2588
December 2010
Syntax Description
port-number
Number of the port on the interface. See the appropriate platform manual or online help for port numbers on your networking device.
Command Modes
Command History
Modification This command was introduced. Command output was enhanced to display modem transport method. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. Command output was enhanced to display fax relay, RFC 2833 DTMF digit relay, dial tone after remote onhook, call control feature mode and visual message waiting indicator (VMWI) information for SCCP analog ports. This command was integrated into Cisco IOS Release 12.4(11)T.
12.4(6)XE
12.4(11)T
Usage Guidelines
Use this command to display debugging information for the components of the STCAPP for a specified port.
Examples
The following example displays RFC 2833 DTMF digits messages sent and received on a voice gateway in Cisco IOS Release 12.4(6)XE:
Router# debug voip application stcapp port 2/3
The following lines show the SCCP gateway receiving the RFC payload.
Mar 4 00:23:31.166: 2/3 *Mar 4 00:23:31.166: 2/3 *Mar 4 00:23:31.166: 2/3 *Mar 4 00:23:31.166: 2/3 *Mar 4 00:23:31.166: 2/3 *Mar 4 00:23:31.166: 2/3 *Mar 4 00:23:31.166: 2/3 *Mar 4 00:23:31.166: 2/3 *Mar 4 00:23:31.166: 2/3 : ==> Received event:STCAPP_DC_EV_MEDIA_OPEN_RCV_CHNL : Call State:PROCEEDING : stcapp_open_rcv_chnl_eh : call_ref=20797703 : stcapp_get_ccb_ptr : received ORC: rcv payload=101 : stcapp_set_up_voip_leg : stcapp_get_ccb_ptr : stcapp_set_up_modem_parms
DB-2589
The following lines show the SCCP gateway sending the RFC payload.
*Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar *Mar 4 4 4 4 4 4 4 4 4 00:23:31.174: 00:23:31.174: 00:23:31.174: 00:23:31.174: 00:23:31.174: 00:23:31.174: 00:23:31.174: 00:23:31.174: 00:23:31.174: 2/3 2/3 2/3 2/3 2/3 2/3 2/3 2/3 2/3 : ==> Received event:STCAPP_DC_EV_MEDIA_OPEN_XMT_CHNL : Call State:CONNECTING : stcapp_start_media_eh : call_ref=20797703 : stcapp_get_ccb_ptr : lcb->mode 0, lcb->conf_status 0 : received XMT: send payload=101 : Start media: CCB Count:1 Call Leg Count:2 : New State = ACTIVE_PENDING
The following example displays VMWI lamp state messages between Cisco Unified Communications Manager and a voice gateway in Cisco IOS Release 12.4(6)XE:
Router# debug voip application stcapp port 2/4 *Mar 1 01:41:58.395: 2/0 : No state change... call remaining *Mar 16 21:47:14.045: 2/4 : stcapp_screen_api_event
The following lines show the gateway receiving messages from Cisco Unified Communications Manager to activate the VMWI lamp.
*Mar 16 21:47:14.045: *Mar 16 21:47:14.049: *Mar 16 21:47:14.049: created. *Mar 16 21:47:14.049: *Mar 16 21:47:14.053: CallId: 229 *Mar 16 21:47:14.053: *Mar 16 21:47:14.053: *Mar 16 21:47:14.057: *Mar 16 21:47:14.057: CallId: 229 *Mar 16 21:47:14.057: *Mar 16 21:47:14.057: *Mar 16 21:47:14.057: *Mar 16 21:47:14.057: 2/4 2/4 2/4 2/4 2/4 2/4 2/4 2/4 2/4 2/4 2/4 2/4 2/4 : : : event:STCAPP_DC_EV_DEVICE_SET_LAMP received. msg_mwi 1, mwi 0, vmwi 0 event STCAPP_DC_EV_DEVICE_SET_LAMP_PROCESS_VMWI
: New State = VMWI_DSP_SETUP : ==> Received event:STCAPP_CC_EV_CALL_PROCEEDING for : Call State:VMWI_DSP_SETUP : stcapp_vmwi_call_proceed_eh : No state change : ==> Received event:STCAPP_CC_EV_CALL_MODIFY_DONE for : Call State:VMWI_DSP_SETUP : stcapp_vmwi_call_modify_done_eh : Sending ccCallFeature (vmwi = on) : New State = VMWI_PENDING
The following lines show that the VMWI activation is completed and call-tear down is beginning.
*Mar *Mar *Mar *Mar *Mar *Mar *Mar 16 16 16 16 16 16 16 21:47:15.237: 21:47:15.237: 21:47:15.237: 21:47:15.237: 21:47:15.237: 21:47:15.237: 21:47:15.237: 2/4 2/4 2/4 2/4 2/4 2/4 2/4 : : : : : : : ==> Received event:STCAPP_CC_EV_VBD_XMIT_DONE for CallId:229 Call State:VMWI_PENDING stcapp_vmwi_fsk_gen_done_eh stcapp_get_ccb_ptr disconnect voice call leg stcapp_disconnect_call_leg Sending ccCallDisconnect for VOICE_LEG with call id:229
The following example displays information on a call between ports 1/1/0 and 1/1/1 after port 1/1/1 hangs up and the automatic dial tone generation after remote onhook feature is enabled:
Router# debug voip application stcapp port 1/1/0 Jan 7 00:41:37.484: 1/1/0: ==> Received event:STCAPP_DC_EV_MEDIA_CLOSE_RCV_CHNL *Jan 7 00:41:37.484: 1/1/0: Call State:ACTIVE
DB-2590
December 2010
*Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan
7 7 7 7 7 7 7 7 7 7 7 7
00:41:37.484: 00:41:37.484: 00:41:37.488: 00:41:37.488: 00:41:37.488: 00:41:37.488: 00:41:37.488: 00:41:37.488: 00:41:37.488: 00:41:37.488: 00:41:37.488: 00:41:37.488:
1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0:
Sending ccCallDisconnect for VoIP_LEG with call id:44 No state change ==> Received event:STCAPP_DC_EV_MEDIA_CLOSE_XMT_CHNL Call State:ACTIVE stcapp_active_close_xmt_chnl_eh lcb->mode 0 lcb->conf_status 0 New State = ONHOOK_PEND stcapp_cs_onhook_eh stcapp_get_ccb_ptr call_ref=209, ccb=0x4662B31C, lcb->num_ccbs=1 stcapp_process_cs_onhook lcb->mode=CALL_BASIC (0)
The following lines show power denial-based supervisory disconnect signal being sent.
*Jan 7 00:41:37.488: *Jan 7 00:41:37.488: *Jan 7 00:41:37.488: *Jan 7 00:41:37.488: id: 9, call_ref: 0 *Jan 7 00:41:37.488: *Jan 7 00:41:37.488: *Jan 7 00:41:37.488: *Jan 7 00:41:37.488: *Jan 7 00:41:37.488: *Jan 7 00:41:37.488: *Jan 7 00:41:37.488: *Jan 7 00:41:37.488: *Jan 7 00:41:37.492: 41 *Jan 7 00:41:37.492: *Jan 7 00:41:37.492: *Jan 7 00:41:37.492: *Jan 7 00:41:37.492: *Jan 7 00:41:37.492: *Jan 7 00:41:37.492: *Jan 7 00:41:37.492: *Jan 7 00:41:37.492: *Jan 7 00:41:37.492: call_id=44 *Jan 7 00:41:37.492: *Jan 7 00:41:37.492: *Jan 7 00:41:37.492: *Jan 7 00:41:37.496: 1/1/0: Sending power denial signal to device 9 1/1/0: stcapp_update_dialtone_gen_trigger 1/1/0: stcapp_send_softkey_event 1/1/0: Sending dcDeviceSoftKeyEvent(NewCall: event=2) for device 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: 1/1/0: New State = REM_ONHOOK_PEND ==> Received event:STCAPP_DC_EV_DEVICE_STOP_TONE Call State:REM_ONHOOK_PEND stcapp_stop_tone_eh call_ref=209 stcapp_get_ccb_ptr Sending ccGenerateTone(NULL) No state change ==> Received event:STCAPP_CC_EV_CONF_DESTROY_DONE for CallId:
1/1/0: Call State:REM_ONHOOK_PEND 1/1/0: Uninteresting event 1/1/0: stcapp_screen_api_event 1/1/0: event:STCAPP_CC_EV_CALL_DISCONNECT_DONE received. STCAPP:Receive CC event:: call_id=44, ccb=0x4662B31C 1/1/0: Received event:CC_EV_CALL_DISCONNECT_DONE for CallId: 44 1/1/0: stcapp_process_disconnect_done 1/1/0: stcapp_reset_call_leg 1/1/0: ccb(0x4662B31C): voice/voip call_id=41/44, reset 1/1/0: stcapp_conn_db_delete_ccb 1/1/0: ccb=0x4662B31C 1/1/0: Disconnect Done: CCB Count:1 Call Leg Count:1 1/1/0: stcapp_get_dcb_and_lcb
DB-2591
The following lines show the message to generate a dial tone for the new call.
*Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan *Jan 7 7 7 7 7 7 7 7 7 7 00:41:37.496: 00:41:37.496: 00:41:37.496: 00:41:37.496: 00:41:37.496: 00:41:37.496: 00:41:37.496: 00:41:37.496: 00:41:37.496: 00:41:37.496: 1/1/0: ==> Received event:STCAPP_DC_EV_DEVICE_START_TONE 1/1/0: Call State:OFFHOOK 1/1/0: stcapp_start_tone_eh 1/1/0: stcapp_get_ccb_ptr 1/1/0: call_ref=211, ccb=0x4662B31C, tone=8(0x8), dir=1 1/1/0: plar enable (0), hookflash (0) 1/1/0: plar enable (0), tone (0x8), hookflash (0) 1/1/0: Sending ccGenerateTone(8(0x8)) ? produce dial tone 1/1/0: Sending ccCallReportDigits 1/1/0: No state change
The following example displays information about a modem-relay call on a voice gateway in Cisco IOS Release 12.4(4)T:
Router# debug voip application stcapp port 1/1/0 *Jan 11 12:37:48.631: ==> Received event:STCAPP_CC_EV_CALL_SETUP_IND (evId:CC_EV_CALL_SETUP_IND) for CallId: 326 *Jan 11 12:37:48.631: 1/1/0: Call State:IDLE *Jan 11 12:37:48.631: 1/1/0: stcapp_setup_ind_eh *Jan 11 12:37:48.631: 1/1/0: stcapp_get_ccb *Jan 11 12:37:48.631: 1/1/0: dcb->lcb[line_inst - 1].num_ccbs=0 *Jan 11 12:37:48.631: 1/1/0: Acquired CCB 0x65D932B8 for device id:7 *Jan 11 12:37:48.631: 1/1/0: num_ccbs++, num_ccbs=1 *Jan 11 12:37:48.631: 1/1/0: Voice Setup: callID:326, vdb_ptr:666581AC *Jan 11 12:37:48.631: 1/1/0: Sending StationOffHook to CallManager *Jan 11 12:37:48.631: 1/1/0: Sending ccCallSetupAck to Symphony for voice call id:326 *Jan 11 12:37:48.631: 1/1/0: New State = OFFHOOK *Jan 11 12:37:48.643: 1/1/0: No line (line=0) found... most likely old Call Ref: event STCAPP_DC_EV_DEVICE_SET_RINGER *Jan 11 12:37:48.643: ==> Received event:STCAPP_DC_EV_DEVICE_CALL_STATE_OFFHOOK (evID:DC_EV_DEVICE_CALL_STATE_OFFHOOK) *Jan 11 12:37:48.643: 1/1/0: Call State:OFFHOOK *Jan 11 12:37:48.643: 1/1/0: stcapp_cs_offhook_eh *Jan 11 12:37:48.643: 1/1/0: call_ref=16777250 *Jan 11 12:37:48.643: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:48.643: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:48.643: 1/1/0: Using call_ref 0 to get ccb=0x65D932B8 *Jan 11 12:37:48.643: 1/1/0: No state change *Jan 11 12:37:48.643: ==> Received event:STCAPP_DC_EV_DEVICE_DISPLAY_PROMPT_STATUS *Jan 11 12:37:48.643: 1/1/0: Device State:IS *Jan 11 12:37:48.643: 1/1/0: stcapp_display_prompt_status_eh *Jan 11 12:37:48.643: 1/1/0: lineNumber: 1 *Jan 11 12:37:48.643: 1/1/0: call reference: 16777250 *Jan 11 12:37:48.643: 1/1/0: promptStatus: Enter Number *Jan 11 12:37:48.643: 1/1/0: No state change *Jan 11 12:37:48.643: ==> Received event:STCAPP_DC_EV_DEVICE_START_TONE (evID:DC_EV_DEVICE_START_TONE) *Jan 11 12:37:48.643: 1/1/0: Call State:OFFHOOK *Jan 11 12:37:48.643: 1/1/0: stcapp_start_tone_eh *Jan 11 12:37:48.643: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:48.643: 1/1/0: call_ref=16777250, ccb=0x65D932B8, tone=8(0x8) *Jan 11 12:37:48.643: 1/1/0: Sending ccGenerateTone(8(0x8)) *Jan 11 12:37:48.643: 1/1/0: Sending ccCallReportDigits *Jan 11 12:37:48.643: 1/1/0: No state change *Jan 11 12:37:48.643: ==> Received event:STCAPP_CC_EV_CALL_REPORT_DIGITS_DONE (evId:CC_EV_CALL_REPORT_DIGITS_DONE) for CallId: 326 *Jan 11 12:37:48.647: 1/1/0: Call State:OFFHOOK *Jan 11 12:37:48.647: 1/1/0: stcapp_report_digits_done_eh *Jan 11 12:37:48.647: 1/1/0: No state change *Jan 11 12:37:52.643: ==> Received event:STCAPP_CC_EV_CALL_DIGIT_BEGIN (evId:CC_EV_CALL_DIGIT_BEGIN) for CallId: 326 *Jan 11 12:37:52.643: 1/1/0: Call State:OFFHOOK
DB-2592
December 2010
*Jan 11 12:37:52.643: 1/1/0: Uninteresting event *Jan 11 12:37:52.683: ==> Received event:STCAPP_CC_EV_CALL_DIGIT_END (evId:CC_EV_CALL_DIGIT_END) for CallId: 326 *Jan 11 12:37:52.683: 1/1/0: Call State:OFFHOOK *Jan 11 12:37:52.683: 1/1/0: stcapp_digit_end_eh *Jan 11 12:37:52.683: 1/1/0: Digit received is (5) *Jan 11 12:37:52.683: 1/1/0: Sending StationKeypadButton(5) to CallManager *Jan 11 12:37:52.683: 1/1/0: No state change *Jan 11 12:37:52.687: ==> Received event:STCAPP_DC_EV_DEVICE_STOP_TONE (evID:DC_EV_DEVICE_STOP_TONE) *Jan 11 12:37:52.687: 1/1/0: Call State:OFFHOOK *Jan 11 12:37:52.687: 1/1/0: stcapp_stop_tone_eh *Jan 11 12:37:52.687: 1/1/0: call_ref=16777250 *Jan 11 12:37:52.687: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:52.687: 1/1/0: Sending ccGenerateTone(NULL) *Jan 11 12:37:52.687: 1/1/0: No state change *Jan 11 12:37:52.775: ==> Received event:STCAPP_CC_EV_CALL_DIGIT_BEGIN (evId:CC_EV_CALL_DIGIT_BEGIN) for CallId: 326 *Jan 11 12:37:52.775: 1/1/0: Call State:OFFHOOK *Jan 11 12:37:52.775: 1/1/0: Uninteresting event *Jan 11 12:37:52.823: ==> Received event:STCAPP_CC_EV_CALL_DIGIT_END (evId:CC_EV_CALL_DIGIT_END) for CallId: 326 *Jan 11 12:37:52.823: 1/1/0: Call State:OFFHOOK *Jan 11 12:37:52.823: 1/1/0: stcapp_digit_end_eh *Jan 11 12:37:52.823: 1/1/0: Digit received is (8) *Jan 11 12:37:52.823: 1/1/0: Sending StationKeypadButton(8) to CallManager *Jan 11 12:37:52.823: 1/1/0: No state change *Jan 11 12:37:52.923: ==> Received event:STCAPP_CC_EV_CALL_DIGIT_BEGIN (evId:CC_EV_CALL_DIGIT_BEGIN) for CallId: 326 *Jan 11 12:37:52.923: 1/1/0: Call State:OFFHOOK *Jan 11 12:37:52.923: 1/1/0: Uninteresting event *Jan 11 12:37:52.963: ==> Received event:STCAPP_CC_EV_CALL_DIGIT_END (evId:CC_EV_CALL_DIGIT_END) for CallId: 326 *Jan 11 12:37:52.963: 1/1/0: Call State:OFFHOOK *Jan 11 12:37:52.963: 1/1/0: stcapp_digit_end_eh *Jan 11 12:37:52.963: 1/1/0: Digit received is (0) *Jan 11 12:37:52.963: 1/1/0: Sending StationKeypadButton(0) to CallManager *Jan 11 12:37:52.963: 1/1/0: No state change *Jan 11 12:37:53.063: ==> Received event:STCAPP_CC_EV_CALL_DIGIT_BEGIN (evId:CC_EV_CALL_DIGIT_BEGIN) for CallId: 326 *Jan 11 12:37:53.063: 1/1/0: Call State:OFFHOOK *Jan 11 12:37:53.063: 1/1/0: Uninteresting event *Jan 11 12:37:53.103: ==> Received event:STCAPP_CC_EV_CALL_DIGIT_END (evId:CC_EV_CALL_DIGIT_END) for CallId: 326 *Jan 11 12:37:53.103: 1/1/0: Call State:OFFHOOK *Jan 11 12:37:53.103: 1/1/0: stcapp_digit_end_eh *Jan 11 12:37:53.103: 1/1/0: Digit received is (2) *Jan 11 12:37:53.103: 1/1/0: Sending StationKeypadButton(2) to CallManager *Jan 11 12:37:53.103: 1/1/0: No state change *Jan 11 12:37:53.235: ==> Received event:STCAPP_DC_EV_DEVICE_CALL_STATE_PROCEED (evID:DC_EV_DEVICE_CALL_STATE_PROCEED) *Jan 11 12:37:53.235: 1/1/0: Call State:OFFHOOK *Jan 11 12:37:53.235: 1/1/0: stcapp_cs_proceed_eh *Jan 11 12:37:53.235: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:53.235: 1/1/0: Sending ccCallProceeding for voice call id:326 *Jan 11 12:37:53.235: 1/1/0: Stopping the initial and inter digit timer! *Jan 11 12:37:53.235: 1/1/0: New State = PROCEEDING *Jan 11 12:37:53.235: ==> Received event:STCAPP_DC_EV_DEVICE_CALL_INFO (evID:DC_EV_DEVICE_CALL_INFO) *Jan 11 12:37:53.235: 1/1/0: Call State:PROCEEDING *Jan 11 12:37:53.235: 1/1/0: stcapp_proceed_call_info_eh *Jan 11 12:37:53.235: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:53.239: 1/1/0: No state change
DB-2593
*Jan 11 12:37:53.239: ==> Received event:STCAPP_DC_EV_DEVICE_START_TONE (evID:DC_EV_DEVICE_START_TONE) *Jan 11 12:37:53.239: 1/1/0: Call State:PROCEEDING *Jan 11 12:37:53.239: 1/1/0: stcapp_start_tone_eh *Jan 11 12:37:53.239: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:53.239: 1/1/0: call_ref=16777250, ccb=0x65D932B8, tone=1(0x1) *Jan 11 12:37:53.239: 1/1/0: Sending ccCallAlert(signal:1) for voice call id:326 *Jan 11 12:37:53.239: 1/1/0: No state change *Jan 11 12:37:53.239: ==> Received event:STCAPP_DC_EV_DEVICE_CALL_STATE_RINGOUT (evID:DC_EV_DEVICE_CALL_STATE_RINGOUT) *Jan 11 12:37:53.239: 1/1/0: Call State:PROCEEDING *Jan 11 12:37:53.239: 1/1/0: stcapp_set_call_state_eh *Jan 11 12:37:53.239: 1/1/0: call_ref=16777250, call_state=2 *Jan 11 12:37:53.239: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:53.239: 1/1/0: No state change *Jan 11 12:37:53.239: ==> Received event:STCAPP_DC_EV_DEVICE_DISPLAY_PROMPT_STATUS *Jan 11 12:37:53.239: 1/1/0: Device State:IS *Jan 11 12:37:53.239: 1/1/0: stcapp_display_prompt_status_eh *Jan 11 12:37:53.239: 1/1/0: lineNumber: 1 *Jan 11 12:37:53.239: 1/1/0: call reference: 16777250 *Jan 11 12:37:53.239: 1/1/0: promptStatus: Ring Out *Jan 11 12:37:53.239: 1/1/0: No state change *Jan 11 12:37:53.239: ==> Received event:STCAPP_DC_EV_DEVICE_CALL_INFO (evID:DC_EV_DEVICE_CALL_INFO) *Jan 11 12:37:53.239: 1/1/0: Call State:PROCEEDING *Jan 11 12:37:53.239: 1/1/0: stcapp_proceed_call_info_eh *Jan 11 12:37:53.239: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:53.239: 1/1/0: No state change *Jan 11 12:37:56.635: ==> Received event:STCAPP_DC_EV_DEVICE_STOP_TONE (evID:DC_EV_DEVICE_STOP_TONE) *Jan 11 12:37:56.635: 1/1/0: Call State:PROCEEDING *Jan 11 12:37:56.635: 1/1/0: stcapp_stop_tone_eh *Jan 11 12:37:56.635: 1/1/0: call_ref=16777250 *Jan 11 12:37:56.635: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:56.639: 1/1/0: Sending ccGenerateTone(NULL) *Jan 11 12:37:56.639: 1/1/0: No state change *Jan 11 12:37:56.639: ==> Received event:STCAPP_DC_EV_MEDIA_OPEN_RCV_CHNL (evID:DC_EV_MEDIA_OPEN_RCV_CHNL) *Jan 11 12:37:56.639: 1/1/0: Call State:PROCEEDING *Jan 11 12:37:56.639: 1/1/0: stcapp_open_rcv_chnl_eh *Jan 11 12:37:56.639: 1/1/0: call_ref=16777250 *Jan 11 12:37:56.639: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:56.639: 1/1/0: stcapp_set_up_voip_leg *Jan 11 12:37:56.639: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:56.639: 1/1/0: Codec: 5 ptime :20, codecbytes: 160
The following line indicates the modem transport method that will be used:
*Jan 11 12:37:56.639: 1/1/0: CCM directive -> enabling modem relay
DB-2594
December 2010
*Jan 11 12:37:56.643: ==> Received event:STCAPP_DC_EV_DEVICE_CALL_STATE_CONNECTED (evID:DC_EV_DEVICE_CALL_STATE_CONNECTED) *Jan 11 12:37:56.643: 1/1/0: Call State:CONNECTING *Jan 11 12:37:56.643: 1/1/0: stcapp_set_call_state_eh *Jan 11 12:37:56.643: 1/1/0: call_ref=16777250, call_state=6 *Jan 11 12:37:56.643: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:56.643: 1/1/0: No state change *Jan 11 12:37:56.643: ==> Received event:STCAPP_DC_EV_DEVICE_DISPLAY_PROMPT_STATUS *Jan 11 12:37:56.643: 1/1/0: Device State:IS *Jan 11 12:37:56.643: 1/1/0: stcapp_display_prompt_status_eh *Jan 11 12:37:56.643: 1/1/0: lineNumber: 1 *Jan 11 12:37:56.643: 1/1/0: call reference: 16777250 *Jan 11 12:37:56.643: 1/1/0: promptStatus: Connected *Jan 11 12:37:56.643: 1/1/0: No state change *Jan 11 12:37:56.643: ==> Received event:STCAPP_DC_EV_DEVICE_CALL_INFO (evID:DC_EV_DEVICE_CALL_INFO) *Jan 11 12:37:56.643: 1/1/0: Call State:CONNECTING *Jan 11 12:37:56.643: 1/1/0: stcapp_conn_call_info_eh *Jan 11 12:37:56.647: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:56.647: 1/1/0: stcapp_call_info_eh::caller_name= *Jan 11 12:37:56.647: 1/1/0: Irrelevant CALL_INFO message is ignore! *Jan 11 12:37:56.647: 1/1/0: No state change *Jan 11 12:37:56.647: ==> Received event:STCAPP_DC_EV_DEVICE_STOP_TONE (evID:DC_EV_DEVICE_STOP_TONE) *Jan 11 12:37:56.647: 1/1/0: Call State:CONNECTING *Jan 11 12:37:56.647: 1/1/0: stcapp_stop_tone_eh *Jan 11 12:37:56.647: 1/1/0: call_ref=16777250 *Jan 11 12:37:56.647: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:56.647: 1/1/0: Sending ccGenerateTone(NULL) *Jan 11 12:37:56.647: 1/1/0: No state change *Jan 11 12:37:56.647: ==> Received event:STCAPP_DC_EV_MEDIA_OPEN_XMT_CHNL (evID:DC_EV_MEDIA_OPEN_XMT_CHNL) *Jan 11 12:37:56.647: 1/1/0: Call State:CONNECTING *Jan 11 12:37:56.647: 1/1/0: stcapp_start_media_eh *Jan 11 12:37:56.647: 1/1/0: call_ref=16777250 *Jan 11 12:37:56.647: 1/1/0: stcapp_get_ccb_ptr *Jan 11 12:37:56.647: 1/1/0: New State = ACTIVE_PENDING *Jan 11 12:37:56.647: ==> Received event:STCAPP_CC_EV_CALL_CONNECTED (evId:CC_EV_CALL_CONNECTED) for CallId: 327 *Jan 11 12:37:56.647: 1/1/0: Call State:ACTIVE_PENDING *Jan 11 12:37:56.647: 1/1/0: stcapp_call_connected_eh *Jan 11 12:37:56.647: 1/1/0: stcapp_create_conference *Jan 11 12:37:56.647: 1/1/0: Sending ccConferenceCreate to Symphony *Jan 11 12:37:56.651: 1/1/0: Conference created. voice call id:326, voip call id:327 *Jan 11 12:37:56.651: 1/1/0: No state change *Jan 11 12:37:56.651: ==> Received event:STCAPP_CC_EV_CONF_CREATE_DONE (evId:CC_EV_CONF_CREATE_DONE) for CallId: 326 *Jan 11 12:37:56.651: 1/1/0: Call State:ACTIVE_PENDING *Jan 11 12:37:56.651: 1/1/0: stcapp_active_pending_eh *Jan 11 12:37:56.651: 1/1/0: Sending ccCallModify for voice call id:326 *Jan 11 12:37:56.651: 1/1/0: codec=5, vad=0 *Jan 11 12:37:56.651: 1/1/0: Stopping the initial and inter digit timer! *Jan 11 12:37:56.651: 1/1/0: Sending ccCallModify for voip call id:327 *Jan 11 12:37:56.651: 1/1/0: Updated SMT info to RTPSPI - sess_mode:3,desired_qos:0, codec:5, pkt_period:20,rem_port:18968 vad:0 ip_tos:4 *Jan 11 12:37:56.655: 1/1/0: No state change *Jan 11 12:37:56.655: ==> Received event:STCAPP_CC_EV_VOICE_MODE_DONE (evId:CC_EV_VOICE_MODE_DONE) for CallId: 326 *Jan 11 12:37:56.655: 1/1/0: Call State:ACTIVE_PENDING *Jan 11 12:37:56.655: 1/1/0: Uninteresting event *Jan 11 12:37:56.655: ==> Received event:STCAPP_CC_EV_CALL_REPORT_DIGITS_DONE (evId:CC_EV_CALL_REPORT_DIGITS_DONE) for CallId: 326 *Jan 11 12:37:56.655: 1/1/0: Call State:ACTIVE_PENDING *Jan 11 12:37:56.655: 1/1/0: Uninteresting event
DB-2595
*Jan 11 12:37:56.655: ==> Received event:STCAPP_CC_EV_CALL_MODIFY_DONE (evId:CC_EV_CALL_MODIFY_DONE) for CallId: 326 *Jan 11 12:37:56.655: 1/1/0: Call State:ACTIVE_PENDING *Jan 11 12:37:56.655: 1/1/0: stcapp_default_eh *Jan 11 12:37:56.655: 1/1/0: call_ref=0, call_state=0 *Jan 11 12:37:56.655: 1/1/0: New State = ACTIVE *Jan 11 12:37:56.655: ==> Received event:STCAPP_CC_EV_CALL_MODIFY_DONE (evId:CC_EV_CALL_MODIFY_DONE) for CallId: 327 *Jan 11 12:37:56.655: 1/1/0: Call State:ACTIVE *Jan 11 12:37:56.655: 1/1/0: Uninteresting event *Jan 11 12:37:59.963: ==> Received event:STCAPP_CC_EV_CALL_FEATURE_OFFHOOK (evId:CC_EV_CALL_FEATURE) for CallId: 326 *Jan 11 12:37:59.963: 1/1/0: Call State:ACTIVE *Jan 11 12:37:59.963: 1/1/0: stcapp_call_feature_eh *Jan 11 12:37:59.963: 1/1/0: lcb->num_ccbs = 1 *Jan 11 12:37:59.963: 1/1/0: No CC_FEATURE match! *Jan 11 12:37:59.967: 1/1/0: No state change... call remaining
The following example displays information on STCAPP controlled FXS port 1/0/1 during call setup:
Router# debug voip application stcapp port 1/0/1 stcapp port debugging is on
The following lines show the voice gateway receiving notification from the Cisco Unified Communications Manager of an incoming call:
*Jan 9 06:57:24.403: ==> Received event:STCAPP_DC_EV_DEVICE_CALL_STATE_RINGIN (evID:DC_EV_DEVICE_CALL_STATE_RINGIN) *Jan 9 06:57:24.403: 1/0/1: Call State:IDLE *Jan 9 06:57:24.403: 1/0/1: stcapp_cs_ringin_eh *Jan 9 06:57:24.407: 1/0/1: Acquired CCB 0x66C0A428 for device id:3
The next lines show the new call processing state for the port.
*Jan 9 06:57:24.407: 1/0/1: New State = RINGIN *Jan 9 06:57:24.407: ==> Received event:STCAPP_DC_EV_DEVICE_CALL_INFO (evID:DC_EV_DEVICE_CALL_INFO) *Jan 9 06:57:24.407: 1/0/1: Call State:RINGIN *Jan 9 06:57:24.407: 1/0/1: stcapp_call_info_eh
The next lines show the application sending a call setup request for the telephony leg.
*Jan 9 06:57:24.407: *Jan 9 06:57:24.407: *Jan 9 06:57:24.407: CdPN:7702CgPN:7701 *Jan 9 06:57:24.407: 1/0/1: stcapp_set_up_voice_leg 1/0/1: Sending ccIFCallSetupRequest for voice leg 1/0/1: ccIFCallSetRequest returned voice call id:22. 1/0/1: No state change
The next lines show the application invoking the ringing state.
*Jan 9 06:57:24.407: ==> Received event:STCAPP_DC_EV_DEVICE_SET_RINGER (evID:DC_EV_DEVICE_SET_RINGER) *Jan 9 06:57:24.407: 1/0/1: Call State:RINGIN *Jan 9 06:57:24.407: 1/0/1: stcapp_set_ringer_eh *Jan 9 06:57:24.407: 1/0/1: stcapp_set_ring_mode *Jan 9 06:57:24.407: 1/0/1: SCCP ring mode:2 *Jan 9 06:57:24.407: 1/0/1: Invoking Feature:12. Mode:0 for callid:22 *Jan 9 06:57:24.407: 1/0/1: No state change
DB-2596
December 2010
Related Commands
Command debug voip application stcapp all debug voip application stcapp error debug voip application stcapp events debug voip application stcapp functions
Description Displays debug output for all the debug commands for the STCAPP compiled into one display. Displays STCAPP error log contents. Traces STCAPP call flow events. Displays STCAPP entry and exit function calls for all voice ports.
DB-2597
Syntax Description
(Optional) Displays all VoiceXML debugging messages. (Optional) Displays VoiceXML application states information. (Optional) Displays VoiceXML background messages. (Optional) Displays output for all of the following keywords:
This option is also available if no keywords are added. error call informational software event function grammar gtd inout log puts (Optional) Displays VoiceXML errors. (Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software errors. (Optional) Displays VoiceXML asynchronous events. (Optional) Displays VoiceXML functions. (Optional) Enables syntax checking of XML grammar by the VoiceXML interpreter and displays syntax debugging messages. (Optional) Displays VoiceXML generic transparency descriptors. (Optional) Displays VoiceXML in/out functions. (Optional) Displays the results of the VoiceXML <log> tag. (Optional) Displays the results of VoiceXML <cisco-puts> and <cisco-putvar> tags.
Note
In Cisco IOS Release 12.4(6th)T and later releases, the puts keyword is obsolete. Use the log keyword instead.
DB-2598
December 2010
ssml
(Optional) Enables syntax checking of Speech Synthesis Markup Language (SSML) by the VoiceXML interpreter and displays syntax debugging messages. (Optional) Displays a trace of all activities for the current VoiceXML document. (Optional) Displays VoiceXML warning messages.
trace warning
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command replaces the debug vxml command. The puts keyword was obsoleted. The log keyword was added to replace it. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
If this debug encounters a fetch failure when using an HTTP interface, an error.badfetch.http.response code message is displayed. The values for the response code are shown in Table 360.
Table 360 error.badfetch.http Response Codes
Response Code 0 400 401 402 403 404 405 406 407 408 409 410 411 412 413
Description No response from HTTP server Bad request Unauthorized Payment required Forbidden Not found Method not allowed Not acceptable Proxy authentication required Request timeout Conflict Gone Length required Precondition failed Request entity too large
DB-2599
Table 360
Response Code 414 415 416 417 500 501 502 503 504 505
Description Request-URI too large Unsupported media type Requested range not satisfiable Expectation failed Internal server error Not implemented Bad gateway Service unavailable Gateway timeout Version not supported
Examples
The following is sample output from the debug voip application vxml all command if there is an HTTP badfetch error call:
Router# debug voip application vxml all Aug 7 04:53:03.003: //-1/000000000000/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event CC_EV_CALL_SETUP_IND Aug 7 04:53:03.003: //-1/000000000000/VAPP:/vapp_driver: pInterp[6383BA48]: Aug 7 04:53:03.003: //-1/000000000000/VAPP:/vapp_driver: evtID: 29 vapp record state: 0 Aug 7 04:53:03.003: //-1/000000000000/VAPP:/vapp_evt_setup: Aug Aug 7 04:53:03.003: //-1//VAPP:/vapp_incoming_callblock: 7 04:53:03.003: vapp_incoming_callblock:
Before the incoming call block data comes in, the CallEntry ID is -1, which indicates that the call leg had not been identified. In the next excerpt, the call leg is shown as 1 and the GUID is also assigned.
Aug 7 04:53:03.003: //1/71E56a9AF8002/VAPP:/vapp_evt_setup: VXML call. GTD should be saved Aug 7 04:53:03.003: //1/71E569AF8002/VAPP:/vapp_load_or_run_script: Aug 7 04:53:03.003: //1/71E569AF8002/VAPP:/vapp_load_or_run_script:
DB-2600
December 2010
The CallEntry ID becomes 0 in the following excerpt, which indicates that the output is from the application server, not a call leg.
Aug Aug Aug Aug . . . Aug Aug Aug Aug Aug Aug Aug 04:53:03.007: //0//VXML:/vxml_start_element_handler: Enter 04:53:03.007: //0//VXML:/vxml_start_element_handler: Exit 04:53:03.007: //0//VXML:/vxml_character_data: Enter 04:53:03.007: //0//VXML:/vxml_character_data: at line 888: length <=0, exit 7 7 7 7
7 04:53:03.051: //0//VXML:/vxml_end_element_handler: Enter 7 04:53:03.051: //0//VXML:/vxml_end_element_handler: Exit 7 04:53:03.051: //0//VXML:/vxml_parse: 7 04:53:03.051: vxml_parse: XML_Parse success err=0 7 04:53:03.051: //0//VXML:/vxml_session_delete: 7 04:53:03.051: vxml_session_delete:mem_mgr_mempool_free: mempool=NULL 7 04:53:03.051: //-1//VXML:/vxml_create: enter url=tftp://dirt/jkuo/vxml/xfer.nosound.vxml tree_handle=63282BDC return_handle_add=63C84F80
In the following excerpt, the call with the GUID 71E569AF8002 is again being tracked as the application session is initiated.
Aug Aug 7 04:53:03.083: //1/71E569AF8002/VXML:/vxml_offramp_mailhdrs_get:
7 04:53:03.087: //1/71E569AF8002/VXML:/vxml_create_gtd_sess_vars: Created object chain for com.cisco.signal.gtdlist Aug 7 04:53:03.087: //1/71E569AF8002/VXML:/vxml_jse_add_gtd_obj_to_list: Sig-event name = setup_indication, gtd-len = 140, gtd-buf = IAM, PRN,isdn*,,, USI,rate,c,s,c,1 USI,lay1,ulaw TMR,00 CPN,34,,4,52950 CPC,09 FCI,,,,,,,y, GCI,71e569af6b5511d4800200014232e6a8
Aug
7 04:53:03.087: //1/71E569AF8002/VXML:/vxml_jse_add_gtd_obj_to_list: gtd_obj for sig-event [setup_indication] added to session/shadow var array [0x63826914] Aug 7 04:53:03.087: //1/71E569AF8002/VXML:/vxml_create: Exit Aug 7 04:53:03.087: //1/71E569AF8002/VXML:/vxml_start: vxmlhandle=6372E9BC vapphandle=6383BA48 status=0 async_status=0 Aug 7 04:53:03.087: //1/71E569AF8002/VXML:/vxml_vxml_proc: <vxml> URI(abs):tftp://dirt/jkuo/vxml/xfer.nosound.vxml scheme=tftp host=dirt path=/jkuo/vxml/xfer.nosound.vxml base= URI(abs):tftp://dirt/jkuo/vxml/xfer.nosound.vxml scheme=tftp host=dirt path=/jkuo/vxml/xfer.nosound.vxml lang=none version=3.0 Aug 7 04:53:03.087: //1/71E569AF8002/VXML:/vxml_form_proc: Aug 7 04:53:03.087: <form>: id=transfer_me scope=dialog
DB-2601
<var>: namep=phone_num expr=5550100 Aug 7 04:53:03.091: //1/71E569AF8002/VXML:/vxml_expr_eval: expr=var phone_num=5550100 <var>: namep=mydur Aug 7 04:53:03.095: //1/71E569AF8002/VXML:/vxml_expr_eval: expr=var mydur vxml_counter_reset: Aug 7 04:53:03.095: //1/71E569AF8002/VXML:/vxml_formitem_select: Status=VXML_STATUS_OK, Aug 7 04:53:03.095: //1/71E569AF8002/VXML:/vxml_formitem_select: AsyncStatus=VXML_STATUS_OK Aug 7 04:53:03.099: //1/71E569AF8002/VXML:/vxml_transfer_proc: <transfer>:
In the following excerpts, the attributes of the incoming phone call are shown:
Aug 7 04:53:03.099: //1/71E569AF8002/VXML:/vxml_item_attrs_proc: name=mycall dest_expr='phone://'+ phone_num bridge=1 connecttimeout=50 maxtime=50 desttype=-1 destplan=-1 anitype=-1 aniplan=-1 anipi=-1, anisi=-1 rdn_exprp='phone://' + 4085550111 rdntype=2 rdnplan=1 rdnpi=0, rdnsi=3, redirectreason=0
The next several excerpts show the initialization and playing of audio prompts. When troubleshooting voice applications, ensure that all your assigned prompts play when required.
Aug Aug Aug 7 04:53:03.099: //1/71E569AF8002/VXML:/vxml_play_prompts: Enter 7 04:53:03.099: //1/71E569AF8002/VXML:/vxml_prompt_proc: Enter 7 04:53:03.099: //1/71E569AF8002/VXML:/vxml_prompt_proc: <prompt>:(default_prompt) bargein=1 count=1 typeaheadflush=0 Aug 7 04:53:03.099: //1/71E569AF8002/VXML:/vxml_audio_proc: Enter Aug 7 04:53:03.099: //1/71E569AF8002/VXML:/vxml_audio_proc: <audio>: URI(abs):http://px1-sun/nosound.au scheme=http host=px1-sun path=/nosound.au caching=fast fetchhint=invalid fetchtimeout=0 Aug 7 04:53:03.099: //1/71E569AF8002/VXML:/vxml_audio_proc: Exit Aug 7 04:53:03.099: //1/71E569AF8002/VXML:/vxml_vapp_media_play: bargein=1 timeout=0 typeaheadflush=0 vcr=0 rate=0 Aug 7 04:53:03.099: //1/71E569AF8002/VXML:/vxml_vapp_media_play: str=http://px1-sun/nosound.au cachable=1 timeout0 Aug 7 04:53:03.099: //1/71E569AF8002/VAPP:/vapp_media_play: Aug 7 04:53:03.099: //1/71E569AF8002/VAPP:/vapp_media_play: prompt=http://px1-sun/nosound.au: Aug 7 04:53:03.687: //1/71E569AF8002/VXML:/vxml_vapp_media_play: Exit Aug 7 04:53:03.687: //1/71E569AF8002/VXML:/vxml_prompt_proc: Exit Aug 7 04:53:03.687: //1/71E569AF8002/VXML:/vxml_play_prompts: Exit
The next several excerpts indicate that something is wrong with the XML form to which data is being written:
Aug 7 04:53:03.699: //1/71E569AF8002/VXML:/vxml_transfer_proc: GTD not present in <transfer> Aug 7 04:53:03.699: //1/71E569AF8002/VXML:/vxml_transfer_proc: Exit Aug 7 04:53:03.699: //1/71E569AF8002/VXML:/vxml_elem_proc: at line 8521: Status not OK, exit Aug 7 04:53:03.703: //1/71E569AF8002/VXML:/vxml_formitem_select: at line 4651: Status not OK, exit Aug 7 04:53:03.703: //1/71E569AF8002/VXML:/vxml_form_proc: at line 4791: Status not OK, exit Aug 7 04:53:03.703: //1/71E569AF8002/VXML:/vxml_elem_proc: at line 8521: Status not OK, exit Aug 7 04:53:03.703: //1/71E569AF8002/VXML:/vxml_vxml_proc: at line 8703: Status not OK, exit Aug 7 04:53:03.703: //1/71E569AF8002/VXML:/vxml_load_immediate_done: sidp->status=180000000
DB-2602
December 2010
7 04:53:03.703: //1/71E569AF8002/VAPP:/vapp_checksessionstate: 7 04:53:03.703: //1/71E569AF8002/VAPP:/vapp_checkifdone: 7 04:53:03.703: //1/71E569AF8002/VAPP:/vapp_driver: Exit 7 04:53:03.703: //1/71E569AF8002/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event CC_EV_CALL_MODIFY_DONE Aug 7 04:53:03.703: //1/71E569AF8002/VAPP:/vapp_driver: pInterp[6383BA48]: Aug 7 04:53:03.703: //1/71E569AF8002/VAPP:/vapp_driver: evtID: 37 vapp record state: 0 Aug 7 04:53:03.703: //1/71E569AF8002/VAPP:/vapp_checksessionstate: Aug 7 04:53:03.703: //1/71E569AF8002/VAPP:/vapp_checkifdone: Aug 7 04:53:03.703: //1/71E569AF8002/VAPP:/vapp_driver: Exit Aug 7 04:53:03.735: //1/71E569AF8002/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event MSW_EV_SYNTHESIZER Aug 7 04:53:03.735: //1/71E569AF8002/VAPP:/vapp_driver: pInterp[6383BA48]: Aug 7 04:53:03.735: //1/71E569AF8002/VAPP:/vapp_driver: evtID: 84 vapp record state: 0 Aug 7 04:53:03.735: //1/71E569AF8002/VAPP:/vapp_play_done: evID=84 reason=8, protocol=2, status_code=404, dur=-1, rate=0 Aug 7 04:53:03.735: //1/71E569AF8002/VXML:/vxml_media_done: status 2 async_status 180000000 duration=-1 rate=0 Aug 7 04:53:03.735: //1/71E569AF8002/VXML:/vxml_save_lastprompt_info: Aug 7 04:53:03.735: //1/71E569AF8002/VXML:/vxml_bind_lastprompt: Aug 7 04:53:03.735: //1/71E569AF8002/VXML:/vxml_vapp_vcr_control_disable: Aug 7 04:53:03.735: //1/71E569AF8002/VAPP:/vapp_notify_play_done: Aug 7 04:53:03.735: //1/71E569AF8002/VAPP:/vapp_notify_play_done: Exit
After checking the status of the application, the router finds a badfetch error, which indicates that a VoiceXML form was not found. See Table 360 for a desription of error.badfetch.http response codes.
Aug 7 04:53:03.735: //1/71E569AF8002/VXML:/vxml_media_done: CALL_ERROR: : fail with vapp error 2, protocol_status_code=404 Aug 7 04:53:03.735: //1/71E569AF8002/VXML:/vxml_media_done: CALL_ERROR: : *** error.badfetch.http.404 event is thrown Aug 7 04:53:03.739: //1/71E569AF8002/VXML:/vxml_event_driver: Aug 7 04:53:03.739: //1/71E569AF8002/VXML:/vxml_event_proc: <event>: event=error.badfetch.http.404 status=0 Aug 7 04:53:03.739: //1/71E569AF8002/VXML:/vxml_default_event_handler: use default event handler Aug 7 04:53:03.739: //1/71E569AF8002/VAPP:/vapp_session_exit_event_name: Exit Event error.badfetch.http.404 Aug 7 04:53:03.739: //1/71E569AF8002/VXML:/vxml_load_immediate_done: sidp->status=10 Aug 7 04:53:03.739: //1/71E569AF8002/VXML:/vxml_start: vxmlhandle=6372E9BC vapphandle=6383BA48 status=0 async_status=10 Aug 7 04:53:03.739: //1/71E569AF8002/VXML:/vxml_vapp_terminate: vapp_status=0 ref_count 0 Aug 7 04:53:03.739: //1/71E569AF8002/VAPP:/vapp_terminate: Aug 7 04:53:03.739: //1/71E569AF8002/VXML:/vxml_destroy: Enter Aug 7 04:53:03.739: //-1//VXML:/vxml_gtd_delete_callback: New ref-count = 0
Related Commands
Command debug condition application voice debug http client debug voip ivr
Description Displays debugging messages for only the specified VoiceXML application. Displays debugging messages for the HTTP client. Displays debugging messages for VoIP IVR interactions.
DB-2603
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.1(1)T.
Examples
The following is sample output from the debug voip application lpcor command for a call between two phones that was blocked by LPCOR policy validation:
Router# debug voip application lpcor voip application AFW lpcor debugging is on CME# *Jun 24 11:24:58.115: //44//Dest:/DestOutboundCallUsingPeer: Save Lpcor Index 1 to Interworking Leg *Jun 24 11:24:58.119: //44//Dest:/DestProcessLPCOR: Peer 20002 Source Callid 44 CallType 0 *Jun 24 11:24:58.119: //44//Dest:/DestProcessLPCOR: lpcor source index(1) target index (2) ret_cause=63 *Jun 24 11:24:58.119: //44//Dest:/DestSetup: lpcor block with peerTag 20002
Related Commands
Command debug ephone lpcor debug voip lpcor show voice lpcor policy voice lpcor enable voice lpcor policy
Description Displays debugging information for calls using the LPCOR feature. Displays debugging information for the LPCOR feature. Displays the LPCOR policy for the specified resource group. Enables LPCOR functionality on the Cisco Unified CME router. Creates a LPCOR policy for a resource group.
DB-2604
December 2010
Syntax Description
(Optional) Displays all AVLIST debugging messages. (Optional) Displays AVLIST error and inout information. This option also runs if no keywords are added. (Optional) Displays AVLIST background messages. (Optional) Displays AVLIST error messages. (Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software errors. (Optional) Displays AVLIST in/out functions.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug voip avlist command does not support call debug filtering.
Examples
DB-2605
Syntax Description
(Optional) Displays all CCAPI debugging messages. (Optional) Displays CCAPI error and inout information. This option also runs if no keywords are added. (Optional) Displays CCAPI background messages. (Optional) Displays CCAPI error messages. The debug voip ccapi error command traces the error logs in the call control API. Error logs are generated during normal call processing, if there are insufficient resources, or if there are problems in the underlying network-specific code, the higher call session application, or the call control API itself. This debug command shows error events or unexpected behavior in system software. Usually no events will be generated.
(Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software errors. (Optional) Enables individual CCAPI debug outputs. For the individual keyword, the range is an integer value from 1 to 146. For specific range values, see Table 361. (Optional) Displays CCAPI in/out functions. The debug voip ccapi inout command traces the execution path through the call control API, which serves as the interface between the call session application and the underlying network-specific software. You can use the output from this command to understand how calls are being handled by the router. This command shows how a call flows through the system. Using this debug level, you can see the call setup and teardown operations performed on both the telephony and network call legs.
(Optional) Displays CCAPI function tracing. (Optional) Displays CCAPI protocol headers passing information. (Optional) Logs debug messages that are not call related.
DB-2606
December 2010
Table 361
Value 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
CCAPI Debug Function CC_IDMSG_API_DISPLAY_IES CC_IDMSG_SETUP_IND_COMM_2 CC_IDMSG_SETUP_IND_COMM_3 CC_IDMSG_SETUP_IND_COMM_4 CC_IDMSG_ALERT_IND_5 CC_IDMSG_ALERT_IND_6 CC_IDMSG_CONNECT_IND_7 CC_IDMSG_CONNECT_IND_8 CC_IDMSG_RECONNECT_IND_9 CC_IDMSG_DISCONNECTED_IND_10 CC_IDMSG_DISCONNECTED_IND_11 CC_IDMSG_DISCONNECTED_IND_12 CC_IDMSG_DISCONNECT_DONE_IND_13 CC_IDMSG_DISCONNECT_DONE_IND_14 CC_IDMSG_DISCONNECT_DONE_IND_15 CC_IDMSG_PRE_DISC_CAUSE_16 CC_IDMSG_PRE_DISC_CAUSE_17 CC_IDMSG_DIGIT_BEGIN_IND_18 CC_IDMSG_DIGIT_END_IND_19 CC_IDMSG_DIGIT_END_IND_20 CC_IDMSG_DIGIT_END_NO_TERM_21 CC_IDMSG_TONE_IND_22 CC_IDMSG_FEATURE_IND_23 CC_IDMSG_MODIFY_DONE_IND_24 CC_IDMSG_MODIFY_MODE_DONE_IND_25 CC_IDMSG_INBAND_MSG_RCVD_IND_26 CC_IDMSG_INBAND_MSG_DONE_IND_27 CC_IDMSG_UPD_CALL_INFO_IND_28 CC_IDMSG_GEN_NTK_ALERT_EVENT_29 CC_IDMSG_VOICE_MODE_EVENT_30 CC_IDMSG_VOICE_MODE_EVENT_31 CC_IDMSG_DIALING_COMPLETE_IND_32 CC_IDMSG_DIGITS_DONE_IND_33 CC_IDMSG_DIGITS_DONE_IND_34 CC_IDMSG_VBD_XMIT_DONE_IND_35 CC_IDMSG_FWD_SETUP_IND_36
DB-2607
Table 361
Value 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72
CCAPI Debug Function CC_IDMSG_RSVP_DONE_IND_37 CC_IDMSG_AUDIT_RSP_IND_38 CC_IDMSG_XFR_STATUS_IND_39 CC_IDMSG_XFR_STATUS_IND_40 CC_IDMSG_XFR_DONE_IND_41 CC_IDMSG_XFR_DONE_IND_42 CC_IDMSG_XFR_DONE_IND_43 CC_IDMSG_TGT_CID_ACTIVE_RCD_44 CC_IDMSG_MODIFY_MEDIA_IND_45 CC_IDMSG_MODIFY_MEDIA_ACK_IND_46 CC_IDMSG_MODIFY_MEDIA_REJ_IND_47 CC_IDMSG_MODEM_CALL_START_IND_48 CC_IDMSG_MODEM_CALL_DONE_IND_49 CC_IDMSG_ACCT_STATUS_IND_50 CC_IDMSG_NW_STATUS_IND_51 CC_IDMSG_DESTINFO_IND_52 CC_IDMSG_LOOPBACK_DONE_IND_53 CC_IDMSG_RT_PACKET_STATS_IND_54 CC_IDMSG_CUT_PROGRESS_IND_55 CC_IDMSG_CUT_PROGRESS_IND_56 CC_IDMSG_PROCEEDING_IND_57 CC_IDMSG_FACILITY_IND_58 CC_IDMSG_INFO_IND_59 CC_IDMSG_PROGRESS_IND_60 CC_IDMSG_USERINFO_IND_61 CC_IDMSG_DISC_PROG_IND_62 CC_IDMSG_DISC_PROG_IND_63 CC_IDMSG_PING_DONE_IND_64 CC_IDMSG_COT_TEST_DONE_IND_65 CC_IDMSG_PROCESS_DONE_IND_66 CC_IDMSG_ASSOCIATED_IND_67 CC_IDMSG_SUSPEND_IND_68 CC_IDMSG_SUSPEND_ACK_IND_69 CC_IDMSG_SUSPEND_REJ_IND_70 CC_IDMSG_RESUME_IND_71 CC_IDMSG_RESUME_ACK_IND_72
DB-2608
December 2010
Table 361
Value 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108
CCAPI Debug Function CC_IDMSG_RESUME_REJ_IND_73 CC_IDMSG_IF_SETUP_REQ_PRIV_74 CC_IDMSG_IF_SETUP_REQ_PRIV_75 CC_IDMSG_IF_ALLOCATE_DSP_76 CC_IDMSG_CONNECT_77 CC_IDMSG_CONNECT_78 CC_IDMSG_PING_79 CC_IDMSG_DISCONNECT_80 CC_IDMSG_DISCONNECT_81 CC_IDMSG_DISCONNECT_82 CC_IDMSG_ALERT_83 CC_IDMSG_ALERT_84 CC_IDMSG_CUT_PROGRESS_85 CC_IDMSG_CUT_PROGRESS_86 CC_IDMSG_CUT_PROGRESS_87 CC_IDMSG_DISC_PROG_88 CC_IDMSG_DISC_PROG_89 CC_IDMSG_SET_PEER_90 CC_IDMSG_SET_PEER_91 CC_IDMSG_PROCEEDING_92 CC_IDMSG_SETUP_REQ_93 CC_IDMSG_SETUP_REQ_94 CC_IDMSG_SETUP_REQ_95 CC_IDMSG_SETUP_REQ_96 CC_IDMSG_SETUP_REQ_97 CC_IDMSG_SETUP_REQ_98 CC_IDMSG_SETUP_REQ_99 CC_IDMSG_SETUP_REQ_100 CC_IDMSG_SETUP_REQ_101 CC_IDMSG_SETUP_ACK_102 CC_IDMSG_FACILITY_103 CC_IDMSG_TRANSFER_REQ_104 CC_IDMSG_GET_CONSULT_ID_105 CC_IDMSG_FORWARD_TO_106 CC_IDMSG_INFO_107 CC_IDMSG_NOTIFY_108
DB-2609
Table 361
Value 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144
CCAPI Debug Function CC_IDMSG_PROGRESS_109 CC_IDMSG_PRE_DISC_110 CC_IDMSG_PRE_DISC_111 CC_IDMSG_USER_INFO_112 CC_IDMSG_MODIFY_113 CC_IDMSG_DIGIT_114 CC_IDMSG_DIGIT_DIAL_115 CC_IDMSG_DIGIT_DIAL_STOP_116 CC_IDMSG_FEATURE_117 CC_IDMSG_FEATURE_ENABLE_118 CC_IDMSG_ASSOCIATE_STREAM_119 CC_IDMSG_ASSOCIATE_STREAM_120 CC_IDMSG_DISASSOCIATE_STREAM_121 CC_IDMSG_DISASSOCIATE_STREAM_122 CC_IDMSG_GENERATE_TONE_INFO_123 CC_IDMSG_SET_DIGIT_TIMEOUTS_124 CC_IDMSG_SET_DIGIT_TIMEOUTS_125 CC_IDMSG_SUSPEND_126 CC_IDMSG_SUSPEND_ACK_127 CC_IDMSG_SUSPEND_REJ_128 CC_IDMSG_RESUME_129 CC_IDMSG_RESUME_ACK_130 CC_IDMSG_RESUME_REJ_131 CC_IDMSG_UPDATE_REDIRECT_NUM_132 CC_IDMSG_BABBLER_AUDIT_133 CC_IDMSG_CONFERENCE_CREATE_134 CC_IDMSG_CONFERENCE_CREATE_135 CC_IDMSG_CONFERENCE_CREATE_136 CC_IDMSG_CONFERENCE_DESTROY_137 CC_IDMSG_CONFERENCE_DESTROY_138 CC_IDMSG_CONFERENCE_DESTROY_139 CC_IDMSG_LOOPBACK_140 CC_IDMSG_COT_TEST_141 CC_IDMSG_HANDOFF_142 CC_IDMSG_APP_RETURN_143 CC_IDMSG_T38_FAX_START_144
DB-2610
December 2010
Table 361
Command Default
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3620, Cisco 3660, Cisco AS5350, Cisco AS5400, Cisco AS5850, Cisco AS5300, Cisco AS5800, and Cisco MC3810. The all, default, detail, call, informational, software, individual, function, protoheaders, and service keywords were added. The range for the individual keyword was extended to 146, to include logs for call preemption indication information. This command was integrated into Cisco IOS Release 12.4(9)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following examples show output for variations of the debug voip ccapi command:
debug voip ccapi detail on the Originating Gateway: Example, page 2612 debug voip ccapi detail on the Terminating Gateway: Example, page 2613 debug voip ccapi inout on the Originating Gateway: Example, page 2615 debug voip ccapi service on the Terminating Gateway: Example, page 2619 debug voip ccapi individual 146 on the Originating Gateway: Example, page 2619
FXS
PSTN
DB-2611
103302
The following event shows that the CallEntry ID 11 is used for the incoming call leg.
*Apr 18 20:35:35.779: //11/ABCE697D8005/CCAPI/cc_insert_guid_pod_entry: Incoming=TRUE, Call Id=11 *Apr 18 20:35:35.779: //11/ABCE697D8005/CCAPI/cc_setupind_registration_lookup: Matching Parameters; Called Number=83103, Call Transfer Consult Id= *Apr 18 20:35:35.779: //11/ABCE697D8005/CCAPI/cc_setupind_registration_lookup: No Matching Node *Apr 18 20:35:35.779: //11/ABCE697D8005/CCAPI/ccCheckClipClir: Calling Party Number Is User Provided *Apr 18 20:35:35.779: //12/xxxxxxxxxxxx/CCAPI/cc_insert_call_entry: Total Call Count=1, Call Entry(Call Count On=FALSE, Incoming Call=FALSE)
The following event shows that the incoming call leg with CallEntry ID 11 is bound to the outgoing call leg with CallEntry ID 12.
*Apr 18 20:35:35.779: //11/ABCE697D8005/CCAPI/cc_peer_bind: Bind=TRUE, Binder Call Id=11, Bindee Call Id=12
The next event shows that CallEntry ID 12 is used for the outgoing call leg.
*Apr 18 20:35:35.779: //12/ABCE697D8005/CCAPI/cc_insert_guid_pod_entry: Incoming=FALSE, Call Id=12 *Apr 18 20:35:35.779: //-1/xxxxxxxxxxxx/CCAPI/cc_api_supported_data: data_mode=0x10082
The next event shows an IP address for a remote device on the outgoing call leg, which indicates that this is the VoIP call leg.
*Apr 18 20:35:35.779: //12/ABCE697D8005/CCAPI/cc_incr_if_call_volume: Remote IP Address=172.16.13.81, Hwidb=FastEthernet0/0 *Apr 18 20:35:35.779: //12/ABCE697D8005/CCAPI/cc_incr_if_call_volume: Total Call Count=1, Voip Call Count=1, MMoip Call Count=0 *Apr 18 20:35:35.795: //11/ABCE697D8005/CCAPI/ccCallGetContext: Context=0x652C0168, Call Id=11 *Apr 18 20:36:31.419: //11/ABCE697D8005/CCAPI/ccCallDisconnect: Start Calling Accounting; Call Entry(Incoming=TRUE) *Apr 18 20:36:31.419: //11/ABCE697D8005/CCAPI/ccCallDisconnect: Cause Value=16, Call Entry(Disconnect Cause=16) *Apr 18 20:36:31.419: //11/ABCE697D8005/CCAPI/ccCallDisconnect: Call Entry(Disconnect Cause=16)
DB-2612
December 2010
At this point, the CallEntry ID changes as the call accounting process begins. The accounting data is sent over the outgoing call leg. The GUID, which identifies the unique call, remains the same.
*Apr 18 20:36:31.419: //12/ABCE697D8005/CCAPI/ccCallDisconnect: Start Calling Accounting; Call Entry(Incoming=FALSE) *Apr 18 20:36:31.419: //12/ABCE697D8005/CCAPI/ccCallDisconnect: Cause Value=16, Call Entry(Disconnect Cause=0)
The change of the CallEntry ID indicates that the call is using the incoming call leg, which is the POTS call leg in this case.
*Apr 18 20:36:31.423: //11/ABCE697D8005/CCAPI/ccCallGetVoipFlag: Data Bitmask=0x1, Call Id=11 *Apr 18 20:36:31.423: //11/ABCE697D8005/CCAPI/ccCallGetVoipFlag: Flag=FALSE *Apr 18 20:36:31.423: //11/ABCE697D8005/CCAPI/cc_delete_guid_pod_entry: Incoming=TRUE *Apr 18 20:36:31.423: //11/ABCE697D8005/CCAPI/cc_delete_call_entry: ccFreeRawMsgInfo=0x63FF8198 *Apr 18 20:36:31.423: //11/ABCE697D8005/CCAPI/cc_delete_call_entry: Total Call Count=1, Call Entry(Call Count On=FALSE, Incoming Call=TRUE) *Apr 18 20:36:31.423: //11/ABCE697D8005/CCAPI/cc_delete_call_entry: Total Call Count=0 *Apr 18 20:36:31.423: //11/ABCE697D8005/CCAPI/cc_delete_call_entry: Deleting profileTable[0x64F44700]
The next line shows the impairment calculation. This is the only CCAPI debug command that shows impairment.
*Apr 18 20:36:31.423: //-1/ABCE697D8005/CCAPI/g113_calculate_impairment: (delay=91(ms), loss=0%), Io=0 Iq=0 Idte=0 Idd=2 Ie=10 Itot=12 *Apr 18 20:36:31.423: //12/ABCE697D8005/CCAPI/ccCallGetVoipFlag: Data Bitmask=0x1, Call Id=12 *Apr 18 20:36:31.423: //12/ABCE697D8005/CCAPI/ccCallGetVoipFlag: Flag=FALSE *Apr 18 20:36:31.423: //12/ABCE697D8005/CCAPI/cc_decr_if_call_volume: Remote IP Address=172.16.13.81, Hwidb=FastEthernet0/0 *Apr 18 20:36:31.423: //12/ABCE697D8005/CCAPI/cc_decr_if_call_volume: Total Call Count=0, Voip Call Count=0, MMoip Call Count=0 *Apr 18 20:36:31.423: //12/ABCE697D8005/CCAPI/cc_delete_guid_pod_entry: Incoming=FALSE *Apr 18 20:36:31.423: //12/ABCE697D8005/CCAPI/cc_delete_call_entry: Total Call Count=0, Call Entry(Call Count On=FALSE, Incoming Call=FALSE) *Apr 18 20:36:31.423: //12/ABCE697D8005/CCAPI/cc_delete_call_entry: Deleting profileTable[0x652E3310] *Apr 18 20:36:31.427: //12/xxxxxxxxxxxx/CCAPI/cc_get_call_entry: Call Entry Is Not Found
DB-2613
The next line shows the impairment calculation. This is the only CCAPI debug command that shows impairment.
*May 1 18:59:21.875: //-1/ABCE697D8005/CCAPI/g113_calculate_impairment: (delay=99(ms), loss=0%), Io=0 Iq=0 Idte=0 Idd=2 Ie=10 Itot=12 *May 1 18:59:21.875: //8/ABCE697D8005/CCAPI/ccCallGetVoipFlag: Data Bitmask=0x1, Call Id=8 *May 1 18:59:21.875: //8/ABCE697D8005/CCAPI/ccCallGetVoipFlag: Flag=FALSE *May 1 18:59:21.875: //8/ABCE697D8005/CCAPI/cc_decr_if_call_volume: Remote IP Address=172.16.13.175, Hwidb=FastEthernet0/0 *May 1 18:59:21.875: //8/ABCE697D8005/CCAPI/cc_decr_if_call_volume: Total Call Count=0, Voip Call Count=0, MMoip Call Count=0 *May 1 18:59:21.875: //8/ABCE697D8005/CCAPI/cc_delete_guid_pod_entry:
DB-2614
December 2010
Incoming=TRUE *May 1 18:59:21.875: //8/ABCE697D8005/CCAPI/cc_delete_call_entry: ccFreeRawMsgInfo=0x644EB850 Router# *May 1 18:59:21.875: //8/ABCE697D8005/CCAPI/cc_delete_call_entry: Total Call Count=1, Call Entry(Call Count On=FALSE, Incoming Call=TRUE) *May 1 18:59:21.875: //8/ABCE697D8005/CCAPI/cc_delete_call_entry: Total Call Count=0 *May 1 18:59:21.879: //8/ABCE697D8005/CCAPI/cc_delete_call_entry: Deleting profileTable[0x64B78600] *May 1 18:59:21.879: //8/xxxxxxxxxxxx/CCAPI/cc_get_call_entry: Call Entry Is Not Found *May 1 18:59:21.879: //8/xxxxxxxxxxxx/CCAPI/cc_get_call_entry: Call Entry Is Not Found Router# *May 1 18:59:24.587: //9/ABCE697D8005/CCAPI/ccCallGetVoipFlag: Data Bitmask=0x1, Call Id=9 *May 1 18:59:24.587: //9/ABCE697D8005/CCAPI/ccCallGetVoipFlag: Flag=FALSE *May 1 18:59:24.587: //9/ABCE697D8005/CCAPI/cc_api_call_disconnect_done: Prefix Is Not Defined From Peer; Peer=3600, Called Number=3600 *May 1 18:59:24.587: //9/ABCE697D8005/CCAPI/cc_delete_guid_pod_entry: Incoming=FALSE *May 1 18:59:24.587: //9/ABCE697D8005/CCAPI/cc_delete_call_entry: Total Call Count=0, Call Entry(Call Count On=FALSE, Incoming Call=FALSE) *May 1 18:59:24.587: //9/ABCE697D8005/CCAPI/cc_delete_call_entry: Deleting profileTable[0x6453F228]
The following lines show information about the calling and called numbers. The network presentation indicator (NPI) shows the type of transmission. The Incoming Dial-Peer field shows that the incoming dial peer has been matched.
*Apr 18 20:42:19.347: //-1/9C5A9CA88009/CCAPI/cc_api_call_setup_ind_common: Interface=0x64F26F10, Call Info( Calling Number=4085550111(TON=National, NPI=ISDN, Screening=User, Passed, Presentation=Allowed), Called Number=83103(TON=Unknown, NPI=Unknown), Calling Translated=FALSE, Subsriber Type Str=RegularLine, FinalDestinationFlag=TRUE,
DB-2615
Incoming Dial-peer=1, Progress Indication=NULL(0), Calling IE Present=TRUE, Source Trkgrp Route Label=, Target Trkgrp Route Label=, CLID Transparent=FALSE), Call Id=-1 *Apr 18 20:42:19.347: //-1/9C5A9CA88009/CCAPI/ccCheckClipClir: In: Calling Number=4085550111(TON=National, NPI=ISDN, Screening=User, Passed, Presentation=Allowed) *Apr 18 20:42:19.347: //-1/9C5A9CA88009/CCAPI/ccCheckClipClir: Out: Calling Number=4085550111(TON=National, NPI=ISDN, Screening=User, Passed, Presentation=Allowed)
In the following event, the call leg is established. The CallEntry ID field changes from -1 to 19.
*Apr 18 20:42:19.347: //19/9C5A9CA88009/CCAPI/cc_api_call_setup_ind_common: Set Up Event Sent; Call Info(Calling Number=4085550111(TON=National, NPI=ISDN, Screening=User, Passed, Presentation=Allowed), Called Number=83103(TON=Unknown, NPI=Unknown)) *Apr 18 20:42:19.351: //19/9C5A9CA88009/CCAPI/cc_process_call_setup_ind: Event=0x63FF4730 *Apr 18 20:42:19.351: //19/9C5A9CA88009/CCAPI/ccCallSetContext: Context=0x652A9858 *Apr 18 20:42:19.351: //19/9C5A9CA88009/CCAPI/cc_process_call_setup_ind: >>>>CCAPI handed cid 19 with tag 1 to app "Default" *Apr 18 20:42:19.351: //19/9C5A9CA88009/CCAPI/ccCallProceeding: Progress Indication=NULL(0) *Apr 18 20:42:19.351: //19/9C5A9CA88009/CCAPI/ccCallSetupRequest: Destination=, Calling IE Present=TRUE, Mode=0, Outgoing Dial-peer=3600, Params=0x652AA4A8, Progress Indication=NULL(0) *Apr 18 20:42:19.351: //19/9C5A9CA88009/CCAPI/ccCheckClipClir: In: Calling Number=4085550111(TON=National, NPI=ISDN, Screening=User, Passed, Presentation=Allowed) *Apr 18 20:42:19.351: //19/9C5A9CA88009/CCAPI/ccCheckClipClir: Out: Calling Number=4085550111(TON=National, NPI=ISDN, Screening=User, Passed, Presentation=Allowed) *Apr 18 20:42:19.351: //19/9C5A9CA88009/CCAPI/ccCallSetupRequest: Destination Pattern=360., Called Number=3600, Digit Strip=FALSE *Apr 18 20:42:19.351: //19/9C5A9CA88009/CCAPI/ccCallSetupRequest: Calling Number=4085550111(TON=National, NPI=ISDN, Screening=User, Passed, Presentation=Allowed), Called Number=3600(TON=Unknown, NPI=Unknown), Redirect Number=, Display Info= Account Number=, Final Destination Flag=TRUE, Guid=9C5A9CA8-5243-11D6-8009-00059A3A15A0, Outgoing Dial-peer=3600 *Apr 18 20:42:19.351: //19/9C5A9CA88009/CCAPI/cc_api_display_ie_subfields: ccCallSetupRequest: cisco-username= ----- ccCallInfo IE subfields ----cisco-ani=4085550111 cisco-anitype=2 cisco-aniplan=1 cisco-anipi=0 cisco-anisi=1 dest=3600 cisco-desttype=0 cisco-destplan=0 cisco-rdn= cisco-rdntype=-1 cisco-rdnplan=-1 cisco-rdnpi=-1 cisco-rdnsi=-1 cisco-redirectreason=-1
DB-2616
December 2010
The following lines show call progress. The progress and signal indications are shown.
*Apr 18 20:42:19.371: //20/9C5A9CA88009/CCAPI/cc_api_call_cut_progress: Interface=0x652F6388, Progress Indication=INBAND(8), Signal Indication=SIGNAL RINGBACK(1), Cause Value=0 *Apr 18 20:42:19.371: //20/9C5A9CA88009/CCAPI/cc_api_call_cut_progress: Call Entry(Responsed=TRUE) *Apr 18 20:42:19.371: //19/9C5A9CA88009/CCAPI/ccCallCutProgress: Progress Indication=INBAND(8), Signal Indication=SIGNAL RINGBACK(1), Cause Value=0 Voice Call Send Alert=FALSE, Call Entry(AlertSent=FALSE) *Apr 18 20:42:19.371: //19/9C5A9CA88009/CCAPI/ccCallCutProgress: Call Entry(Responsed=TRUE)
DB-2617
*Apr 18 20:42:19.375: //20/9C5A9CA88009/CCAPI/cc_api_caps_ind: Destination Interface=0x64F26F10, Destination Call Id=19, Source Call Id=20, Caps(Codec=0x4, Fax Rate=0x1, Vad=0x2, Modem=0x2, Codec Bytes=20, Signal Type=2) *Apr 18 20:42:19.375: //20/9C5A9CA88009/CCAPI/cc_api_caps_ind: Caps(Playout Mode=1, Playout Initial=60(ms), Playout Min=40(ms), Playout Max=300(ms), Fax Nom=300(ms))
The following lines show progress indication information. In this case, the event shows that the destination is not ISDN.
*Apr 18 20:42:26.855: //20/9C5A9CA88009/CCAPI/cc_api_call_connected: Interface=0x652F6388, Data Bitmask=0x0, Progress Indication=DESTINATION IS NON ISDN(2), Connection Handle=0 *Apr 18 20:42:26.855: //20/9C5A9CA88009/CCAPI/cc_api_call_connected: Call Entry(Connected=TRUE, Responsed=TRUE, Retry Count=0) *Apr 18 20:42:26.855: //19/9C5A9CA88009/CCAPI/ccCallConnect: Progress Indication=DESTINATION IS NON ISDN(2), Data Bitmask=0x0 *Apr 18 20:42:26.855: //19/9C5A9CA88009/CCAPI/ccCallConnect: Call Entry(Connected=TRUE, Responsed=TRUE) *Apr 18 20:42:26.855: //20/9C5A9CA88009/CCAPI/ccSaveDialpeerTag: Incoming Dial-peer=1 *Apr 18 20:42:26.859: //19/9C5A9CA88009/CCAPI/ccSaveDialpeerTag: Outgoing Dial-peer=3600 *Apr 18 20:42:26.859: //20/9C5A9CA88009/CCAPI/ccCallFeature: Feature Type=24, Call Id=20
DB-2618
December 2010
Transfer Number Is Null *Apr 18 20:43:16.795: //20/9C5A9CA88009/CCAPI/ccCallDisconnect: Cause Value=16, Tag=0x0, Call Entry(Previous Disconnect Cause=0, Disconnect Cause=0) *Apr 18 20:43:16.795: //20/9C5A9CA88009/CCAPI/ccCallDisconnect: Cause Value=16, Call Entry(Responsed=TRUE, Cause Value=16) *Apr 18 20:43:16.795: //20/9C5A9CA88009/CCAPI/cc_api_get_transfer_info: Transfer Number Is Null *Apr 18 20:43:16.803: //20/9C5A9CA88009/CCAPI/cc_api_call_disconnect_done: Disposition=0, Interface=0x652F6388, Tag=0x0, Call Id=20, Call Entry(Disconnect Cause=16, Voice Class Cause Code=0, Retry Count=0) *Apr 18 20:43:16.803: //20/9C5A9CA88009/CCAPI/cc_api_call_disconnect_done: Call Disconnect Event Sent *Apr 18 20:43:16.803: //19/9C5A9CA88009/CCAPI/cc_api_call_disconnect_done: Disposition=0, Interface=0x64F26F10, Tag=0x0, Call Id=19, Call Entry(Disconnect Cause=16, Voice Class Cause Code=0, Retry Count=0) *Apr 18 20:43:16.803: //19/9C5A9CA88009/CCAPI/cc_api_call_disconnect_done: Call Disconnect Event Sent
This debug shows noncall related events. In this case, information about the timer is shown.
*May 1 19:08:48.027: //-1/xxxxxxxxxxxx/CCAPI/cc_handle_periodic_timer: Calling The Callback, ccTimerctx=0x63B368C0 *May 1 19:08:48.027: //-1/xxxxxxxxxxxx/CCAPI/ccTimerStart: ccTimerctx=0x63B368C0 *May 1 19:10:08.615: //-1/xxxxxxxxxxxx/CCAPI/cc_api_icpif: ExpectFactor=0xA
DB-2619
Syntax Description
Command Modes
Privileged EXEC
Command History
Release 12.2(11)T
Modification This command was implemented on the following platforms: Cisco 2600 series, Cisco 3620, Cisco 3660, Cisco AS5350, Cisco AS5400, Cisco AS5850, Cisco AS5300, Cisco AS5800, and Cisco MC3810. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug voip ccapi error command traces the error logs in the call control API. Error logs are generated during normal call processing, when there are insufficient resources, or when there are problems in the underlying network-specific code, the higher call session application, or the call control API itself. This debug command shows error events or unexpected behavior in system software. In most cases, no events will be generated.
Note
We recommend that you log output from the debug voip ccapi error command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Related Commands
Description Traces the execution path through the CCAPI. Allows configuration of the voice call debug output.
DB-2620
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Release 12.2(11)T
Modification This command was implemented on the following platforms: Cisco 2600 series, Cisco 3620, Cisco 3660, Cisco AS5350, Cisco AS5400, Cisco AS5850, Cisco AS5300, Cisco AS5800, and Cisco MC3810. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug voip ccapi inout command traces the execution path through the call control API, which serves as the interface between the call session application and the underlying network-specific software. You can use the output from this command to understand how calls are being handled by the voice gateway. This command shows how a call flows through the system. Using this debug level, you can see the call setup and teardown operations performed on both the telephony and network call legs.
Note
We recommend that you log output from the debug voip ccapi inout command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Examples
The following example shows the call setup indicated and accepted by the voice gateway:
Router# debug voip ccapi inout *Mar 1 15:35:53.588: //-1/xxxxxxxxxxxx/CCAPI/ccTDConstructTDUsrContainer: usrContainer[0x638C1BF0], magic[FACE0FFF] *Mar 1 15:35:53.592: //-1/xxxxxxxxxxxx/CCAPI/ccTDUtilAddDataToUsrContainer: container=0x638C1BF0, tagID=6, dataSize=16, instID=-1,modifier=1 *Mar 1 15:35:53.592: //-1/xxxxxxxxxxxx/CCAPI/ccTDConstructInstanceTDObject: tdObject[0x638BC1AC], nxtElem[0x0], magic[0xFACE0FFF] tagID[6], dataLen[16], modif[1]
DB-2621
*Mar 1 15:35:53.592: //-1/xxxxxxxxxxxx/CCAPI/ccTDPvtAddObjectToContainer: Adding tdObject[0x638BC1AC] instID[-1] into container[0x638C1BF0] *Mar 1 15:35:53.592: //-1/xxxxxxxxxxxx/CCAPI/ccTDUtilAddDataToUsrContainer: container=0x638C1BF0, tagID=5, dataSize=276, instID=-1,modifier=1 *Mar 1 15:35:53.592: //-1/xxxxxxxxxxxx/CCAPI/ccTDConstructInstanceTDObject: tdObject[0x63401148], nxtElem[0x0], magic[0xFACE0FFF] tagID[5], dataLen[276], modif[1] *Mar 1 15:35:53.592: //-1/xxxxxxxxxxxx/CCAPI/ccTDPvtAddObjectToContainer: Adding tdObject[0x63401148] instID[-1] into container[0x638C1BF0]
In the following lines, the call control API (CCAPI) receives the call setup. The called number is 34999, and the calling number is 55555. The calling number matches dial peer 10002.
*Mar 1 15:35:53.592: //-1/xxxxxxxxxxxx/CCAPI/cc_api_display_ie_subfields: *Mar 1 15:35:53.592: cc_api_call_setup_ind: *Mar 1 15:35:53.592: cisco-username= *Mar 1 15:35:53.596: ----- ccCallInfo IE subfields ----*Mar 1 15:35:53.596: cisco-ani=55555 *Mar 1 15:35:53.596: cisco-anitype=0 *Mar 1 15:35:53.596: cisco-aniplan=0 *Mar 1 15:35:53.596: cisco-anipi=0 *Mar 1 15:35:53.596: cisco-anisi=0 *Mar 1 15:35:53.596: dest=34999 *Mar 1 15:35:53.596: cisco-desttype=0 *Mar 1 15:35:53.596: cisco-destplan=0 *Mar 1 15:35:53.596: cisco-rdn= *Mar 1 15:35:53.596: cisco-rdntype=-1 *Mar 1 15:35:53.596: cisco-rdnplan=-1 *Mar 1 15:35:53.596: cisco-rdnpi=-1 *Mar 1 15:35:53.596: cisco-rdnsi=-1 *Mar 1 15:35:53.596: cisco-redirectreason=-1 *Mar 1 15:35:53.596: //-1/xxxxxxxxxxxx/CCAPI/cc_api_call_setup_ind: (vdbPtr=0x637EC1E0, callInfo={called=34999,called_oct3=0x80,calling=55555,calling_oct3=0x80,calling_oct3a=0x0, calling_xlated=false,subscriber_type_str=RegularLine,fdest=1, peer_tag=10002, prog_ind=0,callingIE_present 1, src_route_label=, tgt_route_label= clid_transparent=0},callID=0x637B4278) *Mar 1 15:35:53.596: //-1/xxxxxxxxxxxx/CCAPI/cc_api_call_setup_ind: *Mar 1 15:35:53.596: //-1/xxxxxxxxxxxx/CCAPI/cc_api_call_setup_ind: type 13 , prot 0 *Mar 1 15:35:53.596: //-1/xxxxxxxxxxxx/CCAPI/ccCheckClipClir: *Mar 1 15:35:53.596: ccCheckClipClir: calling number is: "55555", calling oct3a is: 0x0 *Mar 1 15:35:53.596: //-1/xxxxxxxxxxxx/CCAPI/ccCheckClipClir: *Mar 1 15:35:53.596: Calling Party number is User Provided *Mar 1 15:35:53.596: //-1/xxxxxxxxxxxx/CCAPI/ccCheckClipClir: *Mar 1 15:35:53.596: Leaving ccCheckClipClir calling number is: "55555" calling oct3 is: 0x80 calling oct3a is: 0x0
*Mar 1 15:35:53.600: //44/xxxxxxxxxxxx/CCAPI/cc_insert_call_entry: current call volume: 1 *Mar 1 15:35:53.600: //44/xxxxxxxxxxxx/CCAPI/cc_insert_call_entry: entry's incoming TRUE. *Mar 1 15:35:53.600: //44/xxxxxxxxxxxx/CCAPI/cc_insert_call_entry: is_incoming is TRUE *Mar 1 15:35:53.600: //-1/xxxxxxxxxxxx/CCAPI/ccTDConstructHashProfileTab: profileTable[0x6380E11C], numBuckets[11], numEntries[0] *Mar 1 15:35:53.600: //-1/xxxxxxxxxxxx/CCAPI/ccTDPvtProfileTableBuildManager: Invoking necessary profileTable updaters... *Mar 1 15:35:53.600: //-1/xxxxxxxxxxxx/CCAPI/ccTDPvtUpdateProfileTabFromContainer: Updating profileTable[0x6380E11C] with objects in container[0x638C1BF0]
DB-2622
December 2010
*Mar 1 15:35:53.600: //-1/xxxxxxxxxxxx/CCAPI/ccTDPvtUpdateProfileTabFromContainer: obtained key[5] for the tag[6] *Mar 1 15:35:53.600: //-1/xxxxxxxxxxxx/CCAPI/ccTDPvtAddObjectToProfileBucket: profileTable[0x6380E11C], tdObject[0x638BC1AC] *Mar 1 15:35:53.600: //-1/xxxxxxxxxxxx/CCAPI/ccTDPvtUpdateProfileTabFromContainer: obtained key[0] for the tag[5] *Mar 1 15:35:53.600: //-1/xxxxxxxxxxxx/CCAPI/ccTDPvtAddObjectToProfileBucket: profileTable[0x6380E11C], tdObject[0x63401148] *Mar 1 15:35:53.600: //-1/xxxxxxxxxxxx/CCAPI/ccTDPvtProfileTableBuildManager: *Mar 1 15:35:53.600: ccTDUtilDumpAllElemInProfileTab: profileTable[0x6380E11C], numBuckets[11], numEntries[2] *Mar 1 15:35:53.600: Bucket { 0 } ------>0x63401148[0x0,t-5,l-276,d-0x63401168, m-1,u-56153,g-FACE0FFF] *Mar 1 15:35:53.604: *Mar 1 15:35:53.604: Bucket { 5 } ------>0x638BC1AC[0x0,t-6,l-16,d-0x638BC1CC,m-1,u-56153,g-FACE0FFF] *Mar 1 15:35:53.604: *Mar 1 15:35:53.604: //-1/xxxxxxxxxxxx/CCAPI/ccTDDestructTDUsrContainer: Container[0x638C1BF0] *Mar 1 15:35:53.604: //-1/xxxxxxxxxxxx/CCAPI/cc_incr_if_call_volume: not the VoIP or MMoIP *Mar 1 15:35:53.608: //-1/xxxxxxxxxxxx/CCAPI/cc_process_call_setup_ind: (event= 0x63073AA0)
In the next line, 45F2AAE28044 is the GUID. The tag 10002 entry shows that the incoming dial peer matched the CallEntry ID.
*Mar 1 15:35:53.608: //44/45F2AAE28044/CCAPI/cc_process_call_setup_ind: >>>>CCAPI handed cid 44 with tag 10002 to app "DEFAULT" *Mar 1 15:35:53.608: //44/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(24=CC_EV_CALL_SETUP_IND), cid(44), disp(0) *Mar 1 15:35:53.608: //44/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(SSA_EV_CALL_SETUP_IND), cid(44), disp(0) *Mar 1 15:35:53.608: //44/xxxxxxxxxxxx/SSAPP:-1:-1/ssaCallSetupInd:
The next line shows CallEntry ID in hexadecimal form, 0x2C (44 in decimal). The CallID and GUID numbers have been identified. The incoming dial-peer is 10002.
*Mar 1 15:35:53.608: //44/xxxxxxxxxxxx/CCAPI/ccCallSetContext: (callID=0x2C, context=0x634A430C) *Mar 1 15:35:53.608: //44/45F2AAE28044/SSAPP:10002:-1/ssaCallSetupInd: cid(44), st(SSA_CS_MAPPING),oldst(0), ev(24)ev->e.evCallSetupInd.nCallInfo.finalDestFlag = 1 *Mar 1 15:35:53.608: //44/45F2AAE28044/SSAPP:10002:-1/ssaCallSetupInd: src route label=, tgt route label= tg_label_flag 0x0 *Mar 1 15:35:53.608: //44/45F2AAE28044/SSAPP:10002:-1/ssaCallSetupInd: finalDest cllng(55555), clled(34999) tgt_route_label()tg_label_flag 0x0 *Mar 1 15:35:53.612: //44/45F2AAE28044/SSAPP:10002:-1/ssaCallSetupInd: cid(44), st(SSA_CS_CALL_SETTING),oldst(0), ev(24)dpMatchPeersMoreArg result= 0
For CallEntry ID 44, two dial-peer tags (10001 and 20002) were matched with called number 34999.
*Mar 1 15:35:53.612: //44/45F2AAE28044/SSAPP:10002:-1/ssaDebugPeers: ssaSetupPe er cid(44) peer list: tag(10001) called number (34999) tag(20002) called number (34999) *Mar 1 15:35:53.612: //44/45F2AAE28044/SSAPP:10002:-1/ssaSetupPeer: dialpeer tags in rotary= 10001 20002
DB-2623
The next line shows that 5 digits were matched for this dial peer and no prefix was added. The encapType (2) entry indicates a VoIP call.
*Mar 1 15:35:53.612: //44/45F2AAE28044/SSAPP:10002:-1/ssaSetupPeer: cid(44), de stPat(34999), matched(5), prefix(), peer(637B0984), peer->encapType (2) *Mar 1 15:35:53.612: //-1/xxxxxxxxxxxx/CCAPI/cc_can_gateway: Call legs: In=6, O ut=1
The next line shows the voice gateway sending out a call-proceeding message to the incoming call leg with progress indicator of 0x0.
*Mar 1 15:35:53.612: //44/xxxxxxxxxxxx/CCAPI/ccCallProceeding: (callID=0x2C, pr og_ind=0x0)
The next line shows the voice gateway sending out the call-setup request to the outgoing call leg. The dial-peer is 10001 with the incoming CallEntry ID being 0x2C.
*Mar 1 15:35:53.612: //44/xxxxxxxxxxxx/CCAPI/ccCallSetupRequest: (Inbound call = 0x2C, outbound peer =10001, dest=, params=0x63085D80 mode=0, *callID=0x63086314, prog_ind = 0callingIE_pres ent 1) *Mar *Mar *Mar *Mar 1 1 1 1 15:35:53.612: 15:35:53.612: 15:35:53.612: 15:35:53.616: //44/45F2AAE28044/CCAPI/ccCallSetupRequest: ccCallSetupRequest numbering_type 0x80 //44/45F2AAE28044/CCAPI/ccCallSetupRequest: ccCallSetupRequest: calling number is:55555
*Mar 1 15:35:53.616: //44/45F2AAE28044/CCAPI/ccCallSetupRequest: calling oct3a is:0x0 *Mar 1 15:35:53.616: //-1/xxxxxxxxxxxx/CCAPI/ccCheckClipClir: *Mar 1 15:35:53.616: ccCheckClipClir: calling number is: "55555", calling oct3a is: 0x0 *Mar 1 15:35:53.616: //-1/xxxxxxxxxxxx/CCAPI/ccCheckClipClir: *Mar 1 15:35:53.616: Calling Party number is User Provided *Mar 1 15:35:53.616: //-1/xxxxxxxxxxxx/CCAPI/ccCheckClipClir: *Mar 1 15:35:53.616: Leaving ccCheckClipClir calling number is: "55555" calling oct3 is: 0x80 calling oct3a is: 0x0 *Mar 1 15:35:53.616: //44/45F2AAE28044/CCAPI/ccCallSetupRequest: after ccCheckC lipClir - calling oct3a is:0x0
DB-2624
December 2010
1 1 1 1 1 1 1
*Mar 1 15:35:53.620: //-1/xxxxxxxxxxxx/CCAPI/ccIFCallSetupRequestPrivate: (vdbP tr=0x62EC61A4, dest=, callParams={called=34999,called_oct3=0x80, calling=55555,calling_oct3=0x80, calling_oct3a= 0x0, calling_xlated=false, subscriber_type_str =RegularLine, fdest=1, voice_peer_tag=10001},mode=0x0) *Mar 1 15:35:53.620: //-1/xxxxxxxxxxxx/CCAPI/ccIFCallSetupRequestPrivate: *Mar 1 15:35:53.620: ccIFCallSetupRequestPrivate: src route label tgt route label tg_label_flag 0x0 *Mar 1 15:35:53.620: //-1/xxxxxxxxxxxx/CCAPI/ccIFCallSetupRequestPrivate: vdbPtr type = 1 *Mar 1 15:35:53.620: //-1/xxxxxxxxxxxx/CCAPI/ccIFCallSetupRequestPrivate: *Mar 1 15:35:53.620: //-1/xxxxxxxxxxxx/CCAPI/ccIFCallSetupRequestPrivate: (vdbPtr=0x62EC61A4, dest=, callParams={called=34999, called_oct3 0x80, calling=55555,calling_oct3 0x80, calling_oct3a 0x0, calling_xlated=false, fdest=1, voice_pee r_tag=10001}, mode=0x0, xltrc=-5) *Mar 1 15:35:53.620: //-1/xxxxxxxxxxxx/CCAPI/ccIFCallSetupRequestPrivate: In the next line, outgoing CallEntry ID 45 is bound to the same GUID 45F2AAE28044. *Mar 1 15:35:53.620: //45/45F2AAE28044/CCAPI/cc_insert_call_entry: not incoming entry *Mar 1 15:35:53.620: //45/45F2AAE28044/CCAPI/cc_insert_call_entry: entry's incoming FALSE. *Mar 1 15:35:53.620: //45/45F2AAE28044/CCAPI/cc_insert_call_entry: is_incoming is FALSE *Mar 1 15:35:53.624: //44/xxxxxxxxxxxx/CCAPI/ccSaveDialpeerTag: (callID=0x2C, dialpeer_tag=10001) *Mar 1 15:35:53.624: //45/xxxxxxxxxxxx/CCAPI/ccCallSetContext: (callID=0x2D, context=0x634A537C) 0x2D (decimal 45 is the second call leg ID). *Mar 1 15:35:53.624: //44/xxxxxxxxxxxx/CCAPI/ccCallReportDigits: (callID=0x2C, enable=0x0)
The voice gateway informs the incoming call leg that digits were forwarded.
*Mar 1 15:35:53.624: //44/xxxxxxxxxxxx/CCAPI/cc_api_call_report_digits_done: (vdbPtr=0x637EC1E0, callID=0x2C, disp=0) *Mar 1 15:35:53.624: //44/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(54=CC_EV_CALL_ REPORT_DIGITS_DONE), cid(44), disp(0) *Mar 1 15:35:53.624: //44/45F2AAE28044/SS Router#APP:10002:-1/ssaTraceSct: cid(44)st(SSA_CS_CALL_SETTING)ev(SSA_EV_CALL_RE PORT_DIGITS_DONE) oldst(SSA_CS_MAPPING)cfid(-1)csize(0)in(1)fDest(1) *Mar 1 15:35:53.624: //44/45F2AAE28044/SSAPP:10002:-1/ssaTraceSct: -cid2(45)st2 (SSA_CS_CALL_SETTING)oldst2(SSA_CS_MAPPING) *Mar 1 15:35:53.624: //44/45F2AAE28044/SSAPP:10002:-1/ssaDebugPeers: ssaReportDigitsDone cid(44) peer list: tag(20002) called number (34999) *Mar 1 15:35:53.624: //44/45F2AAE28044/SSAPP:10002:-1/ssaReportDigitsDone: call id=44 Reporting disabled. *Mar 1 15:35:53.628: //-1/xxxxxxxxxxxx/CCAPI/cc_api_supported_data: data_mode=0x10082 *Mar 1 15:35:53.628: //45/xxxxxxxxxxxx/CCAPI/cc_api_get_ic_leg_obtained_numbers: callID=0x2D
DB-2625
The next two lines shows the IP address of the terminating gateway and that the terminating gateway is reached through Ethernet port 0/0.
*Mar 1 15:35:53.628: //-1/xxxxxxxxxxxx/CCAPI/cc_incr_if_call_volume: remote IP is 171.69.85.111 *Mar 1 15:35:53.632: //-1/xxxxxxxxxxxx/CCAPI/cc_incr_if_call_volume: hwidb is Ethernet0/0 *Mar 1 15:35:53.632: //-1/xxxxxxxxxxxx/CCAPI/cc_incr_if_call_volume: create entry in list: 1 *Mar 1 15:35:53.636: //45/xxxxxxxxxxxx/CCAPI/ccTDUtilGetInstanceCount: For tagI D[1] of callID[45] *Mar 1 15:35:53.636: //45/45F2AAE28044/CCAPI/ccTDPvtProfileTableObjectAccessManager: No profileTable set for callID[45] *Mar 1 15:35:53.636: //45/xxxxxxxxxxxx/CCAPI/ccTDUtilGetInstanceCount: For tagID[2] of callID[45] *Mar 1 15:35:53.636: //45/45F2AAE28044/CCAPI/ccTDPvtProfileTableObjectAccessManager: No profileTable set for callID[45]
The next line shows that the voice gateway received a call proceeding message from the terminating gateway, and then the following line shows that the voice gateway received a call alert from the terminating gateway.
*Mar 1 15:35:53.740: //45/xxxxxxxxxxxx/CCAPI/cc_api_call_proceeding: (vdbPtr=0x62EC61A4, callID=0x2D, prog_ind=0x0) *Mar 1 15:35:53.740: //45/xxxxxxxxxxxx/CCAPI/cc_api_call_alert: (vdbPtr=0x62EC61A4, callID=0x2D, prog_ind=0x0, sig_ind=0x1) *Mar 1 15:35:53.744: //45/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(21=CC_EV_CALL_PROCEEDING), cid(45), disp(0) *Mar 1 15:35:53.744: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: cid(45)st(SSA_CS _CALL_SETTING)ev(SSA_EV_CALL_PROCEEDING) oldst(SSA_CS_MAPPING)cfid(-1)csize(0)in(0)fDest(0) *Mar 1 15:35:53.744: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: -cid2(44)st2(SSA_CS_CALL_SETTING)oldst2(SSA_CS_CALL_SETTING) *Mar 1 15:35:53.744: //45/45F2AAE28044/SSAPP:0:-1/ssaCallProc: *Mar 1 15:35:53.744: //44/xxxxxxxxxxxx/CCAPI/ccGetDialpeerTag: (callID=0x2C) *Mar 1 15:35:53.744: //45/45F2AAE28044/SSAPP:0:-1/ssaIgnore: cid(45), st(SSA_CS _CALL_SETTING),oldst(1), ev(21) *Mar 1 15:35:53.744: //45/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(7=CC_EV_CALL_ALERT), cid(45), disp(0) *Mar 1 15:35:53.744: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: cid(45)st(SSA_CS _CALL_SETTING)ev(SSA_EV_CALL_ALERT) oldst(SSA_CS_CALL_SETTING)cfid(-1)csize(0)in(0)fDest(0) *Mar 1 15:35:53.744: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: -cid2(44)st2(SSA _CS_CALL_SETTING)oldst2(SSA_CS_CALL_SETTING) *Mar 1 15:35:53.744: //44/45F2AAE28044/SSAPP:10002:-1/ssaAlert: *Mar 1 15:35:53.744: //44/xxxxxxxxxxxx/CCAPI/ccGetDialpeerTag: (callID=0x2C) Router#
DB-2626
December 2010
The voice gateway receives a connect message from the terminating gateway.
*Mar 1 15:36:05.016: //45/xxxxxxxxxxxx/CCAPI/cc_api_call_connected: (vdbPtr=0x6 2EC61A4, callID=0x2D), prog_ind = 0 *Mar 1 15:36:05.016: //45/45F2AAE28044/CCAPI/cc_api_call_connected: setting callEntry->connected to TRUE
The next line shows that the call accounting starts. The leg_type=False message means this is for an outgoing call. The line that follows shows that AAA accounting is not configured.
*Mar 1 15:36:05.016: //45/45F2AAE28044/CCAPI/cc_api_call_connected: calling accounting start for callID=45 leg_type=0 *Mar 1 15:36:05.020: //45/xxxxxxxxxxxx/CCAPI/ccCallSetAAA_Accounting: callID=0x 2D, accounting=0 *Mar 1 15:36:05.020: //45/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(8=CC_EV_CALL_CONNECTED), cid(45), disp(0) *Mar 1 15:36:05.020: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: cid(45)st(SSA_CS _ALERT_RCVD)ev(SSA_EV_CALL_CONNECTED) oldst(SSA_CS_CALL_SETTING)cfid(-1)csize(0)in(0)fDest(0) *Mar 1 15:36:05.020: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: -cid2(44)st2(SSA _CS_ALERT_RCVD)oldst2(SSA_CS_CALL_SETTING) *Mar 1 15:36:05.020: //45/45F2AAE28044/SSAPP:0:-1/ssaConnect: *Mar 1 15:36:05.020: //44/xxxxxxxxxxxx/CCAPI/ccGetDialpeerTag: (callID=0x2C)
The next lines show a conference being set up between the two call legs 0x2C and 0x2D. Bridge complete messages are sent to both the terminating and originating gateways.
*Mar 1 15:36:05.020: //44/xxxxxxxxxxxx/CCAPI/ccConferenceCreate: (confID=0x6308 6424, callID1=0x2C, callID2=0x2D, tag=0x0) *Mar 1 15:36:05.020: //45/xxxxxxxxxxxx/CCAPI/cc_api_bridge_done: (confID=0x15, srcIF=0x62EC61A4, srcCallID=0x2D, dstCallID=0x2C, disposition=0, tag=0x0) *Mar 1 15:36:05.024: //44/xxxxxxxxxxxx/CCAPI/cc_api_bridge_done: (confID=0x15, srcIF=0x637EC1E0, srcCallID=0x2C, dstCallID=0x2D, disposition=0, tag=0x0)
Here, the voice gateway sets up negotiating capability with the originating telephony leg.
*Mar 1 15:36:05.024: //44/xxxxxxxxxxxx/CCAPI/cc_api_caps_ind: (dstVdbPtr=0x62EC 61A4, dstCallId=0x2D, srcCallId=0x2C, caps={codec=0x2887F, fax_rate=0xBF, vad=0x3, modem=0x2 codec_bytes=0, signal_type=3}) *Mar 1 15:36:05.024: //44/xxxxxxxxxxxx/CCAPI/cc_api_caps_ind: (Playout: mode 0, initial 60,min 40, max 300) *Mar 1 15:36:05.024: //44/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(29=CC_EV_CONF_ CREATE_DONE), cid(44), disp(0) *Mar 1 15:36:05.024: //44/45F2AAE28044/SSAPP:10002:21/ssaTraceSct: cid(44)st(SSA_CS_CONFERENCING)ev(SSA_EV_CONF_CREATE_DONE) oldst(SSA_CS_CALL_SETTING)cfid(21)csize(2)in(1)fDest(1) *Mar 1 15:36:05.024: //44/45F2AAE28044/SSAPP:10002:21/ssaTraceSct: -cid2(45)st2 (SSA_CS_CONFERENCING)oldst2(SSA_CS_ALERT_RCVD) *Mar 1 15:36:05.024: //44/45F2AAE28044/SSAPP:10002:21/ssaConfCreateDone: *Mar 1 15:36:05.024: //44/xxxxxxxxxxxx/CCAPI/ccCallConnect: (callID=0x2C), prog _ind = 0 *Mar 1 15:36:05.024: //44/45F2AAE28044/CCAPI/ccCallConnect: setting callEntry-> connected to TRUE *Mar 1 15:36:05.024: //44/45F2AAE28044/SSAPP:10002:21/ssaDebugPeers: ssaFlushPeerTagQueue cid(44) peer list: tag(20002) called number (34999) *Mar 1 15:36:05.028: //-1/xxxxxxxxxxxx/CCAPI/cc_process_notify_bridge_done: (event=0x63067FC0)
DB-2627
The voice gateway sets up negotiating capability with the terminating VoIP leg.
*Mar 1 15:36:05.028: //45/xxxxxxxxxxxx/CCAPI/cc_api_caps_ind: (dstVdbPtr=0x637E C1E0, dstCallId=0x2C, srcCallId=0x2D, caps={codec=0x4, fax_rate=0x2, vad=0x2, modem=0x0 codec_bytes=20, signal_type=2}) *Mar 1 15:36:05.028: //45/xxxxxxxxxxxx/CCAPI/cc_api_caps_ind: (Playout: mode 0, initial 60,min 40, max 300)
Router# cid(44)st(SSA_CS_ACTIVE)ev(SSA_EV_VOICE_MODE_DONE) oldst(SSA_CS_CONFERENCING)cfid(21)csize(2)in(1)fDest(1) *Mar 1 15:36:05.032: //44/45F2AAE28044/SSAPP:10002:21/ssaTraceSct: -cid2(45)st2 (SSA_CS_ACTIVE)oldst2(SSA_CS_ALERT_RCVD) *Mar 1 15:36:05.032: //44/45F2AAE28044/SSAPP:10002:21/ssaIgnore: cid(44), st(SS A_CS_ACTIVE),oldst(5), ev(52) Router# Router#! digit punched Router#
DB-2628
December 2010
The voice gateway receives a disconnect message from the terminating gateway. The cause code is 0x10 which is normal call clearing.
*Mar 1 15:36:22.916: //45/xxxxxxxxxxxx/CCAPI/cc_api_call_disconnected: (vdbPtr= 0x62EC61A4, callID=0x2D, cause=0x10) *Mar 1 15:36:22.920: //45/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(11=CC_EV_CALL_ DISCONNECTED), cid(45), disp(0) *Mar 1 15:36:22.920: //45/45F2AAE28044/SSAPP:0:21/ssaTraceSct: cid(45)st(SSA_CS _ACTIVE)ev(SSA_EV_CALL_DISCONNECTED) oldst(SSA_CS_ALERT_RCVD)cfid(21)csize(2)in(0)fDest(0) *Mar 1 15:36:22.920: //45/45F2AAE28044/SSAPP:0:21/ssaTraceSct: -cid2(44)st2(SSA _CS_ACTIVE)oldst2(SSA_CS_ACTIVE) *Mar 1 15:36:22.920: ssa: Disconnected cid(45) state(5) cause(0x10)
The voice gateway begins tearing down the conference and dropping the bridge.
*Mar 1 15:36:22.920: //-1/xxxxxxxxxxxx/CCAPI/ccConferenceDestroy: (confID=0x15, tag=0x0) *Mar 1 15:36:22.920: //45/xxxxxxxxxxxx/CCAPI/cc_api_bridge_drop_done: (confID=0 x15, srcIF=0x62EC61A4, srcCallID=0x2D, dstCallID=0x2C, disposition=0 tag=0x0) *Mar 1 15:36:22.920: //44/xxxxxxxxxxxx/CCAPI/cc_api_bridge_drop_done: (confID=0 x15, srcIF=0x637EC1E0, srcCallID=0x2C, dstCallID=0x2D, disposition=0 tag=0x0) *Mar 1 15:36:22.924: //44/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(30=CC_EV_CONF_ DESTROY_DONE), cid(44), disp(0) *Mar 1 15:36:22.924: //44/45F2AAE28044/SSAPP:10002:21/ssaTraceSct: cid(44)st(SSA_CS_CONF_DESTROYING)ev(SSA_EV_CONF_DESTROY_DONE) oldst(SSA_CS_ACTIVE)cfid(21)csize(2)in(1)fDest(1) *Mar 1 15:36:22.924: //44/45F2AAE28044/SSAPP:10002:21/ssaTraceSct: -cid2(45)st2 (SSA_CS_CONF_DESTROYING)oldst2(SSA_CS_ACTIVE) *Mar 1 15:36:22.924: //45/45F2AAE28044/SSAPP:0:-1/ssaConfDestroyDone: *Mar 1 15:36:22.924: //44/xxxxxxxxxxxx/CCAPI/ccCallDisconnect: (callID=0x2C, cause=0x10 tag=0x0)
The voice gateway stops call accounting on the incoming call, indicated by the leg_type=True message. The cause code is then set for the originating leg.
*Mar 1 15:36:22.924: //44/45F2AAE28044/CCAPI/ccCallDisconnect: calling accounting start for callID=44 leg_type=1 *Mar 1 15:36:22.924: //44/45F2AAE28044/CCAPI/ccCallDisconnect: existing_cause = 0x0, new_cause = 0x10 *Mar 1 15:36:22.924: //44/xxxxxxxxxxxx/CCAPI/cc_api_get_transfer_info: (callID=0x2C) *Mar 1 15:36:22.924: //45/xxxxxxxxxxxx/CCAPI/ccCallDisconnect: (callID=0x2D, cause=0x10 tag=0x0)
The voice gateway stops call accounting for the outgoing call, indicated by the leg_type=False message. The cause code is verified for the terminating leg.
*Mar 1 15:36:22.924: //45/45F2AAE28044/CCAPI/ccCallDisconnect: calling accounting start for callID=45 leg_type=0 *Mar 1 15:36:22.924: //45/45F2AAE28044/CCAPI/ccCallDisconnect: existing_cause = 0x10, new_cause = 0x10 *Mar 1 15:36:22.924: //45/45F2AAE28044/CCAPI/ccCallDisconnect: using the existing_cause 0x10 *Mar 1 15:36:22.928: //45/xxxxxxxxxxxx/CCAPI/cc_api_get_transfer_info: (callID=0x2D) *Mar 1 15:36:22.932: //-1/xxxxxxxxxxxx/CCAPI/cc_api_icpif: expect factor = 0 *Mar 1 15:36:22.932: //-1/xxxxxxxxxxxx/CCAPI/g113_calculate_impairment: (delay=79, loss=0), Io=0 Iq=0 Idte=0 Idd=0 Ie=10 Itot=10 *Mar 1 15:36:22.932: //-1/xxxxxxxxxxxx/CCAPI/cc_decr_if_call_volume: the remote IP is 171.69.85.111 *Mar 1 15:36:22.932: //-1/xxxxxxxxxxxx/CCAPI/cc_decr_if_call_volume: hwidb is Ethernet0/0
DB-2629
*Mar 1 15:36:22.932: //-1/xxxxxxxxxxxx/CCAPI/cc_decr_if_call_volume: reduce callnum of entry: 0, voip: 0, mmoip: 0 *Mar 1 15:36:22.932: //-1/xxxxxxxxxxxx/CCAPI/cc_decr_if_call_volume: remove an entry *Mar 1 15:36:22.932: //45/xxxxxxxxxxxx/CCAPI/cc_api_call_disconnect_done: (vdbPtr=0x62EC61A4, callID=0x2D, disp=0, tag=0x0) *Mar 1 15:36:22.932: //45/45F2AAE28044/CCAPI/ccTDPvtProfileTableObjectAccessManager: No profileTable set for callID[45] *Mar 1 15:36:22.936: //45/xxxxxxxxxxxx/CCAPI/ccTDUtilGetDataByRef: No tdObject found in profileTable for tagID[6] of callID[45] *Mar 1 15:36:22.936: //45/45F2AAE28044/CCAPI/cc_delete_call_entry: not incoming entry *Mar 1 15:36:22.936: //45/45F2AAE28044/CCAPI/cc_delete_call_entry: entry's incoming FALSE. *Mar 1 15:36:22.936: //45/45F2AAE28044/CCAPI/cc_delete_call_entry: is_incoming is FALSE *Mar 1 15:36:22.940: //45/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(12=CC_EV_CALL_ DISCONNECT_DONE), cid(45), disp(0) *Mar 1 15:36:22.940: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: cid(45)st(SSA_CS _DISCONNECTING)ev(SSA_EV_CALL_DISCONNECT_DONE) oldst(SSA_CS_ACTIVE)cfid(-1)csize(2)in(0)fDest(0) *Mar 1 15:36:22.940: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: -cid2(44)st2(SSA _CS_DISCONNECTING)oldst2(SSA_CS_CONF_DESTROYING) *Mar 1 15:36:22.940: //45/45F2AAE28044/SSAPP:0:-1/ssaDisconnectDone: *Mar 1 15:36:22.940: //45/45F2AAE28044/SSAPP:0:-1/ssaAAA_CheckAccounting: accounting generation enabled *Mar 1 15:36:22.940: //45/xxxxxxxxxxxx/CCAPI/ccCallSetAAA_Accounting: callID=0x2D, accounting=0 *Mar 1 15:36:22.944: //-1/xxxxxxxxxxxx/CCAPI/cc_decr_if_call_volume: not the VoIP or MMoIP *Mar 1 15:36:22.948: //44/xxxxxxxxxxxx/CCAPI/cc_api_call_disconnect_done: (vdbPtr=0x637EC1E0, callID=0x2C, disp=0, tag=0x0) *Mar 1 15:36:22.948: //44/45F2AAE28044/CCAPI/cc_delete_call_entry: ccFreeRawMsg Info(0x6307595C) *Mar 1 15:36:22.948: //44/45F2AAE28044/CCAPI/cc_delete_call_entry: Decrement call volume counter 1 *Mar 1 15:36:22.948: //44/45F2AAE28044/CCAPI/cc_delete_call_entry: current call volume: 0 *Mar 1 15:36:22.948: //44/45F2AAE28044/CCAPI/cc_delete_call_entry: entry's incoming TRUE. *Mar 1 15:36:22.948: //44/45F2AAE28044/CCAPI/cc_delete_call_entry: is_incoming is TRUE *Mar 1 15:36:22.948: //44/45F2AAE28044/CCAPI/cc_delete_call_entry: Deleting profileTable[0x6380E11C] *Mar 1 15:36:22.948: //-1/xxxxxxxxxxxx/CCAPI/ccTDDestructTDHashProfileTab: Destructor Profile Table (0x6380E11C) *Mar 1 15:36:22.948: //-1/xxxxxxxxxxxx/CCAPI/ccTDDestructInstanceTDObject: tdObject[0x63401148] tagID[5] *Mar 1 15:36:22.948: //-1/xxxxxxxxxxxx/CCAPI/ccTDDestructInstanceTDObject: tdObject[0x638BC1AC] tagID[6] *Mar 1 15:36:22.956: //44/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(12=CC_EV_CALL_ DISCONNECT_DONE), cid(44), disp(0) *Mar 1 15:36:22.956: //44/45F2AAE28044/SSAPP:10002:-1/ssaTraceSct: cid(44)st(SSA_CS_DISCONNECTING)ev(SSA_EV_CALL_DISCONNECT_DONE) oldst(SSA_CS_CONF_DESTROYING)cfid(-1)csize(1)in(1)fDest(1) Router# *Mar 1 15:36:22.956: //44/45F2AAE28044/SSAPP:10002:-1/ssaDisconnectDone:
Related Commands
Description Traces error logs in the CCAPI. Allows configuration of the voice call debug output.
DB-2630
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug voip confmsp command:
Router# debug voip confmsp CONFMSP debugging is on . . . 00:06:44:confmsp_setup_request:callID (6), 00:06:44:confmsp_setup_request:conf structure (63DD27E4) created, 00:06:44:confmsp_bridge:confID(4), callIDs(6,5) xmitFunc 61D46D4C, dstIF 64912880 00:06:44:confmsp_bridge:confID(4), callIDs(6,5) event queued 00:06:44:confmsp_act_bridge: state = CONFMSP_STATE_SETUP, event=EV_CONFMSP_BRIDGING 00:06:44:confmsp_act_bridge:codec 1, codec_bytes 160, vad 1 00:06:44:confmsp_act_bridge:codec 1, codec_bytes 160, vad 1 00:06:44:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_SETUP, event:EV_CONFMSP_BRIDGING, next_state:CONFMSP_STATE_CONNECT_CONFEREE 00:06:44:confmsp_get_dsmp_req_status:condition to be returned FALSE 00:06:44:confmsp_connect_response:found conf (63DD27E4) dsmp ret is 1 00:06:44:confmsp_act_bridge_success: state = CONFMSP_STATE_CONNECT_CONFEREE, event=EV_CONFMSP_CNFRE_CONNECT_RESP_SUCCESS confmsp_caps_ind:context = 65241B34 00:06:44:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_CONNECT_CONFEREE, event:EV_CONFMSP_CNFRE_CONNECT_RESP_SUCCESS, next_state:CONFMSP_STATE_CONNECTED 00:06:44:confmsp_bridge:confID(5), callIDs(6,7) xmitFunc 61D46D4C, dstIF 64912880 00:06:44:confmsp_bridge:confID(5), callIDs(6,7) event queued 00:06:44:confmsp_act_bridge: state = CONFMSP_STATE_SETUP, event=EV_CONFMSP_BRIDGING 00:06:44:confmsp_act_bridge:codec 1, codec_bytes 160, vad 1 00:06:44:confmsp_act_bridge:codec 1, codec_bytes 160, vad 1
DB-2631
00:06:44:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_SETUP, event:EV_CONFMSP_BRIDGING, next_state:CONFMSP_STATE_CONNECT_CONFEREE 00:06:44:confmsp_get_dsmp_req_status:condition to be returned FALSE 00:06:44:confmsp_connect_response:found conf (6358A338) dsmp ret is 1 00:06:44:confmsp_act_bridge_success: state = CONFMSP_STATE_CONNECT_CONFEREE, event=EV_CONFMSP_CNFRE_CONNECT_RESP_SUCCESS confmsp_caps_ind:context = 63588E70 00:06:44:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_CONNECT_CONFEREE, event:EV_CONFMSP_CNFRE_CONNECT_RESP_SUCCESS, next_state:CONFMSP_STATE_CONNECTED 00:06:44:confmsp_bridge:confID(6), callIDs(6,8) xmitFunc 61D46D4C, dstIF 64912880 00:06:44:confmsp_bridge:confID(6), callIDs(6,8) event queued 00:06:44:confmsp_act_bridge: state = CONFMSP_STATE_SETUP, event=EV_CONFMSP_BRIDGING 00:06:44:confmsp_act_bridge:codec 1, codec_bytes 160, vad 1 00:06:44:confmsp_act_bridge:codec 1, codec_bytes 160, vad 1 00:06:44:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_SETUP, event:EV_CONFMSP_BRIDGING, next_state:CONFMSP_STATE_CONNECT_CONFEREE 00:06:44:confmsp_get_dsmp_req_status:condition to be returned FALSE 00:06:44:confmsp_connect_response:found conf (6358CE50) dsmp ret is 1 00:06:44:confmsp_act_bridge_success: state = CONFMSP_STATE_CONNECT_CONFEREE, event=EV_CONFMSP_CNFRE_CONNECT_RESP_SUCCESS confmsp_caps_ind:context = 63DD2524 00:06:44:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_CONNECT_CONFEREE, event:EV_CONFMSP_CNFRE_CONNECT_RESP_SUCCESS, next_state:CONFMSP_STATE_CONNECTED 00:07:28:confmsp_bdrop:confID(4), callIDs(6,5) 00:07:28:confmsp_bdrop:confID(4), callIDs(6,5) event queued 00:07:28:confmsp_act_bdrop: state = CONFMSP_STATE_CONNECTED, event=EV_CONFMSP_BRIDGEDROP 00:07:28:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_CONNECTED, event:EV_CONFMSP_BRIDGEDROP, next_state:CONFMSP_STATE_DISCONNECT_CONFEREE 00:07:28:confmsp_get_dsmp_req_status:condition to be returned FALSE 00:07:28:confmsp_disconnect_response:found conf (63DD27E4) 00:07:28:confmsp_connect_response:found conf (63DD27E4) dsmp ret is 10 00:07:28:confmsp_act_bdrop_success: state = CONFMSP_STATE_DISCONNECT_CONFEREE, event=EV_CONFMSP_CNFRE_DISCONNECT_RESP_SUCCESS 00:07:28:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_DISCONNECT_CONFEREE, event:EV_CONFMSP_CNFRE_DISCONNECT_RESP_SUCCESS, next_state:CONFMSP_STATE_BRIDGE_DROPPED 00:07:28:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_BRIDGE_DROPPED, event:CNFSM_LAMBDA_EVENT, next_state:CNFSM_NO_STATE_CHANGE 00:07:29:confmsp_bdrop:confID(6), callIDs(6,8) 00:07:29:confmsp_bdrop:confID(6), callIDs(6,8) event queued 00:07:29:confmsp_bdrop:confID(5), callIDs(6,7) 00:07:29:confmsp_bdrop:confID(5), callIDs(6,7) event queued 00:07:29:confmsp_act_bdrop: state = CONFMSP_STATE_CONNECTED, event=EV_CONFMSP_BRIDGEDROP 00:07:29:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_CONNECTED, event:EV_CONFMSP_BRIDGEDROP, next_state:CONFMSP_STATE_DISCONNECT_CONFEREE 00:07:29:confmsp_get_dsmp_req_status:condition to be returned FALSE 00:07:29:confmsp_act_bdrop: state = CONFMSP_STATE_CONNECTED, event=EV_CONFMSP_BRIDGEDROP 00:07:29:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_CONNECTED, event:EV_CONFMSP_BRIDGEDROP, next_state:CONFMSP_STATE_DISCONNECT_CONFEREE 00:07:29:confmsp_get_dsmp_req_status:condition to be returned FALSE 00:07:29:confmsp_disconnect_response:found conf (6358CE50) 00:07:29:confmsp_connect_response:found conf (6358CE50) dsmp ret is 10 00:07:29:confmsp_act_bdrop_success: state = CONFMSP_STATE_DISCONNECT_CONFEREE, event=EV_CONFMSP_CNFRE_DISCONNECT_RESP_SUCCESS 00:07:29:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_DISCONNECT_CONFEREE, event:EV_CONFMSP_CNFRE_DISCONNECT_RESP_SUCCESS, next_state:CONFMSP_STATE_BRIDGE_DROPPED
DB-2632
December 2010
00:07:29:confmsp_act_terminate: state = CONFMSP_STATE_BRIDGE_DROPPED, event=CNFSM_LAMBDA_EVENT 00:07:29:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_BRIDGE_DROPPED, event:CNFSM_LAMBDA_EVENT, next_state:CNFSM_NULL_STATE 00:07:29:confmsp_free_conf:freeing 6358CE50 00:07:29:confmsp_disconnect_response:found conf (6358A338) 00:07:29:confmsp_connect_response:found conf (6358A338) dsmp ret is 10 00:07:29:confmsp_act_bdrop_success: state = CONFMSP_STATE_DISCONNECT_CONFEREE, event=EV_CONFMSP_CNFRE_DISCONNECT_RESP_SUCCESS 00:07:29:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_DISCONNECT_CONFEREE, event:EV_CONFMSP_CNFRE_DISCONNECT_RESP_SUCCESS, next_state:CONFMSP_STATE_BRIDGE_DROPPED 00:07:29:confmsp_act_terminate: state = CONFMSP_STATE_BRIDGE_DROPPED, event=CNFSM_LAMBDA_EVENT 00:07:29:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_BRIDGE_DROPPED, event:CNFSM_LAMBDA_EVENT, next_state:CNFSM_NULL_STATE 00:07:29:confmsp_free_conf:freeing 6358A338 00:07:29:confmsp_disconnect:callID (6) 00:07:29:confmsp_disconnect:callID (6) event queued 00:07:29:confmsp_act_disconnected: state = CONFMSP_STATE_BRIDGE_DROPPED, event=EV_CONFMSP_DISCONNECT 00:07:29:CNFSM:cur_container:confmsp container, cur_state:CONFMSP_STATE_BRIDGE_DROPPED, event:EV_CONFMSP_DISCONNECT, next_state:CNFSM_NULL_STATE 00:07:29:confmsp_free_conf:freeing 63DD27E4
DB-2633
Syntax Description
error inout
(Optional) Displays error logs in the DCAPI. (Optional) Displays the execution path through the DCAPI.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug voip dcapi error command traces the error logs in the DCAPI, which is the software layer that interfaces the SCCP Telephony Control Application (STCAPP) with the Cisco CallManager using the Skinny Client Control Protocol (SCCP). Error logs are generated during normal call processing when there are insufficient resources, or when there are problems in the device control API. This debug command shows error events or unexpected behavior in system software. The debug voip dcapi inout command shows how a call executes through the software. This command traces the execution path through the DCAPI during communications with the SCCP service provider interface (SPI) and the call control API (CCAPI) that controls the physical voice port. You can use the output from this command to understand how devices are being handled by the APIs and to see the call setup and teardown operations performed on the telephony call leg.
Examples
Following is sample output from the debug voip dcapi inout command during call setup:
Router# debug voip dcapi inout *Jan 27 16:26:23.957: dc_api_device_set_ringer_res: Set Ringer message success *Jan 27 16:26:23.957: //-1/xxxxxxxxxxxx/CCAPI/dc_api_device_stop_tone_res: *Jan 27 16:26:23.957: dc_api_device_stop_tone_res: Stop Tone message success *Jan 27 16:26:23.957: //-1/xxxxxxxxxxxx/CCAPI/dc_api_media_open_rcv_channel: *Jan 27 16:26:23.957: dc_api_media_open_rcv_channel: evt DC_EV_MEDIA_OPEN_RCV_CHNL is successsfully enqueued to app *Jan 27 16:26:23.957: //-1/xxxxxxxxxxxx/CCAPI/dc_api_device_stop_tone_res: *Jan 27 16:26:23.957: dc_api_device_stop_tone_res: Stop Tone message success
DB-2634
December 2010
*Jan 27 16:26:23.957: //-1/xxxxxxxxxxxx/CCAPI/dc_api_device_call_state_res: *Jan 27 16:26:23.957: dc_api_device_call_state_res: Call State message success *Jan 27 16:26:23.957: //-1/xxxxxxxxxxxx/CCAPI/dc_api_device_call_info_res:
Description Timestamp time in hours (military format), minutes, and seconds that indicates when the DCAPI event occurred. The DCAPI event in which the SCCP SPI translation occurred.
Related Commands
Command debug voip application stcapp events debug voip application stcapp functions
DB-2635
Syntax Description
(Optional) Displays all dialpeer debugging messages. (Optional) Displays dialpeer inout and error debugging messages. This option also runs if no keywords are added. (Optional) Displays detailed dialpeer information. (Optional) Displays dialpeer error messages. (Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software processing errors. (Optional) Displays dialpeer functions. (Optional) Displays dialpeer in/out functions.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command replaces the debug dialpeer command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Disable console logging and use buffered logging before using the debug voip dialpeer command. Using the debug voip dialpeer command generates a large volume of debugging messages, which can affect router performance.
Examples
The following examples show output for variations of the debug voip dialpeer command:
debug voip dialpeer detail on the Originating Gateway, page 2637 debug voip dialpeer inout on the Terminating Gateway, page 2638
DB-2636
December 2010
FXS
PSTN
The following event identifies the incoming dial peer and shows that it has been matched:
*Apr 18 21:07:35.291: //-1/xxxxxxxxxxxx/DPM/MatchNextPeer: Result=Success(0); Incoming Dial-peer=1 Is Matched *Apr 18 21:07:35.291: //-1/xxxxxxxxxxxx/DPM/dpAssociateIncomingPeerCore: Match Rule=DP_MATCH_INCOMING_DNIS; Called Number=83103 *Apr 18 21:07:35.291: //-1/xxxxxxxxxxxx/DPM/dpMatchPeertype: Is Incoming=TRUE, Number Expansion=FALSE *Apr 18 21:07:35.291: //-1/xxxxxxxxxxxx/DPM/dpMatchCore: Dial String=83103, Expanded String=83103, Calling Number= Timeout=TRUE, Is Incoming=TRUE, Peer Info Type=DIALPEER_INFO_FAX *Apr 18 21:07:35.291: //-1/xxxxxxxxxxxx/DPM/dpMatchCore: Result=-1 *Apr 18 21:07:35.291: //-1/xxxxxxxxxxxx/DPM/dpAssociateIncomingPeerCore: Match Rule=DP_MATCH_ANSWER; Calling Number=4085550111 *Apr 18 21:07:35.291: //-1/xxxxxxxxxxxx/DPM/dpMatchPeertype: Is Incoming=TRUE, Number Expansion=FALSE *Apr 18 21:07:35.291: //-1/xxxxxxxxxxxx/DPM/dpMatchCore: Dial String=, Expanded String=, Calling Number=4085550111T Timeout=TRUE, Is Incoming=TRUE, Peer Info Type=DIALPEER_INFO_FAX *Apr 18 21:07:35.291: //-1/xxxxxxxxxxxx/DPM/dpMatchCore: Result=-1 *Apr 18 21:07:35.291: //-1/xxxxxxxxxxxx/DPM/dpAssociateIncomingPeerCore: Match Rule=DP_MATCH_ORIGINATE; Calling Number=4085550111 *Apr 18 21:07:35.291: //-1/xxxxxxxxxxxx/DPM/dpMatchPeertype: Is Incoming=TRUE, Number Expansion=FALSE *Apr 18 21:07:35.291: //-1/xxxxxxxxxxxx/DPM/dpMatchCore: Dial String=, Expanded String=, Calling Number=4085550111T Timeout=TRUE, Is Incoming=TRUE, Peer Info Type=DIALPEER_INFO_FAX *Apr 18 21:07:35.295: //-1/xxxxxxxxxxxx/DPM/dpMatchCore: Result=-1
DB-2637
103302
The following event shows the number expansion. This is the only dial peer debug command that shows the number expansion.
*Apr 18 21:07:35.295: //-1/xxxxxxxxxxxx/DPM/dpMatchCore: Dial String=83103, Expanded String=3600, Calling Number= Timeout=TRUE, Is Incoming=FALSE, Peer Info Type=DIALPEER_INFO_SPEECH
The next few lines show matching for the outgoing dial peer. These lines show the matching sequence if the first match is not available.
*Apr 18 21:07:35.295: //-1/xxxxxxxxxxxx/DPM/MatchNextPeer: Result=Success(0); Outgoing Dial-peer=3600 Is Matched *Apr 18 21:07:35.295: //-1/xxxxxxxxxxxx/DPM/MatchNextPeer: Result=Success(0); Outgoing Dial-peer=36 Is Matched *Apr 18 21:07:35.295: //-1/xxxxxxxxxxxx/DPM/MatchNextPeer: Result=Success(0); Outgoing Dial-peer=360 Is Matched *Apr 18 21:07:35.295: //-1/23ED4B1B8010/DPM/dpMatchCore: Dial String=83103, Expanded String=3600, Calling Number= Timeout=TRUE, Is Incoming=FALSE, Peer Info Type=DIALPEER_INFO_SPEECH
The following event shows the matched dial peers in the order of priority:
List of Matched Outgoing Dial-peer(s): 1: Dial-peer Tag=3600 2: Dial-peer Tag=36
Related Commands
Description Enables blocking of incoming calls on the dial peer. Identifies the carrier handling the incoming call.
DB-2638
December 2010
Command session target (ENUM) show dial-peer voice translation-profile (dial-peer) trunkgroup (dial-peer) trunk-group-label (dial-peer)
Description Specifies the ENUM search table for the target session. Displays the configuration of the dial peer. Assigns a translation profile to the dial peer. Assigns a trunk group to the dial peer. Identifies the trunk group handling the incoming call.
DB-2639
Syntax Description
(Optional) Displays all DSM debugging messages. (Optional) Enables a digital signal processor (DSP) message trace. (Optional) Displays DSM error messages. (Optional) Enables Real-Time Protocol (RTP) debugging on DSM. (Optional) Enables session debugging. (Optional) Displays DSM statistics. (Optional) Displays tone debugging. (Optional) Enables Voice over Frame Relay (VoFR) debugging on the VPM.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command replaces the debug vtsp dsp command. The vofr keyword is no longer available in Cisco IOS Release 12.3(14)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To debug VoIP calls, use this command in conjunction with debug voip vtsp command and debug voip dsmp commands. All the related information for media processing is now available by using Distributed Stream Media Processor (DSMP). DSM is responsible for creating streams and issuing connections between them.
Examples
The following examples show output for variations of the debug voip dsm command:
debug voip dsm session on the Originating Gateway, page 2641 debug voip dsm stats on the Terminating Gateway, page 2643 debug voip dsm Session of a VoIP Call in Transition to Connected State and in Transition from Connected to Disconnected State, page 2643
DB-2640
December 2010
FXS
PSTN
The following event indicates that modem relay is not supported on the specified port, which is port 2/1:23:
*Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_act_bridge: Modem Relay NOT Supported on this end-point/voice-port. disabling it... *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_exec: [B SM: R:FSM_OK -> S:S_DSM_BRIDGING] *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_exec: [Feat SM: S:NONE B SM: S:S_DSM_BRIDGING E:E_DSM_CC_CAPS_IND] *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_act_caps_ind: . *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_act_caps_ind: RTP PT:NTE[101],NSE[100],FaxInd[96],FaxAck[97],CiscoDT 121],FaxRelay[122],CASsig[123],ClearChan[125],PCMu[0],PCMa[8]Codec[4], TxDynamicPayload[0], RxDynamicPayload[0] *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_act_caps_ind: dtmf relay: mode=1, codec=1 *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_act_caps_ind: Modem Relay NOT Supported on this end-point/voice-port disabling it... *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_act_caps_ind: passthrough: cap_modem_proto 4,cap_modem_codec 1, cap_
DB-2641
103302
em_redundancy 0, payload 103, modem_relay 0, gw-xid 0 *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_debug_caps_encap: Encap 1, Vad 2, Codec 0x4, CodecBytes 20, FaxRate 1, FaxBytes 20, FaxNsf 0xAD0051 SignalType 2 DtmfRelay 1, Modem 2, SeqNumStart 0x5A1 *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_act_caps_ind: FORKING Parameters are forking mask: 0, simple_forking dec_mask: 0, complex_forking_codec_mask 0 *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_act_caps_ind: playout: [ mode:1,init:60, min:40, max:200]. data_mode *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_exec: [B SM: R:FSM_OK -> S:S_DSM_BRIDGING] *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_exec: [Feat SM: S:NONE B SM: S:S_DSM_BRIDGING E:E_DSM_CC_CAPS_ACK] *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_act_caps_ack: . *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_act_caps_ack: passthrough: cap_modem_proto 4, cap_modem_codec 1, cap dem_redundancy 0, payload 103, modem_relay 0, gw-xid 0 *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_act_caps_ack: Named Telephone Event payload rcv 101, tx 101 *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_switch_codec: Required codec is 16, current dsp codec is -1 *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_switch_codec: codec = 16 *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_exec: [B SM: R:FSM_OK -> S:S_DSM_PENDING_CODEC_SWITCH] *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_exec: [Feat SM: S:NONE B SM: S:S_DSM_PENDING_CODEC_SWITCH E:E_DSM_DS_PEND_SUCCESS] *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_act_pend_codec_success: . *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/dsm_open_voice_and_set_params: *Apr 18 21:15:39.695: //43/44A507668015/DSM:(2/1:23):0:8:4/set_playout_dmgr: playout default
DB-2642
December 2010
The following events show statistics for DSM transmission, reception, delay, and errors:
*May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_exec: [B SM: R:FSM_OK -> S:S_DSM_BRIDGED] *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_exec: [Feat SM: S:NONE B SM: S:S_DSM_BRIDGED E:E_DSM_DSP_GET_TX] *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_act_packet_stats_res: . *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_act_packet_stats_res: -4->dmgr=0x645461E0,stats_reqs=3 *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_exec: [B SM: R:FSM_OK -> S:S_DSM_BRIDGED] *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_exec: [Feat SM: S:NONE B SM: S:S_DSM_BRIDGED E:E_DSM_DSP_GET_RX] *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_act_packet_stats_res: . *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_act_packet_stats_res: -4->dmgr=0x645461E0,stats_reqs=2 *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_exec: [B SM: R:FSM_OK -> S:S_DSM_BRIDGED] *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_exec: [Feat SM: S:NONE B SM: S:S_DSM_BRIDGED E:E_DSM_DSP_GET_VP_DELAY] *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_act_packet_stats_res: . *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_act_packet_stats_res: -4->dmgr=0x645461E0,stats_reqs=1 *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_exec: [B SM: R:FSM_OK -> S:S_DSM_BRIDGED] *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_exec: [Feat SM: S:NONE B SM: S:S_DSM_BRIDGED E:E_DSM_DSP_GET_VP_ERROR] *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_act_packet_stats_res: . Router# *May 1 19:40:09.775: //43/7EE6F84B8016/DSM:(4/0/0):-1:1:1/dsm_act_packet_stats_res: -4->dmgr=0x645461E0,stats_reqs=0
debug voip dsm Session of a VoIP Call in Transition to Connected State and in Transition from Connected to Disconnected State
The following is sample output from the debug voip dsm command, with Cisco IOS Release 12.3(14)T software, when a VoIP call is in transition to the connected state:
Router# debug voip dsm *Jun 8 20:10:33.205: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_create: . *Jun 8 20:10:33.209: //28/6F1FA7868003/DSM:(2/0:23):-1/set_echo_canceller_data: echo_cancel: 1 *Jun 8 20:10:33.209: //28/6F1FA7868003/DSM:(2/0:23):-1/set_echo_canceller_data: echo_flags: 55, echo_len: 512 *Jun 8 20:10:33.217: //28/6F1FA7868003/DSM:(2/0:23):-1/dsmp_dsmapi_reserve_resource_cb: . *Jun 8 20:10:33.217: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_set_elog_enable: .
DB-2643
*Jun 8 20:10:33.477: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_reinit_platform_info: . *Jun 8 20:10:33.477: //28/6F1FA7868003/DSM:(2/0:23):-1/dsmp_dsmapi_reserve_resource_cb: . *Jun 8 20:10:33.485: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_bridge: . *Jun 8 20:10:33.485: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_bridge: *Jun 8 20:10:33.485: dsp_stream_mgr_bridge, src_call_id 28, dst_call_id 27 *Jun 8 20:10:33.485: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_bridge: creating packet streams *Jun 8 20:10:33.489: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_insert_conn_array_entry: dmgr->connArr.count = 2 *Jun 8 20:10:33.489: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_do_caps_ind: . *Jun 8 20:10:33.493: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_cap_ind_ack: src_call_id = 28, dst_call_id = 27, is_cap_ack = 1 *Jun 8 20:10:33.493: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_cap_ind_ack: src_call_id = 28, dst_call_id = 27, is_cap_ack = 0 *Jun 8 20:10:33.493: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_ind_negotiation: Caps in caps indication: *Jun 8 20:10:33.497: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_dump: playout: [ mode:1,init:60, min:40, max:250]. data_mode:0 *Jun 8 20:10:33.497: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_dump: RTP PT:NTE[101],NSE[100],FaxInd[96],FaxAck[97],CiscoDTMF[121],FaxRelay[122],CASsig[123],ClearC han[125],PCMu[0],PCMa[8]Codec[4], TxDynamicPayload[0], RxDynamicPayload[0] *Jun 8 20:10:33.497: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_dump: passthrough: cap_modem_proto 4,cap_modem_codec 1, cap_modem_redundancy 1, payload 100, modem_relay 0, gw-xid 0 *Jun 8 20:10:33.497: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_debug_caps_encap: Encap 1, Vad 2, Codec 0x4, CodecBytes 20, FaxRate 2, FaxBytes 20, FaxNsf 0xAD0051 SignalType 2 DtmfRelay 1, Modem 2, SeqNumStart 0x0 *Jun 8 20:10:33.497: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_ind_negotiation: Caps after caps negotiation: *Jun 8 20:10:33.497: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_dump: playout: [ mode:1,init:60, min:40, max:250]. data_mode:0 *Jun 8 20:10:33.497: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_dump: RTP PT:NTE[101],NSE[100],FaxInd[96],FaxAck[97],CiscoDTMF[121],FaxRelay[122],CASsig[123],ClearC han[125],PCMu[0],PCMa[8]Codec[4], TxDynamicPayload[0], RxDynamicPayload[0] *Jun 8 20:10:33.501: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_dump: passthrough: cap_modem_proto 4,cap_modem_codec 1, cap_modem_redundancy 1, payload 100, modem_relay 0, gw-xid 0 *Jun 8 20:10:33.501: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_debug_caps_encap: Encap 1, Vad 2, Codec 0x4, CodecBytes 20, FaxRate 2, FaxBytes 20, FaxNsf 0xAD0051 SignalType 2 DtmfRelay 1, Modem 2, SeqNumStart 0x0 *Jun 8 20:10:33.501: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_cap_ind_ack: packet streams already created during bridging *Jun 8 20:10:33.501: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_ind_negotiation: Caps in caps indication: *Jun 8 20:10:33.501: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_dump: playout: [ mode:1,init:60, min:40, max:250]. data_mode:0 *Jun 8 20:10:33.501: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_dump: RTP PT:NTE[101],NSE[100],FaxInd[96],FaxAck[97],CiscoDTMF[121],FaxRelay[122],CASsig[123],ClearC han[125],PCMu[0],PCMa[8]Codec[4], TxDynamicPayload[0], RxDynamicPayload[0] *Jun 8 20:10:33.505: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_dump: passthrough: cap_modem_proto 4,cap_modem_codec 1, cap_modem_redundancy 1, payload 100, modem_relay 0, gw-xid 0 *Jun 8 20:10:33.505: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_debug_caps_encap: Encap 1, Vad 2, Codec 0x4, CodecBytes 20, FaxRate 2, FaxBytes 20, FaxNsf 0xAD0051 SignalType 2 DtmfRelay 1, Modem 2, SeqNumStart 0x0 *Jun 8 20:10:33.505: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_ind_negotiation: Caps after caps negotiation:
DB-2644
December 2010
*Jun 8 20:10:33.505: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_dump: playout: [ mode:1,init:60, min:40, max:250]. data_mode:0 *Jun 8 20:10:33.505: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_dump: RTP PT:NTE[101],NSE[100],FaxInd[96],FaxAck[97],CiscoDTMF[121],FaxRelay[122],CASsig[123],ClearC han[125],PCMu[0],PCMa[8]Codec[4], TxDynamicPayload[0], RxDynamicPayload[0] *Jun 8 20:10:33.505: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_caps_dump: passthrough: cap_modem_proto 4,cap_modem_codec 1, cap_modem_redundancy 1, payload 100, modem_relay 0, gw-xid 0 *Jun 8 20:10:33.505: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_debug_caps_encap: Encap 1, Vad 2, Codec 0x4, CodecBytes 20, FaxRate 2, FaxBytes 20, FaxNsf 0xAD0051 SignalType 2 DtmfRelay 1, Modem 2, SeqNumStart 0x0 *Jun 8 20:10:33.509: //28/6F1FA7868003/DSM:(2/0:23):-1/dsmp_dsmapi_connect_cb: . *Jun 8 20:10:36.229: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_req_stats: . *Jun 8 20:10:36.233: //28/6F1FA7868003/DSM:(2/0:23):-1/dsmp_dsmapi_stats_cb: . *Jun 8 20:10:38.265: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_req_stats: . *Jun 8 20:10:38.269: //28/6F1FA7868003/DSM:(2/0:23):-1/dsmp_dsmapi_stats_cb: . *Jun 8 20:10:43.481: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_req_stats: . *Jun 8 20:10:43.489: //28/6F1FA7868003/DSM:(2/0:23):-1/dsmp_dsmapi_stats_cb: .
The following is sample output from the debug voip dsm command, with Cisco IOS Release 12.3(14)T software, when a VoIP call is in transition from connected to the disconnected state: Router# debug voip dsm *Jun 8 20:12:14.701: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_req_stats: . *Jun 8 20:12:14.705: //28/6F1FA7868003/DSM:(2/0:23):-1/dsmp_dsmapi_stats_cb: . *Jun 8 20:12:18.721: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_bridge_drop: *Jun 8 20:12:18.721: dsp_stream_mgr_bridge_drop, src_call_id 28, dst_call_id 27 *Jun 8 20:12:18.721: //28/6F1FA7868003/DSM:(2/0:23):-1/dsm_delete_conn_array_entry: dmgr->connArr.count = 0 *Jun 8 20:12:18.737: //28/6F1FA7868003/DSM:(2/0:23):-1/dsmp_dsmapi_stats_cb: . *Jun 8 20:12:18.765: //28/6F1FA7868003/DSM:(2/0:23):-1/dsp_stream_mgr_destroy: . *Jun 8 20:12:18.765: //28/6F1FA7868003/DSM:(2/0:23):-1/dsmapi_accept_modem_passthrough_session: : dmgr: 6561C520, active sessions 0, max sessions: 16 rejected sessions till now: 0 *Jun 8 20:12:18.769: //28/6F1FA7868003/DSM:(2/0:23):-1/dsmp_dsmapi_reserve_resource_cb: .
Related Commands
Description Displays debugging information from the DSMP and its related applications. Displays information about the VTSP.
DB-2645
Syntax Description
all default error event function individual inout rtp session stats tone vofr
(Optional) Enables all DSMP debugging (except stats). (Optional) Activates inout, error, and event debugging. (Optional) Enables DSMP error debugging. (Optional) Enables state machine debugging. (Optional) Enables procedure tracing. (Optional) Enables individual DSMP debugging. (Optional) Enables subsystem inout debugging. (Optional) Enables Real-Time Protocol (RTP) debugging on DSMP. (Optional) Enables session debugging. (Optional) Enables DSMP statistics debugging. (Optional) Enables tone debugging. (Optional) Enables Voice over Frame Relay (VoFR) debugging on the VPM.
Command Modes
Command History
Modification This command was introduced. The all, default, error, event, function, individual, inout, rtp, session, stats, tone, and vofr keywords were added to the command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To debug VoIP calls, use this command in conjunction with debug voip vtsp command and debug voip dsm commands. All the related information for media processing is now available by using DSMP. DSM is responsible for creating streams and issuing connections between them.
Examples
The following is sample output from the debug voip dsmp command for transcoding call:
Router# debug voip dsmp
DB-2646
December 2010
Syslog logging:enabled (11 messages dropped, 2 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) Console logging:disabled Monitor logging:level debugging, 0 messages logged, xml disabled, filtering disabled Buffer logging:level debugging, 236 messages logged, xml disabled, filtering disabled Logging Exception size (4096 bytes) Count and timestamp logging messages:disabled Trap logging:level informational, 25 message lines logged Log Buffer (3000000 bytes): 00:10:18:dsmpAddStream:: 00:10:18:dsmpAddStream:: 00:10:18:dsmpAddStream:: 00:10:18:dsmpAddStream:: 00:10:18:dsmpConnectXcodeBinderReq 00:10:18:dsmp_process_event: 00:10:18:dsmp_process_event:evt->requestType = E_DSMP_CC_XCODE_REQ 00:10:18:dsmpxc_act_alloc_rsc::state = S_DSMPXC_INITIAL event = E_DSMP_CC_XCODE_REQ 00:10:18:dsp_ret = 4 (if failed, cause = 0) 00:10:18:dsp_intf = 0x63DD21D8 00:10:18:dsmp_set_state_var:message to DSP successful,ret::4 00:10:18:CNFSM:cur_container:xcoder_container, cur_state:S_DSMPXC_INITIAL, event:E_DSMP_CC_XCODE_REQ, next_state:S_DSMPXC_RSC_ALLOCING 00:10:18:dsmp_is_ret_succ:: 00:10:18:dsmpxc_act_init_rsc::state = S_DSMPXC_RSC_ALLOCING event = CNFSM_LAMBDA_EVENT 00:10:18:dsmp_set_state_var:message to DSP successful,ret::4 00:10:18:CNFSM:cur_container:xcoder_container, cur_state:S_DSMPXC_RSC_ALLOCING, event:CNFSM_LAMBDA_EVENT, next_state:S_DSMPXC_RSC_INITING 00:10:18:dsmp_is_ret_succ:: 00:10:18:dsmpxc_act_open_rsc::state = S_DSMPXC_RSC_INITING event = CNFSM_LAMBDA_EVENT 00:10:18:dsmp_set_state_var:message to DSP successful,ret::4 00:10:18:CNFSM:cur_container:xcoder_container, cur_state:S_DSMPXC_RSC_INITING, event:CNFSM_LAMBDA_EVENT, next_state:S_DSMPXC_RSC_OPENING 00:10:18:dsmp_is_ret_succ:: 00:10:18:dsmpxc_act_program_rsc::state = S_DSMPXC_RSC_OPENING event = CNFSM_LAMBDA_EVENT 00:10:18:dsmp_set_state_var:message to DSP successful,ret::4 00:10:18:CNFSM:cur_container:xcoder_container, cur_state:S_DSMPXC_RSC_OPENING, event:CNFSM_LAMBDA_EVENT, next_state:S_DSMPXC_XCODE_PEND 00:10:18:CNFSM:new_container:xcoding_container 00:10:18:dsmp_is_ret_succ:: 00:10:18:dsmpxc_act_succ_conn_req::state = S_DSMPXC_XCODE_PEND event = CNFSM_LAMBDA_EVENT 00:10:18:CNFSM:cur_container:xcoding_container, cur_state:S_DSMPXC_XCODE_PEND, event:CNFSM_LAMBDA_EVENT, next_state:S_DSMPXC_XCODE 00:10:18:no_stream_in_session Router# clear log Clear logging buffer [confirm] Router# Router# clear logsh logg Syslog logging:enabled (11 messages dropped, 2 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) Console logging:disabled Monitor logging:level debugging, 0 messages logged, xml disabled, filtering disabled
DB-2647
Buffer logging:level debugging, 274 messages logged, xml disabled, filtering disabled Logging Exception size (4096 bytes) Count and timestamp logging messages:disabled Trap logging:level informational, 25 message lines logged Log Buffer (3000000 bytes): 00:10:50:dsmpDeleteStream 00:10:50:dsmpDeleteStream 00:10:50:dsmpDeleteStream 00:10:50:dsmpDeleteStream 00:10:50:dsmp_process_event: 00:10:50:dsmp_process_event:evt->requestType = E_DSMP_CC_DELETE_STREAM 00:10:50:dsmpxc_act_delete_stream::state = S_DSMPXC_XCODE event = E_DSMP_CC_DELETE_STREAM 00:10:50:CNFSM:cur_container:xcoding_container, cur_state:S_DSMPXC_XCODE, event:E_DSMP_CC_DELETE_STREAM, next_state:CNFSM_NO_STATE_CHANGE 00:10:50:no_stream_in_session 00:10:50:dsmp_process_event:evt->requestType = E_DSMP_CC_DELETE_STREAM 00:10:50:dsmpxc_act_delete_stream::state = S_DSMPXC_XCODE event = E_DSMP_CC_DELETE_STREAM 00:10:50:CNFSM:cur_container:xcoding_container, cur_state:S_DSMPXC_XCODE, event:E_DSMP_CC_DELETE_STREAM, next_state:CNFSM_NO_STATE_CHANGE 00:10:50:no_stream_in_session 00:10:50:dsmp_process_event:evt->requestType = E_DSMP_CC_DELETE_STREAM 00:10:50:dsmpxc_act_delete_stream::state = S_DSMPXC_XCODE event = E_DSMP_CC_DELETE_STREAM 00:10:50:CNFSM:cur_container:xcoding_container, cur_state:S_DSMPXC_XCODE, event:E_DSMP_CC_DELETE_STREAM, next_state:CNFSM_NO_STATE_CHANGE 00:10:50:no_stream_in_session 00:10:50:dsmp_process_event:evt->requestType = E_DSMP_CC_DELETE_STREAM 00:10:50: dsmpxc_act_delete_stream::state = S_DSMPXC_XCODE event = E_DSMP_CC_DELETE_STREAM 00:10:50:CNFSM:cur_container:xcoding_container, cur_state:S_DSMPXC_XCODE, event:E_DSMP_CC_DELETE_STREAM, next_state:CNFSM_NO_STATE_CHANGE 00:10:50:no_stream_in_session 00:10:50:dsmpxc_act_stop_rsc::state = S_DSMPXC_XCODE event = CNFSM_LAMBDA_EVENT 00:10:50:dsmp_set_state_var:message to DSP successful,ret::4 00:10:50:CNFSM:cur_container:xcoding_container, cur_state:S_DSMPXC_XCODE, event:CNFSM_LAMBDA_EVENT, next_state:S_DSMPXC_CLOSING 00:10:50:dsmp_is_ret_succ:: 00:10:50:dsmpxc_act_dealloc_rsc::state = S_DSMPXC_CLOSING event = CNFSM_LAMBDA_EVENT 00:10:50:dsmp_set_state_var:message to DSP successful,ret::4 00:10:50:CNFSM:cur_container:xcoding_container, cur_state:S_DSMPXC_CLOSING, event:CNFSM_LAMBDA_EVENT, next_state:S_DSMPXC_STILL_CLOSING 00:10:50:CNFSM:new_container:xcoder_container 00:10:50:dsmp_is_ret_succ:: 00:10:50:dsmpxc_act_start_timer::state = S_DSMPXC_STILL_CLOSING event = CNFSM_LAMBDA_EVENT 00:10:50:CNFSM:cur_container:xcoder_container, cur_state:S_DSMPXC_STILL_CLOSING, event:CNFSM_LAMBDA_EVENT, next_state:CNFSM_NO_STATE_CHANGE 00:10:50:dsmp_process_event:evt->requestType = E_DSMP_DSPRM_CLOSE_COMPLETE 00:10:50:dsmpxc_act_terminate::state = S_DSMPXC_STILL_CLOSING event = E_DSMP_DSPRM_CLOSE_COMPLETE 00:10:50:dsmpxc_act_terminate Removing the program based stream = 1 00:10:50:CNFSM:cur_container:xcoder_container, cur_state:S_DSMPXC_STILL_CLOSING, event:E_DSMP_DSPRM_CLOSE_COMPLETE, next_state:CNFSM_NULL_STATE 00:10:50:dsmp_free_session 00:10:50:dsmp_process_event:
The following is sample output from the debug voip dsmp command, with Cisco IOS Release 12.3(14)T software, when a VoIP call is in transition to the connected state:
Router# debug voip dsmp
DB-2648
December 2010
*May 22 04:12:17.775: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpAddStream: callID = 24, confID = -1, streamType = TDM, streamDir = INPUT, ownerContext = 0x0000000C, codec = 0x0, fax_modem_type =0, XmitFn = 0x00000000, multicastStreamDtmfType = 0 *May 22 04:12:17.775: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpAddStream: streamID = 2 *May 22 04:12:17.779: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpAddStream: callID = 24, confID = -1, streamType = TDM, streamDir = OUTPUT, ownerContext = 0x0000000C, codec = 0x0, fax_modem_type =0, XmitFn = 0x00000000, multicastStreamDtmfType = 0 *May 22 04:12:17.779: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpAddStream: streamID = 3 *May 22 04:12:17.779: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpReserveGwResource: sIdLegInput1 = 2, sIdLegOutput1 = 3, requesterCallID = 24, respFunc = 0x61CD1EE0 *May 22 04:12:17.787: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_new_or_existing_gw_session: created a new session = 0x657EEE20 *May 22 04:12:17.787: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_enlist_stream: Stream 2 is enlisted, total = 1 *May 22 04:12:17.787: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_enlist_stream: Stream 3 is enlisted, total = 2 *May 22 04:12:17.787: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_exec: [state:S_DSMP_INITIAL, event:E_DSMP_CC_RESERVE_RESOURCE_REQ] *May 22 04:12:17.791: CNFSM: cur_container:rsc_main_container, cur_state:S_DSMP_INITIAL, event:E_DSMP_CC_RESERVE_RESOURCE_REQ *May 22 04:12:17.791: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_gw_act_alloc_rsc: *May 22 04:12:17.791: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_decide_pgm_based_stm: *May 22 04:12:17.791: //-1/F401BFC88006/DSMP:():-1/dsmp_set_state_var: Message to DSP is successful *May 22 04:12:17.791: CNFSM: new_container:rsc_allocating_container *May 22 04:12:17.791: CNFSM: next_state:S_DSMP_RSC_ALLOCATING *May 22 04:12:17.791: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_rsc_alloc_succ: *May 22 04:12:17.791: CNFSM: next_state:S_DSMP_RSC_ALLOCATED *May 22 04:12:18.047: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpReserveGwResource: sIdLegInput1 = 2, sIdLegOutput1 = 3, requesterCallID = 24, respFunc = 0x61CD1EE0 *May 22 04:12:18.047: //-1/F401BFC88006/DSMP:():-1/dsmp_exec: [state:S_DSMP_RSC_ALLOCATED, event:E_DSMP_CC_RESERVE_RESOURCE_REQ] *May 22 04:12:18.051: CNFSM: cur_container:rsc_allocating_container, cur_state:S_DSMP_RSC_ALLOCATED, event:E_DSMP_CC_RESERVE_RESOURCE_REQ *May 22 04:12:18.051: CNFSM: new_container:rsc_main_container *May 22 04:12:18.051: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_rsc_reopen: *May 22 04:12:18.051: //-1/F401BFC88006/DSMP:():-1/dsmp_set_state_var: Message to DSP is successful *May 22 04:12:18.051: CNFSM: history stored state: S_DSMP_RSC_ALLOCATED, container: rsc_allocating_container *May 22 04:12:18.051: CNFSM: updated current container: rsc_main_container *May 22 04:12:18.051: CNFSM: next_state:S_DSMP_RSC_REOPENING *May 22 04:12:18.051: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_rsc_alloc_succ: *May 22 04:12:18.051: CNFSM: restoring history state: S_DSMP_RSC_ALLOCATED *May 22 04:12:18.055: CNFSM: restoring history container: rsc_allocating_container *May 22 04:12:18.055: CNFSM: new_container:rsc_allocating_container *May 22 04:12:18.055: CNFSM: next_state:S_DSMP_RSC_ALLOCATED *May 22 04:12:18.055: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpStopPlay: sIdLegOutput = 3 *May 22 04:12:18.059: //-1/F401BFC88006/DSMP:():-1/dsmp_exec: [state:S_DSMP_RSC_ALLOCATED, event:E_DSMP_CC_STOP_PLAY_REQ] *May 22 04:12:18.059: CNFSM: cur_container:rsc_allocating_container, cur_state:S_DSMP_RSC_ALLOCATED, event:E_DSMP_CC_STOP_PLAY_REQ *May 22 04:12:18.059: CNFSM: new_container:rsc_main_container *May 22 04:12:18.059: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_ignore: *May 22 04:12:18.059: CNFSM: next_state:CNFSM_NO_STATE_CHANGE *May 22 04:12:18.063: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpAddStream: callID = 23, confID = 12, streamType = PACKET, streamDir = INPUT, ownerContext = 0x0000000C, codec = 0x1, fax_modem_type =0, XmitFn = 0x6158E1F8, multicastStreamDtmfType = -1 *May 22 04:12:18.067: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpAddStream: streamID = 1 *May 22 04:12:18.067: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpAddStream: callID = 23, confID = 12, streamType = PACKET, streamDir = OUTPUT, ownerContext = 0x0000000C, codec = 0x1, fax_modem_type =0, XmitFn = 0x6158E1F8, multicastStreamDtmfType = -1 *May 22 04:12:18.067: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpAddStream: streamID = 4
DB-2649
*May 22 04:12:18.071: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpUpdateRtpMode: sId = 1, callID = 24, mode = 1 *May 22 04:12:18.071: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpModifyReq: sIdLegInput = 1, sIdLegOutput = 4, callID = 24 *May 22 04:12:18.075: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpConnectGwBinderReq: sIdLegInputTdm1=2, sIdLegOutputPak1=4, sIdLegInputPak2=1, sIdLegOutputTdm2=3, Call Id=24 *May 22 04:12:18.075: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpModifyReq: sIdLegInput = 2, sIdLegOutput = 3, callID = 24FORKING Parameters are forking mask: 7, simple_forking_codec_mask: 327679, complex_forking_codec_mask 327679 *May 22 04:12:18.075: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_process_event: No session is associated to the streams. *May 22 04:12:18.075: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_save_modify_caps: *May 22 04:12:18.079: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_save_modify_packet_stream_caps: *May 22 04:12:18.079: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write: *May 22 04:12:18.079: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write: CALL_ERROR; DSMP Session Is NULL *May 22 04:12:18.079: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write:exit@2908 *May 22 04:12:18.079: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write: *May 22 04:12:18.079: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write: CALL_ERROR; DSMP Session Is NULL *May 22 04:12:18.079: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write:exit@2908 *May 22 04:12:18.079: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write: *May 22 04:12:18.079: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write: CALL_ERROR; DSMP Session Is NULL *May 22 04:12:18.079: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write:exit@2908 *May 22 04:12:18.083: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write: *May 22 04:12:18.083: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write: CALL_ERROR; DSMP Session Is NULL *May 22 04:12:18.083: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write:exit@2908 *May 22 04:12:18.083: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_save_modify_packet_stream_caps: *May 22 04:12:18.083: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_save_modify_tdm_stream_caps: *May 22 04:12:18.083: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_save_modify_tdm_stream_caps:exit@385 *May 22 04:12:18.087: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_save_modify_tdm_stream_caps: *May 22 04:12:18.087: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_save_modify_tdm_stream_caps:exit@385 *May 22 04:12:18.087: //-1/F401BFC88006/DSMP:():-1/dsmp_enlist_stream: Stream 1 is enlisted, total = 3 *May 22 04:12:18.087: //-1/F401BFC88006/DSMP:():-1/dsmp_enlist_stream: Stream 4 is enlisted, total = 4 *May 22 04:12:18.087: //-1/F401BFC88006/DSMP:():-1/dsmp_exec: [state:S_DSMP_RSC_ALLOCATED, event:E_DSMP_CC_CONNECT_REQ] *May 22 04:12:18.091: CNFSM: cur_container:rsc_allocating_container, cur_state:S_DSMP_RSC_ALLOCATED, event:E_DSMP_CC_CONNECT_REQ *May 22 04:12:18.091: //-1/F401BFC88006/DSMP:():-1/dsmp_is_req_not_in_proc_dsp_ready: *May 22 04:12:18.091: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_rsc_init: *May 22 04:12:18.091: //-1/F401BFC88006/DSMP:():-1/dsmp_set_state_var: Message to DSP is successful *May 22 04:12:18.091: CNFSM: history stored state: S_DSMP_RSC_ALLOCATED, container: rsc_allocating_container *May 22 04:12:18.091: CNFSM: new_container:rsc_main_container *May 22 04:12:18.095: CNFSM: next_state:S_DSMP_RSC_INITING *May 22 04:12:18.095: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_decide_pgm_based_stm: *May 22 04:12:18.095: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_rsc_init_succ: pgm_base_stm_id = 1, service_id = 26, codec =4 *May 22 04:12:18.095: //-1/F401BFC88006/DSMP:():-1/dsmp_set_state_var: Message to DSP is successful *May 22 04:12:18.099: CNFSM: next_state:S_DSMP_RSC_OPENING *May 22 04:12:18.099: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_rsc_open_succ: *May 22 04:12:18.099: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write: *May 22 04:12:18.099: //-1/F401BFC88006/DSMP:():-1/dsmp_conf_static_params: *May 22 04:12:18.099: //-1/F401BFC88006/DSMP:():-1/dsmp_conf_static_params: servic_type=1 base stream=1 tdm_caps=0x6557E454 pkt_caps=0x6557EC3C
DB-2650
December 2010
*May 22 04:12:18.099: //-1/F401BFC88006/DSMP:():-1/dsmp_conf_static_params: *May 22 04:12:18.103: ip_tones = 0, pstn_tones = 0 *May 22 04:12:18.103: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_conf_static_params: voice detection disabled *May 22 04:12:18.103: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_conf_static_params: silence detection disabled *May 22 04:12:18.103: //-1/F401BFC88006/DSMP:():-1/dsmp_set_state_var: Message to DSP is successful *May 22 04:12:18.107: CNFSM: next_state:S_DSMP_RSC_STATIC_CONF *May 22 04:12:18.107: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_start_service: *May 22 04:12:18.107: //-1/F401BFC88006/DSMP:():-1/dsmp_set_state_var: Message to DSP is successful *May 22 04:12:18.107: CNFSM: next_state:S_DSMP_RSC_STARTING *May 22 04:12:18.107: //-1/F401BFC88006/DSMP:():-1/dsmp_act_rsc_start_succ: *May 22 04:12:18.107: //-1/F401BFC88006/DSMP:():-1/dsmp_conf_dynamic_params: *May 22 04:12:18.111: //-1/F401BFC88006/DSMP:():-1/dsmp_conf_dynamic_params: servic_type=1 base stream=1 *May 22 04:12:18.111: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write: *May 22 04:12:18.111: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write: *May 22 04:12:18.111: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_leg_voice_elog_write: *May 22 04:12:18.111: //-1/F401BFC88006/DSMP:():-1/dsmp_conf_detector_params: *May 22 04:12:18.115: //-1/F401BFC88006/DSMP:():-1/dsmp_set_state_var: Message to DSP is successful *May 22 04:12:18.115: CNFSM: next_state:S_DSMP_RSC_DYNAMIC_CONF *May 22 04:12:18.115: CNFSM: new_container:rsc_running_container *May 22 04:12:18.115: CNFSM: next_state:S_DSMP_MCAST_CHECK *May 22 04:12:18.115: //-1/F401BFC88006/DSMP:():-1/dsmp_is_mcast: *May 22 04:12:18.119: //-1/F401BFC88006/DSMP:():-1/dsmp_is_mcast:exit@1487 *May 22 04:12:18.119: //-1/F401BFC88006/DSMP:():-1/dsmp_is_not_mcast: *May 22 04:12:18.119: //-1/F401BFC88006/DSMP:():-1/dsmp_is_mcast: *May 22 04:12:18.119: //-1/F401BFC88006/DSMP:():-1/dsmp_is_mcast:exit@1487 *May 22 04:12:18.119: //-1/F401BFC88006/DSMP:():-1/dsmp_is_not_mcast:exit@1500 *May 22 04:12:18.119: CNFSM: next_state:S_DSMP_DTMF_FSK_MODE_CHECK *May 22 04:12:18.119: //-1/F401BFC88006/DSMP:():-1/dsmp_is_fsk_or_dtmf: *May 22 04:12:18.123: //-1/F401BFC88006/DSMP:():-1/dsmp_is_diagnostic: *May 22 04:12:18.123: //-1/F401BFC88006/DSMP:():-1/dsmp_is_diagnostic:exit@1587 *May 22 04:12:18.123: //-1/F401BFC88006/DSMP:():-1/dsmp_is_not_dtmf_fsk: *May 22 04:12:18.123: //-1/F401BFC88006/DSMP:():-1/dsmp_is_fsk_or_dtmf: *May 22 04:12:18.123: //-1/F401BFC88006/DSMP:():-1/dsmp_is_diagnostic: *May 22 04:12:18.123: //-1/F401BFC88006/DSMP:():-1/dsmp_is_diagnostic:exit@1587 *May 22 04:12:18.123: //-1/F401BFC88006/DSMP:():-1/dsmp_is_not_dtmf_fsk:exit@1600 *May 22 04:12:18.127: CNFSM: next_state:S_DSMP_NOT_DTMF_FSK *May 22 04:12:18.127: //-1/F401BFC88006/DSMP:():-1/dsmp_is_simple_voice: *May 22 04:12:18.127: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_get_stm_service_type: *May 22 04:12:18.127: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_simple_voice_start: *May 22 04:12:18.127: //-1/F401BFC88006/DSMP:():-1/dsmp_connect_req_done: *May 22 04:12:18.127: //-1/F401BFC88006/DSMP:():-1/dsmp_enlist_connection: Connection is added, enlisted LegIn: 2, enlisted LegOut: 4 *May 22 04:12:18.131: //-1/F401BFC88006/DSMP:():-1/dsmp_enlist_connection: Connection is added, enlisted LegIn: 1, enlisted LegOut: 3 *May 22 04:12:18.131: CNFSM: new_container:simple_voice_container *May 22 04:12:18.131: CNFSM: next_state:S_DSMP_VC_RUNNING *May 22 04:12:18.131: //-1/F401BFC88006/DSMP:():-1/dsmp_exec: [state:S_DSMP_VC_RUNNING, event:E_DSMP_CC_MODIFY_REQ] *May 22 04:12:18.135: CNFSM: cur_container:simple_voice_container, cur_state:S_DSMP_VC_RUNNING, event:E_DSMP_CC_MODIFY_REQ *May 22 04:12:18.135: CNFSM: new_container:rsc_running_container *May 22 04:12:18.135: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_save_modify_caps: *May 22 04:12:18.135: //-1/F401BFC88006/DSMP:():-1/dsmp_save_modify_caps: *May 22 04:12:18.135: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_save_modify_packet_stream_caps: *May 22 04:12:18.139: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_save_modify_packet_stream_caps: *May 22 04:12:18.139: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_save_modify_tdm_stream_caps: *May 22 04:12:18.139: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_save_modify_tdm_stream_caps: *May 22 04:12:18.139: //-1/F401BFC88006/DSMP:():-1/dsmp_save_stream_detectors:
DB-2651
*May 22 04:12:18.139: CNFSM: history stored state: S_DSMP_VC_RUNNING, container: simple_voice_container *May 22 04:12:18.139: CNFSM: updated current container: rsc_running_container *May 22 04:12:18.143: CNFSM: next_state:S_DSMP_MODIFY_CAPS_SAVED *May 22 04:12:18.143: //-1/F401BFC88006/DSMP:():-1/dsmp_is_modify_to_modem_passthru: *May 22 04:12:18.143: //-1/F401BFC88006/DSMP:():-1/dsmp_is_static_params_changed: *May 22 04:12:18.143: //-1/F401BFC88006/DSMP:():-1/dsmp_is_modify_to_modem_passthru: *May 22 04:12:18.143: //-1/F401BFC88006/DSMP:():-1/dsmp_is_dynamic_params_changed: *May 22 04:12:18.143: //-1/F401BFC88006/DSMP:():-1/dsmp_is_modify_to_modem_passthru: *May 22 04:12:18.143: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_dynamic_params_changed: *May 22 04:12:18.147: //-1/F401BFC88006/DSMP:():-1/dsmp_conf_dynamic_params: *May 22 04:12:18.147: //-1/F401BFC88006/DSMP:():-1/dsmp_conf_dynamic_params: servic_type=1 base stream=1 *May 22 04:12:18.147: //-1/F401BFC88006/DSMP:():-1/dsmp_conf_detector_params: *May 22 04:12:18.147: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_conf_detector_params: fax: 1 *May 22 04:12:18.147: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmp_conf_detector_params: modem: 1 *May 22 04:12:18.151: CNFSM: restoring history state: S_DSMP_VC_RUNNING *May 22 04:12:18.151: CNFSM: restoring history container: simple_voice_container *May 22 04:12:18.151: CNFSM: new_container:simple_voice_container *May 22 04:12:18.151: CNFSM: next_state:S_DSMP_VC_RUNNING *May 22 04:12:18.163: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpUpdateRtpMode: sId = 1, callID = 24, mode = 3 *May 22 04:12:18.163: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpUpdateRtpMode: sId = 1, callID = 24, mode = 3 *May 22 04:12:30.947: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpUpdateRtpMode: sId = 1, callID = 24, mode = 3
The following is sample output from the debug voip dsmp command, with Cisco IOS Release 12.3(14)T software, when a VoIP call is in transition from connected to the disconnected state:
Router# debug voip dsmp *May 22 04:12:30.951: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpDisconnectGwBinder: sIdLegInputTdm1 = 2, sIdLegOutputPak1 = 4, sIdLegInputPak2 = 1, sIdLegOutputTdm2 = 3 requesterCallID = 24 *May 22 04:12:30.951: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpDeleteStream: streamID = 1, callID = 23, ownerContext = 0x00000000 *May 22 04:12:30.951: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpDeleteStream: streamID = 4, callID = 23, ownerContext = 0x00000000 *May 22 04:12:30.951: //-1/F401BFC88006/DSMP:():-1/dsmp_exec: [state:S_DSMP_VC_RUNNING, event:E_DSMP_CC_DISCONNECT] *May 22 04:12:30.955: CNFSM: cur_container:simple_voice_container, cur_state:S_DSMP_VC_RUNNING, event:E_DSMP_CC_DISCONNECT *May 22 04:12:30.955: CNFSM: new_container:rsc_running_container *May 22 04:12:30.955: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_cc_disconnect: *May 22 04:12:30.955: //-1/F401BFC88006/DSMP:():-1/dsmp_delist_connection: Connection is delisted, delisted LegIn: 2, delisted LegOut: 4, total conn_count is = 1 *May 22 04:12:30.955: //-1/F401BFC88006/DSMP:():-1/dsmp_delist_connection: Connection is delisted, delisted LegIn: 1, delisted LegOut: 3, total conn_count is = 0 *May 22 04:12:30.955: CNFSM: next_state:CNFSM_NO_STATE_CHANGE *May 22 04:12:30.955: //-1/F401BFC88006/DSMP:():-1/dsmp_exec: [state:S_DSMP_VC_RUNNING, event:E_DSMP_DELETE_STREAM] *May 22 04:12:30.959: CNFSM: cur_container:simple_voice_container, cur_state:S_DSMP_VC_RUNNING, event:E_DSMP_DELETE_STREAM *May 22 04:12:30.959: CNFSM: new_container:rsc_running_container *May 22 04:12:30.959: CNFSM: new_container:rsc_main_container *May 22 04:12:30.959: //-1/F401BFC88006/DSMP:():-1/dsmp_not_last_stream: *May 22 04:12:30.959: //-1/F401BFC88006/DSMP:():-1/dsmp_is_last_stream: *May 22 04:12:30.959: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_not_last_stream: *May 22 04:12:30.959: //-1/F401BFC88006/DSMP:():-1/remove_stream_from_DB: *May 22 04:12:30.959: //-1/F401BFC88006/DSMP:():-1/process_software_multicast_streams: *May 22 04:12:30.959: CNFSM: next_state:CNFSM_NO_STATE_CHANGE *May 22 04:12:30.959: //-1/F401BFC88006/DSMP:():-1/dsmp_exec: [state:S_DSMP_VC_RUNNING, event:E_DSMP_DELETE_STREAM]
DB-2652
December 2010
*May 22 04:12:30.959: CNFSM: cur_container:simple_voice_container, cur_state:S_DSMP_VC_RUNNING, event:E_DSMP_DELETE_STREAM *May 22 04:12:30.963: CNFSM: new_container:rsc_running_container *May 22 04:12:30.963: CNFSM: new_container:rsc_main_container *May 22 04:12:30.963: //-1/F401BFC88006/DSMP:():-1/dsmp_not_last_stream: *May 22 04:12:30.963: //-1/F401BFC88006/DSMP:():-1/dsmp_is_last_stream: *May 22 04:12:30.963: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_not_last_stream: *May 22 04:12:30.963: //-1/F401BFC88006/DSMP:():-1/remove_stream_from_DB: *May 22 04:12:30.963: //-1/F401BFC88006/DSMP:():-1/process_software_multicast_streams: *May 22 04:12:30.963: CNFSM: next_state:CNFSM_NO_STATE_CHANGE *May 22 04:12:30.967: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpStopPlay: sIdLegOutput = 3 *May 22 04:12:30.975: //-1/F401BFC88006/DSMP:():-1/dsmp_exec: [state:S_DSMP_VC_RUNNING, event:E_DSMP_CC_STOP_PLAY_REQ] *May 22 04:12:30.975: CNFSM: cur_container:simple_voice_container, cur_state:S_DSMP_VC_RUNNING, event:E_DSMP_CC_STOP_PLAY_REQ *May 22 04:12:30.975: CNFSM: new_container:rsc_running_container *May 22 04:12:30.975: CNFSM: new_container:rsc_main_container *May 22 04:12:30.975: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_ignore: *May 22 04:12:30.975: CNFSM: next_state:CNFSM_NO_STATE_CHANGE *May 22 04:12:31.011: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpStopPlay: sIdLegOutput = 3 *May 22 04:12:31.011: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpDeleteStream: streamID = 2, callID = 24, ownerContext = 0x0000000C *May 22 04:12:31.011: //-1/xxxxxxxxxxxx/DSMP:():-1/dsmpDeleteStream: streamID = 3, callID = 24, ownerContext = 0x0000000C *May 22 04:12:31.015: //-1/F401BFC88006/DSMP:():-1/dsmp_exec: [state:S_DSMP_VC_RUNNING, event:E_DSMP_CC_STOP_PLAY_REQ] *May 22 04:12:31.015: CNFSM: cur_container:simple_voice_container, cur_state:S_DSMP_VC_RUNNING, event:E_DSMP_CC_STOP_PLAY_REQ *May 22 04:12:31.015: CNFSM: new_container:rsc_running_container *May 22 04:12:31.015: CNFSM: new_container:rsc_main_container *May 22 04:12:31.015: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_ignore: *May 22 04:12:31.015: CNFSM: next_state:CNFSM_NO_STATE_CHANGE *May 22 04:12:31.015: //-1/F401BFC88006/DSMP:():-1/dsmp_exec: [state:S_DSMP_VC_RUNNING, event:E_DSMP_DELETE_STREAM] *May 22 04:12:31.015: CNFSM: cur_container:simple_voice_container, cur_state:S_DSMP_VC_RUNNING, event:E_DSMP_DELETE_STREAM *May 22 04:12:31.019: CNFSM: new_container:rsc_running_container *May 22 04:12:31.019: CNFSM: new_container:rsc_main_container *May 22 04:12:31.019: //-1/F401BFC88006/DSMP:():-1/dsmp_not_last_stream: *May 22 04:12:31.019: //-1/F401BFC88006/DSMP:():-1/dsmp_is_last_stream: *May 22 04:12:31.019: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_not_last_stream: *May 22 04:12:31.019: //-1/F401BFC88006/DSMP:():-1/remove_stream_from_DB: *May 22 04:12:31.019: //-1/F401BFC88006/DSMP:():-1/process_software_multicast_streams: *May 22 04:12:31.019: CNFSM: next_state:CNFSM_NO_STATE_CHANGE *May 22 04:12:31.019: //-1/F401BFC88006/DSMP:():-1/dsmp_exec: [state:S_DSMP_VC_RUNNING, event:E_DSMP_DELETE_STREAM] *May 22 04:12:31.019: CNFSM: cur_container:simple_voice_container, cur_state:S_DSMP_VC_RUNNING, event:E_DSMP_DELETE_STREAM *May 22 04:12:31.019: CNFSM: new_container:rsc_running_container *May 22 04:12:31.023: CNFSM: new_container:rsc_main_container *May 22 04:12:31.023: //-1/F401BFC88006/DSMP:():-1/dsmp_not_last_stream: *May 22 04:12:31.023: //-1/F401BFC88006/DSMP:():-1/dsmp_is_last_stream: *May 22 04:12:31.023: //-1/F401BFC88006/DSMP:():-1/dsmp_is_last_stream: *May 22 04:12:31.023: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_rsc_stop: *May 22 04:12:31.023: //-1/F401BFC88006/DSMP:():-1/remove_stream_from_DB: *May 22 04:12:31.023: //-1/F401BFC88006/DSMP:():-1/process_software_multicast_streams: *May 22 04:12:31.023: //-1/F401BFC88006/DSMP:():-1/dsmp_set_state_var: Message to DSP is successful *May 22 04:12:31.023: CNFSM: history stored state: S_DSMP_VC_RUNNING, container: simple_voice_container *May 22 04:12:31.023: CNFSM: updated current container: rsc_main_container *May 22 04:12:31.027: CNFSM: new_container:rsc_closing_container *May 22 04:12:31.027: CNFSM: next_state:S_DSMP_RSC_STOPPING *May 22 04:12:31.027: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_rsc_stopping_close:
DB-2653
*May 22 04:12:31.027: //-1/F401BFC88006/DSMP:():-1/dsmp_set_state_var: Message to DSP is successful *May 22 04:12:31.027: CNFSM: next_state:S_DSMP_DSPMGR_CLOSING *May 22 04:12:31.027: //-1/F401BFC88006/DSMP:():-1/dsmp_exec: [state:S_DSMP_DSPMGR_CLOSING, event:E_DSMP_DSPRM_CLOSE_COMPLETE] *May 22 04:12:31.027: CNFSM: cur_container:rsc_closing_container, cur_state:S_DSMP_DSPMGR_CLOSING, event:E_DSMP_DSPRM_CLOSE_COMPLETE *May 22 04:12:31.027: //-1/F401BFC88006/DSMP:():-1/dsmp_gw_act_dspmgr_closing_complete: *May 22 04:12:31.031: //-1/F401BFC88006/DSMP:():-1/remove_stream_from_DB: *May 22 04:12:31.031: //-1/F401BFC88006/DSMP:():-1/process_software_multicast_streams: *May 22 04:12:31.031: //-1/F401BFC88006/DSMP:():-1/remove_stream_from_DB: *May 22 04:12:31.031: //-1/F401BFC88006/DSMP:():-1/process_software_multicast_streams: *May 22 04:12:31.031: CNFSM: next_state:CNFSM_NULL_STATE *May 22 04:12:31.031: //-1/F401BFC88006/DSMP:():-1/dsmp_free_session:
Related Commands
Description Displays debugging information from the DSM subsystem. Displays information about the VTSP.
DB-2654
December 2010
Syntax Description
(Optional) Displays all DSP API debugging messages. (Optional) Displays DSP API commands. (Optional) Displays DSP API detail, error, and inout debugging messages. This option also runs if no keywords are added. (Optional) Displays detailed information about commands sent to the DSP. This command is used in conjunction with other debug voip dspapi commands to show additional details when you use the command, notification, and response keywords. (Optional) Displays DSP API errors. (Optional) Displays call processing errors. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software processing errors. (Optional) Displays DSP API functions. (Optional) Displays output for the command, notification, and response keywords. (Optional) Displays DSP API notification messages. (Optional) Displays DSP API response messages.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command replaces the debug dspapi command. T.38 fax relay call statistics were made available to Call Detail Records (CDRs) through Vendor-Specific Attributes (VSAs) and added to the call log. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
DB-2655
Usage Guidelines
DSP API message events used to communicate with DSPs are intended for use with Connexant (NextPort) and Texas Instruments (54x) DSPs.
Caution
This command severely impacts performance and should be used only for single-call debug capture.
Examples
The following examples show output for variations of the debug voip dspapi command:
debug voip dspapi Command on the Originating Gateway, page 2656 debug voip dspapi inout on the Terminating Gateway, page 2657 debug voip dspapi Command Displaying T.38 fax Relay Statistics on the Terminating Gateway, page 2659
FXS
PSTN
The following lines show encapsulation settings, jitter, inband signaling, echo cancellation, gain, and other quality of service (QoS) settings:
[0] ENCAP RTP: Tx SSRC=0, Rx SSRC=0, Tx VPXCC=0, Rx VPXCC=0 IFP payload type=122, SID support=1, TSE payload=101, Sequence number start=0 Redundancy=0, ClearChannel payload type=0, Fax payload type=0 Alaw PCM switchover=0, MuLAW PCM switchover=0 DTMF payload type=0, NTE receive payload type=101 Dynamic payload=0, Codec=g711ulaw [1] PO_JITTER: mode=2 initial=60(ms) max=200(ms) min=40(ms) fax_nom=300(ms) [2] INBAND_SIG: mode=0x1 enable [3] ECHO_CANCEL: Flags=0x37, Echo length=64(ms) [4] IDLE_CODE_DET: Enable=0, Code=0x0, Duration=6000(ms) [5] GAIN: Input=0.0(dB), Output=0.0(dB) [6] CNG: 1 [7] INFO_FIELD_SIZE: 160 bytes [8] DIGIT_RELAY: 2 *Apr 18 21:33:48.359: //66/CD89F6A78020/DSPAPI/[2/1:23:66]/dsp_voice_get_capabilities: *Apr 18 21:33:48.359: //66/CD89F6A78020/DSPAPI/[2/1:23:66]/dsp_stop_service: NONE (0) *Apr 18 21:33:48.359: //66/CD89F6A78020/DSPAPI/[2/1:23:66]/dsp_open_service:
DB-2656
December 2010
103302
The following lines show settings for encapsulation, packet suppression, and voice activity detection (VAD):
*Apr 18 21:33:48.359: 3 parameters [0] ENCAP RTP: Tx SSRC=64, Rx SSRC=0, Tx VPXCC=0, Rx VPXCC=0 IFP payload type=122, SID support=19, TSE payload=101, Sequence number start=3238 Redundancy=0, ClearChannel payload type=125, Fax payload type=122 Alaw PCM switchover=8, MuLAW PCM switchover=0 DTMF payload type=121, NTE receive payload type=101 Dynamic payload=0, Codec=g729r8 [1] PAK_SUPPRESS: 0 [2] VAD: Enable=1, Threshold=-38(dBm) . . . *Apr 18 21:33:48.363: //66/CD89F6A78020/DSPAPI/[2/1:23:66]/dsp_start_service: G729IETF (25) *Apr 18 21:33:48.363: //66/CD89F6A78020/DSPAPI/[2/1:23:66]/dsp_voice_config_params: *Apr 18 21:33:48.363: 1 parameter [0] VAD: Enable=1, Threshold=-38(dBm) *Apr 18 21:33:50.867: //66/CD89F6A78020/DSPAPI/[2/1:23:66]/dsp_query_info: Request ID=1, Reset Flag=FALSE Q:PO_Delay PO_Error TX RX . . . *Apr 18 21:34:15.031: //66/CD89F6A78020/DSPAPI/[2/1:23:66]/dsp_query_info: Request ID=5, Reset Flag=TRUE Q:Error *Apr 18 21:34:15.031: //66/CD89F6A78020/DSPAPI/[2/1:23:66]/dsp_query_info: Request ID=5, Reset Flag=TRUE Q:Levels *Apr 18 21:34:15.031: //66/CD89F6A78020/DSPAPI/[2/1:23:66]/dsp_inband_tone_off: *Apr 18 21:34:15.031: //66/CD89F6A78020/DSPAPI/[2/1:23:66]/dsp_stop_service: G729IETF (25) *Apr 18 21:34:15.031: //66/CD89F6A78020/DSPAPI/[2/1:23:66]/dsp_close_service: G729IETF (25)
The following lines show encapsulation settings, jitter, inband signalling, echo cancellation, gain, and other quality of service (QoS) settings:
[0] ENCAP RTP: Tx SSRC=0, Rx SSRC=0, Tx VPXCC=0, Rx VPXCC=0 IFP payload type=122, SID support=1, TSE payload=101, Sequence number start=0 Redundancy=0, ClearChannel payload type=0, Fax payload type=0 Alaw PCM switchover=0, MuLAW PCM switchover=0 DTMF payload type=0, NTE receive payload type=101 Dynamic payload=0, Codec=g711ulaw [1] PO_JITTER: mode=2 initial=60(ms) max=200(ms) min=40(ms) fax_nom=300(ms) [2] INBAND_SIG: mode=0x1 enable [3] ECHO_CANCEL: Flags=0x17, Echo length=8(ms) [4] IDLE_CODE_DET: Enable=0, Code=0x0, Duration=6000(ms) [5] GAIN: Input=0.0(dB), Output=-6550.6(dB) [6] CNG: 1
DB-2657
1 19:59:15.587: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_voice_get_capabilities: 1 19:59:15.587: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_stop_service: NONE (0) *May 1 19:59:15.587: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_open_service: G729IETF (25) *May 1 19:59:15.587: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_voice_config_params: *May 1 19:59:15.587: 3 parameters [0] ENCAP RTP: Tx SSRC=0, Rx SSRC=0, Tx VPXCC=0, Rx VPXCC=0 IFP payload type=122, SID support=19, TSE payload=101, Sequence number start=2977 Redundancy=0, ClearChannel payload type=125, Fax payload type=122 Alaw PCM switchover=8, MuLAW PCM switchover=0 DTMF payload type=121, NTE receive payload type=101 Dynamic payload=0, Codec=g729r8 [1] PAK_SUPPRESS: 0 [2] VAD: Enable=1, Threshold=-38(dBm) *May 1 19:59:15.587: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_idle_service: G729IETF (25) *May 1 19:59:15.587: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_voice_config_params: *May 1 19:59:15.587: 3 parameters [0] INFO_FIELD_SIZE: 20 bytes [1] ENCAP RTP: Tx SSRC=64, Rx SSRC=0, Tx VPXCC=0, Rx VPXCC=0 IFP payload type=122, SID support=19, TSE payload=101, Sequence number start=2977 Redundancy=0, ClearChannel payload type=125, Fax payload type=122 Alaw PCM switchover=8, MuLAW PCM switchover=0 DTMF payload type=121, NTE receive payload type=101 Dynamic payload=0, Codec=g729r8 [2] DIGIT_RELAY: 2 *May 1 19:59:15.587: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_start_service: G729IETF (25) *May 1 19:59:15.587: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_voice_config_params: *May 1 19:59:15.587: 1 parameter [0] VAD: Enable=1, Threshold=-38(dBm) *May 1 19:59:15.591: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_inband_tone_on: Tone ID=1, Direction=2, Num frequencies=2 Frequency(hz): a=440 b=480, Amplitude(dB): a=-16.0 b=-16.0 Cadence1(ms): ON=2000 OFF=4000 Cadence2(ms): ON=0 OFF=0 Cadence3(ms): ON=0 OFF=0 Cadence4(ms): ON=0 OFF=0 Frequency(hz): a2=25667 b2=51816 a3=0 b3=1 a4=24596 b4=52484 ITO option group: 1 *May 1 19:59:17.195: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_inband_tone_off: 01:19:04: %PS-3-MULTFAIL: There is more than one failure with the Power System 1; please resolve problems immediately
The following statistics repeat for each DSP query. The transmit (tx) and receive (rx) statistics show number of packets, comfort noise settings, duration, and packet status.
*May 1 19:59:18.051: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_query_info: Request ID=1, Reset Flag=FALSE Q:PO_Delay PO_Error TX RX *May 1 19:59:18.051: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_tx_stats: Request ID=1, Packets: Voice=113, Signaling=0, ComfortNoise=1 TX duration=2460(ms): Voice=2260(ms), FAX=0(ms) *May 1 19:59:18.051: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_rx_stats: Request ID=1, Packets: Voice=33, Signalling=0, ComfortNoise=1 RX duration=840(ms): Voice=640(ms), FAX=0(ms) Packets: Bad Sequence=0, Bad Protocol=0, Late=0, Early=1 *May 1 19:59:18.051: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_playout_delay_stats: Request ID=1, Current=70(ms), MIN=70(ms), MAX=70(ms) Clock offset=80(ms), Inter arrival jitter=67082420(ms)
DB-2658
December 2010
*May
1 19:59:18.051: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_playout_error_stats: Request ID=1 Concealment: Predictive=0(ms), Interpolative=0(ms), Silence=0(ms) Retro Memory update=0(ms), Buffer overflow=10(ms) Talkspurt endpoint detection errors=0 *May 1 19:59:19.827: //67/2BA0E0758024/DSPAPI/[4/0/0 (67)]/dsp_query_info: Request ID=1, Reset Flag=FALSE Q:PO_Delay PO_Error TX RX . . .
debug voip dspapi Command Displaying T.38 fax Relay Statistics on the Terminating Gateway
DB-2659
May
7 21:32:21.464 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_config_params: 1 parameters May 7 21:32:21.464 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_open_service: FAX_RELAY (27) May 7 21:32:21.464 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_is_call_pending: Call is not PENDING May 7 21:32:21.464 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_set_call_pending: Set PENDING state May 7 21:32:21.504 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_query_link_info: Request ID=0, Group ID=1 May 7 21:32:21.504 UTC: vsm(1/3): np_vsmgr_voice_state_change() - state IDLE May 7 21:32:21.504 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_is_call_pending: Call is PENDING May 7 21:32:21.504 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_reset_call_pending: Reset PENDING state May 7 21:32:21.504 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_call_status: Status=PENDING_SUCCESS May 7 21:32:21.504 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_config_params: 11 parameters May 7 21:32:21.504 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_start_service: FAX_RELAY (27) May 7 21:32:21.504 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_set_call_pending: Set PENDING state May 7 21:32:22.556 UTC: vsm(1/3): np_vsmgr_voice_state_change() - state ACTIVE May 7 21:32:22.556 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_is_call_pending: Call is PENDING May 7 21:32:22.556 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_reset_call_pending: Reset PENDING state May 7 21:32:22.556 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_call_status: Status=PENDING_SUCCESS May 7 21:32:22.564 UTC: FAX_RELAY_LINK_INFO_RSP_NTF: slot 1 port 3 timestamp 76082770 fr-entered (20ms) May 7 21:32:22.564 UTC: chan_id [3/1:D (8)] np_vsmgr_fax_relay_link_info_response: May 7 21:32:29.712 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_relay_t30_decode: T30 msg : 0x4 May 7 21:32:30.436 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_relay_t30_decode: T30 msg : 0x2 May 7 21:32:30.784 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_relay_t30_decode: T30 msg : 0x1 May 7 21:32:33.936 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_relay_t30_decode: T30 msg : 0x42 May 7 21:32:34.280 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_relay_t30_decode: T30 msg : 0x41 May 7 21:32:39.676 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_relay_t30_decode: T30 msg : 0x21 May 7 21:32:39.676 UTC: np_fax_relay_t30_decode : Rx Direction May 7 21:32:39.736 UTC: FARELAY_INIT_HS_MOD : 0x8 May 7 21:33:10.385 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_relay_t30_decode: T30 msg : 0x7D May 7 21:33:13.073 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_relay_t30_decode: T30 msg : 0x31 May 7 21:33:15.217 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_relay_t30_decode: T30 msg : 0x5F May 7 21:33:16.073 UTC: FAX_RELAY_DET_STATUS_CHANGE: slot: 1 port: 3 detector mask 0x2 May 7 21:33:16.073 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_det_status: Status=2, Timestamp=716372818 May 7 21:33:16.073 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_query_info: Request ID=5, Reset Flag=FALSE Q:FaxRelay May 7 21:33:16.097 UTC: FAX_RELAY_DATA_PUMP_STATS(1/3) - valid:0x3FFC1F55 state_code:0x1 level:0x18 phase_jitter:0x0 freq_offset:0x0 eqm:0x7FFE jit_depth:0x38B jit_buf_ov:0x0 tx_paks:0x5A rx_pkts:0x62C inv_pkts:0x0 oos_pkts:0x0 hs_mod:0x8 init_hs_mod:0x8 tx_pgs:0x0 rx_pgs:0x1 ecm:0x1 nsf_country:0x0 nsf_manuf_len:0x20 nsf_manuf:0031B8EE80C48511DD0D0000DDDD0000DDDD000000000000000022ED00B0A400 encap:0x1 pkt_loss_con:0x0
DB-2660
December 2010
May
7 21:33:16.097 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_fax_relay_stats: Request ID=5, MAX jitter depth=907, MAX net RX qdepth=0(na) Jitter buffer overflow=0, Net RX qoverflow=0(na) Packets: TX=90 TX drops=0(na) Packets: RX=1580 RX loss=0(na), RX invalid=0, RX OOSequence=0 HS modulation=8, Pages: TX=0 RX=1 MAX TX In qdepth=0(na), MAX RX Out qdepth=0(na) MAX HS buffer usage=0(na), TX In qoverflow=0(na), RX Out qoverflow=0(na) FAX: State=1, level=24, Phase jitter=0, Frequency offset=0, EQM=32766 Initial HS modulation=8, Fax Direction=2, ECM Enabled=1 NSF Countery Code=0, nsf_manuf_code[32]=0031 Encapsulation Protocol=1, Pkt Loss Conceal=0 May 7 21:33:16.101 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_stop_service: FAX_RELAY (27) May 7 21:33:16.101 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_open_service: G729IETF (26) May 7 21:33:16.101 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_is_call_pending: Call is not PENDING May 7 21:33:16.101 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_set_call_pending: Set PENDING state May 7 21:33:16.985 UTC: FAX_RELAY_LINK_INFO_RSP_NTF: slot 1 port 3 timestamp 76518179 fr-end May 7 21:33:17.001 UTC: vsm(1/3): np_vsmgr_voice_state_change() - state IDLE May 7 21:33:17.001 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_is_call_pending: Call is PENDING May 7 21:33:17.001 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_reset_call_pending: Reset PENDING state May 7 21:33:17.001 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_call_status: Status=PENDING_SUCCESS May 7 21:33:17.001 UTC: //8/D6635DD58005/DSPAPI/[1/0:3]/dsp_voice_config_params: May 7 21:33:17.001 UTC: 4 parameters . . .
Related Commands
DB-2661
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
This command displays event and error information about the file accounting processes for flushing the buffer and writing the call detail records (CDRs) to the file.
Examples
The following example displays output from the debug voip dump-file-acct command:
Router# debug voip dump-file-acct *May 10 06:31:10.187: voice_file_acct_write: *May 10 06:31:10.187: file_acct_write_local: file accounting buffer overflow,dumping to file *May 10 06:31:10.187: voice_file_acct_initiate_dump_to_file: ctx_id=2, url=flash:cdr *May 10 06:31:10.187: voice_file_acct_lock, ctx_id=2, refcnt=2 *May 10 06:31:10.187: create_file_acct_buffer: buffer of 63k created from chunk 0x46B5F474 *May 10 06:31:10.187: file_acct_write_local: message (len=640) written to file_acct: 30080 bytes left *May 10 06:31:10.191: handle_file_acct_dump_request *May 10 06:31:10.191: handle_file_acct_dump_request: pick up dump request (ctx_id=2) *May 10 06:31:10.191: open_file_acct_dump_file: url=flash:cdr_ragdenCME1_05_10_2007_06_30_28.191 < == shows url. *May 10 06:31:10.215: Secondary mode file acct is successful *May 10 06:31:10.215: handle_file_acct_dump_request :to_write is 29748 <== shows how much is written to. *May 10 06:31:10.219: : File accounting,write successful to file *May 10 06:31:10.219: handle_file_acct_dump_request :to_write is 640 *May 10 06:31:10.219: : File accounting,write successful to file *May 10 06:31:10.323: voice_file_acct_unlock, ctx_id=2 refcnt=1
DB-2662
December 2010
Related Commands
Description Displays debugging messages related to generating attributes for file accounting. Enables an accounting method for collecting CDRs. Sets the primary location for storing the CDRs generated for file accounting.
DB-2663
Syntax Description
Turns on debugging for EDDRI events. Turns on debugging for EDDRI timers. Turns on debugging for the prefix database. Turns on debugging all EDDRI activities.
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
There is always a performance penalty when using debug commands. The EDDRI notifies TGREP when an attribute changes on some subsystems. EDDRI interacts with the dial peer subsystem, the trunk group subsystems, call control API (CCAPI) subsystem and the customer relationship management (CRM) subsystem to notify changes in particular attributes. EDDRI is responsible for creating the prefix database.
Examples
The following example shows sample output from the debug voip eddri command:
21:00:53: 21:00:53: 21:00:53: 21:00:53: eddri_interesting_ac_pt: new AC_curr 22 FD_curr -5 SD_curr -5 eddri_interesting_ac_pt: percent trigger diff 4 eddri_interesting_ac_pt: Interesting Point eddri_send_prefix_event_to_clients : reason 0x40 num_prefix 1
With the send prefix event the available circuits value and the triggers for reporting are updated.
21:00:53: eddri_send_prefix_event_to_clients attr 0xFF ev_id 1 qid 0x64209230 reason 0x40 eddri_dequeue_event : dequeue event 21:00:53: eddri_interesting_ac_pt : tc 23 IAC 22 lwm 5 hwm 50 pct_trigger 2 oneMinusW 933
DB-2664
December 2010
eddri_interesting_ac_pt: old AC_curr 23 FD_curr 0 SD_curr 0 eddri_interesting_ac_pt: new AC_curr 22 FD_curr -5 SD_curr -5 eddri_interesting_ac_pt: percent trigger diff 4 eddri_interesting_ac_pt: Interesting Point eddri_send_prefix_event_to_clients : reason 0x40 num_prefix 1
Related Commands
Command debug tgrep error debug tgrep events debug tgrep fsm debug tgrep io debug tgrep messages debug tgrep msgdump debug tgrep timer-event debug tgrep timers debug tgrep tripr show voice eddri prefix
Description Turns on debugging for any errors in functioning. Turns on debugging for main events occurring throughout the subsystem. Turns on debugging for FSM activity. Turns on debugging for detailed socket level activities. Turns on debugging for the movement of TGREP messages. Turns on debugging for the dump of the details of TGREP messages. Turns on debugging for events that are related to the timer. Turns on debugging for timer activity. Turns on debugging for the TRIP Reporter. Shows applicable prefixes for the EDDRI.
DB-2665
Syntax Description
detail summary
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Disable console logging and use buffered logging before using the debug voip enum command. Using the debug voip enum command generates a large volume of debugs, which can affect router performance.
Examples
The following shows sample output from the debug voip enum detail command: The output shows the match number as 5108891234, enum table as 10. Rule 1 in table 10 matched the pattern and after applying the replacement rule, the resulting string is 5108891234. The enum query is sent out for the domain 4.3.2.1.9.8.8.0.1.5.e164.cisco.com. The output then shows the matching Naming Authority Pointer (NAPTR) records obtained in the response. The records are then processed and the final URLs (contact lists) are shown toward the end.
Router# debug voip enum detail enum_resolve_domain:match_num 5108891234 table_indx 10 enum_resolve_domain:rule 1 result string 5108891234 generate_enum_search_string :search string 4.3.2.1.9.8.8.0.1.5.e164.cisco.com enum_dns_query:name = 4.3.2.1.9.8.8.0.1.5.e164.cisco.com type = 35, ns_server = 0 order 100 pref 10 service sip+E2U flag U regexp /^.*$/sip:[email protected]/ replacement order 200 pref 10 service h323+E2U flag U regexp /^.*$/h323:[email protected]/ replacement
DB-2666
December 2010
num_elem = 2 NAPTR Record :order 100 pref 10 service sip+E2U flags U regexp /^.*$/sip:[email protected]/ replacement NAPTR Record :order 200 pref 10 service h323+E2U flags U regexp /^.*$/h323:[email protected]/ replacement decode_naptr_record :re_string ^.*$ decode_naptr_record :re_substitution_string sip:[email protected] decode_naptr_record :re_flags_string U_FLAG case, stopping query new_e164_user sip:[email protected] decode_naptr_record :re_string ^.*$ decode_naptr_re tahoe13#cord :re_substitution_string h323:[email protected] decode_naptr_record :re_flags_string U_FLAG case, stopping query new_e164_user h323:[email protected] contact_list : sip:[email protected] contact_list : h323:[email protected] enum_resolve_domain:contact_list 64558450
A sample output of the debug voip enum summary command is shown below. The output shows the matching number, the enum table used and the rule in the table that matched the number along with the resulting string. Note that this output is a subset of the output from debug voip enum detail command.
Router# debug voip enum summary enum_resolve_domain:match_num 5108891234 table_indx 10 enum_resolve_domain:rule 1 result string 5108891234
Table 363 provides an alphabetical listing of the debug voip enum command fields and a description of each field.
Table 363 debug voip enum Field Descriptions
Field contact_list flag match_num name ns_server num_elem order pref regexp replacement
Description Final list of URLs that the gateway will try to contact as an attempt to place the call. Flag value of a NAPTR record as defined in RFC 2915. Number to be used for matching against the enum match table. Fully qualified domain name sent out to Domain Name System (DNS) server Address of the DNS server. If 0, the DNS server configured on the gateway is used. Number of records received in the response. Order in the record, as defined in RFC 2915. Preference of the record, as defined in RFC 2915. Regular expression of the record, as defined in RFC 2915. Replacement string of the record, as defined in RFC 2915.
DB-2667
Table 363
Field re_flags_string
Description Flag indicating whether matching and replacement should be case sensitive:
re_string re_substitution_string result string rule search string service table_indx type
The first part of the regexp, delimited by /. This is used to match the incoming string. Refer to RFC 2915. The second part of regexp, delimited by /. String that results when match_num is taken through the enum match table for a match. This string will be used to form a FQDN. Rule number that matched match_num in the enum match table. String sent out to the DNS server. Service field of the NAPTR record. Refer to RFC 2915. Index of the enum match table picked for this call. Type of record requested in the query: 35 = NAPTR 33 = DNS Service (SRV)
Related Commands
Command rule (ENUM configuration) show voice enum-match-table test enum voice enum-match-table
Description Defines the rule pattern for an ENUM match table. Displays the ENUM match table rules. Tests the ENUM match table rules. Initiates the ENUM match table definition.
DB-2668
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug voip event-log command:
Router# debug voip event-log voip event-log debugging is on Router# *Jul 18 22:22:45.417: voice_elog_open: ctx_id=1F, size=4, url= *Jul 18 22:22:45.417: lock_elog, ctx_id=1F, refcnt=1 *Jul 18 22:22:45.417: voice_elog_write: *Jul 18 22:22:45.417: elog_write_local: message (len=143) written to elog: 1F:1058566965:584:INFO: Call setup indication received, called = 4085550198, calling = 52927, echo canceller = enable, direct inward dialing 3953 bytes left *Jul 18 22:22:45.417: voice_elog_write: *Jul 18 22:22:45.417: elog_write_local: message (len=38) written to elog: 1F:1058566965:585:INFO: Dialpeer = 1 3915 bytes left *Jul 18 22:22:45.421: voice_elog_open: ctx_id=B, size=4, url= *Jul 18 22:22:45.421: lock_elog, ctx_id=B, refcnt=1 *Jul 18 22:22:45.421: voice_elog_write: *Jul 18 22:22:45.421: elog_write_local: message (len=114) written to elog: B:1058566965:586:INFO: Session started for App-type = generic, URL = tftp://demo/scripts/master/generic.vxml 3982 bytes left *Jul 18 22:22:45.421: voice_elog_write: *Jul 18 22:22:45.421: elog_write_local: message (len=69) written to elog: B:1058566965:587:INFO: Incoming Telephony call received, LegID = 1F 3913 bytes left *Jul 18 22:22:45.421: voice_elog_write: *Jul 18 22:22:45.421: elog_write_local: message (len=89) written to elog: B:1058566965:588:INFO: LegID = 1F: Calling = 4085550198, called = 52927, dial peer = 1 3824 bytes left *Jul 18 22:22:45.421: voice_elog_write: *Jul 18 22:22:45.421: elog_write_local: message (len=66) written to elog: B:1058566965:589:INFO: LegID = 1F: Leg State = LEG_INCCONNECTED 3758 bytes left *Jul 18 22:22:45.433: voice_elog_write: *Jul 18 22:22:45.437: elog_write_local: message (len=42) written to elog:
DB-2669
1F:1058566965:590:INFO: Digit collection 3873 bytes left *Jul 18 22:22:45.437: voice_elog_write: *Jul 18 22:22:45.437: elog_write_local: message (len=57) written to elog: 1F:1058566965:591:INFO: Call connected using codec None 3816 bytes left *Jul 18 22:22:45.437: voice_elog_write: *Jul 18 22:22:45.437: elog_write_local: message (len=85) written to elog: B:1058566965:592:INFO: Playing prompt #1: tftp://172.19.139.245/audio/ch_welcome.au 3673 bytes left Router# *Jul 18 22:22:55.942: voice_elog_write: *Jul 18 22:22:55.942: elog_write_local: message (len=51) written to elog: B:1058566975:593:ERR : Prompt play setup failure. 3622 bytes left *Jul 18 22:22:55.942: voice_elog_write: *Jul 18 22:22:55.942: elog_write_local: message (len=65) written to elog: B:1058566975:594:INFO: Script received event = "error.badfetch" 3557 bytes left *Jul 18 22:22:56.918: voice_elog_write: *Jul 18 22:22:56.918: elog_write_local: message (len=98) written to elog: 1F:1058 Router# 566976:595:INFO: Inform application call disconnected (cause = normal call clearing (16)) 3718 bytes left *Jul 18 22:22:56.918: voice_elog_write: *Jul 18 22:22:56.918: elog_write_local: message (len=78) written to elog: B:1058566976:596:INFO: Script received event = "telephone.disconnect.hangup" 3479 bytes left *Jul 18 22:22:56.922: voice_elog_write: *Jul 18 22:22:56.922: elog_write_local: message (len=89) written to elog: B:1058566976:597:INFO: LegID = 1F: Call disconnected, cause = normal call clearing (16) 3390 bytes left *Jul 18 22:22:56.922: voice_elog_write: *Jul 18 22:22:56.922: elog_write_local: message (len=79) written to elog: 1F:1058566976:598:INFO: Call disconnected (cause = normal call clearing (16)) 3639 bytes left *Jul 18 22:22:56.930: voice_elog_write: *Jul 18 22:22:56.930: elog_write_local: message (len=39) written to elog: 1F:1058566976:599:INFO: Call released 3600 bytes left *Jul 18 22:22:56.930: voice_elog_close, ctx_id=1F voice_elog_close, ctx_id=19 *Jul 18 22:22:56.930: unlock_elog, ctx_id=19, refcnt=0 *Jul 18 22:22:56.930: delete_elog, ctx_id=19 *Jul 18 22:22:56.930: voice_elog_write: *Jul 18 22:22:56.930: elog_write_local: message (len=59) written to elog: B:1058566976:600:INFO: Session done, terminating cause = 3331 bytes left *Jul 18 22:22:56.930: voice_elog_close, ctx_id=B
Related Commands
Description Enables event logging for voice application instances. Enables debugging of the AIS database.
DB-2670
December 2010
Syntax Description
invalidate slot/port
(Optional) Turns on debugging for VoIP fastpath cache invalidation. (Optional) Slot and port to be debugged. Slash mark is required.
Command Default
Command Modes
Command History
Release 12.4(21)
Modification This command was introduced on the Cisco AS5400XM and AS5350XM.
Usage Guidelines
The debug voip fastpath command displays the details on every packet that is being switched via fastpath. The debug voip fastpath invalidate command displays the details of cache invalidation and cache update. The debug voip fastpath command and its options are interchangeable with the debug voice fastpath command. VoIP fastpath is enabled by default. In order to disable it, issue the no voip-fastpath enable command in global configuration mode. When VoIP fastpath is enabled, the IP address and User Datagram Protocol (UDP) port number information for the logical channel that is opened for a specific call are cached. VoIP fastpath prevents the RTP stream from reaching the application layer. Instead, the packets are forwarded at a lower layer to help reduce CPU utilization in high call-volume scenarios. When supplementary services such as hold or transfer are used, VoIP fastpath causes the router to stream the audio to the cached IP address and UDP port. The new logical channel information (generated after a call on hold is resumed or after a transfer is completed) is disregarded. Traffic must go to the application layer constantly so that redefinition of the logical channel is taken into account and audio is streamed to the new IP address and UDP port pair. Therefore, be sure to disable VoIP fastpath in order to support supplementary services.
Note
The debug voip fastpath command should be enabled only when there is light traffic on the gateway. Enabling this command can affect the functionality of the gateway.
DB-2671
Examples
The following example shows how to turn on VoIP fastpath debugging, shows how to use the show debug command to display what debugging functions are enabled, and provides sample output for the debugging function:
Router# debug voip fastpath Fastpath related debugging is on Router# show debug fastpath: Fastpath related debugging is on Router# *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 08:22:35.971: NP VPD(2/01): pak sent via fastpath,part=0x652DEE80 ret=0x000003 08:22:35.987: NP VPD(2/01): pak sent via fastpath,part=0x652DEEC0 ret=0x000003 08:22:36.011: NP VPD(2/01): pak sent via fastpath,part=0x652DEF00 ret=0x000003 08:22:36.031: NP VPD(2/01): pak sent via fastpath,part=0x652DEF40 ret=0x000003 08:22:36.051: NP VPD(2/01): pak sent via fastpath,part=0x652DEF80 ret=0x000003 08:22:36.071: NP VPD(2/01): pak sent via fastpath,part=0x652DEFC0 ret=0x000003 08:22:36.095: NP VPD(2/01): pak sent via fastpath,part=0x652DF000 ret=0x000003 08:22:36.111: NP VPD(2/01): pak sent via fastpath,part=0x652DF040 ret=0x000003 08:22:36.131: NP VPD(2/01): pak sent via fastpath,part=0x652DF080 ret=0x000003 08:22:36.151: NP VPD(2/01): pak sent via fastpath,part=0x652DF0C0 ret=0x000003 08:22:36.171: NP VPD(2/01): pak sent via fastpath,part=0x652DF100 ret=0x000003 08:22:36.195: NP VPD(2/01): pak sent via fastpath,part=0x652DF140 ret=0x000003 08:22:36.207: NP VPD(2/01): pak sent via fastpath,part=0x652DF180 ret=0x000003 08:22:36.231: NP VPD(2/01): pak sent via fastpath,part=0x652DF1C0 ret=0x000003 08:22:36.251: NP VPD(2/01): pak sent via fastpath,part=0x652DF200 ret=0x000003 08:22:36.271: NP VPD(2/01): pak sent via fastpath,part=0x652DF240 ret=0x000003 08:22:36.291: NP VPD(2/01): pak sent via fastpath,part=0x652DF280 ret=0x000003 08:22:36.315: NP VPD(2/01): pak sent via fastpath,part=0x652DF2C0 ret=0x000003 08:22:36.331: NP VPD(2/01): pak sent via fastpath,part=0x652DF300 ret=0x000003 08:22:36.351: NP VPD(2/01): pak sent via fastpath,part=0x652DF340 ret=0x000003 08:22:36.371: NP VPD(2/01): pak sent via fastpath,part=0x652DF380 ret=0x000003 08:22:36.391: NP VPD(2/01): pak sent via fastpath,part=0x652DF3C0 ret=0x000003
The following example shows how to use the debug voip fastpath slot/port command to debug slot 2, port 13 on the router:
DB-2672
December 2010
Router# debug voip fastpath 2/013 Fastpath related debugging is on *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 *Nov 14 len=32 08:28:00.623: NP VPD(2/13): pak sent via fastpath,part=0x652DFFC0 ret=0x000003 08:28:00.643: NP VPD(2/13): pak sent via fastpath,part=0x652E0000 ret=0x000003 08:28:00.659: NP VPD(2/13): pak sent via fastpath,part=0x652E0080 ret=0x000003 08:28:00.831: NP VPD(2/13): pak sent via fastpath,part=0x652E0280 ret=0x000003 08:28:00.855: NP VPD(2/13): pak sent via fastpath,part=0x652E0300 ret=0x000003 08:28:00.867: NP VPD(2/13): pak sent via fastpath,part=0x652E0380 ret=0x000003 08:28:01.031: NP VPD(2/13): pak sent via fastpath,part=0x652E0540 ret=0x000003 08:28:01.051: NP VPD(2/13): pak sent via fastpath,part=0x652E0580 ret=0x000003 08:28:01.075: NP VPD(2/13): pak sent via fastpath,part=0x652E0640 ret=0x000003 08:28:01.231: NP VPD(2/13): pak sent via fastpath,part=0x652E0840 ret=0x000003 08:28:01.251: NP VPD(2/13): pak sent via fastpath,part=0x652E07C0 ret=0x000003 08:28:01.271: NP VPD(2/13): pak sent via fastpath,part=0x652E0900 ret=0x000003 08:28:01.439: NP VPD(2/13): pak sent via fastpath,part=0x652E0AC0 ret=0x000003 08:28:01.463: NP VPD(2/13): pak sent via fastpath,part=0x652E0B40 ret=0x000003 08:28:01.483: NP VPD(2/13): pak sent via fastpath,part=0x652E0BC0 ret=0x000003
The following example shows how to enable debugging for fastpath cache invalidation on slot 2, port 17, and shows how to display sample output for the debugging function:
Router# debug voip fastpath invalidate 2/17 Fastpath cache invalidation related Router# show voip call summary PORT CODEC VAD VTSP STATE VPM STATE ============== ======== === ==================== ====================== 6/4:0.20 g729r8 y S_CONNECT CSM_OC6_CONNECTED 6/4:0.21 g729r8 y S_CONNECT CSM_OC6_CONNECTED Router# show spe | i a Country code config : default T1 (u Law) Country code setting: e1-default Port state: (s)shutdown (r)recovery (t)test (a)active call (b)busiedout (d)download (B)bad (p)busyout pending Call type : (m)modem (d)digital (v)voice (f)fax-relay (_)not in use Summary : Ports : Total 540 In-use 2 Free 514 Disabled 24 Calls : Modem 0 Digital 0 Voice 2 Fax-relay 0 SPE SPE SPE SPE Port Call SPE# Port # State Busyout Shut Crash State Type 2/02 0012-0017 ACTIVE 0 0 0 _____a _____v debugging is on
DB-2673
2/03
0018-0023
ACTIVE
0 a_____
v_____
Router# show logging Syslog logging: enabled (274 messages dropped, 20 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) Console logging: disabled Monitor logging: level debugging, 0 messages logged, xml disabled, filtering disabled Buffer logging: level debugging, 1018 messages logged, xml disabled, filtering disabled Logging Exception size (8192 bytes) Count and timestamp logging messages: disabled Trap logging: level informational, 133 message lines logged Log Buffer (1000000 bytes): *Nov 14 08:40:36.499: NP VPD (2/17): Cached header parameter values: header size : 28, payload size : 13, ssrc : 0x24DB1F03, udp chksum : 0x0 *Nov 14 08:40:36.499: NP VPD (2/17): Cached IP/UDP pkt details: dest-ip: 31.31.31.1 src-ip: 31.31.31.3 dport: 0x4070 sport: 0x43A6 *Nov 14 08:40:40.851: NP VPD (2/17): Cached header parameter values: header size : 28, payload size : 32, ssrc : 0x24DB1F03, udp chksum : 0x0 *Nov 14 08:40:40.851: NP VPD (2/17): Cached IP/UDP pkt details: dest-ip: 31.31.31.1 src-ip: 31.31.31.3 dport: 0x4070 sport: 0x43A6 *Nov 14 08:40:40.939: NP VPD (2/17): Cache being cleared due to change in payload size old payload size : 32 new rx payload size : 13 cached ssrc : 24DB1F03
Related Commands
Command debug voice fastpath show voice call voice fastpath enable
Description Turns on debugging to monitor voice fastpath packets. Displays the call status information for voice ports. Turns on voice fastpath.
DB-2674
December 2010
Syntax Description
Command Default
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
This command displays details about the attributes captured in call detail records (CDRs) and their values for the file accounting feature.
Examples
The following example displays output from the debug voip fileacct command:
Router# debug voip fileacct *May 10 06:27:43.719: : add attr:47A815E4 clid(21) 4 5000 *May 10 06:27:43.719: new list: 0x4792614C prev list: 0x47A815D0 *May 10 06:27:43.719: : add attr:47926160 dnis(22) 0 *May 10 06:27:43.719: new list: 0x47C3A2C0 prev list: 0x4792614C *May 10 06:27:43.719: : add attr:47C3A2D4 subscriber(106) 11 RegularLine *May 10 06:27:43.719: new list: 0x4517FC04 prev list: 0x47C3A2C0 *May 10 06:27:43.719: : add attr:4517FC18 override_session_time(67) 4 0(0) Telephony Leg *May 10 06:27:43.719: new list: 0x478C0CA4 prev list: 0x4517FC04 *May 10 06:27:43.719: : add attr:478C0CB8 h323-ivr-out(68) 14 Tariff:Unknown *May 10 06:27:43.719: new list: 0x477EAFFC prev list: 0x478C0CA4 *May 10 06:27:43.719: : add attr:477EB010 h323-voice-quality(70) 1 0 *May 10 06:27:43.719: new list: 0x4783EF80 prev list: 0x477EAFFC *May 10 06:27:43.719: : add attr:4783EF94 gw-rxd-cgn(94) 28 ton:0,npi:0,pi:0,si:0,#:5000 *May 10 06:27:43.719: list is 466C17A8, list->featurename is 0,feat id is 11205 *May 10 06:27:43.719: fcur is 466C17A8, attr is "TWC","05/10/2007 06:27:43.695","5000","",0,11205,6510EBF8 FDF611DB A527DA52 74E8B890,2BD8,"","","","" *May 10 06:27:43.719: : del attr47B8E814 callID(1) 4 11224(2BD8) *May 10 06:27:43.719: : del attr45250054 cdr type(2) 4 0(0) *May 10 06:27:43.719: : del attr452C52F0 leg type(3) 4 1(1) *May 10 06:27:43.719: : del attr47914064 h323-conf-id(4) 35 6510EBF8 FDF611DB A527DA52 74E8B890
DB-2675
Related Commands
Description Displays debugging messages related to file accounting flushing processes. Enables an accounting method for collecting CDRs. Sets the primary location for storing the CDRs generated for file accounting.
DB-2676
December 2010
Syntax Description
all default error error [call] error [call [informational]] error [software] error [software [informational]] function individual inout raw raw [decode]
(Optional) Enables all H.221 debugging, except the raw option. (Optional) Activates function, inout, error call, and software debugging. (Optional) Enables H.221 call error and software error debugging. (Optional) Enables H.221 major call processing error debugs related to the H.221 subsystem. (Optional) Enables H.221 major and informational call processing error debugs related to the H.221 subsystem. (Optional) Enables H.221 major software error debugs related to the H.221 subsystem. (Optional) Enables H.221 major and informational software error debugs related to the H.221 subsystem. (Optional) Enables procedure tracing. (Optional) Activates individual H.221 debugging. (Optional) Enables subsystem inout debugging. (Optional) Displays raw BAS messages. (Optional) Decodes raw BAS data.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command enables debugging for H.221 message events (voice telephony call control information).
Note
This command provides the same results as the debug voice h221 command.
DB-2677
Caution
We recommend that you log the output from the debug voip h221 all command to a buffer, rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway. Use the debug voip h221 individual x command, (where x is an index number for a debug category), to activate a single debug, selected by index number instead of entering a group of debug commands. See Table 364 for a list of debug categories and corresponding index numbers.
Table 364 Indexes and Categories for the debug voip h221 individual command
Index Number 1, 2, 30, 31, 32 5, 6, 14, 15, 16, 22 7, 10, 12, 13, 17, 28 8, 9, 23 11, 24, 33 18 19, 20, 21 3, 4, 25, 27, 42, 43 26 29 34, 35, 36, 37, 38, 39, 40, 41
Debug Category Secondary number exchange Audio mode/caps Video mode/caps B-channel mode/caps Miscellaneous command exchange Bandwidth calculations DSP configuration General caps/internal Non-standard caps/command Loop request BAS squelch
Examples
The raw keyword displays the raw BAS information coming from or to the DSP. It is displayed in a hexadecimal octet format. The decode option decodes the BAS information into a readable English format. The following is sample output from the debug voip h221 raw decode command:
BAS=81:1 BAS=82:1 BAS=84:1 BAS=85:1 BAS=F9:1 BAS=02:0 BAS=0A:0 BAS=8A:1 BAS=8A:BAS=8A:BAS=8A:0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 1 1 0 0 1 1 0 0 0 0 0 1 0 0 0 1 1 1 1: 0: 0: 1: 1: 0: 0: -: -: -: 0: AUDIO CAPS=g711 a-law AUDIO CAPS=g711 u-law AUDIO CAPS=g722 48k AUDIO CAPS=g728 H.242 MBE start indication H.242 MBE length=2 H.242 MBE type=H.263 caps Always 1 H.263 MPI=1 H.263 FORMAT=h.263_cif No additional options
Related Commands
Description Enables debugging for the call control application programming interface (CCAPI) contents. Enables debugging for Real-Time Transport Protocol (RTP) named event packets.
DB-2678
December 2010
Syntax Description
all default error error [call] error [call [informational]] error [software] error [software [informational]] function individual inout message number
(Optional) Enables all H.324 debugging except raw and raw decode. (Optional) Activates function, inout, error call, and software debugging. (Optional) Enables H.324 call error and software error debugging. (Optional) Enables H.324 major call processing error debugs related to the H.324 subsystem. (Optional) Enables H.324 major and informational call processing error debugs related to the H.324 subsystem. (Optional) Enables H.324 major software error debugs related to the H.324 subsystem. (Optional) Enables H.324 major and informational software error debugs related to the H.324 subsystem. (Optional) Enables procedure tracing. (Optional) Activates individual H.324 debugging. (Optional) Enables subsystem inout debugging. (Optional) Enables H.245 message display to/from H.324. Only displays message types, for message detail, use debug h245 asn1. Index number. Number of debug category. See
Command Modes
Command History
Release 12.4(22)T
Usage Guidelines
This command enables debugging for H.324 message events (video call control information).
Note
Caution
We recommend that you log the output from the debug voip h324 all command to a buffer, rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
DB-2679
Use the debug voip h324 individual index-number command, where index number is a debug category, to activate a single debug. This is helpful when trying to see a specific problem, without having a large number of debug output being generated. For example, the user could select the command debug voip h324 individual 4 to see calls where no video caps arrived from the IP side of the call (SIP to H.324 direction). Multiple debug output can be activated using this command, one at a time. These are not additional debug output to the ones enabled by the command debug voip h324 all, just another way to selectively see specific information, without generating large amounts of debug output. See Table 365 for a list of debug categories and corresponding index numbers.
Table 365 Index Numbers and Descriptions for the debug voip h324 Command
Description Shows incoming H.245 message type Shows MSD master/slave determination upon receiving MSD from peer Warns that no audio caps were found from IP leg (not necessarily an error). Warns that no video caps were found from IP leg (not necessarily an error). Shows MSD master/slave determination when sending MSDack. Displays media type being sent (audio/video), when sending MES message. Displays H.223 parameters when sending TCS. Displays OLC information, when sending audio OLC. Displays OLC information, when sending video OLC. Displays OLCack information, when sending OLCack. Displays OLCrej information, when sending OLCrej. Displays digit begin sent, when sending USER INPUT message. Displays internal status bits of h245 messages sent/received in the h324 subsystem. No user data is provided. Displays master/slave determination when MSDack is received. Displays media type when MESack is received. Displays media type when MESrej is received. Displays OLC information, when receiving audio OLC. Displays OLC information, when receiving video OLC. Displays media type when OLCack is received. Displays media type when OLCrej is received. Displays message type, when an H.245 miscellaneous message is received (for example FastVideoUpdate). Displays digit being received, when receiving USER INPUT message. Displays message type, when an H.245 miscellaneous message is sent (for example FastVideoUpdate).
DB-2680
December 2010
Table 365
Index Numbers and Descriptions for the debug voip h324 Command
Description Displays outgoing message command type. No user data is provided with this debug. Displays the initial H.223 mux level received from the peer, reported by the DSP. Displays information about either OLCack or OLCrej being sent in response to an OLC request. Displays the audio codec being opened with the IP leg. Displays the video codec being opened with the IP leg. Should always be the same as the video codec with the H.324 leg. Displays when Cisco IOS is sending the DSP either the H.223 multiplex table, or AL information. No user data is provided. Indicates the digit being sent to the IP leg, through the RFC 2833 procedure. Displays the parameters being sent to the DSP to configure either audio or video. Displays information about the H.223 multiplex table being sent to the DSP. Displays information about the H.223 AL configuration being sent to the DSP. Indicates message arriving from IP leg. No user data is provided. Displays information when receiving VENDOR ID message. This may show the type of equipment being connected to on the H.324 leg, if the peer adds the information to the message. Displays the new H.223 multiplex level being configured. Displays the new H.223 maximum PDU size being configured. Indicates when the internal video capability memory has been released. No user data is provided. Indicates when an empty capability set (ECS) has arrived from the IP leg of the call. Indicates when a new capability set has arrived from the IP leg after an ECS has arrived. Displays the dynamic payload number from the IP leg (H.324 to IP direction).
40 41 42 43 44 45
DB-2681
Syntax Description
(Optional) Displays all HPI debugging messages. (Optional) Displays commands that are being sent to the 54x DSP. (Optional) Displays HPI detail, error, and inout debugging messages and also runs if no keywords are added. (Optional) Displays detailed information about commands for the HPI. This command is used in conjunction with other debug voip hpi commands to show additional details when you use the command, notification, and response keywords. (Optional) Displays HPI error messages. (Optional) Displays call processing errors. (Optional) Displays minor and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software processing errors. (Optional) Displays HPI functions. (Optional) Displays the output for the command, notification, response, and stats keywords. (Optional) Displays notification messages that are sent from the 54x DSP (for example, tone detection notification). (Optional) Displays responses to commands that are sent by the 54x DSP (for example, responses to statistic requests). (Optional) Displays HPI statistics. (Optional) Displays HPI checker operations.
error call informational software function inout notification response stats checker
Defaults
Command Modes
Privileged EXEC
DB-2682
December 2010
Command History
Modification This command replaces the debug hpi command. The checker keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command enables debugging for HPI message events, which are used to communicate with digital signal processors (DSPs). Use the debug voip hpi all command to view gateway DSP modem relay termination codes. The DSP-to-host messages for the modem relay termination indicate to the host the modem relay session termination time, physical or link layer, and other probable causes for disconnection. On receiving this indication from the DSP, the host can disconnect the call or place the channel in the modem passthrough state.
Examples
The following is sample output from the debug voip hpi all command for an incoming ISDN call:
Router# debug voip hpi all 01:28:44: //-1/xxxxxxxxxxxx/HPI/[]/hpi_dspmgr_open:
The following event shows that the HPI has identified the call, as shown by the GUID, but the call leg has not been specified, as shown by the -1 value in the CallEntry ID:
01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_dspmgr_open: Allocated DSP resource: dsp_intf=0x64AF0EEC hpi_cdb=0x64ACED34 ret=1 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_dspmgr_open: Exit Line # 9411 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_init: 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_init: Open channel 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_init: Packet details: Packet Length (16), Channel Id (1), Packet Id (74) ALawULawSelect=A Law Associated SignalingChannel (128) Timeslot=0 SerialPort=0 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/caplog_hpi_msg_log: 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_voice_config_params:
For each packet-related event, information about the packet is shown following the event. The following two events show the Real-Time Protocol (RTP) packet:
01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_encap_config: RTP information 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_encap_config: Packet details: Packet Length (38), Channel Id (1), Packet Id (92) TransportProtocol=2 t_ssrc=0x00 r_ssrc=0x00 t_vpxcc=0x0 r_vpxcc=0x0 sid_support=0 tse_payload=101 seq_num=0x0 redundancy=0 cc_payload_type=0 fax_payload_type=0 alaw_pcm_switchover=0 mulaw_pcm_switchover=0 dtmf_payload_type=0 nte_rcv_payload_type=101 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/caplog_hpi_msg_log: 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_set_playout_config: Packet details: Packet Length (18), Channel Id (1), Packet Id (76)
DB-2683
Mode=1, Initial=60, Min=40, Max=200, fax_nom=300 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/caplog_hpi_msg_log: 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_inband_sig: 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_fax_enable: 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_fax_enable: Enable FAX 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_fax_enable: Packet details: Packet Length (8), Channel Id (1), Packet Id (67) 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/caplog_hpi_msg_log: 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_echo_cancel: Packet details: Packet Length (14), Channel Id (1), Packet Id (66) flags=0x00000B00, Threshold=-21, SuppressorCoverage=7 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/caplog_hpi_msg_log: 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_idle_code_det: Packet details: Packet Length (14), Channel Id (1), Packet Id (116) Enable (FALSE), Code=0x00000000, Duration (6000 ms) 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/caplog_hpi_msg_log: 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_set_gain: Packet details: Packet Length (12), Channel Id (1), Packet Id (91) Gain: In=0, Out=0 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/caplog_hpi_msg_log: 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_cng_config: 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_info_field_size_config: 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_digit_relay_config: Exit Line # 4162 01:28:44: //-1/3FE022AC8009/HPI/[2/0:23]/hpi_dspmgr_update_callid:
At this point, the HPI identifies the call leg, as shown by the CallEntry ID changing from -1 to 11.
01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_voice_get_capabilities: Exit Line # 5073 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_stop_service: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_idle_service: Packet details: Packet Length (8), Channel Id (1), Packet Id (68) 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_open_service: Setting codec g729r8 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_set_codec: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_dsprm_callback: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_voice_config_params: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_digit_relay_config: Exit Line # 4162
The RTP packet is shown again, but now more information is available, such as payload types. The packet ID identifies this as the same RTP packet shown earlier.
01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_encap_config: RTP information 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_encap_config: Packet details: Packet Length (38), Channel Id (1), Packet Id (92) TransportProtocol=2 t_ssrc=0x040 r_ssrc=0x00 t_vpxcc=0x0 r_vpxcc=0x0 sid_support=1 tse_payload=101 seq_num=0x13D3 redundancy=0 cc_payload_type=125 fax_payload_type=122 alaw_pcm_switchover=8 mulaw_pcm_switchover=0 dtmf_payload_type=121 nte_rcv_payload_type=101 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_pak_suppress: Stop packet suppression 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_pak_suppress:
DB-2684
December 2010
Packet details: Packet Length (10), Channel Id (1), Packet Id (106) Mode=1 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_vad_enable: Packet details: Packet Length (18), Channel Id (1), Packet Id (78) VAD=1 (ON): Threshold=-38, VADTime=250 Aggressive=0, Noise=-62 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_init: Open channel 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_init: Packet details: Packet Length (16), Channel Id (1), Packet Id (74) ALawULawSelect=A Law Associated SignalingChannel (128) Timeslot=0 SerialPort=0 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_voice_config_params: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_encap_config: RTP information 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_encap_config: Packet details: Packet Length (38), Channel Id (1), Packet Id (92) TransportProtocol=2 t_ssrc=0x040 r_ssrc=0x00 t_vpxcc=0x0 r_vpxcc=0x0 sid_support=1 tse_payload=101 seq_num=0x13D3 redundancy=0 cc_payload_type=125 fax_payload_type=122 alaw_pcm_switchover=8 mulaw_pcm_switchover=0 dtmf_payload_type=121 nte_rcv_payload_type=101 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_set_playout_config: Packet details: Packet Length (18), Channel Id (1), Packet Id (76) Mode=1, Initial=60, Min=40, Max=200, fax_nom=300 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_inband_sig:
In the following several events, fax is enabled. Packets for echo cancellation, gain, voice activity detection (VAD), and other parameters appear.
01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_fax_enable: Enable FAX 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_fax_enable: Packet details: Packet Length (8), Channel Id (1), Packet Id (67) 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_echo_cancel: Packet details: Packet Length (14), Channel Id (1), Packet Id (66) flags=0x00000B00, Threshold=-21, SuppressorCoverage=7 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_idle_code_det: Packet details: Packet Length (14), Channel Id (1), Packet Id (116) Enable (FALSE), Code=0x00000000, Duration (6000 ms) 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_set_gain: Packet details: Packet Length (12), Channel Id (1), Packet Id (91) Gain: In=0, Out=0 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_cng_config: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_info_field_size_config: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_digit_relay_config: Exit Line # 4162 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_start_service:
DB-2685
01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_voice_mode: Packet details: Packet Length (28), Channel Id (1), Packet Id (73) CodingType=20, Voice FieldSize (20), VAD Flag (250), EchoLength=512, ComfortNoise=1, inband_detect=0x00000001, DigitRelay=2, AGC Flag=0, ECAN TestGroup=0, ECAN TestNumber=0, DynamicPayload=0 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_idle_code_det: Packet details: Packet Length (14), Channel Id (1), Packet Id (116) Enable (FALSE), Code=0x00000000, Duration (6000 ms) 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_start_service: Exit Line # 2816 01:28:44: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_send_data_to_dsp: 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_query_info:
Transmit and receive events are shown, along with packet information.
01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_query_tx: Packet details: Packet Length (10), Channel Id (1), Packet Id (86) ResetFlag (0x00000000) 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_query_rx: Packet details: Packet Length (10), Channel Id (1), Packet Id (87) ResetFlag (0x00000000) 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_query_pd: Playout delay 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_query_pd: Packet details: Packet Length (10), Channel Id (1), Packet Id (83) ResetFlag (0x00000000) 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_query_pe: Playout error 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_query_pe: Packet details: Packet Length (10), Channel Id (1), Packet Id (84) ResetFlag (0x00000000) 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_query_info: Exit Line # 6578 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_receive_message: 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log:
DB-2686
December 2010
RX Packets (5): Signaling (0), ComfortNoise (1) Receive Duration (1750): Voice (70) FAX (0) Packet Counts: OOSequence (0), Bad header (0), Late (1), Early (0) 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_receive_message: 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_receive_query_pd: Got Playout Delay stats... Packet details: Packet Length (24), Channel Id (1), Packet Id (196) RX Delay: CurrentEstimate=69 Low WaterMark (69) High WaterMark (70) Clock Offset (-279863943) 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_receive_message: 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/caplog_hpi_msg_log: 01:28:46: //11/3FE022AC8009/HPI/[2/0:23:11]/hpi_receive_query_pe: Got Playout Error stats Packet details: Packet Length (32), Channel Id (1), Packet Id (197) Predictive Concealment Duration (0) Interpolative Concealment Duration (0) Silence Concealment Duration (0) Retroactive Memory Update (0) Buffer overflow discard duration (10) Talkspurt Detection Errors (0)
The following sample output from the debug voip hpi checker command helps verify the operations of the HPI checker:
Router# debug voip hpi checker *May 19 06:30:53.532: hpi [] DSP [0/0x0] S_HPI_CLOSED(0) E_HPI_DSPRM_OPEN/SET_CODEC(54) *May 19 06:30:53.532: hpi [] DSP [0/0x0] -> S_HPI_CLOSED(0) *May 19 06:30:53.620: hpi [2/0:23 (22)] DSP [0/0x0] S_HPI_CLOSED(0) E_HPI_DSP_OPEN_VOICE_CHANNEL(11) *May 19 06:30:53.620: hpi [2/0:23 (22)] DSP [0/0x0] -> S_HPI_IDLE(1) *May 19 06:30:53.620: hpi [2/0:23 (22)] DSP [0/0x0] S_HPI_IDLE(1) E_HPI_DSPRM_OPEN/SET_CODEC(54) *May 19 06:30:53.620: hpi [2/0:23 (22)] DSP [0/0x0] -> S_HPI_IDLE(1) *May 19 06:30:53.624: hpi [2/0:23 (22)] DSP [0/0x0] S_HPI_IDLE(1) E_HPI_DSP_ENC_CONFIG(29) *May 19 06:30:53.624: hpi [2/0:23 (22)] DSP [0/0x0] -> S_HPI_IDLE(1) *May 19 06:30:53.624: hpi [2/0:23 (22)] DSP [0/0x0] S_HPI_IDLE(1) E_HPI_DSP_SET_VOICE_PLAYOUT_DELAY(13) *May 19 06:30:53.624: hpi [2/0:23 (22)] DSP [0/0x0] -> S_HPI_IDLE(1) *May 19 06:30:53.624: hpi [2/0:23 (22)] DSP [0/0x0] S_HPI_IDLE(1) E_HPI_DSP_IDLE_CODE_CONTROL (50) *May 19 06:30:53.624: hpi [2/0:23 (22)] DSP [0/0x0] -> S_HPI_IDLE(1) *May 19 06:30:53.624: hpi [2/0:23 (22)] *May 19 06:30:53.624: hpi [2/0:23 (22)] *May 19 06:30:53.624: hpi [2/0:23 (22)] E_HPI_DSP_GEN_PACKET_CONTROL(41) *May 19 06:30:53.628: hpi [2/0:23 (22)] *May 19 06:30:53.628: hpi [2/0:23 (22)] E_HPI_DSP_ECHO_CANCELLER_CONTROL(3) *May 19 06:30:53.628: hpi [2/0:23 (22)] *May 19 06:30:53.628: hpi [2/0:23 (22)] *May 19 06:30:53.628: hpi [2/0:23 (22)] *May 19 06:30:53.628: hpi [2/0:23 (22)] E_HPI_DSP_DIGIT_RELAY(22) *May 19 06:30:53.628: hpi [2/0:23 (22)] *May 19 06:30:53.628: hpi [2/0:23 (22)] E_HPI_DSP_VAD_ENABLE(15) *May 19 06:30:53.628: hpi [2/0:23 (22)] *May 19 06:30:53.632: hpi [2/0:23 (22)] E_HPI_DSP_GEN_PACKET_CONTROL(41) DSP [0/0x0] S_HPI_IDLE(1) E_HPI_DSP_VOICE_MODE(10) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP DSP DSP DSP [0/0x0] [0/0x0] [0/0x0] [0/0x0] -> S_HPI_VOICE(2) S_HPI_VOICE(2) E_HPI_DSP_SET_GAINS(28) -> S_HPI_VOICE(2) S_HPI_VOICE(2)
DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2)
DB-2687
*May 19 06:30:53.632: hpi [2/0:23 (22)] *May 19 06:30:53.632: hpi [2/0:23 (22)] E_HPI_DSP_INBAND_DETECTOR_CONTROL(45) *May 19 06:30:53.632: hpi [2/0:23 (22)] *May 19 06:30:53.636: hpi [2/0:23 (22)] E_HPI_DSP_INBAND_DETECTOR_CONTROL(45) *May 19 06:30:53.636: hpi [2/0:23 (22)] *May 19 06:30:53.624: hpi [2/0:23 (22)] *May 19 06:30:53.624: hpi [2/0:23 (22)] *May 19 06:30:53.624: hpi [2/0:23 (22)] E_HPI_DSP_GEN_PACKET_CONTROL(41) *May 19 06:30:53.628: hpi [2/0:23 (22)] *May 19 06:30:53.628: hpi [2/0:23 (22)] E_HPI_DSP_ECHO_CANCELLER_CONTROL(3) *May 19 06:30:53.628: hpi [2/0:23 (22)] *May 19 06:30:53.628: hpi [2/0:23 (22)] *May 19 06:30:53.628: hpi [2/0:23 (22)] *May 19 06:30:53.628: hpi [2/0:23 (22)] E_HPI_DSP_DIGIT_RELAY(22) *May 19 06:30:53.628: hpi [2/0:23 (22)] *May 19 06:30:53.628: hpi [2/0:23 (22)] E_HPI_DSP_VAD_ENABLE(15) *May 19 06:30:53.628: hpi [2/0:23 (22)] *May 19 06:30:53.632: hpi [2/0:23 (22)] E_HPI_DSP_GEN_PACKET_CONTROL(41) *May 19 06:30:53.632: hpi [2/0:23 (22)] *May 19 06:30:53.632: hpi [2/0:23 (22)] E_HPI_DSP_INBAND_DETECTOR_CONTROL(45) *May 19 06:30:53.632: hpi [2/0:23 (22)] *May 19 06:30:53.636: hpi [2/0:23 (22)] E_HPI_DSP_INBAND_DETECTOR_CONTROL(45) *May 19 06:30:53.636: hpi [2/0:23 (22)] *May 19 06:30:56.512: hpi [2/0:23 (22)] E_HPI_DSP_GET_TX_STAT(23) *May 19 06:30:56.512: hpi [2/0:23 (22)] *May 19 06:30:56.512: hpi [2/0:23 (22)] E_HPI_DSP_GET_RX_STAT(24) *May 19 06:30:56.512: hpi [2/0:23 (22)] *May 19 06:30:56.512: hpi [2/0:23 (22)] E_HPI_DSP_GET_VOICE_PLAYOUT_DELAY(20) *May 19 06:30:56.512: hpi [2/0:23 (22)] *May 19 06:30:56.512: hpi [2/0:23 (22)] E_HPI_DSP_GET_VOICE_PLAYOUT_ERROR(21) *May 19 06:30:56.512: hpi [2/0:23 (22)] *May 19 06:30:59.384: hpi [2/0:23 (22)] E_HPI_DSP_GET_TX_STAT(23) *May 19 06:30:59.384: hpi [2/0:23 (22)] *May 19 06:30:59.384: hpi [2/0:23 (22)] E_HPI_DSP_GET_RX_STAT(24) *May 19 06:30:59.384: hpi [2/0:23 (22)] *May 19 06:30:59.384: hpi [2/0:23 (22)] E_HPI_DSP_GET_VOICE_PLAYOUT_DELAY(20) *May 19 06:30:59.384: hpi [2/0:23 (22)] *May 19 06:30:59.384: hpi [2/0:23 (22)] E_HPI_DSP_GET_VOICE_PLAYOUT_ERROR(21) *May 19 06:30:59.384: hpi [2/0:23 (22)] *May 19 06:31:06.524: hpi [2/0:23 (22)] E_HPI_DSP_GEN_PACKET_CONTROL(41) *May 19 06:31:06.524: hpi [2/0:23 (22)] *May 19 06:31:06.532: hpi [2/0:23 (22)] E_HPI_DSP_GET_LEVELS(26) *May 19 06:31:06.536: hpi [2/0:23 (22)]
DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP DSP DSP DSP [0/0x0] [0/0x0] [0/0x0] [0/0x0] -> S_HPI_VOICE(2) S_HPI_IDLE(1) E_HPI_DSP_VOICE_MODE(10) -> S_HPI_VOICE(2) S_HPI_VOICE(2)
DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP DSP DSP DSP [0/0x0] [0/0x0] [0/0x0] [0/0x0] -> S_HPI_VOICE(2) S_HPI_VOICE(2) E_HPI_DSP_SET_GAINS(28) -> S_HPI_VOICE(2) S_HPI_VOICE(2)
DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2) DSP [0/0x0] S_HPI_VOICE(2) DSP [0/0x0] -> S_HPI_VOICE(2)
DB-2688
December 2010
*May 19 06:31:06.536: hpi [2/0:23 E_HPI_DSP_GET_ERROR_STAT(0) *May 19 06:31:06.536: hpi [2/0:23 *May 19 06:31:06.572: hpi [2/0:23 *May 19 06:31:06.572: hpi [2/0:23 *May 19 06:31:06.572: hpi [2/0:23 E_HPI_DSP_CLOSE_VOICE_CHANNEL(12) *May 19 06:31:06.572: hpi [2/0:23 *May 19 06:31:06.576: hpi [2/0:23 *May 19 06:31:06.576: hpi [2/0:23
(22)] DSP [0/0x0] S_HPI_VOICE(2) (22)] (22)] (22)] (22)] DSP DSP DSP DSP [0/0x0] [0/0x0] [0/0x0] [0/0x0] -> S_HPI_VOICE(2) S_HPI_VOICE(2) E_HPI_DSP_IDLE_MODE(5) -> S_HPI_IDLE(1) S_HPI_IDLE(1)
(22)] DSP [0/0x0] -> S_HPI_CLOSED(0) (22)] DSP [0/0x0] -> S_HPI_CLOSED(0) (22)] DSP [0/0x0] -> S_HPI_CLOSED(0)
Related Commands
DB-2689
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-2690
December 2010
Aug
Symmetric Audio Cap Mask: 0x1 Symmetric Audio Codec Bytes: 160 Flow Mode: 0 Silence Suppression: 0 8 15:24:30.626 EDT: cch323_build_olc_for_ccapi:NumOfElements = 1 idx = 1
The following line indicates the inbound call leg is set to work in IP-to-IP mode (0xF0):
Aug 8 15:24:30.630 EDT: cch323_set_h245_state_mc_mode_incoming: h245 state m/c mode=0xF0
The following line indicates flow mode for incoming call leg is set to FLOW_THROUGH (incoming callid = 35). At this point Session Application opens the outbound leg. Some output is omitted here.
Aug Aug 8 15:24:30.630 EDT: cch323_media_flow_mode: IPIPGW(35):Flow Mode=1 8 15:24:30.630 EDT: cch323_set_h245_state_mc_mode_outgoing:call_spi_mode = 1
The following line indicates the outbound call leg is set to work in IP-to-IP mode (0xF0):
Aug 8 15:24:30.630 Aug 8 15:24:30.630 Aug 8 15:24:30.630 Aug 8 15:24:30.630 pref mask=FFFFFFFF Aug 8 15:24:30.630 codec(bytes)=5(160) EDT: EDT: EDT: EDT: cch323_set_h245_state_mc_mode_outgoing: h245 state m/c mode=0xF0 cch323_get_peer_info line 1022: cch323_get_peer_info line 1026: cch323_set_pref_codec_list:IPIPGW(36):peer channel present: dp
The following line indicates the outbound call leg is set to FLOW_THROUGH (outbound callid = 36):
Aug 8 15:24:30.630 EDT: cch323_get_peer_info: Flow Mode set to FLOW_THROUGH for callId 36 Aug 8 15:24:30.642 EDT: cch323_build_local_encoded_fastStartOLCs: state_mc_mode=0xF0 on outbound leg. Aug 8 15:24:30.642 EDT: cch323_build_local_encoded_fastStartOLCs:srcAddress = 0x10C0C30, h245_lport = 0, flow mode = 1, minimum_qos=0 Aug 8 15:24:30.642 EDT: cch323_generic_open_logical_channel: IPIPGW: current codec = 5:160:160.
The following line indicates the IPIPGW received fast start response from the remote (called party) entity of the outbound call leg:
Aug 8 15:24:30.658 EDT: Function: cch323_receive_fastStart_cap_response Line: 2800 Aug 8 15:24:30.658 EDT: Function: cch323_build_olc_for_ccapi, Line: 1198, audioFastStartArray=0x63C1259C Aug 8 15:24:30.658 EDT: cch323_build_olc_for_ccapi: channel_info ptr=0x63C12738, ccb ptr=0x631A4D68 Aug 8 15:24:30.658 EDT: cch323_build_olc_for_ccapi: Channel Information: Logical Channel Number (fwd/rev): 1 Channel address (fwd/rev): 0x10C0C28 RTP Channel (fwd/rev): 19128 RTCP Channel (fwd/rev): 19129 QoS Capability (fwd/rev): 0 Symmetric Audio Cap Mask: 0x1 Symmetric Audio Codec Bytes: 160 Flow Mode: 0 Silence Suppression: 0 Aug 8 15:24:30.658 EDT: cch323_build_olc_for_ccapi:NumOfElements = 1 idx = 1 Aug 8 15:24:30.658 EDT: Function: cch323_do_open_channel_ind Line: 1080 Aug 8 15:24:30.658 EDT: Function: cch323_open_channel_ind Line: 1132
The following lines indicates the outbound call leg (36) sends the channel response back to the inbound call leg (35) via CCAPI:
Aug 8 15:24:30.658 EDT: cch323_receive_fastStart_cap_response: callID 0x24(36), audioFastStartArray = 0x0. Aug 8 15:24:30.658 EDT: cch323_peer_channel_ind: IPIPGW:### chn info coming in chn_ind()
DB-2691
Aug 8 15:24:30.658 EDT: cch323_peer_channel_ind: IPIPGW(35):giving event to Fast start logic. Aug 8 15:24:30.658 EDT: Function: cch323_do_open_channel Line: 5557 Aug 8 15:24:30.658 EDT: cch323_do_open_channel: line:5566, ccb->status=0x4000000 Aug 8 15:24:30.658 EDT: cch323_do_open_channel:srcAddress = 0x10C0C30, h245_lport = 18308, minimum_qos=0 Aug 8 15:24:30.658 EDT: cch323_build_fastStart_cap_response: Start... Aug 8 15:24:30.658 EDT: cch323_build_fastStart_cap_response: selectCodec=5, codec_mask=1, configured_codecBytes=160 forward_codecBytes=160, reverse_codecBytes=160, audioFastStartArray=0x63C1299C Aug 8 15:24:30.658 EDT: cch323_prepare_fastStart_cap_response line 2138 Aug 8 15:24:30.658 EDT: cch323_prepare_fastStart_cap_response: callID 0x23(35), audioFastStartArray = 0x0. Aug 8 15:24:30.658 EDT: cch323_prepare_fastStart_cap_response, ccb->local_fastStart=0x63C183C0, srcAddr=0x10C0C30, lport=18308, rport=19362, rc=1 Aug 8 15:24:30.658 EDT: cch323_build_fastStart_cap_response: local_fastStart=0x63C183C0, negotiated_codec=5, negotiated_codec_bytes=160 Aug 8 15:24:30.658 EDT: cch323_build_fastStart_cap_response: Received peer cap info. Notify RAS state machine (possible BRQ).
Outbound leg, at this point, has prepared the fast start response to be sent to the originating (calling party). This is sent in the next outgoing call control message (such as ALERT or PROGRESS):
Aug Aug Aug Aug Aug 8 8 8 8 8 15:24:30.658 15:24:30.658 15:24:30.674 15:24:30.674 15:24:30.678 EDT: EDT: EDT: EDT: EDT: cch323_build_fastStart_cap_response: Done. cch323_do_open_channel: line:5644, ccb->status=0x4004200 cch323_h245_connection_sm: state = 0 event=5 ccb=63C18580 cch323_h245_connection_sm: listen state=0 cch323_h245_cap_ind: IPIPGW(35): masks au=0x1 data=0xC uinp=0x32.
The following line indicates the inbound call leg (35) received capability set (CAPSET) message:
Aug 8 15:24:30.678 EDT: cch323_run_h245_cap_in_sm:IPIPGW(35): got incoming CAPSET msg. Aug 8 15:24:30.678 EDT: cch323_do_transparent_cap_ind: IPIPGW(35):mask sent to other leg=1
The following lines show the inbound call leg (35) forwarding the TCS to the outbound leg and waiting for the response of the outbound call leg (TCSACK or TCSREJ):
Aug sent Aug peer 8 15:24:30.678 EDT: cch323_run_h245_cap_in_sm:IPIPGW(35):suppressTCS: our TCS will be based on peer. 8 15:24:30.678 EDT: cch323_h245_cap_notify:IPIPGW(35):not xmiting CAPSACK: wait for to ack.
Aug 8 15:24:30.678 EDT: cch323_caps_ind: IPIPGW(36):setting the mask to new : current mask=0x4FFFF new mask=0x1. Aug 8 15:24:30.678 EDT: cch323_caps_ind: IPIPGW(36): ExtendedCapsPresent Aug 8 15:24:30.678 EDT: cch323_set_dtmf_relay_mask: IPIPGW(36): extract dtmf-caps from caps struct Aug 8 15:24:30.678 EDT: cch323_set_dtmf_relay_mask: IPIPGW(36): After extracting dtmf-caps from caps structccb->user_caps.user_input_bit_mask[0x1C]
The following line shows the outbound leg sending the TCS to the called party. No codec filter is configured on outbound dial-peer (FFFFFFFF):
Aug 8 15:24:30.678 caps:5:1:FFFFFFFF Aug 8 15:24:30.678 Aug 8 15:24:30.678 Aug 8 15:24:30.678 Aug 8 15:24:30.678 Aug 8 15:24:30.678 machine. Aug 8 15:24:30.678 EDT: cch323_prepare_preferred_codec_list: IPIPGW(36):munging EDT: EDT: EDT: EDT: EDT: cch323_prepare_preferred_codec_list: IPIPGW(36):final mask=1 cch323_peer_caps_ind_common:IPIPGW(36):starting 245 via tunnel cch323_h245_connection_sm: state = 0 event=1 ccb=631A4D68 cch323_h245_connection_sm: listen state=0 cch323_h245_start_cap_sm: IPIPGW(36): starting the cap/msd
DB-2692
December 2010
The following line shows the outbound leg forwarding the TCS over H.225 tunnel (starting H.245 via tunnel):
Aug 8 15:24:30.678 EDT: cch323_send_generic_caps: IPIPGW:[trans]audio mask after operation=0x1.
The following lines show master-slave determination events passing from inbound to outbound and vice versa:
Aug 8 Aug 8 Aug 8 Aug 8 Aug 8 Aug 8 Aug 8 Aug 8 Aug 8 leg=1 15:24:30.678 15:24:30.678 15:24:30.678 15:24:30.678 15:24:30.678 15:24:30.678 15:24:30.678 15:24:30.678 15:24:30.678 EDT: EDT: EDT: EDT: EDT: EDT: EDT: EDT: EDT: cch323_run_passthru_msd: IPIPGW(36):event = H245_EVENT_MSD cch323_h245_connection_sm: state = 0 event=5 ccb=63C18580 cch323_h245_connection_sm: listen state=0 cch323_run_passthru_msd: IPIPGW(35):event = H245_EVENT_MS_IND cch323_h245_connection_sm: state = 2 event=5 ccb=631A4D68 cch323_h245_connection_sm: listen state=0 cch323_h245_cap_ind: IPIPGW(36): masks au=0x1 data=0xC uinp=0x32. cch323_run_h245_cap_in_sm:IPIPGW(36): got incoming CAPSET msg. cch323_do_transparent_cap_ind: IPIPGW(36):mask sent to other
The following lines show the outbound leg forwarding the TCS to the other leg and waiting for its response (TCSACK or TCSREJ):
Aug 8 15:24:30.678 EDT: cch323_run_h245_cap_in_sm:IPIPGW(36):suppressTCS: our TCS will be sent based on peer. Aug 8 15:24:30.678 EDT: cch323_h245_cap_notify:IPIPGW(36):not xmiting CAPSACK: wait for peer to ack. Aug 8 15:24:30.678 EDT: cch323_run_passthru_msd: IPIPGW(36):event = H245_EVENT_MSD Aug 8 15:24:30.678 EDT: cch323_caps_ind: IPIPGW(35):setting the mask to new : current mask=0x4FFFF new mask=0x1. Aug 8 15:24:30.682 EDT: cch323_caps_ind: IPIPGW(35): ExtendedCapsPresent Aug 8 15:24:30.682 caps struct Aug 8 15:24:30.682 dtmf-caps from caps Aug 8 15:24:30.682 caps:21:1:FFFFFFFF Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug 8 15:24:30.682 machine. Aug 8 15:24:30.682 Aug 8 15:24:30.682 codec(bytes)=21(0) EDT: cch323_set_dtmf_relay_mask: IPIPGW(35): extract dtmf-caps from EDT: cch323_set_dtmf_relay_mask: IPIPGW(35): After extracting structccb->user_caps.user_input_bit_mask[0x1C] EDT: cch323_prepare_preferred_codec_list: IPIPGW(35):munging EDT: EDT: EDT: EDT: EDT: cch323_prepare_preferred_codec_list: IPIPGW(35):final mask=1 cch323_peer_caps_ind_common:IPIPGW(35):starting 245 via tunnel cch323_h245_connection_sm: state = 0 event=1 ccb=63C18580 cch323_h245_connection_sm: listen state=0 cch323_h245_start_cap_sm: IPIPGW(35): starting the cap/msd
The following line shows the inbound call leg sending the TCS to the calling party:
Aug 8 15:24:30.682 operation=0x1. Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug 8 15:24:30.682 leg. EDT: cch323_send_generic_caps: IPIPGW:[trans]audio mask after EDT: EDT: EDT: EDT: EDT: EDT: EDT: EDT: cch323_run_passthru_msd: IPIPGW(35):event = H245_EVENT_MSD cch323_h245_connection_sm: state = 2 event=5 ccb=631A4D68 cch323_h245_connection_sm: listen state=0 cch323_run_passthru_msd: IPIPGW(36):event = H245_EVENT_MS_IND cch323_h245_connection_sm: state = 2 event=5 ccb=631A4D68 cch323_h245_connection_sm: listen state=0 cch323_run_h245_cap_out_sm: IPIPGW(36): got caps ack. cch323_run_h245_cap_out_sm:IPIPGW(36): sending caps ack to other
DB-2693
Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug 8 15:24:30.682 state mc. Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug 8 15:24:30.682 Aug Aug Aug
EDT: Function: cch323_do_caps_ack Line: 1116 EDT: cch323_run_passthru_msd: IPIPGW(35):event = H245_EVENT_MSD EDT: cch323_peer_caps_ack: IPIPGW(35):sending caps resp event to CAP EDT: EDT: EDT: EDT: cch323_h245_connection_sm: state = 2 event=5 ccb=631A4D68 cch323_h245_connection_sm: listen state=0 cch323_run_passthru_msd: IPIPGW(36):event = H245_EVENT_MS_CFM cch323_run_passthru_msd: IPIPGW(35):event = H245_EVENT_MS_DET_RSP
8 15:24:30.686 EDT: cch323_h245_connection_sm: state = 2 event=5 ccb=63C18580 8 15:24:30.686 EDT: cch323_h245_connection_sm: listen state=0 8 15:24:30.686 EDT: cch323_run_h245_cap_out_sm: IPIPGW(35): got caps ack.
The following line shows the inbound leg informing the outbound leg of the TCSACK:
Aug 8 15:24:30.686 leg. Aug 8 15:24:30.686 Aug 8 15:24:30.686 state mc. Aug 8 15:24:30.686 Aug 8 15:24:30.686 EDT: cch323_run_h245_cap_out_sm:IPIPGW(35): sending caps ack to other EDT: Function: cch323_do_caps_ack Line: 1116 EDT: cch323_peer_caps_ack: IPIPGW(36):sending caps resp event to CAP EDT: cch323_h245_connection_sm: state = 2 event=5 ccb=63C18580 EDT: cch323_h245_connection_sm: listen state=0
The following lines show that master-slave determination procedures are completed on both call legs:
Aug Aug 8 15:24:30.686 EDT: cch323_run_passthru_msd: IPIPGW(35):event = H245_EVENT_MS_CFM 8 15:24:30.686 EDT: cch323_run_passthru_msd: IPIPGW(36):event = H245_EVENT_MS_DET_RSP
DB-2694
December 2010
The debug voip ivr command is replaced by the debug voip application command. See the debug voip application command for more information.
DB-2695
The debug voip ivr all command is replaced by the debug voip application all command. See the debug voip application all command for more information.
DB-2696
December 2010
The debug voip ivr applib command is replaced by the debug voip application core command. See the debug voip application core command for more information.
DB-2697
The debug voip ivr callset command is replaced by the debug voip application callset command. See the debug voip application callset command for more information.
DB-2698
December 2010
The debug voip ivr digitcollect command is replaced by the debug voip application digitcollect command. See the debug voip application digitcollect command for more information.
DB-2699
The debug voip ivr dynamic command is replaced by the debug voip application media state command. See the debug voip application media state command for more information.
DB-2700
December 2010
The debug voip ivr error command is replaced by the debug voip application error command. See the debug voip application error command for more information.
DB-2701
The debug voip ivr redirect command is replaced by the debug voip application redirect command. See the debug voip application redirect command for more information.
DB-2702
December 2010
The debug voip ivr script command is replaced by the debug voip application script command. See the debug voip application script command for more information.
DB-2703
The debug voip ivr settlement command is replaced by the debug voip application settlement command. See the debug voip application settlement command for more information.
DB-2704
December 2010
The debug voip ivr states command is replaced by the debug voip application media state command. See the debug voip application media state command for more information.
DB-2705
The debug voip ivr supplementary-service command is replaced by the debug voip application supplementary-service command. See the debug voip application supplementary-service command for more information.
DB-2706
December 2010
The debug voip ivr tclcommands command is replaced by the debug voip application tclcommands command. See the debug voip application tclcommands command for more information.
DB-2707
Syntax Description
(Optional) Enables all LPCOR debugging. (Optional) Enables error, function, and inout debugging. This is the default option if no keywords are used. (Optional) Enables detailed trace messages of the LPCOR subsystem. (Optional) Enables LPCOR major call and software error debugging. (Optional) Enables major call error debugging. (Optional) Enables major software error debugging. (Optional) Enables tracing of the functions called by the LPCOR subsystem. (Optional) Enables function in and out debugging.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 15.1(1)T.
Usage Guidelines
Examples
The following is sample output from the debug voip lpcor command for a call between two phones that was blocked by LPCOR policy validation:
*Jun 25 09:52:18.910: //-1/xxxxxxxxxxxx/LPCOR/lpcor_get_index_by_name: lpcor local_sccp_phone_1 *Jun 25 09:52:18.910: //-1/xxxxxxxxxxxx/LPCOR/lpcor_get_index_by_name: lpcor local_sccp_phone_1 index 1 *Jun 25 09:52:20.114: //-1/xxxxxxxxxxxx/LPCOR/lpcor_get_index_by_peer: peer tag 20003, direction 1 *Jun 25 09:52:20.114: //-1/xxxxxxxxxxxx/LPCOR/lpcor_get_index_by_name: lpcor local_sccp_phone_2 *Jun 25 09:52:20.114: //-1/xxxxxxxxxxxx/LPCOR/lpcor_get_index_by_name: lpcor local_sccp_phone_2 index 2 *Jun 25 09:52:20.114: //-1/xxxxxxxxxxxx/LPCOR/lpcor_get_index_by_peer: Return Lpcor Index 2 for Peer Tag 20003 *Jun 25 09:52:20.114: //-1/xxxxxxxxxxxx/LPCOR/lpcor_index_is_valid: lpcor index 1 is valid
DB-2708
December 2010
*Jun 25 09:52:20.114: //-1/xxxxxxxxxxxx/LPCOR/lpcor_policy_validate: Source LPCOR Index=1, Target LPCOR Policy=local_sccp_phone_2 -Traceback= 0x42949584 0x4219C430 0x4219CCDC 0x421A6B60 0x421A6D1C 0x421A75EC 0x421AB328 0x421ACA14 0x421B2518 0x421B2FFC 0x421B7614 0x4217F910 0x421F522C 0x421F89CC 0x421D84FC 0x422033BC *Jun 25 09:52:20.118: //-1/xxxxxxxxxxxx/LPCOR/lpcor_policy_validate: Validate Fail; lpcor (source[1] target[2])
Related Commands
Description Displays debugging information for calls using the LPCOR feature.
debug voip application Enables debugging of the LPCOR application system. lpcor show voice lpcor policy Displays the LPCOR policy for the specified resource group. voice lpcor enable voice lpcor policy Enables LPCOR functionality on the Cisco Unified CME router. Creates a LPCOR policy for a resource group.
DB-2709
Syntax Description
Enables the following set of debugs for an onramp or offramp fax mail call:
debug csm voice debug fax dmsp all debug fax fmsp all debug fax foip all debug fax mmoip aaa all debug fax mspi all debug fax mta all debug isdn q931 debug voip application all debug voip application vxml all debug voip ccapi all debug voip dsm all debug voip dspapi all debug voip hpi all debug voip ivr all debug voip vtsp all
DB-2710
December 2010
The following debug commands are enabled for access servers with MICA modem cards:
debug fax fmsp all debug fax mmoip aaa debug fax mta all debug isdn q931 debug voip application all debug voip application vxml all debug voip ccapi all debug voip dsm all debug voip dspapi all debug voip hpi all debug voip ivr all debug voip vtsp all
The following debug options are enabled for access servers with universal port dial feature cards:
debug fax dmsp all debug fax fmsp all debug fax foip all debug fax mspi all debug voip application vxml all debug voip ivr all
relay application
Enables the debug fax relay t30 all-level-1 and the sets specified by either the application or signaling keyword. Enables the following set of debugs for fax relay applications:
debug voip application all debug voip application vxml all debug voip ccapi all debug voip dialpeer all debug voip ivr all
DB-2711
signaling
debug cch323 all debug ccsip error debug ccsip messages debug cdapi detail debug cdapi events debug csm voice debug gtd error debug gtd events debug h225 asn1 debug h225 events debug h225 q931 debug h245 events debug h245 asn1 debug isdn q931 debug mgcp errors debug mgcp events debug mgcp media debug mgcp packets debug mgcp voipcac debug rtpspi all debug voip ccapi all debug voip dsm all debug voip dspapi all debug voip hpi all debug voip rawmsg debug voip tsp all debug voip vtsp all
Defaults
Command Modes
Privileged EXEC
DB-2712
December 2010
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug voip profile fax command can be used to use a set of debug commands at one time. Because this command generates a large amount of messages, router performance can be affected.
Caution
The debug voip profile fax command generates debug messages from many VoIP components. The number of messages can impact the performance of your router. This command should only be used during low traffic periods.
Examples
Related Commands
Command debug voip profile help debug voip profile modem debug voip profile voice
Description Displays the sets of commands supported by the debug voip profile commands. Enables a set of debug commands for modem applications. Enables a set of debug commands for voice.
DB-2713
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug voip profile help command displays the sets of debug commands supported by the debug voip profile commands. It does not display any debug output.
Examples
The following is sample output from the debug voip profile help command:
Router# debug voip profile help "debug voip profile modem relay signaling" includes: debug csm voice debug isdn q931 debug cdapi detail debug cdapi events debug voip dspapi all debug voip hpi all debug voip vtsp all debug voip tsp all debug voip ccapi all debug cch323 all debug ccsip error debug ccsip messages debug mgcp errors debug mgcp events debug mgcp media debug mgcp packets debug mgcp voipcac debug voip dsm all "debug voip profile voice application" includes: debug voip dialpeer all debug voip ccapi all debug voip ivr all debug voip application all debug voip application vxml all
DB-2714
December 2010
"debug voip profile [ voice | modem pass-through ] signaling" includes: debug csm voice debug isdn q931 debug cdapi detail debug cdapi events debug h225 asn1 debug h225 events debug h225 q931 debug h245 events debug h245 asn1 debug voip dspapi all debug voip hpi all debug voip vtsp all debug voip tsp all debug voip ccapi all debug cch323 all debug rtpspi all debug ccsip error debug ccsip messages debug mgcp errors debug mgcp events debug mgcp media debug mgcp packets debug mgcp voipcac debug voip rawmsg debug gtd error debug gtd events debug voip dsm all "debug voip profile fax mail" includes: debug csm voice debug isdn q931 debug voip dspapi all debug voip hpi all debug voip vtsp all debug voip ccapi all debug voip ivr all debug voip application all debug voip application vxml all debug fmail client debug fmail server debug fax mta all debug fax receive all debug fax send all debug text-to-fax debug tiff reader debug tiff writer debug fax mmoip aaa debug voip dsm all "debug voip profile fax relay application" includes: debug voip dialpeer all debug voip ccapi all debug voip ivr all debug voip application all debug voip application vxml all "debug voip profile fax relay signaling" includes: debug csm voice debug isdn q931 debug cdapi detail debug cdapi events debug h225 asn1
DB-2715
debug debug debug debug debug debug debug debug debug debug debug debug debug debug debug debug debug debug debug debug debug
h225 events h225 q931 h245 events h245 asn1 voip dspapi all voip hpi all voip vtsp all voip tsp all voip ccapi all cch323 all rtpspi all ccsip error ccsip messages mgcp errors mgcp events mgcp media mgcp packets mgcp voipcac voip rawmsg gtd error gtd events
Related Commands
Command debug voip profile fax debug voip profile modem debug voip profile voice
Description Enables a set of debug commands for fax applications. Enables a set of debug commands for modem applications. Enables a set of debug commands for voice.
DB-2716
December 2010
Syntax Description
pass-through signaling Enables the following set of debugs for modem pass-through signaling:
debug cch323 all debug ccsip error all debug ccsip messages debug cdapi detail debug cdapi events debug csm voice debug gtd error debug gtd events debug h225 asn1 debug h225 events debug h225 q931 debug isdn q931 debug mgsp errors all debug mgcp events debug mgcp media debug mgcp packets debug mgcp voipcac debug rtpspi all debug voip ccapi all debug voip dsm all debug voip rawmsg debug voip tsp all debug voip vtsp all debug vpm all
DB-2717
relay signaling
debug voip ccapi all debug voip vtsp all debug cch323 all debug ccsip error debug ccsip messages all debug mgcp all debug mgcp events debug mgcp media debug mgcp packets debug mgcp voipcac all debug isdn q931
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug voip profile modem command can be used to use a set of debug commands at one time. Because this command causes a large amount of messages to be generated, router performance can be affected.
Caution
The debug voip profile modem command generates debug messages from many VoIP components, which generates a large number of debug messages. The number of messages can affect the performance of your router. This command should only be used during low traffic periods.
Examples
DB-2718
December 2010
Related Commands
Command debug voip profile fax debug voip profile help debug voip profile voice
Description Enables a set of debug commands for fax applications. Displays the sets of commands supported by the debug voip profile commands. Enables a set of debug commands for voice.
DB-2719
Syntax Description
application
debug voip applib debug voip application vxml all debug voip ccapi all debug voip ivr all debug cch323 all debug ccsip error all debug ccsip messages debug cdapi detail debug cdapi events debug csm voice debug gtd error debug gtd events debug h225 asn1 debug h225 events debug h225 q931 debug isdn q931 debug mgsp errors all debug mgcp events debug mgcp media debug mgcp packets debug mgcp voipcac debug rtpspi all debug voip ccapi all debug voip dsm all debug voip rawmsg debug voip tsp all debug voip vtsp all debug vpm all
signaling
DB-2720
December 2010
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug voip profile voice command can be used to use a set of debug commands at one time. Because this command causes a large amount of messages to be generated, router performance can be affected.
Caution
The debug voip profile voice command generates debug messages from many VoIP components, which generates a large number of debug messages. The number of messages can impact the performance of your router. This command should only be used during low traffic periods.
Examples
Related Commands
Command debug voip profile fax debug voip profile help debug voip profile modem
Description Enables a set of debug commands for fax applications. Displays the sets of commands supported by the debug voip profile commands. Enables a set of debug commands for modem applications.
DB-2721
Syntax Description
detail
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The new debug header was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, Cisco 3640, and Cisco 3660; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following universal access servers: Cisco AS5300 and Cisco AS5800; and on the Cisco MC3810 multiservice access concentrators. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
We recommend that you log output from the debug voip rawmsg command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Examples
The following is sample output from the debug voip rawmsg command:
Router# debug voip rawmsg voip rawmsg debugging is on Router# *Mar 1 01:16:25.155: //-1/xxxxxxxxxxxx/CCAPI/ccAllocRawMsgInfo: VoIP Raw Msg Al loc from 1, Length 18 Body 638E0C5
These debug messages show that a raw message is allocated for this call. The pointer to the memory location for this raw message is 63075164.
*Mar 1 01:16:25.155: //-1/xxxxxxxxxxxx/CCAPI/ccAllocRawMsgInfo: Raw Message ALL OCATED: ptr is 63075164, owner is 1, length is 18, msg is 638E0C54, type is 0, p rotocol id is 0
DB-2722
December 2010
The call control API (CCAPI) gets a setup indicator. It has no information about the callid (-1) and GUID (xxxxxxxxxxxx).
*Mar 1 01:16:25.159: //-1/xxxxxxxxxxxx/CCAPI/cc_api_call_setup_ind:
*Mar 1 01:16:25.159: Raw Message MaMa is TSP owner is CCAPI, length is 77, ptr is 63075164, type is 0, protocol id is 2
The SSAPP at this stage knows about the CallEntry ID (30) but not about GUID (xxxxxxxxx) or the dial-peer (-1).
*Mar 1 01:16:25.163: //30/xxxxxxxxxxxx/SSAPP:-1:-1/ssaCallSetupInd: *Mar 1 01:16:25.163: Raw Message MaMa is TSP owner is SSAPP, length is 77, ptr is 63075164, type is 0, protocol id is 2
The SSAPP learns about the GUID (34C457CD802F) and also learns the incoming dial peer (10002).
*Mar 1 01:16:25.163: //30/34C457CD802F/SSAPP:10002:-1/ssaSetupPeer: *Mar 1 01:16:25.163: Raw Message MaMa is TSP owner is SSAPP, length is 77, ptr is 63075164, type is 0, protocol id is 2
The CCAPI gets the call proceeding for CallEntry ID 30. CCAPI still does not have a GUID (xxxxxxxxxxx).
*Mar 1 01:16:25.163: //30/xxxxxxxxxxxx/CCAPI/ccCallProceeding:
A new raw message buffer is created and the previous one is released.
*Mar 1 01:16:25.163: //-1/xxxxxxxxxxxx/CCAPI/ccAllocRawMsgInfo: VoIP Raw Msg Al loc from 10, Length 77 Body 0 *Mar 1 01:16:25.167: //-1/xxxxxxxxxxxx/CCAPI/ccAllocRawMsgInfo: Raw Message ALL OCATED: ptr is 630751EC, owner is 10, length is 77, msg is 638E0F0C, type is 0, protocol id is 0 *Mar 1 01:16:25.167: //30/34C457CD802F/SSAPP:10002:-1/ssaSetupPeer: *Mar 1 01:16:25.167: ssaSetupPeer: Saved rawmsgpp 630751EC len 77 IAM, GCI,34c457cd14f911cc802f95f5fabb6b0f?)??p?34999 *Mar 1 01:16:25.167: //30/xxxxxxxxxxxx/CCAPI/ccCallSetupRequest: *Mar 1 01:16:25.167: Raw Message MaMa is TSP owner is SSAPP, length is 77, ptr is 63075164, type is 0, protocol id is 2 *Mar 1 01:16:25.167: //-1/xxxxxxxxxxxx/CCAPI/ccIFCallSetupRequestPrivate: *Mar 1 01:16:25.167: Raw Message MaMa is TSP owner is SSAPP, length is 77, ptr is 63075164, type is 0, protocol id is 2
The SSAPP gets a message indicating the digits were passed along the VoIP call leg to the terminating gateway. The CallEntry ID is 30, GUID is 34C457CD802F and the incoming dial peer is 10002.
*Mar 1 01:16:25.167: //30/34C457CD802F/SSAPP:10002:-1/ssaReportDigitsDone:
The old raw message 63075164 was freed. The new one is 630751EC. *Mar 1 01:16:25.179: //-1/xxxxxxxxxxxx/CCAPI/ccFreeRawMsgInfo: Router#Raw Message FREED: ptr is 63075164, owner is 3, length is 4D, msg is 638E 0DB0, type is 0, protocol id is 2
CCAPI got a call proceeding on the second call leg (31); it has no information about the GUID (xxxxxxxxx).
*Mar 1 01:16:25.223: //31/xxxxxxxxxxxx/CCAPI/cc_api_call_proceeding:
CCAPI got a call alert on the second call leg (31); still no information about the GUID (xxxxxxxxx).
*Mar 1 01:16:25.227: //31/xxxxxxxxxxxx/CCAPI/cc_api_call_alert:
DB-2723
The alert is sent to the first call leg (30), GUID 34C457CD802F.
*Mar 1 01:16:25.227: //30/34C457CD802F/SSAPP:10002:-1/ssaAlert: *Mar 1 01:16:25.227: //30/xxxxxxxxxxxx/CCAPI/ccCallAlert: The call is answered at this point and the CCAPI gets a call connect for the second call leg (CallEntry ID is 31; GUID is xxxxxxxxx). *Mar 1 01:16:40.975: //31/xxxxxxxxxxxx/CCAPI/cc_api_call_connected:
The call connect is sent to the first call leg (30), GUID 34C457CD802F.
*Mar *Mar 1 01:16:40.975: //30/34C457CD802F/SSAPP:10002:-1/ssaConnect: 1 01:16:40.975: //30/xxxxxxxxxxxx/CCAPI/ccCallConnect:
The current raw message (ptr 630751EC) is released; a new one will be proclaimed when needed.
*Mar 1 01:16:40.975: //-1/xxxxxxxxxxxx/CCAPI/ccFreeRawMsgInfo: Raw Message FREE D: ptr is 630751EC, owner is 10, length is 4D, msg is 638E0F0C, type is 0, protocol id is 2
The call terminates now. CCAPI detects a call disconnect from the first call leg (30) with no GUID (xxxxxxxxx).
*Mar 1 01:17:04.007: //30/xxxxxxxxxxxx/CCAPI/cc_api_call_disconnected: *Mar 1 01:17:04.007: Raw Message MaMa is TSP owner is CCAPI, length is 4, ptr i s 63075274, type is 0, protocol id is 2
The disconnect is sent to the first call leg (30), GUID (34C457CD802F).
*Mar 1 01:17:04.011: //30/34C457CD802F/SSAPP:10002:14/ssaDisconnected: *Mar 1 01:17:04.011: Raw Message MaMa is TSP owner is SSAPP, length is 4, ptr i s 63075274, type is 0, protocol id is 2
The CCAPI disconnects both call legs (incoming 30 and outgoing 31).
*Mar 1 01:17:04.011: //30/xxxxxxxxxxxx/CCAPI/ccCallDisconnect: *Mar 1 01:17:04.011: //31/xxxxxxxxxxxx/CCAPI/ccCallDisconnect: *Mar 1 01:17:04.011: Raw Message MaMa is TSP owner is SSAPP, length is 4, ptr i s 63075274, type is 0, protocol id is 2
The following example shows output when you use the debug voip rawmsg detail command. This example shows that the CCAPI layer received an indication for call setup. The detailed raw message dumps the hex of the message. This output is used to track down data pointing to different variables within the software modules.
Router# debug voip rawmsg detail *Mar 6 17:03:24.169://-1/xxxxxxxxxxxx/CCAPI/ccAllocRawMsgInfo:VoIP Raw Msg Al loc from 5, Length 0 Body 0 *Mar 6 17:03:24.173://-1/xxxxxxxxxxxx/CCAPI/cc_api_call_setup_ind: *Mar 6 17:03:24.173:Raw Message MaMa is CCAPI owner is CCAPI, length is 59, ptr is 63045C14, type is 0, protocol id is 18 *Mar 6 17:03:24.173:Raw Message is :1C 39 9E 01 00 03 67 74 64 00 00 00 2E 49
DB-2724
December 2010
41 4D 2C 0D 0A 47 43 49 2C 35 33 39 61 30 35 39 64 31 39 36 62 31 31 63 63 38 3 9 30 63 39 30 37 65 31 65 31 37 35 61 34 37 0D 0A 0D 0A
Related Commands
Description Displays information about the call distributor application programming interface. Displays information about the telephony service provider. Allows configuration of the voice call debug output.
DB-2725
Syntax Description
Prints out a trace for error cases. Provides debug output for RTCP packets. Provides all session debug information.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was implemented on the Cisco AS5300, Cisco AS5400, and Cisco AS5850. This command was implemented on the Cisco 1751 and Cisco 1760. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
When used without a keyword, this command turns on debugging for all events. This command severely impacts performance; use with caution.
Examples
The following is sample output from the debug voip rtcp command:
Router# debug voip rtcp 1w0d: voip_rtcp_create_session: callID=37, dstCallID=36 laddr=172.19.169.85, lp0 1w0d: voip_rtcp_get_cname: [email protected] 1w0d: voip_rtcp_send_event: event=EV_NEW 1w0d: voip_rtcp_new: rtcp_interval=1893 Router# 1w0d: voip_rtcp_send_event: event=EV_STATS 1w0d: voip_rtcp_stats_req: rtcp_interval=3448 1w0d: voip_rtcp_stats_req:delay=45 lost_packets=0 rtt=0 Router# 1w0d: recv: 1w0d: SR: ssrc=0x1272A94D sr_ntp_h=0xAF44E045 sr_ntp_l=0xA6CE39C sr_timestamp=02 1w0d: SDES: ssrc=0x1272A94D name=1 len=19 [email protected]
DB-2726
December 2010
1w0d: rtcp_round_trip_delay: ssrc=0x1D86A955 Router# 1w0d: voip_rtcp_send_event: event=EV_STATS 1w0d: voip_rtcp_stats_req: rtcp_interval=6394 1w0d: voip_rtcp_stats_req:delay=40 lost_packets=0 rtt=0 1w0d: recv: 1w0d: SR: ssrc=0x1272A94D sr_ntp_h=0xAF44E047 sr_ntp_l=0xFFB007F6 sr_timestamp=6 1w0d: SDES: ssrc=0x1272A94D name=1 len=19 [email protected] 1w0d: rtcp_round_trip_delay: ssrc=0x1D86A955 Router# 1w0d: voip_rtcp_remove_ccb 1w0d: voip_rtcp_send_event: event=EV_DESTROY 1w0d: voip_rtcp_destroy_idle 1w0d: voip_rtcp_close_session 1w0d: Cleaning up sess=62F95F58, sp=19544, dp=17130
DB-2727
Syntax Description
error session conference dtmf-relay event multicast named-event nse text-relay packet callid id-number packet-number
Prints out a trace for error cases. Provides all session debug information. If used with a keyword, supplies more specific debug information according to the keywords used. (Optional) Provides debug information for conference packets. (Optional) Provides debug information for dual-tone multifrequency (DTMF) packets. (Optional) Enables VoIP RTP session generic event debugging trace. (Optional) Provides debug information for multicast packets. (Optional) Provides debug information for named telephony event (NTE) packets. (Optional) Provides debug information for named signaling events (NSEs). (Optional) Provides debug information for text-relay packets. Enables VoIP RTP packet debugging trace. (Optional) Provides debug information for a specific call ID number (obtained by using the show voip rtp connections command). The packet-number argument specifies the number of packets to trace so that the display is not flooded. (Optional) Provides debug information for a remote IP address and RTP port number. The packet-number argument specifies the number of packets to trace so that the display is not flooded.
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(8)T. This command was implemented on the Cisco AS5300, Cisco AS5400, and Cisco AS5850. This command was implemented on the Cisco 1751 and Cisco 1760.
DB-2728
December 2010
Modification The text-relay keyword was added. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command severely impacts performance and should be used only for single-call debug capture.
Examples
The following example shows debugging output for the debug voip rtp session named-event command. The example is for a gateway that sends digits 1, 2, 3, then receives digits 9,8,7. The payload type, event ID, and additional packet payload are shown in each log. The first three packets indicate the start of the tone (initial packet and two redundant). The last three packets indicate the end of the tone (initial packet and two redundant). The packets in between are refresh packets that are sent every 50 milliseconds (without redundancy).
Router# debug voip rtp session named-event 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:29: 00:09:30: 00:09:30: 00:09:30: 00:09:30: 00:09:30: 00:09:30: 00:09:30: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Evt:1 Evt:1 Evt:1 Evt:1 Evt:1 Evt:1 Evt:1 Evt:1 Evt:1 Evt:2 Evt:2 Evt:2 Evt:2 Evt:2 Evt:2 Evt:2 Evt:2 Evt:2 Evt:3 Evt:3 Evt:3 Evt:3 Evt:3 Evt:3 Evt:3 Evt:3 Evt:3 Evt:3 Evt:9 Evt:9 Evt:9 Evt:9 Evt:9 Evt:9 Evt:9 Evt:9 Evt:9 Evt:9 Evt:8 Pkt:03 Pkt:03 Pkt:03 Pkt:03 Pkt:03 Pkt:03 Pkt:83 Pkt:83 Pkt:83 Pkt:03 Pkt:03 Pkt:03 Pkt:03 Pkt:03 Pkt:03 Pkt:83 Pkt:83 Pkt:83 Pkt:03 Pkt:03 Pkt:03 Pkt:03 Pkt:03 Pkt:03 Pkt:03 Pkt:83 Pkt:83 Pkt:83 Pkt:02 Pkt:02 Pkt:02 Pkt:02 Pkt:02 Pkt:02 Pkt:02 Pkt:82 Pkt:82 Pkt:82 Pkt:02 00 00 00 01 03 04 04 04 04 00 00 00 01 03 04 05 05 05 00 00 00 01 03 04 06 06 06 06 00 00 00 01 03 04 06 06 06 06 00 00 00 00 90 20 B0 C8 C8 C8 00 00 00 90 20 B0 18 18 18 00 00 00 90 20 B0 40 80 80 80 00 00 00 90 20 B0 40 58 58 58 00 <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv> <<<Rcv>
<Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>>
DB-2729
00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:31: 00:09:32: 00:09:32: 00:09:32: 00:09:32:
<Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>> <Snd>>>
Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99 Pt:99
Evt:8 Evt:8 Evt:8 Evt:8 Evt:8 Evt:8 Evt:8 Evt:8 Evt:8 Evt:7 Evt:7 Evt:7 Evt:7 Evt:7 Evt:7 Evt:7 Evt:7 Evt:7 Evt:7
Pkt:02 Pkt:02 Pkt:02 Pkt:02 Pkt:02 Pkt:02 Pkt:82 Pkt:82 Pkt:82 Pkt:02 Pkt:02 Pkt:02 Pkt:02 Pkt:02 Pkt:02 Pkt:02 Pkt:82 Pkt:82 Pkt:82
00 00 01 03 04 06 06 06 06 00 00 00 01 03 04 06 06 06 06
00 00 90 20 B0 40 90 90 90 00 00 00 90 20 B0 40 58 58 58
The following example shows debugging output for the debug voip rtp session text-relay command:
Router# debug voip rtp session text-relay Pt:119 Evt:0 4 247 37 128 Cnt:F7 4B <Snd>>>
Related Commands
Description Configures the system-wide protocol type for text packets transmitted between gateways. Configures the RTP payload type and redundancy level.
DB-2730
December 2010
Syntax Description
(Optional) Displays all entrances. (Optional) Displays information only if an error occurs. (Optional) Displays all exits. (Optional) Displays the details on the code flow of each transaction. (Optional) Displays network connectivity data. (Optional) Displays security and encryption errors. (Optional) Displays transaction information.
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug voip settlement all command enables the following debug settlement commands:
debug voip settlement enter debug voip settlement error debug voip settlement exit debug voip settlement misc debug voip settlement network debug voip settlement security debug voip settlement transaction
DB-2731
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug voip settlement enter command:
Router# debug voip settlement enter 00:43:40:OSP:ENTER:OSPPMimeMessageCreate() 00:43:40:OSP:ENTER:OSPPMimeMessageInit() 00:43:40:OSP:ENTER:OSPPMimeMessageSetContentAndLength() 00:43:40:OSP:ENTER:OSPPMimeMessageBuild() 00:43:40:OSP:ENTER:OSPPMimeDataFree() 00:43:40:OSP:ENTER:OSPPMimePartFree() 00:43:40:OSP:ENTER:OSPPMimePartFree() 00:43:40:OSP:ENTER:OSPPMsgInfoAssignRequestMsg() 00:43:40:OSP:ENTER:osppHttpSelectConnection 00:43:40:OSP:ENTER:OSPPSockCheckServicePoint() ospvConnected = <1> 00:43:40:OSP:ENTER:OSPPSockWaitTillReady() 00:43:40:OSP:ENTER:osppHttpBuildMsg() 00:43:40:OSP:ENTER:OSPPSSLSessionWrite() 00:43:40:OSP:ENTER:OSPPSockWrite() 00:43:40:OSP:ENTER:OSPPSockWaitTillReady()
DB-2732
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug voip settlement error command:
Router# debug voip settlement error 00:45:50:OSP:OSPPSockProcessRequest:http recv init header failed 00:45:50:OSP:osppHttpSetupAndMonitor:attempt#0 on http=0x6141A514, limit=1 error=14310
Usage Guidelines
DB-2733
11060:OSP 11070:OSP 11080:OSP 11090:OSP 11100:OSP 11110:OSP 11120:OSP 11130:OSP 11140:OSP 11150:OSP 11160:OSP 11170:OSP 11180:OSP 11190:OSP 11200:OSP 11210:OSP 11220:OSP 11230:OSP 11240:OSP 11250:OSP 11260:OSP 11270:OSP 11280:OSP 11290:OSP 11300:OSP 11310:OSP 11320:OSP 11330:OSP 11340:OSP 11350:OSP 11360:OSP 11370:OSP 11380:OSP 11390:OSP 11400:OSP 11410:OSP 11420:OSP 11430:OSP 11440:OSP 11450:OSP 11460:OSP 11470:OSP 12010:OSP 12020:OSP 12030:OSP 12040:OSP 12050:OSP 12060:OSP 12065:OSP 12070:OSP 12080:OSP 12090:OSP 12100:OSP 12110:OSP 12120:OSP 12130:OSP 12140:OSP 12150:OSP 12160:OSP 12170:OSP 12180:OSP 12190:OSP
transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction transaction security security security security security security security security security security security security security security security security security security security security
failed (possibly ran out) to allocate memory. tried to perform a transaction which is not allowed. found no more responses. could not find a specified value. did not have enough space to copy. - call id did not match destination. encountered an invalid entry. tried to use a token too soon. tried to use a token too late. - source is invalid. - destination is invalid. - calling number is invalid. - called number is invalid. - call id is invalid. - authentication id is invalid. - call id was not found - The IDS of the called number was invalid. - function not implemented. tried to access an invalid handle. returned an invalid return code. reported an invalid status code. encountered an invalid token. reported a status which could not be identified. in now valid after it was not found. could not find the specified destination. is valid until not found. - invalid signaling address. could not find the ID of the transmitter. could not find the source number. could not find the destination number. could not find the token. could not find the list. was not allowed to accumulate. - transaction usage was already reported. could not find statistics. failed to create new statistics. made an invalid calculation. was not allowed to get the destination. could not fine the authorization request. - invalid transmitter ID. could not find any data. found no new authorization requests.
did not have enough space to copy. received and invalid argument. could not find the private key. encountered an un-implemented function. ran out of memory. received an invalid signal. could not initialize the SSL database. could not find space for the certificate. has no local certificate info defined. encountered a zero length certificate. encountered a certificate that is too big. encountered an invalid certificate. encountered a NULL certificate. has too many certificates. has no storage provided. has no private key. encountered an invalid context. was unable to allocate space. - CA certificates do not match. found no authority certificates
DB-2734
December 2010
12200:OSP security - CA certificate index overflow. 13010:OSP error message - failed to allocate memory. 13110:OSP 13115:OSP 13120:OSP 13125:OSP 13130:OSP 13135:OSP 13140:OSP 13145:OSP 13150:OSP 13155:OSP 13160:OSP 13165:OSP 13170:OSP 13301:OSP 13302:OSP 13303:OSP 13304:OSP 13305:OSP 13306:OSP 13307:OSP 13308:OSP 13309:OSP 13310:OSP 13311:OSP 13312:OSP 13313:OSP 13314:OSP 13315:OSP 13316:OSP 13317:OSP 13318:OSP 13319:OSP 13320:OSP 13410:OSP 13415:OSP 13420:OSP 13425:OSP 13430:OSP 13435:OSP 13440:OSP 13445:OSP 13450:OSP 13455:OSP 13460:OSP 13465:OSP 13470:OSP 13475:OSP 13480:OSP 13485:OSP 13490:OSP 13500:OSP 13510:OSP 13520:OSP 13610:OSP MIME MIME MIME MIME MIME MIME MIME MIME MIME MIME MIME MIME MIME XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML data data data data data data data data data data data data data data data data data error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error buffer is too small. failed to allocate memory. could not find variable. no input was found. invalid argument. no more space. received an invalid type. received an invalid subtype. could not find the specified protocol. could not find MICALG. boundary was not found. content type was not found. message parts were not found. received incomplete XML data. bad encoding of XML data. bad entity in XML data. bad name in XML data. bad tag in XML data. bad attribute in XML data. bad CID encoding in XML data. bad element found in XML data. no element found in XML data. no attribute found in XML data. OSP received invalid arguments. failed to create a new buffer. failed to get the size of a buffer. failed to send the buffer. failed to read a block from the buffer. failed to allocate memory. could not find the parent. could not find the child. data type not found in XML data. failed to write a clock to the buffer. no call id preset. no token present. bad number presented. no destination found. no usage indicator present. no status present. no usage configured. no authentication indicator. no authentication request. no authentication response. no authentication configuration. no re-authentication request. no re-authentication response. invalid data type present. no usage information available. no token info present. invalid data present.
data error - no alternative info present. data error - no statistics available. data error - no delay present. certificate error - memory allocation failed.
DB-2735
14020:OSP 14030:OSP 14040:OSP 14050:OSP 14060:OSP 14070:OSP 14080:OSP 14085:OSP 14086:OSP 14110:OSP 14120:OSP 14130:OSP 14140:OSP 14210:OSP 14220:OSP 14221:OSP 14222:OSP 14223:OSP 14230:OSP 14240:OSP 14250:OSP 14260:OSP 14270:OSP 14280:OSP 14290:OSP 14292:OSP 14295:OSP 14297:OSP 14300:OSP 14310:OSP 14315:OSP 14320:OSP 14320:OSP 14330:OSP 14340:OSP 14350:OSP 14360:OSP 14370:OSP 14400:OSP 14410:OSP 14420:OSP 14430:OSP 14440:OSP 14450:OSP 14460:OSP 14470:OSP 14480:OSP 14490:OSP 14495:OSP 14496:OSP 14497:OSP 14498:OSP 14499:OSP 15410:OSP 15420:OSP 15430:OSP 15440:OSP 15450:OSP
communications communications communications communications communications communications communications communications communications message message message message HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP queue queue queue queue -
error error error error error error error error error error error error error -
bad communication value. parser error. no more memory available. communication channel currently in use. invalid argument passed. no service points present. no service points available. thread initialization failed. communications is shutdown. no more memory available. failed to add a request. no event queue present. invalid arguments passed.
error error error error error error error error error error error error error error error
100 - bad header. 200 - bad header. 400 - bad request. bas service port present. failed to add a request. invalid queue present. bad message received. invalid argument passed. memory allocation failed. failed to create a new connection. server error. HTTP server is shutdown. failed to create a new SSL connection. failed to create a new SSL context. service unavailable. socket socket socket failed socket failed failed failed failed failed select failed. receive failed. send failed. to allocate memory for the receive buffer. reset. to create the socket. to close the socket. to connect the socket. to block I/O on the socket. to disable nagle on the socket.
socket socket socket socket socket socket socket socket socket socket SSL SSL SSL SSL SSL SSL SSL SSL SSL SSL SSL SSL SSL SSL SSL
error error error error error error error error error error -
error error error error error error error error error error error error error error error
failed to allocate memory. failed to initialize the context. failed to retrieve the version. failed to initialize the session. failed to attach the socket. handshake failed. failed to close SSL. failed to read from SSL. failed to write to SSL. could not get certificate. no root certificate found. failed to set the private key. failed to parse the private key. failed to add certificates. failed to add DN. not enough space for copy. no time stamp has been created. value not found. failed to allocate memory. invalid argument passed.
DB-2736
December 2010
15500:OSP buffer error - buffer is empty. 15510:OSP buffer error - buffer is incomplete. 15980:OSP POW error. 15990:OSP Operating system conditional variable timeout. 16010:OSP 16020:OSP 16030:OSP 16040:OSP 16050:OSP 16060:OSP 16070:OSP 16080:OSP 17010:OSP 17020:OSP 17030:OSP 17040:OSP 17050:OSP 18010:OSP 18020:OSP 18020:OSP 18030:OSP 18040:OSP 18050:OSP 19010:OSP 19020:OSP 19030:OSP 19040:OSP 19050:OSP 19060:OSP 19070:OSP 19080:OSP 19090:OSP 19100:OSP 19110:OSP 19120:OSP 19130:OSP 19140:OSP 19150:OSP 19160:OSP 19170:OSP 19180:OSP 19190:OSP 20010:OSP 20020:OSP 20030:OSP 20040:OSP 20050:OSP 20060:OSP 21010:OSP 21020:OSP 21030:OSP 21040:OSP 21050:OSP X509 X509 X509 X509 X509 X509 X509 X509 PKCS1 PKCS1 PKCS1 PKCS1 PKCS1 PKCS7 PKCS7 PKCS7 PKCS7 PKCS7 PKCS7 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 ASN1 error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error error serial number undefined. certificate undefined. invalid context. decoding error. unable to allocate space. invalid data present. certificate has expired. certificate not found. tried to access invalid private key pointer unable to allocate space. invalid context found. tried to access NULL pointer. private key overflow. signer missing. invalid signature found. unable to allocate space. encoding error. tried to access invalid pointer. buffer overflow. tried to access NULL pointer. invalid element tag found. unexpected high tag found. invalid primitive tag found. unable to allocate space. invalid context found. invalid time found. parser error occurred. parsing complete. parsing defaulted. length overflow. unsupported tag found. object ID not found. object ID mismatch. unexpected int base. buffer overflow. invalid data reference ID found. no content value for element found. integer overflow. invalid parameters found. unable to allocate space. could not verify signature. implementation specific error. tried to access invalid pointer. not enough space to perform operation. invalid private key pointer found. unable to allocate space for operation. invalid context found. tried to access NULL pointer. private key overflow.
Crypto Crypto Crypto Crypto Crypto Crypto PKCS8 PKCS8 PKCS8 PKCS8 PKCS8
error error error error error error error error error error error
22010:OSP Base 64 error - encode failed. 22020:OSP Base 64 error - decode failed.
DB-2737
22510:OSP audit error - failed to allocate memory. 156010:OSP RSN failure error - no data present. 156020:OSP RSN failure error - data is invalid.
DB-2738
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug voip settlement exit command:
Router# debug voip settlement exit 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT 01:21:10:OSP:EXIT :OSPPMimeMessageInit() :OSPPMimeMessageSetContentAndLength() :OSPPMimeMessageBuild() :OSPPMimePartFree() :OSPPMimePartFree() :OSPPMimeDataFree() :OSPPMimeMessageCreate() :OSPPMsgInfoAssignRequestMsg() :osppHttpSelectConnection :OSPPSockCheckServicePoint() isconnected(1) :osppHttpBuildMsg() :OSPPSockWrite() (0) :OSPPSSLSessionWrite() (0) :OSPPSSLSessionRead() (0) :OSPPSSLSessionRead() (0) :OSPPHttpParseHeader :OSPPHttpParseHeader :OSPPSSLSessionRead() (0) :OSPPUtilMemCaseCmp()
DB-2739
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug voip settlement misc command:
Router# debug voip settlement misc 00:52:03:OSP:osp_authorize:callp=0x6142770C 00:52:03:OSP:OSPPTransactionRequestNew:ospvTrans=0x614278A8 00:52:03:OSP:osppCommMonitor:major:minor=(0x2:0x1) 00:52:03:OSP:HTTP connection:reused 00:52:03:OSP:osppHttpSetupAndMonitor:HTTP=0x6141A514, QUEUE_EVENT from eventQ=0x6141A87C, comm=0x613F16C4, msginfo=0x6142792C 00:52:03:OSP:osppHttpSetupAndMonitor:connected = <TRUE> 00:52:03:OSP:osppHttpSetupAndMonitor:HTTP=0x6141A514, build msginfo=0x6142792C, trans=0x2 00:52:04:OSP:osppHttpSetupAndMonitor:HTTP=0x6141A514, msg built and sent:error=0, msginfo=0x6142792C 00:52:04:OSP:osppHttpSetupAndMonitor:monitor exit. errorcode=0 00:52:04:OSP:osppHttpSetupAndMonitor:msginfo=0x6142792C, error=0, shutdown=0 00:52:04:OSP:OSPPMsgInfoProcessResponse:msginfo=0x6142792C, err=0, trans=0x614278A8, handle=2 00:52:04:OSP:OSPPMsgInfoChangeState:transp=0x614278A8, msgtype=12 current state=2 00:52:04:OSP:OSPPMsgInfoChangeState:transp=0x614278A8, new state=4 00:52:04:OSP:OSPPMsgInfoProcessResponse:msginfo=0x6142792C, context=0x6142770C, error=0 00:52:04:OSP:osp_get_destination:trans_handle=2, get_first=1, callinfop=0x614275E0 00:52:04:OSP:osp_get_destination:callinfop=0x614275E0 get dest=1.14.115.51, validafter=1999-01-20T02:04:32Z, validuntil=1999-01-20T02:14:32Z 00:52:04:OSP:osp_parse_destination:dest=1.14.115.51 00:52:04:OSP:osp_get_destination:callinfop=0x614275E0, error=0, ip_addr=1.14.115.51, credit=60
DB-2740
December 2010
00:52:06:OSP:stop_settlement_ccapi_accounting:send report for callid=0x11, transhandle=2 00:52:06:OSP:osp_report_usage:transaction=2, duration=0, lostpkts=0, lostfrs=0, lostpktr=0, lostfrr=0
DB-2741
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Using the debug voip settlement network command shows messages, in detail, in HTTP and XML formats.
Examples
The following is sample output from the debug voip settlement network command:
Router# debug voip settlement network 00:47:25:OSP:HTTP connection:reused 00:47:25:OSP:OSPPSockWaitTillReady:HTTPCONN=0x6141A514, fd=0 00:47:25:OSP:OSPPSockWaitTillReady:read=0, timeout=0, select=1 00:47:25:OSP:osppHttpBuildAndSend():http=0x6141A514 sending: POST /scripts/simulator.dll?handler HTTP/1.1 Host:1.14.115.12 content-type:text/plain Content-Length:439 Connection:Keep-Alive Content-Type:text/plain Content-Length:370 <?xml version="1.0"?><Message messageId="1" random="8896"> <AuthorisationRequest componentId="1"> <Timestamp> 1993-03-01T00:47:25Z</Timestamp> <CallId>
DB-2742
December 2010
<![CDATA[12]]></CallId> <SourceInfo type="e164"> 5551111</SourceInfo> <DestinationInfo type="e164"> 5552222</DestinationInfo> <Service/> <MaximumDestinations> 3</MaximumDestinations> </AuthorisationRequest> </Message> 00:47:25:OSP:OSPPSockWaitTillReady:HTTPCONN=0x6141A514, fd=0 00:47:25:OSP:OSPPSockWaitTillReady:read=0, timeout=1, select=1 00:47:25:OSP:OSPM_SEND:bytes_sent = 577 00:47:25:OSP:OSPPSockProcessRequest:SOCKFD=0, Expecting 100, got 00:47:25:OSP:OSPPSockWaitTillReady:HTTPCONN=0x6141A514, fd=0 00:47:25:OSP:OSPPSockWaitTillReady:read=1, timeout=1, select=1 00:47:25:OSP:OSPPSSLSessionRead() recving 1 bytes: HTTP/1.1 100 Continue Server:Microsoft-IIS/4.0 Date:Wed, 20 Jan 1999 02:01:54 GMT 00:47:25:OSP:OSPPSockProcessRequest:SOCKFD=0, Expecting 200, got 00:47:25:OSP:OSPPSockWaitTillReady:HTTPCONN=0x6141A514, fd=0 00:47:25:OSP:OSPPSockWaitTillReady:read=1, timeout=1, select=1 00:47:25:OSP:OSPPSSLSessionRead() recving 1 bytes: HTTP/1.1 200 OK Server:Microsoft-IIS/4.0 Date:Wed, 20 Jan 1999 02:01:54 GMT Connection:Keep-Alive Content-Type:multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary=bar Content-Length:1689 00:47:25:OSP:OSPPSockProcessRequest:SOCKFD=0, error=0, HTTP response 00:47:25:OSP:OSPPSockWaitTillReady:HTTPCONN=0x6141A514, fd=0 00:47:25:OSP:OSPPSockWaitTillReady:read=1, timeout=1, select=1 00:47:25:OSP:OSPPSSLSessionRead() recving 1689 bytes: --bar Content-Type:text/plain Content-Length:1510 <?xml version="1.0"?><Message messageId="1" random="27285"> <AuthorisationResponse componentId="1"> <Timestamp> 1999-01-20T02:01:54Z</Timestamp> <Status> <Description> success</Description> <Code> 200</Code> </Status> <TransactionId> 101</TransactionId> <Destination> <AuthorityURL> http://www.myauthority.com</AuthorityURL> <CallId> <![CDATA[12]]></CallId> <DestinationInfo type="e164"> 5552222</DestinationInfo> <DestinationSignalAddress> 1.14.115.51</DestinationSignalAddress>
DB-2743
<Token encoding="base64"> PD94bWwgdmVyc2lvbj0xLjA/PjxNZXNzYWdlIG1lc3NhZ2VJZD0iMSIgcmFuZG9tPSIxODM0OSI+PFRva2VuSW5mbz 48U291cmNlSW5mbyB0eXBlPSJlMTY0Ij41NTUxMTExPC9Tb3VyY2VJbmZvPjxEZXN0aW5hdGlvbkluZm8gdHlwZT0i ZTE2NCI+NTU1MjIyMjwvRGVzdGluYXRpb25JbmZvPjxDYWxsSWQ+PCFbQ0RBVEFbMV1dPjwvQ2FsbElkPjxWYWxpZE FmdGVyPjE5OTgtMTItMDhUMjA6MDQ6MFo8L1ZhbGlkQWZ0ZXI+PFZhbGlkVW50aWw+MTk5OS0xMi0zMVQyMzo1OTo1 OVo8L1ZhbGlkVW50aWw+PFRyYW5zYWN0aW9uSWQ+MTAxPC9UcmFuc2FjdGlvbklkPjxVc2FnZURldGFpbD48QW1vdW 50PjE0NDAwPC9BbW91bnQ+PEluY3JlbWVudD4xPC9JbmNyZW1lbnQ+PFNlcnZpY2UvPjxVbml0PnM8L1VuaXQ+PC9V c2FnZURldGFpbD48L1Rva2VuSW5mbz48L01lc3NhZ2U+</Token> <UsageDetail> <Amount> 60</Amount> <Increment> 1</Increment> <Service/> <Unit> s</Unit> </UsageDetail> <ValidAfter> 1999-01-20T01:59:54Z</ValidAfter> <ValidUntil> 1999-01-20T02:09:54Z</ValidUntil> </Destination> <transnexus.com:DelayLimit critical="False"> 1000</transnexus.com:DelayLimit> <transnexus.com:DelayPreference critical="False"> 1</transnexus.com:DelayPreference> </AuthorisationResponse> </Message> --bar Content-Type:application/pkcs7-signature Content-Length:31 This is your response signature --bar--
DB-2744
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-2745
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
For complete information about the SSL connection, use the debug voip settlement ssl command if you see one of the following errors generated from the debug voip settlement error command.
14400:OSP 14410:OSP 14420:OSP 14430:OSP 14440:OSP 14450:OSP 14460:OSP 14470:OSP 14480:OSP 14490:OSP 14495:OSP 14496:OSP 14497:OSP 14498:OSP 14499:OSP SSL SSL SSL SSL SSL SSL SSL SSL SSL SSL SSL SSL SSL SSL SSL error error error error error error error error error error error error error error error failed to allocate memory. failed to initialize the context. failed to retrieve the version. failed to initialize the session. failed to attach the socket. handshake failed. failed to close SSL. failed to read from SSL. failed to write to SSL. could not get certificate. no root certificate found. failed to set the private key. failed to parse the private key. failed to add certificates. failed to add DN.
Examples
The following example shows the debug output when the SSL is making a good connection to the Open Settlement Protocol server:
*May 15 11:53:42.871:OSP: *May 15 11:53:42.871:OSPPSSLConnect:****** SSL HANDSHAKE SUCCEED !!**** retry=2
DB-2746
December 2010
These messages do not indicate an error but indicate the result of the operation. To display actual error messages, enter the debug voip settlement error command.
DB-2747
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
DB-2748
December 2010
Syntax Description
all default error call informational software event function individual range inout rose
(Optional) Displays all TSP debugging messages. (Optional) Displays TSP inout, error, and event debugging messages. This option also runs if no keywords are added. (Optional) Displays TSP error messages. (Optional) Displays TSP call-related debugs not generated by other TSP debug options. (Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. (Optional) Displays software processing errors. (Optional) Displays TSP events. (Optional) Displays TSP functions. (Optional) Enables individual TSP debugs. For the individual keyword, the range is an integer value from 1 to 68. For specific range values, see Table 366. (Optional) Displays TSP function entry/exit debugs. (Optional) Enables the remote operations service element. This debug displays information about ISDN-related elements.
Table 366
Value 1 2 3 4 5 6 7 8 9 10 11
TSP Debug Function INDIVIDUAL_TSP_DEBUG_TDM_HAIRPIN_CONNECT_001 INDIVIDUAL_TSP_DEBUG_TDM_HAIRPIN_DISCONNECT_002 INDIVIDUAL_TSP_DEBUG_CCRAWMSG_ENCAP_003 INDIVIDUAL_TSP_DEBUG_CDAPI_FORM_MSG_BASIC_SS_INFO_004 INDIVIDUAL_TSP_DEBUG_CDAPI_FORM_MSG_005 INDIVIDUAL_TSP_DEBUG_CDAPI_FORM_MSG_006 INDIVIDUAL_TSP_DEBUG_CDAPI_SEND_MSG_007 INDIVIDUAL_TSP_DEBUG_CDAPI_SEND_MSG_008 INDIVIDUAL_TSP_DEBUG_CDAPI_SEND_INFO_MSG_009 INDIVIDUAL_TSP_DEBUG_ALLOC_CDB_010 INDIVIDUAL_TSP_DEBUG_DEALLOC_CDB_011
DB-2749
Table 366
Value 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
TSP Debug Function INDIVIDUAL_TSP_DEBUG_CONNECT_IND_012 INDIVIDUAL_TSP_DEBUG_CONNECT_IND_EXIT_013 INDIVIDUAL_TSP_DEBUG_CONNECT_IND_EXIT_014 INDIVIDUAL_TSP_DEBUG_CONNECT_IND_EXIT_015 INDIVIDUAL_TSP_DEBUG_CONNECT_IND_EXIT_016 INDIVIDUAL_TSP_DEBUG_CONNECT_IND_EXIT_017 INDIVIDUAL_TSP_DEBUG_CDAPI_SETUP_ACK_018 INDIVIDUAL_TSP_DEBUG_CDAPI_PROCEEDING_019 INDIVIDUAL_TSP_DEBUG_CDAPI_ALERT_020 INDIVIDUAL_TSP_DEBUG_CDAPI_CONNECT_021 INDIVIDUAL_TSP_DEBUG_CDAPI_INFO_022 INDIVIDUAL_TSP_DEBUG_CDAPI_PROGRESS_023 INDIVIDUAL_TSP_DEBUG_CDAPI_FACILITY_024 INDIVIDUAL_TSP_DEBUG_CDAPI_FACILITY_025 INDIVIDUAL_TSP_DEBUG_CDAPI_PRE_CONN_DISC_REQ_026 INDIVIDUAL_TSP_DEBUG_CDAPI_DISC_PROG_IND_027 INDIVIDUAL_TSP_DEBUG_CDAPI_DISCONNECT_REQ_028 INDIVIDUAL_TSP_DEBUG_CDAPI_DISCONNECT_REQ_029 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_SS_RESP_030 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_INFO_IND_031 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_PROCEEDING_032 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_ALERT_033 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_ALERT_EXIT_034 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_ALERT_EXIT_035 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_PROGRESS_036 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_INFO_037 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_CONNECT_038 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_CONNECT_CONF_039 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_DISC_PROG_IND_040 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_PROG_IND_PROGRESS_041 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_RELEASE_IND_042 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_RELEASE_IND_EXIT_043 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_RELEASE_COMP_044 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_RELEASE_COMP_CLEAR_045 INDIVIDUAL_TSP_DEBUG_SETUP_REQ_EXIT_046 INDIVIDUAL_TSP_DEBUG_SETUP_REQ_EXIT_047
DB-2750
December 2010
Table 366
Value 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68
TSP Debug Function INDIVIDUAL_TSP_DEBUG_SETUP_REQ_EXIT_048 INDIVIDUAL_TSP_DEBUG_TSP_SET_TRANSFER_INFO_049 INDIVIDUAL_TSP_DEBUG_TSP_CALL_VOICE_CUT_THROUGH_050 INDIVIDUAL_TSP_DEBUG_TSP_CALL_VOICE_CUT_THROUGH_051 INDIVIDUAL_TSP_DEBUG_TSP_CALL_VOICE_CUT_THROUGH_052 INDIVIDUAL_TSP_DEBUG_TSP_CALL_VOICE_CUT_THROUGH_053 INDIVIDUAL_TSP_DEBUG_TSP_MAIN_054 INDIVIDUAL_TSP_DEBUG_DO_GLOBAL_END_TO_END_DISC_055 INDIVIDUAL_TSP_DEBUG_TSP_CDAPI_MSG_DUMP_056 INDIVIDUAL_TSP_DEBUG_TSP_COT_TIMER_START_057 INDIVIDUAL_TSP_DEBUG_TSP_COT_TIMER_STOP_058 INDIVIDUAL_TSP_DEBUG_TSP_COT_RESULT_059 INDIVIDUAL_TSP_DEBUG_TSP_COT_DONE_060 INDIVIDUAL_TSP_DEBUG_TSP_COT_TIMEOUT_061 INDIVIDUAL_TSP_DEBUG_TSP_COT_REQ_062 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_COT_SETUP_ACK_063 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_RCV_COT_MSG_064 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_RCV_COT_MSG_065 INDIVIDUAL_TSP_DEBUG_TSP_CDAPI_PUT_CAUSE_IE_066 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_SETUP_ACK_067 INDIVIDUAL_TSP_DEBUG_CDAPI_TSP_RCV_MSG_068
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command replaces the debug tsp command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
DB-2751
Examples
The following is sample output from the debug voip tsp command:
Router# debug voip tsp Apr 4 2002 14:04:11.034 UTC://-1/xxxxxxxxxxxx/TSP:():-1/FFFF/tsp_voice_call_check:Query#9 Overlap=FALSE, Called Number=222, Calling Number=4321
*Apr 4 2002 14:04:11.034 UTC://-1/xxxxxxxxxxxx/TSP:():-1/FFFF/tsp_check_call_type:Query#9 Peer Search Type=Voice *Apr 4 2002 14:04:11.034 UTC://-1/xxxxxxxxxxxx/TSP:():-1/FFFF/tsp_check_call_type:Query#9 Matched Incoming Dialpeer With=Port, Peer=299 *Apr 4 2002 14:04:11.034 UTC://-1/xxxxxxxxxxxx/TSP:():-1/FFFF/tsp_check_call_type:Query#9 DID=TRUE *Apr 4 2002 14:04:11.034 UTC://-1/xxxxxxxxxxxx/TSP:():-1/FFFF/tsp_check_call_type:Query#9 Incoming Dial-peer=SUCCESS *Apr 4 2002 14:04:11.034 UTC://-1/xxxxxxxxxxxx/TSP:():-1/FFFF/tsp_check_call_type:Query#9 Matched Outgoing Dialpeer=221 *Apr 4 2002 14:04:11.034 UTC://-1/xxxxxxxxxxxx/TSP:():-1/FFFF/tsp_voice_call_check:Query#9 Call Type=VOICE, Result=ACCEPT
CallEntry ID is -1. This indicates that a call leg has not been identified. GUID is xxxxxxxxxxxx. This indicates that the call has not been specified. TSP:():-1/FFFF is the module name and module-specific parameters. The tsp_voice_call_check field shows that the accounting for an onramp fax is active.
Matched Incoming Dialpeer With=Port, Shows that the incoming dial peer was matched and Peer=299 identifies the dial peer. DID=TRUE Matched Outgoing Dialpeer=221 Indicates that the call is a direct-inward dial (DID) call. Shows that the outgoing dial peer was matched and identifies the dial peer.
Related Commands
Description Displays information about the telephony service provider. Displays the raw message owner, length, and pointer.
DB-2752
December 2010
Syntax Description
(Optional) Displays all VTSP debugging messages. (Optional) Displays VTSP inout, error, and event debugging messages. This option also runs if no keywords are added. (Optional) Displays VTSP error messages. (Optional) Displays VTSP events. (Optional) Displays VTSP functions. (Optional) Enables individual VTSP debugs. For the individual keyword, the range is an integer value from 1 to 102. For specific range values, see Table 368. (Optional) Displays VTSP function entry/exit debugs. (Optional) Traces how the router interacts with the digital signal processor (DSP) based on the signaling indications from the signaling stack and requests from the application. (Optional) Displays the VTSP messages showing the types of tones generated by the Voice over IP (VoIP) gateway.
tone
Table 368
Value 1 2 3 4 5 6 7 8 9 10 11 12 13 14
VTSP Debug Function INDIVIDUAL_VTSP_DEBUG_SETUP_REQ_PEND_DEFER_001 INDIVIDUAL_VTSP_DEBUG_SETUP_REQ_WAIT_PEND_SUCCESS_002 INDIVIDUAL_VTSP_DEBUG_SETUP_REQ_WAIT_PEND_FAIL_003 INDIVIDUAL_VTSP_DEBUG_TDM_HPM_COMPLETE_004 INDIVIDUAL_VTSP_DEBUG_TDM_HPM_COMPLETE_EXIT_005 INDIVIDUAL_VTSP_DEBUG_TDM_HPM_CHECK_006 INDIVIDUAL_VTSP_DEBUG_TDM_HPM_CHECK_EXIT_007 INDIVIDUAL_VTSP_DEBUG_GENERATE_DISC_008 INDIVIDUAL_VTSP_DEBUG_GENERATE_DISC_EXIT_009 INDIVIDUAL_VTSP_DEBUG_SETUP_IND_ACK_010 INDIVIDUAL_VTSP_DEBUG_SETUP_IND_ACK_EXIT_011 INDIVIDUAL_VTSP_DEBUG_PROCEEDING_012 INDIVIDUAL_VTSP_DEBUG_PRE_CON_DISCONNECT_013 INDIVIDUAL_VTSP_DEBUG_PRE_CON_DISCONNECT_EXIT_014
DB-2753
Table 368
Value 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
VTSP Debug Function INDIVIDUAL_VTSP_DEBUG_SET_DIGIT_TIMEOUTS_015 INDIVIDUAL_VTSP_DEBUG_CONNECT_016 INDIVIDUAL_VTSP_DEBUG_LOOPBACK_017 INDIVIDUAL_VTSP_DEBUG_RING_NOAN_TIMER_018 INDIVIDUAL_VTSP_DEBUG_ALERT_CONNECT_019 INDIVIDUAL_VTSP_DEBUG_PRE_CON_DISC_REL_EXIT_020 INDIVIDUAL_VTSP_DEBUG_HOST_DISC_CLEANUP_021 INDIVIDUAL_VTSP_DEBUG_HOST_DISC_CLEANUP_EXIT_022 INDIVIDUAL_VTSP_DEBUG_DISCONNECT_023 INDIVIDUAL_VTSP_DEBUG_DISCONNECT_EXIT_024 INDIVIDUAL_VTSP_DEBUG_DISCONNECT_EXIT_025 INDIVIDUAL_VTSP_DEBUG_CONNECT_DIAL_026 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_DIAL_027 INDIVIDUAL_VTSP_DEBUG_PRE_DISC_CAUSE_028 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_CONNECT_029 INDIVIDUAL_VTSP_DEBUG_SETUP_REQ_PEND_FAIL_030 INDIVIDUAL_VTSP_DEBUG_SETUP_REQ_DISC_031 INDIVIDUAL_VTSP_DEBUG_RELEASE_TIMEOUT_032 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_PROCEEDING_EXIT_033 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_PROCEEDING_EXIT_034 INDIVIDUAL_VTSP_DEBUG_PEND_RELEASE_IND_035 INDIVIDUAL_VTSP_DEBUG_PEND_RELEASE_IND_EXIT_036 INDIVIDUAL_VTSP_DEBUG_DISCONNECT_NO_DSP_CHAN_037 INDIVIDUAL_VTSP_DEBUG_DISCONNECT_NO_DSP_CHAN_EXIT_038 INDIVIDUAL_VTSP_DEBUG_CALL_FEATURE_IND_039 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_PROGRESS_040 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_ALERT_041 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_ALERT_EXIT_042 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_FIRST_PROGRESS_043 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_FIRST_PROGRESS_EXIT_044 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_FIRST_PROGRESS_EXIT_045 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_PROG_PROCEEDING_046 INDIVIDUAL_VTSP_DEBUG_PROCEEDING_R2_PEND_DIAL_047 INDIVIDUAL_VTSP_DEBUG_ALERT_R2_PEND_DIAL_048 INDIVIDUAL_VTSP_DEBUG_CONN_R2_PEND_DIAL_049 INDIVIDUAL_VTSP_DEBUG_SETUP_R2_PEND_DIAL_050
DB-2754
December 2010
Table 368
Value 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86
VTSP Debug Function INDIVIDUAL_VTSP_DEBUG_R2_PEND_DIAL_ALL_051 INDIVIDUAL_VTSP_DEBUG_INFO_IND_052 INDIVIDUAL_VTSP_DEBUG_ALERT_053 INDIVIDUAL_VTSP_DEBUG_ALERT_EXIT_054 INDIVIDUAL_VTSP_DEBUG_PROGRESS_055 INDIVIDUAL_VTSP_DEBUG_DISC_PROG_IND_056 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_DISC_PI_IND_057 INDIVIDUAL_VTSP_DEBUG_INFO_058 INDIVIDUAL_VTSP_DEBUG_FEATURE_059 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_ALERT_NO_TIMEOUT_060 INDIVIDUAL_VTSP_DEBUG_SETUP_PEND_ALERT_NO_TIMEOUT_EXIT_061 INDIVIDUAL_VTSP_DEBUG_CALL_FEATURE_ENABLE_062 INDIVIDUAL_VTSP_DEBUG_XCCSM_COT_TEST_DONE_063 INDIVIDUAL_VTSP_DEBUG_XCCSM_COT_TEST_TIMEOUT_064 INDIVIDUAL_VTSP_DEBUG_XCCSM_COT_TEST_065 INDIVIDUAL_VTSP_DEBUG_CALL_FEATURE_066 INDIVIDUAL_VTSP_DEBUG_TCSM_COT_TEST_DONE_067 INDIVIDUAL_VTSP_DEBUG_TCSM_COT_TEST_TIMEOUT_068 INDIVIDUAL_VTSP_DEBUG_TCSM_ACT_COT_TEST_069 INDIVIDUAL_VTSP_DEBUG_PLAY_BUSY_TIMER_START_070 INDIVIDUAL_VTSP_DEBUG_PLAY_BUSY_TIMER_STOP_071 INDIVIDUAL_VTSP_DEBUG_RING_NOAN_TIMER_START_072 INDIVIDUAL_VTSP_DEBUG_RING_NOAN_TIMER_STOP_073 INDIVIDUAL_VTSP_DEBUG_VTSP_TIMER_074 INDIVIDUAL_VTSP_DEBUG_VTSP_TIMER_STOP_075 INDIVIDUAL_VTSP_DEBUG_VTSP_ALLOCATE_CDB_076 INDIVIDUAL_VTSP_DEBUG_VTSP_DO_CALL_SETUP_IND_077 INDIVIDUAL_VTSP_DEBUG_VTSP_DO_CALL_SETUP_IND_EXIT_078 INDIVIDUAL_VTSP_DEBUG_VTSP_REQUEST_CALL_079 INDIVIDUAL_VTSP_DEBUG_VTSP_REQUEST_CALL_EXIT_080 INDIVIDUAL_VTSP_DEBUG_VTSP_REALLOC_CDB_081 INDIVIDUAL_VTSP_DEBUG_VTSP_OG_CALL_REQ_EXIT_082 INDIVIDUAL_VTSP_DEBUG_VTSP_FREE_CDB_083 INDIVIDUAL_VTSP_DEBUG_TGRM_DISC_REL_084 INDIVIDUAL_VTSP_DEBUG_VTSP_CC_CALL_DISCONNECTED_085 INDIVIDUAL_VTSP_DEBUG_SIGO_BDROP_086
DB-2755
Table 368
VTSP Debug Function INDIVIDUAL_VTSP_DEBUG_SIGO_PRE_CON_DISCONNECT_087 INDIVIDUAL_VTSP_DEBUG_SIGO_PROCEEDING_088 INDIVIDUAL_VTSP_DEBUG_SIGO_GENERATE_DISC_089 INDIVIDUAL_VTSP_DEBUG_SIGO_ALERT_090 INDIVIDUAL_VTSP_DEBUG_SIGO_ALERT_CONNECT_091 INDIVIDUAL_VTSP_DEBUG_SIGO_SETUP_PEND_CONNECT_092 INDIVIDUAL_VTSP_DEBUG_DO_SIGO_CALL_SETUP_REQ_093 INDIVIDUAL_VTSP_DEBUG_DO_SIGO_CALL_SETUP_REQ_SESSION_094 INDIVIDUAL_VTSP_DEBUG_DSM_MEDIA_EVENT_CB_095 INDIVIDUAL_VTSP_DEBUG_DSM_PEER_EVENT_CB_096 INDIVIDUAL_VTSP_DEBUG_DSM_FEATURE_NOTIFY_CB_097 INDIVIDUAL_VTSP_DEBUG_DSM_BRIDGE_CHECK_CB_098 INDIVIDUAL_VTSP_DEBUG_DSM_BRIDGE_STATUS_EXIT_099 INDIVIDUAL_VTSP_DEBUG_DSM_SET_FAX_FEAT_EXIT_100 INDIVIDUAL_VTSP_DEBUG_DS_DO_DIAL_101 INDIVIDUAL_VTSP_DEBUG_DS_DIALING_DEFAULT_102
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command replaces the debug vtsp command. T.38 fax relay call statistics were made available to Call Detail Records (CDRs) through Vendor-Specific Attributes (VSAs) and added to the call log. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Examples
The following examples show output for variations of the debug voip vtsp command:
debug voip vtsp event on the Terminating Gateway, page 2757 debug voip vtsp function on the Originating Gateway, page 2757 debug voip vtsp inout on the Originating Gateway, page 2758 debug voip vtsp tone on the Originating Gateway, page 2760
DB-2756
December 2010
debug voip vtsp Displaying T.38 Fax Relay Statistics on the Originating Gateway, page 2760
FXS
PSTN
At the setup request, the CallEntry ID and GUID are set. The remainder of the output follows the progress of the call.
*May 1 20:03:47.707: //78/CDDFE7FF8029/VTSP:(4/0/0):-1:1:1/vtsp_process_event: [state:S_SETUP_REQUEST, event:E_TSP_PROCEEDING] *May 1 20:03:47.707: //78/CDDFE7FF8029/VTSP:(4/0/0):-1:1:1/vtsp_process_event: [state:S_SETUP_REQ_PROC, event:E_TSP_PROGRESS] *May 1 20:03:49.955: //78/CDDFE7FF8029/VTSP:(4/0/0):-1:1:1/vtsp_process_event: [state:S_SETUP_REQ_PROC, event:E_TSP_CONNECT] *May 1 20:03:49.959: //78/CDDFE7FF8029/VTSP:(4/0/0):-1:1:1/vtsp_process_event: [state:S_CONNECT, event:E_CC_FEATURE] *May 1 20:04:14.851: //78/CDDFE7FF8029/VTSP:(4/0/0):-1:1:1/vtsp_process_event: [state:S_CONNECT, event:E_CC_DISCONNECT] *May 1 20:04:14.855: //78/CDDFE7FF8029/VTSP:(4/0/0):-1:1:1/vtsp_process_event: [state:S_WAIT_STATS, event:E_VTSP_DSM_STATS_COMPLETE] *May 1 20:04:15.759: //78/CDDFE7FF8029/VTSP:(4/0/0):-1:1:1/vtsp_process_event: [state:S_WAIT_RELEASE, event:E_TSP_CALL_FEATURE_IND] *May 1 20:04:15.811: //78/CDDFE7FF8029/VTSP:(4/0/0):-1:1:1/vtsp_process_event: [state:S_WAIT_RELEASE, event:E_TSP_CALL_FEATURE_IND] *May 1 20:04:15.811: //78/CDDFE7FF8029/VTSP:(4/0/0):-1:1:1/vtsp_process_event: [state:S_WAIT_RELEASE, event:E_TSP_DISCONNECT_CONF] *May 1 20:04:15.811: //78/CDDFE7FF8029/VTSP:(4/0/0):-1:-1:-1/vtsp_process_event: [state:S_CLOSE_DSPRM, event:E_VTSP_DSM_CLOSE_COMPLETE]
At the setup request, the CallEntry ID and GUID are set. The call setup functions are shown.
*Apr 18 21:48:25.671: //-1/D87794B9802B/VTSP:(2/1:23):0:-1:-1/vtsp_do_normal_call_setup_ind: *Apr 18 21:48:25.671: //-1/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_indicate_call: *Apr 18 21:48:25.675: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_insert_cdb: *Apr 18 21:48:25.675: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/act_proceeding:
DB-2757
103302
*Apr 18 21:48:25.687: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/act_progress: *Apr 18 21:48:25.687: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_bridge_check_cb: *Apr 18 21:48:25.687: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_bridge_check_cb:exit@1066 *Apr 18 21:48:25.687: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_bridge_status_cb: *Apr 18 21:48:25.687: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_save_fax_config: *Apr 18 21:48:25.687: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_set_fax_feat_param: *Apr 18 21:48:25.687: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_peer_event_cb: *Apr 18 21:48:25.687: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_peer_event_cb: *Apr 18 21:48:25.687: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_feature_notify_cb: *Apr 18 21:48:25.687: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_reactivate_ringback: *Apr 18 21:48:25.687: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_reactivate_ringback:exit@871 *Apr 18 21:48:27.451: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_peer_event_cb:
At this point, the ringback to the caller has occurred and the next event shows a connection.
*Apr *Apr *Apr *Apr *Apr *Apr 18 18 18 18 18 18 21:48:28.635: 21:48:29.003: 21:48:34.059: 21:48:36.587: 21:48:36.587: 21:48:36.587: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/act_connect: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_peer_event_cb: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_peer_event_cb: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/act_generate_disc: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_cc_call_disconnected: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_bridge_status_cb:
The next event shows the call disconnect. There are several VTSP functions that follow the call disconnection to release and terminate the call.
*Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr *Apr 18 18 18 18 18 18 18 18 18 21:48:36.587: 21:48:36.587: 21:48:36.587: 21:48:36.595: 21:48:36.595: 21:48:36.595: 21:48:36.595: 21:48:36.595: 21:48:36.595: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/act_disconnect: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_save_fax_config: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_set_fax_feat_param: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/act_dsm_dsp_stats_complete: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/act_wrelease_release: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_do_call_history: //88/D87794B9802B/VTSP:(2/1:23):0:8:4/vtsp_dsm_closed_cb: //88/D87794B9802B/VTSP:(2/1:23):0:-1:-1/act_terminate: //-1/D87794B9802B/VTSP:(2/1:23):0:-1:-1/vtsp_free_cdb:
The following two events show the calling number, called number, and related parameters:
*Apr 18 21:48:59.239: //-1/xxxxxxxxxxxx/VTSP:(2/1:23):-1:-1:-1/vtsp_do_call_setup_ind: Calling Number=4085550111, TON=National, NPI=ISDN, Screening=User, Passed, Presentation=Allowed CLIR=FALSE, CLID Transparent=FALSE, Null Originating Calling Number=FALSE, Calling Translated=FALSE *Apr 18 21:48:59.239: //-1/xxxxxxxxxxxx/VTSP:(2/1:23):-1:-1:-1/vtsp_do_call_setup_ind: Called Number=83103, TON=Unknown, NPI=Unknown *Apr 18 21:48:59.239: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_insert_cdb: *Apr 18 21:48:59.243: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/act_proceeding: Progress Indication=0 *Apr 18 21:48:59.255: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/act_progress: Progress Indication=8 *Apr 18 21:48:59.255: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_timer_stop:
DB-2758
December 2010
The following event shows fax parameters associated with the call:
*Apr 18 21:48:59.255: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_dsm_save_fax_config: Fax Relay=DISABLED - 'fax rate disabled' set (dial-peer) Primary Fax Protocol=IGNORE_FAX_RELAY, Fallback Fax Protocol=IGNORE_FAX_RELAY Fax Parameters Set By=Dialpeer, Peer=3600 *Apr 18 21:48:59.255: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_dsm_peer_event_cb: Event=E_DSM_CC_CAPS_IND *Apr 18 21:48:59.255: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_dsm_peer_event_cb: Event=E_DSM_CC_CAPS_ACK *Apr 18 21:48:59.255: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_dsm_feature_notify_cb: Feature ID=0, Feature Status=1
The following event shows that it was the calling party that initiated the call disconnect:
*Apr 18 21:49:25.943: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_set_release_source: Release Direction=PSTN, Release Source=Calling Party-PSTN *Apr 18 21:49:25.943: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_timer: Timer Start Time=541374, Timer Value=15000(ms) *Apr 18 21:49:25.943: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/act_generate_disc: Return Code=0 *Apr 18 21:49:25.943: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/act_disconnect: Cause Value=16, Previous Cause Value=16 *Apr 18 21:49:25.943: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_ring_noan_timer_stop: Timer Stop Time=541374 *Apr 18 21:49:25.943: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_dsm_save_fax_config: Fax Relay=DISABLED - 'fax rate disabled' set (dial-peer) Primary Fax Protocol=IGNORE_FAX_RELAY, Fallback Fax Protocol=IGNORE_FAX_RELAY Fax Parameters Set By=Dialpeer, Peer=3600 *Apr 18 21:49:25.951: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/act_dsm_dsp_stats_complete: *Apr 18 21:49:25.951: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_timer: Timer Start Time=541375, Timer Value=60000(ms)
The following two events show the call being released and the timer stopping:
*Apr 18 21:49:25.951: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/act_wrelease_release: *Apr 18 21:49:25.951: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_play_busy_timer_stop: Timer Stop Time=541375 *Apr 18 21:49:25.951: //90/EC79A754802C/VTSP:(2/1:23):0:8:4/vtsp_timer_stop: Timer Stop Time=541375 *Apr 18 21:49:25.951: //90/EC79A754802C/VTSP:(2/1:23):0:-1:-1/act_terminate: *Apr 18 21:49:25.951: //90/EC79A754802C/VTSP:(2/1:23):0:-1:-1/vtsp_timer_stop: Timer Stop Time=541375 *Apr 18 21:49:25.951: //-1/EC79A754802C/VTSP:(2/1:23):0:-1:-1/vtsp_free_cdb: CDB=0x65289878 Router#
DB-2759
This output shows a wrong number dialed in the two-stage call to see the tone generated by the router.
*Apr 18 21:52:26.595: //98/657C0B9C8030/VTSP:(2/1:23):0:8:4/act_pre_con_disconnect: [Number Unobtainable]-Tone Played In Direction [Network]
debug voip vtsp Displaying T.38 Fax Relay Statistics on the Originating Gateway
7 21:37:35.322 UTC: //-1/xxxxxxxxxxxx/VTSP:(3/1:D):-1:-1:-1/vtsp_allocate_cdb: CDB=0x63088050 May 7 21:37:35.322 UTC: //-1/xxxxxxxxxxxx/VTSP:(3/1:D):-1:-1:-1/vtsp_do_call_setup_ind: Event=E_TSP_SETUP_IND Progress Indication=3, CarrierIDCode=, Info Trans Capability=16, Source Carrier ID=, tg_label_flag=0 May 7 21:37:35.322 UTC: //-1/xxxxxxxxxxxx/VTSP:(3/1:D):-1:-1:-1/vtsp_do_call_setup_ind: Called Number=41021, TON=National, NPI=ISDN May 7 21:37:35.326 UTC: //-1/96A4C0C48006/VTSP:(3/1:D):0:-1:-1/vtsp_timer: Timer Start Time=1019501, Timer Value=180000(ms) May 7 21:37:35.326 UTC: //-1/96A4C0C48006/VTSP:(3/1:D):0:-1:-1/vtsp_insert_cdb: May 7 21:37:35.326 UTC: //-1/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_SETUP_IND_PEND, event:E_VTSP_DSM_OPEN_SUCCESS] May 7 21:37:35.326 UTC: //-1/96A4C0C48006/VTSP:(3/1:D):0:0:0/act_setup_ind_pend_success: May 7 21:37:35.326 UTC: //-1/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_realloc_cdb: CDB=0x63088050 May 7 21:37:35.326 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_insert_cdb: May 7 21:37:35.326 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_timer: Timer Start Time=1019501, Timer Value=180000(ms) May 7 21:37:35.330 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_SETUP_INDICATED, event:E_CC_PROCEEDING] May 7 21:37:35.330 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/act_proceeding: Progress Indication=0 May 7 21:37:35.330 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_timer_stop: Timer Stop Time=1019502 May 7 21:37:35.394 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_PROCEEDING, event:E_CC_ALERT] May 7 21:37:35.394 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/act_alert: Progress Indication=0, Signal Indication=1, Setup Progress Indication=3 May 7 21:37:35.394 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_timer_stop: Timer Stop Time=1019508 May 7 21:37:35.398 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/act_alert: Progress Indication=0, Tone= May 7 21:37:37.422 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_save_fax_config: Fax Relay=ENABLED Primary Fax Protocol=T38_FAX_RELAY, Fallback Fax Protocol=NONE_FAX_RELAY Fax Parameters Set By=Dialpeer, Peer=2 May 7 21:37:37.426 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_save_fax_config: LS Red=0, HS Red=0 May 7 21:37:37.426 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_ALERTING, event:E_CC_DO_CAPS_IND]
DB-2760
December 2010
May
7 21:37:37.426 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_peer_event_cb: Event=E_DSM_CC_CAPS_IND May 7 21:37:37.426 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_ALERTING, event:E_CC_CAPS_IND] May 7 21:37:37.426 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_peer_event_cb: Event=E_DSM_CC_CAPS_ACK May 7 21:37:37.426 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_ALERTING, event:E_CC_SERVICE_MSG] May 7 21:37:37.426 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/act_service_msg_down: May 7 21:37:37.426 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_timer_stop: Timer Stop Time=1019711 May 7 21:37:37.426 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_ALERTING, event:E_CC_CONNECT] May 7 21:37:37.426 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/act_alert_connect: Progress Indication=0 May 7 21:37:37.426 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_ring_noan_timer_stop: Timer Stop Time=1019711 May 7 21:37:37.598 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_feature_notify_cb: Feature ID=0, Feature Status=1 May 7 21:37:37.598 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_feature_notify_cb: Feature ID=0, Feature Status=1 May 7 21:37:44.123 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_peer_event_cb: Event=E_DSM_CC_MC_LOCAL_DNLD_DONE May 7 21:37:44.123 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_peer_event_cb: Event=E_DSM_CC_SET_FAX_MODE May 7 21:37:44.123 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_peer_event_cb: Event=E_DSM_CC_MC_LOCAL_DNLD_DONE May 7 21:37:44.123 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_peer_event_cb: Event=E_DSM_CC_SET_FAX_MODE May 7 21:38:02.911 UTC: %ALIGN-3-SPURIOUS: Spurious memory access made at 0x6040A40C reading 0x1 May 7 21:38:02.911 UTC: %ALIGN-3-TRACE: -Traceback= 6040A40C 60409198 603F8338 603F85F8 613EA398 619B369C 619B40BC 613DFEE4 May 7 21:38:02.915 UTC: %ALIGN-3-TRACE: -Traceback= 6040A54C 60409198 603F8338 603F85F8 613EA398 619B369C 619B40BC 613DFEE4 May 7 21:38:37.483 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_CONNECT, event:E_CC_CAPS_IND] May 7 21:38:37.483 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_peer_event_cb: Event=E_DSM_CC_CAPS_ACK May 7 21:38:37.663 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_CONNECT, event:E_TSP_DISCONNECT_IND] May 7 21:38:37.663 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/act_generate_disc: Cause Value=16 May 7 21:38:37.663 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_timer_stop: Timer Stop Time=1025735 May 7 21:38:37.663 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_ring_noan_timer_stop: Timer Stop Time=1025735 May 7 21:38:37.663 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_set_release_source: Release Direction=PSTN, Release Source=Calling Party-PSTN May 7 21:38:37.663 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_timer: Timer Start Time=1025735, Timer Value=15000(ms) May 7 21:38:37.663 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/act_generate_disc: Return Code=0 May 7 21:38:37.667 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_CONNECT, event:E_CC_DISCONNECT] May 7 21:38:37.667 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/act_disconnect: Cause Value=16, Previous Cause Value=16 May 7 21:38:37.667 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_ring_noan_timer_stop: Timer Stop Time=1025735 May 7 21:38:37.667 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_save_fax_config: Fax Relay=ENABLED Primary Fax Protocol=T38_FAX_RELAY, Fallback Fax Protocol=NONE_FAX_RELAY Fax Parameters Set By=Dialpeer, Peer=2 May 7 21:38:37.667 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_dsm_save_fax_config:
DB-2761
LS Red=0, HS Red=0 7 21:38:37.691 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_WAIT_STATS, event:E_VTSP_DSM_STATS_COMPLETE] May 7 21:38:37.691 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/act_dsm_dsp_stats_complete: May 7 21:38:37.691 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_timer: Timer Start Time=1025738, Timer Value=60000(ms) May 7 21:38:37.691 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_WAIT_RELEASE, event:E_TSP_DISCONNECT_CONF] May 7 21:38:37.691 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/act_wrelease_release: May 7 21:38:37.691 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_play_busy_timer_stop: Timer Stop Time=1025738 May 7 21:38:37.691 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_timer_stop: Timer Stop Time=1025738 May 7 21:38:37.695 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: [state:S_CLOSE_DSPRM, event:E_VTSP_DSM_STATS_COMPLETE] May 7 21:38:37.695 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:0:0/vtsp_process_event: Unexpected EVENT [E_VTSP_DSM_STATS_COMPLETE] Received For STATE [S_CLOSE_DSPRM]; Previous STATE [0.17 ] May 7 21:38:37.695 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:-1:-1/vtsp_process_event: [state:S_CLOSE_DSPRM, event:E_VTSP_DSM_CLOSE_COMPLETE] May 7 21:38:37.695 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:-1:-1/act_terminate: May 7 21:38:37.695 UTC: //9/96A4C0C48006/VTSP:(3/1:D):0:-1:-1/vtsp_timer_stop: Timer Stop Time=1025738 May 7 21:38:37.695 UTC: //-1/96A4C0C48006/VTSP:(3/1:D):0:-1:-1/vtsp_free_cdb: CDB=0x63088050 May
Related Commands
Description Displays information about the DSM. Displays which debug commands are enabled. Allows configuration of the voice call debug output.
DB-2762
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug voip xcodemsp command:
Router# debug voip xcodemsp XCODEMSP debugging is on Router# Router# *Jul 8 *Jul 8 *Jul 8 *Jul 8 *Jul 8 *Jul 8 *Jul 8 *Jul 8 *Jul 8 *Jul 8 *Jul 8 *Jul 8 Router# Router# Router# sess_id 16777223 16777223
18:36:53: 18:36:53: 18:36:53: 18:36:53: 18:36:53: 18:36:53: 18:36:53: 18:36:53: 18:36:53: 18:36:53: 18:36:53: 18:36:53:
xcmsp_call_setup_request: xcmsp_call_setup_request: xcmsp_bridge: xc_add_streams: xc_add_streams: stream id xc_add_streams: stream id xcmsp_bridge: xc_add_streams: xc_add_streams: stream id xc_add_streams: stream id xc_connect_bridges: xcmsp_dsmp_response
1 added 2 added
5 added 6 added
codec
Total number of active session(s) 1, and connection(s) 2 Router# *Jul 8 18:37:22: xcmsp_bridge_drop:
DB-2763
8 8 8 8 8 8 8 8
xcmsp_bridge_drop: deleting stream id 5 xcmsp_bridge_drop: deleting stream id 6 xcmsp_dsmp_response xcmsp_dsmp_response: DSMP_DISCONNECTED xcmsp_bridge_drop: xcmsp_bridge_drop: deleting stream id 1 xcmsp_bridge_drop: deleting stream id 2 xcmsp_call_disconnect:
DB-2764
December 2010
debug vpdn
To troubleshoot Layer 2 Forwarding (L2F) or Layer 2 Tunnel Protocol (L2TP) virtual private dialup network (VPDN) tunneling events and infrastructure, use the debug vpdn command in privileged EXEC mode. To disable debugging output, use the no form of this command.
Note
Effective with Cisco Release 12.4(11)T, the L2F protocol is not available in Cisco IOS software. debug vpdn {call {event | fsm} | authorization {error | event} | error | event [disconnect] | l2tp-sequencing | l2x-data | l2x-errors | l2x-events | l2x-packets | message | packet [detail | errors] | sss {error | event | fsm} | subscriber {error | event | fsm}} no debug vpdn {call {event | fsm} | authorization {error | event} | error | event [disconnect] | l2tp-sequencing | l2x-data | l2x-errors | l2x-events | l2x-packets | message | packet [detail | errors] | sss {error | event | fsm} | subscriber {error | event | fsm}}
Syntax Description
authorization error authorization event call event call fsm error event disconnect l2tp-sequencing l2x-data l2x-errors l2x-events l2x-packets message packet detail errors sss error
Displays authorization errors. Displays authorization events. Displays significant events in the VPDN call manager. Displays significant events in the VPDN call manager finite state machine (fsm). Displays VPDN errors. Displays VPDN events. (Optional) Displays VPDN disconnect events. Displays significant events related to L2TP sequence numbers such as mismatches, resend queue flushes, and drops. Displays errors that occur in data packets. Displays errors that occur in protocol-specific conditions. Displays events resulting from protocol-specific conditions. Displays detailed information about control packets in protocol-specific conditions. Displays VPDN interprocess messages. Displays information about VPDN packets. (Optional) Displays detailed packet information, including packet dumps. (Optional) Displays errors that occur in packet processing. Displays debug information about VPDN Subscriber Service Switch (SSS) errors.
Note
Effective with Cisco Release 12.4(20)T, the debug vpdn sss error command is not available in Cisco IOS software.
DB-2765
sss event
Note
Effective with Cisco Release 12.4(20)T, the debug vpdn sss event command is not available in Cisco IOS software.
sss fsm
Note
Effective with Cisco Release 12.4(20)T, the debug vpdn sss fsm command is not available in Cisco IOS software.
Displays debug information about VPDN Subscriber errors. Displays debug information about VPDN Subscriber events. Displays debug information about the VPDN Subscriber fsm.
Command Modes
Privileged EXEC
Command History
0S Release 12.0(23)S 12.0(31)S S Release 12.2(22)S 12.2(27)SBC 12.2(28)SB 12.2(31)SB T Release 11.2 12.0(5)T
Modification This command was integrated into Cisco IOS Release 12.0(23)S. The output was enhanced to display messages about control channel authentication events. Modification This command was integrated into Cisco IOS Release 12.2(22)S. Support for enhanced display of messages about control channel authentication events was added in Cisco IOS Release 12.2(27)SBC. Support for the display of messages about congestion avoidance events was added in Cisco IOS Release 12.2(28)SB. Support was added to decode the outbound control channel authentication events. Modification This command was introduced. Support was added for L2TP debugging messages. The l2tp-sequencing and error keywords were added. The l2f-errors, l2f-events, and l2f-packets keywords were changed to l2x-errors, l2x-events, and l2x-packets. Support was added for the message and call {event | fsm} keywords. Support was added for the detail keyword. Support was added for the sss {error | event | fsm} keywords. Support was added to decode the outbound control channel authentication events. Support was added for the authorization {error | event} keywords. The subscriber keyword was added.
DB-2766
December 2010
Modification This command was integrated into Cisco IOS XE Release 2.4. This command was modified. Authentication failure messages for L2TPv3 were added.
Usage Guidelines
Note that the debug vpdn packet and debug vpdn packet detail commands generate several debug operations per packet. Depending on the L2TP traffic pattern, these commands may cause the CPU load to increase to a high level that impacts performance.
Examples
Debugging VPDN Events on a NASNormal L2F Operations Debugging VPDN Events on the Tunnel ServerNormal L2F Operations Debugging VPDN Events on the NASNormal L2TP Operations Debugging VPDN Events on the Tunnel ServerNormal L2TP Operations Debugging Protocol-Specific Events on the NASNormal L2F Operations Debugging Protocol-Specific Events on the Tunnel ServerNormal L2F Operations Displaying L2TP Congestion Avoidance Settings Debugging Errors on the NASL2F Error Conditions Debugging L2F Control Packets for Complete Information Debugging an L2TPv3 Xconnect SessionNormal Operations Debugging Control Channel Authentication Events
The network access server (NAS) has the following VPDN configuration:
vpdn-group 1 request-dialin protocol l2f domain cisco.com initiate-to ip 172.17.33.125 username nas1 password nas1
The following is sample output from the debug vpdn event command on a NAS when an L2F tunnel is brought up and Challenge Handshake Authentication Protocol (CHAP) authentication of the tunnel succeeds:
Router# debug vpdn event %LINK-3-UPDOWN: Interface Async6, changed state to up *Mar 2 00:26:05.537: looking for tunnel -- cisco.com -*Mar 2 00:26:05.545: Async6 VPN Forwarding... *Mar 2 00:26:05.545: Async6 VPN Bind interface direction=1 *Mar 2 00:26:05.553: Async6 VPN vpn_forward_user [email protected] is forwarded %LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to up *Mar 2 00:26:06.289: L2F: Chap authentication succeeded for nas1.
DB-2767
The following is sample output from the debug vpdn event command on a NAS when the L2F tunnel is brought down normally:
Router# debug vpdn event %LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to down %LINK-5-CHANGED: Interface Async6, changed state to reset *Mar 2 00:27:18.865: Async6 VPN cleanup *Mar 2 00:27:18.869: Async6 VPN reset *Mar 2 00:27:18.873: Async6 VPN Unbind interface %LINK-3-UPDOWN: Interface Async6, changed state to down
Table 369 describes the significant fields shown in the two previous displays. The output describes normal operations when an L2F tunnel is brought up or down on a NAS.
Table 369 debug vpdn event Field Descriptions for the NAS
Field
Asynchronous interface coming up
Description Asynchronous interface 6 came up. Domain name is identified. Tunnel is bound to the interface. These are the direction values:
%LINK-3-UPDOWN: Interface Async6, changed state to up looking for tunnel -- cisco.com -Async6 VPN Forwarding... Async6 VPN Bind interface direction=1
1From the NAS to the tunnel server 2From the tunnel server to the NAS
Async6 VPN vpn_forward_user [email protected] is forwarded %LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to up L2F: Chap authentication succeeded for nas1.
Virtual access interface coming down
Tunnel for the specified user and domain name is forwarded. Line protocol is up. Tunnel was authenticated with the tunnel password nas1. Normal operation when the virtual access interface is taken down. Normal cleanup operations performed when the line or virtual access interface goes down.
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to down Async6 VPN cleanup Async6 VPN reset Async6 VPN Unbind interface
DB-2768
December 2010
The tunnel server has the following VPDN configuration, which uses nas1 as the tunnel name and the tunnel authentication name. The tunnel authentication name might be entered in a users file on an authentication, authorization, and accounting (AAA) server and used to define authentication requirements for the tunnel.
vpdn-group 1 accept-dialin protocol l2f virtual-template 1 terminate-from hostname nas1
The following is sample output from the debug vpdn event command on the tunnel server when an L2F tunnel is brought up successfully:
Router# debug vpdn event L2F: Chap authentication succeeded for nas1. Virtual-Access3 VPN Virtual interface created for [email protected] Virtual-Access3 VPN Set to Async interface Virtual-Access3 VPN Clone from Vtemplate 1 block=1 filterPPP=0 %LINK-3-UPDOWN: Interface Virtual-Access3, changed state to up Virtual-Access3 VPN Bind interface direction=2 Virtual-Access3 VPN PPP LCP accepted sent & rcv CONFACK %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to up
The following is sample output from the debug vpdn event command on a tunnel server when an L2F tunnel is brought down normally:
Router# debug vpdn event %LINK-3-UPDOWN: Interface Virtual-Access3, changed state to down Virtual-Access3 VPN cleanup Virtual-Access3 VPN reset Virtual-Access3 VPN Unbind interface Virtual-Access3 VPN reset %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to down
Table 370 describes the fields shown in two previous outputs. The output describes normal operations when an L2F tunnel is brought up or down on a tunnel server.
Table 370 debug vpdn event Field Descriptions for the Tunnel Server
Field
Tunnel coming up
Description PPP CHAP authentication status for the tunnel named nas1. Virtual access interface was set up on the tunnel server for the user [email protected].
L2F: Chap authentication succeeded for nas1. Virtual-Access3 VPN Virtual interface created for [email protected]
Virtual-Access3 VPN Set to Async interface Virtual access interface 3 was set to asynchronous for character-by-character transmission. Virtual-Access3 VPN Clone from Vtemplate Virtual template 1 was applied to virtual access 1 block=1 filterPPP=0 interface 3. %LINK-3-UPDOWN: Interface Virtual-Access3, changed state to up Link status is set to up.
DB-2769
Table 370
debug vpdn event Field Descriptions for the Tunnel Server (continued)
Description Tunnel is bound to the interface. These are the direction values:
1From the NAS to the tunnel server 2From the tunnel server to the NAS
Virtual-Access3 VPN PPP LCP accepted sent & rcv CONFACK %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to up
Tunnel coming down
PPP link control protocol (LCP) configuration settings (negotiated between the remote client and the NAS) were copied to the tunnel server and acknowledged. Line protocol is up; the line can be used.
%LINK-3-UPDOWN: Interface Virtual-Access3, changed state to down Virtual-Access3 VPN cleanup Virtual-Access3 VPN reset Virtual-Access3 VPN Unbind interface Virtual-Access3 VPN reset %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to down
Virtual access interface is coming down. Router is performing normal cleanup operations when a virtual access interface used for an L2F tunnel comes down.
Line protocol is down for virtual access interface 3; the line cannot be used.
The following is sample output from the debug vpdn event command on the NAS when an L2TP tunnel is brought up successfully:
Router# debug vpdn event 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:17: 20:19:18: 20:19:18: 20:19:18: L2TP: I SCCRQ from ts1 tnl 8 L2X: Never heard of ts1 Tnl 7 L2TP: New tunnel created for remote ts1, address 172.21.9.4 Tnl 7 L2TP: Got a challenge in SCCRQ, ts1 Tnl 7 L2TP: Tunnel state change from idle to wait-ctl-reply Tnl 7 L2TP: Got a Challenge Response in SCCCN from ts1 Tnl 7 L2TP: Tunnel Authentication success Tnl 7 L2TP: Tunnel state change from wait-ctl-reply to established Tnl 7 L2TP: SM State established Tnl/Cl 7/1 L2TP: Session FS enabled Tnl/Cl 7/1 L2TP: Session state change from idle to wait-for-tunnel Tnl/Cl 7/1 L2TP: New session created Tnl/Cl 7/1 L2TP: O ICRP to ts1 8/1 Tnl/Cl 7/1 L2TP: Session state change from wait-for-tunnel to wait-connect Tnl/Cl 7/1 L2TP: Session state change from wait-connect to established Vi1 VPDN: Virtual interface created for [email protected] Vi1 VPDN: Set to Async interface Vi1 VPDN: Clone from Vtemplate 1 filterPPP=0 blocking %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up Vi1 VPDN: Bind interface direction=2 Vi1 VPDN: PPP LCP accepting rcv CONFACK
DB-2770
December 2010
The following is sample output from the debug vpdn event command on the tunnel server when an L2TP tunnel is brought up successfully:
Router# debug vpdn event 20:47:33: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:35: 20:47:36: %LINK-3-UPDOWN: Interface Async7, changed state to up As7 VPDN: Looking for tunnel -- cisco.com -As7 VPDN: Get tunnel info for cisco.com with NAS nas1, IP 172.21.9.13 As7 VPDN: Forward to address 172.21.9.13 As7 VPDN: Forwarding... As7 VPDN: Bind interface direction=1 Tnl/Cl 8/1 L2TP: Session FS enabled Tnl/Cl 8/1 L2TP: Session state change from idle to wait-for-tunnel As7 8/1 L2TP: Create session Tnl 8 L2TP: SM State idle Tnl 8 L2TP: Tunnel state change from idle to wait-ctl-reply Tnl 8 L2TP: SM State wait-ctl-reply As7 VPDN: [email protected] is forwarded Tnl 8 L2TP: Got a challenge from remote peer, nas1 Tnl 8 L2TP: Got a response from remote peer, nas1 Tnl 8 L2TP: Tunnel Authentication success Tnl 8 L2TP: Tunnel state change from wait-ctl-reply to established Tnl 8 L2TP: SM State established As7 8/1 L2TP: Session state change from wait-for-tunnel to wait-reply As7 8/1 L2TP: Session state change from wait-reply to established %LINEPROTO-5-UPDOWN: Line protocol on Interface Async7, changed state to up
The following is sample output from the debug vpdn l2x-events command on the NAS when an L2F tunnel is brought up successfully:
Router# debug vpdn l2x-events %LINK-3-UPDOWN: Interface Async6, changed state to up *Mar 2 00:41:17.365: L2F Open UDP socket to 172.21.9.26 *Mar 2 00:41:17.385: L2F_CONF received *Mar 2 00:41:17.389: L2F Removing resend packet (type 1) *Mar 2 00:41:17.477: L2F_OPEN received *Mar 2 00:41:17.489: L2F Removing resend packet (type 2) *Mar 2 00:41:17.493: L2F building nas2gw_mid0 %LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to up *Mar 2 00:41:18.613: L2F_OPEN received *Mar 2 00:41:18.625: L2F Got a MID management packet *Mar 2 00:41:18.625: L2F Removing resend packet (type 2) *Mar 2 00:41:18.629: L2F MID synced NAS/HG Clid=7/15 Mid=1 on Async6
The following is sample output from the debug vpdn l2x-events command on a NAS when an L2F tunnel is brought down normally:
Router# debug vpdn l2x-events %LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to down %LINK-5-CHANGED: Interface Async6, changed state to reset *Mar 2 00:42:29.213: L2F_CLOSE received *Mar 2 00:42:29.217: L2F Destroying mid *Mar 2 00:42:29.217: L2F Removing resend packet (type 3) *Mar 2 00:42:29.221: L2F Tunnel is going down!
DB-2771
*Mar 2 00:42:29.221: L2F Initiating tunnel shutdown. *Mar 2 00:42:29.225: L2F_CLOSE received *Mar 2 00:42:29.229: L2F_CLOSE received *Mar 2 00:42:29.229: L2F Got closing for tunnel *Mar 2 00:42:29.233: L2F Removing resend packet *Mar 2 00:42:29.233: L2F Closed tunnel structure %LINK-3-UPDOWN: Interface Async6, changed state to down *Mar 2 00:42:31.793: L2F Closed tunnel structure *Mar 2 00:42:31.793: L2F Deleted inactive tunnel
Field
Tunnel coming up
Descriptions Asynchronous interface came up normally. L2F opened a User Datagram Protocol (UDP) socket to the tunnel server IP address. L2F_CONF signal was received. When sent from the tunnel server to the NAS, an L2F_CONF indicates the tunnel server's recognition of the tunnel creation request. Removing the resend packet for the L2F management packet. There are two resend packets that have different meanings in different states of the tunnel.
%LINK-3-UPDOWN: Interface Async6, changed state to up L2F Open UDP socket to 172.21.9.26 L2F_CONF received
L2F_OPEN received
L2F_OPEN management message was received, indicating that the tunnel server accepted the NAS configuration of an L2F tunnel. L2F is building a tunnel between the NAS and the tunnel server, using the multiplex ID (MID) MID0. Line protocol came up. Indicates whether the software processes that handle the line protocol regard the interface as usable. L2F_OPEN management message was received, indicating that the tunnel server accepted the NAS configuration of an L2F tunnel. MID management packets are used to communicate between the NAS and the tunnel server.
L2F building nas2gw_mid0 %LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to up L2F_OPEN received
L2F MID synced NAS/HG Clid=7/15 Mid=1 L2F synchronized the client IDs on the NAS and the on Async6 tunnel server, respectively. A MID is assigned to identify this connection in the tunnel.
Tunnel coming down
Line protocol came down. Indicates whether the software processes that handle the line protocol regard the interface as usable.
DB-2772
December 2010
Table 371
Field %LINK-5-CHANGED: Interface Async6, changed state to reset L2F_CLOSE received L2F Destroying mid L2F Tunnel is going down! L2F Initiating tunnel shutdown. L2F_CLOSE received L2F Got closing for tunnel %LINK-3-UPDOWN: Interface Async6, changed state to down L2F Closed tunnel structure L2F Deleted inactive tunnel
Descriptions Interface was marked as reset. NAS received a request to close the tunnel. Connection identified by the MID is being taken down. Advisory message about impending tunnel shutdown. Tunnel shutdown has started. NAS received a request to close the tunnel. NAS began tunnel closing operations. Asynchronous interface was taken down. NAS closed the tunnel. Now-inactivated tunnel was deleted.
The following is sample output from the debug vpdn l2x-events command on a tunnel server when an L2F tunnel is created:
Router# debug vpdn l2x-events L2F_CONF received L2F Creating new tunnel for nas1 L2F Got a tunnel named nas1, responding L2F Open UDP socket to 172.21.9.25 L2F_OPEN received L2F Removing resend packet (type 1) L2F_OPEN received L2F Got a MID management packet %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to up
The following is sample output from the debug vpdn l2x-events command on a tunnel server when the L2F tunnel is brought down normally:
Router# debug vpdn l2x-events L2F_CLOSE received L2F Destroying mid L2F Removing resend packet (type 3) L2F Tunnel is going down! L2F Initiating tunnel shutdown. %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to down L2F_CLOSE received L2F Got closing for tunnel L2F Removing resend packet L2F Removing resend packet L2F Closed tunnel structure L2F Closed tunnel structure L2F Deleted inactive tunnel %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to down
DB-2773
Field
Tunnel coming up
Description L2F configuration is received from the NAS. When sent from a NAS to a tunnel server, the L2F_CONF is the initial packet in the conversation. Tunnel named nas1 is being created. Tunnel server is responding. Opening a socket to the NAS IP address. L2F_OPEN management message was received, indicating the NAS is opening an L2F tunnel. Removing the resend packet for the L2F management packet. The two resend packet types have different meanings in different states of the tunnel.
L2F_CONF received
L2F Creating new tunnel for nas1 L2F Got a tunnel named nas1, responding L2F Open UDP socket to 172.21.9.25 L2F_OPEN received L2F Removing resend packet (type 1)
L2F Got a MID management packet %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to up
Tunnel coming down
L2F MID management packets are used to communicate between the NAS and the tunnel server. Tunnel server is bringing up virtual access interface 1 for the L2F tunnel. Line protocol is up. The line can be used.
L2F_CLOSE received L2F Destroying mid L2F Removing resend packet (type 3)
NAS or tunnel server received a request to close the tunnel. Connection identified by the MID is being taken down. Removing the resend packet for the L2F management packet. There are two resend packets that have different meanings in different states of the tunnel.
L2F Tunnel is going down! L2F Initiating tunnel shutdown. %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to down
Router is performing normal operations when a tunnel is coming down. The virtual access interface is coming down.
DB-2774
December 2010
Table 372
Field L2F_CLOSE received L2F Got closing for tunnel L2F Removing resend packet L2F Removing resend packet L2F Closed tunnel structure L2F Closed tunnel structure L2F Deleted inactive tunnel %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to down
Displaying L2TP Congestion Avoidance Settings
Description Router is performing normal cleanup operations when the tunnel is being brought down.
The following partial example of the debug vpdn l2x-events command is useful for monitoring a network running the L2TP Congestion Avoidance feature. The report shows that the congestion window (CWND) window has been reset to 1 because of packet retransmissions:
Router# . . . *Jul 15 *Jul 15 *Jul 15 *Jul 15 *Jul 15 *Jul 15 debug vpdn l2x-events
Congestion Control event received is retransmission Congestion Window size, Cwnd 1 Slow Start threshold, Ssthresh 2 Remote Window size, 500 Control channel retransmit delay set to 4 seconds Update ns/nr, peer ns/nr 2/5, our ns/nr 5/2
The following partial example shows that traffic has been restarted with L2TP congestion avoidance throttling traffic:
Router# debug vpdn l2x-events . . . *Jul 15 14:45:16.123: Tnl 30597 *Jul 15 14:45:16.123: Tnl 30597 *Jul 15 14:45:16.131: Tnl 30597 acknowledgement *Jul 15 14:45:16.131: Tnl 30597 *Jul 15 14:45:16.131: Tnl 30597 *Jul 15 14:45:16.131: Tnl 30597 *Jul 15 14:45:16.131: Tnl 30597
L2TP: Control channel retransmit delay set to 2 seconds L2TP: Tunnel state change from idle to wait-ctl-reply L2TP: Congestion Control event received is positive L2TP: L2TP: L2TP: L2TP: Congestion Window size, Cwnd 2 Slow Start threshold, Ssthresh 500 Remote Window size, 500 Congestion Ctrl Mode is Slow Start
DB-2775
Table 373 briefly describes the sigificant fields shown in the displays. See RFC 2661 for more details about the information in the reports for L2TP congestion avoidance.
Table 373 debug vpdn l2x-events Field DescriptionsL2TP Congestion Avoidance
Field Control channel retransmit delay set to ... Tunnel state... Congestion Control event received is...
Description Indicates the current value set for the retransmit delay. Indicates the tunnels current Control Connection State, per RFC 2661. Indicates the received congestion control event.
RetransmissionIndicates packet retransmission has been detected in the resend queue. Positive acknowledgementIndicates that a packet was received and acknowledged by the peer tunnel endpoint.
Congestion Window size, Cwnd 2 Slow Start threshold, Ssthresh 500 Remote Window size, 500
Current size of the congestion window (Cwnd). Current value of the slow start threshold (Ssthresh). Size of the advertised receive window configured on the remote peer with the l2tp tunnel receive-window command. Indicates if the router is operating in Slow Start or Congestion Avoidance mode. See RFC 2661.
Congestion Ctrl Mode is... Update ns/nr, peer ns/nr 2/5, our ns/nr 5/2
The following is sample output from the debug vpdn error command on a NAS when the L2F tunnel is not set up:
Router# debug vpdn error %LINEPROTO-5-UPDOWN: Line protocol on Interface Async1, changed state to down %LINK-5-CHANGED: Interface Async1, changed state to reset %LINK-3-UPDOWN: Interface Async1, changed state to down %LINK-3-UPDOWN: Interface Async1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Async1, changed state to up VPDN tunnel management packet failed to authenticate VPDN tunnel management packet failed to authenticate
Field %LINEPROTO-5-UPDOWN: Line protocol on Interface Async1, changed state to down %LINK-5-CHANGED: Interface Async1, changed state to reset
Description Line protocol on the asynchronous interface went down. Asynchronous interface 1 was reset.
DB-2776
December 2010
Table 374
Field %LINK-3-UPDOWN: Interface Async1, changed state to down %LINK-3-UPDOWN: Interface Async1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Async1, changed state to up VPDN tunnel management packet failed to authenticate
Description Link from asynchronous interface 1 link went down and then came back up.
Line protocol on the asynchronous interface came back up. Tunnel authentication failed. This is the most common VPDN error.
Note
Verify the password for the NAS and the tunnel server name.
If you store the password on an AAA server, you can use the debug aaa authentication command. The following is sample output from the debug vpdn l2x-errors command:
Router# debug vpdn l2x-errors %LINK-3-UPDOWN: Interface Async1, changed state to up L2F Out of sequence packet 0 (expecting 0) L2F Tunnel authentication succeeded for cisco.com L2F Received a close request for a non-existent mid L2F Out of sequence packet 0 (expecting 0) L2F packet has bogus1 key 1020868 D248BA0F L2F packet has bogus1 key 1020868 D248BA0F
Field %LINK-3-UPDOWN: Interface Async1, changed state to up L2F Out of sequence packet 0 (expecting 0) L2F Tunnel authentication succeeded for cisco.com
Description The line protocol on the asynchronous interface came up. Packet was expected to be the first in a sequence starting at 0, but an invalid sequence number was received. Tunnel was established from the NAS to the tunnel server, cisco.com.
L2F Received a close request for Multiplex ID was not used previously; cannot close the tunnel. a non-existent mid L2F Out of sequence packet 0 (expecting 0) L2F packet has bogus1 key 1020868 D248BA0F L2F packet has bogus1 key 1020868 D248BA0F Packet was expected to be the first in a sequence starting at 0, but an invalid sequence number was received. Value based on the authentication response given to the peer during tunnel creation. This packet, in which the key does not match the expected value, must be discarded. Another packet was received with an invalid key value. The packet must be discarded.
DB-2777
The following is sample output from the debug vpdn l2x-packets command on a NAS. This example displays a trace for a ping command.
Router# debug vpdn l2x-packets L2F SENDING (17): D0 1 1 10 0 0 0 4 0 11 0 0 81 94 E1 A0 4 L2F header flags: 53249 version 53249 protocol 1 sequence 16 mid 0 cid 4 length 17 offset 0 key 1701976070 L2F RECEIVED (17): D0 1 1 10 0 0 0 4 0 11 0 0 65 72 18 6 5 L2F SENDING (17): D0 1 1 11 0 0 0 4 0 11 0 0 81 94 E1 A0 4 L2F header flags: 53249 version 53249 protocol 1 sequence 17 mid 0 cid 4 length 17 offset 0 key 1701976070 L2F RECEIVED (17): D0 1 1 11 0 0 0 4 0 11 0 0 65 72 18 6 5 L2F header flags: 57345 version 57345 protocol 2 sequence 0 mid 1 cid 4 length 32 offset 0 key 1701976070 L2F-IN Output to Async1 (16): FF 3 C0 21 9 F 0 C 0 1D 41 AD FF 11 46 87 L2F-OUT (16): FF 3 C0 21 A F 0 C 0 1A C9 BD FF 11 46 87 L2F header flags: 49153 version 49153 protocol 2 sequence 0 mid 1 cid 4 length 32 offset 0 key -2120949344 L2F-OUT (101): 21 45 0 0 64 0 10 0 0 FF 1 B9 85 1 0 0 3 1 0 0 1 8 0 62 B1 0 0 C A8 0 0 0 0 0 11 E E0 AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD L2F header flags: 49153 version 49153 protocol 2 sequence 0 mid 1 cid 4 length 120 offset 3 key -2120949344 L2F header flags: 49153 version 49153 protocol 2 sequence 0 mid 1 cid 4 length 120 offset 3 key 1701976070 L2F-IN Output to Async1 (101): 21 45 0 0 64 0 10 0 0 FF 1 B9 85 1 0 0 1 1 0 0 3 0 0 6A B1 0 0 C A8 0 0 0 0 0 11 E E0 AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD
Description Number of bytes being sent. The first set of SENDING...RECEIVED lines displays L2F keepalive traffic. The second set displays L2F management data. Version and flags, in decimal. Version. Protocol for negotiation of the point-to-point link between the NAS and the tunnel server is always 1, indicating L2F management. Sequence numbers start at 0. Each subsequent packet is sent with the next increment of the sequence number. The sequence number is thus a free running counter represented modulo 256. There is a distinct sequence counter for each distinct MID value. MID, which identifies a particular connection within the tunnel. Each new connection is assigned a MID currently unused within the tunnel. Client ID used to assist endpoints in demultiplexing tunnels. Size in octets of the entire packet, including header, all fields pre-sent, and payload. Length does not reflect the addition of the checksum, if pre-sent.
DB-2778
December 2010
Table 376
Field offset 0
Description Number of bytes past the L2F header at which the payload data is expected to start. If it is 0, the first byte following the last byte of the L2F header is the first byte of payload data. Value based on the authentication response given to the peer during tunnel creation. During the life of a session, the key value serves to resist attacks based on spoofing. If a packet is received in which the key does not match the expected value, the packet must be silently discarded. Number of bytes received. Payload datagram. The data came in to the VPDN code. Payload datagram sent out from the VPDN code to the tunnel. Ping payload datagram. The value 62 in this line is the ping packet size in hexadecimal (98 in decimal). The three lines that follow this line show ping packet data.
key 1701976070
L2F RECEIVED (17) L2F-IN Otput to Async1 (16) L2F-OUT (16): L2F-OUT (101)
The following example shows output from the debug vpdn l2x-events command for an L2TP version 3 (L2TPv3) xconnect session on an Ethernet interface:
Router# debug vpdn l2x-events 23:31:18: L2X: l2tun session [1669204400], event [client request], old state [open], new state [open] 23:31:18: L2X: L2TP: Received L2TUN message <Connect> 23:31:18: Tnl/Sn58458/28568 L2TP: Session state change from idle to wait-for-tunnel 23:31:18: Tnl/Sn58458/28568 L2TP: Create session 23:31:18: Tnl58458 L2TP: SM State idle 23:31:18: Tnl58458 L2TP: O SCCRQ 23:31:18: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds 23:31:18: Tnl58458 L2TP: Tunnel state change from idle to wait-ctl-reply 23:31:18: Tnl58458 L2TP: SM State wait-ctl-reply 23:31:18: Tnl58458 L2TP: I SCCRP from router 23:31:18: Tnl58458 L2TP: Tunnel state change from wait-ctl-reply to established 23:31:18: Tnl58458 L2TP: O SCCCN to router tnlid 8012 23:31:18: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds 23:31:18: Tnl58458 L2TP: SM State established 23:31:18: Tnl/Sn58458/28568 L2TP: O ICRQ to router 8012/0 23:31:18: Tnl/Sn58458/28568 L2TP: Session state change from wait-for-tunnel to wait-reply 23:31:19: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds 23:31:20: %LINK-3-UPDOWN: Interface Ethernet2/1, changed state to up 23:31:21: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet2/1, changed state to up 23:31:25: L2X: Sending L2TUN message <Connect OK> 23:31:25: Tnl/Sn58458/28568 L2TP: O ICCN to router 8012/35149 23:31:25: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds 23:31:25: Tnl/Sn58458/28568 L2TP: Session state change from wait-reply to established 23:31:25: L2X: l2tun session [1669204400], event [server response], old state [open], new state [open] 23:31:26: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds
DB-2779
The following debug messages show control channel authentication failure events in Cisco IOS Release 12.0(31)S:
Router# debug vpdn l2x-events ! Tnl41855 L2TP: Per-Tunnel auth counter, Overall Failed, now 1 Tnl41855 L2TP: Tunnel auth counter, Overall Failed, now 219 !
Related Commands
Command debug aaa authentication debug acircuit debug pppoe debug vpdn pppoe-data debug vpdn pppoe-error
Description Displays information on AAA/TACACS+ authentication. Displays events and failures related to attachment circuits. Display debugging information for PPPoE sessions. Displays data packets of PPPoE sessions. Displays PPPoE protocol errors that prevent a session from being established or errors that cause an established sessions to be closed. Displays PPPoE protocol messages about events that are part of normal session establishment or shutdown. Displays each PPPoE protocol packet exchanged. Displays errors and events related to an xconnect configuration.
DB-2780
December 2010
Effective with Cisco IOS Release 12.2(13)T, the debug vpdn pppoe-data command is replaced by the debug pppoe command. See the debug pppoe command for more information. To display data packets of PPP over Ethernet (PPPoE) sessions, use the debug vpdn pppoe-data command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vpdn pppoe-data no debug vpdn pppoe-data
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was replaced by the debug pppoe command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug vpdn pppoe-data command displays a large number of debug messages and should generally be used only on a debug chassis with a single active session.
Examples
The following is sample output from the debug vpdn pppoe-data command:
Router# debug vpdn pppoe-data 6d20h:%LINK-3-UPDOWN:Interface Virtual-Access1, changed state to up 6d20h:PPPoE:OUT contiguous pak, size 19 FF 03 C0 21 01 01 00 0F 03 05 C2 23 05 05 06 D3 FF 2B DA 6d20h:PPPoE:IN particle pak, size 1240 C0 21 01 01 00 0A 05 06 39 53 A5 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6d20h:PPPoE:OUT contiguous pak, size 14 FF 03 C0 21 02 01 00 0A 05 06 39 53 A5 17 6d20h:PPPoE:OUT contiguous pak, size 19 FF 03 C0 21 01 02 00 0F 03 05 C2 23 05 05 06 D3
DB-2781
05 C2 23 05 05 06 D3 FF 2B 00 00 10 7B 01 2C D9 00 B0 00
1A 10 99 1E 6E 8F 8C F2 C6 68 13 47 61 6E 67 61
6d20h:PPPoE:IN particle pak, size 3840 C2 23 02 06 00 24 10 E6 84 FF 3A A4 49 19 CE D7 AC D7 D5 96 CC 23 B3 41 6B 61 73 68 40 63 69 73 63 6F 2E 63 6F 6D 00 00 6d20h:PPPoE:OUT contiguous pak, size 8 FF 03 C2 23 03 06 00 04 6d20h:PPPoE:OUT contiguous pak, size 14 FF 03 80 21 01 01 00 0A 03 06 65 65 00 66 6d20h:PPPoE:IN particle pak, size 1240 80 21 01 01 00 0A 03 06 00 00 00 00 49 19 CE D7 AC D7 D5 96 CC 23 B3 41 6B 61 73 68 40 63 69 73 63 6F 2E 63 6F 6D 00 00 6d20h:PPPoE:OUT contiguous pak, size 14 FF 03 80 21 03 01 00 0A 03 06 65 65 00 67 6d20h:PPPoE:IN particle pak, size 1240 80 21 02 01 00 0A 03 06 65 65 00 66 00 04 AA AA 03 00 80 C2 00 07 00 00 00 10 7B 01 2C D9 00 B0 C2 EB 10 38 88 64 11 00 6d20h:PPPoE:IN particle pak, size 1240 80 21 01 02 00 0A 03 06 65 65 00 67 49 19 CE D7 AC D7 D5 96 CC 23 B3 41 6B 61 73 68 40 63 69 73 63 6F 2E 63 6F 6D 00 00 6d20h:PPPoE:OUT contiguous pak, size 14 FF 03 80 21 02 02 00 0A 03 06 65 65 00 67 6d20h:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access1, changed state to up 6d20h:PPPoE:OUT contiguous pak, size 16 FF 03 C0 21 09 01 00 0C D3 FF 2B DA 4C 4D 49 A4 6d20h:PPPoE:IN particle pak, size 1440 C0 21 0A 01 00 0C 39 53 A5 17 4C 4D 49 A4 AA AA 03 00 80 C2 00 07 00 00 00 10 7B 01 2C D9 00 B0 C2 EB 10 38 88 64 11 00 6d20h:PPPoE:IN particle pak, size 1440 C0 21 09 01 00 0C 39 53 A5 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
DB-2782
December 2010
Table 377
Field 6d20h:%LINK-3-UPDOWN:Interface Virtual-Access1, changed state to up 6d20h:PPPoE:OUT 6d20h:PPPoE:IN 6d20h:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access1, changed state to up contiguous pak, size 19 particle pak, size 1240
Descriptions Virtual access interface 1 came up. The host delivered a PPPoE session packet to the access concentrator. The access concentrator received a PPPoE session packet. Line protocol is up; the line can be used.
Related Commands
Command debug pppoe debug vpdn pppoe-error debug vpdn pppoe-events debug vpdn pppoe-packet protocol (VPDN) show vpdn vpdn enable
Description Displays debugging information for PPPoE sessions. Displays PPPoE protocol errors that prevent a session from being established or errors that cause an established session to be closed. Displays PPPoE protocol messages about events that are part of normal session establishment or shutdown. Displays each PPPoE protocol packet exchanged. Specifies the L2TP that the VPDN subgroup will use. Displays information about active L2F protocol tunnel and message identifiers in a VPDN. Enables virtual private dialup networking on the router and informs the router to look for tunnel definitions in a local database and on a remote authorization server (home gateway), if one is present.
DB-2783
Effective with Cisco IOS Release 12.2(13)T, the debug vpdn pppoe-error command is replaced by the debug pppoe command. See the debug pppoe command for more information. To display PPP over Ethernet (PPPoE) protocol errors that prevent a session from being established or errors that cause an established sessions to be closed, use the debug vpdn pppoe-error command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vpdn pppoe-error no debug vpdn pppoe-error
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was replaced by the debug pppoe command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is a full list of error messages displayed by the debug vpdn pppoe-error command:
PPPOE:pppoe_acsys_err cannot grow packet PPPoE:Cannot find PPPoE info PPPoE:Bad MAC address:00b0c2eb1038 PPPOE:PADI has no service name tag PPPoE:pppoe_handle_padi cannot add AC name/Cookie. PPPoE:pppoe_handle_padi cannot grow packet PPPoE:pppoe_handle_padi encap failed PPPoE cannot create virtual access. PPPoE cannot allocate session structure. PPPoE cannot store session element in tunnel. PPPoE cannot allocate tunnel structure. PPPoE cannot store tunnel PPPoE:VA221:No Session, Packet Discarded PPPOE:Tried to shutdown a null session PPPoE:Session already open, closing PPPoE:Bad cookie:src_addr=00b0c2eb1038 PPPoE:Max session count on mac elem exceeded:mac=00b0c2eb1038 PPPoE:Max session count on vc exceeded:vc=3/77 PPPoE:Bad MAC address - dropping packet PPPoE:Bad version or type - dropping packet
DB-2784
December 2010
Table 378
Field PPPoE:Cannot find PPPoE info PPPoE:Bad MAC address:00b0c2eb1038 PPPOE:PADI has no service name tag PPPoE:pppoe_handle_padi cannot add AC name/Cookie. PPPoE:pppoe_handle_padi cannot grow packet PPPoE:pppoe_handle_padi encap failed PPPoE cannot create virtual access. PPPoE cannot allocate session structure. PPPoE cannot store session element in tunnel. PPPoE cannot allocate tunnel structure. PPPoE cannot store tunnel
Descriptions The access concentrator sends a PADO to the host. The host was unable to identify the Ethernet MAC address. PADI requires a service name tag. pppoe_handle_padi could not append AC name. pppoe_handle_padi could not append packet. pppoe_handle_padi could not specify PPPoE on ATM encapsulation. PPPoE session unable to verify virtual access interface. PPPoE session unable to allocate Stage Protocol. PPPoE tunnel cannot allocate session element. PPPoE tunnel unable to allocate Stage Protocol. PPPoE configuration settings unable to initialize a tunnel. Null session shutdown. PPPoE session already open. The maximum number of sessions exceeded the Ethernet MAC address. The maximum number of sessions exceeded the PVC connection.
PPPoE:VA221:No Session, Packet Discarded No sessions created. All packets dropped. PPPOE:Tried to shutdown a null session PPPoE:Session already open, closing PPPoE:Max session count on mac elem exceeded:mac=00b0c2eb1038 PPPoE:Max session count on vc exceeded:vc=3/77
PPPoE:Bad MAC address - dropping packet The host was unable to identify the MAC address. Packet dropped. PPPoE:Bad version or type - dropping packet The host was unable to identify the encapsulation type.
Related Commands
Command debug pppoe debug vpdn pppoe-data debug vpdn pppoe-events debug vpdn pppoe-packet protocol (VPDN)
Description Displays debugging information for PPPoE sessions. Displays data packets of PPPoE sessions. Displays PPPoE protocol messages about events that are part of normal session establishment or shutdown. Displays each PPPoE protocol packet exchanged. Specifies the L2TP that the VPDN subgroup will use.
DB-2785
Description Displays information about active L2F protocol tunnel and message identifiers in a VPDN. Enables virtual private dialup networking on the router and informs the router to look for tunnel definitions in a local database and on a remote authorization server (home gateway), if one is pre-sent.
DB-2786
December 2010
Effective with Cisco IOS Release 12.2(13)T, the debug vpdn pppoe-events command is replaced by the debug pppoe command. See the debug pppoe command for more information. To display PPP over Ethernet (PPPoE) protocol messages about events that are part of normal session establishment or shutdown, use the debug vpdn pppoe-events command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vpdn pppoe-events no debug vpdn pppoe-events
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was replaced by the debug pppoe command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug vpdn pppoe-events command:
1w5d:IN PADI from PPPoE tunnel 1w5d:OUT PADO from PPPoE tunnel 1w5d:IN PADR from PPPoE tunnel 1w5d:PPPoE:VPN session created. 1w5d:%LINK-3-UPDOWN:Interface Virtual-Access2, changed state to up 1w5d:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access2, changed state to up
Field 1w5d:IN PADI from PPPoE tunnel 1w5d:OUT PADO from PPPoE tunnel
Descriptions The access concentrator receives an Active Discovery Initiation (PADI) packet from the PPPoE tunnel. The access concentrator sends an Active Discovery Offer (PADO) to the host.
DB-2787
Table 379
Descriptions The host sends a single Active Discovery Request (PADR) to the access concentrator that it has chosen.
1w5d:PPPoE:VPN session created. 1w5d:%LINK-3-UPDOWN:Interface Virtual-Access2, changed state to up 1w5d:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access2, changed state to up
The access concentrator receives the PADR packet and creates a virtual private network (VPN) session. Virtual access interface 2 came up. Line protocol is up. The line can be used.
Related Commands
Command debug pppoe debug vpdn pppoe-data debug vpdn pppoe-error debug vpdn pppoe-packet protocol (VPDN) show vpdn vpdn enable
Description Displays debugging information for PPPoE sessions. Displays data packets of PPPoE sessions. Displays PPPoE protocol errors that prevent a session from being established or errors that cause an established session to be closed. Displays each PPPoE protocol packet exchanged. Specifies the L2TP that the VPDN subgroup will use. Displays information about active L2F protocol tunnel and message identifiers in a VPDN. Enables virtual private dialup networking on the router and informs the router to look for tunnel definitions in a local database and on a remote authorization server (home gateway), if one is pre-sent.
DB-2788
December 2010
Effective with Cisco IOS Release 12.2(13)T, the debug vpdn pppoe-packet command is replaced by the debug pppoe command. See the debug pppoe command for more information. To display each PPP over Ethernet (PPPoE) protocol packet exchanged, use the debug vpdn pppoe-packet command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vpdn pppoe-packet no debug vpdn pppoe-packet
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was replaced by the debug pppoe command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug vpdn pppoe-packet command displays a large number of debug messages and should generally only be used on a debug chassis with a single active session.
Examples
The following is sample output from the debug vpdn pppoe-packet command:
PPPoE control packets debugging is on 1w5d:PPPoE:discovery packet contiguous pak, size 74 FF FF FF FF FF FF 00 10 7B 00 00 00 04 01 01 00 00 00 00 00 00 00 00 00 00 00 00 1w5d:OUT PADO from PPPoE tunnel contiguous pak, size 74 00 01 09 00 AA AA 03 00 80 7B 01 2C D9 00 90 AB 13 BC 00 20 01 01 00 00 01 02 00 1w5d:PPPoE:discovery packet contiguous pak, size 74 00 90 AB 13 BC A8 00 10 7B 00 00 00 20 01 01 00 00 01 01 04 00 10 B7 4B 86 5B 90
01 2C D9 88 63 11 09 00 00 00 00 00 00 00 00 00 00 00 00 00 ...
C2 00 07 00 00 00 10 A8 88 63 11 07 00 00 04 41 67 6E 69 01 ...
01 2C D9 88 63 11 19 02 00 04 41 67 6E 69 A5 EF 11 64 A9 BA ...
DB-2789
Field PPPoE control packets debugging is on 1w5d:PPPoE:discovery packet 1w5d:OUT PADO from PPPoE tunnel 1w5d:PPPoE:discovery packet contiguous pak, size 74
Descriptions PPPoE debugging of packets is enabled. The host performs a discovery to initiate a PPPoE session. The access concentrator sends a PADO to the host. The host performs a discovery to initiate a PPPoE session. Size 74 contiguous packet.
Related Commands
Command debug pppoe debug vpdn pppoe-data debug vpdn pppoe-error debug vpdn pppoe-events protocol (VPDN) show vpdn vpdn enable
Description Displays debugging information for PPPoE sessions. Displays data packets of PPPoE sessions. Displays PPPoE protocol errors that prevent a session from being established or errors that cause an established session to be closed. Displays PPPoE protocol messages about events that are part of normal session establishment or shutdown. Specifies the L2TP that the VPDN subgroup will use. Displays information about active L2F protocol tunnel and message identifiers in a VPDN. Enables virtual private dialup networking on the router and informs the router to look for tunnel definitions in a local database and on a remote authorization server (home gateway), if one is pre-sent.
DB-2790
December 2010
Syntax Description
Displays VPDN redundancy-facility (cf) events. Displays VPDN redundancy details. Displays VPDN redundancy errors. Displays VPDN redundancy events. Displays VPDN redundancy forwarding-service manager (fsm) events. Displays VPDN redundancy resynchronizations. Displays VPDN redundancy-facility (rf) events.
Command Modes
Command History
Usage Guidelines
Use the debug vpdn redundancy command in privileged EXEC mode to display a list of VPDN sessions that have redundancy events and errors. Use the show vpdn redundancy command in privileged EXEC mode to display information on the state of the VPDN session redundancy data.
Examples
The following example shows how to display a debug of redundancy events during the setup and termination of an tunnel for an LNS active Route Processor (RP):
LNS1> debug enable LNS1# debug vpdn redundancy cf L2TP redundancy cf debugging is on LNS1# debug vpdn redundancy detail L2TP redundancy details debugging is on LNS1# debug vpdn redundancy error L2TP redundancy errors debugging is on LNS1# debug vpdn redundancy event L2TP redundancy events debugging is on LNS1# debug vpdn redundancy fsm L2TP redundancy fsm debugging is on LNS1# debug vpdn redundancy resync
DB-2791
L2TP redundancy resync debugging is on LNS1# debug vpdn redundancy rf L2TP redundancy rf debugging is on LNS1# *Aug 26 18:00:00.467: %SYS-5-CONFIG_I: Configured from console by console LNS1# *Aug 26 18:00:45.631: L2TP tnl 01000:________: CCM initialized CCM session *Aug 26 18:00:45.631: : L2TP HA:CC playback chkpt skipped, CC not doing HA *Aug 26 18:00:45.711: : L2TP HA FSM:Receive proto FSM event 19 *Aug 26 18:00:45.711: : L2TP HA FSM:Receive RxSCCRQ *Aug 26 18:00:45.711: : L2TP HA:lcm_cc alloc: l2tp_cc 070B45B8, lcm_cc 02FE55E8 *Aug 26 18:00:45.711: : L2TP HA FSM:FSM-CC ev Rx-SCCRQ *Aug 26 18:00:45.711: : L2TP HA FSM:FSM-CC Idle->Wt-ChkptSidRmt *Aug 26 18:00:45.711: : L2TP HA FSM:FSM-CC do Block-Tx-AckSCCRQ *Aug 26 18:00:45.711: : L2TP HA FSM:Checkpoint Two Cc IDs *Aug 26 18:00:45.711: L2TP HA CF: Chkpt send: s/c id 0/52631, BothCcId, seq 0, ns/nr 0/0, rid 51583, len 52; flush = 1, ctr 1 *Aug 26 18:00:45.711: 01000:0000CD97: L2TP HA:Enqueue peer Ns 0 to ns_q, seq 1 (q sz 0) *Aug 26 18:00:45.711: L2TP tnl 01000:0000CD97: Encoding SCCRQ-IN CHKPT *Aug 26 18:00:45.711: L2TP tnl 01000:0000CD97: Tx CHKPT *Aug 26 18:00:45.739: L2TP tnl 01000:0000CD97: Encoding SCCRP-OUT CHKPT *Aug 26 18:00:45.739: L2TP tnl 01000:0000CD97: Tx CHKPT *Aug 26 18:00:45.739: : L2TP HA:Adjust local window size to 10 *Aug 26 18:00:45.739: 01000:0000CD97: L2TP HA FSM:Receive proto TxCM event SCCRP *Aug 26 18:00:45.739: : L2TP HA FSM:Receive TxSCCRP LNS1# *Aug 26 18:00:45.739: : L2TP HA FSM:FSM-CC ev Tx-SCCRP *Aug 26 18:00:45.739: : L2TP HA FSM:FSM-CC Wt-ChkptSidRmt->WtCcIdRmt2 *Aug 26 18:00:45.739: : L2TP HA FSM:FSM-CC do Block-Tx-SCCRP *Aug 26 18:00:45.739: 01000:0000CD97: L2TP HA FSM:Found blocked RxSCCRQ, seq_num 1 *Aug 26 18:00:45.739: 01000:0000CD97: L2TP HA FSM:Queued SCCRP to CC hold_q *Aug 26 18:00:46.863: : L2TP HA FSM:CHKPT status callback: status 0, len 56 *Aug 26 18:00:46.863: : L2TP HA FSM:Context s/c id 0/52631, BothCcId, seq 1, ns/nr 0/0, rid 51583, len 52 *Aug 26 18:00:46.863: L2TP HA CF: Rcvd status s/c id 0/52631, BothCcId, seq 1, ns/nr 0/0, rid 51583, len 52 *Aug 26 18:00:46.863: L2TP HA CF: Rcvd status 0: len 56 *Aug 26 18:00:46.863: L2TP HA CF: Status content s/c id 0/52631, BothCcId, seq 1, ns/nr 0/0, rid 51583, len 52 *Aug 26 18:00:46.863: 01000:0000CD97: L2TP HA FSM:Recv chkpt ack: s/c id 0/52631, BothCcId, seq 1, ns/nr 0/0, rid 51583, len 52 *Aug 26 18:00:46.863: : L2TP HA FSM:Receive CC-ChkptAck *Aug 26 18:00:46.863: : L2TP HA FSM:FSM-CC ev Rx-CkpACK-CcID-Rmt *Aug 26 18:00:46.863: : L2TP HA FSM:FSM-CC WtCcIdRmt2->Wt-RxSccn *Aug 26 18:00:46.863: : L2TP HA FSM:FSM-CC do Allow-Tx-SCCRP2 *Aug 26 18:00:46.863: : L2TP HA FSM:Received Chkpt of local + remote CC ID *Aug 26 18:00:46.863: 01000:0000CD97: L2TP HA:Try to remove from CC's ns_q: seq num 1 (current Ns 1) *Aug 26 18:00:46.863: 01000:0000CD97: L2TP HA:Ns entry to remove: found (current Ns 1) *Aug 26 18:00:46.863: 01000:0000CD97: L2TP HA:Advance peer Nr to 1 (ns_q sz 0) *Aug 26 18:00:46.863: 01000:0000CD97: L2TP HA:CC send all unblocked if can LNS1# *Aug 26 18:00:46.863: 01000:0000CD97: L2TP HA:CC send one blocked CM (SCCRP): ns 0 (0), nr 1 *Aug 26 18:00:46.863: L2TP HA CF: O SCCRP 51583/0 ns/nr 0/1 *Aug 26 18:00:47.867: 01000:0000CD97: L2TP HA FSM:Receive Cm-Ack *Aug 26 18:00:47.867: 01000:0000CD97: L2TP HA FSM:Receive CC Cm-Ack *Aug 26 18:00:47.867: : L2TP HA FSM:FSM-CC ev Rx-CmACK *Aug 26 18:00:47.867: : L2TP HA FSM:FSM-CC in Wt-RxSccn *Aug 26 18:00:47.867: : L2TP HA FSM:FSM-CC do Ignore *Aug 26 18:00:47.867: 01000:0000CD97: L2TP HA FSM:Ignore event *Aug 26 18:00:47.867: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 1, peer 1
DB-2792
December 2010
*Aug 26 18:00:47.867: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (1,0/1,1, int 1, rx 1, 1) (ns_q sz 0) *Aug 26 18:00:47.867: 01000:0000CD97: L2TP HA FSM:Peer Ns 1 (1), Nr 1 (ns_q sz 0) *Aug 26 18:00:48.087: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 1, peer 1 *Aug 26 18:00:48.087: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (1,0/1,1, int 1, rx 1, 1) (ns_q sz 0) *Aug 26 18:00:48.087: 01000:0000CD97: L2TP HA FSM:Peer Ns 1 (2), Nr 1 (ns_q sz 0) *Aug 26 18:00:48.087: : L2TP HA FSM:Receive proto FSM event 21 *Aug 26 18:00:48.087: 01000:0000CD97: L2TP HA FSM:Receive RxSCCCN *Aug 26 18:00:48.087: : L2TP HA FSM:FSM-CC ev Rx-SCCCN *Aug 26 18:00:48.087: : L2TP HA FSM:FSM-CC Wt-RxSccn->WtCcsUp *Aug 26 18:00:48.087: : L2TP HA FSM:FSM-CC do Allow-Tx-AckSCCCN *Aug 26 18:00:48.087: 01000:0000CD97: L2TP HA FSM:Allow TxSCCCN-ACK *Aug 26 18:00:48.087: 01000:0000CD97: L2TP HA FSM:Receive CcUp *Aug 26 18:00:48.087: : L2TP HA FSM:FSM-CC ev Proto CcUp *Aug 26 18:00:48.087: : L2TP HA FSM:FSM-CC WtCcsUp->Wt-CkptCcUp *Aug 26 18:00:48.087: : L2TP HA FSM:FSM-CC do Chkpt-CcUp2 *Aug 26 18:00:48.087: : L2TP HA FSM:Checkpoint CcUp *Aug 26 18:00:48.087: L2TP HA CF: Chkpt send: s/c id 0/52631, CcUp, seq 0, ns/nr 1/1, rid 0, len 52; flush = 1, ctr 2 *Aug 26 18:00:48.091: L2TP tnl 01000:0000CD97: CCM added sync data *Aug 26 18:00:48.095: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 2, peer 1 *Aug 26 18:00:48.095: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (2,1/1,1, int 2, rx 1, 2) (ns_q sz 0) *Aug 26 18:00:48.095: 01000:0000CD97: L2TP HA FSM:Peer Ns 2 (3), Nr 1 (ns_q sz 0) *Aug 26 18:00:48.095: L2TP _____:01000:000036F8: Encoding ICRQ-IN CHKPT *Aug 26 18:00:48.095: L2TP _____:01000:000036F8: Tx CHKPT *Aug 26 18:00:48.095: : L2TP HA FSM:Receive proto FSM event 3 *Aug 26 18:00:48.095: : L2TP HA FSM:Receive RxICRQ *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM: Using ICRQ FSM *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev created *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Init->Idle *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do none *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Rx-xCRQ *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Idle->Wt-ChkptSidRmt *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Block-Tx-AckXCRQ *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA FSM:Checkpoint TwoSessionIDs *Aug 26 18:00:48.095: L2TP HA CF: Chkpt send: s/c id 14072/52631, BothSesId, seq 0, ns/nr 1/2, rid 40276, len 52; flush = 1, ctr 3 *Aug 26 18:00:48.095: _____:01000:000036F8: L2TP HA:Enqueue peer Ns 2 to ns_q, seq 3 (q sz 0) *Aug 26 18:00:48.131: : L2TP HA:Try to buffer sock msg type 19 *Aug 26 18:00:48.131: : L2TP HA:Buffering skipped *Aug 26 18:00:48.131: L2TP _____:01000:000036F8: Encoding ICRP-OUT CHKPT *Aug 26 18:00:48.131: L2TP _____:01000:000036F8: Tx CHKPT *Aug 26 18:00:48.131: 01000:0000CD97: L2TP HA FSM:Receive proto TxCM event ICRP *Aug 26 18:00:48.131: _____:_____:000036F8: L2TP HA FSM:Receive TxICRP *Aug 26 18:00:48.131: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Tx-xCRP *Aug 26 18:00:48.131: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Wt-ChkptSidRmt->Wt-SesIdRmt2 *Aug 26 18:00:48.131: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Block-Tx-xCRP *Aug 26 18:00:48.131: _____:01000:000036F8: L2TP HA FSM:Found blocked RxICRQ, seq_num 3 LNS1# *Aug 26 18:00:48.131: _____:01000:000036F8: L2TP HA FSM:Queued xCRP to session hold_q *Aug 26 18:00:48.131: : L2TP HA:Try to buffer sock msg type 23 *Aug 26 18:00:48.131: : L2TP HA:CC not in resync state, buffering skipped *Aug 26 18:00:49.115: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 2, peer 1 *Aug 26 18:00:49.115: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (2,2/1,1, int 3, rx 1, 3) (ns_q sz 1) *Aug 26 18:00:49.211: : L2TP HA FSM:CHKPT status callback: status 0, len 56 *Aug 26 18:00:49.211: : L2TP HA FSM:Context s/c id 0/52631, CcUp, seq 2, ns/nr 1/1, rid 0, len 52 *Aug 26 18:00:49.211: : L2TP HA FSM:CHKPT status callback: status 0, len 56
DB-2793
*Aug 26 18:00:49.211: : L2TP HA FSM:Context s/c id 14072/52631, BothSesId, seq 3, ns/nr 1/2, rid 40276, len 52 *Aug 26 18:00:49.211: L2TP HA CF: Rcvd status s/c id 0/52631, CcUp, seq 2, ns/nr 1/1, rid 0, len 52 *Aug 26 18:00:49.211: L2TP HA CF: Rcvd status 0: len 56 *Aug 26 18:00:49.211: L2TP HA CF: Status content s/c id 0/52631, CcUp, seq 2, ns/nr 1/1, rid 0, len 52 *Aug 26 18:00:49.211: 01000:0000CD97: L2TP HA FSM:Recv chkpt ack: s/c id 0/52631, CcUp, seq 2, ns/nr 1/1, rid 0, len 52 *Aug 26 18:00:49.211: : L2TP HA FSM:Receive CC-ChkptAck *Aug 26 18:00:49.211: : L2TP HA FSM:FSM-CC ev Rx-CkpACK-CcUp *Aug 26 18:00:49.211: : L2TP HA FSM:FSM-CC Wt-CkptCcUp->ProcCcsUp *Aug 26 18:00:49.211: : L2TP HA FSM:FSM-CC do Proc-ChpACK-CcUp2 *Aug 26 18:00:49.211: : L2TP HA FSM:Received chkpt ACK of CcUp *Aug 26 18:00:49.211: L2TP HA CF: Rcvd status s/c id 14072/52631, BothSesId, seq 3, ns/nr 1/2, rid 40276, len 52 *Aug 26 18:00:49.211: L2TP HA CF: Rcvd status 0: len 56 *Aug 26 18:00:49.211: L2TP HA CF: Status content s/c id 14072/52631, BothSesId, seq 3, ns/nr 1/2, rid 40276, len 52 *Aug 26 18:00:49.211: 01000:0000CD97: L2TP HA FSM:Recv chkpt ack: s/c id 14072/52631, BothSesId, seq 3, ns/nr 1/2, rid 40276, len 52 *Aug 26 18:00:49.211: _____:_____:000036F8: L2TP HA FSM:Receive Session-ChkptAck *Aug 26 18:00:49.211: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Rx-CktACK-SesID-Rmt *Aug 26 18:00:49.211: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Wt-SesIdRmt2->Wt-RxXccn *Aug 26 18:00:49.211: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Allow-Tx-xCRP *Aug 26 18:00:49.211: 01000:0000CD97: L2TP HA:Try to remove from CC's ns_q: seq num 3 (current Ns 3) *Aug 26 18:00:49.211: _____:01000:000036F8: L2TP HA:Ns entry to remove: found (current Ns 3) *Aug 26 18:00:49.211: _____:01000:000036F8: L2TP HA:Advance peer Nr to 3 (ns_q sz 0) *Aug 26 18:00:49.211: _____:01000:000036F8: L2TP HA:Session send all unblocked *Aug 26 18:00:49.211: 01000:0000CD97: L2TP HA:CC send if can (ICRP): ns 1 (1, 1), nr 3 (3) *Aug 26 18:00:49.211: L2TP HA CF: O ICRP 51583/40276 ns/nr 1/3 *Aug 26 18:00:49.231: 01000:0000CD97: L2TP HA FSM:Receive Cm-Ack *Aug 26 18:00:49.231: _____:_____:000036F8: L2TP HA FSM:Receive session Cm-Ack LNS1# *Aug 26 18:00:49.231: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Rx-CmACK *Aug 26 18:00:49.231: _____:01000:000036F8: L2TP HA FSM:FSM-Sn in Wt-RxXccn *Aug 26 18:00:49.231: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Ignore *Aug 26 18:00:49.231: _____:01000:000036F8: L2TP HA FSM:Ignore event *Aug 26 18:00:49.231: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 3, peer 2 *Aug 26 18:00:49.231: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (3,2/2,2, int 3, rx 2, 3) (ns_q sz 0) *Aug 26 18:00:49.231: 01000:0000CD97: L2TP HA FSM:Peer Ns 3 (3), Nr 2 (ns_q sz 0) LNS1# *Aug 26 18:00:50.407: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 3, peer 2 *Aug 26 18:00:50.407: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (3,2/2,2, int 3, rx 2, 3) (ns_q sz 0) *Aug 26 18:00:50.407: 01000:0000CD97: L2TP HA FSM:Peer Ns 3 (4), Nr 2 (ns_q sz 0) *Aug 26 18:00:50.407: : L2TP HA FSM:Receive proto FSM event 5 *Aug 26 18:00:50.407: _____:_____:000036F8: L2TP HA FSM:Receive RxICCN *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Rx-xCCN *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Wt-RxXccn->Wt-SessUp *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Allow-Tx-AckXCCN *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:Allow TxICCN-ACK *Aug 26 18:00:50.407: L2TP _____:01000:000036F8: Encoding ICCN-IN CHKPT *Aug 26 18:00:50.407: L2TP _____:01000:000036F8: Tx CHKPT *Aug 26 18:00:50.407: _____:_____:000036F8: L2TP HA FSM:Receive SessionUp *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Proto SessUp *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Wt-SessUp->Wt-CkptSesUp *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Chkpt-SesUp2 *Aug 26 18:00:50.407: _____:01000:000036F8: L2TP HA FSM:Checkpoint SessionUP *Aug 26 18:00:50.407: L2TP HA CF: Chkpt send: s/c id 14072/52631, SesUp, seq 0, ns/nr 2/3, rid 0, len 52; flush = 1, ctr 4
DB-2794
December 2010
*Aug 26 18:00:51.055: : L2TP HA FSM:CHKPT status callback: status 0, len 56 *Aug 26 18:00:51.055: : L2TP HA FSM:Context s/c id 14072/52631, SesUp, seq 4, ns/nr 2/3, rid 0, len 52 *Aug 26 18:00:51.055: L2TP HA CF: Rcvd status s/c id 14072/52631, SesUp, seq 4, ns/nr 2/3, rid 0, len 52 *Aug 26 18:00:51.055: L2TP HA CF: Rcvd status 0: len 56 *Aug 26 18:00:51.055: L2TP HA CF: Status content s/c id 14072/52631, SesUp, seq 4, ns/nr 2/3, rid 0, len 52 *Aug 26 18:00:51.055: 01000:0000CD97: L2TP HA FSM:Recv chkpt ack: s/c id 14072/52631, SesUp, seq 4, ns/nr 2/3, rid 0, len 52 *Aug 26 18:00:51.055: _____:_____:000036F8: L2TP HA FSM:Receive Session-ChkptAck *Aug 26 18:00:51.055: _____:01000:000036F8: L2TP HA FSM:FSM-Sn ev Rx-CktACK-SesUp *Aug 26 18:00:51.055: _____:01000:000036F8: L2TP HA FSM:FSM-Sn Wt-CkptSesUp->Proc-SessUp *Aug 26 18:00:51.055: _____:01000:000036F8: L2TP HA FSM:FSM-Sn do Proc-ChpACK-SesUp *Aug 26 18:00:51.055: _____:01000:000036F8: L2TP HA FSM:Received chkpt ACK of SessionUP *Aug 26 18:00:51.347: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up LNS1# *Aug 26 18:00:51.635: : L2TP HA:Try to buffer sock msg type 26 *Aug 26 18:00:51.635: : L2TP HA:CC not in resync state, buffering skipped *Aug 26 18:00:51.659: : L2TP HA:Try to buffer sock msg type 26 *Aug 26 18:00:51.659: : L2TP HA:CC not in resync state, buffering skipped LNS1# *Aug 26 18:00:52.363: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access2, changed state to up LNS1# LNS1# clear vpdn all Proceed with clearing LNS1# *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: 4/4 (Q sz 0) LNS1# *Aug 26 18:01:21.271: *Aug 26 18:01:21.271: 0, len 52; flush = 1, *Aug 26 18:01:21.271: *Aug 26 18:01:21.295: *Aug 26 18:01:21.295: *Aug 26 18:01:22.423: *Aug 26 18:01:22.423: 0, len 52 *Aug 26 18:01:22.423: 0, len 52 *Aug 26 18:01:22.423: *Aug 26 18:01:22.423: rid 0, len 52 *Aug 26 18:01:22.423: seq 5, ns/nr 2/3, rid *Aug 26 18:01:22.423: *Aug 26 18:01:22.423: *Aug 26 18:01:22.423: *Aug 26 18:01:22.423: *Aug 26 18:01:22.423: all tunnels? [confirm] 00001:_____:000036F8: L2TP HA FSM:Receive Session-CC-Rm 00001:_____:000036F8: L2TP HA FSM:Receive SessionRm 01000:0000CD97: L2TP HA FSM:Receive proto TxCM event StopCCN 01000:0000CD97: L2TP HA FSM:Receive TxSTOPCCN : L2TP HA FSM:FSM-CC ev Tx-STOPCCN : L2TP HA FSM:FSM-CC ProcCcsUp->Wt-CkptCcDn : L2TP HA FSM:FSM-CC do Chkpt-CcDwn 01000:0000CD97: L2TP HA FSM:Receive TxSTOPCCN while CC up 01000:0000CD97: L2TP HA:CC ns_q cleanup: overall head Ns old/new =
: L2TP HA FSM:Checkpoint CCDown L2TP HA CF: Chkpt send: s/c id 0/52631, CcDwn, seq 0, ns/nr 2/3, rid ctr 5 01000:0000CD97: L2TP HA FSM:Queued STOPCCN to cc hold_q : L2TP HA:Try to buffer sock msg type 22 : L2TP HA:Buffering skipped : L2TP HA FSM:CHKPT status callback: status 0, len 56 : L2TP HA FSM:Context s/c id 0/52631, CcDwn, seq 5, ns/nr 2/3, rid L2TP HA CF: Rcvd status s/c id 0/52631, CcDwn, seq 5, ns/nr 2/3, rid L2TP HA CF: Rcvd status 0: len 56 L2TP HA CF: Status content s/c id 0/52631, CcDwn, seq 5, ns/nr 2/3, 01000:0000CD97: L2TP HA FSM:Recv chkpt ack: s/c id 0/52631, CcDwn, 0, len 52 : L2TP HA FSM:Receive CC-ChkptAck : L2TP HA FSM:FSM-CC ev Rx-CkpACK-CcDwn : L2TP HA FSM:FSM-CC Wt-CkptCcDn->Wt-RxStopAck : L2TP HA FSM:FSM-CC do Allow-Tx-STOPCCN4 : L2TP HA FSM:Received Chkpt of CC removal
DB-2795
*Aug 26 18:01:22.423: 01000:0000CD97: L2TP HA:Try to remove from CC's ns_q: seq num 5 (current Ns 4) *Aug 26 18:01:22.423: 01000:0000CD97: L2TP HA:Ns entry to remove: not found (current Ns 4) *Aug 26 18:01:22.423: 01000:0000CD97: L2TP HA:CC send all unblocked if can *Aug 26 18:01:22.423: 01000:0000CD97: L2TP HA:CC send one blocked CM (SCCRP): ns 2 (2), nr 4 *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Receive Cm-Ack *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Receive CC Cm-Ack *Aug 26 18:01:22.451: : L2TP HA FSM:FSM-CC ev Rx-CmACK *Aug 26 18:01:22.451: : L2TP HA FSM:FSM-CC Wt-RxStopAck->Wt-CkptCcRm *Aug 26 18:01:22.451: : L2TP HA FSM:FSM-CC do ChkptCcRm3 *Aug 26 18:01:22.451: : L2TP HA FSM:Received STOPCCN-ACK while waiting for it, checkpoint CCRm and remove cc *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA:CC ns_q cleanup: overall head Ns old/new = 4/4 (Q sz 0) *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Checkpoint CcRm *Aug 26 18:01:22.451: L2TP HA CF: Chkpt send: s/c id 0/52631, CcRm, seq 0, ns/nr 3/3, rid 0, len 52; flush = 1, ctr 6 *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Check for Ns/Nr update 4, peer 3 *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Receive peer Ns/Nr update (4,3/3,3, int 4, rx 3, 4) (ns_q sz 0) *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Peer Ns 4 (4), Nr 3 (ns_q sz 0) *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:Receive CC-Rm *Aug 26 18:01:22.451: : L2TP HA FSM:FSM-CC ev Proto CcRm *Aug 26 18:01:22.451: : L2TP HA FSM:FSM-CC Wt-CkptCcRm->End *Aug 26 18:01:22.451: : L2TP HA FSM:FSM-CC do RmCc3 *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA FSM:CC destruction after Tx/Rx StopCCN LNS1# *Aug 26 18:01:22.451: 01000:0000CD97: L2TP HA:CC ns_q cleanup: overall head Ns old/new = 4/4 (Q sz 0) *Aug 26 18:01:22.451: : L2TP HA FSM:Checkpoint CCRm *Aug 26 18:01:22.451: L2TP HA CF: Chkpt send: s/c id 0/52631, CcRm, seq 0, ns/nr 3/3, rid 0, len 52; flush = 1, ctr 7 *Aug 26 18:01:22.451: : L2TP HA:lcm_cc free: l2tp_cc 070B45B8, lcm_cc 02FE55E8 *Aug 26 18:01:22.451: L2TP tnl _____:________: CCM setting state to DOWN *Aug 26 18:01:23.571: : L2TP HA FSM:CHKPT status callback: status 0, len 56 *Aug 26 18:01:23.571: : L2TP HA FSM:Context s/c id 0/52631, CcRm, seq 6, ns/nr 3/3, rid 0, len 52 *Aug 26 18:01:23.571: : L2TP HA FSM:CHKPT status callback: status 0, len 56 *Aug 26 18:01:23.571: : L2TP HA FSM:Context s/c id 0/52631, CcRm, seq 7, ns/nr 3/3, rid 0, len 52 *Aug 26 18:01:23.571: L2TP HA CF: Rcvd status s/c id 0/52631, CcRm, seq 6, ns/nr 3/3, rid 0, len 52 *Aug 26 18:01:23.571: L2TP HA CF: Rcvd status 0: len 56 *Aug 26 18:01:23.571: L2TP HA CF: Status content s/c id 0/52631, CcRm, seq 6, ns/nr 3/3, rid 0, len 52 *Aug 26 18:01:23.571: : L2TP HA FSM:Ignore chkpt ACK: CC not found. LNS1# *Aug 26 18:01:23.571: L2TP HA CF: Rcvd status s/c id 0/52631, CcRm, seq 7, ns/nr 3/3, rid 0, len 52 *Aug 26 18:01:23.571: L2TP HA CF: Rcvd status 0: len 56 *Aug 26 18:01:23.571: L2TP HA CF: Status content s/c id 0/52631, CcRm, seq 7, ns/nr 3/3, rid 0, len 52 *Aug 26 18:01:23.571: : L2TP HA FSM:Ignore chkpt ACK: CC not found. LNS1# *Aug 26 18:01:35.771: %REDUNDANCY-3-STANDBY_LOST: Standby processor fault (PEER_DOWN_INTERRUPT)
DB-2796
December 2010
Table 381 describes significant fields shown in the debug vpdn redundancy command output.
Table 381 debug vpdn redundancy Command Field Descriptions
Description Number of L2TP checkpointing-facility events (cf-events). Number of L2TP checkpointing errors. Number of L2TP checkpointing events. Number of L2TP checkpointing fsm events. Number of L2TP checkpointing resynchronized events. Number of L2TP checkpointing redundancy-facility events (rf-events).
Related Commands
Command debug l2tp redundancy l2tp sso enable l2tp tunnel resync show l2tp redundancy show vpdn redundancy sso enable
Description Displays information about L2TP sessions that have redundancy events and errors. Enables L2TP High Availability (HA). Specifies the number of packets sent before waiting for an acknowledgement message. Displays L2TP sessions containing redundancy data. Displays VPDN sessions containing redundancy data. Enables L2TP HA for VPDN groups.
DB-2797
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for the Cisco 3600 series. This command was updated for the Cisco 2600, Cisco 3600, and Cisco MC3810 series devices. This command was integrated into Cisco IOS Release 12.1(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug vpm all command to enable the complete set of VPM debugging commands: debug vpm dsp, debug vpm error, debug vpm port, debug vpm spi, and debug vpm trunk_sc. Execution of no debug all will turn off all port level debugging. It is usually a good idea to turn off all debugging and then enter the debug commands you are interested in one by one. This will help to avoid confusion about which ports you are actually debugging.
Examples
For sample outputs, refer to the documentation of the other debup vpm commands.
Related Commands
Command debug vpm port show debug debug vpm error debug vpm voaal2 all
Description Limits the debug vpm all command to a specified port. Displays which debug commands are enabled. Enables DSP error tracing. Enables the display of trunk conditioning supervisory component trace information.
DB-2798
December 2010
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug vpm dsp command shows messages from the DSP on the VPM to the router; this command can be useful if you suspect that the VPM is not functional. It is a simple way to check if the VPM is responding to off-hook indications and to evaluate timing for signaling messages from the interface.
Examples
The following output shows the DSP time stamp and the router time stamp for each event. For SIG_STATUS, the state value shows the state of the ABCD bits in the signaling message. This sample shows a call coming in on an FXO interface. The router waits for ringing to terminate before accepting the call. State=0x0 indicates ringing; state 0x4 indicates not ringing.
ssm_dsp_message: SEND/RESP_SIG_STATUS: state=0x0 timestamp=58172 systime=40024 ssm_dsp_message: SEND/RESP_SIG_STATUS: state=0x4 timestamp=59472 systime=40154 ssm_dsp_message: SEND/RESP_SIG_STATUS: state=0x4 timestamp=59589 systime=40166
This shows the disconnect indication and the final call statistics reported by the DSP (which are then populated in the call history table):
ssm_dsp_message: SEND/RESP_SIG_STATUS: state=0xC timestamp=21214 systime=42882 vcsm_dsp_message: MSG_TX_GET_TX_STAT: num_tx_pkts=1019 num_signaling_pkts=0 num_comfort_noise_pkts=0 transmit_durtation=24150 voice_transmit_duration=20380 fax_transmit_duration=0
DB-2799
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 2600, 3600, and MC3810 series devices. This command was integrated into Cisco IOS Release 12.1(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Execution of no debug all will turn off all port level debugging. You should turn off all debugging and then enter the debug commands you are interested in one by one. This will help avoid confusion about which ports you are actually debugging.
Examples
The following example shows debug vpm error messages for Cisco 2600 or Cisco 3600 series router or a Cisco MC3810 series concentrator:
Router# debug vpm error 00:18:37:[1:0.1, FXSLS_NULL, E_DSP_SIG_0100] -> ERROR:INVALID INPUT Router#
The following example turns off debug vpm error debugging messages:
Router# no debug vpm error
Related Commands
DB-2800
December 2010
Limits the debug vpm error command to a specified port. Displays which debug commands are enabled.
DB-2801
Syntax Description
slot-number
(Optional) Specifies the slot number in the Cisco router where the voice interface card is installed. Valid entries are from 0 to 3, depending on the router being used and the slot where the voice interface card has been installed. (Optional) Specifies the subunit on the voice interface card where the voice port is located. Valid entries are 0 or 1. (Optional) Specifies the voice port. Valid entries are 0 or 1.
subunit-number port
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is not supported on Cisco 7200 series routers or on the Cisco MC3810. Use this command to limit the debug output to a particular port. The debug output can be quite voluminous for a single channel. A 12-port box might create problems. Use this debug command with any or all of the other debug modes. Execution of no debug vpm all will turn off all port level debugging. We recommend that you turn off all debugging and then enter the debug commands you are interested in one by one. This process helps to avoid confusion about which ports you are actually debugging.
Examples
The following is sample output from the debug vpm port 1/1/0 command during trunk establishment after the no shutdown command has been executed on the voice port:
Router# debug vpm port 1/1/0 *Mar 1 03:21:39.799: htsp_process_event: [1/1/0, 0.1 , 2]act_down_inserve *Mar 1 03:21:39.807: htsp_process_event: [1/1/0, 0.0 , 14] act_go_trunkhtsp_trunk_createhtsp_trunk_sig_linkfxols_trunk *Mar 1 03:21:39.807: htsp_process_event: [1/1/0, 1.0 , 1]trunk_offhookfxols_trunk_down *Mar 1 03:21:39.807: dsp_sig_encap_config: [1/1/0] packet_len=28 channel_id=128 packet_id=42 transport_protocol=1 playout_delay=100 signaling_mode=0 t_ssrc=0 r_ssrc=0 t_vpxcc=0 r_vpxcc=0 *Mar 1 03:21:39.811: dsp_set_sig_state: [1/1/0] packet_len=12
DB-2802
December 2010
channel_id=128 packet_id=39 state=0xC timestamp=0x0 *Mar 1 03:21:39.811: trunk_offhook: Trunk Retry Timer Enabled *Mar 1 03:22:13.095: htsp_process_event: [1/1/0, 1.1, 39]act_trunk_setuphtsp_setup_ind *Mar 1 03:22:13.095: htsp_process_event: [1/1/0, 1.2 , 8] *Mar 1 03:22:13.099: hdsprm_vtsp_codec_loaded_ok: G726 firmware needs download *Mar 1 03:22:13.103: dsp_download: p=0x60E73844 size=34182 (t=1213310):39 FA 6D *Mar 1 03:22:13.103: htsp_process_event: [1/1/0, 1.2 , 6]act_trunk_proc_connect *Mar 1 03:22:13.191: dsp_receive_packet: MSG_TX_RESTART_INDICATION: code=0 t=1213319 *Mar 1 03:22:13.191: dsp_download: p=0x60EA8924 size=6224 (t=1213319): 8 55 AE *Mar 1 03:22:13.207: dsp_receive_packet: MSG_TX_RESTART_INDICATION: code=0 t=1213320 *Mar 1 03:22:13.207: htsp_process_event: [1/1/0, 1.3 , 11] trunk_upfxols_trunk_up *Mar 1 03:22:13.207: dsp_set_sig_state: [1/1/0] packet_len=12 channel_id=128 packet_id=39 state=0x4 timestamp=0x0 *Mar 1 03:22:13.207: dsp_sig_encap_config: [1/1/0] packet_len=28 channel_id=128 packet_id=42 transport_protocol=3 playout_delay=100 headerbytes = 0xA0
Note in the above display that transport_protocol = 3 indicates Voice-over-Frame Relay. Also note that the second line of the display indicates that a shutdown/no shutdown command sequence was executed on the voice port.
Related Commands
Command debug vpdn pppoe-data debug vpm dsp debug vpm signal debug vpm spi
Description Enables debugging of all VPM areas. Shows messages from the DSP on the VPM to the router. Collects debug information only for signaling events. Displays information about how each network indication and application request is handled.
DB-2803
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug vpm signal command collects debug information only for signaling events. This command can also be useful in resolving problems with signaling to a PBX.
Examples
The following output shows that a ring is detected, and that the router waits for the ringing to stop before accepting the call:
ssm_process_event: ssm_process_event: ssm_process_event: ssm_process_event: [1/0/1, [1/0/1, [1/0/1, [1/0/1, 0.2, 0.7, 0.3, 0.3, 15] fxols_onhook_ringing 19] fxols_ringing_not 6] 19] fxols_offhook_clear
The following output confirms a disconnect from the switch and release with higher layer code:
ssm_process_event: [1/0/1, 0.4, 27] fxols_offhook_disc ssm_process_event: [1/0/1, 0.4, 33] fxols_disc_confirm ssm_process_event: [1/0/1, 0.4, 3] fxols_offhook_release
DB-2804
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Release
Modification This command was introduced. This command was integrated into Release 12.1(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the debug vpm signaling command:
Router# debug vpm signaling 01:52:55: 01:52:55: 01:52:55: 01:52:55: 01:52:55: 01:52:55: 01:52:55: 01:52:55: 01:52:55: 01:52:55: 01:52:55: 01:52:55: 01:52:55: [1:1.1, S_TRUNK_BUSYOUT, E_HTSP_OUT_BUSYOUT] htsp_timer - 0 msec [1:1.1, S_TRUNK_PEND, E_HTSP_EVENT_TIMER] htsp_timer_stop htsp_setup_ind htsp_timer - 2000 msec [1:1.1, S_TRUNK_PROC, E_HTSP_SETUP_ACK] htsp_timer_stop htsp_timer - 20000 msec [1:6.6, S_TRUNK_PROC, E_HTSP_SETUP_ACK] htsp_timer_stop htsp_timer - 20000 msec [1:1.1, S_TRUNK_PROC, E_HTSP_VOICE_CUT_THROUGH] %HTSP-5-UPDOWN: Trunk port(channel) [1:1.1] is up
DB-2805
Syntax Description
Command Modes
Privileged EXEC
Usage Guidelines
The debug vpm spi command traces how the voice port module SPI interfaces with the call control API. This debug command displays information about how each network indication and application request is handled. This debug level shows the internal workings of the voice telephony call state machine.
Examples
The following output shows that the call is accepted and presented to a higher layer code:
dsp_set_sig_state: [1/0/1] packet_len=14 channel_id=129 packet_id=39 state=0xC timestamp=0x0 vcsm_process_event: [1/0/1, 0.5, 1] act_up_setup_ind
The following output shows that the higher layer code accepts the call, requests addressing information, and starts DTMF and dial-pulse collection. It also shows that the digit timer is started.
vcsm_process_event: [1/0/1, 0.6, 11] act_setup_ind_ack dsp_voice_mode: [1/0/1] packet_len=22 channel_id=1 packet_id=73 coding_type=1 voice_field_size=160 VAD_flag=0 echo_length=128 comfort_noise=1 fax_detect=1 dsp_dtmf_mode: [1/0/1] packet_len=12 channel_id=1 packet_id=65 dtmf_or_mf=0 dsp_CP_tone_on: [1/0/1] packet_len=32 channel_id=1 packet_id=72 tone_id=3 n_freq=2 freq_of_first=350 freq_of_second=440 amp_of_first=4000 amp_of_second=4000 direction=1 on_time_first=65535 off_time_first=0 on_time_second=65535 off_time_second=0 dsp_digit_collect_on: [1/0/1] packet_len=22 channel_id=129 packet_id=35 min_inter_delay=550 max_inter_delay=3200 mim_make_time=18 max_make_time=75 min_brake_time=18 max_brake_time=75 vcsm_timer: 46653
The following output shows the collection of digits one by one until the higher level code indicates it has enough. The input timer is restarted with each digit and the device waits in idle mode for connection to proceed.
vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71 vcsm_timer: 47055 vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71 vcsm_timer: 47079 vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
DB-2806
December 2010
vcsm_timer: 47173 vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71 vcsm_timer: 47197 vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71 vcsm_timer: 47217 vcsm_process_event: [1/0/1, 0.7, 13] act_dcollect_proc dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71 dsp_digit_collect_off: [1/0/1] packet_len=10 channel_id=129 packet_id=36 dsp_idle_mode: [1/0/1] packet_len=10 channel_id=1 packet_id=68
The following output shows that the network voice path cuts through:
vcsm_process_event: [1/0/1, 0.8, 15] act_bridge vcsm_process_event: [1/0/1, 0.8, 20] act_caps_ind vcsm_process_event: [1/0/1, 0.8, 21] act_caps_ack dsp_voice_mode: [1/0/1] packet_len=22 channel_id=1 packet_id=73 coding_type=6 voice_field_size=20 VAD_flag=1 echo_length=128 comfort_noise=1 fax_detect=1
The following output shows that the called-party end of the connection is connected:
vcsm_process_event: [1/0/1, 0.8, 8] act_connect
The following output shows the voice quality statistics collected periodically:
vcsm_process_event: [1/0/1, 0.13, 17] dsp_get_rx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=87 reset_flag=0 vcsm_process_event: [1/0/1, 0.13, 28] vcsm_process_event: [1/0/1, 0.13, 29] vcsm_process_event: [1/0/1, 0.13, 32] vcsm_process_event: [1/0/1, 0.13, 17] dsp_get_rx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=87 reset_flag=0 vcsm_process_event: [1/0/1, 0.13, 28] vcsm_process_event: [1/0/1, 0.13, 29] vcsm_process_event: [1/0/1, 0.13, 32] vcsm_process_event: [1/0/1, 0.13, 17] dsp_get_rx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=87 reset_flag=0 vcsm_process_event: [1/0/1, 0.13, 28] vcsm_process_event: [1/0/1, 0.13, 29] vcsm_process_event: [1/0/1, 0.13, 32]
The following output shows that the disconnection indication is passed to higher-level code. The call connection is torn down, and final call statistics are collected:
vcsm_process_event: [1/0/1, 0.13, 4] act_generate_disc vcsm_process_event: [1/0/1, 0.13, 16] act_bdrop dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71 vcsm_process_event: [1/0/1, 0.13, 18] act_disconnect dsp_get_levels: [1/0/1] packet_len=10 channel_id=1 packet_id=89 vcsm_timer: 48762 vcsm_process_event: [1/0/1, 0.15, 34] act_get_levels dsp_get_tx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=86 reset_flag=1 vcsm_process_event: [1/0/1, 0.15, 31] act_stats_complete dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71 dsp_digit_collect_off: [1/0/1] packet_len=10 channel_id=129 packet_id=36 dsp_idle_mode: [1/0/1] packet_len=10 channel_id=1 packet_id=68 vcsm_timer: 48762 dsp_set_sig_state: [1/0/1] packet_len=14 channel_id=129 packet_id=39 state=0x4 timestamp=0x0 vcsm_process_event: [1/0/1, 0.16, 5] act_wrelease_release dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71 dsp_idle_mode: [1/0/1] packet_len=10 channel_id=1 packet_id=68 dsp_get_rx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=87 reset_flag=1
DB-2807
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 2600, Cisco 3600, and Cisco MC3810 series devices. This command was integrated into Cisco IOS Release 12.1(2)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug vpm port command with the slot-number/subunit-number/port argument to limit the debug vpm trunk_sc debug output to a particular port. If you do not use the debug vpm port command, the debug vpm trunk_sc displays output for all ports. Execution of the no debug all command will turn off all port level debugging. It is usually a good idea to turn off all debugging and then enter the debug commands you are interested in one by one. This process helps avoid confusion about which ports you are actually debugging.
Examples
The following example shows debug vpm trunk_sc messages for port 1/0/0 on a Cisco 2600 or Cisco 3600 series router:
Router# debug vpm trunk_sc Router# debug vpm port 1/0/0
The following example shows debug vpm trunk_sc messages for port 1/1 on a Cisco MC3810 device:
Router# debug vpm trunk_sc Router# debug vpm port 1/1
DB-2808
December 2010
The following example turns off debug vpm trunk_sc debugging messages:
Router# no debug vpm trunk_sc
Related Commands
Description Enables all VPM debugging Limits the debug vpm trunk_sc command to a specified port. Displays which debug commands are enabled.
DB-2809
Syntax Description
Displays messages to and from the DSP. Displays messages from the DSP. Displays messages to the DSP.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for the Cisco MC3810 series. This command was integrated in Cisco IOS Release 12.1(2)T. Support for this command was integrated on the Cisco 7200 series. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Do not enter this debug command on a system carrying live traffic. Continuous display of AAL2 type 1 (voice) packets results in high CPU utilization and loss of console access to the system. Calls will be dropped and trunks may go down. For AAL2 debugging, use the debug vpm voaal2 type3 debug command and identify a specific type 3 (control) packet type.
Examples
The following is sample output from the debug vpm voaal2 all command, where the example selection is to display channel-associated switching (CAS) packets sent to and from the DSP:
Router# debug vpm voaal2 all all_dsp *Jan 9 20:10:36.965:TYPE 3, len = 8, cid = 34, uui = 24 :TO_DSP *Jan 9 20:10:36.965:CAS redundancy = 3, timestamp = 10270, signal = 0 - 22 13 12 E8 1E 0 E 15 *Jan 9 20:10:41.617:TYPE 3, len = 8, cid = 34, uui = 24 :FROM_DSP *Jan 9 20:10:41.617:CAS redundancy = 3, timestamp = 980, signal = 0
DB-2810
December 2010
- 22 13 12 C3 D4 0 F 87 *Jan 9 20:10:41.965:TYPE 3, len = 8, cid = 34, uui = 24 :TO_DSP *Jan 9 20:10:41.965:CAS redundancy = 3, timestamp = 10270, signal = 0 - 22 13 12 E8 1E 0 E 15 *Jan 9 20:10:46.621:TYPE 3, len = 8, cid = 34, uui = 24 :FROM_DSP *Jan 9 20:10:46.621:CAS redundancy = 3, timestamp = 980, signal = 0 - 22 13 12 C3 D4 0 F 87 .... *Jan 9 20:10:57.101:TYPE 1, len = 43, cid = 34, uui = 8- 22 9D 1 CC FC C7 3E 22 23 FE DF F8 DE 1C FF E5 12 22 43 EC 2E 9E CC DE A7 EF 14 E3 F1 2C 2D BC 1B FC FE D7 E1 1F 2F ED 11 FC 1F *Jan 9 20:10:57.105:TYPE 3, len = 9, cid = 34, uui = 24 :FROM_DSP *Jan 9 20:10:57.105:DIALED DIGITS redundancy = 0, timestamp = 940, digitcode = 1 - 22 17 3 3 AC 1 1 8 E5 *Jan 9 20:10:57.113:TYPE 1, len = 43, cid = 34, uui = 10- 22 9D 4B 3F 1F 11 FC CD CC BE B7 E2 F3 32 2E 1F F9 DA CC BF 12 F1 37 31 11 2C FE 9D DA D2 E1 C7 4A 34 3F FA 21 AD CC 1F EE 16 E1 *Jan 9 20:10:57.113:TYPE 3, len = 9, cid = 34, uui = 24 :FROM_DSP *Jan 9 20:10:57.113:DIALED DIGITS redundancy = 1, timestamp = 940, digitcode = 1 - 22 17 3 43 AC 1 1 B 12 *Jan 9 20:10:57.121:TYPE 1, len = 43, cid = 34, uui = 12- 22 9D 95 F1 1E E1 DF 1E 21 31 21 1D D9 EB BB DF 22 17 13 12 1F 58 FF ED ED E1 4D B7 3E 3F 21 F3 8E FD EF DF F4 12 E4 32 FE B4 D8 -
Related Commands
Command debug vpm voaal2 type1 debug vpm voaal2 type3 show debug
Description Displays type 1 (voice) AAL2 packets sent to and received from the DSP. Displays type 3 (control) AAL2 packets sent to and received from the DSP. Shows which debug commands are enabled.
DB-2811
Syntax Description
Displays messages to and from the DSP. Displays messages from the DSP. Displays messages to the DSP.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for the Cisco MC3810 series. This command was integrated in Cisco IOS Release 12.1(2)T. Support for this command was implemented on the Cisco 7200 series. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Do not enter this debug command on a system carrying live traffic. Continuous display of AAL2 type 1 (voice) packets results in high CPU utilization and loss of console access to the system. Calls will be dropped and trunks may go down. For AAL2 debugging, use the debug vpm voaal2 type 3 command and identify a specific type 3 (control) packet type.
Examples
The following is sample output from the debug vpm voaal2 type1 command:
Note
The display of voice packets on a live system will continue indefinitely. The debugging output cannot be interrupted, because console access will be lost.
Router# debug vpm voaal2 type1 all_dsp TYPE 1, len = 43, cid = 17, uui = 15- 11 9D E6 1B 52 9D 95 9B DB 1D 14 1C 5F 9C 95 9C EA 1C 15 1B 74 9C 94 9D 6B 1C 14 1D E4 9B 94 9D 5B 1B 14
DB-2812
December 2010
1D D7 9B 94 9D 50 1B 14 TYPE 1, len = 43, cid = 22, uui = 15- 16 9D ED 1D 14 1B 53 9D 94 9C DB 1D 14 1C 5F 9C 95 9C EB 1C 14 1C 78 9D 94 9D 6F 1C 14 1E E4 9B 94 9D 5B 1B 14 1D D7 9B 94 9E 52 TYPE 1, len = 43, cid = 12, uui = 14- C 9D D1 29 AB 96 96 A9 2B 16 16 2A AA 96 96 AB 2A 16 17 2B A9 96 97 AC 28 16 17 2C A8 96 97 AD 27 15 17 2E A7 97 97 AE 26 16 17 TYPE 1, len = 43, cid = 34, uui = 14- 22 9D DF D7 31 20 19 15 14 15 19 1E 2C 60 AF 9F 99 96 94 95 99 9F AD EC 2F 1F 1A 15 14 15 19 1F 2E ED AD 9F 99 96 93 95 99 9F AF TYPE 1, len = 43, cid = 12, uui = 15- C 9D F4 2F A5 96 97 AF 25 15 18 31 A4 95 98 B3 23 15 18 33 A3 95 98 B5 22 15 18 37 A2 95 98 B7 21 15 18 39 A0 95 99 BB 21 14 19 TYPE 1, len = 43, cid = 34, uui = 15- 22 9D FA 5D 2D 1E 19 15 14 15 1A 21 31 D9 AC 9E 98 95 94 95 9A A4 B3 52 2B 1D 18 14 14 16 1B 22 36 CA AA 9D 98 94 94 96 9B A4 B6 -
Related Commands
Command debug vpm all debug vpm voaal2 all debug vpm voaal2 type3 show debug
Description Enables all VPM debugging. Displays type 1 (voice) and type 3 (control) AAL2 packets sent to and received from the DSP. Displays type 3 (control) AAL2 packets sent to and received from the DSP. Shows which debug commands are enabled.
DB-2813
Syntax Description
Displays type 3 alarm packets. Displays all type 3 packets. Displays type 3 channel-associated switching (CAS) packets. Displays type 3 dialed digit packets. (Not supported) Displays type 3 fax relay packets. Displays type 3 user state packets. Displays messages to and from the DSP. Displays messages from the DSP. Displays messages to the DSP.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced for the Cisco MC3810 series. This command was integrated in Cisco IOS Release 12.1(2)T. Support for this command was implemented on the Cisco 7200 series. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This is the preferred debug command for displaying specific types of control packets. It is usually preferable to specify a particular type of control packet rather than use the alltype3 to avoid excessive output display and CPU utilization.
Examples
The following is sample output from the debug vpm voaal2 type3 command, where the example selection is to display messages to and from the DSP:
DB-2814
December 2010
Router# debug vpm voaal2 type3 all_dsp 00:43:02:TYPE 3, len = 8, cid = 58, uui = 24 :TO_DSP 00:43:02:CAS redundancy = 3, timestamp = 10484, signal = 0 - 3A 13 18 E8 F4 0 C DA 00:43:02:TYPE 3, len = 8, cid = 93, uui = 24 :FROM_DSP 00:43:02:CAS redundancy = 3, timestamp = 6528, signal = 0 - 5D 13 1E D9 80 0 F 33 00:43:02:TYPE 3, len = 8, cid = 102, uui = 24 :FROM_DSP 00:43:02:CAS redundancy = 3, timestamp = 5988, signal = 0 - 66 13 4 D7 64 0 F DF 00:43:02:TYPE 3, len = 8, cid = 194, uui = 24 :FROM_DSP 00:43:02:CAS redundancy = 3, timestamp = 6212, signal = 0 - C2 13 10 D8 44 0 F AC 00:43:02:TYPE 3, len = TYPE 3, len = 8, cid = redundancy = 3, times - 5C 13 5 D9 E4 0 C 1F 8, cid = 92, uui = 24 :FROM_DSP 66, uui = 24 :TO_DSP:43:00:CAS signal = 0 -
00:43:02:TYPE 3, len = 8, cid = 40, uui = 24 :TO_DSP 00:43:02:CAS redundancy = 3, timestamp = 8658, signal = 0 - 28 13 7 E1 D2 0 E 79 00:43:02:TYPE 3, len = 8, cid = 137, uui = 24 :FROM_DSP 00:43:02:CAS redundancy = 3, timestamp = 6836, signal = 0 - 89 13 B DA B4 0 E 78 -
Related Commands
Command debug vpm voaal2 type1 debug vpm voaal2 type3 show debug
Description Displays type 1 (voice) AAL2 packets sent to and received from the DSP. Displays type 3 (control) AAL2 packets sent to and received from the DSP. Shows which debug commands are enabled.
DB-2815
debug vrf
To get debugging information on virtual routing and forwarding (VRF) instances, use the debug vrf command in privileged EXEC mode. To turn off the debug output, use the undebug version of the command. debug vrf {create | delete | error | ha | initialization | interface | ipv4 | ipv6 | issu | lock | lookup | mpls | selection} undebug vrf {create | delete | error | ha | initialization | interface | ipv4 | ipv6 | issu | lock | lookup | mpls | selection}
Syntax Description
create delete error ha initialization interface ipv4 ipv6 issu lock lookup mpls selection
Specifies VRF creation debugging. Specifies VRF deletion debugging. Specifies VRF error debugging. Specifies VRF high-availability debugging. Specifies VRF subsystem initialization debugging. Specifies VRF interface assignment debugging. Specifies VRF IPv4 address family debugging. Specifies VRF IPv6 address family debugging. Specifies VRF in-service software upgrade debugging. Specifies VRF lock debugging. Specifies VRF database lookup debugging. Specifies VRF multiprotocol label switching debugging. Specifies VRF selection debugging.
Command Modes
Command History
Usage Guidelines
Examples
The following example shows how to turn on debugging of VRF interface assignment:
Router# debug vrf interface
Related Commands
DB-2816
December 2010
Syntax Description
Command Modes
Command History
Release 12.0(18)ST 12.0(22)S 12.2(15)T 12.2(14)S 12.2(33)SRA 12.2(31)SB2 12.2(31)SG 12.2(17d)SXB 12.2(33)SXH Cisco IOS XE Release 2.1 Cisco IOS XE Release 2.6
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command was integrated into Cisco IOS Release 12.2(31)SG. This command was integrated into Cisco IOS Release 12.2(17d)SXB. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS XE Release 2.1. This command was modified. This output was modified to display VRRP debugging statements for Virtual Router Redundancy Service (VRRS).
Examples
The following is sample output from the debug vrrp all command:
Router# debug vrrp all 00:15:30: %IP-4-DUPADDR: Duplicate address 10.18.0.2 on Ethernet1/0, sourced by 0000.5e00.0101 May 22 18:41:54.447: VRRP: Grp 1 Advertisement Primary address 10.18.0.2 different from ours 10.18.0.1 May 22 18:41:57.443: VRRP: Grp 1 Advertisement Primary address 10.18.0.2 different from ours 10.18.0.1 May 22 18:42:00.443: VRRP: Grp 1 Advertisement Primary address 10.18.0.2 different from ours 10.18.0.1 May 22 18:48:41.521: VRRP: Grp 1 Event - Advert higher or equal priority May 22 18:48:44.521: VRRP: Grp 1 Event - Advert higher or equal priority May 22 18:48:47.521: VRRP: Grp 1 Event - Advert higher or equal priority May 22 18:53:23.390: VRRP: Grp 1 changing to V_STATE_INIT
DB-2817
May 22 18:54:26.143: VRRP: Grp 1 changing to V_STATE_BACKUP May 22 18:54:35.755: VRRP: Grp 1 changing to V_STATE_MASTER May 22 18:53:23.390: VRRP: Grp 1 changing to V_STATE_INIT May 22 18:54:26.143: VRRP: Grp 1 changing to V_STATE_BACKUP May 22 18:54:35.755: VRRP: Grp 1 changing to V_STATE_MASTER
Related Commands
Command debug vrrp error debug vrrp events debug vrrp state
Description Displays debugging messages about VRRP error conditions. Displays debugging messages about VRRP events. Displays debugging messages about the VRRP state transitions.
DB-2818
December 2010
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following sample output shows that MD5 authentication is enabled on one router but not the other:
Router# debug vrrp authentication VRRP: Grp 1 Adv from 172.24.1.2 has incorrect auth type 1 expected 0
The following sample output shows that the MD5 key IDs and key strings differ on each router:
Router# debug vrrp authentication VRRP: Sent: 21016401FE050000AC1801FE0000000000000000 VRRP: HshC: B861CBF1B9026130DD34AED849BEC8A1 VRRP: VRRP: VRRP: VRRP: Rcvd: HshC: HshR: Grp 1 21016401FE050000AC1801FE0000000000000000 B861CBF1B9026130DD34AED849BEC8A1 C5E193C6D84533FDC750F85FCFB051E1 Adv from 172.24.1.2 has failed MD5 auth
The following sample output shows that the text authentication strings differ on each router:
Router# debug vrrp authentication VRRP: Grp 1 Adv from 172.24.1.2 has failed TEXT auth
Related Commands
Command debug vrrp error debug vrrp events debug vrrp state
Description Displays debugging messages about VRRP error conditions. Displays debugging messages about VRRP events. Displays debugging messages about the VRRP state transitions.
DB-2819
Syntax Description
Command Modes
Command History
Release 12.0(18)ST 12.0(22)S 12.2(15)T 12.2(14)S 12.2(33)SRA 12.2(31)SB2 12.2(31)SG 12.2(17d)SXB 12.2(33)SXH Cisco IOS XE Release 2.1
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command was integrated into Cisco IOS Release 12.2(31)SG. This command was integrated into Cisco IOS Release 12.2(17d)SXB. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS XE Release 2.1.
Examples
The following is sample output from the debug vrrp error command:
Router# debug vrrp error 00:15:30: %IP-4-DUPADDR: Duplicate address 10.18.0.2 on Ethernet1/0, sourced by 0000.5e00.0101 May 22 18:41:54.447: VRRP: Grp 1 Advertisement Primary address 10.18.0.2 different from ours 10.18.0.1 May 22 18:41:57.443: VRRP: Grp 1 Advertisement Primary address 10.18.0.2 different from ours 10.18.0.1 May 22 18:42:00.443: VRRP: Grp 1 Advertisement Primary address 10.18.0.2 different from ours 10.18.0.1
In the example, the error being observed is that the router has a virtual address of 10.18.0.1 for group 1, but it received a virtual address of 10.18.0.2 for group 1 from another router on the same LAN.
DB-2820
December 2010
Related Commands
Description Displays debugging messages for VRRP errors, events, and state transitions.
DB-2821
Syntax Description
Command Modes
Command History
Release 12.0(18)ST 12.0(22)S 12.2(15)T 12.2(14)S 12.2(33)SRA 12.2(31)SB2 12.2(31)SG 12.2(17d)SXB 12.2(33)SXH Cisco IOS XE Release 2.1
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command was integrated into Cisco IOS Release 12.2(31)SG. This command was integrated into Cisco IOS Release 12.2(17d)SXB. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS XE Release 2.1.
Examples
The following is sample output from the debug vrrp events command:
Router# debug vrrp events May 22 18:48:41.521: VRRP: Grp 1 Event - Advert higher or equal priority May 22 18:48:44.521: VRRP: Grp 1 Event - Advert higher or equal priority May 22 18:48:47.521: VRRP: Grp 1 Event - Advert higher or equal priority
In the example, the event being observed is that the router received an advertisement from another router for group 1 that has a higher or equal priority to itself.
Related Commands
Description Displays debugging messages for VRRP errors, events, and state transitions.
DB-2822
December 2010
debug vrrp ha
To display debugging messages for Virtual Router Redundancy Protocol (VRRP) high availability, use the debug vrrp ha command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vrrp ha no debug vrrp ha
Syntax Description
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SB2. This command was integrated into Cisco IOS XE Release 2.1. This command was integrated into Cisco IOS Release 12.2(33)SXI.
Examples
The following examples for the debug vrrp ha command display the syncing of VRRP state information from the Active RP to the Standby RP. The following sample output displays two VRRP state changes on the Active RP:
Router# . . . *Nov 14 *Nov 14 *Nov 14 *Nov 14 debug vrrp ha
VRRP: Gi3/2 Grp 42 RF Encode state Backup into sync buffer %VRRP-6-STATECHANGE: Gi3/2 Grp 42 state Init -> Backup VRRP: Gi3/2 Grp 42 RF Encode state Master into sync buffer %VRRP-6-STATECHANGE: Gi3/2 Grp 42 state Backup -> Master
The following sample output displays two VRRP state changes on the Standby RP:
Router# debug vrrp ha . . . *Nov 14 11:36:50.392 UTC: STDBY: VRRP: Gi3/2 Grp 42 RF sync state Init -> Backup *Nov 14 11:36:53.984 UTC: STDBY: VRRP: Gi3/2 Grp 42 RF sync state Backup -> Master
Related Commands
DB-2823
Description Displays debugging messages about VRRP events. Displays debugging messages about the VRRP state transitions.
DB-2824
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Release 12.0(18)ST 12.0(22)S 12.2(15)T 12.2(14)S 12.2(33)SRA 12.2(31)SB2 12.2(31)SG 12.2(17d)SXB 12.2(33)SXH Cisco IOS XE Release 2.1
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command was integrated into Cisco IOS Release 12.2(31)SG. This command was integrated into Cisco IOS Release 12.2(17d)SXB. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS XE Release 2.1.
Examples
The following is sample output from the debug vrrp packets command. The output is on the master virtual router; the router for group 1 is sending an advertisement with a checksum of 6BE7.
Router# debug vrrp packets VRRP Packets debugging is on May 22 18:51:03.220: VRRP: Grp 1 sending Advertisement checksum 6BE7 May 22 18:51:06.220: VRRP: Grp 1 sending Advertisement checksum 6BE7
In the following example, the router with physical address 10.18.0.3 is advertising a priority of 105 for VRRP group 1:
Router# debug vrrp packets VRRP Packets debugging is on May 22 18:51:09.222: VRRP: Grp 1 Advertisement priority 105, ipaddr 10.18.0.3 May 22 18:51:12.222: VRRP: Grp 1 Advertisement priority 105, ipaddr 10.18.0.3
DB-2825
Syntax Description
Command Modes
Command History
Release 12.0(18)ST 12.0(22)S 12.2(15)T 12.2(14)S 12.2(33)SRA 12.2(31)SB2 12.2(31)SG 12.2(17d)SXB 12.2(33)SXH Cisco IOS XE Release 2.1
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.0(22)S. This command was integrated into Cisco IOS Release 12.2(15)T. This command was integrated into Cisco IOS Release 12.2(14)S. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command was integrated into Cisco IOS Release 12.2(31)SB2. This command was integrated into Cisco IOS Release 12.2(31)SG. This command was integrated into Cisco IOS Release 12.2(17d)SXB. This command was integrated into Cisco IOS Release 12.2(33)SXH. This command was integrated into Cisco IOS XE Release 2.1.
Examples
The following is sample output from the debug vrrp state command:
Router# debug vrrp state May 22 18:53:23.390: VRRP: Grp 1 changing to V_STATE_INIT May 22 18:54:26.143: VRRP: Grp 1 changing to V_STATE_BACKUP May 22 18:54:35.755: VRRP: Grp 1 changing to V_STATE_MASTER
Related Commands
Description Displays debugging messages for VRRP errors, events, and state transitions.
DB-2826
December 2010
Syntax Description
Command Default
Command Modes
Command History
Examples
The following is sample output from the debug vrrp vrrs command:
Router# debug vrrp vrrs VRRP VRRS debugging is on
The following is sample output from the debug vrrp vrrs command when a VRRP group is configured with a name association to name1:
Router# configure terminal Router(config)# interface gigabitethernet0/0/0 Router(config-if)# ip address 10.0.0.1 255.0.0.0 Router(config-if)# vrrp 1 ip 10.0.0.7 Router(config-if)# vrrp 1 name name1 *Feb 5 09:29:47.005: VRRP: Registered VRRS group "name1"
The following is sample output when a name association is changed to a different name:
Router(config-if)# vrrp 1 name name2 *Feb *Feb 5 09:30:14.153: VRRP: Unregistered VRRS group "name1" 5 09:30:14.153: VRRP: Registered VRRS group "name2"
DB-2827
The following is sample output when a name association for group is removed:
Router(config-if)# no vrrp 1 name *Feb 5 09:30:22.689: VRRP: Unregistered VRRS group "name2"
Related Commands
Description Enables VRRS infrastructure debug messages. Enables VRRS plug-in debug messages.
DB-2828
December 2010
Syntax Description
Enables all VRRS accounting debug messages. Enables VRRS accounting error debug messages. Enables VRRS accounting event debug messages.
Command Default
Command Modes
Command History
Examples
Related Commands
Command debug vrrp vrrs debug vrrs infra debug vrrs plugin
Description Enables VRRP debugging statements for VRRS interactions. Enables VRRS infrastructure debug messages. Enables VRRS plug-in debug messages.
DB-2829
Syntax Description
Enables all VRRS infrastructure debug messages. Enables debugging for VRRS infrastructure to VRRS client interactions. Enables debugging for VRRS infrastructure events. Enables debugging for VRRS infrastructure to VRRS server interactions.
Command Default
Command Modes
Command History
Examples
The following is sample output from the debug vrrs infra command:
Router# debug vrrs infra all *Sep 9 16:09:53.848: *Sep 9 16:09:53.848: *Sep 9 16:09:53.848: *Sep 9 16:09:53.848: *Sep 9 16:09:53.848: handle FE720 *Sep 9 16:09:53.848: F7000001 *Sep 9 16:09:53.876: *Sep 9 16:09:53.876: *Sep 9 16:09:53.876: handle 22766F0 *Sep 9 16:09:54.356: *Sep 9 16:09:54.356: *Sep 9 16:09:54.360: *Sep 9 16:09:54.360: *Sep 9 16:09:54.360: *Sep 9 16:09:54.360: VRRP-TEST-1. Remov *Sep 9 16:09:54.860: VRRS: VRRS: VRRS: VRRS: VRRS: Client Client Client Client Client 21 is not registered 21 unregister failed VRRS TEST CLIENT registered, id 21 21 add, group VRRP-TEST-1 does not exist, allocating... 21 add to VRRP-TEST-1. Vrrs handle F7000001, client
VRRS: Server VRRP add, group VRRP-TEST-1, state INIT, vrrs handle VRRS: VRRP-TEST-1 group added notification VRRS: Normal priority clients for group 200000, for all groups[4C0 VRRS: Client 2 add to VRRP-TEST-1. Vrrs handle F7000001, client VRRS: VRRS: VRRS: VRRS: VRRS: VRRS: Client 21 remove from VRRP-TEST-1. vrrs handle F7000001 Server VRRP delete, group VRRP-TEST-1 vrrs handle F7000001 VRRP-TEST-1 group deleted notification Low priority clients 4 Client 2 remove from VRRP-TEST-1. vrrs handle F7000001 client remove, no more clients and no server for group
DB-2830
December 2010
*Sep 9 16:09:54.860: VRRS: Client 22 unregister failed *Sep 9 16:09:54.860: VRRS: Client VRRS TEST CLIENT registered, id 22
Related Commands
Description Enables VRRP debugging statements for VRRS interactions. Enables VRRS plug-in debug messages.
DB-2831
Syntax Description
Enables all VRRS debugs. Enables debugging for VRRS mac-address gratuitous ARP messages. Enables debugging for VRRS plug-in client interactions with VRRS. Enables debugging for VRRS plug-in database management. Enables VRRS events associated specifically with the VRRS interface-state plug-in. Enables VRRS events associated specifically with the VRRS mac-address plug-in. Enables debugging for the VRRS plug-in events process. Enables debugging for VRRS interface subblock management. Enables VRRS plug-in test code monitoring.
Command Default
Command Modes
Command History
Examples
The following is sample output when a VRRS borrowed MAC address is added to the MAC address filter of an interface enables VRRS plug-in debug messages:
Router)# debug vrrs plugin all Feb 17 19:15:38.052: VRRS-P(mac): GigEth0/0/0.1 Add 0000.12ad.0001 to MAC filter, using (afilter_add) Feb 17 19:15:38.053: VRRS-P(mac): Active count increase to (2) for MAC : 0000.12ad.0001
DB-2832
December 2010
Description Specifies this debug is related to VRRS plug-ins. Specifies this debug is related to the VRRS mac-address plug-in. Alternately (if-state) may displayed to indicate the debug is related to the VRRS interface-state plugiplug-inn.
Related Commands
Description Enables VRRP debugging statements for VRRS interactions. Enables VRRS infrastructure debug messages.
DB-2833
Effective with Cisco IOS Release 12.4(20)T, the debug vsi api command is not available in Cisco IOS software. To display information on events associated with the external ATM application programming interface (API) interface to the Virtual Switch Interface (VSI) master, use the debug vsi api command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vsi api no debug vsi api
Syntax Description
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was removed.
12.4(20)T
Usage Guidelines
Use the debug vsi api command to monitor the communication between the VSI master and the XmplsATM component regarding interface changes and cross-connect requests.
Examples
The following is sample output from the debug vsi api command:
Router# debug vsi api VSI_M: vsi_exatm_conn_req: 0x000C0200/1/35 -> 0x000C0100/1/50 desired state up, status OK VSI_M: vsi_exatm_conn_resp: 0x000C0200/1/33 -> 0x000C0100/1/49 curr state up, status OK
DB-2834
December 2010
Table 383
Description The type of connection request (connect or disconnect) that was submitted to the VSI master. The logical interface identifier of the primary endpoint, in hexadecimal form. The virtual path identifier (VPI) and virtual channel identifier (VCI) of the primary endpoint. The type of traffic flow. A right arrow (->) indicates unidirectional traffic flow (from the primary endpoint to the secondary endpoint). A bidirectional arrow (<->) indicates bidirectional traffic flow. Logical interface identifier of the secondary endpoint. VPI and VCI of the secondary endpoint. The status of a connect request. Up indicates a connect request; Down indicates a disconnect request. The status of a request. One of following status indications appears: OK INVALID_ARGS NONEXIST_INTF TIMEOUT NO_RESOURCES FAIL OK means only that the request is successfully queued for transmission to the switch; it does not indicate completion of the request.
DB-2835
Effective with Cisco IOS Release 12.4(20)T, the debug vsi errors command is not available in Cisco IOS software. To display information about errors encountered by the Virtual Switch Interface (VSI) master, use the debug vsi errors command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vsi errors [interface interface [slave number]] no debug vsi errors [interface interface [slave number]]
Syntax Description
(Optional) Specifies the interface number. (Optional) Specifies the slave number (beginning with 0).
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was removed.
12.4(20)T
Usage Guidelines
Use the debug vsi errors command to display information about errors encountered by the VSI master when parsing received messages, as well as information about unexpected conditions encountered by the VSI master. If the interface parameter is specified, output is restricted to errors associated with the indicated VSI control interface. If the slave number is specified, output is further restricted to errors associated with the session with the indicated slave.
Note
Slave numbers are the same as the session numbers discussed under the show controllers vsi session command.
DB-2836
December 2010
Multiple commands that specify slave numbers allow multiple slaves to be debugged immediately. For example, the following commands display errors associated with sessions 0 and 1 on control interface atm2/0, but for no other sessions.
Router# debug vsi errors interface atm2/0 slave 0 Router# debug vsi errors interface atm2/0 slave 1
Some errors are not associated with any particular control interface or session. Messages associated with these errors are printed, regardless of the interface or slave options currently in effect.
Examples
The following is sample output from the debug vsi errors command:
Router# debug vsi errors VSI Master: parse error (unexpected param-group contents) in GEN ERROR RSP rcvd on ATM2/0:0/51 (slave 0) errored section is at offset 16, for 2 bytes: 01.01.00.a0 00.00.00.00 00.12.00.38 00.10.00.34 *00.01*00.69 00.2c.00.00 01.01.00.80 00.00.00.08 00.00.00.00 00.00.00.00 00.00.00.00 0f.a2.00.0a 00.01.00.00 00.00.00.00 00.00.00.00 00.00.00.00 00.00.00.00
Field
parse error
Description An error was encountered during the parsing of a message received by the VSI master. The type of parsing error. In this case, a parameter group within the message contained invalid data. The function code in the header of the error message. The control interface on which the error message was received. The virtual path identifier (VPI) or virtual channel identifier (VCI) of the virtual circuit (VC) (on the control interface) on which the error message is received. Number of the session on which the error message is received. The number of bytes between the start of the VSI header and the start of that portion of the message in error. Length of the error section. The entire error message, as a series of hexadecimal bytes. Note that the error section is between asterisks (*).
DB-2837
Effective with Cisco IOS Release 12.4(20)T, the debug vsi events command is not available in Cisco IOS software. To display information about events that affect entire sessions, as well as events that affect only individual connections, use the debug vsi events command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vsi events [interface interface [slave number]] no debug vsi events [interface interface [slave number]]
Syntax Description
(Optional) The interface number. (Optional) The slave number (beginning with zero).
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug vsi events command to display information about events associated with the per-session state machines of the Virtual Switch Interface (VSI) master, as well as the per-connection state machines. If you specify an interface, the output is restricted to events associated with the indicated VSI control interface. If you specify the slave number, output is further restricted to events associated with the session with the indicated slave.
Note
Slave numbers are the same as the session numbers discussed under the show controllers vsi session command. Multiple commands that specify slave numbers allow multiple slaves to be debugged at once. For example, the following commands restrict output to events associated with sessions 0 and 1 on control interface atm2/0, but for no other sessions. Output associated with all per-connection events are displayed, regardless of the interface or slave options currently in effect.
DB-2838
December 2010
Router# debug vsi events interface atm2/0 slave 0 Router# debug vsi events interface atm2/0 slave 1
The following is sample output from the debug vsi events command:
Router# debug vsi events VSI Master: conn 0xC0200/1/37->0xC0100/1/51: CONNECTING -> UP VSI Master(session 0 on ATM2/0): event CONN_CMT_RSP, state ESTABLISHED -> ESTABLISHED VSI Master(session 0 on ATM2/0): event KEEPALIVE_TIMEOUT, state ESTABLISHED -> ESTABLISHED VSI Master(session 0 on ATM2/0): event SW_GET_CNFG_RSP, state ESTABLISHED -> ESTABLISHED debug vsi packets
Field
conn 0xC0200 1/37
Description The event applies to a particular connection. Logical interface identifier of the primary endpoint, in hexadecimal form. The virtual path identifier (VPI) or virtual channel identifier (VCI) of the primary endpoint. The type of traffic flow. A right arrow (->) indicates unidirectional traffic flow (from the primary endpoint to the secondary endpoint). A bidirectional arrow (<->) indicates bidirectional traffic flow. Logical interface identifier of the secondary endpoint. VPI or VCI of the secondary endpoint. <state1> is a mnemonic for the state of the connection before the event occurred. <state2> represents the state of the connection after the event occurred. The number of the session with which the event is associated. The control interface associated with the session. The event that has occurred. This includes mnemonics for the function codes of received messages (for example, CONN_CMT_RSP), as well as mnemonics for other events (for example, KEEPALIVE_TIMEOUT). Mnemonics for the session states associated with the transition triggered by the event. <state1> is a mnemonic for the state of the session before the event occurred; <state2> is a mnemonic for the state of the session after the event occurred.
->
DB-2839
Effective with Cisco IOS Release 12.4(20)T, the debug vsi packets command is not available in Cisco IOS software. To display a one-line summary of each Virtual Switch Interface (VSI) message sent and received by the label switch controller (LSC), use the debug vsi packets command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vsi packets [interface interface [slave number]] no debug vsi packets [interface interface [slave number]]
Syntax Description
(Optional) The interface number. (Optional) The slave number (beginning with zero).
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was removed.
12.4(20)T
Usage Guidelines
If you specify an interface, output is restricted to messages sent and received on the indicated VSI control interface. If you specify a slave number, output is further restricted to messages sent and received on the session with the indicated slave.
Note
Slave numbers are the same as the session numbers discussed under the show controllers vsi session command. Multiple commands that specify slave numbers allow multiple slaves to be debugged at once. For example, the following commands restrict output to messages received on atm2/0 for sessions 0 and 1, but for no other sessions.
Router# debug vsi packets interface atm2/0 slave 0 Router# debug vsi packets interface atm2/0 slave 1
DB-2840
December 2010
Examples
The following is sample output from the debug vsi packets command:
Router# debug vsi packets VSI VSI VSI VSI master(session master(session master(session master(session 0 0 0 0 on on on on ATM2/0): ATM2/0): ATM2/0): ATM2/0): sent rcvd sent rcvd msg msg msg msg SW SW SW SW GET GET GET GET CNFG CNFG CNFG CNFG CMD RSP CMD RSP on on on on 0/51 0/51 0/51 0/51
Field
session
Description Session number identifying a particular VSI slave. Numbers begin with zero. See the show controllers vsi session command. Identifier for the control interface on which the message is sent or received. The message is sent by the VSI master. The message is received by the VSI master. The function code from the message header. The virtual path identifier (VPI) or virtual channel identifier (VCI) of the virtual circuit (VC) (on the control interface) on which the message is sent or received.
DB-2841
Effective with Cisco IOS Release 12.4(20)T, the debug vsi param-groups command is not available in Cisco IOS software. To display the first 128 bytes of each Virtual Switch Interface (VSI) message sent and received by the Multiprotocol Label Switching (MPLS) label switch controller (LSC) (in hexadecimal form), use the debug vsi param-groups command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vsi param-groups [interface interface [slave number]] no debug vsi param-groups [interface interface [slave number]]
Note
param-groups stands for parameter groups. A parameter group is a component of a VSI message.
Syntax Description
(Optional) The interface number. (Optional) The slave number (beginning with zero).
Defaults
Command Modes
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. This command was removed.
12.4(20)T
Usage Guidelines
This command is most commonly used with the debug vsi packets command to monitor incoming and outgoing VSI messages. If you specify an interface, output is restricted to messages sent and received on the indicated VSI control interface. If you specify a slave, output is further restricted to messages sent and received on the session with the indicated slave.
DB-2842
December 2010
Note
Slave numbers are the same as the session numbers discussed under the show controllers vsi session command. Multiple commands that specify slave numbers allow multiple slaves to be debugged at once. For example, the following commands restrict output for messages received on atm2/0 for sessions 0 and 1, but for no other sessions:
Router# debug vsi param-groups interface atm2/0 slave 0 Router# debug vsi param-groups interface atm2/0 slave 1
Examples
The following is sample output from the debug vsi param-groups command:
Router# debug vsi param-groups Outgoing VSI 01.02.00.80 Incoming VSI 01.02.00.81 00.01.00.00 00.00.00.09 00.01.0f.a0 42.50.58.2d Outgoing VSI 01.02.00.80 Incoming VSI 01.02.00.81 00.01.00.00 00.00.00.09 00.01.0f.a0 42.50.58.2d msg of 12 bytes (not including encap): 00.00.95.c2 00.00.00.00 msg of 72 bytes (not including encap): 00.00.95.c2 00.0f.00.3c 00.10.00.08 00.00.00.00 01.00.00.08 00.00.00.09 01.10.00.20 01.01.01.00 0c.08.80.00 00.13.00.15 00.0c.01.00 00.00.00.00 56.53.49.31 msg of 12 bytes (not including encap): 00.00.95.c3 00.00.00.00 msg of 72 bytes (not including encap): 00.00.95.c3 00.0f.00.3c 00.10.00.08 00.00.00.00 01.00.00.08 00.00.00.09 01.10.00.20 01.01.01.00 0c.08.80.00 00.13.00.15 00.0c.01.00 00.00.00.00 56.53.49.31
Description The message is sent by the VSI master. The message is received by the VSI master. Number of bytes in the message, starting at the VSI header, and excluding the link layer encapsulation. The first 128 bytes of the message, in hexadecimal form.
DB-2843
debug vtemplate
To display cloning information for a virtual access interface from the time it is cloned from a virtual template to the time the virtual access interface comes down when the call ends, use the debug vtemplate command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vtemplate no debug vtemplate
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug vtemplate command when a virtual access interface comes up. The virtual access interface is cloned from virtual template 1.
Router# debug vtemplate VTEMPLATE Reuse vaccess8, New Recycle queue size:50 VTEMPLATE set default vaccess8 with no ip address Virtual-Access8 VTEMPLATE hardware address 0000.0c09.ddfd VTEMPLATE vaccess8 has a new cloneblk vtemplate, now it has vtemplate VTEMPLATE undo default settings vaccess8 VTEMPLATE ************* CLONE VACCESS8 ***************** VTEMPLATE Clone from vtemplate1 to vaccess8 interface Virtual-Access8 no ip address encap ppp ip unnumbered Ethernet0 no ip mroute-cache fair-queue 64 256 0 no cdp enable ppp authentication chap end %LINK-3-UPDOWN: Interface Virtual-Access8, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access8, changed state to up
The following is sample output from the debug vtemplate command when a virtual access interface goes down. The virtual interface is uncloned and returns to the recycle queue.
Router# debug vtemplate %LINK-3-UPDOWN: Interface Virtual-Access8, changed state to down VTEMPLATE Free vaccess8 %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access8, changed state to down VTEMPLATE clean up dirty vaccess queue, size:1
DB-2844
December 2010
VTEMPLATE Found a dirty vaccess8 clone with vtemplate VTEMPLATE ************ UNCLONE VACCESS8 ************** VTEMPLATE Unclone to-be-freed vaccess8 command#7 interface Virtual-Access8 default ppp authentication chap default cdp enable default fair-queue 64 256 0 default ip mroute-cache default ip unnumbered Ethernet0 default encap ppp default ip address end VTEMPLATE set default vaccess8 with no ip address VTEMPLATE remove cloneblk vtemplate from vaccess8 with vtemplate VTEMPLATE Add vaccess8 to recycle queue, size=51
Field
Description
VTEMPLATE Reuse vaccess8, New Recycle Virtual access interface 8 is reused; the current queue size is 50. queue size:50 VTEMPLATE set default vaccess8 with no ip address Virtual-Access8 VTEMPLATE hardware address 0000.0c09.ddfd VTEMPLATE vaccess8 has a new cloneblk vtemplate, now it has vtemplate VTEMPLATE ************* CLONE VACCESS8 ********** ******* VTEMPLATE Clone from vtemplate1 to vaccess8 interface Virtual-Access8 no ip address encap ppp ip unnumbered Ethernet0 no ip mroute-cache fair-queue 64 256 0 no cdp enable ppp authentication chap end %LINK-3-UPDOWN: Interface Virtual-Access8, changed state to up MAC address of virtual interface 8. Recording that virtual access interface 8 is cloned from the virtual interface template. Banner: Cloning is in progress on virtual access interface 8. Specific configuration commands in virtual interface template 1 that are being applied to the virtual access interface 8.
%LINEPROTO-5-UPDOWN: Line protocol Line protocol status: The line protocol is up. on Interface Virtual-Access8, changed state to up
DB-2845
Table 388
Field %LINK-3-UPDOWN: Interface Virtual-Access8, changed state to down VTEMPLATE Free vaccess8
Description Link status: The link is down. Freeing virtual access interface 8.
%LINEPROTO-5-UPDOWN: Line protocol Line protocol status: The line protocol is down. on Interface Virtual-Access8, changed state to down VTEMPLATE clean up dirty vaccess queue, size:1 VTEMPLATE Found a dirty vaccess8 clone with vtemplate VTEMPLATE ************ UNCLONE VACCESS8 ************** VTEMPLATE Unclone to-be-freed vaccess8 command#7 interface Virtual-Access8 default ppp authentication chap default cdp enable default fair-queue 64 256 0 default ip mroute-cache default ip unnumbered Ethernet0 default encap ppp default ip address end VTEMPLATE set default vaccess8 with no ip Default is set again. address VTEMPLATE remove cloneblk vtemplate from vaccess8 with vtemplate Removing the record of cloning from a virtual interface template. Specific configuration commands to be removed from the virtual access interface 8. Access queue cleanup is proceeding and the template is being uncloned.
VTEMPLATE Add vaccess8 to recycle queue, Virtual access interface is added to the recycle queue. size=51
DB-2846
December 2010
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(15)B. This command was integrated into Cisco IOS Release 12.2(28)SB. This command was integrated into Cisco IOS Release 12.2(31)SB. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The debug messages are displayed if you configure virtual templates with commands that are incompatible with virtual access subinterfaces.
Examples
The following example shows how to display virtual access subinterface debug messages:
Router# debug vtemplate subinterface Virtual Template subinterface debugging is on Router# Router# Sep 19 15:09:41.989:VT[Vt11]:Config prevents subinterface creation carrier-delay 45 ip rtp priority 2000 2010 500
DB-2847
Table 389
Field VT [Vt11]: Config prevents subinterface creation carrier-delay 45 ip rtp priority 2000 2010 500
Description Indicates that this is a debug virtual template subinterface message. Indicates that this message concerns virtual template 11. Indicates that this virtual template cannot support the creation of virtual access subinterfaces. These are the commands that make the virtual template incompatible with subinterfaces.
Related Commands
Description Tests a virtual template to determine if it can support virtual access subinterfaces. Enables the creation of virtual access subinterfaces.
DB-2848
December 2010
debug vtsp
Note
Effective with release 12.3(8)T, the debug vtsp command is replaced by the debug voip dsm and debug voip vtsp commands. See the debug voip dsm and debug voip vtsp commands for more information. To display the state of the gateway and the call events, use the debug vtsp command in privileged EXEC mode. To display the machine state during voice telephony service provider (VTSP) event processing, use the no form of the command. debug vtsp {all | dsp | error | event | session | stats | tone | rtp} no debug vtsp {all | dsp | error | event | session | stats | tone | rtp}
Note
The debug vtsp command with the event keyword must be turned on before the voice call debug command can be used.
Syntax Description
All VTSP debugging except stats, tone, and event is enabled. Digital signal processor (DSP) message trace is enabled. VTSP error debugging is enabled. State machine debugging is enabled. Session debugging is enabled. Statistics debugging is enabled. Tone debugging is enabled. Real-Time Transport Protocol (RTP) debugging is enabled.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 universal access servers. This command was introduced on the Cisco 2600 series router, Cisco 3600 series router, and MC3810 multiservice access concentrators. This command was integrated into Cisco IOS Release 12.1(2)T. The enhancement of debug capabilities, which affects this command by adding a single call identification header, for Cisco voice gateways was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, Cisco 3640, and Cisco 3660 series; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following access servers: Cisco AS5300, and Cisco AS5800; and, on the Cisco MC3810 multiservice access concentrators.
DB-2849
Modification This command was replaced by the debug voip vtsp command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output for a Cisco AS5300 and Cisco 3640 when the debug vtsp all command is entered:
Cisco AS5300 Access Server
Router# debug vtsp all ! Voice telephony call control all debugging is on ! 00:10:53: %SYS-5-CONFIG_I: Configured from console by console 00:10:54: %SYS-5-CONFIG_I: Configured from console by console ! 00:11:09: //-1/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_regxrule_translate: 00:11:09: //-1/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_regxrule_translate: 00:11:09: //-1/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_tsp_call_setup_ind: 00:11:09: //-1/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_tsp_fill_setup_ind:
DB-2850
December 2010
20:58:16: //-1/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_tsp_fill_setup_ind: ev.clg.clir is 0 ev.clg.clid_transparent is 0 ev.clg.null_orig_clg is 0 ev.clg.calling_translated is false //-1/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/VTSP:(3/0:23):-1:0:0/vtsp_do_call_setup_ind: Call ID=101123, guid=63EB9AC8
Description Identifies the VTSP module, port name, channel number, DSP slot, and DSP channel number. Identifies a function name. Identifies a called number. Identifies the date the call was made. Identifies the dial peer number. Identifies the GUID (hexadecimal address).
Related Commands
Description Debugs the call control API. Debugs a voice call by displaying a full GUID or header.
DB-2851
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300. This command was first supported on the Cisco 2600, Cisco 3600 and Cisco MC3810 series. This command was integrated into Cisco IOS Release 12.1(2)T. The new debug header was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, and Cisco 3640. and Cisco 3660; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following universal access servers: Cisco AS5300, and Cisco AS5800; and, on the Cisco MC3810 multiservice access concentrators. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug vtsp all command enables the following debug vtsp commands: debug vtsp session, debug vtsp error, and debug vtsp dsp. For more information or sample output, see the individual commands. Execution of the no debug vtsp all command will turn off all VTSP-level debugging. You should turn off all debugging and then enter the debug commands you are interested in one by one. This process helps avoid confusion about which ports you are actually debugging.
Caution
Using this command can severely impact network performance and prevent any faxes from succeeding.
DB-2852
December 2010
Examples
The following example shows the debug vtsp all command on a Cisco 3640 modular access router:
Router# debug vtsp all Voice telephony call control all debugging is on
At this point, the VTSP is not aware of anything. The format of this message is //callid/GUID/VTSP:(voice-port):T1-channel_number:DSP_number:DSP_channel_number:
CallEntry ID is -1. GUID is xxxxxxxxxx. The voice port is blank. Channel ID is -1. DSP ID is -1. DSP channel ID is -1.
1 08:23:10.869: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_regxrule_translate:
*Mar
The original and the translated calling number are the same (55555) and the original and the translated called number are the same (888545). These numbers are often the same because if a translation rule is applied, it will be on the dial peers or the ports, both of which comes later than these VTSP messages in the Cisco IOS code execution.
*Mar 1 08:23:10.869: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_regxrule_translate: calling_number(original)= calling_number(xlated)=55555 called_number(original)= called_number(xlated)=888545 redirectNumber(original)= redirectNumber(xlated)=
The VTSP got a call setup indicator from the TSP layer with called number 888545 and calling number 55555. There is no awareness of the CallEntry ID (-1) or the GUID (xxxxxxxxxxxx).
*Mar 1 08:23:10.873: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_tsp_call_setup_ind: (sdb=0x634C90EC, tdm_info=0x0, tsp_info=0x63083950, calling_number=55555 calling_oct3 = 0x80, called_number=888545 called_oct3 = 0x80, oct3a=0x0): peer_tag=10002 *Mar 1 08:23:10.873: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_tsp_fill_setup_ind : ev.clg.clir is 0 ev.clg.clid_transparent is 0 ev.clg.null_orig_clg is 0 ev.clg.calling_translated is false *Mar 1 08:23:10.873: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_call_setup_ind: . *Mar 1 08:23:10.873: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_allocate_cdb: ,cdb 0x635FC480 *Mar 1 08:23:10.873: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_call_setup_ind: *Mar 1 08:23:10.873: source route label
At this point, the VTSP is not aware of anything. The format of this message is //callid/GUID/VTSP:(voice-port):T1-channel_number:DSP_number:DSP_channel_number:
CallEntry ID is -1. GUID is D2F6429A8A8A. The voice port is 1/0:23 where 23 indicates D channel. The T1 channel is still unknown at this point (-1). The digital signal processor (DSP) is 0. The DSP channel is 4.
DB-2853
The VTSP learns about the B channel (changed from -1 to 22), and the CallEntry ID is still unknown (-1).
*Mar 1 08:23:10.873: //-1/D2F6429A8A8A/VTSP:(1/0:23):22:0:4/vtsp_do_call_setup_ind: type=0, under_spec=1615186336, name=, id0=23, id1=0, id2=0, calling=55555,called=888545 subscriber=RegularLinevtsp_do_call_setup_ind: redirect DN = reason = -1 *Mar 1 08:23:10.877: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_normal_call_setup_ind: .
The VTSP learns the CallEntry ID. The format of this message is //callid/GUID/VTSP:(voice-port):T1-channel_number:DSP_number:DSP_channel_number:
CallEntry ID is 899 (changed from -1 to 899) GUID is D2F6429A8A8A The voice port is 1/0:23 where 23 indicates D channel The T1 channel is 22 The DSP is 12 The DSP channel is 4
In the following outputs, VTSP sets some of the voice parameters for this call:
*Mar 1 08:23:10.877: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_modem_proto_from_cdb: cap_modem_proto 0 *Mar 1 08:23:10.881: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/set_playout_cdb:playout default *Mar 1 08:23:10.881: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_dsp_echo_canceller_control: echo_cancel: 1 *Mar 1 08:23:10.885: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_save_dialpeer_tag: tag = 10003 *Mar 1 08:23:10.885: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_report_digit_control: vtsp_report_digit_control: enable=0: *Mar 1 08:23:10.885: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_report_digit_control: digit reporting disabled *Mar 1 08:23:10.885: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_get_digit_timeouts: : vtsp_get_digit_timeouts
DB-2854
December 2010
VTSP sends out an alerting to the POTS leg; the phone is ringing at this time.
*Mar 1 08:23:10.949: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event: vtsp:[1/0:23:899, S_PROCEEDING, E_CC_ALERT] *Mar 1 08:23:10.949: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_alert: . *Mar 1 08:23:10.949: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_timer_stop:3019095 *Mar 1 08:23:18.769: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_get_dialpeer_tag: tag = 10003
The phone gets answered here, a bridge is now set up between the two call legs.
*Mar 1 08:23:18.769: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event: vtsp:[1/0:23:899, S_ALERTING, E_CC_BRIDGE] *Mar 1 08:23:18.769: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_bridge: .
The VTSP received a capabilities indication event from the CCAPI. The VTSP needs to be aware of this because it handles the DSPs.
*Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event: vtsp:[1/0:23:899, S_CONNECT, E_CC_CAPS_IND] *Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: . *Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: RTP PT:NTE[101],NTEtx[101],NSE[100],FaxInd[96],FaxAck[97],CiscoDTMF[121],FaxRelay[122],CASsig[ 123],ClearChan[125],PCMu[0],PCMa[8]Codec[4],TxDynamicPayload[0], RxDynamicPayload[0] *Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: dtmf relay: mode=32, codec=1 *Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: passthrough: cap_modem_proto 0, cap_modem_codec 0, cap_modem_redundancy 0, payload100, modem_relay 0, gw-xid=0 *Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: Encap 1, Vad 2, Codec 0x4, CodecBytes 20, FaxRate 2, FaxBytes 20, FaxNsf 0xAD0051 SignalType 2 DtmfRelay 32, Modem 0, SeqNumStart 0x1343 *Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: *Mar 1 08:23:18.777: FORKING Parameters are forking mask: 0, simple_forking_codec_mask: 0, complex_forking_codec_mask 0 *Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: [ mode:0,init:60, min:40, max:200]
The VTSP received events regarding capabilities acknowledged from the call control API (CCAPI).
*Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event: vtsp:[1/0:23:899, S_CONNECT, E_CC_CAPS_ACK] *Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ack: . *Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ack: passthrough: cap_modem_proto 0, cap_modem_codec 0, cap_modem_redundancy 0, payload100, modem_relay 0, gw-xid=0 *Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ack: Named Telephone Event payload: rcv 101, tx 101 *Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_switch_codec: *Mar 1 08:23:18.777: DTMF Relay in act_switch_codec is 32 *Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/set_dsp_encap_config:
DB-2855
*Mar 1 08:23:18.777: set_dsp_encap_config: logical ssrc 40 *Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_modem_proto_from_cdb: cap_modem_proto 0 *Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_switch_codec: codec = 16 *Mar 1 08:23:18.781: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_timer: 3019878 *Mar 1 08:23:18.781: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event: vtsp:[1/0:23:899, SP_PENDING_CODEC_SWITCH, E_DSPRM_PEND_SUCCESS] *Mar 1 08:23:18.781: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_pend_codec_success: . *Mar 1 08:23:18.781: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_timer_stop:3019878 *Mar 1 08:23:18.781: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_open_voice_and_set_params: . *Mar 1 08:23:18.781: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/set_dsp_encap_config: *Mar 1 08:23:18.781: set_dsp_encap_config: logical ssrc 40 *Mar 1 08:23:18.781: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_modem_proto_from_cdb: cap_modem_proto 0 *Mar 1 08:23:18.781: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/set_playout_cdb:playout default *Mar 1 08:23:18.781: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_dsp_echo_canceller_control: echo_cancel: 1 *Mar 1 08:23:18.781: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_add_fork: *Mar 1 08:23:18.785: vtsp_add_fork *Mar 1 08:23:18.785: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_update_fork_info: *Mar 1 08:23:18.785: vtsp_update_fork_info: add_fork=0 *Mar 1 08:23:18.785: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_get_xmit_info_node: *Mar 1 08:23:18.785: vtsp_get_xmit_info_node *Mar 1 08:23:18.785: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_update_fork_info: *Mar 1 08:23:18.785: vtsp_update_fork_info xmit func is 60FC43F0, context is 635BC51Cpeer_call_id: 900, stream_count: 1, update_flag 0 Router# *Mar 1 08:23:18.785: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_update_fork_info: *Mar 1 08:23:18.785: The stream bit-mask is 1 *Mar 1 08:23:18.785: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_update_fork_info: *Mar 1 08:23:18.785: The stream type is 0 *Mar 1 08:23:18.785: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_update_fork_info: *Mar 1 08:23:18.785: The logical ssrc is 64 for stream 0 *Mar 1 08:23:18.785: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_update_stream_count: *Mar 1 08:23:18.785: g711_voice_count=0 g711_avt_count = 0 g711_voice_avt_count = 0 complex_voice_count = 1 complex_avt_count = 0 complex_voice_avt_count = 0
A digit begin event was detected while in the connect state. Digit 1 is dialed outbound on the POTS legs.
*Mar 1 08:23:26.745: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_call_digit_begin: vtsp_call_digit_begin: digit=1, digit_begin_flags=0x0, rtp_timestamp=0, rtp_expiration=0 *Mar 1 08:23:26.745: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event: vtsp:[1/0:23:899, S_CONNECT, E_CC_DIGIT_BEGIN] *Mar 1 08:23:26.745: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_digit_begin:act_digit_begin *Mar 1 08:23:27.045: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_call_digit_end: vtsp_call_digit_end: digit=1, duration=300
A digit end event was detected while in the connect state. The total duration of the digit was 300 ms.
*Mar 1 08:23:27.045: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event: vtsp:[1/0:23:899, S_CONNECT, E_CC_DIGIT_END,] *Mar 1 08:23:27.045: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_digit_end: act_digit_end
DB-2856
December 2010
The call is hung up at this point, VTSP receives a bridge drop event from the CCAPI.
*Mar 1 08:23:39.393: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event: vtsp:[1/0:23:899, S_CONNECT, E_CC_BRIDGE_DROP] *Mar 1 08:23:39.393: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_remove_stream_node: *Mar 1 08:23:39.393: vtsp_remove_stream_node *Mar 1 08:23:39.393: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_get_xmit_info_node: *Mar 1 08:23:39.393: vtsp_get_xmit_info_node *Mar 1 08:23:39.393: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_remove_stream_node: *Mar 1 08:23:39.393: Stream count is 1 in function vtsp_remove_stream_node *Mar 1 08:23:39.393: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_bdrop: . *Mar 1 08:23:39.393: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_is_record_active: *Mar 1 08:23:39.393: vtsp_is_record_active: false
Following the disconnect event from the CCAPI, the timers are stopped.
*Mar 1 08:23:39.397: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_ring_noan_timer_stop: 3021940 *Mar 1 08:23:39.397: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_pcm_tone_detect_timer_stop: 3021940 *Mar 1 08:23:39.397: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_pcm_switchover_timer_stop: 3021940 *Mar 1 08:23:39.397: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_cm_detect_timer_stop: 3021940 *Mar 1 08:23:39.397: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_modem_relay_mode_timer_stop: 3021940 *Mar 1 08:23:39.397: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_modem_relay_stats_timer_stop: 3021940 *Mar 1 08:23:39.397: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_timer_stop:3021940 *Mar 1 08:23:39.397: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_disconnect: cdb 0x635FC480, cause 0x10 *Mar 1 08:23:39.401: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_timer: 3021940
DB-2857
Related Commands
Description Limits VTSP debug output to a specific voice port. Displays which debug commands are enabled. Allows configuration of the voice call debug output.
DB-2858
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 series access servers. This command was implemented on the Cisco 2600 series, Cisco 3600 series, and Cisco MC3810 multiservice access concentrators. This command was integrated into Cisco IOS Release 12.1(2)T. The new debug header was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, and Cisco 3640. and Cisco 3660; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following universal access servers: Cisco AS5300, and Cisco AS5800; and, on the Cisco MC3810 multiservice access concentrators. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.1(2)T 12.2(11)T
12.2SX
Usage Guidelines
The debug vtsp dsp command shows messages from the DSP on the voice feature card (VFC) to the router; this command can be useful if you suspect that the VFC is not functional. It is a simple way to check if the VFC is responding to off-hook indications.
On Cisco 2600, 3600, MC3810 Series
The debug vtsp dsp command shows messages from the DSP to the router.
DB-2859
Note
We recommend that you log output from the debug vtsp dsp command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Examples
The following example shows the VTSP DSP usage on a Cisco 3640 modular access router:
Router# debug vtsp dsp Voice telephony call control dsp debugging is on Router# *Mar 1 01:05:18.539: //12/A76D98838014/VTSP:(1/0:23):22:14:2/vtsp_dsp_echo_canceller_control: echo_cancel: 1
Descriptions CallEntry ID. GUID. Controller 1/0, D channel. B-channel number. This can also be found using the show voice call summary command. DSP number. This can also be found using the show voice dsp command. Channel number on the DSP. This can also be found using the show voice dsp command. Echo cancel is on.
Related Commands
Command debug vpm all debug vtsp port show debug voice call debug
Description Enables all VPM debugging. Limits VTSP debug output to a specific voice port. Displays which debug commands are enabled. Allows configuration of the voice call debug output.
DB-2860
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was first supported on the Cisco 2600, Cisco 3600 and Cisco MC3810 series. This command was integrated into Cisco IOS Release 12.1(2)T. The new debug header was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, and Cisco 3640. and Cisco 3660; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following universal access servers: Cisco AS5300, and Cisco AS5800; and, on the Cisco MC3810 multiservice access concentrators. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug vtsp error command can be used to check for mismatches in interface capabilities.
Note
We recommend that you log output from the debug vtsp error command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Related Commands
Command debug vpm all debug vtsp port show debug voice call debug
Description Enables all VPM debugging. Limits VTSP debug output to a specific voice port. Displays which debug commands are enabled. Allows configuration of the voice call debug output.
DB-2861
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 universal access servers. This command was first supported on the Cisco 2600, Cisco 3600 and Cisco MC3810 series. This command was integrated into Cisco IOS Release 12.1(2)T. The new debug header was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, and Cisco 3640. and Cisco 3660; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following universal access servers: Cisco AS5300, and Cisco AS5800; and, on the Cisco MC3810 multiservice access concentrators. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug vtsp event command can be used to enable state machine debugging.
Note
We recommend that you log output from the debug vtsp event command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
DB-2862
December 2010
Examples
The following shows sample output from the debug vtsp event command:
Router# debug vtsp event Voice Telephony event debugging is on
The following events are seen when the call is set up.
*Mar 1 22:20:39.138: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_SETUP_INDICATED, event: E_CC_PROCEEDING]
As soon as the call is answered, the bridge comes up and the CONNECT event appears.
*Mar 1 22:20:47.798: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_ALERTING, event: E_CC_BRIDGE] *Mar 1 22:20:47.802: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_ALERTING, event: E_CC_CONNECT]
The following debug outputs are regularly seen as the call progresses. The outputs indicate that collection of Tx/Rx/Delay/Error statistics is occurring.
*Mar 1 22:20:49.470: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_CC_REQ_PACK_STAT] *Mar 1 22:20:49.482: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_DSP_GET_TX] *Mar 1 22:20:49.482: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_DSP_GET_RX] *Mar 1 22:20:49.486: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_DSP_GET_VP_DELAY] *Mar 1 22:20:49.486: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_DSP_GET_VP_ERROR] *Mar 1 22:20:51.638: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_CC_REQ_PACK_STAT] *Mar 1 22:20:51.638: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_DSP_GET_TX] *Mar 1 22:20:51.638: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_DSP_GET_RX] *Mar 1 22:20:51.642: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_DSP_GET_VP_DELAY] *Mar 1 22:20:51.642: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_DSP_GET_VP_ERROR] Router#
When digits are passed during the conversation, the digit begin and digit end events are seen.
*Mar 1 22:21:01.542: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_CC_DIGIT_BEGIN] *Mar 1 22:21:01.842: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_CC_DIGIT_END,]
DB-2863
*Mar 1 22:21:01.962: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_CC_DIGIT_BEGIN] *Mar 1 22:21:02.262: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_CC_DIGIT_END,] Router#
Once the call is hung up from one side, the bridge_drop and the disconnect events appear.
*Mar 1 22:21:10.834: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_TSP_DISCONNECT_IND] *Mar 1 22:21:10.838: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_CC_BRIDGE_DROP] *Mar 1 22:21:10.838: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: [state:S_CONNECT, event: E_CC_DISCONNECT]
Following the disconnect event, the signaling state becomes S_WAIT_STATS, during which the DSP stats are collected.
*Mar 1 22:21:10.842: [state:S_WAIT_STATS, *Mar 1 22:21:10.846: [state:S_WAIT_STATS, *Mar 1 22:21:10.854: [state:S_WAIT_STATS, //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: event: E_DSP_GET_ERROR] //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: event: E_DSP_GET_LEVELS] //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event: event: E_DSP_GET_TX]
Related Commands
Command debug vpm all debug vtsp error debug vtsp port show debug voice call debug
Description Enables all VPM debugging. Displays processing errors in the VTSP. Limits VTSP debug output to a specific voice port. Displays which debug commands are enabled. Allows configuration of the voice call debug output.
DB-2864
December 2010
Syntax Description
slot/subunit/port
slot specifies a router slot in which a voice network module (NM) is installed. Valid entries are router slot numbers for the specific platform. subunit specifies a voice interface card (VIC) where the voice port is located. Valid entries are 0 and 1. (The VIC fits into the voice network module.) port specifies an analog voice port number. Valid entries are 0 and 1.
For the Cisco 2600 and Cisco 3600 Series with Digital Voice Ports
slot/port:ds0-group Debugs the digital voice port you specify with the slot/port:ds0-group designation.
slot specifies a router slot in which the packet voice trunk network module (NM) is installed. Valid entries are router slot numbers for the specific platform. port specifies a T1 or E1 physical port in the voice WAN interface card (VWIC). Valid entries are 0 and 1. (One VWIC fits in an NM.) ds0-group specifies a T1 or E1 logical port number. Valid entries are 0 to 23 for T1 and 0 to 30 for E1.
DB-2865
slot/port
Debugs the analog voice port you specify with the slot/port designation.
slot is the physical slot in which the analog voice module (AVM) is installed. The slot is always 1 for analog voice ports in the Cisco MC3810 series. port specifies an analog voice port number. Valid entries are 1 to 6.
slot:ds0-group
Debugs the digital voice port you specify with the slot:ds0-group designation.
slot specifies the module (and controller). Valid entries are 0 for the MFT (controller 0) and 1 for the DVM (controller 1). ds0-group specifies a T1 or E1 logical voice port number. Valid entries are 0 to 23 for T1 and 0 to 30 for E1.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on Cisco 2600 and Cisco 3600 series routers. This command was introduced on the Cisco AS5300 series access servers. This command was first supported on the Cisco MC3810 series. This command was integrated into Cisco IOS Release 12.1(2)T. The new debug header was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, and Cisco 3640. and Cisco 3660; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following universal access servers: Cisco AS5300, and Cisco AS5800; and, on the Cisco MC3810 multiservice access concentrators. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
Use the debug vtsp port command to limit the debug output to a specific voice port. The debug output can be quite voluminous for a single channel. The entire VTSP debug output from a platform with 12 voice ports might create problems. Use this debug command with any or all of the other debug modes.
DB-2866
December 2010
Execution of no debug vtsp all will turn off all VTSP-level debugging. It is usually a good idea to turn off all debugging and then enter the debug commands you are interested in one by one. This will help to avoid confusion about which ports you are actually debugging.
Note
We recommend that you log output from the debug vtsp port command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Related Commands
Description Enables all VPM debugging. Displays which debug commands are enabled. Allows configuration of the voice call debug output.
DB-2867
Syntax Description
Displays packets that are both sent and received from the digital signal processor (DSP). Displays packets received from the DSP. Displays packets sent to the DSP. (Optional) Specifies a specific type of payload. (Optional) Valid payload types are as follows:
allAll packets are displayed. No codec is specified. equal-toPackets in payloads equal to the specified codec are displayed. greater-thanPackets in payloads greater than the specified codec are displayed. less-thanPackets in payloads less than the specified codec are displayed. other-thanPackets in payloads other than the specified codec are displayed. other-than-fax-andPackets in payloads other than fax relay and the specified codec are displayed. other-than-silence-andPackets in payloads other than silence and the specified codec are displayed.
codec
(Optional) If a codec needs to be specified for the payload type, valid codecs are as follows:
0 to 123Custom value of the payload. g711alawG.711 alaw 64000 bps. g711ulawG.711 ulaw 64000 bps. g723.1G.723.1. g726G.726. g728G.728. g729aG.729a.
Defaults
Command Modes
Privileged EXEC
DB-2868
December 2010
Command History
Modification This command was introduced on the Cisco AS5300 series access servers. This command was first supported on the Cisco 2600, Cisco 3600, and MC3810 series devices. This command was integrated into Cisco IOS Release 12.1(2)T. The new debug header was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, and Cisco 3640. and Cisco 3660; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following universal access servers: Cisco AS5300, and Cisco AS5800; and, on the Cisco MC3810 multiservice access concentrators. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
We recommend that you log output from the debug vtsp rtp command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Examples
The following line shows the payload from the DSP (telephony leg) to the IP leg:
*Mar 1 01:10:05.687: //20/4DD959B48020/VTSP:(1/0:23):22:14:2/vtsp_print_rtp_header: s=DSP d=VoIP payload 0x12 ssrc 0x40 sequence 0x19E3 timestamp 0xCCDCE092
The following line shows the payload from the IP leg to the DSP (telephony leg):
*Mar 1 01:10:05.699: //20/4DD959B48020/VTSP:(1/0:23):22:14:2/vtsp_print_rtp_header: s=VoIP d=DSP payload 0x12 ssrc 0xAF0534E3 sequence 0x92A timestamp 0x6BE50
Related Commands
Description Shows messages from the DSP. Allows configuration of the voice call debug output.
DB-2869
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
We recommend that you log output from the debug vtsp send-nse command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Related Commands
Command debug rtpspi all debug rtpspi errors debug rtpspi inout debug rtpspi send-nse debug sgcp errors debug sgcp events debug sgcp packet voice call debug
Description Debugs all RTP SPI errors, sessions, and in/out functions. Debugs RTP SPI errors. Debugs RTP SPI in/out functions. Triggers the RTP SPI to send a triple redundant NSE. Debugs SGCP errors. Debugs SGCP events. Debugs SGCP packets. Allows configuration of the voice call debug output.
DB-2870
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 universal access servers. This command was implemented on the Cisco 2600, Cisco 3600 and Cisco MC3810 series. The new debug header was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, and Cisco 3640. and Cisco 3660; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following universal access servers: Cisco AS5300, and Cisco AS5800; and, on the Cisco MC3810 multiservice access concentrators. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug vtsp session command traces how the router interacts with the DSP based on the signaling indications from the signaling stack and requests from the application. This debug command displays information about how each network indication and application request is handled, signaling indications, and DSP control messages. This debug level shows the internal workings of the voice telephony call state machine.
Note
We recommend that you log output from the debug vtsp send-nse command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
DB-2871
Examples
The following shows sample output from the debug vtsp session command:
Router# debug vtsp session Voice telephony call control session debugging is on
At this point, the VTSP is not aware of anything. The format of this message is //callid/GUID/VTSP:(voice-port):T1-channel_number:DSP_number:DSP_channel_number:
CallEntry ID is -1. GUID is xxxxxxxxxx. The voice port is blank. Channel ID is -1. DSP ID is -1. DSP channel ID is -1.
2 01:20:43.225: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_regxrule_translate: .
*Mar
The original and the translated calling number are the same (55555) and the original and the translated called number are the same (888545). These numbers are often the same because if a translation rule is applied, it will be on the dial peers or the ports both of which comes later than these VTSP messages in the Cisco IOS code execution.
*Mar 2 01:20:43.225: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_regxrule_translate: calling_number(original)= calling_number(xlated)=55555 called_number(original)= called_number(xlated)=888545 redirectNumber(original)= redirectNumber(xlated)=
The VTSP got a call setup indicator from the TSP layer with called number 888545 and calling number 55555. There is no awareness of the CallEntry ID (-1) or the GUID (xxxxxxxxxxxx).
*Mar 2 01:20:43.225: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_tsp_call_setup_ind: (sdb=0x637AA6C0, tdm_info=0x0, tsp_info=0x630B6050, calling_number=55555 calling_oct3 = 0x80, called_number=888545 called_oct3 = 0x80, oct3a=0x0): peer_tag=10002 *Mar 2 01:20:43.225: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_tsp_fill_setup_ind: ev.clg.clir is 0 ev.clg.clid_transparent is 0 ev.clg.null_orig_clg is 0 ev.clg.calling_translated is false *Mar 2 01:20:43.229: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_call_setup_ind: . *Mar 2 01:20:43.229: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_allocate_cdb: ,cdb 0x637B2A68 *Mar 2 01:20:43.229: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_call_setup_ind: *Mar 2 01:20:43.229: source route label
At this point, the VTSP is not aware of the anything. The format of this message is //callid/GUID/VTSP:(voice-port):T1-channel_number:DSP_number:DSP_channel_number:
CallEntry ID is -1. GUID is F90073EB8080. The voice port is 1/0:23 where 23 indicates D channel. The T1 channel is still unknown at this point (-1). The DSP is 0. The DSP channel is 2.
DB-2872
December 2010
The VTSP learns that the B channel used changed from -1 to 22.
*Mar 2 01:20:43.229: //-1/F90073EB8080/VTSP:(1/0:23):22:0:2/vtsp_do_call_setup_ind: type=0, under_spec=1615186336, name=, id0=23, id1=0, id2=0, calling=55555,called=888545 subscriber=RegularLinevtsp_do_call_setup_ind: redirect DN = reason = -1 *Mar 2 01:20:43.229: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_normal_call_setup_ind: .
The VTSP learns the CallEntry ID. The format of this message is //callid/GUID/VTSP:(voice-port):T1-channel_number:DSP_number:DSP_channel_number:
CallEntry ID is 84 (changed from -1 to 84). GUID is F90073EB8080. The voice port is 1/0:23 where 23 indicates D channel. The T1 channel is 22. The DSP is 14. The DSP channel is 2.
In the following outputs VTSP sets some of the voice parameters for this call:
*Mar 2 01:20:43.233: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_modem_proto_from_cdb: cap_modem_proto 0 *Mar 2 01:20:43.233: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/set_playout_cdb: playout default *Mar 2 01:20:43.237: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_save_dialpeer_tag: tag = 10003 *Mar 2 01:20:43.237: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_report_digit_control: vtsp_report_digit_control: enable=0: *Mar 2 01:20:43.237: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_report_digit_control: digit reporting disabled *Mar 2 01:20:43.237: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_get_digit_timeouts: : vtsp_get_digit_timeouts
DB-2873
VTSP sends out an alerting to the POTS leg; the phone is ringing now.
*Mar 2 01:20:43.301: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_process_event: vtsp:[1/0:23:84, S_PROCEEDING, E_CC_ALERT] *Mar 2 01:20:43.301: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/act_alert: . *Mar 2 01:20:43.301: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_timer_stop: 9124331 Router# *Mar 2 01:20:52.289: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_get_dialpeer_tag: tag = 10003
The phone gets answered here, and a bridge is now set up between the two call legs.
*Mar 2 01:20:52.289: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_process_event: vtsp:[1/0:23:84, S_ALERTING, E_CC_BRIDGE] *Mar 2 01:20:52.289: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/act_bridge: .
Related Commands
Description Enables all VPM debugging. Limits VTSP debug output to a specific voice port. Displays which debug commands are enabled.
DB-2874
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300 universal access servers. This command was implemented on the Cisco 2600, Cisco 3600 and Cisco MC3810 series. The new debug header was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, and Cisco 3640. and Cisco 3660; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following universal access servers: Cisco AS5300, and Cisco AS5800; and, on the Cisco MC3810 multiservice access concentrators. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
The debug vtsp stats command generates a collection of DSP statistics for generating Real-Time Transport Protocol (RTCP) packets and a collection of other statistical information.
Note
We recommend that you log output from the debug vtsp stats command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
DB-2875
Related Commands
Command debug vpm all debug vtsp port show debug voice call debug
Description Enables all VPM debugging. Limits VTSP debug output to a specific voice port. Displays which debug commands are enabled. Allows configuration of the voice call debug output.
DB-2876
December 2010
Syntax Description
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.1(5)T. The new debug header was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, and Cisco 3640. and Cisco 3660; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following universal access servers: Cisco AS5300, and Cisco AS5800; and, on the Cisco MC3810 multiservice access concentrators. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Usage Guidelines
We recommend that you log output from the debug vtsp tone command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Related Commands
Command debug vtsp dsp debug vtsp session voice call debug
Description Shows messages from the DSP on the modem to the router. Traces how the router interacts with the DSP, based on the signaling indications from the signaling stack and requests from the application. Allows configuration of the voice call debug output.
DB-2877
Syntax Description
payload
Number used to selectively display subframes of a specific payload. Payload types are: 0: Primary Payload 1: Annex-A 2: Annex-B 3: Annex-D 4: All other payloads 5: All payloads
Caution
from-dsp to-dsp
Displays only the subframes received from the digital signal processor (DSP). Displays only the subframes going to the DSP.
Defaults
Disabled
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 2600 and Cisco 3600 series. This command was first supported on the Cisco MC3810 series. This command was integrated into Cisco IOS Release 12.1(2)T. The new debug header was added to the following Cisco routers: Cisco 2600 series, Cisco 3620, and Cisco 3640. and Cisco 3660; on the following universal gateways: Cisco AS5350, Cisco AS5400, and Cisco AS5850; on the following universal access servers: Cisco AS5300, and Cisco AS5800; and, on the Cisco MC3810 multiservice access concentrators. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
DB-2878
December 2010
Usage Guidelines
Each debug output displays the first 10 bytes of the FRF.11 subframe, including header bytes. The from-dsp and to-dsp options can be used to limit the debugs to a single direction. If not specified, debugs are displayed for subframes when they are received from the DSP and before they are sent to the DSP. Use extreme caution in selecting payload options 0 and 6. These options may cause network instability.
Note
We recommend that you log output from the debug vtsp vofr subframe command to a buffer rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway.
Related Commands
Command debug vpm all debug vtsp port show debug voice call debug
Description Enables all VPM debugging. Limits VTSP debug output to a specific voice port. Displays which debug commands are enabled. Allows configuration of the voice call debug output.
DB-2879
Syntax Description
t1 e1 slot port alarm all config fdl loopback register display status
Displays debugging messages for T1 channels. Displays debugging messages for E1 channels. Slot number. Refer to the appropriate hardware manual for slot information. Port number. Refer to the appropriate hardware manual for port information. The slash mark is required between the slot argument and the port argument. Displays firmware alarm messages. Displays all debugging messages about the MFT VWIC. Displays firmware output messages about configuration change messages sent by the Cisco IOS software. Displays firmware output messages when select facilities data link (FDL) events occur. Displays firmware output messages when select loopback events occur. Displays a full framer register value table. Displays current attributes enabled for the specified controller.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.3(7)T. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug vwic-mft firmware controller command in privileged EXEC mode to provide firmware-level information for VWICs when information is required beyond the Cisco IOS T1 and E1 controller statistics. The physical-layer information generated by this command includes alarm conditions, line status, controller issues, and register settings, all of which can be used to help troubleshoot MFT VWIC problems.
DB-2880
December 2010
All the debugging keywords, except register display, enable debugging on both ports of a 2-port card. For example, if T1 0/0 and T1 0/1 are two ports on a 2-port MFT card and any of the keywords except register display is enabled, debugging output will be generated for both ports because they share a common firmware system. The Cisco 1- and 2-port T1/E1 multiflex VWICs support voice and data applications in Cisco 2600, Cisco 3600, and Cisco 3700 series multiservice routers. The multiflex VWIC combines WAN interface card and voice interface card functionality.
Caution
Use any debugging command with caution because the volume of output generated can slow or stop the router operations. We recommend that this command be used only under the supervision of a Cisco engineer.
Examples
The following sample output displays firmware output about alarm messages for an MFT VWIC installed in slot 0.
Router# debug vwic-mft firmware controller e1 0/0 alarm vwic-mft firmware output messages for wic slot set to: Alarm Router# *Mar 4 13:58:14.702: E1T1 0/1 FW: alm1:0e p:01 ALOS LOS LOF *Mar 4 13:58:15.194: E1T1 0/1 FW: CERR: 00 *Mar 4 13:58:15.194: E1T1 0/1 FW: MERR: 00 *Mar 4 13:58:15.194: E1T1 0/1 FW: FERR: 00
Note
The output will vary depending on what the router is configured to do after the debug command is entered. Table 392 describes the significant fields shown in the display.
Table 392 debug vwic-mft firmware controller alarm Field Descriptions
Field
Description
vwic-mft firmware output messages Acknowledges that the command has been entered and for wic slot set to indicates the current state. *Mar 4 13:58:14.702: E1T1 0/1 FW Time-stamp preface that shows that this is a firmware (FW) message.
Note
The port numbers reported here may differ from the numbers configured using the Cisco IOS software because the error is being reported from the second port where debugging has been enabled by the alarm keyword on a 2-port MFT card.
alm1:0e p:01
Actual value of the alarm status register. Port number of the local VWIC port that is reporting the condition. Value is either 0 or 1 for each port.
Note
The output shows two port numbers; this is an example of the debugging being enabled for both ports on a 2-port MFT card.
DB-2881
Table 392
Description Shorthand value of current alarm conditions defined in the register. One of the following:
AISReceive Alarm Indication Signal ALOSReceive Analog Loss of Signal LOFReceive Loss of Frame Alignment LOSReceive Loss of Signal MYELReceive Multiframe Yellow Alarm YELReceive Yellow Alarm
Register value showing the actual value of the alarm status register. CERR MERR FERR Status of the error status register; cyclical redundancy check (CRC) block error. Status of the error status register; multiframe alignment signal (MFAS) pattern error (E1 only). Status of the error status register; framing error.
Related Commands
DB-2882
December 2010
debug vxml
Note
Effective with release 12.3(8)T, the debug vxml command is replaced by the debug voip application vxml command. See the debug voip application vxml command for more information. To display debugging messages for VoiceXML features, use the debug vxml command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug vxml [all | application | background | error | event | grammar | puts | ssml | trace | warning] no debug vxml [all | application | background | error | event | grammar | puts | ssml | trace | warning]
Syntax Description
(Optional) Displays all VoiceXML debugging messages. (Optional) Displays VoiceXML application states information. (Optional) Displays VoiceXML background messages. (Optional) Displays VoiceXML application error messages. (Optional) Displays VoiceXML asynchronous events. (Optional) Enables syntax checking of XML grammar by the VoiceXML interpreter and displays syntax debugging messages. (Optional) Displays the results of VoiceXML <cisco-puts> and <cisco-putvar) tags. (Optional) Enables syntax checking of Speech Synthesis Markup Language (SSML) by the VoiceXML interpreter and displays syntax debugging messages. (Optional) Displays a trace of all activities for the current VoiceXML document. (Optional) Displays VoiceXML warning messages.
trace warning
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco AS5300, Cisco AS5350, and Cisco AS5400. This command was implemented on the Cisco 3640 and Cisco 3660, and the background, grammar, and ssml keywords were added.
DB-2883
Modification This command was replaced by the debug voip application vxml command. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The output of this command is affected by the debug condition application voice command. If the debug condition application voice command is configured and the <cisco-debug> element is enabled in the VoiceXML document, debugging output is limited to the VoiceXML application named in the debug condition application voice command. The debug vxml command enables all VoiceXML debugging messages except those displayed by the grammar and ssml keywords. The debug vxml all command enables all VoiceXML debugging messages including grammar and SSML.
Caution
When the debug vxml grammar or debug vxml ssml command is enabled, the VoiceXML document could abort if there is a fatal syntax error in its eXtensible Markup Language (XML) grammar or SSML.
Examples
The following example shows output from the debug vxml application command:
Router# debug vxml application vxml application debugging is on Router# 1w5d: //-1//VAPP:/vapp_get_apphandler: 1w5d: vapp_get_apphandler: Script callme 1w5d: //-1//VAPP:/vapp_get_apphandler_core: 1w5d: //-1/000000000000/VAPP:/vapp_InterpInitConfigParams: 1w5d: //-1/000000000000/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event CC_D 1w5d: //-1/000000000000/VAPP:/vapp_driver: pInterp[660E10FC]: 1w5d: //-1/000000000000/VAPP:/vapp_driver: evtID: 28 vapp record state: 0 1w5d: //-1/000000000000/VAPP:/vapp_evt_setup: 1w5d: //-1//VAPP:/vapp_incoming_cal doc-rtr54-01#lblock: 1w5d: vapp_incoming_callblock: 1w5d: //39/924083218026/VAPP:/vapp_load_or_run_script: 1w5d: //39/924083218026/VAPP:/vapp_load_or_run_script: 1w5d: The VXML Script with len=1450 starts: ------------------------------------<?xml version="1.0" encoding="iso-8859-1"?> <vxml version="1.0"> <property name="fetchtimeout" value="20s"/> <var name="phone_num"/> <form id="main"> <noinput> <prompt> <audio src="flas 1w5d: //39/924083218026/VAPP:/vapp_media_play: 1w5d: //39/ Router#924083218026/VAPP:/vapp_media_play: prompt=flash:welcome_test.au: 1w5d: //39/924083218026/VAPP:/vapp_checksessionstate: 1w5d: //39/924083218026/VAPP:/vapp_checkifdone: 1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event CC_E
DB-2884
December 2010
1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]: 1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 36 vapp record state: 0 1w5d: //39/924083218026/VAPP:/vapp_checksessionstate: 1w5d: //39/924083218026/VAPP:/vapp_checkifdo Router#ne: 1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event MSWR 1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]: 1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 77 vapp record state: 0 1w5d: //39/924083218026/VAPP:/vapp_media_done: evID=77 status=0, protocol=0, st0 1w5d: //39/924083218026/VAPP:/vapp_media_play: 1w5d: //39/924083218026/VAPP:/vapp_media_play: prompt=flash:enter_dest.au: 1w5d: //39/924083218026/VAPP:/vapp_c Router#hecksessionstate: 1w5d: //39/924083218026/VAPP:/vapp_checkifdone: Router# 1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event MSWR 1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]: 1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 77 vapp record state: 0 1w5d: //39/924083218026/VAPP:/vapp_media_done: evID=77 status=0, protocol=0, st0 1w5d: //39/924083218026/VAPP:/vapp_digit_collect: 1w5d: //39/924083218026/VAPP:/vapp_checksessionstate: 1w5d: //39/924083218026/VAPP:/vapp_checkifdone: Router# 1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event APPE 1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]: 1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 87 vapp record state: 0 1w5d: //39/924083218026/VAPP:/vapp_digit_collection_done: 1w5d: //39/924083218026/VAPP:/vapp_digit_collection_done: digits [5551234], sta] 1w5d: //39/924083218026/VAPP:/vapp_gain_control_default: 1w5d: //39/924083218026/VAPP:/vapp_placecall: Router#1w5d: //39/924083218026/VAPP:/vapp_checksessionstate: 1w5d: //39/924083218026/VAPP:/vapp_checkifdone: Router# 1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event APPE 1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]: 1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 84 vapp record state: 0 1w5d: //39/924083218026/VAPP:/vapp_evt_setupdone: 1w5d: //39/924083218026/VAPP:/vapp_checksessionstate: 1w5d: //39/924083218026/VAPP:/vapp_checkifdone: Router# 1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event CC_D 1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]: 1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 15 vapp record state: 0 1w5d: //39/924083218026/VAPP:/vapp_call_disconnected: 1w5d: //39/924083218026/VAPP:/vapp_connection_destroy: 1w5d: //39/924083218026/VAPP:/vapp_checksessionstate: 1w5d: //39/924083218026/VAPP:/vapp_checkifdone: 1w5d: //39/924083218026/VAPP:/vapp_evt_handler: Sta Router#te VAPP_ACTIVE got event CC_EV_CONF_DESTROY_DONE 1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]: 1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 34 vapp record state: 0 1w5d: //39/924083218026/VAPP:/vapp_leg_disconnect: 1w5d: //39/924083218026/VAPP:/vapp_checksessionstate: 1w5d: //39/924083218026/VAPP:/vapp_checkifdone: 1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event CC_E 1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC] Router#: 1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 16 vapp record state: 0 1w5d: //39/924083218026/VAPP:/vapp_terminate: 1w5d: //39/924083218026/VAPP:/vapp_session_exit_event_name: Exit Event vxml.sese 1w5d: //39/924083218026/VAPP:/vapp_checksessionstate: 1w5d: //39/924083218026/VAPP:/vapp_terminate_initiation: 1w5d: //39/924083218026/VAPP:/vapp_checkifdone:
DB-2885
1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_CLEANING got event CE 1w5d: //39/924083218 Router#026/VAPP:/vapp_cleaner: 1w5d: //39/924083218026/VAPP:/vapp_checksessionstate: 1w5d: //39/924083218026/VAPP:/vapp_checkifdone: 1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_CLEANING got event AE 1w5d: //39/924083218026/VAPP:/vapp_cleaner: 1w5d: //39/924083218026/VAPP:/vapp_cleaner: VxmlDialogDone event=vxml.session.c0 1w5d: //39/924083218026/VAPP:/vapp_popifdone: 1w5d: //39/924083218026/VAPP:/vapp_checkifdone: 1w5d: //39/924083218026/VAPP:/vapp_ Router#cleanup_apphandler: 1w5d: vapp_cleanup_apphandler: Terminate FALSE Terminated TRUE{HAN[VXML_HAN][NU} 1w5d: //39/924083218026/VAPP:/vapp_free_apphandler: {HAN[VXML_HAN][NULL ] }
The following example shows output from the debug vxml background command:
Router# debug vxml background vxml background messages debugging is on Router# 1w5d: //-1//VAPP:/vapp_init_apphandler: 1w5d: //-1//VXML:/vxml_create: url=flash:call.vxml vapphandle=660E10FC Router# 1w5d: //-1//VAPP:/vapp_process: Interp Done
The following examples show output from the debug vxml error command:
Router# debug vxml error
This example output shows an error when the version header is missing:
*May 10 at line *May 10 *May 10 20:08:57.572://7/98119BD78008/VXML:/vxml_vxml_build:tftp://demo/scripts/test.vxml 2:<vxml version> required attribute missing 20:08:57.576://7/98119BD78008/VXML:/vxml_create: 20:08:57.576:code=ERROR vapp=VAPP_SUCCESS vxml=VXML_ERROR_INVALID
This example output shows an error when a field item is not used according to the DTD:
*May 10 20:16:23.315://8/A1BCF458800B/VXML:/vxml_start_element_handler:tftp://demo/scripts/test.vx ml at line 4:Element <field> is not used according to DTD *May 10 20:16:23.315://8/A1BCF458800B/VXML:/vxml_create: *May 10 20:16:23.315:code=ERROR vapp=VAPP_SUCCESS vxml=VXML_ERROR_INVALID
The following example shows output from the debug vxml event command:
Router# debug vxml event vxml events debugging is on Router# 1w5d: //47/000000000000/VXML:/vxml_media_done: status 0 async_status 100000000 Router# 1w5d: //47/000000000000/VXML:/vxml_media_done: status 0 async_status 300000000 Router# 1w5d: //47/000000000000/VXML:/vxml_digit_collection_done: vxmlp 6534C7C8 status0 1w5d: //47/000000000000/VXML:/vxml_digit_collection_done: digits 5551234 1w5d: //47/000000000000/VXML:/vxml_digit_collection_done: name v0
DB-2886
December 2010
Router# 1w5d: //47/000000000000/VXML:/vxml_placecall_done: duration=0 status=0 async_st0 Router# 1w5d: //47/000000000000/VXML:/vxml_user_hangup: duration 3 status=A async_statu0
The following example shows output from the debug vxml grammar command:
Router# debug vxml grammar vxml xml grammar syntax checking debugging is on Router# Feb 11 13:47:25.110: //-1//VAPP:/vapp_get_apphandler: *Feb 11 13:47:25.114: vapp_get_apphandler: Script help *Feb 11 13:47:25.114: //-1//VAPP:/vapp_get_apphandler_core: *Feb 11 13:47:25.114: //-1/000000000000/VAPP:/vapp_InterpInitConfigParams: *Feb 11 13:47:25.114: //-1//VAPP:/vapp_init_apphandler: *Feb 11 13:47:25.114: //-1/000000000000/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event CC_EV_CALL_SETUP_IND *Feb 11 13:47:25.114: //-1/000000000000/VAPP:/vapp_driver: pInterp[62DD481C]: *Feb 11 13:47:25.114: //-1/000000000000/VAPP:/vapp_driver: evtID: 28 vapp record state: 0 *Feb 11 13:47:25.114: //-1/000000000000/VAPP:/vapp_evt_setup: *Feb 11 13:47:25.114: //-1//VAPP:/vapp_incoming_callblock: *Feb 11 13:47:25.114: vapp_incoming_callblock: *Feb 11 13:47:25.114: //7/9AC9CCF28008/VAPP:/vapp_load_or_run_script: *Feb 11 13:47:25.114: //7/9AC9CCF28008/VAPP:/vapp_load_or_run_script: *Feb 11 13:47:25.114: The VXML Script with len=741 starts: ------------------------------------<?xml version = "1.0"?> <vxml version = "2.0"> <property name="universals" value="all"/> <form id="check_help"> <field name="book"> <grammar version="1.0" mode="voice" xml:lang="en-US"> *Feb 11 13:47:25.114: //-1//VXML:/vxml_create: url=tftp://dirt/lshen/regression/help.vxml vapphandle=62DD481C *Feb 11 13:47:25.114: //-1//VXML:/vxml_mem_init: *Feb 11 13:47:25.118: //7/9AC9CCF28008/VXML:/vxml_rule_build: tftp://dirt/lshen/regression/help.vxml at line 8: attribute <rule> with invalid value (wrong_scope) *Feb 11 13:47:25.118: //7/9AC9CCF28008/VXML:/vxml_create: *Feb 11 13:47:25.118: code=ERROR vapp=VAPP_SUCCESS vxml=VXML_ERROR_INVALID *Feb 11 13:47:25.118: //-1//VXML:/vxml_mem_free: *Feb 11 13:47:25.118: //-1//VXML:/vxml_mem_free1: *Feb 11 13:47:25.118: //7/9AC9CCF28008/VAPP:/vapp_terminate: *Feb 11 13:47:25.118: //7/9AC9CCF28008/VAPP:/vapp_session_exit_event_name: Exit Event vxml.session.complete *Feb 11 13:47:25.118: //7/9AC9CCF28008/VAPP:/vapp_checksessionstate: *Feb 11 13:47:25.118: //7/9AC9CCF28008/VAPP:/vapp_terminate_initiation: *Feb 11 13:47:25.118: //7/9AC9CCF28008/VAPP:/vapp_checkifdone: *Feb 11 13:47:25.122: //7/9AC9CCF28008/VAPP:/vapp_evt_handler: State VAPP_CLEANING got event CC_EV_CALL_MODIFY_DONE *Feb 11 13:47:25.122: //7/9AC9CCF28008/VAPP:/vapp_cleaner: *Feb 11 13:47:25.122: //7/9AC9CCF28008/VAPP:/vapp_cleaner: Ignoring Event CC_EV_CALL_MODIFY_DONE(36) in Cleanup *Feb 11 13:47:25.122: //7/9AC9CCF28008/VAPP:/vapp_checksessionstate: *Feb 11 13:47:25.122: //7/9AC9CCF28008/VAPP:/vapp_checkifdone: *Feb 11 13:47:25.138: //7/9AC9CCF28008/VAPP:/vapp_evt_handler: State VAPP_CLEANING got event CC_EV_CALL_DISCONNECT_DONE *Feb 11 13:47:25.138: //7/9AC9CCF28008/VAPP:/vapp_cleaner: *Feb 11 13:47:25.138: //7/9AC9CCF28008/VAPP:/vapp_checksessionstate: *Feb 11 13:47:25.138: //7/9AC9CCF28008/VAPP:/vapp_checkifdone:
DB-2887
*Feb 11 13:47:25.138: //7/9AC9CCF28008/VAPP:/vapp_evt_handler: State VAPP_CLEANING got event APP_EV_VXMLINTERP_DONE *Feb 11 13:47:25.138: //7/9AC9CCF28008/VAPP:/vapp_cleaner: *Feb 11 13:47:25.138: //7/9AC9CCF28008/VAPP:/vapp_cleaner: VxmlDialogDone event=vxml.session.complete, status 3 *Feb 11 13:47:25.138: //7/9AC9CCF28008/VAPP:/vapp_popifdone: *Feb 11 13:47:25.138: //7/9AC9CCF28008/VAPP:/vapp_checkifdone: *Feb 11 13:47:25.138: //-1//VAPP:/vapp_process: Interp Done *Feb 11 13:47:25.138: //7/9AC9CCF28008/VAPP:/vapp_cleanup_apphandler: *Feb 11 13:47:25.138: vapp_cleanup_apphandler: Terminate FALSE Terminated TRUE{HAN[VXML_HAN][NULL ] ( )} *Feb 11 13:47:25.138: //7/9AC9CCF28008/VAPP:/vapp_free_apphandler: {HAN[VXML_HAN][NULL ] ( )}
The following example shows output from the debug vxml ssml command:
Router# debug vxml ssml Router# vxml ssml syntax checking debugging is on Feb 11 13:55:28.994: //-1//VAPP:/vapp_get_apphandler: *Feb 11 13:55:28.994: vapp_get_apphandler: Script help *Feb 11 13:55:28.994: //-1//VAPP:/vapp_get_apphandler_core: *Feb 11 13:55:28.994: //-1/A93E3F8F800E/VAPP:/vapp_InterpInitConfigParams: *Feb 11 13:55:28.998: //-1//VAPP:/vapp_init_apphandler: *Feb 11 13:55:28.998: //-1/003E3F8F800E/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event CC_EV_CALL_SETUP_IND *Feb 11 13:55:28.998: //-1/003E3F8F800E/VAPP:/vapp_driver: pInterp[62DD481C]: *Feb 11 13:55:28.998: //-1/003E3F8F800E/VAPP:/vapp_driver: evtID: 28 vapp record state: 0 *Feb 11 13:55:28.998: //-1/003E3F8F800E/VAPP:/vapp_evt_setup: *Feb 11 13:55:28.998: //-1//VAPP:/vapp_incoming_callblock: *Feb 11 13:55:28.998: vapp_incoming_callblock: *Feb 11 13:55:28.998: //10/BB2F243F8011/VAPP:/vapp_load_or_run_script: *Feb 11 13:55:28.998: //10/BB2F243F8011/VAPP:/vapp_load_or_run_script: *Feb 11 13:55:28.998: The VXML Script with len=760 starts: ------------------------------------<?xml version = "1.0"?> <vxml version = "2.0"> <property name="universals" value="all"/> <form id="check_help"> <field name="book"> <grammar version="1.0" mode="voice" xml:lang="en-US"> *Feb 11 13:55:28.998: //-1//VXML:/vxml_create: url=tftp://dirt/lshen/regression/help.vxml vapphandle=62DD481C *Feb 11 13:55:28.998: //-1//VXML:/vxml_mem_init: *Feb 11 13:55:29.002: //10/BB2F243F8011/VXML:/vxml_parse: tftp://dirt/lshen/regression/help.vxml at line 16: mismatched tag *Feb 11 13:55:29.002: //10/BB2F243F8011/VXML:/vxml_create: *Feb 11 13:55:29.002: code=ERROR vapp=VAPP_SUCCESS vxml=VXML_ERROR_INVALID *Feb 11 13:55:29.002: //-1//VXML:/vxml_mem_free: *Feb 11 13:55:29.002: //-1//VXML:/vxml_mem_free1: *Feb 11 13:55:29.002: //10/BB2F243F8011/VAPP:/vapp_terminate: *Feb 11 13:55:29.002: //10/BB2F243F8011/VAPP:/vapp_session_exit_event_name: Exit Event vxml.session.complete *Feb 11 13:55:29.002: //10/BB2F243F8011/VAPP:/vapp_checksessionstate: *Feb 11 13:55:29.002: //10/BB2F243F8011/VAPP:/vapp_terminate_initiation: *Feb 11 13:55:29.002: //10/BB2F243F8011/VAPP:/vapp_checkifdone: *Feb 11 13:55:29.006: //10/BB2F243F8011/VAPP:/vapp_evt_handler: State VAPP_CLEANING got event CC_EV_CALL_MODIFY_DONE *Feb 11 13:55:29.006: //10/BB2F243F8011/VAPP:/vapp_cleaner: *Feb 11 13:55:29.006: //10/BB2F243F8011/VAPP:/vapp_cleaner: Ignoring Event CC_EV_CALL_MODIFY_DONE(36) in Cleanup
DB-2888
December 2010
*Feb 11 13:55:29.006: //10/BB2F243F8011/VAPP:/vapp_checksessionstate: *Feb 11 13:55:29.006: //10/BB2F243F8011/VAPP:/vapp_checkifdone: *Feb 11 13:55:29.022: //10/BB2F243F8011/VAPP:/vapp_evt_handler: State VAPP_CLEANING got event CC_EV_CALL_DISCONNECT_DONE *Feb 11 13:55:29.022: //10/BB2F243F8011/VAPP:/vapp_cleaner: *Feb 11 13:55:29.022: //10/BB2F243F8011/VAPP:/vapp_checksessionstate: *Feb 11 13:55:29.022: //10/BB2F243F8011/VAPP:/vapp_checkifdone: *Feb 11 13:55:29.022: //10/BB2F243F8011/VAPP:/vapp_evt_handler: State VAPP_CLEANING got event APP_EV_VXMLINTERP_DONE *Feb 11 13:55:29.022: //10/BB2F243F8011/VAPP:/vapp_cleaner: *Feb 11 13:55:29.022: //10/BB2F243F8011/VAPP:/vapp_cleaner: VxmlDialogDone event=vxml.session.complete, status 3 *Feb 11 13:55:29.022: //10/BB2F243F8011/VAPP:/vapp_popifdone: *Feb 11 13:55:29.022: //10/BB2F243F8011/VAPP:/vapp_checkifdone: *Feb 11 13:55:29.022: //-1//VAPP:/vapp_process: Interp Done *Feb 11 13:55:29.022: //10/BB2F243F8011/VAPP:/vapp_cleanup_apphandler: *Feb 11 13:55:29.022: vapp_cleanup_apphandler: Terminate FALSE Terminated TRUE{HAN[VXML_HAN][NULL ] ( )} *Feb 11 13:55:29.022: //10/BB2F243F8011/VAPP:/vapp_free_apphandler: {HAN[VXML_HAN][NULL ] ( )}
The following example shows output from the debug vxml trace command:
Router# debug vxml trace vxml trace debugging is on Router# 1w5d: //-1//VXML:/vxml_mem_init: 1w5d: //51/359408288031/VXML:/vxml_offramp_mailhdrs_get: 1w5d: //51/359408288031/VXML:/vxml_start: vxmlhandle=65350A7C vapphandle=660E100 1w5d: //51/359408288031/VXML:/vxml_vxml_proc: 1w5d: <vxml> URI(abs):flash:call.vxml scheme=flash path=call.vxml base= URI(abs0 1w5d: <var>: namep=phone_num 1w5d: //-1//VXML:/vxml_stand_alone: scope=document, application = document 1w5d: //51/359 Router#408288031/VXML:/vxml_form_proc: 1w5d: <form>: id=main scope=dialog 1w5d: vxml_form_init current scope: dialog 1w5d: vxml_counter_reset: 1w5d: vxml_counter_reset: 1w5d: //51/359408288031/VXML:/vxml_formitem_select: Status=VXML_STATUS_OK, 1w5d: //51/359408288031/VXML:/vxml_formitem_select: AsyncStatus=VXML_STATUS_OK 1w5d: //51/359408288031/VXML:/vxml_block_proc: 1w5d: <block>: 1w5d: //51/359408288031/VXML:/vxml_item_attrs_proc: name=_in6 1w5d: //51/359408288031/VXML:/vxml_expr_eval: exp Router#r=dialog._in6='defined' 1w5d: //51/359408288031/VXML:/vxml_prompt_proc: 1w5d: <prompt>: bargein=0 count=1 typeaheadflush=0 1w5d: //51/359408288031/VXML:/vxml_audio_proc: 1w5d: <audio>: URI(abs):flash:welcome_test.au scheme=flash path=welcome_tes0 1w5d: //51/359408288031/VXML:/vxml_vapp_media_play: bargein=0 timeout=0 typeahe0 1w5d: //51/359408288031/VXML:/vxml_vapp_media_play: 1w5d: //51/359408288031/VXML:/vxml_vapp_me Router#dia_play: audio=flash:welcome_test.au cachable=1 timeout20 1w5d: //51/359408288031/VXML:/vxml_leave_scope: scope=8 1w5d: //51/359408288031/VXML:/vxml_vapp_vcr_control_disable: 1w5d: //51/359408288031/VXML:/vxml_start: vxmlhandle=65350A7C vapphandle=660E100 1w5d: //51/359408288031/VXML:/vxml_vxml_proc: 1w5d: <vxml> URI(abs):flash:call.vxml scheme=flash path=call.vxml base= URI(abs0 1w5d: //51/359408288031/VXML:/vxm Router#l_block_proc: 1w5d: <block>: 1w5d: //51/359408288031/VXML:/vxml_item_attrs_proc: name=_in6
DB-2889
1w5d: //51/359408288031/VXML:/vxml_form_proc: 1w5d: <form>: id=main scope=dialog 1w5d: //51/359408288031/VXML:/vxml_formitem_select: Status=VXML_STATUS_OK, 1w5d: //51/359408288031/VXML:/vxml_formitem_select: AsyncStatus=VXML_STATUS_OK 1w5d: //51/359408288031/VXML:/vxml_field_proc: 1w5d: <field>: type=number 1w5d: //51/359408288031/VXML:/vxml_item_attrs_proc: name=get_phone_num modal=am Router#pt_counter=1 1w5d: //51/359408288031/VXML:/vxml_prompt_proc: 1w5d: <prompt>: bargein=1 count=1 typeaheadflush=0 1w5d: //51/359408288031/VXML:/vxml_audio_proc: 1w5d: <audio>: URI(abs):flash:enter_dest.au scheme=flash path=enter_dest.au0 1w5d: //51/359408288031/VXML:/vxml_vapp_media_play: bargein=1 timeout=0 typeahe0 1w5d: //51/359408288031/VXML:/vxml_vapp_media_play: 1w5d: //51/359408288031/VXML:/vxml_vapp_media_play: audio Router#=flash:enter_dest.au cachable=1 timeout20 1w5d: //51/359408288031/VXML:/vxml_vapp_vcr_control_disable: 1w5d: //51/359408288031/VXML:/vxml_vapp_digit_collect: termchar # maxDigits 0 t0 1w5d: //51/359408288031/VXML:/vxml_start: vxmlhandle=65350A7C vapphandle=660E100 1w5d: //51/359408288031/VXML:/vxml_vxml_proc: 1w5d: <vxml> URI(abs):flash:call.vxml scheme=flash path=call.vxml base= URI(abs1 Router#.0 1w5d: //51/359408288031/VXML:/vxml_field_proc: 1w5d: <field>: type=number 1w5d: //51/359408288031/VXML:/vxml_item_attrs_proc: name=get_phone_num modal=a2 1w5d: //51/359408288031/VXML:/vxml_filled_proc: 1w5d: 1w5d: <filled>: mode=all 1w5d: //51/359408288031/VXML:/vxml_assign_proc: 1w5d: <assign>: namep=phone_num expr=get_phone_num 1w5d: //51/359408288031/VXML:/vxml_goto_proc: 1w5d: <goto>: caching=fast fetchhint=invalid fetchtimeout=20 URI:#transfer_mm Router#entp=transfer_me 1w5d: vxml_dialog_reset: 1w5d: //51/359408288031/VXML:/vxml_leave_scope: scope=110 1w5d: //51/359408288031/VXML:/vxml_leave_scope: scope=8 1w5d: //51/359408288031/VXML:/vxml_vxml_proc: 1w5d: <vxml> URI(abs):flash:call.vxml scheme=flash path=call.vxml base= URI(abs0 1w5d: //51/359408288031/VXML:/vxml_form_proc: 1w5d: <form>: id=transfer_me scope=dialog 1w5d: vxml_form_init current scope: dialog 1w5d: <var>: namep=myd Router#ur 1w5d: vxml_counter_reset: 1w5d: //51/359408288031/VXML:/vxml_formitem_select: Status=VXML_STATUS_OK, 1w5d: //51/359408288031/VXML:/vxml_formitem_select: AsyncStatus=VXML_STATUS_OK 1w5d: //51/359408288031/VXML:/vxml_transfer_proc: 1w5d: <transfer>: 1w5d: //51/359408288031/VXML:/vxml_item_attrs_proc: name=mycall dest_expr='phoe Router#ctreason=-1 1w5d: //51/359408288031/VXML:/vxml_vapp_placecall: dest 5551234 timeout 15 maxl0 1w5d: //51/359408288031/VXML:/vxml_vapp_gain_control_default: 1w5d: //51/359408288031/VXML:/vxml_expr_eval: expr=dialog.mycall = 'far_end_dis' 1w5d: //51/359408288031/VXML:/vxml_expr_eval: expr=dialog.mycall$.duration = 2 1w5d: //51/359408288031/VXML:/vxml_start: vxmlhandle=65350A7C vapphandle=660E100 1w5d: //51/359408288031/VXML:/vxml_vxml Router#_proc: 1w5d: <vxml> URI(abs):flash:call.vxml scheme=flash path=call.vxml base= URI(abs0 1w5d: //51/359408288031/VXML:/vxml_transfer_proc: 1w5d: <transfer>: 1w5d: //51/359408288031/VXML:/vxml_item_attrs_proc: name=mycall URI(abs):phoneRouter#1, redirectreason=-1 1w5d: //51/359408288031/VXML:/vxml_form_proc: 1w5d: <form>: id=transfer_me scope=dialog
DB-2890
December 2010
1w5d: //51/359408288031/VXML:/vxml_filled_proc: 1w5d: 1w5d: <filled>: mode=all 1w5d: //51/359408288031/VXML:/vxml_assign_proc: 1w5d: <assign>: namep=mydur expr=mycall$.duration 1w5d: //51/359408288031/VXML:/vxml_if_proc: 1w5d: <if>: cond=mycall == 'busy' 1w5d: //51/359408288031/VXML:/vxml_leave_scope: scope=8 1w5d: //51/359408288031/VXML:/vxml_formitem_select: Status=VXML_ST Router#ATUS_OK, 1w5d: //51/359408288031/VXML:/vxml_formitem_select: AsyncStatus=VXML_STATUS_OK 1w5d: //51/359408288031/VXML:/vxml_formitem_select: the form is full 1w5d: //51/359408288031/VXML:/vxml_vapp_terminate: vapp_status=0 ref_count 0 1w5d: //-1//VXML:/vxml_mem_free: 1w5d: //-1//VXML:/vxml_mem_free1:
Related Commands
Command debug condition application voice debug http client debug voip ivr
Description Displays debugging messages for only the specified VoiceXML application. Displays debugging messages for the HTTP client. Displays debug messages for VoIP IVR interactions.
DB-2891
debug warm-reboot
To display warm reload debug information, use the debug warm-reboot command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug warm-reboot no debug warm-reboot
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the reload warm file url command when the debug warm-reboot command is enabled:
Router# debug warm-reboot Router# reload warm file tftp://9.1.0.1/c7200-p-mz.port Proceed with reload? [confirm] Loading c7200-p-mz.port from 9.1.0.1 (via Ethernet5/0):!!! 00:05:43:ptr :63B978E0 00:05:43:magic :A457272 00:05:43:ptr :63B98020 00:05:43:magic :0 00:05:43:ptr :63B98380 00:05:43:magic :0 00:05:43:ptr :63B983A0 00:05:43:magic :FEEDFACE 00:05:43:uncomp_size :2749E7C 00:05:43:comp_size :E966F0 00:05:43:comp_checksum :9BB36053 00:05:43:uncomp_checksum :56F1754B!!! [OK - 15323964 bytes] Decompressing the image :### 00:06:22:Image checksum correct -1#682743213 00:06:22:Compressed Image checksum correct### [OK] Number Number Number Number . . . 0 1 2 3 source source source source 0x63BD17C4 0x63C43AD0 0x63C83AFC 0x63CC3B28
DB-2892
December 2010
Number 156 source 0x66384074 Number 157 source 0x663C40A0 Number 158 source 0x664040CC wrb_copy_and_launch location = 0x664040CC 00:06:39:Found elf header at the expected location 00:06:39:Source elf_hdr->e_shnum = A 00:06:39:Setting up to copy ELF section 1 00:06:39: to image_info section 0 00:06:39: sh_name = B 00:06:39: sh_type = 1 00:06:39: sh_flags = 7 00:06:39: sh_addr = 80008000 00:06:39: sh_offset = 60 00:06:39: sh_size = 186C000 00:06:39: sh_link = 0 00:06:39: sh_info = 0 00:06:39: sh_addralign = 20 00:06:39: sh_entsize = 0 . . . 00:06:40:Setting up to copy ELF section 4 00:06:40: to image_info section A0 00:06:40: sh_name = 1F 00:06:40: sh_type = 1 00:06:40: sh_flags = 10000003 00:06:40: sh_addr = 82750380 00:06:40: sh_offset = 27483E0 00:06:40: sh_size = 18A0 00:06:40: sh_link = 0 00:06:40: sh_info = 0 00:06:40: sh_addralign = 10 00:06:40: sh_entsize = 0 00:06:40:cpu type :19 00:06:40:image_info->entry_point = 80008000 00:06:40:image_info->section_count = A1 00:06:40:image_info->monstack = 80007FC0 00:06:40:image_info->monra = BFC014E4 00:06:40:image_info->param0 = 2 00:06:40:image_info->param1 = 0 00:06:40:image_info->param2 = 80005998 00:06:40:image_info->param3 = 80008000 00:06:40:Section 00:06:40:Section Decompressed Image checksum correct Restricted Rights Legend . . .
DB-2893
debug webvpn
To enable the display of debug information for SSL VPN applications and network activity, use the debug webvpn command in privileged EXEC mode. To stop debugging messages from being processed and displayed, use the no form of this command. debug webvpn [verbose] [aaa | acl | cifs | citrix [verbose] | cookie [verbose] | count | csd | data | dns | emweb [state] | entry context-name [source ip [network-mask] | user username] | http [authentication | trace | verbose] | package | sdps [level number] | sock [flow] | sso | timer | trie | tunnel [traffic acl-number | verbose] | url-disp | webservice [verbose]] no debug webvpn [verbose] [aaa | acl | cifs | citrix [verbose] | cookie [verbose] | count | csd | data | dns | emweb [state] | entry context-name [source ip [network-mask] | user username] | http [authentication | trace | verbose] | package | sdps [level number] | sock [flow] | sso | timer | trie | tunnel [traffic acl-number | verbose] | url-disp | webservice [verbose]]
Syntax Description
(Optional) Detailed information about SSL VPN applications and network activity is displayed in addition to the nondetailed information. (Optional) Displays authentication, authorization, and accounting (AAA) event and error messages. (Optional) Displays information about the Application Layer access control list (ACL). (Optional) Displays Microsoft Windows file share access event and error messages. (Optional) Displays Citrix application event and error messages.
verbose (Optional)All detailed and nondetailed citrix messages are displayed. If the verbose keyword is not used, only the nondetailed messages are displayed.
cookie [verbose]
(Optional) Displays event and error messages that relate to the cookie that is pushed to the browser of the end user.
verbose (Optional)All detailed and nondetailed cookie messages are displayed. If the verbose keyword is not used, only the nondetailed messages are displayed.
(Optional) Displays reference count information for a context. (Optional) Displays Cisco Secure Desktop (CSD) event and error messages. (Optional) Displays data debug messages. (Optional) Displays domain name system (DNS) event and error messages. (Optional) Displays emweb state debug messages.
DB-2894
December 2010
context-nameSSL VPN context name. source ip (Optional)IP address of the user or group. The network-mask argument is optional. If not specified, 255.255.255.255 is used. user username (Optional) Username of the user. The entry keyword can be used with other debug commands to single out the debug messages for a particular user or group. If the debug webvpn entry is not defined, the debug messages of the feature or function that are turned on are printed for every user. authentication (Optional)Displays information for HTTP authentication, such as NT LAN Manager (NTLM). trace (Optional)Displays HTTP information that involves EmWeb processing. verbose (Optional)All detailed and nondetailed HTTP messages are displayed. If the verbose keyword is not used, only the nondetailed messages are displayed.
Note
package sdps [level number] sock [flow] sso timer trie tunnel [traffic acl-number | verbose]
(Optional) Deploys event and error messages for the software packages that are pushed to the end user. (Optional) Displays SDPS debug messages. The level is entered as a number from 1 to 5. (Optional) Displays socket debug messages. (Optional) Displays information about Single SignOn (SSO) ticket creation, session setup, and response handling. (Optional) Displays timer debug messages. (Optional) Displays trie debug messages. (Optional) Displays tunnel debug messages.
traffic acl-number (Optional)Access control list number of the traffic to be displayed. verbose (Optional)All detailed and nondetailed tunnel messages are displayed. If the verbose keyword is not used, only the nondetailed messages are displayed.
(Optional) Displays URL debug messages. (Optional) Displays web service event and error messages.
verbose (Optional)All detailed and nondetailed web service messages are displayed. If the verbose keyword is not used, only the nondetailed messages are displayed.
Command Default
None
Command Modes
Privileged EXEC
DB-2895
Command History
Modification This command was introduced. Support for the SSL VPN enhancements feature was added. The following keywords were deleted effective with Cisco IOS Release 12.4(11)T:
The following keywords and arguments were added effective with Cisco IOS Release 12.4(11)T:
verbose acl entry context-name [source ip [network-mask] | user username] authentication, trace, and verbose keyword options for the http keyword sso verbose keyword option for the citrix, cookie, tunnel, and webservice keywords
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command should be used with caution on a production router or networking device. It is recommended that debugging is enabled only for individual components as necessary. This restriction is intended to prevent the console session from be overwhelmed by large numbers of messages. The no form of this command turns off feature debugging. It does not matter if the verbose keyword has been used or not. If the no form of this command is used with the verbose keyword option for any keyword, all keyword and argument fields must be an exact match.
Examples
The following example displays debug webvpn output for various SSL VPN sessions:
Router# debug webvpn *Dec 23 07:47:41.368: WV: Entering APPL with Context: 0x64C5F270, Data buffer(buffer: 0x64C877D0, data: 0x4F27B638, len: 272, offset: 0, domain: 0) *Dec 23 07:47:41.368: WV: http request: /sslvpn with domain cookie *Dec 23 07:47:41.368: WV: Client side Chunk data written.. buffer=0x64C877B0 total_len=189 bytes=189 tcb=0x6442FCE0 *Dec 23 07:47:41.368: WV: sslvpn process rcvd context queue event *Dec 23 07:47:41.372: WV: sslvpn process rcvd context queue event *Dec 23 07:47:41.372: WV: Entering APPL with Context: 0x64C5F270, Data buffer(buffer: 0x64C877D0, data: 0x4F26D018, len: 277, offset: 0, domain: 0) *Dec 23 07:47:41.372: WV: http request: /webvpn.html with domain cookie *Dec 23 07:47:41.372: WV: [Q]Client side Chunk data written..
DB-2896
December 2010
buffer=0x64C877B0 total_len=2033 bytes=2033 tcb=0x6442FCE0 *Dec 23 07:47:41.372: WV: Client side Chunk data written.. buffer=0x64C87710 total_len=1117 bytes=1117 tcb=0x6442FCE0
The following example displays information for a specific user (user1 under the context mycontext) and for a feature or function:
Router# debug webvpn entry mycontext_user_user1 ! The above line turns debugging on for user1. ! The following line turns on debugging for a feature (or features) or function (or functions)in this case; for authentication, authorization, and accounting (AAA). Router# debug webvpn aaa
debug webvpn Command Cookie and HTTP Output for a Group of Users
The following example displays cookie and HTTP information for a group of users under the context mycontext having a source IP range from 192.168.1.1. to 192.168.1.255:
Router# debug webvpn entry mycontext source 192.168.1.0 255.255.255.0 ! The above command line sets up debugging for the group. !The following command lines turn on debugging for cookie and HTTP information. Router# debug webvpn cookie Router# debug webvpn http
The following output example displays information about SSO ticket creation, session setup, and response handling:
Router# debug webvpn sso
DB-2897
*Jun 12 20:37:01.052: WV-SSO: Redirect to SSO web agent URL http://example.examplecompany.com/vpnauth/ *Jun 12 20:37:01.052: WV_SSO: Set session cookie with SSO redirect *Jun 12 20:37:01.056: WV-SSO: Set SSO auth flag *Jun 12 20:37:01.056: WV-SSO: Attach credentials - building auth ticket *Jun 12 20:37:01.060: WV-SSO: user: [user11], secret: [example123], version: [1.0], login time: [BCEFC86D], session key: [C077F97A], SHA1 hash : [B07D0A924DB33988D423AE9F937C1C5A66404819] *Jun 12 20:37:01.060: WV-SSO: auth_ticket : user11:1.0@C077F97A@BCEFC86D@B07D0A924DB33988D423AE9F937C1C5A66404819 *Jun 12 20:37:01.060: WV-SSO: Base64 credentials for the auth_ticket: dXNlcjExOjEuMEBDMDc3Rjk3QUBCQ0VGQzg2REBCMDdEMEE5MjREQjMzOTg4RDQyM0FFOUY5MzdDMUM1QTY2NDA0OD E5 *Jun 12 20:37:01.060: WV-SSO: Decoded credentials = user11:1.0@C077F97A@BCEFC86D@B07D0A924DB33988D423AE9F937C1C5A66404819 *Jun 12 20:37:01.060: WV-SSO: Starting SSO request timer for 15-second *Jun *Jun *Jun *Jun 12 12 12 12 20:37:01.572: 20:37:01.572: 20:37:01.576: 20:37:01.576: WV-SSO: WV-SSO: WV-SSO: WV-SSO: SSO auth response rcvd - status[200] Parsed non-SM cookie: SMCHALLENGE Parsed SMSESSION cookie Sending logon page after SSO auth success
DB-2898
December 2010
Syntax Description
(Optional) Displays errors that might have occurred while setting up DTLS tunnel or during data transfer. (Optional) Displays DTLS event messages. Displays events like encryption, decryption, switching, and so on. (Optional) Displays DTLS packet dump.
Command Default
If no keyword is specified, then all the SSL VPN DTLS debug information displays are enabled.
Command Modes
Command History
Release 15.1(2)T
Usage Guidelines
You can use the debug webvpn dtls command to debug any issues related to WebVPN DTLS. This debug information provides information about the packets that are being processed by WebVPN DTLS and indicates if there are any errors.
Examples
The following example displays the SSL VPN DTLS packet dump information:
Router# debug webvpn dtls packets *Jun 15 10:23:04.495: WV-DTLS: pak (0x67EEF474), dgram (109), length (0) encsize(0) 2E6FBD10: 17010000 01000000 ........ 2E6FBD20: 00004C00 6057A7E2 399F19CF 9915D3F4 ..L.`W'b9..O..St 2E6FBD30: 4FBA7F24 8AEC4EFC 9F4192B5 D334F471 O:.$.lN|.A.5S4tq 2E6FBD40: 02232ADF BB248C8B 54E197F5 713D7886 .#*_;$..Ta.uq=x. 2E6FBD50: 4F71398D 993342BA 90D2A677 96A6ABB9 Oq9..3B:.R&w.&+9 2E6FBD60: 8B72F19C 4D454CBB A74D2342 B643FA74 .rq.MEL;'M#B6Czt 2E6FBD70: A627656A E1DDF0A9 ABDAC6FC 7986FC52 &'eja]p)+ZF|y.|R 2E6FBD80: AD9AF67D C5 -.v}E *Jun 15 10:23:04.499: WV-DTLS: pak (0x67EEB7A8), dgram (137), length (0) encsize(0) 2E6FA4D0: 45000089 FCE80000 E...|h.. 2E6FA4E0: FF11761F 1E010132 28010128 01BB0CBA ..v....2(..(.;.: 2E6FA4F0: 0075ECF8 17010000 01000000 00004C00 .ulx..........L.
DB-2899
The following example displays the SSL VPN DTLS event information:
Router# debug webvpn dtls events *Jun 15 10:28:13.731: ce_status = (1) *Jun 15 10:28:14.575: ce_status = (1) *Jun 15 10:28:14.575: ce_status = (1) *Jun 15 10:28:14.575: *Jun 15 10:28:15.575: ce_status = (1) *Jun 15 10:28:15.579: ce_status = (1) *Jun 15 10:28:15.579: *Jun 15 10:28:16.575: ce_status = (1) *Jun 15 10:28:16.575: ce_status = (1) *Jun 15 10:28:16.575: *Jun 15 10:28:17.579: ce_status = (1) *Jun 15 10:28:17.579: ce_status = (1) *Jun 15 10:28:17.579: *Jun 15 10:28:18.579: ce_status = (1) *Jun 15 10:28:18.579: ce_status = (1) *Jun 15 10:28:18.579: *Jun 15 10:28:19.579: ce_status = (1) *Jun 15 10:28:19.583: ce_status = (1) *Jun 15 10:28:19.583: WV-DTLS-3 Decryption done: context (0x67BF9BA0) pak (0x67634074), WV-DTLS-3 Decryption done: context (0x67BF9BA0) pak (0x67634074), WV-DTLS-3 Encryption done: context (0x67BF9BA0) pak (0x65EF4778), WV-DTLS-2 DTLS: Switching cont pak in process path WV-DTLS-3 Decryption done: context (0x67BF9BA0) pak (0x67634074), WV-DTLS-3 Encryption done: context (0x67BF9BA0) pak (0x66B2AAD4), WV-DTLS-2 DTLS: Switching cont pak in process path WV-DTLS-3 Decryption done: context (0x67BF9BA0) pak (0x67634074), WV-DTLS-3 Encryption done: context (0x67BF9BA0) pak (0x65EF4C04), WV-DTLS-2 DTLS: Switching cont pak in process path WV-DTLS-3 Decryption done: context (0x67BF9BA0) pak (0x67634074), WV-DTLS-3 Encryption done: context (0x67BF9BA0) pak (0x66B298A4), WV-DTLS-2 DTLS: Switching cont pak in process path WV-DTLS-3 Decryption done: context (0x67BF9BA0) pak (0x67634074), WV-DTLS-3 Encryption done: context (0x67BF9BA0) pak (0x65EF74F0), WV-DTLS-2 DTLS: Switching cont pak in process path WV-DTLS-3 Decryption done: context (0x67BF9BA0) pak (0x67634074), WV-DTLS-3 Encryption done: context (0x67BF9BA0) pak (0x65EF6BD8), WV-DTLS-2 DTLS: Switching cont pak in process path
Related Commands
Description Configures a desired port for the DTLS to listen. Enables DTLS support on the Cisco IOS SSL VPN.
DB-2900
December 2010
Syntax Description
Command Default
Command Modes
Command History
Release 15.0(1)M
Examples
The following is sample output from the debug webvpn license command when there is no valid license, and a user tries to log in to SSL VPN:
*Sep 17 09:36:21.091: %SSLVPN-3-LICENSE_NO_LICENSE: No valid license is available to use IOS SSLVPN service *Sep 17 09:36:21.091: WV-License: no valid reserve handle exists, request is not made *Sep 17 09:36:21.091: WV-AAA: Error! No valid SSLVPN license exists
The following is sample output from the debug webvpn license command when there is a valid license, and a user tries to log in:
*Sep 17 09:40:15.535: WV-License: requested 1 count, granted 1 count, status is : No Error
The following is sample output from the debug webvpn license command when a user logs out and closes his or her session:
*Sep 17 09:41:48.143: WV-License: trying to release 1 count, released 1 count, status is : No Error
The following is sample output from the debug webvpn license command when the currently active license is a temporary (nonpermanent) license, and it has expired; some sessions are still active:
*Sep 18 00:28:19.018: WV-License: received licensing event for handle 0x1000004 *Sep 18 00:28:19.018: Event type : LICENSE_CLIENT_EXPIRED *Sep 18 00:28:19.018: Count [usage/max(new max)]: 0/0(0) *Sep 18 00:28:19.018: WV-License: setting lic expired flag! *Sep 18 00:28:19.018: %SSLVPN-3-LICENSE_EXPIRED: IOS SSLVPN evaluation/extension license has expired *Sep 18 00:28:19.018: WV-License: event handling completed *Sep 18 00:28:19.078: %LICENSE-2-EXPIRED: License for feature SSL_VPN_Test_Feature 1.0 has expired now.. UDI=CISCO2821:FHK1110F0PF
DB-2901
The following is sample output from the debug webvpn license command when the currently active license is a temporary (nonpermanent) license, and it has expired; some sessions are still active and a new user tries to log in:
*Sep 18 00:29:18.078: *Sep 18 00:29:18.078: *Sep 18 00:29:18.078: has expired *Sep 18 00:29:18.078: *Sep 18 00:29:18.078: WV-AAA: AAA authentication request sent for user: "lab" WV-AAA: AAA Authentication Passed! %SSLVPN-3-LICENSE_EXPIRED: IOS SSLVPN evaluation/extension license WV-License: License expired, no more counts can be requested! WV-AAA: Error! No valid SSLVPN license exists
The following is sample output from the debug webvpn license command when a new license having a count higher than the currently active license is installed:
*Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep *Sep 18 18 18 18 18 18 18 18 18 00:39:12.658: 00:39:12.658: 00:39:12.658: 00:39:12.770: 00:39:12.770: 00:39:12.774: 00:39:12.774: 00:39:12.774: 00:39:12.774: WV-License: received licensing event Event type : LICENSE_CLIENT_COUNT_CHANGED Count [usage/max(new max)]: 0/0(169) WV-License: reserved extra count (158): No Error WV-License: reserved count now is 169 WV-License: event handling completed WV-License: received licensing event for handle 0x1000004 Event type : LICENSE_CLIENT_COUNT_CHANGED Count [usage/max(new max)]: 0/0(169)
Related Commands
DB-2902
December 2010
debug wlccp ap
Use the debug wlccp ap privileged EXEC command to enable debugging for devices that interact with the access point that provides wireless domain services (WDS). debug wlccp ap {mn | rm [statistics | context | packet] | state | wds-discovery}
Note
Syntax Description
Command mn
rm [statistics | context | (Optional) Activates display of debug messages related to radio packet] management
statisticsshows statistics related to radio management contextshows the radio management contexts packetshows output related to packet flow
state wds-discovery
(Optional) Activates display of debug messages related to access point authentication to the WDS access point (Optional) Activates display of debug messages related to the WDS discovery process
Defaults
Command Modes
Command History
Modification This command was first introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
This example shows how to begin debugging for LEAP-enabled client devices participating in Cisco Centralized Key Management (CCKM):
SOAP-AP# debug wlccp ap mn
DB-2903
Related Commands
Description Displays all debug settings and the debug packet headers Displays WLCCP information
DB-2904
December 2010
Note
Syntax Description
Defaults
Command Modes
Command History
Modification This command was first introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
This example shows how to activate debugging and error messages of the Enhanced Neighbor List feature on the access point:
SOAP-AP# debug wlccp ap rm enhanced-neighbor-list
Related Commands
Description Displays all debug settings and the debug packet headers Displays WLCCP information Displays Enhanced Neighbor List feature related information.
DB-2905
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on Cisco Aironet access points. This command was implemented on the following platforms: Cisco 2600XM, Cisco 2691, Cisco 2811, Cisco 2821, Cisco 2851, Cisco 3700, and Cisco 3800 series routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Related Commands
Command debug wlccp wds show wlccp wds wlccp authentication-server client wlccp authentication-server infrastructure wlccp wds priority interface
Description Displays either WDS debug state or WDS statistics messages. Shows information about access points and client devices on the WDS router. Configures the list of servers to be used for 802.1X authentication. Configures the list of servers to be used for 802.1X authentication for the wireless infrastructure devices. Enables a wireless device such as an access point or a wireless-aware router to be a WDS candidate.
DB-2906
December 2010
Note
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was first introduced. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
This example shows how to activate display of radio management library functions on the access point that provides WDS:
SOAP-AP# debug wlccp rmlib
Related Commands
Description Displays all debug settings and the debug packet headers Displays WLCCP information
DB-2907
Syntax Description
MAC and Extensible Authentication Protocol (EAP) authentication. WDS state and debug messages. WDS failure statistics.
Defaults
Command Modes
Command History
Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600XM, Cisco 2691, Cisco 2811, Cisco 2821, Cisco 2851, Cisco 3700, and Cisco 3800 series routers. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.2SX
Examples
Related Commands
Command debug wlccp packet show wlccp wds wlccp authentication-server client wlccp authentication-server infrastructure wlccp wds priority interface
Description Displays packet traffic to and from the WDS router. Shows information about access points and client devices on the WDS router. Configures the list of servers to be used for 802.1X authentication. Configures the list of servers to be used for 802.1X authentication for the wireless infrastructure devices. Enables a wireless device such as an access point or a wireless-aware router to be a WDS candidate.
DB-2908
December 2010
Syntax Description
(Optional) Displays debugging information for the configuration agent. (Optional) Displays debugging information for the executive agent. (Optional) Displays debugging information for the file system agent. (Optional) Displays debugging information for the notify agent.
Command Modes
Command History
Release 12.4(24)T
Examples
The following example shows how to display debugging information for a WSMA listener profile:
Router# debug wsma agent config WSMA agent config debugging is on
Related Commands
DB-2909
Syntax Description
listener initiator
Displays debugging information for the listener profile. Displays debugging information for the initiator profile.
Command Modes
Command History
Modification This command was introduced. This command was modified. The initiator keyword was added.
Examples
The following example shows how to display debugging information for a WSMA listener profile:
Router# debug wsma profile listener WSMA profile listener debugging is on
The following example shows how to display debugging information for a WSMA initiator profile:
Router# debug wsma profile initiator WSMA profile initiator debugging is on
Related Commands
DB-2910
December 2010
debug x25
To display information about all X.25 traffic or a specific X.25 service class, use the debug x25 command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug x25 [only | cmns | xot] [events | all] [dump] no debug x25 [only | cmns] [events | all] [dump]
Syntax Description
(Optional) Displays information about X.25 services only. (Optional) Displays information about CMNS services only. (Optional) Displays information about XOT services only. (Optional) Displays all traffic except Data and Receiver Ready (RR) packets. (Optional) Displays all traffic. This is the default. (Optional) Displays the encoded packet contents in hexadecimal and ASCII formats.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. For Domain Name System (DNS)-based X.25 routing, additional functionality was added to the debug x25 events command to describe the events that occur while the X.25 address is being resolved to an IP address using a DNS server. The debug domain command can be used along with debug x25 events to observe the whole DNS-based X.25 routing data flow. For the X.25 Closed User Groups (CUGs) feature, functionality was added to the debug x25 events command to describe events that occur during CUG activity. The debug x25 events command was enhanced to display events specific to Record Boundary Preservation protocol. The dump keyword was added. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.0(7)T
DB-2911
Usage Guidelines
Caution
The X.25 debug commands can generate large amounts of debugging output. If logging of debug output to the router console is enabled (the default condition), this output may fill the console buffer, preventing the router from processing packets until the contents of the console buffer have been printed. The debug x25, debug x25 interface, debug x25 vc, and debug x25 xot commands all generate the same basic output. The debug x25 interface, debug x25 vc, and debug x25 xot commands narrow the scope of the debug x25 output to specific virtual circuits or types of traffic. This command is particularly useful for diagnosing problems encountered when placing calls. The debug x25 all output includes data, control messages, and flow control packets for all virtual circuits of the router. All debug x25 commands can take either the events or the all keyword. The keyword all is the default and causes all packets meeting the other debug criteria to be reported. The keyword events omits reports of any Data or RR flow control packets; the normal flow of data and RR packets is commonly large and less interesting to the user, so event reporting can significantly decrease the processor load induced by debug reporting. Use the dump keyword to display the entire contents, including user data, of X.25 packets. The encoded X.25 packet contents are displayed after the standard packet description. The output includes the offset into the packet and the display of the data in both hexadecimal and ASCII formats.
Caution
The X.25 packet information that is reported by using the dump keyword may contain sensitive data; for example, clear-text account identities and passwords. The network access policies and router configuration should be controlled appropriately to address this risk.
Examples
The following is sample output from the debug x25 command, displaying output concerning the functions X.25 restart, call setup, data exchange, and clear:
Router# debug x25 Serial0: X.25 I R/Inactive Restart (5) 8 lci 0 Cause 7, Diag 0 (Network operational/No additional information) Serial0: X.25 O R3 Restart Confirm (3) 8 lci 0 Serial0: X.25 I P1 Call (15) 8 lci 1 From(6): 170091 To(6): 170090 Facilities: (0) Call User Data (4): 0xCC000000 (ip) Serial0: X.25 O P3 Call Confirm (3) 8 lci 1 Serial0: X.25 I D1 Data (103) 8 lci 1 PS 0 PR 0 Serial0: X.25 O D1 Data (103) 8 lci 1 PS 0 PR 1 Serial0: X.25 I P4 Clear (5) 8 lci 1 Cause 9, Diag 122 (Out of order/Maintenance action) Serial0: X.25 O P7 Clear Confirm (3) 8 lci 1
The following example of the debug x25 command with the events keyword shows output related to the DNS-Based X.25 Routing feature. It shows messages concerning access to the DNS server. In the example, nine alternate addresses for one XOT path are entered into the DNS server database. All nine addresses are returned to the host cache of the router by the DNS server. However, only six addresses will be used during the XOT switch attempt because this is the limit that XOT allows.
DB-2912
December 2010
Router# debug x25 events 00:18:25:Serial1:X.25 I R1 Call (11) 8 lci 1024 00:18:25: From (0): To (4):444 00:18:25: Facilities:(0) 00:18:25: Call User Data (4):0x01000000 (pad) 00:18:25:X.25 host name sent for DNS lookup is "444" 00:18:26:%3-TRUNCATE_ALT_XOT_DNS_DEST:Truncating excess XOT addresses (3) returned by DNS 00:18:26:DNS got X.25 host mapping for "444" via network 00:18:32:[10.1.1.8 (pending)]:XOT open failed (Connection timed out; remote responding) 00:18:38:[10.1.1.7 (pending)]:XOT open failed (Connection timed out; remote responding) 00:18:44:[10.1.1.6 (pending)]:XOT open failed (Connection timed out; remote responding) 00:18:50:[10.1.1.5 (pending)]:XOT open failed (Connection timed out; remote responding) 00:18:56:[10.1.1.4 (pending)]:XOT open failed (Connection timed out; remote responding) 00:20:04:[10.1.1.3,1998/10.1.1.3,11007]:XOT O P2 Call (17) 8 lci 1 00:20:04: From (0): To (4):444 00:20:04: Facilities:(6) 00:20:04: Packet sizes:128 128 00:20:04: Window sizes:2 2 00:20:04: Call User Data (4):0x01000000 (pad) 00:20:04:[10.1.1.3,1998/10.1.1.3,11007]:XOT I P2 Call Confirm (11) 8 lci 1 00:20:04: From (0): To (0): 00:20:04: Facilities:(6) 00:20:04: Packet sizes:128 128 00:20:04: Window sizes:2 2 00:20:04:Serial1:X.25 O R1 Call Confirm (5) 8 lci 1024 00:20:04: From (0): To (0): 00:20:04: Facilities:(0)
host not host not host not host not host not
The following examples show output for the x25 debug command with the events keyword when record boundary preservation (RBP) has been configured using the x25 map rbp local command. The following display shows establishment of connection:
X25 RBP:Incoming Serial0/1:X.25 O From (5):13133 Facilities:(0) Serial0/1:X.25 I connection for port 9999 from 10.0.155.30 port 11001 R1 Call (10) 8 lci 64 To (5):12131 R1 Call Confirm (3) 8 lci 64
The following display shows that the X.25 call was cleared by the X.25 host:
Serial0/1:X.25 I R1 Clear (5) 8 lci 64 Cause 0, Diag 122 (DTE originated/Maintenance action) X25 RBP:X.25 circuit cleared Serial0/1:X.25 O R1 Clear Confirm (3) 8 lci 64
The following display shows that the TCP session has terminated:
[10.0.155.30,11000/10.0.155.33,9999]:TCP receive error, End of data transfer X25 RBP:End of data transfer Serial0/1:X.25 O R1 Clear (5) 8 lci 64 Cause 9, Diag 122 (Out of order/Maintenance action) Serial0/1:X.25 I R1 Clear Confirm (3) 8 lci 64
DB-2913
The following examples show output of the x25 debug command with the events keyword when RBP has been configured using the x25 pvc rbp local command. The following display shows data on the permanent virtual circuit (PVC) before the TCP session has been established:
X25 RBP:Data on unconnected PVC Serial1/0:X.25 O D1 Reset (5) 8 lci 1 Cause 0, Diag 113 (DTE originated/Remote network problem) Serial1/0:X.25 I D2 Reset Confirm (3) 8 lci 1
The following display shows termination of connection when the X.25 PVC was reset:
Serial1/0:X.25 I D1 Reset (5) 8 lci 1 Cause 15, Diag 122 (Network operational (PVC)/Maintenance action) X25 RBP:Reset packet received Serial1/0:X.25 O D3 Reset Confirm (3) 8 lci 1
The following display shows that the TCP session has terminated:
[2.30.0.30,11003/2.30.0.33,9998]:TCP receive error, End of data transfer X25 RBP:End of data transfer Serial1/0:X.25 O D1 Reset (5) 8 lci 1 Cause 0, Diag 113 (DTE originated/Remote network problem) Serial1/0:X.25 I D2 Reset Confirm (3) 8 lci 1
The following examples show output of the x25 debug command with the events keyword when RBP has been configured using the x25 map rbp remote command. The following display shows that the X.25 call was cleared:
Serial0/1:X.25 I R1 Clear (5) 8 lci 1024 Cause 0, Diag 122 (DTE originated/Maintenance action) X25 RBP:X.25 circuit cleared Serial0/1:X.25 O R1 Clear Confirm (3) 8 lci 1024
The following display shows that the X.25 call was reset:
Serial0/1:X.25 I D1 Reset (5) 8 lci 1024 Cause 0, Diag 122 (DTE originated/Maintenance action) X25 RBP:Reset packet received Serial0/1:X.25 O R1 Clear (5) 8 lci 1024 Cause 9, Diag 122 (Out of order/Maintenance action) Serial0/1:X.25 I R1 Clear Confirm (3) 8 lci 1024
The following examples show output of the x25 debug command with the events keyword when RBP has been configured using the x25 pvc rbp remote command. The following display shows that the X.25 PVC has been reset:
Serial0/0:X.25 I D1 Reset (5) 8 lci 1 Cause 0, Diag 122 (DTE originated/Maintenance action) X25 RBP:Reset packet received Serial0/0:X.25 O D2 Reset Confirm (3) 8 lci 1
DB-2914
December 2010
The following display shows that the connection was terminated when the X.25 interface was restarted:
Serial0/0:X.25 I R1 Restart (5) 8 lci 0 Cause 0, Diag 122 (DTE originated/Maintenance action) X25 RBP:X.25 PVC inactive Serial0/0:X.25 O R2 Restart Confirm (3) 8 lci 0 Serial0/0:X.25 O D1 Reset (5) 8 lci 1 Cause 1, Diag 113 (Out of order (PVC)/Remote network problem) Serial0/0:X.25 I D3 Reset Confirm (3) 8 lci 1
The following is sample output for the debug x25 dump command. The encoded X.25 packet contents are displayed after the standard packet description. The output includes the offset into the packet and the display of the data in both hexadecimal and ASCII formats.
Router# debug x25 dump Serial1: X.25 O R/Inactive Restart (5) 8 lci 0 Cause 0, Diag 0 (DTE originated/No additional information) 0: 1000FB00 00 ..{.. Serial1: X.25 I R2 Restart (5) 8 lci 0 Cause 7, Diag 0 (Network operational/No additional information) 0: 1000FB ..{ 3: 0700 .. Serial1: X.25 I R1 Call (13) 8 lci 1 From (4): 2501 To (4): 2502 Facilities: (0) Call User Data (4): 0xCC000000 (ip) 0: 10010B 44250225 0100CC00 ...D%.%..L. 11: 0000 .. Serial1: X.25 O R1 Call Confirm (3) 8 lci 1 0: 10010F ... Serial1: X.25 I D1 Data (103) 8 lci 1 PS 0 PR 0 0: 100100 45000064 00000000 ...E..d.... 11: FF01A764 0A190001 0A190002 0800CBFB ..'d..........K{ 27: 0B1E22CA 00000000 00028464 ABCDABCD .."J.......d+M+M 43: ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M 59: ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M 75: ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M 91: ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M Serial1: X.25 O D1 Data (103) 8 lci 1 PS 0 PR 1 0: 100120 45000064 00000000 .. E..d.... 11: FF01A764 0A190002 0A190001 0000D3FB ..'d..........S{ 27: 0B1E22CA 00000000 00028464 ABCDABCD .."J.......d+M+M 43: ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M 59: ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M 75: ABCDABCD ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M+M+M 91: ABCDABCD ABCDABCD ABCDABCD +M+M+M+M+M+M Serial1: X.25 I R1 Clear (5) 8 lci 1 Cause 9, Diag 122 (Out of order/Maintenance action) 0: 100113 097A ....z Serial1: X.25 O R1 Clear Confirm (3) 8 lci 1 0: 100117 .
Description Interface on which the X.25 event occurred. Type of event this message describes.
DB-2915
Table 393
Field I R3
Description Letter indicating whether the X.25 packet was input (I) or output (O) through the interface. State of the service or virtual circuit (VC). Possible values follow: R/InactivePacket layer awaiting link layer service R1Packet layer ready R2Data terminal equipment (DTE) restart request R3DCE restart indication P/InactiveVC awaiting packet layer service P1Idle P2DTE waiting for DCE to connect CALL P3DCE waiting for DTE to accept CALL P4Data transfer P5CALL collision P6DTE clear request P7DCE clear indication D/InactiveVC awaiting setup D1Flow control ready D2DTE reset request D3DCE reset indication Refer to Annex B of the ITU-T Recommendation X.25 for more information on these states.
DB-2916
December 2010
Table 393
Field Restart
Restart Restart Confirm Diagnostic Call Call Confirm Clear Clear Confirm Reset Reset Confirm Data Receiver Not Ready (RNR) RR (Receiver Ready) Interrupt Interrupt Confirm PVC Setup
P Events
D Events
D1 Events
XOT Overhead
Refer to RFC 1613 Cisco Systems X.25 over TCP (XOT) for information about the XOT PVC Setup packet type. (5) 8 lci 0 Cause 7 Number of bytes in the packet. Modulo of the virtual circuit. Possible values are 8 and 128. VC number. Refer to Annex A of the ITU-T Recommendation X.25 for information on VC assignment. Code indicating the event that triggered the packet. The Cause field can appear only in entries for Clear, Reset, and Restart packets. Possible values for the Cause field can vary, depending on the type of packet. Refer to the appendix X.25 Cause and Diagnostic Codes for an explanation of these codes. Code providing an additional hint of what, if anything, went wrong. The Diag field can appear only in entries for Clear, Diagnostic (as error 0), Reset, and Restart packets. Refer to the appendix X.25 Cause and Diagnostic Codes for an explanation of these codes. The standard explanations of the Cause and Diagnostic codes (cause/diag).
Diag 0
DB-2917
Table 393
Description Source address. (6) indicates the number of digits in the address that follows. The source address is part of the address block that may be encoded in Call Setup packets. Destination address. (6) indicates the number of digits in the address that follows. The destination address is part of the address block that may be encoded in Call Setup packets. Indicates that a facilities block is encoded and that it consists of 0 bytes. A breakdown of the encoded facilities (if any) follows. Indicates that the Call User Data (CUD) field is present and consists of 4 bytes. Protocol identifier (PID). This subfield of the CUD field is presented in the output as a hexadecimal string followed by the name of the protocol (in this case, IP) that the string represents. Any bytes following the PID are designated user data and may be used by an application separately from the PID.
To (6): 170090
Related Commands
Description Displays information about a specific X.25 or CMNS context or virtual circuit. Displays information about traffic for all virtual circuits that use a given number. Displays information about traffic to or from a specific XOT host.
DB-2918
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
It is generally recommended that the debug x25 annexg command be used only when specifically requested by Cisco TAC to obtain information about a problem with an Annex G configuration. The messages displayed by the debug x25 annexg command are meant to aid in the diagnosing of internal errors.
Caution
The X.25 debug commands can generate large amounts of debugging output. If logging of debug output to the router console is enabled (the default condition), this output may fill the console buffer, preventing the router from processing packets until the contents of the console buffer have been printed.
Examples
The following shows sample output from the debug x25 annexg command for a Frame Relay data-link connection identifier (DLCI) configured for Annex G operation:
Router# debug x25 annexg Jul 31 05:23:20.316:annexg_process_events:DLCI 18 attached to interface Serial2/0:0 is ACTIVE Jul 31 05:23:20.316:annexg_ctxt_create:Creating X.25 context over Serial2/0:0 (DLCI:18 using X.25 profile:OMC), type 10, len 2, addr 00 12 Jul 31 05:23:20.316:annexg_create_lower_layer:Se2/0:0 DLCI 18, payload 1606, overhead 2 Jul 31 05:23:20.320:annexg_restart_tx:sending pak to Serial2/0:0 Jul 31 05:23:23.320:annexg_restart_tx:sending pak to Serial2/0:0
DB-2919
Table 394
Description Amount of buffer space available per message before adding Frame Relay and device-specific headers. The length of the Frame Relay header and any device-specific header that may be needed.
Related Commands
Description Displays information about all X.25 traffic or a specific X.25 service class. Displays information about specific X.25, Annex G or CMN contexts or virtual circuits that occur on the identified interface. Displays information about traffic for all virtual circuits that have a given number.
DB-2920
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the debug x25 aodi command to display interface PPP events running over an X.25 session and to debug X.25 connections between a client and server configured for Always On/Dynamic ISDN (AO/DI).
Examples
The following examples show the normal sequence of events for both the AO/DI client and the server sides:
Client Side
Router# debug x25 aodi PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: Virtual-Access1: Initiating AODI call request Bringing UP X.25 AODI VC AODI Client Call Confirm Event Received Cloning interface for AODI is Di1 Queuing AODI Client Map Event Event:AODI Client Map Created interface Vi2 for AODI service Attaching primary link Vi2 to Di1 Cloning Vi2 for AODI service using Di1 Vi2: Setting the PPP call direction as OUT Vi2: Setting vectors for RFC1598 operation on BRI3/0:0 VC 0 Vi2: Setting the interface default bandwidth to 10 Kbps Virtual-Access2: Initiating AODI call request Bringing UP X.25 AODI VC AODI Client Call Confirm Event Received
DB-2921
Server Side
Router# debug x25 aodi PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: PPP-X25: AODI Call Request Event Received Event:AODI Incoming Call Request Created interface Vi1 for AODI service Attaching primary link Vi1 to Di1 Cloning Vi1 for AODI service using Di1 Vi1: Setting vectors for RFC1598 operation on BRI3/0:0 VC 1 Vi1: Setting the interface default bandwidth to 10 Kbps Binding X.25 VC 1 on BRI3/0:0 to Vi1
DB-2922
December 2010
Syntax Description
Serial interface number that is configured for X.25 or Annex G service. Interface supporting CMNS traffic and, if specified, the MAC address of a remote host. The interface type can be Ethernet, Token Ring, or FDDI. (Optional) MAC address of the CMNS interface and remote host. (Optional) Virtual circuit number. Range is from 1 to 4095. (Optional) Displays all traffic except Data and Receiver Ready (RR) packets. (Optional) Displays all traffic. This is the default. (Optional) Displays the encoded packet contents in hexadecimal and ASCII formats.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The dump keyword was added. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
The X.25 debug commands can generate large amounts of debugging output. If logging of debug output to the router console is enabled (the default condition), this output may fill the console buffer, preventing the router from processing packets until the contents of the console buffer have been printed.
DB-2923
The debug x25, debug x25 interface, debug x25 vc, and debug x25 xot commands all generate the same basic output. The debug x25 interface, debug x25 vc, and debug x25 xot commands narrow the scope of the debug x25 output to specific virtual circuits or types of traffic. The debug x25 interface command is useful for diagnosing problems encountered with a single X.25 or CMNS host or virtual circuit. The keyword all is the default and causes all packets meeting the other debug criteria to be reported. The keyword events omits reports of any Data or RR flow control packets; the normal flow of data and RR packets is commonly large and less interesting to the user, so event reporting can significantly decrease the processor load induced by debug reporting. Use the dump keyword to display the entire contents, including user data, of X.25 packets. The encoded X.25 packet contents are displayed after the standard packet description. The output includes the offset into the packet and the display of the data in both hexadecimal and ASCII formats.
Caution
The X.25 packet information that is reported by using the dump keyword may contain sensitive data; for example, clear-text account identities and passwords. The network access policies and router configuration should be controlled appropriately to address this risk.
Examples
The following is sample output from the debug x25 interface command:
Router# debug x25 interface serial 0 X.25 packet debugging is on X.25 packet debugging is restricted to interface serial0 Serial0: X.25 I R/Inactive Restart (5) 8 lci 0 Cause 7, Diag 0 (Network operational/No additional information) Serial0: X.25 O R3 Restart Confirm (3) 8 lci 0 Serial0: X.25 I P1 Call (15) 8 lci 1 From(6): 170091 To(6): 170090 Facilities: (0) Call User Data (4): 0xCC000000 (ip) Serial0: X.25 O P3 Call Confirm (3) 8 lci 1 Serial0: X.25 I D1 Data (103) 8 lci 1 PS 0 PR 0 Serial0: X.25 O D1 Data (103) 8 lci 1 PS 0 PR 1 Serial0: X.25 I P4 Clear (5) 8 lci 1 Cause 9, Diag 122 (Out of order/Maintenance action) Serial0: X.25 O P7 Clear Confirm (3) 8 lci 1
Description Interface on which the X.25 event occurred. Type of event this message describes. Letter indicating whether the X.25 packet was input (I) or output (O) through the interface.
DB-2924
December 2010
Table 395
Field R3
Description State of the service or virtual circuit (VC). Possible values follow: R/InactivePacket layer awaiting link layer service R1Packet layer ready R2Data terminal equipment (DTE) restart request R3DCE restart indication P/InactiveVC awaiting packet layer service P1Idle P2DTE waiting for DCE to connect CALL P3DCE waiting for DTE to accept CALL P4Data transfer P5CALL collision P6DTE clear request P7DCE clear indication D/InactiveVC awaiting setup D1Flow control ready D2DTE reset request D3DCE reset indication Refer to Annex B of the ITU-T Recommendation X.25 for more information on these states.
DB-2925
Table 395
Field Restart
Restart Restart Confirm Diagnostic Call Call Confirm Clear Clear Confirm Reset Reset Confirm Data Receiver Not Ready (RNR) RR (Receiver Ready) Interrupt Interrupt Confirm PVC Setup
P Events
D Events
D1 Events
XOT Overhead
Number of bytes in the packet. Modulo of the virtual circuit. Possible values are 8 and 128. VC number. Refer to Annex A of the ITU-T Recommendation X.25 for information on VC assignment. Code indicating the event that triggered the packet. The Cause field can appear only in entries for Clear, Reset, and Restart packets. Possible values for the Cause field can vary, depending on the type of packet. Refer to the appendix X.25 Cause and Diagnostic Codes for an explanation of these codes. Code providing an additional hint of what, if anything, went wrong. The Diag field can appear only in entries for Clear, Diagnostic (as error 0), Reset, and Restart packets. Refer to the appendix X.25 Cause and Diagnostic Codes for an explanation of these codes. The standard explanations of the Cause and Diagnostic codes (cause/diag).
Diag 0
DB-2926
December 2010
Table 395
Description Source address. (6) indicates the number of digits in the address that follows. The source address is part of the address block that may be encoded in Call Setup packets. Destination address. (6) indicates the number of digits in the address that follows. The destination address is part of the address block that may be encoded in Call Setup packets. Indicates that a facilities block is encoded and that it consists of 0 bytes. A breakdown of the encoded facilities (if any) follows. Protocol identifier (PID). This subfield of the CUD field is presented in the output as a hexadecimal string followed by the name of the protocol (in this case, IP) that the string represents. Any bytes following the PID are designated user data and may be used by an application separately from the PID.
To (6): 170090
Facilities:(0)
Call User Data (4): Indicates that the Call User Data (CUD) field is present and consists of 4 bytes. 0xCC000000 (ip)
Related Commands
Description Displays information about all X.25 traffic or a specific X.25 service class. Displays information about traffic for all virtual circuits that use a given number. Displays information about traffic to or from a specific XOT host.
DB-2927
debug x25 vc
To display information about traffic for all virtual circuits that have a given number, use the debug x25 vc command. To disable debugging output, use the no form of this command. debug x25 vc number [events | all] [dump] no debug x25 vc number [events | all] [dump]
Syntax Description
Virtual circuit number. Range is from 1 to 4095. (Optional) Displays all traffic except Data and Receiver Ready (RR) packets. (Optional) Displays all traffic. This is the default. (Optional) Displays the encoded packet contents in hexadecimal and ASCII formats.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The dump keyword was introduced. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
The X.25 debug commands can generate large amounts of debugging output. If logging of debug output to the router console is enabled (the default condition), this output may fill the console buffer, preventing the router from processing packets until the contents of the console buffer have been printed. The debug x25, debug x25 interface, debug x25 vc, and debug x25 xot commands all generate the same basic output. The debug x25 interface, debug x25 vc, and debug x25 xot commands narrow the scope of the debug x25 output to specific virtual circuits or types of traffic. Because no interface is specified by the debug x25 vc command, traffic on any virtual circuit that has the specified number is reported. Virtual circuit (VC) zero (vc 0) cannot be specified. It is used for X.25 service messages, such as RESTART packets, not virtual circuit traffic. Service messages can be monitored only when no virtual circuit filter is used.
DB-2928
December 2010
Use the dump keyword to display the entire contents, including user data, of X.25 packets. The encoded X.25 packet contents are displayed after the standard packet description. The output includes the offset into the packet and the display of the data in both hexadecimal and ASCII formats.
Caution
The X.25 packet information that is reported by using the dump keyword may contain sensitive data; for example, clear-text account identities and passwords. The network access policies and router configuration should be controlled appropriately to address this risk.
Examples
The following shows sample output from the debug x25 vc command:
Router# debug x25 vc 1 events X.25 special event debugging is on X.25 debug output restricted to VC number 1 Router# show debug X.25 (filtered for VC 1): X.25 special event debugging is on *Jun 18 20:22:29.735 UTC:Serial0:X.25 O R1 Call (13) 8 lci 1 *Jun 18 20:22:29.735 UTC: From (4):2501 To (4):2502 *Jun 18 20:22:29.735 UTC: Facilities:(0) *Jun 18 20:22:29.735 UTC: Call User Data (4):0xCC000000 (ip) *Jun 18 20:22:29.739 UTC:Serial0:X.25 I R1 Call Confirm (3) 8 lci 1 *Jun 18 20:22:36.651 UTC:Serial0:X.25 O R1 Clear (5) 8 lci 1 *Jun 18 20:22:36.651 UTC: Cause 9, Diag 122 (Out of order/Maintenance action) *Jun 18 20:22:36.655 UTC:Serial0:X.25 I R1 Clear Confirm (3) 8 lci 1
Description Interface on which the X.25 event occurred. Type of event this message describes. Letter indicating whether the X.25 packet was input (I) or output (O) through the interface.
DB-2929
Table 396
Field R1
Description State of the service or virtual circuit (VC). Possible values follow: R/InactivePacket layer awaiting link layer service R1Packet layer ready R2Data terminal equipment (DTE) restart request R3DCE restart indication P/InactiveVC awaiting packet layer service P1Idle P2DTE waiting for DCE to connect CALL P3DCE waiting for DTE to accept CALL P4Data transfer P5CALL collision P6DTE clear request P7DCE clear indication D/InactiveVC awaiting setup D1Flow control ready D2DTE reset request D3DCE reset indication Refer to Annex B of the ITU-T Recommendation X.25 for more information on these states.
DB-2930
December 2010
Table 396
Field Call
Restart Restart Confirm Diagnostic Call Call Confirm Clear Clear Confirm Reset Reset Confirm Data Receiver Not Ready (RNR) RR (Receiver Ready) Interrupt Interrupt Confirm PVC Setup
P Events
D Events
D1 Events
XOT Overhead
Number of bytes in the packet. Modulo of the virtual circuit. Possible values are 8 and 128. VC number. Refer to Annex A of the ITU-T Recommendation X.25 for information on VC assignment. Source address. (4) indicates the number of digits in the address that follows. The source address is part of the address block that may be encoded in Call Setup packets. Destination address. (4) indicates the number of digits in the address that follows. The destination address is part of the address block that may be encoded in Call Setup packets. Indicates that 0 bytes are being used to encode facilities. Indicates that the Call User Data (CUD) field is present and consists of 4 bytes. Protocol identifier (PID). This subfield of the CUD field is presented in the output as a hexadecimal string followed by the name of the protocol (in this case, IP) that the string represents. Any bytes following the PID are designated user data and may be used by an application separately from the PID.
To (4): 2502
DB-2931
Table 396
Field Cause 7
Description Code indicating the event that triggered the packet. The Cause field can appear only in entries for Clear, Reset, and Restart packets. Possible values for the Cause field can vary, depending on the type of packet. Refer to the appendix X.25 Cause and Diagnostic Codes for an explanation of these codes. Code providing an additional hint of what, if anything, went wrong. The Diag field can appear only in entries for Clear, Diagnostic (as error 0), Reset, and Restart packets. Refer to the appendix X.25 Cause and Diagnostic Codes for an explanation of these codes. The standard explanations of the Cause and Diagnostic codes (cause/diag).
Diag 0
Related Commands
Description Displays information about all X.25 traffic or a specific X.25 service class. Displays information about a specific X.25 or CMNS context or virtual circuit. Displays information about traffic to or from a specific XOT host.
DB-2932
December 2010
Syntax Description
remote ip-address [port number] local ip-address [port number] events all dump
(Optional) Remote IP address and, optionally, a port number. Range is from 1 to 65535. (Optional) Local host IP address and, optionally, a port number. Range is from 1 to 65535. (Optional) Displays all traffic except Data and Receiver Ready (RR) packets. (Optional) Displays all traffic. This is the default. (Optional) Displays the encoded packet contents in hexadecimal and ASCII formats.
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. The dump keyword was added. This command was integrated into Cisco IOS Release 12.2(33)SRA. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Caution
The X.25 debug commands can generate large amounts of debugging output. If logging of debug output to the router console is enabled (the default condition), this output may fill the console buffer, preventing the router from processing packets until the contents of the console buffer have been printed. The debug x25, debug x25 interface, debug x25 vc, and debug x25 xot commands all generate the same basic output. The debug x25 interface, debug x25 vc, and debug x25 xot commands narrow the scope of the debug x25 output to specific virtual circuits or types of traffic.
DB-2933
The debug x25 xot output allows you to restrict the debug output reporting to XOT traffic for one or both hosts or host/port combinations. Because each XOT virtual circuit uses a unique TCP connection, an XOT debug request that specifies both host addresses and ports will report traffic only for that virtual circuit. Also, you can restrict reporting to sessions initiated by the local or remote router by specifying 1998 for the remote or local port. (XOT connections are received on port 1998.) Use the dump keyword to display the entire contents, including user data, of X.25 packets. The encoded X.25 packet contents are displayed after the standard packet description. The output includes the offset into the packet and the display of the data in both hexadecimal and ASCII formats.
Caution
The X.25 packet information that is reported by using the dump keyword may contain sensitive data; for example, clear-text account identities and passwords. The network access policies and router configuration should be controlled appropriately to address this risk.
Examples
The following shows sample output from the debug x25 xot command:
Router# debug x25 xot X.25 packet debugging is on X.25 debug output restricted to protocol XOT Router# show debug X.25 (filtered for XOT): X.25 packet debugging is on *Jun 18 20:32:34.699 UTC:[10.0.155.71,11001/10.0.155.70,1998]:XOT lci 1 *Jun 18 20:32:34.699 UTC: From (4):2501 To (4):2502 *Jun 18 20:32:34.699 UTC: Facilities:(6) *Jun 18 20:32:34.699 UTC: Packet sizes:128 128 *Jun 18 20:32:34.699 UTC: Window sizes:2 2 *Jun 18 20:32:34.699 UTC: Call User Data (4):0xCC000000 (ip) *Jun 18 20:32:34.707 UTC:[10.0.155.71,11001/10.0.155.70,1998]:XOT lci 1 *Jun 18 20:32:34.707 UTC: From (0): To (0): *Jun 18 20:32:34.707 UTC: Facilities:(6) *Jun 18 20:32:34.707 UTC: Packet sizes:128 128 *Jun 18 20:32:34.707 UTC: Window sizes:2 2 *Jun 18 20:32:34.715 UTC:[10.0.155.71,11001/10.0.155.70,1998]:XOT PS 0 PR 0 *Jun 18 20:32:34.723 UTC:[10.0.155.71,11001/10.0.155.70,1998]:XOT PS 0 PR 1 *Jun 18 20:32:34.731 UTC:[10.0.155.71,11001/10.0.155.70,1998]:XOT PS 1 PR 1 *Jun 18 20:32:34.739 UTC:[10.0.155.71,11001/10.0.155.70,1998]:XOT PS 1 PR 2 *Jun 18 20:32:34.747 UTC:[10.0.155.71,11001/10.0.155.70,1998]:XOT PS 2 PR 2 *Jun 18 20:32:34.755 UTC:[10.0.155.71,11001/10.0.155.70,1998]:XOT PS 2 PR 3 *Jun 18 20:32:34.763 UTC:[10.0.155.71,11001/10.0.155.70,1998]:XOT PS 3 PR 3 *Jun 18 20:32:34.771 UTC:[10.0.155.71,11001/10.0.155.70,1998]:XOT PS 3 PR 4 *Jun 18 20:32:34.779 UTC:[10.0.155.71,11001/10.0.155.70,1998]:XOT PS 4 PR 4 *Jun 18 20:32:34.787 UTC:[10.0.155.71,11001/10.0.155.70,1998]:XOT PS 4 PR 5
I D1 Data (103) 8 lci 1 O D1 Data (103) 8 lci 1 I D1 Data (103) 8 lci 1 O D1 Data (103) 8 lci 1 I D1 Data (103) 8 lci 1 O D1 Data (103) 8 lci 1 I D1 Data (103) 8 lci 1 O D1 Data (103) 8 lci 1 I D1 Data (103) 8 lci 1 O D1 Data (103) 8 lci 1
DB-2934
December 2010
Field [10.0.155.71,11001/10.0.155.70,1998]
Description TCP connection identified by the remote IP address, remote TCP port/local IP address, local TCP port. An XOT connection is always placed to port ID 1998, so a remote port ID of 1998 implies that the router initiated the TCP connection, whereas a local port ID of 1998 implies that the router received the TCP connection.
XOT I P/Inactive
Type of event this message describes. Letter indicating whether the X.25 packet was input (I) or output (O) through the interface. State of the service or virtual circuit (VC). Possible values follow: R/InactivePacket layer awaiting link layer service R1Packet layer ready R2Data terminal equipment (DTE) restart request R3DCE restart indication P/InactiveVC awaiting packet layer service P1Idle P2DTE waiting for DCE to connect CALL P3DCE waiting for DTE to accept CALL P4Data transfer P5CALL collision P6DTE clear request P7DCE clear indication D/InactiveVC awaiting setup D1Flow control ready D2DTE reset request D3DCE reset indication Refer to Annex B of the ITU-T Recommendation X.25 for more information on these states.
DB-2935
Table 397
Field Call
Restart Restart Confirm Diagnostic Call Call Confirm Clear Clear Confirm Reset Reset Confirm Data Receiver Not Ready (RNR) RR (Receiver Ready) Interrupt Interrupt Confirm PVC Setup
P Events
D Events
D1 Events
XOT Overhead
(19) 8 lci 1
Number of bytes in the packet. Modulo of the virtual circuit. Possible values are 8 and 128. VC number. Refer to Annex A of the ITU-T Recommendation X.25 for information on VC assignment. Source address. (4) indicates the number of digits in the address that follows. The source address is part of the address block that may be encoded in Call Setup packets. Destination address. (4) indicates the number of digits in the address that follows. The destination address is part of the address block that may be encoded in Call Setup packets. Indicates that a facilities block is encoded and that it consists of 6 bytes. A breakdown of the encoded facilities follows.
From (4):2501
To (4): 2502
Facilities:(6)
DB-2936
December 2010
Table 397
Field Packet sizes Window sizes Call User Data (4): 0xCC000000 (ip)
Description Encoded packet size facility settings. Encoded window size facility settings. Indicates that the Call User Data (CUD) field is present and consists of 4 bytes. Protocol identifier (PID). This subfield of the CUD field is presented in the output as a hexadecimal string followed by the name of the protocol (in this case, IP) that the string represents. Any bytes following the PID are designated user data and may be used by an application separately from the PID.
Cause 7
Code indicating the event that triggered the packet. The Cause field can appear only in entries for Clear, Reset, and Restart packets. Possible values for the Cause field can vary, depending on the type of packet. Refer to the appendix X.25 Cause and Diagnostic Codes for an explanation of these codes. Code providing an additional hint of what, if anything, went wrong. The Diag field can appear only in entries for Clear, Diagnostic (as error 0), Reset, and Restart packets. Refer to the appendix X.25 Cause and Diagnostic Codes for an explanation of these codes. The standard explanations of the Cause and Diagnostic codes (cause/diag).
Diag 0
Related Commands
Description Displays information about all X.25 traffic or a specific X.25 service class. Displays information about a specific X.25 or CMNS context or virtual circuit. Displays information about traffic for all virtual circuits that use a given number.
DB-2937
debug x28
To monitor error information and X.28 connection activity, use the debug x28 command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug x28 no debug x28
Syntax Description
Command Modes
Privileged EXEC
Examples
The following is sample output while the packet assembler/disassembler (PAD) initiates an X.28 outgoing call:
Router# debug x28 X28 MODE debugging is on Router# x28 * 03:30:43: X.28 mode session started 03:30:43: X28 escape is exit 03:30:43: Speed for console & vty lines :9600 *call 123456 COM 03:39:04: address ="123456", cud="[none]" 03:39:04: Setting X.3 Parameters for this call...1:1 2:1 3:126 4:0 5:1 6:2 7:2 8:0 9:0 10:0 11:14 12:1 13:0 14:0 15:0 16:127 17:24 18:18 19:2 20:0 21:0 22:0 Router> exit CLR CONF * *03:40:50: Session ended * exit Router# *03:40:51: Exiting X.28 mode
DB-2938
December 2010
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced. Support for this command was extended to the Cisco uBR924 cable modem. This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
See the following examples to turn on and off external call control debugging:
AS5300-TGW# debug xcctsp all External call control all debugging is on AS5300-TGW# no debug xcctsp all External call control all debugging is off AS5300-TGW#
Related Commands
Description Enables debugging on external call control errors. Enables debugging on external call control sessions.
DB-2939